Tag Archives: 2019

For Sale – Corsair HS60 Surround headset, Carbon/white, boxed as new

Bought these late August 2019 from Amazon but don’t find them that comfortable as I wear glasses. Balance of 2 year warranty – happy to help out in any future claim, although I’ve no idea how practical that would be.

Corsair HS60 Stereo gaming headset with 7.1 surround sound USB dongle
Carbon/white
Perfect, as new working condition – under 10 hours use
Boxed with all accessories inc detachable mic (unused), USB dongle and manual/warranty booklets
Compatible with PC, Mac, PS4, XBOX, Switch and mobile devices
Precision-tuned 50mm audio drivers
Plush memory foam ear pads
CUE software compatible
Have been fully cleaned with anti bacterial wipes etc

Ideally you will collect but can post at additional cost

Go to Original Article
Author:

For Sale – @@ price reduced @@ 2019 MacBook Pro 13 Space Grey – 256 ssd + warranty

Just do a search on Completed Listings on 2019 256 GB, filter with pre-owned and sort by “End Date Recent First”. it’s easily verified.
**Edit** I assume you’re on a sellers promotion with eBay and consequently not facing their 10% fees, etc. So little point me making an offer on here on that basis.

Go to Original Article
Author:

Wanted – Macbook Pro 2019 or 2020 with 16GB RAM

Looking for a 2019 or 2020 Macbook Pro with 16GB of RAM. EDIT: Would consider 2018 too if higher spec.

Screen size, storage and any other spec is unimportant as long as it has that amount of memory.

Condition must be excellent, a low(ish) battery cycle count and must include original box and ideally proof of purchase.

£1400 is my absolute top end of budget, I can’t go any higher. Should be enough to cover any second hand base model with a RAM upgrade.

Can collect within a reasonable distance and pay via bank transfer. I’m a few miles north of Walsall/J7 M6.

Go to Original Article
Author:

Use a Windows Server 2019 domain controller or go to Azure?

Transcript – Use a Windows Server 2019 domain controller or go to Azure?

In this video, I will show you how to set up a domain controller in Windows Server 2019.

I’m logged into the Windows Server 2019 desktop. I’m going to go ahead and open Server Manager.

The process of setting up a domain controller is really similar to what you had in the previous Windows Server version.

Go up to Manage and select Add roles and features. This launches the wizard.

Click Next to bypass the Before you begin screen. I’m taken to the Installation type menu. I’m prompted to choose Role-based or feature-based installation or Remote Desktop Services installation. Choose the role-based or feature-based installation option and click Next.

I’m prompted to select my server from the pool. There’s only one server in here. This is the server that will become my domain controller. One thing I want to point out is to look at the operating system. This is Windows Server 2019 Datacenter edition; in a few minutes, you’ll see why I’m pointing this out. Click Next.

At the Server Roles menu, there are two roles that I want to install: Active Directory Domain Services and the DNS roles. Select the checkbox for Active Directory Domain Services. When I select that checkbox, I’m prompted to add some additional features. I’ll go ahead and select the Add Features button.

I’m also going to select the DNS Server checkbox and, once again, click on Add Features. Click Next.

Click Next on the Features menu. Click Next again on the AD DS menu. Click Next on the DNS menu.

I’m taken to the confirmation screen. It’s a good idea to take a moment and just review everything to make sure that it appears correct. Click Install. After a few minutes, the installation completes.

I should point out that the server was provisioned ahead of time with a static IP address. If you don’t do that, then you’re going to get a warning message during the installation wizard. Click Close.

The next thing that we need to do is to configure this to act as a domain controller. Click on the notifications icon. You can see there is a post-deployment configuration task that’s required. In this case, we need to promote the server to domain controller. Do that by clicking on the link, which opens Active Directory Domain Services configuration wizard.

I’m going to create a new forest, so I’ll click the Add a new forest button. I’m going to call this forest poseylab.com and click Next.

On the domain controller options screen, you’ll notice that the forest functional level is set to Windows Server 2016. There is no Windows Server 2019 option — at least, not yet. That’s the reason that I pointed out earlier that we are indeed running on Windows Server 2019. Leave this set to Windows Server 2016. Leave the default selections on the domain controller capabilities. I need to enter and confirm a password, so I’ll do that and click Next.

Click Next again on the DNS options screen.

