Learn Binary Trading Options Using This Secret Tips – Make ...

Gravity's Rainbow Reading Group | Sections 66-69 | Week 20

Alright, home stretch foax. This section's a beast. Hang in there and keep sharing your insights! All together now...
Section 66
"You will want cause and effect. All right." (663) What an opening - it's almost confrontational, mocking our need for clear narrative structure and causality.
We discover that Thanatz was tossed overboard in the same storm that sent Slothrop off the Anubis and off on his adventure with Frau Gnahb. Thanatz is rescued by someone even stranger - an unnamed Polish undertaker (think on the etymology of that word) who happens to be a lightening aficionado. I'll stop here and comment that, earlier, when Slothrop fell into the water before and after getting on the Anubis, it brought to mind the river Styx in Hades - another underworld. It washes clean one's identity and memory. Makes you forget who you are. And there's traditionally a ferryman, Charon, to help people cross it. Can't help but think that's who saved Thanatz here, carrying him from the land of the dead to the land of the unliving, the preterite detritus of WWII.
(An aside: Speaking of Styx, has anyone listened to Mr. Roboto recently? That song has some Gravity's Rainbow vibes.)
Our undertaker here is inspired by the Franklin myth and is trying to get struck by lightening in order to experience that "singular point, [that] discontinuity in the curve of life" (664) passing from a rate of change of positive infinity to one of negative infinity in the blink of an eye. Seems there's something of a conspiracy among those who have been through this point of infinite inflection - a secret society of lightening heads who are aware not of another reality but of a new layer of reality laid on top of our own. Insight into a higher level of reality, of hidden systems.
We get an example of the content of the lightning-aficionado's publication A Nickel Saved and it's supposedly full of coded messages for Those Who Know, each part being a veiled reference to other topics that contain the true meaning, requiring a true paranoid's ability to see (make?) connections. For example, there are repeated mentions of April, Easter, and Spring - the season of rebirth. To an Amperage Contest and lightbulbs failing - Byron the Bulb's attempts to strike back, perchance? A screen-door salesman - what is a screen door except a permeable interface?
But our undertaker isn't interested in secret knowledge - he just wants to be a better businessman - and he deposits Thanatz on the shore and rows back off into the storm. Here, Thanatz meets a group of 175s - men formerly imprisoned in the Dora camp for being gay - who have formed their own solitary community in this isolated section of northern Germany.
I suspect some of this imagery may initially shock readers - concentration camp victims who want to return to their prison? Who set up their own 175-Stadt to recreate the conditions of their imprisonment? But think about it - just last section, we saw Katje, someone who's been used and abused by those in power, balk at the thought of being truly free because she had become dependent on systems of control. She had integrated those control systems as part of her identity, her sense of self. "She needs the whip," Blicero wrote of her (662). Just like Katje, these men became so conditioned to depend on a system of total control and rigid social hierarchies that they don't know how to function without it. Their 175-Stadt doesn't seem like such a ridiculously dark, inappropriate caricature now, does it? Because isn't that a central point of this book - that everyone has been conditioned to need control, to need Their System, to not know how to function without it? Slothrop was our perfect everyman from within this system, and look at what it took for him to actually be free (and even then, the ideal of America still has a colonial outpost in his head). But in their 175-Stadt, these men at least control their system of control. They built it, they staff every level of it, and it's entirely under their control. An isolated state, separate from the broader System. But is there a ruler in this system, a king? No, simply the figment of Blicero. His name, his specter, looming over everything. A system of control with no real king? We've seen that before.
Not only that, but this micro-society is not based strictly on the SS command from Dora, but what the prisoners inferred about the rocket command structure in the Mittelwerke. So even their "recreation" of their imprisonment is an approximation of a different system. I'd also stop here to comment that, is this imagery really as ridiculous/insane as it first appears? I'd say no, since the queeS&M community absolutely took inspiration from Nazi uniforms as symbols of dominance and control, repurposing it into fetishwear. But then, as in this 175-Stadt, the control is by choice, as is the submission. As we've seen elsewhere in this book (Blicero's Oven-State), turning submission into a fetish can be a form of rebellion, since it subverts Their means of control (fear of pain) and turns it into a source of pleasure. Is it truly control if you're choosing it? Enjoying it? No one said this book asks easy questions of its readers...
Thanatz keeps looking for answers, and gets swept up amidst the vast swarms of preterite Displaced Persons being shifted across the zone. What's concerning is that these supposedly-free, albeit displaced, people, are shuffled without purpose across the Zone, with minimal food, water, or medicine, being "herded into wire enclosure[s]" and shipped around in freight cars, "deloused, poked, palpated, named, numbered, consigned, invoiced, misrouted, detained, ignored" (669). It's almost impossible to miss the painful similarity here to the treatment of Jews and other victims of the Holocaust. Only here the mistreatment isn't out of some pathological hatred, simply a system without a place for so many people, and without the committed resources to actually, effectively help them. The thought is unsettling, since we like to imagine that only Naziesque hatred could prompt such brutal mistreatment, not apathy.
Finally, he's rescued by the Schwarzkommando thanks to his knowledge of Blicero and the firing of Rocket 00000. Here, we learn a bit more about what happened that day. Looking into Blicero's eyes, he saw windmills reflected, though none were in the area. Another four-way mandala, like we saw last week with Slothrop. Thanatz isn't in great mental shape by this point, and he's beginning to equate Gottfried and Bianca both as his children. Why? Because he felt some sense of responsibility to them? Because he failed them? Either way, the Schwarzkommando learn all they need from him about that fateful noon on the Heath, though we do not. The section ends with a simple touch of hands between Enzian and Christian, a moment of connection, of trust.
Section 67
Man, how do I even start summarizing this complete doozy of a section? As Weissenburger writes, "In this episode the narration begins to fragment." (344) Ya don't say... Well, here goes.
We being one serious trip of a section with Slothrop, as part of a rather unimpressive team of quasi-superheros (the "Floundering Four") fighting against evil ol' Broderick Slothrop amidst the factory-state (a Metropolis-like iteration of the Rocket-State with movable buildings?!). Broderick, in the role of comic book supervillain, keeps trying to off Slothrop, but our hero has a lucky streak just wide enough to keep him alive.
Right off the bat, we see another image of the chessboard - the whole factory-state is laid out in a grid, and it's all A Game of Chess, as der Springer already informed us, and our movements are limited. Crucially, "Your objective is not the King - there is no King - but momentary targets such as the Radiant Hour." (674) How can you win at chess when there's no King? How can the land be restored and the cycle renewed if there's no King to die and be replaced?
