Jared Heinrichs

  • Technology Blog
  • Winnipeg Computer Repair
  • Winnipeg Photographer
  • Cooking With Jared
You are here: Home / Blog

Aug 26, 2017 By Jared Heinrichs Leave a Comment

How to silently install Adobe Reader the correct way

Silent installation using the .exe is usually problematic in one fashion or another. However, unzip the .exe file for Reader with 7-Zip or a similar tool to get the .msi file.

  • Volume Distribution Registration: https://acrobat.adobe.com/us/en/products/pdf-reader/volume-distribution.html

Additionally, Adobe provides the Customization Tool which can be used to customize nearly every aspect of the installation and product settings, including accepting the EULA, disabling upsell (“Buy this tool now!”), and a silent installation with absolutely no UI. I’ve used it to customize my Reader DC installations for all computers on our network.

  • Customization Wizard XI: https://www.adobe.com/support/downloads/detail.jsp?ftpID=5515
  • Customization Wizard DC: https://www.adobe.com/support/downloads/detail.jsp?ftpID=5892%E2%80%8B

The Customization Wizard requires you to load the MSI file. Once loaded, you make your configuration changes and generate an MST (transformation) file.

Then, it can be installed with a single line command:

MSIEXEC /i C:\PathToMSI\Reader.msi /t C:\PathToMsiTransform\ReaderCustomization.mst /qn

This command can be then used in products like batchpatch and Microsoft MDT to easily install Adobe reader remotely!

Filed Under: Acrobat Reader

Aug 6, 2017 By Jared Heinrichs Leave a Comment

How to install “Damn Small Linux” in Virtual Box

The process for this is pretty straight forward. The website makes the install seem like it much harder than it should be.

I am going to assume you have Virtual Box already installed.

Files needed:

  1. Virtual Box
  2. Damn Small Linux (DSL) iso

These files are hosted on my MEGA account. You can get the files from the original sites but this post will use these items.

When you open Virtual box click “New” icon.

Name the VM. I am calling mine DSL-inside.

Change the size to: 2GB and click “create” button.

Select the new VM and click “Start“.

You will ask what you want to boot off of. Select the DSL iso file.

Hit enter to boot into the Live OS.

Click on Terminal.

You will now need to create 2 drives:

  1. hda1 – App 128MB Swap drive
  2. hda2 – DSL location 2Gb (83MB smallest)

Type these commands to open the partition manager.

sudo -s
cfdisk

This will open the partition manager. You will be asked to zero the HD table. Say “y“es.

You will need to select the free space and create a new partition. Use the left and right arrows to select “New“.

Will will need to make a primary partition

Select 128MB. This is the recommended size for the swap partition (HDA1).

You will need to create this partition at the beginning of the drive.

Select the remaining free space. using arrows select “New” to create the data partition (HDA2).

Will will need to make a primary partition

Use the default which should be the remaining space. (2018.97MB)

Make HDA2 bootable.

Finalize and write the partitions to the hard drive.

Confirm the writing to disk by typing “yes“.

Type these commands:

        sudo -s
        swapoff -a    swapoff is a critical step, make sure you do it.
        mkswap /dev/hda1
        swapon /dev/hda1  [If you get "device or resource busy" here, ignore it.]

Run the HD install by running this command:

sudo -u root dsl-hdinstall

Select HDA2 to install DSL to. Follow the rest of the prompts.

Proceed with Bootloader (y)es and tell DSL to use (G)rub.

You obviously don’t have windows install so say “n“o.

You will need to create a password for two users:

  1. root – Super User.
  2. dsl – Normal Linux user.

Filed Under: Damn Small Linux, Damn Small Linux

Jul 9, 2017 By Jared Heinrichs Leave a Comment

How to perform a basic setup of a Palo Alto Firewall

Welcome to the first of many posts about Palo Alto Firewalls. This post will go over using a physical Palo Alto Firewall.

The model I will be using is a PA-200 with a PAN-OS of 8. As long as you use the same OS the screenshots should look identical. Older versions of PAN-OS should be similar or the same.

Palo Alto Firewalls have two “Planes”. They have the Management Plane and the Data Plane. These concepts are important to understand when setting up the device.

  1. Management Plane – Is essentially tied to the Management Port. It will have it’s own IP address, DNS and Default Gateway. In order to update your firewall, you will need to make sure the Management Plane/Port is set up correctly. This post will go over these tasks
  2. Data Plan – The data plane is the area in which the data flows. Typically the External Port will have a default gateway as well. This post will not cover this.

