Categories
Tech

PROCESS1_INITIALIZATION_FAILED BSOD on Windows Server

This weekend we had an electricity inspection so all equipment in the office needed to be powered down. Fast forward a few hours after I had gracefully shutdown all the servers and network devices, the inspection was complete and it was time to power everything back on again.

So I started to power on the virtual machines one by one in the correct sequence and once I thought I was done, I took a little break.

Categories
Tech

DuoSecurity Invalid Integration Error

Very recently out of no where I couldn’t log on to my WordPress Blog and was presented with an ‘Invalid Integration’ error.

I noticed this happen soon after the automatic WordPress upgrade from 3.8 to 3.8.1 so I am suspecting the upgrade as the cause but have no evidence to back that up.

Luckily there is a very easy fix to this problem. Simply FTP (or whatever protocol you desire) in to your server and locate the blog/wp-content/plugins folder and rename the duo-wordpress folder to something else (like duo-wordpress-old)

You should now be able to log-in.

Now, rename the folder back to what it was before and on the WordPress web interface,uninstall the plug-in completely.

Unfortunately, as of this post (28/1/2014), re-installing & integrating the plug-in does not actually fix the issue so you may need to live without 2FA for a while (or alternatively, use another provider)

The problem may be something specific to my set-up but just in case others are having the same/similar issues, I hope this helps you!

Categories
Tech

What Juniper Host Checker Rules and Policies Should You Implement?

The Juniper MAG series presents very powerful and flexible configurations for remote access users.

One of these configurations is the Host Checker which is what I will be briefly discussing today.

The Host Checker is a component which, according to the Juniper documentation, “is a client-side agent that performs endpoint checks on hosts that
connect to the IVE. You can invoke Host Checker before displaying an IVE sign-in
page to a user and when evaluating a role mapping rule or resource policy”

Categories
Tech

CryptoLocker Preventative Measures

If you haven’t heard of CryptoLocker, it is a form of Ransomware which basically means locking down your files in an attempt to get you (the victim) to pay a sum of money to get access to those locked files.

CryptoLocker isn’t the first of its kind and nor will it be the last. It is just another one out of the thousands out there, except this one has been more cleverly engineered to infect more machines and thus gain more media attention.

Below is some advice to take in a corporate environment – this advice is purely my own and is not meant to be some extensive ‘go-to’ for all your sys admin problems when dealing with these issues ๐Ÿ™‚

Categories
Tech

Two-Factor Authentication with BlackBerry 10

We’ve seen plenty of tutorials on two-factor authentication (2FA from now on) using the Authomator app but unfortunately this app has not been made available for the Q10 device for several months now.

Therefore I have made this short tutorial available for a cool new app which will give us our daily shot of security and peace of mind ๐Ÿ™‚