Skip to main content

Plans for Weekend.

Hmm,

Good question. I think Plans for the weekend are going to involve a Birthday Party, and then some hard studying for my 70-621. (MCITP:Enterprise Support Technician), which I have next Thursday. Haven't been feeling the best recently, been strucken with the flu. I will be posting more PC related items, and items of interest within the next few days.


Here's a few things that caught my interest:

Windows Live Mesh : Basically a Remote Console for your Home, Work, and Virtual PC. Very cool and practical application. 3.7/5 for a relatively new BETA program that M$ released. Keep up the good work Windows Live.

Avast! : Personally, one of the best Anti-Viruses I've used in a long while, although if your running an old PC (Anything lower than a p4, with less than 1 GB of ram.) I wouldn't suggest it. It autoscans in the background, it pre-scans before downloads even initiate, and looks for all those badies that you wouldn't want running around in your PC. 4.2/5 since, I've only had a few issues with it, but thats when I was trying to break it :D

Opera 10 Unite : Honestly. And I know all you guys, probably scratching your head those that know me.. Opera??... Yeah. Typically i'm a Firefox, and IE guy. But honestly guys. This makes your life a joke. Built-in Mail reader, Notepad, Contact List, Tabbed Browsing w/ Speed Dial. If you decide to use Unite instead of Normal Opera BAM! you've got more applications, such as File Sharing, (Need I give an Explination?), the Fridge, which is kinda the equivalent of a Twitter to leave your post, Media Player/Photo Sharing.. (Once again, need an explination?), The lounge which, is pretty much a chatroom pre-configured, so you can chat with your friends in real-time, and a Web Server. All pre-configured. :D Well, enough sounding like an ad for Opera :) Try it yourself. 4.5/5 :)

Comments

  1. BlindKid: Love Opera... absolutely love it... and it's great for blind kids :)

    ReplyDelete

Post a Comment

Popular posts from this blog

Implementing 802.1X - Windows 2012R2 + Cisco 4500 Switches

Implementing 802.1X Using Windows Server 2012R2 & Cisco 4500 Series Switches Overview: This document is to outline how the configuration between Windows Server 2012 R2’s NPS Services and Cisco 4500 Series switches has been implemented. High Level Diagram:   Requirements: Windows Server 2012 R2 with NPS Server installed Windows Server 2012 R2 with CA Services Windows AD Environment Cisco 4500 Series Switches Windows 7-10 Clients to connect NPS Configuration: 1. This assumes the above requirement that the NPS Service has already been installed on Windows Server 2012 R2 2. Disable all existing Policies under Connection Request Policies and Network Policies as you will be making your own, except one that states “Catch All” with the below parameters: 3. You will then need to add in a new Radius Client to have Policies built around. Friendly Name will be used going forward for the Policies for referencing the document. 4. Once completed...

How to setup a Host-Check for Fortigate SSL VPN

This document outlines how to setup a host-check for a Fortigate SSL VPN (Web only): config vpn ssl web portal edit "portalname" set web-mode enable set host-check custom set host-check-policy "Microsoft-Windows-Firewall" set os-check-enable set ip-pools "PoolName" set split-tunneling disable set page-layout double-column set theme orange config os-check-list "windows-7" set action check-up-to-date set latest-patch-level 1 end  config vpn ssl web host-check-software edit "Microsoft-Windows-Firewall" config check-item-list edit 1 set target "HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile:EnableFirewall==1" set type registry next edit 2 set target "HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile:EnableFirewall==1" set type registry next edit 3 set target "HKLM\\SYSTEM\\CurrentControlSet\\S...

Fortigate to USG B2B

Building Site-to-Site B2B from Unifi USG to Fortigate (500D or other models) Fortigate Configuration 1. Build a New VPN Tunnel using Custom VPN Tunnel (No Template) 2. Under Network, point to the Public Side IP of the USG (Public IP, not WAN interface) 3. Leave everything else default (NAT-T Enabled, DPD Disabled..ect) 4. Authentication, use PSK and IKEv1 with Main 5. Phase 1 Purposal, set algorithms to AES128 and SHA1, with DH 14. 6. Phase 2 Purposal, set Local Address and Remote address to 0.0.0.0/0.0.0.0 and 0.0.0.0/0.0.0.0 respectively. 7. Set Encryption to AES128/Sha1, Replay Detection and PFS enabled, along with DH14. Enable Autokey Keep Alive, and Auto-Negotiate, and save changes. 8. Build a Static Route pointing to the Far-End Destination/Segment you want to reach. 9. Build a Policy Stating which Segments can hit the Far-End Destination/B2B USG Configuration 1. This is assuming that USG is already registered to the Unifi Controller. 2. Go t...