I will be creating a LAB setup that will be a subset of an existing network. The purpose of this setup is to allow you to play and work with a Palo Alto firewall from the comforts of a working network.

The first thing you need to know when setting up a Palo Alto is that the device’s management port is set to the IP address of 192.168.1.1.

If you plan to plug this port into your existing network and your IP range is also in 192.168.1.1 you will need to change this IP address by plugging a computer directly into the Managment port rather then plugging the management port into your existing network infrastructure.

My network is not part of the 192.168.1.X network so I will plug my Palo Alto management port into a switch and make sure that the Palo Alto device and Computer are on the same VLAN/Physical Network.

I will change my IP address from it’s 192.168.101.x network address to 192.168.1.2 /24. Doing this will allow my machine to talk with the Palo Alto firewall.

  • Open your favorite browser (I find Chrom works the best) and go to https://192.168.1.1

You will be greeted with a warning that you are using a private cert instead of cert from a certificate authority. Tell your browser it is ok.

You will see the login page for the Palo Alto firewall. The default username and password is:

  • user: admin
  • pass: admin

When you have entered the login credentials click “Log In“.

You will see a warning that you haven’t changed the default password yet. Click “OK”

Click the Device Tab

To change things like

  • Hostname
  • Domain
  • Time Zone
  • Time

Click Setup – Management TAB and then the General Settings Cog icon.

A window will pop open and you can enter the information. Here is an example of what I entered into the Palo Alto Device. When done click “OK”.

Please note that this setting and the rest of the settings we change will not be applied on the Palo Alto Firewall until I have hit commit!

Next we will update the DNS servers that the Management Plane. To do so stay in the setup section and click the Service TAB – then click the Services Cog

Enter your preferred DNS servers. Typically you would enter your Active Directory DNS servers. Today I chose to use the Google DNS server. Click OK

The next things we will change is the IP address of the Management Port. To do this stay in the setup section. Click the Interfaces TAB – Click Managment Interface.

As we have seen the default IP address is 192.168.1.1. We can specify the IP Address to be DHCP (only newer versions of PAN OS allow for this!) or a static IP address. Here is how I setup my device:

The next thing we will need to do is change the default password of your Palo Alto Firewall. To do this click on:

  • Device TAB – Click Administrators Section – then click on admin

Change the password to your liking:

Now that we have finished the basic setup of the Palo Alto Firewall we will now need to commit our settings.

PLEASE NOTE – Since we are changing the IP address from 192.168.1.X network to the 192.168.101.x Network the progress bar will never reach 100%. The reason for this is the browser won’t be able to update progress bar to 100%. This “issue” is pretty typical on network devices that are being configured via it’s web managment. If you were using the command console it would complete as expected.

In my instance, the device got to 98%. Click Close.

You can now switch your computer’s IP address back to its normal network and you should be able to talk to the Palo Alto on the new IP address!

When you log in it is good to verify that the settings you have entered were applied. Notice right away you can tell the device was named propperly and that we are now logging in from the new network in the logs.

The last thing we should do is check our ability to SSH into our device and test connectivity using Ping and trace Route.

Open your favorite SSH client I use PuTTy. Enter the settings into the client. Here is mine:

accept thew SSH Key:

Log into the box using your username and password you enter into the Web Interface.

The first thing we want to do is ping google.com. The command to do this is:

  • ping host google.com

You should see that the name is resolved using DNS and that the box should be able to ping the server:

Another good test is a Trace Route. I blurred out my information.

I really hope you find this post informative and concise!

 

Filed Under: Palo Alto Firewall

Jan 8, 2017 By Jared Heinrichs Leave a Comment

How to figure out what switch port your computer is plugged into

Do you have a live port that wasn’t documented? Normally if you had a huge budget you might have a Fluke device on hand. Unfortunately, not everyone can afford a Fluke Testing Device.

For this article, you will need to have a laptop with Wireshark installed.

Plug in the laptop and start Wireshark. Once you start Wireshark you will want to start the packet capture on the network card that is attached to the port in question.

Once you see that traffic is flowing you should enter the “Filter Expression”:

  • CDP

If you leave Wireshark up and running long enough you will see only the CDP packets start to come in.

The CDP packets will tell you many things. Some of the most useful things are:

  • Device ID – This is the name of the switch
  • Software Version – Firmware Version of the switch
  • Addresses- IP address of the switch
  • Port ID – The switch port the computer is plugged into
  • Cluster Management
  • VTP Domain info
  • VLAN info
  • Duplex Info
  • Management IP address of switch

Here is what you might see:

Once you have one packet captured that is all you will need. Stop the packet capturing and take a look at the first packet.