Slothrop is joined by a truly slipshod lot: Myrtle Miraculous, the only one who seems to have actual powers; Maximilian, a suave Black club manager who can flow with all natural rhythms and thus able to navigate any scenario with ease, and Marcel, a mechanical chess player (an embodiment of the Mechanical Turk, but crucially, one without the hidden human operator. No hidden Grandmaster lurking inside Marcel here - nope, this android's the real deal.
This section includes one of my favorite quotes from the book: "Decisions are never really made - at best they manager to emerge, from a chaos of peeves, whims, hallucinations and all-round assholery." (676) I can think of several times where I've been able to relate to that scenario all too well.
Their chances for success and failure are equal, but these opposing odds don't cancel each other out - instead, the two opposing forces just create a "loud dissonance". The crew undertake some truly hallucinatory adventures through the Racketen-Stadt which I will not attempt to summarize, as that would be an exercise in futility. But we are treated to flashes of Slothrop, "Broderick and Nalline's shadow-child, their unconfessed, their monster son," (677) getting locked in an icebox, piloting a mobile building through the grid-streets of the factory-state like a giant chess piece. One line really jumps out at me, here, that I think is important: "Their struggle is not the only, or even the ultimate one. Indeed, not only are there many other struggles, but there are also spectators, watching, as spectators will do, hundreds of thousands of them." (679) Makes me think of the "glozing neuters," mentioned earlier - of the masses of people who are just trying to live their lives, neither part of any conspiracy nor actively aware of being subject to one. Must be nice. At the same time, the idea of other, simultaneous struggles, is noteworthy - it brings to mind the concept of intersectionality, and how people realizing their unique, individual struggles share common sources, and common traits, which they can work together to fight.
We end this sub-section in an arena for these exact masses, where our heroes are on a stakeout, with Slothrop in full drag waiting in the Transvestites' Toilet for a message.
You may be wondering about the multiple instances of cross-dressing, in various iterations, throughout the book. Slothrop in drag and Blicero in a wig and merkin come to mind. One aspect, I'd say, is that it reflects a blending of two (as far as society is generally concerned) binary opposites. A crossing-over, a transgression against the status quo and an option other than 1 or 0.
Eliot, in his Notes on The Waste Land, wrote,
"Tiresias, although a mere spectator and not indeed a 'character', is yet the most important personage in the poem, uniting all the rest. Just as the one-eyed merchant, seller of currants, melts into the Phoenician Sailor, and the latter is not wholly distinct from Ferdinand Prince of Naples, so all the women are one woman, and the two sexes meet in Tiresias. What Tiresias sees, in fact, is the substance of the poem." (Emphasis mine).
Cue Crutchfield the Westwardman's world of only one of everything. Likewise, the women in Gravity's Rainbow often blend together, share traits or imagery. So do the men. The joining of the two sexes in Blicero, as well as Slothrop here at the end, is significant.
The Low-Frequency Listeners
The introduction here of the character of Rohr, the Keeper of the Antenna, specifically as a Jehovah's witness, was odd. It's such a specific subsect of Christianity. Then we see - he heard a man on the radio, dying, asking for a priest. Rohr says, "Should I have got on and told him about priests? Would he've found any comfort in that?" (682). In what? I had to look it up, but when I did, it clicked - Jehovah's witnesses apparently do not have priests, because they are all ordained. There is no separate priest caste in their church, and thus no Preterite/Elect division. In this section, we also learn that the Nuremberg trials are getting underway.
Mom Slothrop's Letter to Ambassador Kennedy
You start to feel even more sorry for Slothrop as you realize just how terrible his parents apparently were. His mom cares enough to at least write another letter asking Ambassador Kennedy as to what the hell happened to their son, but her letter quickly devolves into drunken ramblings complaining about striking workers and managing to make an innuendo about Jack Kennedy while also dismissing her love of her sons. Oof. Maybe Otto was right with his conspiracy of mothers...
On the Phrase "Ass-Backwards"
An entertaining linguistic debate between Säure and Slothrop on American idioms, specifically ones involving a reversal, as in the case of "ass-backwards". The section then slips into a story of Säure, in his youth, breaking into the home of a young woman, Minnie, who is unable to hear or pronounce umlauted letters, and thus manages to shout the word "helicopter" rather than "cute robber" well before the vehicle was ever invented. Her cry is heard by none other than a young aerodynamics student. The word is taken as a prophesy and a warning of the helicopter's symbol of the police state, with armed officers hanging out the sides, aiming down at their targets.
My Doper's Cadenza
It begins with a serenade from Bodine, and then an exploration of the tenement building "Der Platz" that is home to numerous drug addicts, dope peddlers, and general ne'er-do-wells. They are building an anti-police moat around the building, entirely underground so as to avoid detection, saving breaking through the street for the end.
Shit 'n' Shinola
Another idiomatic diversion for Säure. A beautiful line is tucked away in here - "from outside, the Hall is golden, the white gold precisely of one lily-of-the-valley petal in 4 o'clock sunlight, serene, at the top of an artificially-graded hill." (687) This building, the Schein-Aula (Seeming-Hall), suggests "persistence, through returns of spring, hopes for love, melting snow and ice, academic Sunday tranquillities, smells of grass just crushed or cut or later turning to hay..." (688) Yet again, imagery of spring, of a return to life from the dead season of winter, of the cycle.
We return to the Roseland Ballroom, where shit 'n' Shinola do actually come together. "Shit, now, is the color white folks are afraid of. Shit is the presence of death, not some abstract-arty character with a scythe but the stiff and rotting corpse itself inside the whiteman's warm and private own asshole, which is getting pretty intimate. That's what that white toilet's for.... that white porcelain's the very emblem of Odorless and Official Death." (688) Here Pynchon cuts straight to the point - the almost pathological fear of death and its connections to fears of blackness, excrement. Shit, Death, and the Word. Edwin Treacle hit on this back on p. 276 when he tried to show his colleagues at the White Visitation "that their feelings about blackness were tied to feelings about shit, and feelings about shit to feelings about putrefaction and death." The cycle of life is too organic, too messy. Better to replace carbon with silicon, to hide shit with porcelain, to treat people with dark skin as "other" or sub-human to avoid acknowledging that their non-European, communal ways of life were, in fact, totally natural.
An Incident in the Transvestites' Toilet
