Interspire logon fails even though password is correct after WWW redirect

Ran into this issue after modifying Interspire Shopping Cart’s main .htaccess file to 301 redirect non-www urls to www.domain.com . A log in to the admin section would fail each time, but using the same password after removing the www redirect would work. The problem is in the shop path variable, it must include the www part of the domain name. There are two points that this can be fixed in, by either editing the spop path under store settings, or by modifying the config.php file in the line that specifies the ISC_CFG variable “ShopPath”.

Office For Mac 2011 -Cannot Save Spreadsheet in Excel Problem

Ran into an issue on an install of Office for Mac 2011 recently. When the user attempted to save an excel spreadsheet, they would get an error as follows:
– file name or path name does not exist
– file is being used by another program
– name is the same as another file

Unfortunately these error messages were not the case- it was a new file with a unique name, and only Excel was trying to use the document.

The solution was simple to understand once the issue was fixed by verifying disc permissions. The user did not have the correct permissions to write files. Apparently saving an Excel document writes first to a temporary location which they had no rights.

Flexible Single Master of Operator Roles and How to tell Which Domain Controller Owns Them

The Operations Master roles ( AKA FSMO pronounced FIZZMOE) are, by default, assigned to the first DC installed in an Active Directory environment.

Schema Master The Schema is the field structure of the AD Database in this context – The Schema master maintains that schema, in the case of Schema modifications – such as intalling Exchange, running adprep.exe/forestprep or a third party app that hooks itself into Active Directory (Cognos for example.) This role is unique to the forest. To view the Schema Master, you need to register the schmmgmt.dll file, and then add Schema Management to a mmc console. You can now right click and view the owner of this role (and change it if so desired.)

Continue reading “Flexible Single Master of Operator Roles and How to tell Which Domain Controller Owns Them”

Common Computer Attack Types

Common computer attack types defined

Access Attacks– the attacker’s goal is to gain unauthorized access to information or services.
Dumpster Diving Literally picking the corporate dumpster for information. Also called Information Diving
Eavesdropping Simply listening in in an effort to gain knowledge.
Snooping Peeking around for information.
Interception The attacker positions himself covertly, either physically or in a digital sense, in the middle of a transaction or conversation.
Modification Attacks The attacker’s goal is to alter information for gain.
Repudiation Attacks Modifying with the purpose of discrediting or invalidating information.
Back Doors by design or surreptiously inserted, allows the attacker a ‘back door’ into a system or application for purposes of control Continue reading “Common Computer Attack Types”

Cindy Crybaby Activity Page

Hate Sidney Crosby? Did he put your team out of the playoffs? Had it with his crying to the refs? Did he run over your dog? Get your revenge in a mature, non-violent fashion with the Cindy Crybaby Activity Page! Designed to keep you occupied for hours and your team’s fortune off of your mind – all you need is scissors, tape and free time. Click for big!


Continue reading “Cindy Crybaby Activity Page”