united states of america usa  linkedinfacebookgoogle
  • business-it-consulting
  • business-managed-it
  • web-design
  • business-it-services
  • No matter how big or small: we will get you up and running!
  • You run your business - we manage your IT!
  • Leverage the power of Content Management Systems! We provide custom solutions for all sectors.
  • End-to-end IT consulting firm, providing support for your IT and network infrastructure.

For immediate IT Support call: (786) 646-6461

Tailored IT Services:

All businesses are different. Because we appreciate the uniqueness of each firm, we take a customized approach to business IT support. Select the industry that best applies to you and see how our technology management can help your firm grow:

Latest IT News and Updates

Unlocking locked files in Mac OS

Let's say you are trying to change the permissions of some files (using chown or chmod), but you get an error:

Operation not permitted

Apple and Mac IT SupportThis is (in most cases) because the files are locked (you can verify that by going to "Get Info" for each file or directory). One way to solve it is to go through the list of permission errors and manually unlock them using Finder. A quicker way is to do it on a command line:

Continue Reading

Schedule nightly reboot in linux

Linux IT SupportSometimes it is a good idea to schedule a regular reboots, to clear the memory and remove any crashed processes.

This can be easily achieved by adding the task to a cron tab (Linux scheduling system):

First, open the crontab (as a root):

crontab -e

and add a line similar to this:

Continue Reading

Remove mailbox from quarantine (Exchange 2013 and up)

Exchange Support and ConsultingMicrosoft has simplified the process of removing a mailbox from quarantine starting with Exchange 2013. (Before it was a more complicated process, involving registry edits).

Keep in mind that Exchange quarantines mailboxes for a reason. It tries to correct a problem automatically, but if it fails, it will quarantine the mailbox again, so the root cause of the problem needs to be identified.

First, you need to find which mailbox was quarantined. Open Exchange management shell and run the follow codelet:

Continue Reading

Mount windows share in Linux (fstab)

Ubuntu Support and Consulting

This works on any modern distribution of Linux, but we are using Ubuntu 14.04 for the process. First, install CIFS/Samba tools, required to mount the share point:

In Ubuntu:

apt-get install cifs-utils

Now let's create the credentials file:

Continue Reading

Attacks with New Microsoft Office Vulnerability

Microsoft Support and ConsultingThere's a zero-day Microsoft office vulnerability out in the wild, which infects fully patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word. Using Protected View in word prevents the execution of the malicious code:

FireEye recently detected malicious Microsoft Office RTF documents that leverage a previously undisclosed vulnerability. This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit. FireEye has observed several Office documents exploiting the vulnerability that download and execute malware payloads from different well-known malware families.

Continue Reading

More Articles...

Tel: (786) 646-6461   |   Toll-Free: (877) 454-0758
18350 NW 2nd Ave, Suite 406E, Miami, FL, 33169, USA
Privacy Policy