|
We use a solution from Nuance (NSI) called Output Manager to achieve exactly this, for a similar number of MFPs. We optioned it as part of our MFP contract, it might be worthwhile talking to whomever handles the printer contracting to see if you have access to a tool like that as a part of the contract itself.
If you guys use Scan to Folder, you might already have a tool that can be configured for this purpose.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
I wish. I think they're crazy not to have the printers under contract, like every sensible organization in the world.
But NOooooo. Not contracted; just bought.
|
|
|
|
|
I'am a sysadmin beginner
I need to install some applications like Mailtrain , WordPress and Vtiger CRM.
I want to know :
What are all the services needed (apache ...)?
I want to use MySQL , Can all applications use the same mysql server ?
What is the best linux server that I need (ubuntu vps , other ...) ?
How to secure this new server and it's applications ?
Thanks
|
|
|
|
|
Wow.
Member 14292504 wrote: What are all the services needed (apache ...)?
So, for starters, basically any application that you install should provide a list of dependencies. Most distros will attempt to auto-resolve dependencies, but there might be some (such as your SQL instance or, as you mention httpd) that you want to directly manage.
Member 14292504 wrote: I want to use MySQL , Can all applications use the same mysql server ?
Yes, that's part of the point. The concern is partially capacity, but mostly utilization.
Member 14292504 wrote: What is the best linux server that I need (ubuntu vps , other ...) ?
I suggest CentOS for these purposes. Opinions will obviously vary.
Member 14292504 wrote: How to secure this new server and it's applications ?
I have a one week class that I teach that covers about 1/3 of what it could/should for DoD RMF security compliance for Linux. You're not going to get an adequate summary in a forum post.
But, this being the interwebs and knowing you're unlikely to buy a book:
Assign file/folder permissions based on Least Privilege
Password complexity via PAM Cracklib
Learn to use iptables or firewalld and close everything you aren't actively using
Lock down root, utilize sudoers, and require passwords for sudo
Don't switch SELinux to permissive; learn to use semanage instead
Get a real TLS cert and enforce strong standards (TLS 1.1+, AES256, etc)
Setup an update script with a post-update notification for systemctl --failed
Extra Credit:
If at all possible, containerize all apps
Use a jump box and limit ssh access to that box (no VNC or DM, that's for plebs)
Do not let apps run as root, segment permissions
Learn to leverage AIDE
Encrypted data partitions to avoid side-channel exfiltration
Backup strategy
Logs...dear god don't forget the logs...
By no means take this list as comprehensive; it's the baseline for what I'd consider a "security attentive" system that is exposed to the public internet today.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Use should be using nginx on Ubuntu with iptables for security
|
|
|
|
|
How can we verify Email addresses before sending emails?. Generally we can verify email address through Email verify tools. But Im asking it should be done automatically through Mail server or smtp server means it should verify emails addresses automatically before sending email to them .which to avoid sending emails to junk and invalid and blacklisted ..
Please help me ASAP
|
|
|
|
|
There is no easy way to verify email addresses apart from the basic name@domain check. You could keep a list of known illegal domain names, but even that is not guaranteed.
|
|
|
|
|
teki parimala wrote: which to avoid sending emails to junk and invalid and blacklisted .. You can't, simply because you don't know whether I have blacklisted you in my email-app.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
you should already have list of illegal email domains. However you can check dkim records might be they will help you
|
|
|
|
|
I'm all Googled out on this one - the Win10 settings that are supposed to hide your tray icons don't work on my new machine. I can hide or show system icons, like the volume control, but application icons will not hide. No matter what I do, I can't get the system tray expansion area to appear.
Any one else had this and figured it out?
modified 21-Nov-18 19:28pm.
|
|
|
|
|
I assume you've checked that "Always show all icons in the notification area" is set to "Off"?
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Yes...it doesn't seem to matter what I set the visibility settings to, the only thing that makes a difference to the tray is the showing/hiding of system icons.
Does it depend on something else I wonder? I have all the 'extra' taskbar things turned off and/or uninstalled (toolbars, taskview, people, search, Cortana, OneDrive, all the system icons, bar volume), I'm also running Classic Shell and UltraMon with extra taskbars on my secondary monitors.
|
|
|
|
|
Kyudos wrote: UltraMon with extra taskbars on my secondary monitors. |
Why are you doing that? Win 10 provides a taskbar for every monitor already.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Hello all,
Introduction:
A customer has called me to help him with a computer that doesn't starts...
CA = Company A
CB = Company B
CC = Company C
CA has a computer from CB, CB has disappeared a long time ago... CA computer controls an expensive machine that's producing almost 24x7.
CA has contacted CC to repair the computer and CC have contacted me to help .
CA have no backups (This is Sparta!).
While booting, CA computer shows the windows 2000 logo and the progress bar grows but at a certain point the computer restarts... and this infinite loop continues once and again...
CC have found another computer from CB! That computer is not working well, but it's hard disk boots another copy of Windows 2000 embedded.
I want to help them as they can give me proper work in the future and they helped me starting my freelancing job...
Question 1:
I'm wondering if it would be worth trying to just copy all the system files from the booting windows hard disk into the non booting windows hard disk...
Question 2:
CB (the disappeared company) used to put safety measures to avoid the program to be copied into different computers, this usually includes storing a key into the registry and checking if that key is there or not...
In order to avoid this to explode, does any of you knows which files contain the registry in a windows 2000 embedded OS?
I would copy all the OS files except the ones containing the registry...
Question 3:
I don't have the administrator password, CB computers seem to log in automatically... but the recovery console ask that password...
What would you do in order to solve that boot problem?
PS: please refrain from recommending running as far as possible from the computer... I truly want to help them...
Thank you all for reading and sorry for this long post.

|
|
|
|
|
Hiren's boot disk to mine the password, and you can use it fix that registry trick if you like with automatic .dat parsers. Win2K should be trivial for it. Bear in mind that there is a small chance you'll frag the drive, so you might want to clone it first.
I'd also advise replacing the drive, anyway, if you can. If it's old enough for Win2K to have been relevant, it's likely starting to fray.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Thank you Nathan!
I've tried it into a VM and I've not been able to import the physical hard disk into it so I've not been able to do it...
But:
I've replaced i386 and Winnt folders from the hard disk that booted windows 2000 perfectly and voila!
We have now a perfectly running windows system.
I've needed only to update a couple of drivers.
All in all, the customer will have the machine working again.

|
|
|
|
|
Glad it worked out for you!
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Awesome! Have you cloned the drive for future?
|
|
|
|
|
|
I use the HOSTS file to block ad sites. I've recently encountered a few that don't seem to be affected.
deals.slashdot.org
tracking.deltadefense.com
When I ping them, I'm told the site can't be reached/doesn't exist, but when I browse to a site that contains ads from these sites, the ads are displayed.
Why is this happening, and how can I fix it?
BTW, this happens on Linux and Windows boxes.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
Might be configured to not reply to a ping. Use fiddler to find out from which domain the ads are served, doubt that they're the same. Once you have that adres, add it to your host-file.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
You could try flushing your DNS cache with the command "ipconfig /flushdns". The DNS entries may be cached from a time before you added those domains to your HOSTS file.
The difficult we do right away...
...the impossible takes slightly longer.
|
|
|
|
|
Tried it before posting my original msg.
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
The DNS entries might be cached by your browser.
How to clear the DNS Cache? – OpenDNS[^]
Or your browser might be configured to use DoH[^], which would completely ignore your HOSTS file.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
domain system user login once login system user but every time shutdown the system after user is removed in that system how to solve ?
|
|
|
|