Category Archives: Security

How to Allow Applications Downloaded from Anywhere – OSX Mountain Lion

Follow these simple steps to allow applications downloaded from anywhere to run on your OS X Mac: Step 1: Open System Preferences and then choose Security & Privacy Step 2 Choose the first tab: “General”: The bottom section may be grayed out: If so choose the “Lock Icon” in the bottom left: Under “Allow Applications Downloaded From” click the button to set it as “Anywhere” instead of “Mac App Store” or “Mac App Store and Identified Developers” Now try running your application and see if it works.

Posted in Mac, Security, Software, Tech Tips | Tagged | 1 Comment

E00044 – Customer Information Manager is not enabled [solved]

If you are using the CIM API for web services and are ending up with a XML / SOAP response (SimpleXMLElement Object) with the error: E00044 – Customer Information Manager is not enabled If you have a production Authorize account Authorize.Net requires you to agree to the CIM Terms of Service before the API can be enabled. Please perform the following steps below. Log into your Authorize.Net Account Click Account Click “Merchant Profile” Under “Additional Services” click the “sign-up” link where CIM is listed. Agree to the Terms and Services If you have a / sandbox account and you do not have CIM enabled: “Customer Information Manager (CIM) is not available within shared test accounts. If you need to process CIM transactions, please request a new test account at:”

Posted in Security, Tech Tips, Web Development | Tagged , , , | Leave a comment

Zmodo 420TVL

The Zmodo 420TVL is an outdoor PTZ camera with a 1/4″ Sony Super HAD Color CCD, 22X optical zoom and 10X digital zoom, 420TV Lines, 4-88mm Vari-Focal Zoom Lens (Manual), 60 LEDs, Visible up to 260ft (80m) , and fully Weatherproof. Product Features Image Sensor: 1/4-Inch SONY Super HAD Color CCD Lens: 4-88mm Zoom: 22X Optical Zoom and 10X Digital Zoom Dome Movement: Pan: 0 degree ~ 360 degree (Endless), Tilt: Auto Flip 180 degree IR (Night Vision) Distance: Visible up to 260 (80m)

Posted in Security, Tech Tips | Tagged , | Leave a comment Blacklist

Recently I was checking out the Better WP Security plugin for WordPress and noticed that the plugin comes with a cool blacklist of useragents from (btw that website seems to have a lot of great info on fixing hacked wordpress sites). Anyhow I found that after installing the plugin my .htaccess file was updated and included a new section to block malicious IPs and user agents. The list looks like this:

Posted in Security, Server Admin, Tech Tips, Web Development | Tagged , | Leave a comment

Windows XP Cisco VPN Client Latest Version

If you’re wondering what the latest Version of the Cisco VPN Client for Windows XP, you’ve come to the right place. You may want to heed notice from Cisco that this product is no longer supported… But, according to the information I have found, the final version of the Cisco VPN client software for Windows XP was “” and the installation file was: vpnclient-win-msi-

Posted in Security, Software, Tech Tips | Tagged , , | Leave a comment

AWS re: Invent Day 1 Highlights & Announcements

Greetings from Las Vegas, host city for AWS re: Invent! AWS Senior Vice President Andy Jassy kicked off AWS re: Invent with a rousing 90 minute keynote presentation in front of 6,000 attendees, with another 13,000 watching the live stream. Andy’s talk covered a lot of ground! Starting with the history and growth of AWS over the last 6.5 years, he talked about important AWS use cases including web site hosting, gaming, social media, high performance computing (HPC), media distribution and streaming, disaster recovery, and more. He noted that AWS has hundreds of thousands of customers in 190 countries. This includes over 300 government agencies and 1500 educational institutions. Andy also used this opportunity to reveal some updated statistics on the growth of AWS – over 1.3 trillion objects in Amazon S3 (accessed at a rate of over 835,000 requests per second) and 3.7 million Hadoop clusters launched on Elastic MapReduce in the past two years. During the keynote we also announced Amazon Redshift, our new data warehouse product and an Amazon S3 price reduction, drawing applause from the live audience and a similarly appreciative reaction online. Amazon Redshift Amazon Redshift is a fast and powerful, fully managed, petabyte-scale data warehouse service in the cloud. Redshift offers you fast query performance when analyzing virtually any size data set using the same SQL-based tools and business intelligence applications you use today. With a few clicks in the AWS Management Console, you can launch a Redshift cluster, starting with a few hundred … Continue reading

Posted in Marketing, Security, Server Admin, Web Development | Tagged , , | Leave a comment

Martha Sawyers Comments

“Martha Sawyers” has been posting posting spam comments on my blog. The comments are the usual spam kind, talking about how great a post is or that it renders weird in a particular browser, or that she would love to see more written on the topic. Here are a few examples: I don’t even know the way I ended up right here, but I believed this submit was once great. I don’t recognize who you might be however definitely you’re going to a famous blogger when you are not already. Cheers! And another: Woah this weblog is magnificent i like studying your posts. Stay up the great paintings! You realize, many persons are looking around for this information, you could help them greatly. and finally: obviously like your web-site however you need to test the spelling on quite a few of your posts. Many of them are rife with spelling problems and I in finding it very troublesome to tell the truth then again I will definitely come back again. Did you get some similar spam comments from Martha Sawyers? Leave a note below!

Posted in Marketing, Security | Tagged | Leave a comment

Alex Verdea – Domain Name Squatting

Alex Verdea wants to take you to the cleaner, asking you to pay a few thousand dollars for a domain name he is prospecting on. This is nothing new. Lots of people will buy alternatives to popular domain names and then email the registrants asking for a few thousand dollars in return for giving them the domain name. My advice? Steer clear. Here are a few such emails: Hello,I own the domain name This premium domain is an exact match of the search term and a perfect marketing toolto capture additional traffic, reduce advertising costs, to help brand your website and rank higher in search engines.If you’re interested in acquiring this premium domain name, please let me know as soon as possible.Thank you for your time.Best Regards,Alex VerdeaNameConsultants LLC.alex PO BOX 1522Enka, NC 28728828-367-7030 (Office) Hi,We have managed to secure the domain for one of ourweb apps however we have decided to change the nameand secure a different name that suits out project better.If you would be interested in purchasing this domain pleasedon’t hesitate to contact us.ThanksAlex VerdeaNameConsultants LLC.PO BOX 1522Enka, NC 28728828-367-7030 (mobile) Their website lives at The e-mail address is listed as: [email protected] I find it funny that they have a note on their contact form asking people not to spam them, when that is what they are doing to others: *Note: We log and maintain a list of all visitors/IP addresses that access our site. Please do NOT SPAM. Did you get a message … Continue reading

Posted in Marketing, Security | Tagged , | Leave a comment

Google’s I’m Feeling Lucky Search is Broken

Google’s I’m Feeling Lucky Search is Broken… at least if you’re using some type of browser shortcut for it. I had a custom search set up in Firefox and Chrome to allow me to “lucky search” any keyword and jump to the result. Now Google is checking the referrer for lucky searches and it will take you to a results page unless you do the lucky search from the Google Website. One small note: It still seems to work for queries without a space in them. Try replacing your spaces with underscores or just searching for a single word. Is this affecting you? Do you have a solution? Leave a comment below.

Posted in Security, Tech Tips, Web Development | Tagged | Leave a comment

Yahoo Logout URL

You can easily log out of Yahoo Mail, and the entire Yahoo Network with this URL. You can bookmark it or simply type it into your browser. The URL to log out of Yahoo is: Of course Yahoo won’t even let you logout without showing you at least one ad.

Posted in Security, Tech Tips | Tagged , | Leave a comment