For immediate IT Support call: (786) 646-6461
Tailored IT Services:
All businesses are different. Because we appreciate the uniqueness of each firm, we take a customized approach to business IT support. Select the industry that best applies to you and see how our technology management can help your firm grow:
Latest IT News and Updates
Sometimes it is a good idea to schedule a regular reboots, to clear the memory and remove any crashed processes.
This can be easily achieved by adding the task to a cron tab (Linux scheduling system):
First, open the crontab (as a root):
and add a line similar to this:
Microsoft has simplified the process of removing a mailbox from quarantine starting with Exchange 2013. (Before it was a more complicated process, involving registry edits).
Keep in mind that Exchange quarantines mailboxes for a reason. It tries to correct a problem automatically, but if it fails, it will quarantine the mailbox again, so the root cause of the problem needs to be identified.
First, you need to find which mailbox was quarantined. Open Exchange management shell and run the follow codelet:
This works on any modern distribution of Linux, but we are using Ubuntu 14.04 for the process. First, install CIFS/Samba tools, required to mount the share point:
apt-get install cifs-utils
Now let's create the credentials file:
There's a zero-day Microsoft office vulnerability out in the wild, which infects fully patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word. Using Protected View in word prevents the execution of the malicious code:
FireEye recently detected malicious Microsoft Office RTF documents that leverage a previously undisclosed vulnerability. This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit. FireEye has observed several Office documents exploiting the vulnerability that download and execute malware payloads from different well-known malware families.
This tutorial is for adding extra disks to an already existing system, not conerting current ones to RAID. We are adding a RAID1 software RAID to most common Linux distributions (this should work on any one of them).
We have used 2 disks for this: