After searching high and low, I thought I would share some commands that will allow you to find all active DHCP servers on your network.
There is software like FIND DHCP SERVER however there are some incompatibilities we have found on some operating systems.
Temporarily disable your production DHCP server and see if other servers respond.
You can get the IP address of the server by running ipconfig /all on a windows machine, and then you can get the MAC address by looking for that IP address using arp -a.
Running a simple COMMAND PROMPT in windows and the command line : ipconfig /all | find /i “DHCP Server”
You will be granted with the following results.
Note that you can replace DHCP SERVER with SERVER and it will display all servers on the network.
IMPORTANT NOTE: Your IP must be set by DHCP to retrieve this information otherwise it will not show up. Also this command will show even virtual NIC DHCP servers as well.
(firstly I thought the picture to be appropriate considering this true story)
You might laugh at me but I was having a nanny nap with my son, and as I was drifting off, I went to put the phone on his bedside table.
I realized that the table should have been lower than where my hand stopped and then fully waking and realizing, I was putting the phone into a fish tank.
Being so tired, I put the phone down and didn’t even turn it off. (which that should be the first thing you do with water damage).
When I woke in the morning it would not turn on (even though about 80% battery left) – there was still water dripping out of power and sound buttons (not good!)
Plugged in the power and turned on but kept rebooting so I quickly powered back off.
Stuck the phone in rice for a few hours and still no good. Even got a heat gun over the phone.
This is where it went well and this is 12 hours after the incident. I then proceeded to get an air compressor and blow out any water I could (without pulling apart).
The touch screen become a little responsive but started rebooting again. I even had MORE water marks and streaks on the LCD between the touchscreen and LCD (internal)
Now this is the fix for a water damaged iPhone which might even work on Android/Samsung but not tested.
I could get the water dried, it wasn’t a hot day either. So I placed the phone on the dashboard of the car, closed all windows and got the phone as hot as possible.
After a couple of hours I went to the car and tried turning it on…. Guess what – it said TEMPERATURE TOO HOT… I thought good, lets leave it there for most of the day.
Went back 4 hours later, not only did it turn on, the screen was working perfect and even better, all the water streaks were gone. Its just like the new screen I paid $200 for 2 weeks ago on teh same phone.
Hopefully this will help someone else.
(PS I am extremely careful with my phones, and in 3 years, two incidents in two weeks… Argh!)
This topic comes up quite a fair bit some some clients. They do not realise the risk of having simple passwords until it’s too late.
It also means people can be looking at your data without even knowing.
We recommend passwords at a minimim to be 6 characters (however we recommend 8) , and also to have upper, lower, alphanumber and special characters in the password.
The password %^@gtgTT is easier to crack than aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
With Windows 8/8.1 this process was quite difficult and if running Windows 8/8.1, we recommend upgrading before July 29th 2016 to get free upgrade
Now, you can simply open the Settings app, navigate to Personalization > Colors, and activate the “Show color on Start, taskbar, action center, and title bar” option.
You can also choose the color you want to use from the Colors screen.
This Petya ransomware will kill the Master Boot Record making your hard disk useless. If this fails, it will then run a file-encypting program
Petya is an unusual ransomware threat that first popped up on security researchers’ radar in March. Instead of encrypting a user’s files directly, it encrypts the master file table (MFT) used by NTFS disk partitions to hold information about file names, sizes and location on the physical disk.
Before encrypting the MFT, Petya replaces the computer’s master boot record (MBR), which contains code that initiates the operating system’s bootloader. Petya replaces it with its own malicious code that displays the ransom note and leaves computers unable to boot.
However, in order to overwrite the MBR after it infects a computer, the malware needs to obtain administrator privileges. It does so by asking users for access via the User Account Control (UAC) mechanism in Windows.
In previous versions, if Petya failed to obtain administrator privileges, it stopped the infection routine. However, in such a case, the latest variant installs another ransomware program, dubbed Mischa, that begins to encrypt users’ files directly, an operation that doesn’t require special privileges.
The ransom that Mischa currently asks is approx 2 bitcoins, or around US$900
Another thing that sets Mischa apart is that it encrypts executable (.EXE) files in addition to documents, pictures, videos and other user-generated files typically targeted by ransomware programs. This has the potential to leave installed programs and the OS in a non-functional state, making it harder to pay the ransom from the affected system.
The installer for the Petya-Mischa combo is distributed via spam emails that pose as job applications.
These emails contain a link to an online file storage service that hosts a picture of the alleged applicant and a malicious executable file that masquerades as a PDF document.
If it’s downloaded and executed, the fake PDF file first tries to install Petya and if that fails, it installs Mischa. There is currently no known way to restore files encrypted by Mischa without paying the ransom.
The computer POST (power-on self-test) checks a computer’s hardware for compatibility and connection before starting the remainder of the boot process. When the computer is working and passes POST, the computer may give a single or two beepsas it starts and continue to boot. If fails the POST, the computer will either not beep or generate a beep code that tells the user the source of the problem.
Below are a list of some vendors and the post code explanations.
AMI BIOS beep codes
Below are the AMI BIOS Beep codes that can occur. However, because of the wide variety of different computer manufacturers with this BIOS, the beep codes may vary.
Beep Code
Descriptions
1 short
DRAM refresh failure
2 short
Parity circuit failure
3 short
Base 64K RAM failure
4 short
System timer failure
5 short
Process failure
6 short
Keyboard controller Gate A20 error
7 short
Virtual mode exception error
8 short
Display memory Read/Write test failure
9 short
ROM BIOS checksum failure
10 short
CMOS shutdown Read/Write error
11 short
Cache Memory error
1 long, 3 short
Conventional/Extended memory failure
1 long, 8 short
Display/Retrace test failed
two-tone siren
Low CPU Fan speed, Voltage Level issue
AWARD BIOS beep codes
Below are Award BIOS Beep codes that can occur. However, because of the wide variety of different computer manufacturers with this BIOS, the beep codes may vary.
Beep Code
Description
1 long, 2 short
Indicates a video error has occurred and the BIOS cannot initialize the video screen to display any additional information
1 long, 3 short
Video card not detected (reseat video card) or bad video card
Beeps repeating endlessly
RAM problem.
Repeated high frequency beeps while PC is running
Overheating processor (CPU)
Repeated beeps alternating high & low frequency
Issue with the processor (CPU), possibly damaged
If any other correctable hardware issues are found, the BIOS displays a message.