There will be 4 Main sections of the packet. The section we are going to care about is: “Cisco Discovery Protocol”.

If it isn’t already open please do so now. Scroll down until you see:

Depending on the make and model you might see FastEthernet, GigabitEthernet or just plain Ethernet. The 1/0/4 says the name of the port on the switch!

NOTE- You could also write down the MAC address of the laptop, log into the switch console and look the Mac Address up in the ARP cache. What is nice about the Wireshark method is that you can get this info without having login credentials for the switch!.

Let me know if you have any issues.

Filed Under: Networking

Oct 22, 2016 By Jared Heinrichs Leave a Comment

[FIXED] Dism Error: 0xc1420117

I was getting the error message “Error: 0xc1420117” when I tried unmounting a wim file.

To give you a little background about my machine…

It’s is a Windows 2012R2 server with WDS, MDT installed. I installed MDT I needed to install Microsoft ADT which also includes Dism.

If you open a command and run dism the program just runs.

After a little bit of fooling around, I noticed the system had TONS of dism files on it. To resolve the issue you need to run the most up-to-date version. A way to check which dism files are on your computer is to open a command prompt and type:

  • dir C:\dism.exe /s /a

The output will look similar. Notice how the file in the C:\deploymentShare\Servicing\x64 has the most recent file where as the Windows\System32 dism file was made back in 2014.

dism-001

Using the most recent version of dism I then ran the commands:

  • dism /Cleanup-Mountpoints
  • dism /unmount-wim /mountdir:C:\dismmount /discard

NOTE – My mount drive is “C:\Dismount”

Hopefully, this will help you successfully fix your Dism Error: 0xc1420117

Filed Under: Windows Deployment Services

  • 1
  • 2
  • 3
  • …
  • 163
  • Next Page »

Categories

  • Board Game Rules
  • Camera
  • Computer Hardware
    • Blackberry
    • drivers
    • iPad
    • Magic Jack
    • USB
  • Damn Small Linux
  • Exam Notes
  • Facebook
  • FREE Flashcards
  • Games
    • PC
      • League of Legends
    • Wii
    • xbox 360
  • Music
  • Networking
    • Cisco Certification
    • Mitel
    • Palo Alto Firewall
  • News
    • Google
    • Microsoft
  • Operating System
    • Active Directory (2003)
    • Android
    • Command Prompt
    • Damn Small Linux
    • Group Policy
    • Hyper-V
    • IIS
    • ISA 2006
    • Mac OS X
    • Microsoft Exchange Server
    • Powershell
    • Security
    • SME Server
    • Terminal Server 2003
    • Ubuntu Linux
      • Adito Web SSL VPN
      • OpenVpn-als
      • Webmin
    • Virtual Machine Manager
    • Windows 2003 SBS
    • Windows 2003 Server
    • Windows 2008
    • Windows 2008 R2
    • Windows 2012R2
    • Windows 7
    • Windows 8
    • Windows Command Line
    • Windows Deployment Services
    • Windows Server Backup
    • Windows Vista
    • Windows XP
  • Phones
  • Photography
  • Photos
    • Animals
    • Misc
    • Nature
    • Portraits
  • Portfolio
  • Programming
    • CSS
    • HTML
    • jQuery
    • MySQL
    • PHP
    • Script
  • Programs
    • Acrobat
    • Acrobat Reader
    • Adobe Dreamweaver
    • Adobe Illustrator
    • Adobe Photoshop
    • Anti-virus Software
    • Antivirus
    • Backup Exec
    • Bittorent
    • Blackberry BESADMIN
    • Internet Explorer 9
    • Lightroom
    • Microsoft Office
    • Netbeans
    • Onenote
    • Outlook
    • Shelby
    • Sysprep
    • Trend
    • Video Editing
    • Visual Studio
    • Windows Live Writer
    • WireShark
    • XP Mode
    • Zarafa
  • Recipe
  • Review
  • Software Links
  • Troubleshooting
  • Uncategorized
  • Videos
  • Web Applications
    • Brage
    • Google
    • Spiceworks
    • Wordpress
  • Web Browsers
    • Internet Explorer
  • Web Server
    • XAMPP
  • Winnipeg
    • ISP

Try searching this site!

Copyright © 2021 Winnipeg Web Design