Not King Kong, but a small, costumed ape comes up to Slothrop, who's wearing a Fay Wray dress while waiting in the bathroom for a still-unspecified message. We get a Miltonic blank-verse poem (thanks, Weissenburger!) about the movie King Kong, written in the voice of Anne Darrow (Fay Wray's character). It's honestly quite good - I love the line "in your own stone living space" - the internal rhyme there sounds really nice, and I like the riff on living stone / Livingston, both of which have popped up previously. In the poem, Darrow talks about when she was tied up, hung by the natives as an offering to "the night's one Shape to come" (689), echoing both Greta Erdman's scene in Alpdrücken and the Hanged Man card of the Tarot (willing sacrifice, sacrifice that prompts a return, a renewal of the cycle). Darrow says she prayed, "not for Jack," her suave costar, but for her director Carl Denham, "only him, with gun and camera... making the unreal reel / By shooting at it, one way or the other-" (689). Throughout GR, we've seen a film motif, and this really brings it home. The analogy of a gun to a camera, both of which make the unreal real (a camera creates films that interpret real life - the "unreal reel", a gun makes death, which we've blocked away and tried to avoid, real and inescapable). The director is in control of the movie, the actors, the story, of how it works and what is told. Darrow ends by asking Carl to "show me the key light, whisper me a line..." - a key light is used in cinema and photography to not just shed light on the subject, but to do so in a way that provides form and dimension to the subject and the scene. So Darrow is asking for the director to literally give her form and definition, to tell her what to say next.
This ape, though, isn't so Romantic as ol' Kong though, and is much more direct. It hands Slothrop an anarchist's bomb straight out of the comics pages, and takes off. Slothrop freezes and is saved by a helpful transvestite who takes the bomb and flushes it down the toilet. But it explodes anyway, sending geysers of water up out of all the toilets. A Voice comes out of he Loudspeaker informing everyone that it was, in fact, a sodium bomb that explodes upon contact with water. Tellls everyone to get the "dangerous maniac" who threw it. That was supposed to be Slothrop, but he was saved by his indecision and the kindness of a stranger, who is now set upon by the other occupants of the toilet.
A Moment of Fun with Takeshi and Ichizo, the Komical Kamikazes
We now jump to a pair of comically-mismatched Kamikaze pilots stationed on a remote island well away from any conflict. One flies a Zero, the other flies an "Ohka device" which is basically a rocket-bomb with a pilot's seat. They get moonshine from their radarman, Kenosho, who mocks them daily for the lack of opportunities to fly to their deaths and who comes up with haikus that, while in the right format, really miss the heart of what a haiku is supposed to be.
Streets
Back to Slothrop, now, and a catalogue of the streets he's traveled down and what he's seen. We get a meditation on the absurdity of army chaplains, who worked for the Army and "stood up and talked to the men who were going to die about God, death, nothingness, redemption, salvation." (693) And it does seem a bit absurd when you consider that the Army that employs the chaplains is the same entity sending the men off to die. We see a bus driver (perchance our maniac bus driver from earlier?) driving through town in the night, his passengers looking out the windows, their faces "drowned-man green, insomniac, tobacco-starved, scared, not of tomorrow, not yet, but of this pause in their night-passage, of how easy it will be to lose, and how much it will hurt..." (693) Going back to the Waste Land, the phrase "I do not find / The Hanged Man. Fear death by water." is symbolic of a death without return (drowning) contrasted to the sacrifice/return symbolized by The Hanged Man. These poor passengers, it seems, aren't to expect any return.
Slothrop also, at this point, learns of the bombing of Hiroshima from a discarded Army newspaper, the photo of the atomic blast placed in poor taste next to an image of a pin-up girl. The bomb's mushroom cloud is compared to the Cross, to a capital-T Tree. But which tree? Is this a meditation on the deadly, unforgettable knowledge of how to split the atom, or of the tree of life, with the citizens of Hiroshima as a sacrifice made... but to what? I'm honestly not sure. Would love your thoughts.
Listening to the Toilet
As others have noted, this book in many ways is about the drug counterculture and hippie movement of the 60s/early 70s. This is the most overt in this section, in which we learn that listening for the cessation of the flow of water to the toilet in the pipes is a cue that a police raid is imminent - shutting off the water being a way to prevent the flushing of illicit substances. But it takes a special ear to hear the cessation of a subtle, pervasive white noise. What if the sun, in fact, massive furnace that it is, emits a constant, low-level roar that is so incessant we don't even hear it? What if eddies in the current of the Soniferous Aether cause rare spots of true quiet, where the noise is no longer transmitted and anyone in that spot can hear their own heartbeat it's so quiet? Interestingly, there are "quiet rooms" designed to absorb nearly all sound, used for precise sound calibration. I remember reading that most people can't sit in one of those rooms for more than 30 minutes or so because it's literally so quiet that you can hear the blood flowing through your veins, and people have even reported auditory hallucinations as a result. But why this digression? Maybe because we need to be asking what other white noise is out there that we've become completely deaf to? I think Roger and Jessica found a pocket of this quiet, early in the book, where the "noise" of modern society and all its associated obligations was muted by the War.
Witty Repartee
A return to our Komical Kamikazes, and a meditation on the ubiquity of the Hotchkiss machine gun across nations, independent of alliances. We get an image of a false King - an inbred idiot lying naked in a dumpster, attracting the attention of potential revolutionaries. But they can't decide if he's "a diversionary nuisance planted here by the Management, or whether he's real Decadent Aristocracy to be held for real ransom" (698). While the would-be revolutionaries are debating in the alley, sentries with the aforementioned Hotchkiss guns take positions on the rooftops, aiming down...
Heart-to-Heart, Man-to-Man
A dialogue here between Slothrop and ol' Broderick, with dear old dad interrogating his wayward son about a modern electric drug. Slothrop reassures him that he'd never shoot raw electricity - no, they dope themselves with waves. Major pre-Cyberpunk vibes here, with Broderick warning "Suppose someday you just plug in and go away and never come back?" to which Tyrone replies, "What do you think every electrofreak dreams about? .... Maybe there is a Machine to take us away, take us completely, suck us out through the electrodes out of the skull 'n' into the Machine and live there forever.... We can live forever, in a clean, honest, purified Electroworld-" (699). Matrix, anyone? Not to mention the waves of radio, TV, etc. and the simple, episodic, controlled reality they offer. Pleasantville also comes to mind, with all its commentary on the shows of the era.
Some Characteristics of Imipolex G
We learn that Imipolex G is the first erectile plastic, stiffening in response to certain electronic stimuli. The potential of a layer of controlling wires just under the outer layer of Imipolex, making it a second skin - a synthetic interface. Alternately, there's the potential to control it via a projection of "an electronic 'image; analogous to a motion picture." (700)
My gods, I made it through this section...
Section 68
Tchitcherine now, dealing with a spook, Nikolai Ripov, from the Commissariat for Intelligence Activities. His pal Džabajev has run off with "two local derelicts" (700) and is impersonating Frank Sinatra and wooing the ladies of the Zone. We get the line, "While nobles are crying in their nights' chains, the squires sing. The terrible politics of the Grail can never touch them. Song is the magic cape." (701) - Seems another example of folks recognizing the game, the Grail quest, for what it was and checking out - deciding not to play and just enjoy themselves while the Elect lose sleep over the endless searching.
