We just uploaded our recent HFFH #7 (full show) with Michael Lierman, founder of Invise Solutions! In this show we talk tech with Michael Lierman, founder of Invise Solutions (aka he who does NOT use d7II !)
Michael has a lot to say in response to our question about finding the original point of infection, as well as general malware behavior. He also discusses how he juggles a company of 8 “employees” composed entirely of interns (quite well I might add,) and later we challenge him to compare his removal and tune-up routines with d7II’s capabilities! You may just witness an intelligent, resourceful, and extremely stubborn tech turn into a d7II convert, live!
Other goodies: We speak with Dustin (a tech new to d7II) in order to get his first impressions, discuss Fab’s AutoBackup Pro 6 and the story with our own DataGrab in d7/d7II, and during some down time we talk about the food waste in America and dishonest food labeling, I think we all learned something there!
Today’s Show: www.d7xtech.com/live
I can’t predict today’s specific agenda, but it’ll be good and techy! Later we’ll have Proctor and Tank visit in person for a company meeting…
As always, if you’re a tech with a question or idea related to not only Foolish IT products and support/training but we’ll discuss anything that can be beneficial to our clients.
The Lost Show Notes:
Infecting a virtual machine was yesterday’s topic on show #9, where we offered some options in addition to checking some links provided by our techs in chat for obtaining malicious software for testing/training purposes.
- http://zeltser.com/combating-malicious-software/malicious-ip-blocklists.html
- http://zeltser.com/combating-malicious-software/malware-sample-sources.html
At some point we mentioned our friend Britec09 of youtube fame, who authors and produces countless videos on PC repair and usage for everyone from casual PC users to novice technicians, but we’ve seen his knowledge surprise experts as well!
The recent hacking team breach brought up some revelations and some free tools to detect the hacking team malware!
Brantley prefers the older Chrome Hangouts extension giving the separate taskbar icon, available here.
Toshiba doesn’t do so well in PC sales these days, and it’s fairly obvious everywhere except in the numbers — but check the current scandal over some missing $$..
I complain about the lack of decent RSS readers, specifically one with a rule/filter system (unfortunately the best thing I’ve ever used for RSS was MS Outlook, and I complain about Google Reader not only being discontinued, but being garbage to begin with due to … well … no rules or any other useful features!) Brantley recommends I check out Feedly to use in conjunction with a Chrome extension called SPOI Filter.. I dunno…
Hacking a Chrysler remotely – Proof of concept on a Jeep Cherokee here. Are you affected?
Creating your own FTP server for use with d7II – (or dSupportSuite) Did you know that d7II can house your custom apps on your own FTP server? This can be useful for your in-house apps, or purchased 3rd party apps, where distributing them from your web server would expose your personally owned software and/or licenses. The coming d7II v4 takes this much further integrating two additional options to house and secure your data, the ability to use a web exposed server with SSL and authentication with custom ports, and also AES-256 encryption/decryption for zip files stored there.
Creating a WinPE 5.1 Bootable – (note the linked guide hasn’t been refreshed recently and some steps may have changed slightly.) This was mentioned during a recent show, you can follow this process to create a bootable image for use on disk/flash drive/network pxe/USB ISO thingie, etc.. We typically use them to run d7II or dBug on a PC where Windows won’t load for some reason or is too badly infected to work with easily. d7II has a comprehensive and unique set of tools for WinPE environments such as repair routines for safe mode blue screens caused by malware, internal functions like direct registry editing with regedit.exe or your preferred editor, and other tools including our powerful tech scalpel dFunk/MalwareScan, all of which were originally designed from the ground up with the dual purpose of functioning on live/currently running/online Windows installations as well as “offline” Windows installations (we consider the actual Windows installation on a PC’s internal hard drive to be “offline” during the time you are booted into your custom WinPE environment from that PC; this is a term you will see throughout d7II and our documentation where applicable, including labeling certain custom apps as “offline” where we have tweaked these configs to run on both online/offline systems.)
SLP product keys explained – I heard Jeff @Podnutz on his recent call in show discussing Windows “OEM” product keys with a guest and some others in IRC, specifically using key readers (like Nirsoft Produkey or functions internal to our own d7II) to retrieve keys for later reinstallation. I hear a LOT of techs out there confused as to the differences between the key found in the registry from a factory reload and the key on the OEM sticker, so I wrote up this little bit to explain that and some other caveats that go along with it. This made my show notes because I linked to it in chat during Jeff’s show, and I guess he wasn’t watching IRC so it didn’t get an on-air clarification; in fact I don’t think anyone in that IRC paid it/me any attention and perhaps that is my fault for not concealing my identity haha!