Categories
Tech

Windows Server 2012 – File System Resiliency or Data Deduplication?

Windows 8 and Server 2012 come with a new file system (along side NTFS) called ReFS – Resilient File System.

I am in the process of setting up a Server 2012 as a file server for my organisation and came across a bit of a dilemma. Out of the two great features (both of which, by the way, would be awesome on a file server!) offered by Server 2012, I had to choose one.

Categories
Tech

Windows Server 2012 File Share – Access Denied Error

Whilst configuring a Windows Server 2012 VM as a file server, I came across the very annoying Access denied error message when attempting to access a file share from my computer.

If you’re getting similar issues and have made sure your folder permissions are set correctly then see if the following helps you:

Categories
Tech

Setting up VLC Remote on your BlackBerry 10

This will be a quick how-to guide on setting up VLC remote on your BlackBerry 10 device.
VLC Remote will work if both your VLC player (so your PC for example) and BlackBerry 10 device is on the same wireless network*.
*Now, technically speaking, you should also be able to get it to work if your BB10 device is not on the same wireless network by port forwarding the VLC web server on your router but that’s another story – shoot off in the comments if you would like this use case covered.

Categories
Tech

What does the iOS Diagnostics App Send to Apple?

I was asked by an Apple rep to send in diagnostic logs via the iOS diagnostics app in an attempt to diagnose a reboot/battery issue with an iPhone 4S.

Curious as to how this information was collected and more importantly what was collected, I fired up my new friend Fiddler 🙂

Categories
Tech

Tampering with Mobile Traffic Using Fiddler

In part one of these series I talked about how you can very easily capture mobile traffic using Fiddler.

In this second part, I will talk about how you can actually tamper with the traffic you send and receive to and from your mobile device.
Please note that tampering with traffic is not just limited to mobile traffic!