Categories
Tech

Get a Free Cisco Meraki 802.1n Wireless Access Point

Cisco Meraki is a whole new game changer for sys admins – it adds a completely different perspective to ‘Cloud’ managed devices. I will be trialling out the Meraki suite of devices & services for my organisation and hopefully blog about it in the near future!

In the mean time, if you want to try out a Meraki WAP, see below!

https://meraki.cisco.com/freeap

IT professionals can receive a FREE Cisco Meraki access point (AP) with a 3-year cloud management license.

While Cisco Meraki webinars are open to all audiences and while APs may be offered at live events, to be eligible for a free AP, participants must:

Attend the live event or the live webinar in its entirety
Enter a valid company name
Be an IT professional
Register with a shipping address in the US, CA, UK or the rest of the EEA, Croatia, Switzerland, Australia, New Zealand, or Puerto Rico. We cannot ship free APs outside of these regions, and cannot ship to post office boxes.
European countries require a valid VAT ID for shipment
Register with their organization’s email address
Confirm eligibility and shipping address with a Cisco Meraki representative by phone
If you are unable to accept your AP due to restrictions, (e.g., Erate), we will be happy to provide you with a trial AP, which can be returned following your evaluation of our solution

As APs are provided as an educational tool to those new to the Cisco Meraki platform, individuals and organizations who have received a free access point through other promotions are not eligible. Limit one free AP per organization and per individual. Due to abuse, we cannot provide free access points to individuals who register with yahoo, gmail, hotmail, and other similar email addresses.

Categories
Tech

PROCESS1_INITIALIZATION_FAILED BSOD on Windows Server

This weekend we had an electricity inspection so all equipment in the office needed to be powered down. Fast forward a few hours after I had gracefully shutdown all the servers and network devices, the inspection was complete and it was time to power everything back on again.

So I started to power on the virtual machines one by one in the correct sequence and once I thought I was done, I took a little break.

Categories
Tech

DuoSecurity Invalid Integration Error

Very recently out of no where I couldn’t log on to my WordPress Blog and was presented with an ‘Invalid Integration’ error.

I noticed this happen soon after the automatic WordPress upgrade from 3.8 to 3.8.1 so I am suspecting the upgrade as the cause but have no evidence to back that up.

Luckily there is a very easy fix to this problem. Simply FTP (or whatever protocol you desire) in to your server and locate the blog/wp-content/plugins folder and rename the duo-wordpress folder to something else (like duo-wordpress-old)

You should now be able to log-in.

Now, rename the folder back to what it was before and on the WordPress web interface,uninstall the plug-in completely.

Unfortunately, as of this post (28/1/2014), re-installing & integrating the plug-in does not actually fix the issue so you may need to live without 2FA for a while (or alternatively, use another provider)

The problem may be something specific to my set-up but just in case others are having the same/similar issues, I hope this helps you!

Categories
Tech

What Juniper Host Checker Rules and Policies Should You Implement?

The Juniper MAG series presents very powerful and flexible configurations for remote access users.

One of these configurations is the Host Checker which is what I will be briefly discussing today.

The Host Checker is a component which, according to the Juniper documentation, “is a client-side agent that performs endpoint checks on hosts that
connect to the IVE. You can invoke Host Checker before displaying an IVE sign-in
page to a user and when evaluating a role mapping rule or resource policy”

Categories
Tech

CryptoLocker Preventative Measures

If you haven’t heard of CryptoLocker, it is a form of Ransomware which basically means locking down your files in an attempt to get you (the victim) to pay a sum of money to get access to those locked files.

CryptoLocker isn’t the first of its kind and nor will it be the last. It is just another one out of the thousands out there, except this one has been more cleverly engineered to infect more machines and thus gain more media attention.

Below is some advice to take in a corporate environment – this advice is purely my own and is not meant to be some extensive ‘go-to’ for all your sys admin problems when dealing with these issues 🙂