Latest Headlines

Guacamole, RDP, and Windows 10


Guacamole is a killer remote access tool with a metric crap ton of potential uses.  It uses an HTML5 interface to run things like remote desktop, SSH, and even telnet.  Seriously, give it a look.

Well recently I tried to add rdp to a Windows 10 machine to my guacamole instance, and was unable to get it to connect.  After scouring the internet, I couldn’t find much info as to why, so I started looking into the rdp differences with the new OS.  Evidently MS cranked up the default encryption levels in Windows 10, and the rdp client within guac doesn’t yet support it.

The fix is not to just simply disable NLA.  There is a registry hack that must be changed, so pull out regedit.  Change the following key from 2 to 1.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]

After that, guac will successfully connect.  Hopefully this helps some other folks struggling with this issue.


The 3 best laptops ready for Windows 10

Lenovo Yoga 3 Pro

Lenovo Yoga
Lenovo has pushed its magical Yoga line to the front of the pack with the Yoga Pro 3, a lightweight laptop with a sexy design that brings a back bending 360-degree hinge.
At just 12.7mm thick when shut, the Yoga Pro 3 decemates tablets and undercuts Microsoft’s Surface 3 by a hefty chunk. The outer frame of the screen and laptop underside are shielded by brushed metal that feels premium and strong.
The special skill of the Yoga 3 Pro is that hinge mechanism, which is comprised of more than 800 pieces of steel and aluminium to deliver a laptop-meets-tablet experience.

Read the rest of this entry »


How to create a Windows 10 ISO file from your installation


Microsoft desperately seems to want you to upgrade to Windows 10, and they REALLY want you to use Windows Update to do it.  Honestly, if you have a PC that qualifies for the upgrade, you should do go for it.  However, a lot of people would rather do it the old fashioned way.  Or maybe you’d rather run your Win10 instance in a virtual machine…or even dual boot, for that matter.

Having that installer image available gives you access to some installation and repair options that you don’t have otherwise, such as the option to create bootable media.

Microsoft made it so that after your upgrade is complete, you can create an ISO file from the cached upgrade files. That ISO file can be used to install Windows on any PC, assuming you have the right product key (more on that below).

Read the rest of this entry »


Microsoft to accept payments in bitcoin


A blog post on December 11 from Microsoft quietly announced that its customers can now use bitcoin to purchase certain products through third party payment processor BitPay, which also supports tech sales site TigerDirect and Virgin’s space flight offshoot Virgin Galactic.

Microsoft made its announcement with little fanfare on its blog and slotted into the FAQ list of billing and payment queries. Despite the quiet rollout it did lead to the inevitable flurry of speculation and publicity. This is hardly surprising, when businesses announce they accept the decentralized cryptocurrency a headline is often a given.

Read the rest of this entry »


Aww…how cute, Internet Explorer gets offended when you download Google Chrome



Confirmed: Windows 10 will have native FLAC support



In a tweet from Microsoft’s Gabriel Aul, Microsoft is throwing out spoilers again.  This time they showed a screenshot showcasing Windows Media Player in Windows 10 playing music with the FLAC audio format.

Keen eyed will notice something cool about this pic. Something to look forward to in the new year!

Read the rest of this entry »


Mischievious Prank: Change Windows Wallpaper…and keep it that way


Your friend leave their Windows computer unlocked?  Want to change their wallpaper?  Want to make it change back to your wallpaper every time they log into their computer?  Well, here’s your guide…

So, with Windows you can set the wallpaper via the command line.  We’re going to abuse this feature and create a batch file that runs on each logon to set the user’s wallpaper.  What this means is that even if they change it, once they reboot or logoff/logon, it’ll change back to your evil wallpaper.  Good luck figuring out how to undo this if you’re an un-tech savy victim of this prank.

First, with access to your victim’s machine you’ll need to download the wallpaper you want to use.  How about something with the one true god, Nick Cage himself?  ( if you’re the sensitive type and don’t get the joke)

Read the rest of this entry »


New Malware Targeting Password Managers


Cyber criminals have started targeting the password managers that protect an individual’s most sensitive credentials by using a keylogger to steal the master password in certain cases, according to research from data-protection company IBM Trusteer.

The research found that a configuration file, which attackers use to tailor the Citadel trojan for specific campaigns, had been modified to start up a keylogger when the user opened either Password Safe or KeePass, two open-source password managers. While malware has previously targeted the credentials stored in the password managers included in popular Web browsers, third-party password managers have typically not been targeted.

While the current impact of the attack is low, the implications of the attacker’s focus is that password managers will soon come under more widespread assault, Dana Tamir, director of enterprise security for IBM Trusteer, told Ars Technica.

“Once the malware captures this master key, then they can use that master key to exercise complete control over the machine and any of the user’s online accounts,” she said.

Read the rest of this entry »


Has your email address and password been leaked?

Pwn: from the verb own, as meaning to appropriate or to conquer, compromise or control.

Screen Shot 2013-12-16 at 4.08.19 PM

It seems like a month doesn’t go by where we don’t hear about another account breach at a major organization.  Well some clever guys over at set it up so that you can check your email address against a database of accounts associated with security breaches.   The site will immediately tell you whether you’re at risk for your email/password being in the hands of bad guys, or you’re safe…for now.

Currently, the site contains leaked user data from the breaches at Adobe earlier this year, the Yahoo Leak in 2012, Sony’s cluster @$%^ in 2011, Start for from the same year, and the Gawker security breach in 2010.  They plan on adding more to the list when more breaches happen in the future.  Note that I said when, not if…

So, this just bears prudence to the idea that you shouldn’t reuse the same password at different places.


Amazing gif of how digital cameras work


Source captured from a Nokia promotional video for the 41 mp camera in the Lumia 1020.