Ripov explains to Tchitcherine how "the basic problem... has always been getting other people to die for you." (701) Religion used to serve as an effective control for that reason - death isn't quite as scary if you think you're going to heaven. But modern society has moved on, and needs more secular sources of control, like a commitment to "History" as if you're part of some great narrative, sacrificing yourself for some imagined end-goal of what society is "supposed" to be.
Seems Tchitcherine was doping on Oneirine theophosphate. Wimpe, his dealer, argues that a man is "only real at the points of decision. The time between doesn't matter." (702) Points man again - the moment of decision, of choice, that splits the future in two. Points of control. Contrast that to:
"Datta: what have we given? / My friend, blood shaking my heart / The awful daring of a moment’s surrender / Which an age of prudence can never retract / By this, and this only, we have existed." (The Waste Land, Part V: What the Thunder Said - emphasis mine).
Both are arguing that it's these key moments, irreversible junctures in our lives that make us real. Not what comes next, not what people say about us, just our moments. Integrate those moments, run them fast enough (say 24 frames per second) and you might even approximate something close to a person...
We learn that Oneirine apparently leads to "the dullest hallucinations known to psychopharmacology" (703) - hauntings of the mundane, the almost-normal.
Tchitcherine's Haunting
Tchitcherine hallucinates that Ripov is interrogating him, and he becomes fixated on the question of whether or not he was supposed to die. Seems like part of him wants to believe in life after death, in some hope for meaning, which goes against the Soviet doctrine and thus isn't exactly endearing him to those above him. Thankfully this is just an Oneirine haunting, except... wait, it's too real - no subtle violations of reality. He tries to escape, but is outnumbered. But no execution for him here - just a reassignment to Central Asia. A cold and operational death.
Section 69
"The dearest nation of all is one that will survive no longer than you and I, a common movement at the mercy of death and time: the ad hoc adventure." - Resolutions of the Gross Suckling Conference (706)
In other words, they seek a nation that does not function independently of its citizens - one that is not some separate identity with a quasi-personhood (much like how corporations are legally "people"). Rather, a nation that is inextricably linked to the people and that will die when they do. No immortality, no denial of the cycle or death.
But poor Roger's still dealing with Jessica, and now with Jeremy, too, who he's at least amicable with. But he's struggling with their acceptance of the System, their embracing of it. Jeremy's all about reassembling the rockets and firing them, asking "What else does one do with a rocket?" (note how disassembling it or at least not using the weapon isn't even an option...).
Jeremy's even so kind as to invite Roger to a fancy dinner with a bunch of corporate bigwigs, including folks from Krupp, ICI, and GE, and hosted by one Stefan Utgarthaloki, whose name should be a giant red-flag that something's amiss with this shindig. Roger picks Seaman Bodine as his date, the two having struck up a rather theatrical friendship, dress in their absurdist best (Bodine in the mother of all zoot suits), and join the party.
We get some insight here into the nature of rebellions, and the danger of them not only fizzling out or failing, but of being co-opted as a tool to "help legitimize Them" (713). Of either dying or "living on as Their pet" - it brings to mind the corporate branding of "rebelliousness" as cool, as "a phase" that it's normal to go through and eventually grow up from. Treating the idealism of youth, the desire to make the world better and to fight against the problems of the system before you become numb to them, as a normal phase of life is such an effective way to neutralize it culturally. How many people have heard the phrase "you get conservative [i.e. more resistant to change] as you get older"? How many of us have seen youth-led movements being dismissed as examples of immaturity, for example? Between that and companies stamping their logo on it (hello, Hot Topic), it's a way to change the cultural narrative around any movement against the status quo to one that's dismissive, just accepting enough to let people burn off their energy and eventually fall into line. Because how else can you continue to live a decent life in a society that refuses to change? You either go build a shack in the woods somewhere, die, or acclimate to the system and just focus on being comfortable yourself, not constantly fighting for change. It's a depressing thought, and I'm sure Pynchon saw a lot of that attitude in the 60s. I have to wonder - do non-industrialized societies have "teenage rebellion" as a normal part of life? Is that a part of human nature, like we tend to think, or is it an explicit reaction to reaching maturity in a system that is anti-human and anti-nature?
Anyway, back to the dinner party - between the depressing, anti-social music (kazoos?!) and the lavish dinner, things seem fine, but there's a plot against the Roger and Bodine. Fortunately a journalist, Constance, tips off Bodine that they might just be the main course of this feast, so Bodine cues Roger to begin the evening show - an absurd gross-out session that they planned in advance with the aid of now-deceased Pudding communicating via medium Carroll Eventyr. The pair recite an increasingly disgusting list of alliterative dishes, triggering "well-bred gagging" and guests to flee, though a few find it all quite entertaining. But it's enough to break up the dinner party and allow our heroes to flee.
Note: If you made it this far, actually read all this, thank you. Bloom warned me this was a longer section, and boy, he wasn't kidding. I think this is longer than some college essays I wrote... Damn fun, though, and I hope you've found my thoughts informative, interesting, useful, or if nothing else, sufficiently diversionary for a spell. I truly look forward to seeing what you other fine foax have to say on these labrynthine sections.
Questions
  1. In the lightning-aficionado's "A Nickel Saved" excerpt, are there any other references or hidden ideas you can find? I have to think there are.
  2. What is the meaning of the windmill reflected in Blicero's eyes? How do you interpret the imagery in this scene in general?
  3. 175-Stadt. Oven-State. Hund-Stadt. Rocket-State. Factory-State. We've seen numerous examples of specialized micro-states across the Zone, experiments in different forms of society. What are your thoughts on these? Are they hints at ways to find alternate societies, or manifestations of humanity's tendency to divide by category and put of fences?
  4. In the "Shit 'n' Shinola" subsection, Pynchon connects Jack Kennedy, Malcolm X, and Tyrone Slothrop. What do you make of this intersection?
  5. In "Streets," the bombing of Hiroshima is presented as being similar to the Cross, "it is also, perhaps, a Tree..." - the capitalized "Tree" here could be the tree of knowledge, the tree of life, the tree from which the Hanged Man dangles, or perhaps something else. What's your interpretation of this imagery?
  6. In Section 69, we see references to the Albatross, famous symbol from The Rime of the Ancient Mariner. It's presented that Slothrop is the (now-plucked) albatross, but it's not clear who killed this bird, or who's wearing it around their neck. They? Any ideas?
submitted by KieselguhrKid13 to ThomasPynchon [link] [comments]

