Tag Archives: with

For Sale – Microsoft Surface Pro 4 i5/256gb

For sale is my Surface Pro 4. It is the i5/8gb/256gb model. Comes with Red keyboard as pictured and original box, but no pen included.

It is in full working order and good condition. Has wear and tear scratches/marks on the back and around the bezel but the screen is near perfect with no scratches or marks at all.

The keyboard is in very good condition with very little signs of use. Mainly because I only use this device for work when on client sites. Which has been around a total of 4 weeks in the last 9 months. This was a new keyboard I purchased around the end of Feb.

I need this gone asap, so open to reasonable offers.

Price and currency: 600
Delivery:
Delivery cost is included within my country
Payment method: BT
Location: Slough
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Wanted – Original Apple 85W MagSafe 2 Power Adaptor and Cord

Hi

To work with my MacBook Pro Retina 2013, last lightly used one sold for £35.00 inc slow postage so looking for similar

Thanks

Location: Lancashire

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – lenovo x220 core i5 vpro ips screen with ultrabase 3 Reduced 180

Selling my old trusted x220 with core i5 vPro and 8gb ram.
300gb 7200rpm harddrive and this comes with IPS screen.

Also comes with ultrabase 3 where you can just dock the machine and connect to monitor. Also has additional vga port ,usb ports 4 , Ethernet port and DVD player on base dock.
Comes with 2 lenovo power adapters.
Windows 10 pro installed. Overall good condition few scratches on top. Pictures attached.

Looking for 200 and available for collection in Kent or London. Now reduced to 180.

Let me know if you need any details. Pictures on next screen.

Price and currency: 200
Delivery: Goods must be exchanged in person
Payment method: BACS
Location: London
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – HP Proliant ML110 G6 – Xeon X3430 2.40 GHz – 12GB RAM

Hi there folks,

Need to part ways with my solid HP Proliant ML110 G6 server which I have used to brush up on my VMware skills. I have reached a point where I don’t need this box anymore. Will be shipped with a 250GB OS hardrive and a additional 1TB storage disk. I have installed Windows 7 Ultimate on it to confirm what type of hardware is installed etc. You will require your own serial to activate it.

Main Spec:

  • Intel® Xeon® X3430 (2.40GHz/4-core/8MB/95W, 1333, Turbo 1/1/2/3) Processor
  • 12GB RAM
  • 250GB HDD
  • 1TB HDD for storage

If you need full spec please click on the following link. I have included some pics below if you need any more detailed info please let me know.

Price and currency: 170
Delivery: Delivery cost is included within my country
Payment method: BT or PPG
Location: Reading
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

For Sale – Corsair 16GB DDR4 Vengeance LPX 3000MHz – NEW SEALED

Brand new still sealed, spare set as using a 2666 16GB Kit with Ryzen instead. Cash on Collection or can post track and signed by Royal Mail with payment via PayPal or Bank Transfer.

16GB (2x8GB)
PC4-24000 (3000)
Non-ECC Unbuffered
CAS 15-17-17-35
XMP 2.0
1.35V

Price and currency: £150
Delivery: Delivery cost is included within my country
Payment method: Cash on Collection, Bank Transfer or PayPal
Location: Manchester
Advertised elsewhere?: Advertised elsewhere
Prefer goods collected?: I have no preference

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

Skype Interviews Scheduler—helping recruiters simplify the interview process | Skype Blogs

Scheduling job interviews with multiple interviewers and candidates can be a complicated and time-consuming task, one that can easily account for a significant portion of a recruiter’s workload. Today, a new integrated scheduling app—built on the Skype Interviews platform—significantly streamlines the interview scheduling process.

Introducing Skype Interviews Scheduler, designed to simplify the process of scheduling interviews—as well as reduce the number of steps required to send an invite. With an embedded interview link, candidates can launch an interview directly from their calendar. In addition, Skype Interviews Scheduler can also become an integrated part of your recruitment workflows via APIs.

The power of Skype Interviews Scheduler

Scheduler is easy to use—making it a powerful tool for recruiters. Simply sign in to Scheduler, click Schedule new Interview, and then select the type of interview that is being scheduled.

Next, input the candidate and interviewer’s name and email address, and either enter an agreed-upon time and date for the interview, or select the Smart Scheduler—which will arrange the interviewer and candidate’s interview.

Once available time slots are selected, Scheduler sends a notification to the candidate to accept or decline.

After the candidate selects a timeslot, each participant is automatically sent a calendar invite, which they can click to join the interview directly from the email. No download or Skype ID is required to join. From the Skype Interviews dashboard, recruiters can see what times candidates have selected and make further amendments to interviews if needed.

Make Skype Interviews Scheduler part of your recruitment workflow

We are looking for platform partners who want to integrate the Skype Interviews Scheduler functionality within their platform, dramatically streamlining the scheduling process for recruiters, coordinators, interviewers, and candidates alike. Your input will help shape the future of Skype Interviews. Sign up for early access to our developer API now.

Visit the Skype Interviews website to learn more and try it today.

For Sale – Lenovo AIO Y910 all-in-one gaming PC – 144hz monitor

Hello,

For sale, an as-new Lenovo AIO Y910, with GTX1070. Full specs:

  • Intel Core i5-6400 Processor ( 2.70GHz 2133MHz 6MB )
  • Operating SystemWindows 10 Home 64
  • Display Type27″QHD 2560 x 1440
  • Memory16.0GB PC4-17000 DDR4 2133MHz (2 x 8.0GB)
  • Hard Drive128GB SSD PCIe+2TB 7200 rpm
  • Optical DriveDVD-RW
  • WarrantyOne year Depot or Carry-in
  • GraphicsNVIDIA GeForce GTX 1070 8GB GDDR5

I bought this on an impulse back in September, when Lenovo had a sale on them, and I just haven’t found the time to play with it. I was away for the better part of October, and I’m going to be away for several months next year, and I just can’t justify keeping it sat in my spare room. It’s had very little use, the monitor has been covered (no scratches and little dust) the whole time I’ve had it, and still has the plastic on the bezel. The peripherals (keyboard etc) it came with are still in their original seals.

A word of warning – these AIOs get pretty hot. In the tests I did with it, it sat at about 80c during benchmarking, or upper 70s when I removed the back panel (which is perfectly safe to do). This was during the hot spell we were having in September. Might be better now, but do keep that in mind. It seems to be par for the course with these AIOs. If you’re not sure, do a bit of reading on them before you commit, so you’re aware of the trade-offs vs a well-built desktop pc.

Otherwise, it’s a pretty special machine. Fabulous 27″, 1440p, 144hz monitor. Everything can be upgraded, though it’s so tightly packed I wouldn’t fancy trying to take out the graphics card myself. Though you could in theory upgrade it to a 1080 if you wanted to. I know someone who bought one and has done just that.

I’m looking for £960 collected. RRP is £2000 and going rate on ebay seems to be £1200-1500. I paid £960 from the Lenovo store and will provide the receipts etc in case there is a warranty (I’ll need to check)

I’d rather not take any offers – I’ve been umming and ahhing over whether to keep it these past two months, and will just do that if I can’t sell at asking.

I can’t do delivery. It’ll be carefully packed in the original packaging for collection, but I wouldn’t trust it with a courier. Collection only in person. I’m in Barnet, North London.

Any questions please ask.

Price and currency: 960
Delivery: Goods must be exchanged in person
Payment method: Cash on collection
Location: Barnet, N. London
Advertised elsewhere?: Not advertised elsewhere
Prefer goods collected?: I prefer the goods to be collected

______________________________________________________
This message is automatically inserted in all classifieds forum threads.
By replying to this thread you agree to abide by the trading rules detailed here.
Please be advised, all buyers and sellers should satisfy themselves that the other party is genuine by providing the following via private conversation to each other after negotiations are complete and prior to dispatching goods and making payment:

  • Landline telephone number. Make a call to check out the area code and number are correct, too
  • Name and address including postcode
  • Valid e-mail address

DO NOT proceed with a deal until you are completely satisfied with all details being correct. It’s in your best interest to check out these details yourself.

December Patch Tuesday closes year on a relatively calm note

Administrators were greeted with a subdued December Patch Tuesday, a quiet end to what had been a somewhat tumultuous year early in 2017.

Of the 32 unique Common Vulnerabilities and Exposures (CVEs) that Microsoft addressed, just three patches were directly related to Windows operating systems. While not a critical exploit, the patch for CVE-2017-11885, which affects Windows client and server operating systems, is where administrators should focus their attention.

The patch is for a Remote Procedure Call (RPC) vulnerability for machines with the Routing and Remote Access service (RRAS) enabled. RRAS is a Windows service that allows remote workers to use a virtual private network to access internal network resources, such as files and printers.

“Anyone who has RRAS enabled is going to want to deploy the patch and check other assets to make sure RRAS is not enabled on any devices that don’t use it actively to prevent the exploitation,” said Gill Langston, director of product management at Qualys Inc., based in Redwood City, Calif.

The attacker triggers the exploit by running a specially crafted application against a Windows machine with RRAS enabled.

“Once the bad actor is on the endpoint, they can then install applications and run code,” Langston said. “They establish a foothold in the network, then see where they can spread. The more machines you have under your control, the more ability you have to move laterally within the organization.”

In addition, desktop administrators should roll out updates promptly to apply 19 critical fixes that affect the Internet Explorer and Edge browsers, Langston said.

“The big focus should be on browsers because of the scripting engine updates Microsoft seems to release every month,” he said. “These are all remote-code execution type vulnerabilities, so they’re all critical. That’s obviously a concern because that’s what people are using for browsing.”

Fix released for Windows Malware Protection Engine flaw

On Dec. 6, Microsoft sent out an update to affected Windows systems for a Windows Malware Protection Engine vulnerability (CVE-2017-11937). This emergency repair closed a security hole in Microsoft’s antimalware application, affecting systems on Windows 7, 8.1 and 10, and Windows Server 2016. Microsoft added this correction to the December Patch Tuesday updates.

“The fix happened behind the scenes … but it was recommended [for] administrators using any version of the Malware Protection Engine that it’s set to automatically update definitions and verify that they’re on version 1.1.14405.2, which is not vulnerable to the issue,” Langston said.

OSes that lack the update are susceptible to a remote-code execution exploit if the Windows Malware Protection Engine scanned a specially crafted file, which would give the attacker a range of access to the system. That includes the ability to view and delete data, and create a new account with full user rights.

Other affected Microsoft products include Exchange Server 2013 and 2016, Microsoft Forefront Endpoint Protection, Microsoft Security Essentials, Windows Defender and Windows Intune Endpoint Protection.

“Microsoft uses the Forefront engine to scan incoming email on Exchange 2013 and Exchange 2016, so they were part of this issue,” Langston said.

Lessons learned from WannaCry

Microsoft in May surprised many in IT when the company released patches for unsupported Windows XP and Windows Server 2003 systems to stem the tide of WannaCry ransomware attacks. Microsoft had closed this exploit for supported Windows systems in March, but it took the unusual step of releasing updates for OSes that had reached end of life.

Many of the Windows malware threats from early 2017 spawned from exploits found in the Server Message Block (SMB) protocol, which is used to share files on the network. The fact that approximately 400,000 machines got bit by the ransomware bug showed how difficult it is for IT to keep up with patching demands.

“WannaCry woke people back up to how critical it is to focus on your patch cycles,” Langston said.

More than three months elapsed between the time Microsoft first patched the SMB vulnerability in March that WannaCry exploited and when the Petya ransomware — which used the same SMB exploit — continued to compromise people. Some administrators might be lulled into a false sense of security from the cumulative update servicing model and delay the patching process, Langston said.

“They may delay because the next rollup will cover the updates they missed, but then that’s more time those machines are unprotected,” he said.

For more information about the remaining security bulletins for December Patch Tuesday, visit Microsoft’s Security Update Guide.

Tom Walat is the site editor for SearchWindowsServer. Write to him at twalat@techtarget.com or follow him @TomWalatTT on Twitter.

CloudBerry backups feature protection from ransomware

CloudBerry backups are hopping aboard the ransomware protection train, with the ability to detect encyrption changes along the way.

The latest update to CloudBerry’s flagship product, CloudBerry Backup, protects a customer’s file-level backups when it discovers ransomware. The product prevents existing CloudBerry backups from being overwritten until an administrator confirms if there is an issue.

Statistics show that ransomware attacks are still prevalent. Requested payment amounts to release encrypted files are also trending up.

“Customers are looking for any type of protection they can get,” said David Gugick, vice president of product management at CloudBerry Lab, which is based in New York City. “You don’t want ransomware to find your backup files.”

Some ransomware, though, is smart enough to encrypt backups. CloudBerry’s off-site cloud backup helps customers follow the 3-2-1 rule of backup, Gugick said. Organizations should have three copies of data on two different media, with one copy off site.

In addition, some ransomware is smart enough to exist on a user’s system without making its presence known right away.

When a customer enables ransomware protection in CloudBerry Backup 5.8, the vendor performs the initial backup and analyzes the bit structure of each file to determine if any files are encrypted. During subsequent backups, CloudBerry compares the original byte structure to the current byte structure, which enables the identification of newly encrypted files.