The NetBIOS domain name is populated automatically. Click Next.

Go with the default paths for AD DS database, logs and SYSVOL. Click Next.

Everything on the Review options screen appears to be correct, so click Next.

Windows will do a prerequisites check. We have a couple of warnings, but all the prerequisite checks completed successfully, so we can go ahead and promote the server to a domain controller. Click Install to begin the installation process.

After a few minutes, the Active Directory Domain Services and the DNS roles are configured. Both are listed in Server Manager.

Let’s go ahead and switch over to a Windows 10 machine and make sure that we can connect that machine to the domain. Click on the Start button and go to Settings, then go to Accounts. I’ll click on Access work or school then Connect. I’ll choose the option Join this device to a local Active Directory domain. I’m prompted for the domain name, which is poseylab.com. Click Next.

I’m prompted for the administrative name and password. I’m prompted to choose my account type and account name. Click Next and Restart now.

Once the machine restarts, I’m prompted to log into the domain. That’s how you set up an Active Directory domain controller in Windows Server 2019.

+ Show Transcript

Go to Original Article
Author:

For Sale – Razer Core/Vega 64/MacMini (2018)

For Sale : Complete Desktop Setup

Razer Core X : Bought in Feb 2019 : £230 (The main fans to cool have been upgraded to Noctura one but I have the originals to supply)

Vega 64 Red Devil : Bought from eBay in Feb 2019 : £220 (price determined from last eBay prices)

Mac Mini : Bought from Apple UK in Jan 2019 : £2500 (spec below : memory was bought from apple)

It was bought with the following spec

PROCESSOR 3.2GHz 6-core Core i7
MEMORY 64GB 2666MHz DDR4
STORAGE 1TB SSD
GRAPHICS Intel UHD Graphics 630
ETHERNET ADAPTER 10GB Ethernet Port
Cost New £3139

I may consider a discount based on all parts being sold together. For the Core and GPU I will be wanting to ensure both parts sell at the same time so if you only want one you will need to wait till the other one sells.

All items are boxed like new, all original packing materials have been retained.

Go to Original Article
Author:

Lighten up and install Exchange 2019 on Windows Server Core

One of the biggest changes in Exchange Server 2019 from previous versions of the messaging platform is Microsoft supports — and recommends — deployments on Server Core.

For those who are comfortable with this deployment model, the option to install Exchange 2019 on a server without a GUI is a great advance. You can still manage the system with the Exchange Admin Console from another computer, so you really don’t lose anything when you install Exchange this way. The upside to installing Exchange on a Server Core machine is a smaller attack surface with less resource overhead. For some IT shops, because Server Core has no GUI, it can present a challenge when troubleshooting issues.

This tutorial will explain how to install Exchange 2019 on Server Core in a lab environment instead of a production setting. The following instructions will work the same for either setting, but users new to Server Core should practice a few deployments in a lab before trying the deployment for real.

Getting started

For the sake of brevity, this tutorial does not cover the aspects related to the installation of the Server Core operating system — it is identical to other Windows Server build processes — and the standard Exchange Server sizing exercises and overall deployment planning.

After installing a new Server Core 2019 build, you see the logon screen in Figure 1.

Server Core logon screen
Figure 1. Instead of the usual Desktop Experience in the full Windows Server installation, the Server Core deployment shows a simple black logon screen.

Most of the setup work on the server will come from PowerShell. After logging in, load PowerShell with the following command:

Start PowerShell

Next, this server needs an IP address. To check the current configuration, use the following command:

Get-NetIPAddress

This generates the server’s IP address configuration for all its network interfaces.

IP address configuration
Figure 2. Use the Get-NetIPAddress cmdlet to see information about the network interfaces on the server.

Your deployment will have different information, so select an interface and use the New-NetIPAddress cmdlet to configure it. Your command should look something to the following:

New-NetIPAddress -InterfaceIndex {Number} -IPAddress {IP Address} -PrefixLength {Subnet mask length} -DefaultGateway {IP Address}

After setting up the network, change the computer name and join it to the domain:

Add-Computer -DomainName {Domain} -NewName {Server} -DomainCredential {Admin account}

Next, install the prerequisites for Exchange 2019. The following cmdlet adds the Window features we need:

Install-WindowsFeature Server-Media-Foundation, RSAT-ADDS

You can use the Exchange install wizard to add the other required Windows components or you can use the following PowerShell command to handle it:

