united states of america usa  linkedinfacebookgoogle
  • business-it-consulting
  • business-managed-it
  • web-design
  • business-it-services
  • No matter how big or small: we will get you up and running!
  • You run your business - we manage your IT!
  • Leverage the power of Content Management Systems! We provide custom solutions for all sectors.
  • End-to-end IT consulting firm, providing support for your IT and network infrastructure.

For immediate IT Support call: (786) 646-6461

Tailored IT Services:

All businesses are different. Because we appreciate the uniqueness of each firm, we take a customized approach to business IT support. Select the industry that best applies to you and see how our technology management can help your firm grow:

Latest IT News and Updates

Schedule nightly reboot in linux

Linux IT SupportSometimes it is a good idea to schedule a regular reboots, to clear the memory and remove any crashed processes.

This can be easily achieved by adding the task to a cron tab (Linux scheduling system):

First, open the crontab (as a root):

crontab -e

and add a line similar to this:

Continue Reading

Remove mailbox from quarantine (Exchange 2013 and up)

Exchange Support and ConsultingMicrosoft has simplified the process of removing a mailbox from quarantine starting with Exchange 2013. (Before it was a more complicated process, involving registry edits).

Keep in mind that Exchange quarantines mailboxes for a reason. It tries to correct a problem automatically, but if it fails, it will quarantine the mailbox again, so the root cause of the problem needs to be identified.

First, you need to find which mailbox was quarantined. Open Exchange management shell and run the follow codelet:

Continue Reading

Mount windows share in Linux (fstab)

Ubuntu Support and Consulting

This works on any modern distribution of Linux, but we are using Ubuntu 14.04 for the process. First, install CIFS/Samba tools, required to mount the share point:

In Ubuntu:

apt-get install cifs-utils

Now let's create the credentials file:

Continue Reading

Attacks with New Microsoft Office Vulnerability

Microsoft Support and ConsultingThere's a zero-day Microsoft office vulnerability out in the wild, which infects fully patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word. Using Protected View in word prevents the execution of the malicious code:

FireEye recently detected malicious Microsoft Office RTF documents that leverage a previously undisclosed vulnerability. This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit. FireEye has observed several Office documents exploiting the vulnerability that download and execute malware payloads from different well-known malware families.

Continue Reading

Add a software raid to Linux

linux-icon-19This tutorial is for adding extra disks to an already existing system, not conerting current ones to RAID. We are adding a RAID1 software RAID to most common Linux distributions (this should work on any one of them).

We have used 2 disks for this:
/dev/sdb: 500.1
/dev/sdc 500.1

Continue Reading

More Articles...

Tel: (786) 646-6461   |   Toll-Free: (877) 454-0758
1990 NE 163rd St, Suite 215, North Miami Beach, FL 33162, USA
Privacy Policy