T O P

Blocking Cryptolocker and Crypto Viruses in Office365

In Office365, you can setup a rule that blocks attachments with executable content… namely attachments that are EXE files OR things like zip files with EXE, bat, etc. content within. This is something Google Apps automatically does, but Exchange / Office365 does not and requires manual intervention.

To do this, you have to go into the Exchange Admin Center, go to Mail Flow, create a new rule, hit “more options”, and then use the following settings:

cryptoblock

Save it and you’re golden!

 

Adding Registry Entries With Powershell

Working at an MSP, I’ve been trying to script a lot of the repetitious tasks I have to do with Powershell. One of the smaller ones is hiding a local admin account on non domain computers.

Usually, I would have to navigate into the registry to HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon and create a new key, called SpecialAccounts, and then another new key called UserList and then add a new dword value with the name of the account. That’s a lot of work!

Today, I fired up Google and Powershell ISE and came up with this simple, simple script:

New-Item -Path “HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon” -Name SpecialAccounts –Force
New-Item -Path “HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts” -Name UserList –Force
New-ItemProperty “HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList” -Name “[LOCAL ACCOUNT NAME]” -Value 1 -PropertyType “DWord”

Saved it as a PS1 script file and ran it on my computer successfully.

 

Securely Transmitting Passwords

I’ve been doing a lot of research recently on secure methods of password sharing. Being in IT, I have to share many passwords each day and also have passwords shared with me by clients.

My favorite so far is ZeroBin. It is no-frills, open source (so anyone can vet it), and fairly simple. It requires no database and doesn’t store any information in a database. It is as simple as downloading the components, throwing it on a web server and going to the index page. That’s it. I did it on my server here and have been using it personally with no issues.

You can set messages / data to delete after a certain amount of time, like 5 or 10 minutes, or longer… 10 – 30 days.

How is this secure?

  • The text or data is encrypted & compressed inside the browser, then sent to the server already encrypted
  • The server has the encrypted data and that is all
  • The text is encrypted inside the browser. The encrypted data is sent to the server, while the encryption key does not get sent. Therefore even if a server was compromised, nothing could be done with the data
  • The encryption key is part of the URL and that is what unlocks the data

Diagram below

zerobin

TBT – Throwback Technology

In today’s issue of Throwback Technology, we have a mobile phone from 1916, on a World War 1 battlefield. It has been 99 years since this photograph was taken.

A German field telephone station in the Aisne department of northern France during World War I, circa 1916. (Photo by Paul Thompson/FPG/Hulton Archive/Getty Images)
A German field telephone station in the Aisne department of northern France during World War I, circa 1916. (Photo by Paul Thompson/FPG/Hulton Archive/Getty Images)

Outlook 2016 Attachment Tweaks

I’ve been using the beta build of Office 2016 and one of the nice new features that I’ve been getting use out of is the “Attach File” button. Before, you were prompted for a folder and file when clicking this button. In Outlook 2016, you are shown recent documents that you have saved. So if you work on Doc21.docx, save it, then go into Outlook and click ‘Attach File’… that file is the first one listed without needing to navigate around folders and finding your file! Nifty little feature. Screenshot below:

 

Outlook2016Attach