Install-WindowsFeature Server-Media-Foundation, NET-Framework-45-Features, RPC-over-HTTP-proxy, RSAT-Clustering, RSAT-Clustering-CmdInterface, RSAT-Clustering-PowerShell, WAS-Process-Model, Web-Asp-Net45, Web-Basic-Auth, Web-Client-Auth, Web-Digest-Auth, Web-Dir-Browsing, Web-Dyn-Compression, Web-Http-Errors, Web-Http-Logging, Web-Http-Redirect, Web-Http-Tracing, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Metabase, Web-Mgmt-Service, Web-Net-Ext45, Web-Request-Monitor, Web-Server, Web-Stat-Compression, Web-Static-Content, Web-Windows-Auth, Web-WMI, RSAT-ADDS

Prepare to install Exchange 2019

The next step is to download Exchange Server 2019 and the required prerequisites to get the platform running. Be sure to check Microsoft’s prerequisites for Exchange 2019 mailbox servers on Windows Server 2019 Core from this link because they have a tendency to change over time. The Server Core 2019 deployment needs the following software installed from the Microsoft link:

  • .NET Framework 4.8 or later
  • Visual C++ Redistributable Package for Visual Studio 2012
  • Visual C++ Redistributable Package for Visual Studio 2013

Next, run the following PowerShell command to install the Media Foundation:

Install-WindowsFeature Server-Media-Foundation

Lastly, install the Unified Communications Managed API 4.0 from the following link.

To complete the installation process, reboot the server with the following command:

Restart-Computer -Force

Installing Exchange Server 2019

To proceed to the Exchange 2019 installation, download the ISO and mount the image:

Mount-DiskImage c:<FolderPath>ExchangeServer2019-x64.iso

Navigate to the mounted drive and start the Exchange setup with the following command:

.Setup.exe /m:install /roles:m /IAcceptExchangeServerLicenseTerms
Exchange Server 2019 installation
Figure 3. Mount the Exchange Server 2019 ISO as a drive, then start the unattended setup to start the installation.

The installation should complete with Exchange Server 2019 operating on Windows Server Core.

Managing Exchange Server 2019 on Server Core

Once you complete the installation and reboot the server, you’ll find the same logon screen as displayed in Figure 1.

This can be somewhat discomforting for an administrator who spent their whole career working with the standard Windows GUI interface. There isn’t much you can do to manage your Exchange Server from the command prompt.

Your first management option is to use PowerShell locally on this server. From the command prompt, enter:

Start PowerShell

From the PowerShell window, enter the command:

Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapIn

You need to run this command each time to use PowerShell on the headless Exchange Server when you want to run the Exchange Management Shell. To streamline this process, you can add that cmdlet to your PowerShell profile so that the Exchange Management snap-in loads automatically when you start PowerShell on that server. To find the location of your PowerShell profile, just type $Profile in PowerShell. That file may not exist if you’ve never created it; to do this, open Notepad.exe and create a file with the name $Profile and enter that previous Add-PSSnapin command.

The more reasonable management option for your headless Exchange Server is to never log into the server locally. You can run the Exchange Admin Center from a workstation to remotely manage the Exchange 2019 deployment.

Go to Original Article
Author:

For Sale – 2 x 32GB SODIMM / Intel NUC8i5BEK3

SODIMM’s kit is CMSX64GX4M2A2666C18 purchased middle of 2019 – £275.

Intel NUC8i5BEK3 purchased January 2019 – £300 (no storage or memory).

Both have been used as a ESXi lab server.

Location
Glastonbury
Price and currency
£275 / £300
Delivery cost included
Delivery is NOT included
Prefer goods collected?
I have no preference
Advertised elsewhere?
Advertised elsewhere
Payment method
Paypal / BT

Last edited:

Go to Original Article
Author:

For Sale – ROG Rapture GT-AX11000 router

Selling this gaming router due to change of circumstances.. Was brought in July 2019 from Very.. Opened up over the weekend to set it up forgotten I had it to be honest was due to have my front room Extended why the delay is setting it up.. but loft is now getting done first so item has not even been turned on yet took pics and put back in box. Had a little. Accident with one the anttanas must of been lose wire has come out and little clip will need gluing. Price adjusted for the antanna

Go to Original Article
Author:

Intel CSME flaw deemed ‘unfixable’ by Positive Technologies

An underlying flaw in Intel chipsets, which was originally disclosed in May of 2019, was recently discovered by Positive Technologies to be far worse than previously reported.

