Edventures in Normalcy

Pi Day Then and Now

Posted by Rose Bush on March 14th, 2016

A little backstory, On 3-14-1998 I find out it is Pi Day, and being a fat kid understand it as Pie Day. I’m thinking of cherry and apple being options during lunch. lol, nope, pi, π, as in 3.14159265359. On 3-14-2016 I am reminded by a coworker that it is Pi Day, and my first reaction is to note that it’s Steak and a Blowjob Day. In 18 years I went from being preoccupied with food to sex.

open task manager
go to services tab
right click on Synergy
start running the service

Yup, thats it. Thanks to http://superuser.com/questions/555137/synergy-server-doesnt-work for the help!

Running ColdFusion as A Separate User

Posted by Rose Bush on January 28th, 2016

ColdFusion needs to be limited, or in certain cased, granted more access, in the case of NAS shares, etc.

Defaults:
https://helpx.adobe.com/coldfusion/kb/running-coldfusion-specific-user.html

Way too open, give the user full control of:

“WebDocument Directory
c:\cfusion or c:\cfusionmx (and all subdirectories)
c:\winnt
c:\winnt\system32”

Okay, web root seems fine, the ColdFusion install directory seems fine. My OS installation folder, is not fine by me.

The first two give me a majority of what is needed, with few asides for other softwares:

Accounting for Fusion Reactor:
http://docs.intergral.com/display/FR455/Installing+FusionReactor+in+Locked+Down+Environments

I did find another person talking about the matter:
http://jochem.vandieten.net/2008/04/06/windows-file-permissions-for-the-coldfusion-account/

But they include ripping out existing permissions.

https://books.google.com/books?id=rI0OZhmcuc0C&pg=PT382&lpg=PT382&dq=Running+ColdFusion+as+a+specific+user&source=bl&ots=imQn_gDv_q&sig=QfRQ3DCqXzCNZ-sgcufo7iVtpxc&hl=en&sa=X&ved=0ahUKEwj-kMPvsKfKAhWGdj4KHQ7lAAsQ6AEIPTAE#v=onepage&q=Running%20ColdFusion%20as%20a%20specific%20user&f=false

 

Spoke to a coworker, the idea to add the ColdFusion user to the IIS_Users group which would inherently add permissions to the web locations.  Clean and direct, I like it.

KeePass for Web, ssh, MSTSC (RDP), ftp, sftp, and WinSCP

Posted by Rose Bush on January 26th, 2016

KeePass and You, Scheming the PC

KeePass (Professional Edition, I am using the 2 version Portable Package) is a phenomenal tool, that can save you insurmountable amounts of time if configured well.  I have taken the time to use it for numerous schemes and desktop environments to have it work best for me.  Find my learned results below:

 

Web (http and https schemes)

Chrome Browser Integration

chromeIPass
Url in title

Firefox browser Integration

KeeFox

 

URL Overrides

The following section shows many helpful setups.  In order to add a URL override in KeePass 2, click on Tools -> Options and navigate to the Integration Tab.  Click on URL Overrides… to bring up the following screen:

URLOverrides

As you can see, all of the below mentioned are shown in my configuration.  To use any override that calls a non browser application, highlight the entry and press Ctrl + U to initiate it.

 

putty.exe (ssh scheme)

Add putty.exe to system path

“To the Control Panel System tab then. In the Control Panel, System Properties, select the Environment Variables button at the bottom: and then select Path in the System Variables section, and press the Edit button. This set the path variables to include the PuTTY program directory in the search path.”  In some cases, it may be System, then Advanced system settings.  Environment Variables.  In mine I have:

C:\Program Files (x86)\PuTTY\

added making sure to delimit with semicolons and not end with a semicolon.  This does require a re login, so either logout/login or reboot for this to take effect.

URL Override

 

MSTSC (rdp scheme)

URL Override

Once the URL Override is added, from within KeePass highlight the entry and press Ctrl + U to automatically launch RDC with these credentials.  The credentials are then removed from your system and kept secure in KeePass.

