It's been a while, but I'm back. I decided to tackle this month's Scripting Games puzzle, and I found that it's basically something I've previously written with some modifications. So, I used that, made the necessary tweaks to fit their guidelines, and made some improvements over what I'd done at the time (it was a couple of years ago, and I'd like to think I've gotten at least a little better since then...)
Read More
Have you ever been lied to by a user when you ask them if they tried rebooting their system before calling? Wouldn't it be simpler to just check it directly rather than have to rely on them being honest with you? Well, this little tool will help out with that. Give it a try and see what you think.
Read More
CryptoLocker is a nasty beast of a bug causing all manner of havoc. If it's done nothing else, one positive impact it has had on IT is that we're making sure our backups aren't being ignored.
One of the hardest parts still, though, is finding what got hit, and who got hit, and in a timely enough manner to minimize the damage done. Part of that problem is that there is no scanner that can definitively detect CryptoLocker encrypted files, specifically because they just look like any encrypted file; there is no virus fingerprint to be had.
So, how to scan for its fingerprints proactively? It seemed like a nearly impossible task (I'm no malware expert, so figuring out how to detect something like this isn't my forte). When I started digging in to the problem, though, I did learn a few key pieces to the puzzle.
Read More