This is based on lots of help from Rui Seabra with a G+ remark I made a while ago: “So what would be a proper way to setup an SSH connection over HTTPS given that the proxy in between is CNTLM providing credentials to an NTLM authenticating proxy that does HTTPS man-in-the-moddle? Clients are Linux or Windows with admin access. On the outside Linux with admin access as well.
This is also becoming more and more relevant with “free” WiFi providers only allowing HTTP/HTTPS and playing HTTPS Man-in-the-Middle.”
So the situation is something like this:
client ssh client
stunnel client
man-in-the-middle HTTP/HTTPS proxy only allowing outgoing traffic on ports 80/443
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters
Windows 10 on ARM will supply a long-rumored feature: The ability to run 32-bit Win32/x86 desktop applications—Apple iTunes, Adobe Photoshop, Google Chrome, whatever—directly on the system, unchanged.
Everybody surely knows about more and more software trying to smart replace straight double quotes " with opening ” and closing ” ones.
WordPress is no exception and when you forget to embed these quotes in code and/or pre tags, your source code won’t paste as such.
For terminal code (nx or Windows console doesn’t matter much): it’s much worse: you should not copy/paste code directly to the terminal.
I usually did this any way to get quotes corrected, but – via Daniela Osterhagen referring Dorin Duminica – recently came across a reason that’s much more important:
What’s on the clipboard might not be what you saw on the web site.
The clipboard is getting all text from a selection
The browser hides some part of that text by cleverly using one more more style tags.
So basically copy/pasting to the console is just as risky as piping curl through bash or another shell. You can actually detect that server-side (and abuse it)!
Slightly updated the answer the /D Y part will recursively accept taking ownership when directory listing is denied in the permissions:
To fix really broken permissions, the best is to run these two commands one after the other:
takeown /F /D Y "C:\path\to\folder" /R
icacls "C:\path\to\folder" /reset /T
The first one will give you ownership of all the files, however that might not be enough, for example if all the files have the read/write/exec permissions set to “deny”. You own the files but still cannot do anything with them.
In that case, run the second command, which will fix the broken permissions.
For example, lets say you have spaces 1 and 2. If space 1 is active, you can not move it. You first have to select space 2 then you can move space 1 to a different monitor.
Not sure why yet, but on a gigabit network between a Windows 2008 R2 Server and a Proxmox KVM machine, WinSCP gets around 10 megabit/second and FileZilla > 30 megabit/second.
(Don’t ask for details; at a site with Microsoft Data Protection Manager an external company monitoring that DPM didn’t notice various backups – including the domain controller – were months old despite daily tape changes; so then the RAID fell out because multiple disks failed within hours, contingency aftermath took weeks)
you have PowerShell v3 or later on the client machine
on the client machine
Ensure it’s connected to the same network as the domain controller
Ensure you can ping the domain controller
Test with Powershell Test-ComputerSecureChannel to see if the connection is indeed lost:
if it returns True then you have a different problem (have not seen this, but just in case: this blog post won’t solve that)
if it returns False, then continue with the next step
Run Powershell Test-ComputerSecureChannel -Repair and check if the output is True (when False there )
Note there are various posts suggesting to use Powershell Reset-ComputerMachinePassword and netdom.exe resetpwd /s:dc-hostname.domain /ud:domainadminusername /pd:*. Though faster than rejoining the domain, the Powershell Test-ComputerSecureChannel is even faster and easier.
I’ve seen at least 3 different versions that I needed in the same number of occasions of updating Windows 7 x64 VMs that usually are off-line (I use them every few weeks to do some testing).
Each and every time the situation is the same:
Windows Update will be stuck in “Checking for Updates” for hours (even overnight)
When stuck, Windows Update still uses 1 CPU core at 100%
Warm reboot won’t help
Shutdown and cold boot won’t help
The only thing that consistently solves this is reliably:
Reboot and logon
Stop Windows Update service (wuauserv in Task Manager)
Wait until CPU usage drops
Install the latest Windows Update client
currently this is KB3172605 which – though named July 2016 – has been refreshed quite a few times as late as September 2016
the installation of the .MSU file with the Windows Update client usually seems to “hang” on "checking for installed updates" for like 30 minutes, but if you forget to stop the Windows Update service, the .MSU install will be stuck on "checking for installed updates" forever
Reboot
Try Windows Update again and wait for at least 30 minutes
You need to re-apply to a more recent Windows Update client each and every time this happens taking a few hours of your time.