strong trigger warning. are my feeling here valid?

this has stong wording and sexual assult and all types off abuse. please consider your mental health before reading thank you. all names in hear have been changed for the safety off all involved. i am about to go no contact with my mother for the abuse i have suffer at her hand but first i want to tell everyone what happened and how i feel. can you please tell me if i am being to harsh?

This has been one of the hardest posts I have ever had to make. I ask that you read everything before you reply. Please hear me out then you can say what you want but I want it known I have people who will be watching, all private messages will be screenshot, posted publicly and it is there that I will reply. So, you might as well just post your comment below and do not even try private messaging me if it is not supportive for what I have to say. Also, even supportive messages will be posted, no one here is special or discriminated against. This is about exposing my abuser and nothing more.
Ok let us get started. You once asked me what I had to be depressed about when I told you I was struggling. I hope this answers your question, but I do not think it will. You have stated that I was faking disabilities that I had not even heard of before I was even diagnosed with, you have made fun of a small child for being scared of a hallucination. I now know this is common for children with complex PTSD, imagine that.Overall, the point is you have disregarded my mental illness and believed my main abuser over me but let us move on.
I know this will not change your mind, that would take you recognising your narcissistic, toxic behaviour and that, honestly it is more likely that the gods would walk on this earth again than you admitting your behaviour. You have out rightly told me you have a diagnosis of bipolar type one. Funny thing about that, bipolar is enough to get you disability if you seek treatment but you wont and then you go off at me for seeking treatment for the disorders that i can place at your door. You go off at me for being on disability because i went and got help, but your mentile health is worse then mine and you still wont seek help. Seeking help would fix everything but you just wont and then you put that frustration on me.
You will read this, and you will not even know it is about you if I had not made it so very obvious by now, I know you know who this is about. I know you will not see why this is wrong. I am ok with that. You do not confront a bully because you think it will change their mind. You do it because they deserve to be called out, and you my dear deserve this more than most. I am not doing this for an apology. I am doing this for me to release you and to tell you I deserved better then what you did to me.
Underneath are a list of charges I lay at your feet. I want it known I did not want to do this; I have tried getting along with you, but I am over your smear campaign I am over the emotional blackmail, I’m over the abuse.
Point 1. how a loving mother acts when their child's life is indangour.
I would like to start this with one day about six months after I was born, you and the man you would proceed to have one more child with got into a fight and he threw me, A SIX MONTHS OLD INFANT onto the bed. You seem to think that because you were not the one to do the act you were not in the wrong here, but here is the thing. If you care for your kid and your partner puts that child in danger ONCE you leave.
NO, there is no excuse for staying, I do not care if you “loved” him, he threw your 6-month baby on a bed, at that point your child’s life is in danger, you leave.
Let us continue on shall we to the fact that even though YOU had escaped him, and you knew what he was capable of you continued to let him have unsupervised visits with me. I am sorry but if I have seen that my partner is in any way capable of aggression towards my kids, I am not leaving him alone with them. But you did. You insisted to not take away HIS rights, well what about mine? The minute I said I did not want to go with him, that should have been it. you should not have let him pressure me into going with him.
But let us be honest here shall we, we are placing way too much blame on Adam because you could be just as bad. I can only speak for me of course but I don’t remember you sober except when you were doing your HSC and even then I don’t think you were as “sober” as you wanted us all to believe.
Point 2. theft
You stole a 1000 dollars from me when i got compensation for the sexual abuse i suffered. I told you i did not want to go for compensation.I told you It made me feel like I was being paid for my assault, what did you do? You pushed me AGAINST MY WILL to go for compo even though i told you I DID NOT WANT IT! You did not think about how going over something so traumatic would make the whole thing worse, you just thought of the money, money i did not want. When i got it you asked to borrow a 1000 dollars and you would pay it back. i told you point black i needed it before my birthday because i was going to use it to give myself the best 21 ever. That never happened, in fact you said grandmother told you to keep the money and if you did pay it back she would disown you. Well now both your children want nothing to do with you, how does that feel? Also if what you said is true and grandmother did say this (which i don't think she did.) she can go get fucked too. You do not steal from your mentailly ill 20 year old child- you did.
Also dont try the, “i spent 1000s on you”, im your FUCKING CHILD. I did not ask to be born, i did not want to be born, I hate life. The only reason i'm not dead is the guilt you put in me for thinking i don't deserve to feel the way i do and killing myself would be “selfish”. So no you don't get to say that. You were selfish enough to want me, you spread your legs and you decided to keep me when you found out. That was your choice, take some fucking responsablity and stop trying to blame your kids for your shitty life choices. Giving us life in this climat and the climat back then wasnt a gift as you like to say, it was a fucking curse.
Point 3. what a loving mother does not do.
A loving mother does not say
“I don’t hate you, I hate your personality”
Glad you cleared that up mum when you said, “I hate you”.
“I love you, I just don’t like you right now.” I mean it’s not like
I wasn’t already being bullied at school on a daily basis, being told at school by the student body how much they hated me and when I moved schools because off my awkward and antisocial ways I was completely ostracised and I didn’t need love and support from you. (sarcasm)
On that note loving mothers do not deny their child physical affection when they are the only ones, they can get it from. No, I do not care what your excuse is. I do not care that is how your mum treated you, you always prided yourself on being the better parent well you were not you were an abusive bitch deal with it.
You do not hit or choke a bullied child because they do not want to go to the place where they have no friends and nothing to do on the best days and on the worst their life was in danger, I’m not even blowing this up they threw pieces of paper that were on fire at me.
I begged you to home-school me, but you wouldn’t and why? Because you didn’t know it was an option- if you cared you would have found out, you just didn’t want to be responsible for your disabled daughter’s education because you were disappointed in me for being dyslexic because heaven forbid your child not be good at English.
Point 4 how to get children to like each other.
You made me believe I was responsible for my sister protection. Every bit of resentment we held and still hold for each other would not be there if it had not been for the toxic behaviour you encouraged on both our sides. You should have separated us; you should have admitted you could not handle me. You should have let me go, but heaven forbid your ego take a hit.
Part 5. Child rasing
A good mother does not dump a 1 year old on an 11-year-old and a 9-year-old, you did. To the point that said child called me and the 9 year old mum. I had people at the shops thinking this child was mine. You were the adult, you should off been the one washing, feeding, taking care off him and yet you werent, we were.
Part 6. fertility
A loving mother doesn’t turn around to their clearly hurting and grieving child who is reaching out about pain they feel about their sister being able to do something they can’t and I quote- “it’s a good thing you can’t have children, because you wouldn’t make a good mother anyway”.
I am sorry, what? Who are you to say that to me? Maybe I should call aunty k give her a nice long list off how you have handled my miscarriages. “Oh but i understand i lost a child once” you had one miscarrgie that you only ever mentioned to down play my hurt at leaning i cant have kids. The only person in this family who has any right to say anything about my fertility problems is the only person in the family who could possibly understand at all and that person isnt you. Its aunty k.
I wanted children, i wanted a family. A big one. I want 10 kids and 8 dogs and a white picket fance. Im not going to get that naturally- witch cool i have no problem with adoption and if me and my partner ever decided we wanted a child that is probably the way we would go- BUT you want to tell me that my adopted child wouldnt be as LOVED that my FAMILY wouldnt be as real because i adopted. If you really believe that, why did you give up scott? I mean if you cared and loved your child - witch you have said you did, thats why you gave him up your words- why would you give him to someone if you believed they were incapable off loving that child as their own? You are a horrible human being who has fostered jealousy on more then one occasion between me and my sisters because they are physically healthy and abiled body and i am not.
