Category Archives: Security

How to Allow Applications Downloaded from Anywhere – OSX Mountain Lion

Follow these simple steps to allow applications downloaded from anywhere to run on your OS X Mac: Step 1: Open System Preferences and then choose Security & Privacy Step 2 Choose the first tab: “General”: The bottom section may be grayed out: If so choose the “Lock Icon” in the bottom left: Under “Allow Applications Downloaded From” click the button to set it as “Anywhere” instead of “Mac App Store” or “Mac App Store and Identified Developers” Now try running your application and see if it works.

Posted in Mac, Security, Software, Tech Tips | Tagged | 1 Comment

E00044 – Customer Information Manager is not enabled [solved]

If you are using the CIM API for web services and are ending up with a XML / SOAP response (SimpleXMLElement Object) with the error: E00044 – Customer Information Manager is not enabled If you have a production Authorize account Authorize.Net requires you to agree to the CIM Terms of Service before the API can be enabled. Please perform the following steps below. Log into your Authorize.Net Account Click Account Click “Merchant Profile” Under “Additional Services” click the “sign-up” link where CIM is listed. Agree to the Terms and Services If you have a / sandbox account and you do not have CIM enabled: “Customer Information Manager (CIM) is not available within shared test accounts. If you need to process CIM transactions, please request a new test account at:”

Posted in Security, Tech Tips, Web Development | Tagged , , , | Leave a comment

Zmodo 420TVL

The Zmodo 420TVL is an outdoor PTZ camera with a 1/4″ Sony Super HAD Color CCD, 22X optical zoom and 10X digital zoom, 420TV Lines, 4-88mm Vari-Focal Zoom Lens (Manual), 60 LEDs, Visible up to 260ft (80m) , and fully Weatherproof. Product Features Image Sensor: 1/4-Inch SONY Super HAD Color CCD Lens: 4-88mm Zoom: 22X Optical Zoom and 10X Digital Zoom Dome Movement: Pan: 0 degree ~ 360 degree (Endless), Tilt: Auto Flip 180 degree IR (Night Vision) Distance: Visible up to 260 (80m)

Posted in Security, Tech Tips | Tagged , | Leave a comment Blacklist

Recently I was checking out the Better WP Security plugin for WordPress and noticed that the plugin comes with a cool blacklist of useragents from (btw that website seems to have a lot of great info on fixing hacked wordpress sites). Anyhow I found that after installing the plugin my .htaccess file was updated and included a new section to block malicious IPs and user agents. The list looks like this:

Posted in Security, Server Admin, Tech Tips, Web Development | Tagged , | Leave a comment

Windows XP Cisco VPN Client Latest Version

If you’re wondering what the latest Version of the Cisco VPN Client for Windows XP, you’ve come to the right place. You may want to heed notice from Cisco that this product is no longer supported… But, according to the information I have found, the final version of the Cisco VPN client software for Windows XP was “” and the installation file was: vpnclient-win-msi-

Posted in Security, Software, Tech Tips | Tagged , , | Leave a comment

AWS re: Invent Day 1 Highlights & Announcements

Greetings from Las Vegas, host city for AWS re: Invent! AWS Senior Vice President Andy Jassy kicked off AWS re: Invent with a rousing 90 minute keynote presentation in front of 6,000 attendees, with another 13,000 watching the live stream. Andy’s talk covered a lot of ground! Starting with the history and growth of AWS over the last 6.5 years, he talked about important AWS use cases including web site hosting, gaming, social media, high performance computing (HPC), media distribution and streaming, disaster recovery, and more. He noted that AWS has hundreds of thousands of customers in 190 countries. This includes over 300 government agencies and 1500 educational institutions. Andy also used this opportunity to reveal some updated statistics on the growth of AWS – over 1.3 trillion objects in Amazon S3 (accessed at a rate of over 835,000 requests per second) and 3.7 million Hadoop clusters launched on Elastic MapReduce in the past two years. During the keynote we also announced Amazon Redshift, our new data warehouse product and an Amazon S3 price reduction, drawing applause from the live audience and a similarly appreciative reaction online. Amazon Redshift Amazon Redshift is a fast and powerful, fully managed, petabyte-scale data warehouse service in the cloud. Redshift offers you fast query performance when analyzing virtually any size data set using the same SQL-based tools and business intelligence applications you use today. With a few clicks in the AWS Management Console, you can launch a Redshift cluster, starting with a few hundred … Continue reading

Posted in Marketing, Security, Server Admin, Web Development | Tagged , , | Leave a comment

Martha Sawyers Comments

“Martha Sawyers” has been posting posting spam comments on my blog. The comments are the usual spam kind, talking about how great a post is or that it renders weird in a particular browser, or that she would love to see more written on the topic. Here are a few examples: I don’t even know the way I ended up right here, but I believed this submit was once great. I don’t recognize who you might be however definitely you’re going to a famous blogger when you are not already. Cheers! And another: Woah this weblog is magnificent i like studying your posts. Stay up the great paintings! You realize, many persons are looking around for this information, you could help them greatly. and finally: obviously like your web-site however you need to test the spelling on quite a few of your posts. Many of them are rife with spelling problems and I in finding it very troublesome to tell the truth then again I will definitely come back again. Did you get some similar spam comments from Martha Sawyers? Leave a note below!

Posted in Marketing, Security | Tagged | Leave a comment

Google’s I’m Feeling Lucky Search is Broken

Google’s I’m Feeling Lucky Search is Broken… at least if you’re using some type of browser shortcut for it. I had a custom search set up in Firefox and Chrome to allow me to “lucky search” any keyword and jump to the result. Now Google is checking the referrer for lucky searches and it will take you to a results page unless you do the lucky search from the Google Website. One small note: It still seems to work for queries without a space in them. Try replacing your spaces with underscores or just searching for a single word. Is this affecting you? Do you have a solution? Leave a comment below.

Posted in Security, Tech Tips, Web Development | Tagged | Leave a comment

Yahoo Logout URL

You can easily log out of Yahoo Mail, and the entire Yahoo Network with this URL. You can bookmark it or simply type it into your browser. The URL to log out of Yahoo is: Of course Yahoo won’t even let you logout without showing you at least one ad.

Posted in Security, Tech Tips | Tagged , | Leave a comment

Yahoo Authorized Applications

To control which applications have access to your Yahoo account, first sign in at After that you can choose Manage Apps and Website Connections under Sign-In and Security: Once you’ve clicked Manage Apps and Website Connections you should see a page that lists your authorized applications: When you first allow access to an application, Yahoo should send you an e-mail that says something like: Hello, You agreed to share your Yahoo! information with Macworld. You can manage who sees your activities on Macworld. If you did not agree to share your information, stop sharing. Regards, Yahoo! Account Services If the first link doesn’t work for you, you can also try this one:

Posted in Security, Tech Tips | Tagged , | Leave a comment