For immediate IT Support call: (786) 646-6461
Tailored IT Services:
All businesses are different. Because we appreciate the uniqueness of each firm, we take a customized approach to business IT support. Select the industry that best applies to you and see how our technology management can help your firm grow:
Latest IT News and Updates
Let's say you are trying to change the permissions of some files (using chown or chmod), but you get an error:
Operation not permitted
This is (in most cases) because the files are locked (you can verify that by going to "Get Info" for each file or directory). One way to solve it is to go through the list of permission errors and manually unlock them using Finder. A quicker way is to do it on a command line:
Sometimes it is a good idea to schedule a regular reboots, to clear the memory and remove any crashed processes.
This can be easily achieved by adding the task to a cron tab (Linux scheduling system):
First, open the crontab (as a root):
and add a line similar to this:
Microsoft has simplified the process of removing a mailbox from quarantine starting with Exchange 2013. (Before it was a more complicated process, involving registry edits).
Keep in mind that Exchange quarantines mailboxes for a reason. It tries to correct a problem automatically, but if it fails, it will quarantine the mailbox again, so the root cause of the problem needs to be identified.
First, you need to find which mailbox was quarantined. Open Exchange management shell and run the follow codelet:
This works on any modern distribution of Linux, but we are using Ubuntu 14.04 for the process. First, install CIFS/Samba tools, required to mount the share point:
apt-get install cifs-utils
Now let's create the credentials file:
There's a zero-day Microsoft office vulnerability out in the wild, which infects fully patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word. Using Protected View in word prevents the execution of the malicious code:
FireEye recently detected malicious Microsoft Office RTF documents that leverage a previously undisclosed vulnerability. This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit. FireEye has observed several Office documents exploiting the vulnerability that download and execute malware payloads from different well-known malware families.