If you honestly think i dont love my younger siblings nephews neices or any child of the people i love have with all i my heart or you think that i could love a child more because it come from my twat then you have no idea who the fuck i am. I dont even feel like i have the right to reach out and interact with my sibling children because im almost positive they hate me and honestly that can be placed with you too, and i dont blame them. Because you wouldn't be a parent i had to be the bitch. The one saying no. the one stopping shit that could hurt them. i was the only one trying to protect them. I saw where they were headed and tried to stop it. you were drunk.that should have been you. I love my siblings and could not be prouder off any off them but do not try to take responsibility for how we turned out, that wasn't you. That was us.
Also do not try to pin this on aunty d, she is a sweet kind woman who is shy and doesn't know how to assert herself. She gave up the wine, she showed unconditional love and support. The worst thing that woman has ever done to me is when i came out she told me she thought my sexuality was just a “phase” and I'd grow out of it. I didn't but that's ok, she also told me that day that she would love me no matter what and has never not done that.
If you want someone you can drag into your snake pitt take p his treatment off me compared to his own fucking kids was messed up. How was i the fucking favourt when i wasnt his god dam kid- and dont say i wasnt we all know i was.
Part 7. Traumatic situations.
Moving on to ten when my favourite uncle held us hostage. Did you know I saw that knife held to your neck while looking over the banister? I did. I saw my favourite uncle hold a knife to your neck and new me and my sister needed to get out which is why when you came up, I was trying to get my sister to leave. That is why I said the tree. You made the whole thing about you, it was all you. Me and my sister, we weren't traumatized, i didn't just lose the one person i felt like i had a connection to. No, the only person who mattered was you. To the point that when i broke down i was told i had to “stop crying” because YOU need me, a ten year old child, to be strong enough to handle YOUR truma. Thats not how that works.
Part 8. How to handle your child be sexually assaulted
How about 12? How about when the ongoing sexual harassment and inappropriate comments [grooming let us be honest} by my MOTHERS partner at the time was doing {that both me and my siblings had warned her about it and that we were uncomfortable. I am not protecting you anymore, you knew how we felt.} ended with him sexually assaulting me and another girl. {for her privacy I will not name her, but she knows who she is. If she wants to confront you that is on her.} while he was babysitting and why was he babysitting? Because you wanted to go out partying and do not say “oh well you said it was fine” I was 12 what else would I say?
Also after that you proceed to tell me about your sexual assault and that you had it so much worse. You said this while drunk and did not remember. You were in your 20s when you were assaulted, I WAS A CHILD! I was even a child the first time I was raped. You are not special, you want help see a doctor stop putting it on me and my siblings- also get some help your not ok, you have never been ok, the fact you put this on a CHILD proves your not ok. You have told me so much shit when drunk to discredited my assaults i don't even know if what you said was true anymore but ill give you the benefit and say it is. In witch case you are not coping you are an abusive alcoholic who doesn't even see the damage they're doing around them. Get help.
I have a massive problem with understanding what is and isn't appropriate to say now, i don't understand social situations. That was your fault. Your the one who didnt teach me what is and isnt appropriate in sexual situations. Im reteaching myself this, i use to think this is because off how open everyone was, aunty j aunty k ec, but its not. That should off tought me body confidence and kindness not an inability to decipher when im making someone uncomfortable with sexual comments. You made the talk off sex so common that now the idea off people being uncomfortable with it is confusing to me. That should off been part of the conversation, why wasnt it?
Part 9 how to deal with bullying
Under all of this is the ongoing systematic bullying that went from kindy till year 10, why did it go on for so long? Because when you were given the option to move me to another district in year 6 you kept us in the same town because you did not want to separate my sister from her friends. If you had put me first for once I would never have hurt. I am going to leave this hear but you know you did more, and I have no problem airing all your dirty laundry mother.
So, what is the result of what is clearly intense abuse you may ask?
  1. I have DID
under this post or maybe above will be another post naming off my alters and explain what DID is and how it affects me, but for those wondering I have 8 main personalities 1 who has not made themselves none and two “sleeping”.
  1. Anorexia and bulimia and honestly, I do not blame anyone I went to school with but how did me vomiting after lunch every day not tip anyone off? How did me starving myself never get caught? Honest question. I mean i know you all didnt like me in school, but did no one see how much i was hurting? I needed help. Why did no one offer?
  2. PTSD, what do I say here? If you think you could get through what I went through, good luck.
  3. Bipolar schizoaffective disorder- it is a chemical imbalance in the brain, so I do not know what you want from me.
You have bullied and belittled me for my weight. You have put your own traumatic past on me when I was a minor and asking for help. It is not my job to get you through your trauma, I am your child, not your sister. YOU should be fixing mine. You should have been taking care of me loving me, instead you treated me like your own personal shrink and then got angry when I was hurt at you cutting me out after aunty k died. I never should have thought my job was to comfort you, your job was to comfort me.
Considering you cannot seem to understand the concept that you might be in the wrong. You even decided to out my sexuality to the family and were actively betting on my sexuality-that is not normal, that is not ok, that is not accepting. - you did this even though you knew we have a cousin who is like me and who was kicked from the family.
HOW DARE YOU!
You even raised me knowing that no one, not even me, can connect with this family member because you all kicked him so fair from the family no one has heard from him since before i was born. YOU STILL THOUGHT YOU HAD THE RIGHT TO OUT ME! HOW FUCKING DARE YOU. even if none off this was true it was my choice when, if or how i came out to my family, you took that away from me. That alone is enough for me to disown you. I had been fucking careful once i had grandma on my page. Yes i am big in lgbtq rights but i didnt start saying online that i was queer till you took that right away.
So, as we no longer have the right to come out how we want this is our coming out. we have DID as such I am not a girl or a boy, we have both male and female alters in our system. Our system's name is starlight. We are not one person. We as a whole identify as non-binary. Our sexuality is pansexual-demiromantic.
My name is not Madison, I only went by that because I didn’t want to try to get people to call me by my preferred name, I tried that I asked you to call me star, you couldn’t respect that because I chose it myself and nicknames can’t be “chosen” so you have called me by a completely different name to what mine actually is.
So just that we are clear
My name is (Insert name here)
My pronouns are he/him
I have 7 other active alters with their own gender and sexuality. You do not need to remember them all; we are happy with they/them as there is
more than one of us.
Also, you have meet my alters you just do not know me well enough
to tell the differences.
So what can we gather from all this?
You were an abusive person, i didnt blame you for my childhood before but i do now. You are completely responsible for my shitty childhood.if you had been a responsable sobor adult none of this would of happen. You took away my freedom and left me with the only choice of “do what YOU want” with me having no right to my own life or die. That's not a choice, that's the illusion of choice and you even took that away from me when uncle todd died, you told me what he did was selfish, you said killing myself was selfish. You took away my only way out and still dont see how you were wrong. After that you TRIED to take your life too, like shit your the biggest hypocrite i know.
You will never be left along with my CHILD, hell you will be lucky if you even know if i give birth. This is me saing im going no contact if you couldnt tell by now. Stay the fuck out off my life and anyone who wants to justifie or support her abuse ass can see them self out.
If you want my forgiveness you can start by returning the money you stole and issuing a public apology admitting to the shit i didnt say to prove you understand you are in the wrong. Keep in mind i have no issue handing the phone i have into the police and leaving you to deal with it if you in anyway attack me for this post. If you apologise i might for give you, if you chose to leave me the fuck alone the money will be in once a month. if you attack me, call me consistently or call me a lier and refuse to take responsibility for your actions i will just stop paying the bill and hand it too the police, i dont need it, i will survive with out it. you will not be able to pay the bill. Chose what you want to do.