Customers are looking for any type of protection they can get.
David Gugickvice president of product management, CloudBerry

The customer’s backup plan continues, but CloudBerry prevents existing backups from deletion regardless of retention policies, according to the vendor. Customers can go back to a point in time before the attack and restore from protected CloudBerry backups.

Gugick cautioned that a ransomware protection strategy should be comprehensive and also include user education and security patches.

“Customers should not rely exclusively on backup and disaster recovery,” Gugick said. “This is just a piece of the protection puzzle.”

Waking up from the ransomware ‘nightmare’

Lori Hardtke, president of ByteWize Inc., which provides IT support for small businesses, said one of her clients got hit with a ransomware attack on a server earlier this year, before this new protection feature launched.

“It was the worst nightmare I ever went through,” Hardtke said.

However, the organization restored from CloudBerry backups and didn’t lose any data.

Hardtke recently downloaded the latest CloudBerry Backup software and engaged the ransomware feature, essentially by just checking a box. She welcomed the capability as “another layer of protection.”

Hardtke uses CloudBerry for file-level backups of Windows environments, primarily desktops. Her business, based in Scottsdale, Ariz., has roughly 50 clients across the United States. CloudBerry backs up 5.5 TB of data, mainly QuickBooks and standard documents, such as Word files and PDFs.

ByteWize uses Google Cloud Platform as the back end for its storage. CloudBerry does not provide storage; it only  handles backup and disaster recovery, which keeps costs low compared to its competition, Gugick said. The majority of customers use Amazon Web Services, but CloudBerry supports more than 30 cloud storage vendors, also including Google, Microsoft Azure, Backblaze B2, Oracle and Wasabi.

ByteWize switched to CloudBerry in September 2015 after about five years with Jungle Disk backup. Hardtke said she was looking for more innovation and less cost, and she found both with CloudBerry backups. She said she appreciates the steady flow of upgrades with significant enhancements.  

One enhancement Hardtke likes is the ability to do image-based backups. She said it would be helpful to retrieve files out of an image, like she can with Veeam Software, which she also uses to protect data.

CloudBerry's ransomware detection
CloudBerry Backup informs the user when it detects possible ransomware.

What else is new?

The ransomware protection is currently only designed for file-level backup, but Gugick said CloudBerry is planning support for images in a future release.

Other new features in CloudBerry Backup 5.8, which became generally available two weeks ago, include protection for Microsoft Hyper-V 2016 and support for VMware changed block tracking.

CloudBerry has two main backup offerings that support Windows, macOS and Linux. CloudBerry Backup for small businesses and consumers starts at $29.99 for the desktop edition and $119.99 for the server edition, and it features perpetual licenses. CloudBerry Managed Backup for managed service providers and larger businesses offers subscription licensing and starts at $5 per month, per server or desktop for file-level backup and $6 per month, per server or desktop for image-based backup.

CloudBerry backups protect more than 210 PB of data, Gugick said. The vendor claims about 43,000 CloudBerry Backup customers and 4,500 active CloudBerry Managed Backup customers.

Migrating local VM owner certificates for VMs with vTPM

Whenever I want to replace or reinstall a system which is used to run virtual machines with a virtual trusted platform module (vTPM), I’ve been facing a challenge: For hosts that are not part of a guarded fabric, the new system does need to be authorized to run the VM.
Some time ago, I wrote a blog post focused on running VMs with a vTPM on additional hosts, but the approach highlighted there does not solve everything when the original host is decommissioned. The VMs can be started on the new host, but without the original owner certificates, you cannot change the list of allowed guardians anymore.

This blog post shows a way to export the information needed from the source host and import it on a destination host. Please note that this technique only works for local mode and not for a host that is part of a guarded fabric. You can check whether your host runs in local mode by running Get-HgsClientConfiguration. The property Mode should list Local as a value.

Exporting the default owner from the source host

The following script exports the necessary information of the default owner (“UntrustedGuardian“) on a host that is configured using local mode. When running the script on the source host, two certificates are exported: a signing certificate and an encryption certificate.

Importing the UntrustedGuardian on the new host

On the destination host, the following snippet creates a new guardian using the certificates that have been exported in the previous step.

Please note that importing the “UntrustedGuardian” on the new host has to be done before creating new VMs with a vTPM on this host — otherwise a new guardian with the same name will already be present and the creation with the PowerShell snippet above will fail.

With these two steps, you should be able to migrate all the necessary bits to keep your VMs with vTPM running in your dev/test environment. This approach can also be used to back up your owner certificates, depending on how these certificates have been created.