Vol. 22, #36 - September 04, 2017 - Issue #1147
WServerNews: Privacy briefs
- Editor's Corner
- Got ears? Listen to our podcasts!
- Intel ME backdoor can be closed
- Interview with Bruce Schneier
- Rhoomba vacuums up more than just your dust
- More privacy news
- Send us your feedback
- Recommended for Learning
- Microsoft Virtual Academy
- IT Pro Fitness Corner
- Factoid of the Week
- Admin Toolbox
- Admin Tools We Think You Shouldn't Be Without
- This Week's Tips
- Hyper-V - Disable RDP Printer Mapping
- Active Directory - Recover from extending schema
- ConfigMrg - Queries for Windows 10
- Events Calendar
- HOT! Register for IT/Dev Connections early and save!!
- More upcoming events
- New on TechGenix.com
- Recommended articles from TechGenix.com
- Tech Briefing - Networking
- Client Certificate Authentication (Part 2)
- SSL/TLS - Decrypt the encrypted network traces
- Securing Small to Midsize Local Networks – A Practical Approach
- 20 Preview Documents Released for Windows Server Operating System
- WSL Networking
- Other Articles of Interest
- Tatarinov out as Citrix CEO in surprise shake-up
- Enterprise file sync-and-sharing vendors up close and in-depth
- Does the enterprise have a viable Microsoft Word alternative?
- Just wait, the mobile/cloud world is going to "rediscover" VDI and DaaS
- WServerNews FAVE Links
- Skydiver Ejects From Glider
- Rally Champion Ken Block - Drifting In The Desert
- A Rare Look Inside North Korea And Its Luxury Ski Resort
- Amazing Acrobatic Dance
- WServerNews - Product of the Week
- Veeam Named a Leader Again
- Veeam Named a Leader Again
- SAVE THIS NEWSLETTER so you can refer back to it later for helpful tips, tools and resources!
- SEND YOUR FEEDBACK to email@example.com if you have any comments or suggestions!
Got ears? Listen to our podcasts!
The TechGenix Xtreme podcast series explores everything information technology. We love to talk about the industry, what it means to be working in IT, and all the absurd and hilarious situations we encountered in our professional careers. Of course, prepare for a lot of hardcore tech stuff too, including servers, virtualization, cloud computing, cybersecurity, and more. You can listen to us on SoundCloud here:
Intel ME backdoor can be closed
In the summer of last year in Issue #1086 Remote management security and more we included a section titled "Possible security concerns with Intel AMT" in which we linked to several articles where security researchers described a vulnerability in the Intel Management Engine (ME) built into Intel processors that could provide a backdoor for attackers to break into your systems. Well yesterday I read that researchers from a company called Positive Technologies had discovered a way of disabling the ME component of Intel processors to close off any possible backdoor access it might provide. They found that they could disable the ME component using an undocumented feature in the processor firmware code. You can read more about their discovery in some detail on their blog here:
There is also a less technical description of the matter on BleepingComputer here:
Hope this helps any readers who are concerned about the privacy and security of Intel systems they manage in their organizations.
Interview with Bruce Schneier
The Harvard Gazette recently interviewed well-known IT security expert Bruce Schneier about government and corporate surveillance and about what concerned users can do to protect their privacy. The interview is well worth reading, especially if you live in the USA:
Rhoomba vacuums up more than just your dust
Rhoomba vacuum cleaners are fun, aren't they? Well, cats obviously think so:
But then there's the following Reuter's article from last month:
Quoting from the above article:
"Angle told Reuters that iRobot, which made Roomba compatible with Amazon's Alexa voice assistant in March, could reach a deal to sell its maps to one or more of the Big Three in the next couple of years. Amazon declined to comment, and Apple and Google did not respond to requests for comment."
Gizmodo puts it more bluntly:
Roomba's Next Big Step Is Selling Maps of Your Home to the Highest Bidder
What do readers think about that? Email me at firstname.lastname@example.org
More privacy news
UK Law Proposal to Criminalize Re-Identification of Anonymized User Data
Former MI5 chief warns against cracking dowm on encryption
Lauren's Blog: "Beware the Browser Extensions Privacy Trap!"