thank you for reading this any advice would be grate.
submitted by lilylightfang to survivorsofabuse [link] [comments]

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

IT Pro Tuesday #64 (part 2) - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Captura is a flexible tool for capturing your screen, audio, cursor, mouse clicks and keystrokes. Features include mixing audio recorded from microphone and speaker output, command-line interface, and configurable hotkeys. Thanks to jantari for the recommedation.
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
submitted by crispyducks to ITProTuesday [link] [comments]

Tools & Info for MSPs #2 - Mega List of Tips, Tools, Books, Blogs & More

(continued from part #1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments.
Graham | CEO | EveryCloud
Fyi - I've set up a subreddit /itprotuesday, where we feature / encourage posts of some additional tools, tips etc. throughout the week. Pop over and subscribe if you’re interested.
submitted by crispyducks to msp [link] [comments]

Forgive my idiocy, but what is emacs-26.0.50 and how did it appear on my Ubuntu VM?

Ran a bit of ubuntu last night for the first time in months.
$ apt-get update $ apt-get upgrade dist-upgrade 
Then fired up emacs and was surprised to see I am running
GNU Emacs 26.0.50 (build 2, x86_64-pc-linux-gnu, GTK+ Version 3.18.9) of 2017-05-02 
Emacs 26.0.50?
That seems odd. A bit of googling suggests it is the devel version, fine, but I am not sure how I got that.
Below I'll show you what I did to find out, and it didn't work, leaving me wondering:
  1. What is emacs-26.0.50?
  2. How did I get it?
  3. What is the proper way to ask Ubuntu where it came from?

At any rate, what I did was trace it

  1. Via google ...
  2. Looked through my apt sources and traced it from the repository I would think it came from
  3. Interrogated apt

1. Google

Googling "emacs 26.0.50" leads to github.
Now sure enough, when I visit https://github.com/emacs-mirroemacs, the master branch there currently holds:
Copyright (C) 2001-2017 Free Software Foundation, Inc. See the end of the file for license conditions. This directory tree holds version 26.0.50 of GNU Emacs, the extensible, customizable, self-documenting real-time display editor. 
But how did it get on my system?

2. Looked through my apt sources and traced it from the repository I would think it came from

Looking in /etc/apt/sources.list.d, I see:
ubuntu-elisp-ubuntu-ppa-xenial.list 
which contains
deb http://ppa.launchpad.net/ubuntu-elisp/ppa/ubuntu xenial main 
going to that url, I see
http://ppa.launchpad.net/ubuntu-elisp/ppa/ubuntu/dists/xenial/main/binary-amd64/ Index of /ubuntu-elisp/ppa/ubuntu/dists/xenial/main/binary-amd64 [ICO] Name Last modified Size Description [DIR] Parent Directory - [ ] Packages.gz 02-May-2017 09:05 1.4K [ ] Packages.xz 02-May-2017 09:05 1.4K [ ] Release 02-May-2017 09:05 120 [DIR] by-hash/ 15-Apr-2016 17:17 - 
And downloading Packages.gz and peeking inside I see
Package: emacs-snapshot Priority: optional Section: editors Installed-Size: 20671 Maintainer: Robert Bruce Park  Architecture: amd64 Version: 20170501:93592-d36b0c2-emacs-25.1~ubuntu16.04.1 Replaces: emacs-snapshot-nox Provides: editor, emacsen, info-browser, mail-reader, news-reader Depends: emacs-snapshot-common (= 20170501:93592-d36b0c2-emacs-25.1~ubuntu16.04.1), gconf-service, libasound2 (>= 1.0.16), libc6 (>= 2.17), libcairo2 (>= 1.2.4), libdbus-1-3 (>= 1.9.14), libfontconfig1 (>= 2.11.94), libfreetype6 (>= 2.2.1), libgconf-2-4 (>= 3.2.5), libgdk-pixbuf2.0-0 (>= 2.22.0), libgif7 (>= 5.1), libglib2.0-0 (>= 2.37.3), libgnutls30 (>= 3.4.2), libgpm2 (>= 1.20.4), libgtk-3-0 (>= 3.11.5), libice6 (>= 1:1.0.0), libjavascriptcoregtk-4.0-18, libjpeg8 (>= 8c), liblockfile1 (>= 1.0), libm17n-0 (>= 1.6.1), libmagickcore-6.q16-2 (>= 8:6.8.8.2), libmagickwand-6.q16-2 (>= 8:6.8.9.9), libotf0 (>= 0.9.11), libpango-1.0-0 (>= 1.18.0), libpng12-0 (>= 1.2.13-4), librsvg2-2 (>= 2.14.4), libselinux1 (>= 1.32), libsm6, libsystemd0, libtiff5 (>= 4.0.3), libtinfo5 (>= 6), libwebkit2gtk-4.0-37 (>= 2.15.1), libx11-6, libx11-xcb1, libxcb1, libxext6, libxfixes3 (>= 1:4.0.1), libxft2 (>> 2.1.1), libxml2 (>= 2.7.4), libxpm4, libxrender1, zlib1g (>= 1:1.1.4) Conflicts: emacs-snapshot-nox Filename: pool/main/e/emacs-snapshot/emacs-snapshot_93592-d36b0c2-emacs-25.1~ubuntu16.04.1_amd64.deb Size: 3873116 MD5sum: db8e6ecddeffa4fed3fad388e3965cca SHA1: 63bd17412db88084a0b25bb9db4bc79387919be0 SHA256: 40047cbaa736fdf107897e6d7bb3b1bdfd12066dcf7fff17ed8c90db59081a43 Description: GNU Emacs editor (with GTK+ user interface) Description-md5: ac8913ffe24029ae506e2840dc7a29da 
Which seems to describe a version of 25.1.

3. Interrogated apt

SIMILARLY,
When I ask ubuntu what package provides emacs
$ ls -l /usbin/emacs lrwxrwxrwx 1 root root 23 Feb 11 20:08 /usbin/emacs -> /etc/alternatives/emacs $ ls -l /etc/alternatives/emacs lrwxrwxrwx 1 root root 23 Feb 11 20:08 /etc/alternatives/emacs -> /usbin/emacs-snapshot $ ls -l /usbin/emacs-snapshot lrwxrwxrwx 1 root root 22 May 2 02:00 /usbin/emacs-snapshot -> emacs-26.0.50-snapshot $ ls -l /usbin/emacs-26.0.50-snapshot -rwxr-xr-x 1 root root 16648248 May 2 02:01 /usbin/emacs-26.0.50-snapshot $ dpkg -S /usbin/emacs-26.0.50-snapshot emacs-snapshot: /usbin/emacs-26.0.50-snapshot $ apt-cache policy emacs-snapshot emacs-snapshot: Installed: 20170501:93592-d36b0c2-emacs-25.1~ubuntu16.04.1 Candidate: 20170501:93592-d36b0c2-emacs-25.1~ubuntu16.04.1 Version table: *** 20170501:93592-d36b0c2-emacs-25.1~ubuntu16.04.1 500 500 http://ppa.launchpad.net/ubuntu-elisp/ppa/ubuntu xenial/main amd64 Packages 100 /valib/dpkg/status $ 
Which also seems to describe a 25.1 version of emacs
However, the md5 and sha1 of the snapshot I have does not appear to match what I think it should be from the package repository:
$ md5sum emacs-26.0.50-snapshot 706cd0f8806ae48765ae600ca7568fc8 emacs-26.0.50-snapshot $ sha1sum emacs-26.0.50-snapshot 6ab0301e7f092d70536bf382f1d3631f940b100d emacs-26.0.50-snapshot 

So, how did I get emacs 26.0.50 on my system and what is the proper way to ask Ubuntu where it came from?