FileZilla (ftp, ftps, and sftp schemes)

(Identical, yes)

 

WinSCP (scp scheme)

 

General Usage

Plugins

Getting Favicons when Favicon Downloader fails to

I find in some cases, that this fails to work, using the Download Favicons option.  Usually due to the icon not being on the same site, or not actually linked in the way one would expect. These are of course web specific.  You can change the URL in the entry to a URL where the icon does show, and pull the icon, change the URL back once done to get it.  After that, try www.google.com/s2/favicons such as:

http://www.google.com/s2/favicons?domain=http://www.edwinbush.com/

For pulling icons out of files, and for making them from screen shots, you can use this handy tool:

LiquidIcon [Download link] Virus Total Review of said file [downloaded then uploaded/linked directly]

True Story

Posted by Rose Bush on January 18th, 2016

xk4qn

Enumerate or Count Active Connections on a Given Port

Posted by Rose Bush on January 11th, 2016

Enumerate Active Connections on port 1433:

Count Active Connections on port 1433:

 

To Enumerate and Count Active Connections on port 1433 and 443

 

Locating crontab scheduled tasks in *nix

Posted by Rose Bush on January 11th, 2016

If you need a list of all users crontab tasks, run this as root:

 

will loop over each user name listing out their crontab. The crontabs are owned by the respective users so you won’t be able to see another user’s crontab w/o being them or root.

–[edit] if you want to know, which user does a crontab belong to insert echo $user

As a side note, this doesn’t work when the users are defined in NIS or LDAP. You need to use

I have also seen this bash script that supposedly takes into account displaying other crons, (including the scripts launched by run-parts in /etc/cron.hourly, /etc/cron.daily, etc.) and the jobs in the /etc/cron.d.

I have not thoroughly tested this script, I ran it once on my server, I found it here.

Find Symbolic Links in *nix

Posted by Rose Bush on January 11th, 2016

Find all symbolic links on a linux OS:

Or if you want to output it to a file:

Granting MySQL Permissions and Deleting them

Posted by Rose Bush on January 11th, 2016

Granting permissions in MySQL, localhost and external hosts must be separately run, the % sign means any external host and will not account for local connections:

But say you wanted to then remove remote access, but leave local access, easy (with this being the actual part I learned.  I wanted to write both granting and denying down.):

 

Perception is Relative

Posted by Rose Bush on January 5th, 2016

Actions speak louder than words, and I find some actions speak poorly.  I find the LGBT world has a duality to it.  I belong to the transgender community, which is where I run into this the most.  For example, I pulled an article from here:

http://www.cambio.com/2015/09/17/what-happened-when-i-revealed-to-men-on-tinder-that-im-a-transg/

The body is below, images are clickable, and although you may not need to see them all, you will get the idea.

tindra

“To put it plain and simply, dating sucks. Online dating sucks even more. And online dating as a transgender woman is pretty much a modern-day Greek tragedy. That being said, afterrecently undergoing gender-confirming surgery, I’ve been making a concerted effort to put myself out there and meet new people. According to many of my friends, Tinder was a good place to start. A little bit jaded and slightly pessimistic, I reluctantly decided to embark on a social experiment of sorts.

The reality of navigating dating world is that everyone has baggage that they’re weary about revealing to potential suitors. At the end of the day, we’re all human beings who want to be accepted and appreciated in our entirety. And the idea of having someone reject you because of a fundamental component of your identity is daunting enough to make a person avoid dating all together.

So as a young transwoman living in New York City, I’ve always been pretty freaking nervous about how guys could react when I reveal to them that I was born biologically male, even though I identify and live my life as female. After all, transwomen are all too often beaten and murdered for no reason other than their gender identities.

That’s exactly why the idea of online dating appealed to me despite it’s inherent shittiness and utter lack of romance. It opened up a space where I could disclose my transgender status to men from the safety of my phone without having to worry about putting myself in a potentially violent or dangerous situation (which is the reality for all of us transwomen). I decided to reveal my truth to men who I had matched with on Tinder and their responses were not always what I expected…

Of course there was the expected invasiveness, as you can see in the exchanges below. (PROTIP: Instead of asking a transwoman about her genitals right off the bat, try asking about her hobbies.)”

a1

a2

a3

a4

a5

a6

a7

a8

a9

a10

a12

a13

a15

a16

a19

a20

 

The above shows how to ridicule the ignorant, and come of as rude.  Yes, I face odd and peculiar questions, but since when is it wrong to be curious from an ignorant perspective.  When I was 5, I would ask some pretty awful/great questions.

 6QMkQ1T

 

Inclusiveness

 

Copyright © Edventures in Normalcy. All rights reserved.