'Anonymous' browsing data can be easily exposed, researchers reveal
Amazon Echo vulnerability allows hackers to eavesdrop with always-on microphone
Send us your feedback
Got feedback about anything in this issue of WServerNews? Email us at email@example.com
Recommended for Learning
VIDEO: Windows 10 Deployment: tips and tricks from Microsoft IT
At Microsoft today, we think of Windows as a service. Cloud-powered Windows Analytics have streamlined the upgrade to Windows 10 Creators Update for our employees around the world. Our experts share lessons learned and best practices for application compatibility testing, upgrading, readiness, and adopting Windows Hello and Always-On VPN connection.
Microsoft Virtual Academy
Azure Security and Compliance
This self-paced online course introduces you to Azure security and compliance – a topic of great importance to all types of organizations implementing cloud computing. Focusing on the Azure Trust Center, Azure Key Vault, and the Azure Security Center, the course will also briefly review built-in security features such as Azure storage keys and shared access signatures, network security groups, and identity management strategies. Enroll here:
IT Pro Fitness Corner
Get ready for Fit IT Pro News! (Your Editors)
As we mentioned last week we're pleased to announce that we'll soon be launching a new weekly newsletter called Fit IT Pro News. This new TechGenix newsletter will feature Yours Truly (Mitch and Ingrid Tulloch) as the Editors and will be similar in voice, style, and format to WServerNews except that it will be entirely devoted to helping IT pros get fit, lose weight, and live happily ever after as they face the daily stresses and workload of being in the gristmill of the IT profession. Each week Fit IT Pro News will include an in-depth editorial or article along with tips, reviews, industry news, and fun stuff--just like WServerNews! We also plan on doing some interviews with IT pros who have successfully transformed their life through exercise and good nutrition, and we'll have the same kind of Ask Our Readers section that's proved so popular with WServerNews so you can ask any question you like about exercise or nutrition and hear what other IT pros have to say on the subject! As subscribers to WServerNews you'll soon be receiving some sample issues of Fit IT Pro News so you can decide whether you want to continue to receive this exciting new newsletter. Our hope is that you will want to read it every single week and will also recommend it to all of your colleagues, employees, and friends!
You can find Quentin here on LinkedIn:
Disclaimer: I'm not a certified fitness professional or nutritionist so take any suggestions made here "as is" with a grain of salt and a heaping supply of your own judgment. Help other readers of this newsletter lose weight and get fit by sending your own weightloss and/or fitness tips to us at firstname.lastname@example.org
Factoid of the Week
Last week's factoid and question was this:
When Canada held a competition to design its national flag, more than 10% of the entries featured a beaver. What other interesting fact(s) do you know about Canada?
Yes, I'm a Canadian and I'm sorry but I'm proud of it! Yes being Canadian I just had to apologize making that statement LOL…
Anyways, here are some of the more interesting responses we received to this question from our newsletter readers:
Don -- Canadians consume more Kraft Macaroni & Cheese dinners than any other nation in the world.
Pete -- It has a Strategic Maple Syrup Reserve (which was robbed back in 2012!) see:
Richard -- Loonies and Toonies, eh? Tell an American that the dollar bill is going to be replaced with a coin. I double dog dare you.
Doug -- Canada has a contest each year to invent some new kind of sport. Past winners: broom ball, curling, wheelchair rugby, and whatever it is the Hamilton Tigercats think they are doing.
Ouch! Well I guess all of that is fair, eh?
Now let's move on to this week's factoid:
Question: Have you seen any anecdotal evidence of this among recent MBA hires by your own organization?
Email your answer to us at: email@example.com
Until next week,
GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at firstname.lastname@example.org
The Big Easy Voodoo — vSAN, VVOLs, and Veeam: join live webinar for a deep dive into vSphere 6.5 storage technologies and learn how to protect them.
Veriato RansomSafe acts as a vital layer in your ransomware defense, combining just-in-time data protection with multiple mechanisms to detect, and shut down attacks before they hold your business hostage.
Discover Your Technology SuperPower. Take this 5 question quiz to find out your Super Power + get a chance to win an All Access Pass to IT/Dev Connections 2017.
OST to PST Wizard is a Professional solution to convert OST files to PST it allows the user to export OST files in bulk with their entire data:
Hyper-V - Disable RDP Printer Mapping
Active Directory - Recover from extending schema
This tip was passed on to me by a colleague who has worked a lot with Active Directory. When you need to extend your Active Directory schema for some reason you might want to consider disabling both inbound and outbound replication on the domain controller that holds the Schema Master role prior to extending the schema and then try doing it only on the Schema Master domain controller. That way if the process goes wrong and your schema gets borked, you can disconnect the domain controller holding the Schema Master role from your network, seize the Schema Master role on another domain controller, and delete the old Schema Master objects from your directory.
Do you know of any other IT conferences or events that you think readers of this newsletter might be interested in knowing about? Email us at email@example.com with the name, date, and location of the event along with the event URL.
HOT! Register for IT/Dev Connections early and save!!
IT/Dev Connections takes place Oct. 23-26 in San Francisco. It features more than 190 deep-dive technical sessions for IT Pros, Developers & DevOps. Register before Sept. 15 & save $400!
Add Your Event
PLANNING A CONFERENCE OR OTHER EVENT you'd like to tell our 100,000 subscribers about? Contact firstname.lastname@example.org
Troubleshooting problems with System Center Virtual Machine Manager 2016
Resolving errors in System Center Virtual Machine Manager 2016 is challenging. Here are some troubleshooting techniques that can help you find the problems.
Beware of WannaCry copycats: LG service centers experience ransomware attack
LG discovered recently what the security community has feared for some time: WannaCry copycats will pose a threat for years to come.
Do-it-yourself IoT: How to build your own Internet of Things devices
Building a do-it-yourself IoT device is easier than it might seem. And you don't have to be a master in the field of component-level electronics.
Hybrid cloud management: A guide to help you grab the rainbow
As more organizations consider a hybrid cloud approach, hybrid cloud management becomes crucial. Here's some tips to help your company soar.
Meet SyncCrypt: A ransomware without possibility of decryption
SyncCrypt is a nasty new ransomware that encrypts your system's files via AES. Most worrisome? As of now, there is no decryption method available.
Client Certificate Authentication (Part 2)
SSL/TLS - Decrypt the encrypted network traces
From the blog of Saurabh Somani
Securing Small to Midsize Local Networks – A Practical Approach
From the Cloud Ready Blog
20 Preview Documents Released for Windows Server Operating System
Tatarinov out as Citrix CEO in surprise shake-up
Citrix's latest CEO change magnified speculation that the company is up for sale and raised concerns about its product roadmap. Citrix has named its fourth CEO in less than two years, appointing its CFO to replace Kirill Tatarinov. The move has analysts and IT pros questioning the company's motivation.
Enterprise file sync-and-sharing vendors up close and in-depth
Enterprise file sync and sharing helps users share, collaborate on and edit files to keep workflows moving. Learn what the various vendors can do for your mobile EFSS needs.
Does the enterprise have a viable Microsoft Word alternative?
Microsoft Word may be the go-to application for word processing, but there are solid alternatives that organizations can turn to instead. Check out some additional options.
Just wait, the mobile/cloud world is going to "rediscover" VDI and DaaS
We've always said that the long-term future of Windows desktop apps is in the data center. Mobile and cloud maturity could be the turning point that makes it happen.
This Week's Links We Like. Tips, Hints And Fun Stuff
GOT FUN VIDEOS or other fun links to suggest you'd like to recommend? Email us at email@example.com
Skydiver Ejects From Glider
Rally Champion Ken Block - Drifting In The Desert
Amazing Acrobatic Dance
An amazing acrobatic dance performance recorded in Hanoi, Vietnam:
WServerNews - Editors
Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7www.mtit.com.Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see
Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.