Update:
The tl;dr is that the ppa I added leads to DAILY Snapshots. And that for whatever reason, the daily is tagged as 26.0.50 and not some incremental update to 25.1
Thanks to all for the various ubuntu and emacs tips!
More:
I found in the /valog/dpkg.log where the snapshot is installed, and the snapshot is labeled:
2017-05-02 03:02:22 upgrade emacs-snapshot:amd64 20170315:93230-a3207a3-emacs-25.1~ubuntu16.04.1 20170501:93592-d36b0c2-emacs-25.1~ubuntu16.04.1 
And the package itself was downloaded in /vacache/apt/archives
-rw-r--r-- 1 root root 3.7M May 2 02:04 emacs-snapshot_20170501%3a93592-d36b0c2-emacs-25.1~ubuntu16.04.1_amd64.deb
When I open the package I see:
 Mode UseGroup Size Date Filename --------- -----/----- ------- ---------------- ---------------- rw-r--r-- 0/0 4 2017-05-02 02:01 debian-binary rw-r--r-- 0/0 15916 2017-05-02 02:01 control.tar.gz rw-r--r-- 0/0 3857008 2017-05-02 02:01 data.tar.xz --------- -----/----- ------- ---------------- ---------------- 
When I open control.tar.gz I see:
 drwxr-xr-x root/root 0 ./ -rwxr-xr-x root/root 374 ./prerm -rw-r--r-- root/root 50350 ./md5sums -rwxr-xr-x root/root 503 ./postinst -rw-r--r-- root/root 1524 ./control 
When I open md5sums I see:
706cd0f8806ae48765ae600ca7568fc8 usbin/emacs-26.0.50-snapshot 
And when I take the md5sum of the installed emacs I see:
$ md5sum /usbin/emacs-26.0.50-snapshot 706cd0f8806ae48765ae600ca7568fc8 /usbin/emacs-26.0.50-snapshot 
So clearly, what is on disk that I am using is an official emacs release.
And so then going back to the ppa I added in the sources.list.d, which is
deb http://ppa.launchpad.net/ubuntu-elisp/ppa/ubuntu xenial main 
Well hell, that even states it is:
`The Official ;-) Ubuntu Emacs Daily Snapshot PPA.` 
So the only mismatch is why the daily is referred to as 26.0.50 and not an incremental off of 25.1.
But, I was the person who asked my machine to load it up. So that's good.
submitted by jpflathead to emacs [link] [comments]

Binary Options Daily Tips Best Binary Options Strategy ... Binary Options Daily Tips Best Binary Options Strategy ... binäre optionen kay - binäre optionen kay iq option ... Best Binary Options Trading Strategy - Best Way To Make Up To $5,000 Every Day Daily Binary Option Trading Tips – January 16th 2015 - YouTube tradingfornewbies - YouTube How to make money trading binary options 2018 EASY Fundamentals TIPS for Forex Trading

Binary.com Binary options for teenagers. Written by on March 12, 2015. binary options no minimum autopilot, stock market after hours gamma trading earnings release, getting into stock auto trading signal, nadex binary options software scams youtube, binary options advisory service usa regulated, how to make money binary options trading low minimum deposit, binary option brokers that accept paypal ... binary options trading tips strategies Covert Millionaire League Reviewed. Ptimsene8537. 2:18 . trading binary options hedging strategy Covert Millionaire League Reviewed. Ptimsene8537. 2:19. trade rush binary options trading strategy Covert Millionaire League Reviewed. Ptimsene8537. 2:19. binary options trading api Covert Millionaire League Reviewed. Ptimsene8537. 2:18. binary options trading ... Binary Options Trading Strategy 2017 – Powerful 5 Minute Binary Options Strategy Binary Options Trading Strategy 2017 - Powerful 5 Minute Binary Options Strategy Click […] 5 Tips On How To Become A Good Binary Options Trader 5 Tips On How To Become A Good Binary Options Trader If you don't have any binary trading account then sign up here ... Parents should not feel hesitant to seek out assistance when needed. At this point, the future is very unclear and the timeline for when children might go back to school is uncertain. Although ... Best Binary Trading Tips for Successful Trader. Just like trading forex, there are several binary trading tips you need to know to become a successful trader. Binary options can simply be regarded as financial instruments that assist every trader to run all types of transactions like stocks, crypto, forex, indices, and futures.It is considered as one of the easiest forms of trading wherein a ... Free CSS has 3118 free website templates, all templates are free CSS templates, open source templates or creative commons templates. I've looked into online binary options trading a bit and it seems to me that the consensus is that very few people outside of professional traders can beat the trading sites consistently for good ... Binary Options Daily Paychecks Course and Program Develop a positive and fun mentality about trading and open the path for you to fill out the possibilities. Just a Simple Change in Mindset Can Help Many Traders Find Success Much More Easily by Putting on a Mindset that Attracts and Manifests Successful Trades. These tips can work for parents, too. Tips for Managing FTL. Stop accommodating. This is obvious. So obvious that we think Trip’s parents are fools for hiring a surrogate girlfriend to lure him out of the house, when what they really need to do is stop feeding, taking care of, and cleaning up after him. Which is a great segue to the second tip… Don’t judge. The parental accommodation we ...

[index] [26426] [6535] [15776] [4548] [20736] [5216] [27329] [7153] [25037] [26012]

Binary Options Daily Tips Best Binary Options Strategy ...

All about Trading in Forex and Binary Option Marked. Video Name: EASY Fundamentals TIPS for Forex Tradin ----- Perfect site for All Forex Fundumentals and the Performance of the Top 7 Forex pairs. ... OptionsXO is one of the world’s leading online binary options trading brokers. OptionsXO was founded by a team of financial professionals and pioneers in the internet technology industry. The ... http://anyoption.com Trade with knowledge. Discover what's happening in the markets and use this knowledge to make better trading decisions. Visit our anyopt... 🚩Certified Broker!🔔 Sign up to Get 💰Profit Offers💰👉 https://bit.ly/2Q2FvmG 🚩Automated Binary Options Trading Software 👉 https://bit.ly/SoftSignal ... Trading for newbies, the best place to learn about trading forex, binary options, and any other markets you can think of. Be sure to check out the new videos... Best Binary Options Trading Strategy - Best Way To Make Up To $5,000 Every Day ... I know of one 16 year old kid making over $1000 a day online by selling fictional ebooks through the Kindle ... Get one projectoption course for FREE when you open and fund your first tastyworks brokerage account with more than $2,000: https://www.projectoption.com/fre... 🚩Certified Broker!🔔 Sign up to Get 💰Profit Offers💰👉 https://bit.ly/3bKlLys 🚩Automated Binary Options Trading Software 👉 https://bit.ly/2R7faV2 The top 3 bina... Profitability up to 90% binäre optionen kay - binäre optionen kay 20 facher gewinn. bdswiss binäre optionen handeln... Skip navigation Sign in. Search. Loading... Close. This video is ... In this video you are given binary options trading tips that will help you overall with your trading. Trading binary options is not easy so this video will help anybody who trades binary options ...

http://arab-binary-option.brittakwork.tk