Entradas

Mostrando entradas de abril, 2016

How Embedding PDF files in Moodle

Imagen
Sample code to embed PDF content inside your Moodle page is: There are other ways of embedding PDF files on the Net, but I found that this method ( outlined here ) works for me. Armed with this knowledge, I proceeded to create a book resource (Moodle 1.9) where each link was a embedded PDF file. It’s a very nice layout (see below for a screen shot of an embedded PDF using embedding! <center><embed width="800" height="600" src="http://scm.moodleace.com/file.php/7/download/SM1007_SEPT_2011_Coursework_Assignment.pdf#toolbar=1&navpanes=1&scrollbar=1" quality="low" /></center>

Blocking YouTube Videos con Squid

Imagen
Squid Configuration File Add this to squid.conf before the part where you allow people access to the Internet.  As of Feb 2014 Google are using one subdomain of youtube.com for authenticating  all  google services, including Docs and Gmail. If you were intending to block only YouTube access this needs to be whitelisted from the denial. ## The videos come from several domains acl youtube_domains dstdomain .youtube.com .googlevideo.com .ytimg.com ## G* services authentication domain acl gLogin dstdomain accounts.youtube.com http_access deny youtube_domains !gLogin Other sites than YouTube also host this kind of content. See the Flash Video section of  ConfigExamples/Streams/Other  for general flash media patterns withut needing to block specific websites. To block not all YT, but some clips, use focused acl rule: # Block YT clips acl yt_clips url_regex .youtube\.com\/watch\?v=lr_m3GW5Cws http_access deny yt_clips

How to prevent internal SPAM from your own domain on Exchange 2010

Thank to: http://www.packetland.net/ Have you ever seen plenty of spam mail in your inbox and noticed in the source FROM field that it's either your email address or some colleague’s email address, of your own domain and company as a sender? This can happen if one of your domain email addresses has been spoofed by a spammer and then used to flood your mail server with what it’s called internal spam. But how is this achieved? In Exchange Server 2010, the Accepted Domains section is where is stated on Exchange server which domains are valid to be used as source email addresses in order to push emails to the internet. But this means that an external user can connect to your company Exchange server and by providing any email address using your domain name will get accepted. That’s what the extensive Transport Permissions model in Exchange 2010 is there for, in order to prevent such spam to be delivered. By default all the Receive Connectors on Exchange 2010 have the ms-exch-sm

Change Local Administrator Password thru GPO

Imagen
You can script it This script will change your local Administrators passwords to the one you specify. (Note that you'll need to encrypt this one using Microsoft script encrypter if your users shouldn't be able to read it in clear text.)      Set  WshNetwork = WScript.CreateObject( "WScript.Network" ) strComputer =  "." Set  objUser = GetObject( "WinNT://"  & strComputer &  "/Administrator,user" ) objUser.SetPassword  "NEW.PASSWORD"   ' Enter new password between brackets objUser.SetInfo      Best way to use this script is  to run it using the  Startup script option in a Group Policy object , since these scripts run with the credentials of the Local System account. Start the Group Policy snap-in, expand  Computer Configuration , expand  Windows Settings , click  Scripts (Startup/Shutdown) , and then in the right pane, add a script.   To change to Local Administrator’s password for all machines assigned