Researchers from the vulnerability management vendor discovered a bug in the read-only memory of the Intel Converged Security and Management Engine (CSME) could allow threat actors to compromise platform encryption keys and steal sensitive information. The Intel CSME vulnerability, known as CVE-2019-0090, is present in both the hardware and the firmware of the boot ROM and affects all chips other than Intel’s 10th-generation “Ice Point” processors.

“We started researching the Intel CSME IOMMU [input-output memory management unit] in 2018,” Mark Ermolov, lead specialist of OS and hardware security at Positive Technologies, said via email. “We’ve been interested in that topic especially because we’ve known that Intel CSME shares its static operative memory with the host (main CPU) on some platforms. Studying the IOMMU mechanisms, we were very surprised that two main mechanisms of CSME and IOMMU are turned off by default. Next, we started researching Intel CSME boot ROM’s firmware to ascertain when CSME turns on the IOMMU mechanists and we found that there is a very big bug: the IOMMU is activated too late after x86 paging structures were created and initialized, a problem we found in October.”

The bug, which Positive calls “unfixable,” can be found in most Intel chipsets released in the last five years, according to Positive Technologies. 

“Intel CSME is responsible for initial authentication of Intel-based systems by loading and verifying all other firmware for modern problems,” Ermolov said. “It is the cryptographic basis for hardware security technologies developed by Intel and used everywhere, such as DRM, fTPM [firmware Trusted Platform Module] and Intel Identity protection. The main concern is that, because this vulnerability allows a compromise at the hardware level, it destroys the chain of trust for the platform as a whole.”

Although Intel has issued patches and mitigations that complicate the attack, Positive Technologies said fully patching the flaw is impossible because firmware updates can’t fully address all of the vectors.

“In the CVE-2019-0090 patch, Intel blocked ISH [Integrated Sensors Hub], so now it can’t issue DMA transactions to CSME. But we’re convinced there are other exploitation vectors and they will be found soon. To exploit a system that has not patched for CVE-2019-0090, an attacker doesn’t need to be very sophisticated,” Ermolov said.

In addition, Positive Technologies said extracting the chipset key is impossible to detect.

“The chipset key being leaked can’t be detected by CSME or by the main OS,” Ermolov said. “You’re already in danger, but you don’t know it. The attack (by DMA) also doesn’t leave any footprint. When an attacker uses the key to compromise the machine’s identity, this might be detected by you and you only, but only after it’s happened when it is too late.”

Once they’ve breached the system, threat actors can exploit this vulnerability in several ways, according to Positive Technologies.

“With the chipset key, attackers can pass off an attacker computer as the victims’ computer. They can gain remote certification into companies to access digital content usually under license (such as videos or films from companies like Netflix),” the company said via email. “They can steal temporary passwords to embezzle money. They can pose as a legitimate point-of-sale payment terminal to charge funds to their own accounts. Abusing this vulnerability, criminals can even spy on companies for industrial espionage or steal sensitive data from customers.”

Positive Technologies recommended disabling Intel CSME-based encryption or completely replacing CPUs with the latest generation of Intel chips.

This is the second vulnerability disclosed regarding Intel chips since January, when computer science researchers discovered a speculative execution attack that leaks data from an assortment of Intel processors released before the fourth quarter of 2018.

Go to Original Article
Author:

For Sale – Razer Blade Stealth Early 2019 16Gb /256Gb SSD / MX150

Selling my Razer Blade Stealth Early 2019 MX150 version with 16Gb RAM and 256Gb SSD.
Totally and truly immaculate condition and only used like a dozen times properly. Never left the house.

Comes complete with box and all accessories even the USB C is unused. Also including the original shipping packaging which i will use to ship out
Brought directly from Razer UK in late June 2019 and will have warranty until then. Will put the laptop back to factory.

Will send using Royal Mail Special insured to the value. Can chuck in a basic case that i purchased with it , albeit it is slightly too big for this slim laptop.

Will post pictures of the unit when i get home.

Any questions , let me know.

Looking for £900 inclusive of Royal Mail delivery method mentioned above. Or if your local , i will personally deliver it to you.

Thanks for looking.

Go to Original Article
Author: