Add1son's Blog

A place for pondering, planning and projects

Weekly Rundown Week 7 2018


Seriously, Delete your facebook account if you still use one or at the very least reduce your use of the platform.

Drop any apple device with some unicode, this is the second time this has happened in recent memory.

Terrible “news” sites response to adblockers being “can we transparently use your computer to mine if you don’t want to view advertisements? This may be the first time that this has been reported but it will not be the last time. Reminder to use uBlock Origin or uMatrix

  • People are walking into glass at the new Apple headquarters

Apple spent 5 Billion on a new HQ but looks like they have had 2 cases of “minor cuts but did not appear to require hospitalization”. Another interesting idea is that California has law in place that they could be breaking in order to keep the “spaceship” campus aesthetics.

Is it really though? This is tied in with stories that have been linked in previous weeks in regards to GPU shortages, the Search For Extraterrestrial Life (SETI) researchers state that they want to expand operations but can’t because they can’t buy graphics cards due to the market. This is the barrier to entry? It doesn’t seem like this would be a barrier to entry for anyone doing serious research, it is a good headline though.


Worth a Read


This is more of a youtube channel but I have watched around 80% of the total content uploaded by this channel. The engineering that goes into theme park rides that are just lost to time is incredible. Very interesting and well researched content.

Tools that I am enjoying

  • I got IFTTT to work with Telegram to post a daily hydration reminder to a channel that I admin (unfortunate that this is a thing), I saw a library for python => Telegram which could be of use.
  • I am still enjoying Toby The Tab Manager but currently Papaly also offers a great bookmark management solution.


Weekly Rundown Week 6 2018


Worth a Read



Tools that I am enjoying

  • Working on integrating Telegram with IFTTT + additional workflows.

Potential future posts

  • Deepfakes

P.s. Sorry for being late, wordpress died after I upgraded to the newest version

Weekly Rundown Week 5 2018



Worth a Read

Tools that I am testing

  • Inoreader – Better version of Feedly from what I can tell,
  • Letterboxd – Keep track of the films you consume, might just create a blog post / page and update it manually as for a paid site the main feature is curation that you can get for free

Cleaning up,

So I was running and gunning with the TwentySixteen theme for most of 2017 and I figured why not change the look a little bit in 2018. This new theme is Galaxia and it is similar in nature with slight changes. Design and visual arts are two things that don’t come all that easily to me as you can tell by my choices to use well designed landing pages and themes as I believe my time is better spent doing other things.

I have added the RSS feed link on the landing page which was accessible before but not without a little bit of monkeying around. Speaking of which I am looking to get MailChimp up and running for new posts so that users can subscribe via email to get maybe a weekly rundown on the regular + whatever else I have going on at the time. Work has had me very busy lately but the Weekly Rundown will be coming out as scheduled and I have enjoyed putting them together.

Might be adding additional pages / widgets to my WordPress site as I could use the experience setting up some additional features. Previously I was using vanilla WordPress but I have recently added JetPack as it does some really neat stuff as well. Part of what I am doing now is adding comments so that some feedback can be given and I would love to hear from you regarding the design changes! That’s all for now,

How to make the most secure Windows Server ever!!1!

AKA – What to do if you install 2 antivirus products on one machine and RDP/Vsphere console are completely non-responsive.

Our guys at Symantec have done the footwork in the user forums to see if they could resolve the issue in this forum post.Boot into safe mode with networking on the Windows Hosts that you are working on by pressing F8 during the BIOS splash prior to boot. It is possible that your VM will breeze through the bios faster than you can click F8 during the boot sequence. If this is the case right click the VM -> Edit Settings -> Options -> Advanced -> Boot Options -> “Power on boot delay” -> Add millisecond value (e.g. 1000 for 1 full second)

Login to the server and after this use the following code to allow for an uninstall to be processed by the server. If multiple machines are having this issue save the following code into a .bat file and then place it in a network shared location and run it on each machine

REG ADD “HKLM\SYSTEM\CURRENTControlSet\Control\SafeBoot\Network\MSIServer” /VE /T REG_SZ /F /D “Server”
net start msiserver

At this point you will be able to uninstall the antivirus that is causing the issues and then restart your server and everything should be back up and running.

That concludes the How to portion of this post but the bigger question is how could this be avoided by the antivirus itself and/or does this occur with every antivirus? It surely would be interesting to see what products cause the most of this problem. Perhaps that will be a post for the future.

The title of this post was a bit tongue in cheek in that if not even IT staff is able to access a server it must be Fort Knox! One would think that if the primary goal is to secure a computer does that mean that the antivirus has failed in its goals or has it succeeded? It is interesting to me that an antivirus wouldn’t see another antivirus installing as being malicious or potentially causing harm. This opens a larger door in the balance between security and ease of use. Should an Antivirus product not allow you to access the sites of their competitors? This would make sure something like this wouldn’t happen but it also has the possibility to cause more issues than it is preventing.

Most people know not to install two copies of AV over one another but it does happen and most likely will continue to happen. This will also question the use of classic signature based AV in the sense that we are generally moving towards more innovative ways of capturing this sort of data in machine learning / AI integrated products. I will conclude this post with the question in that what if an AI was turned against itself in the form of having to AV products that were AI driven? Would we be in a worse spot than what inspired this blog post? Only time will tell.

Weekly Rundown Week 4 2018

Tools that I am enjoying
  • Pocket – I have been using this when browsing my news feeds on my phone as to save things for later to add to my rundowns. The feature of just being able to share an article and then selecting pocket (Android) is nice and centrally managed. Naturally, if something self hosted existed for this it would be neat to use but for now Pocket works very well. The integration with Firefox / Firefox accounts is also an awesome feature.

Weekly Rundown Week 3 2018

Tools that I am testing
  • Wavebox – Follow up from 2 weeks ago. The lack of extension support is what is keeping me away from buying premium at this point. The program is built on chromium / electron but doesn’t allow extensions such as Mailvelope or uBlock origin. Perhaps if I start using more webapps I will reconsider this choice.

DNS After Death

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System is an essential component of the functionality on the Internet, that has been in use since 1985.

via wikipedia

“What happens when you type in” is a classic interview question. The general idea of the question is that you can go in depth so far as to dissect what happens at every keystroke or you can say “well the website resolves”.  Either way in your answer the way that this system works is through DNS. This system has been in use for the last ~33 years and it is a great way that records work assuming that they are maintained. The idea that you will be able to maintain these records forever is a bit optimistic and some would even say impossible.

The issue here being when your DNS records expire through your name registrar of choice, they are going to be once again available for purchase. This means that if someone can purchase my domain they own my web identity. Obviously, this means that they could serve malware at my domain, redirect to another website and even setup a page defaming me. None of these are of that much concern as they are not avoidable but the most interesting idea behind a DNS record going to someone else is that the person would be able to inherit email that was meant to be sent to me. If that the email wasn’t encrypted they would have basically bought a PO box that previously belonged to me and receive all of my mail. The alternative to this being that you can host your email through a company on a server that belongs to someone else which isn’t without sacrifice as a decision to make. To dive into the inherit flaws in this is outside the scope of this blog post as these are not things that are within your control.

DNSSEC does exist that mitigates this issue to a point but it is not widely used. The idea here being that you no longer own the DNS records and the idea that possibly this could be mitigated. The idea that you could either license the domain for an extended period to make sure that the communication you were receiving goes to a next of kin perhaps or the alternative would be that you would be able to have a domain funeral. The domain funeral in this case being exactly akin to a traditional process of moving on to the afterlife (if you believe in that sort of thing) or being placed in a grave never to be accessed again. Currently with a system of this age the mortality of man was not factored into the system at design nor should it have been necessarily. The implications of this however are that if you own DNS you become a person without the proper mitigation which is not the standard now.

A business need seems to exist for a post mortem world of computational glory. A business built by trusted enthusiasts for other enthusiasts. Currently offerings for this are very primitive in Dead Man’s Switch as far as I can tell nothing like this exists. Granted the needs of this go beyond DNS and can extend to VPS systems that could be taken down, memories that need to be parsed out through multiple terabytes of hardware and cloud storage, and various online personas that a person can request to be archived or pulled down entirely. The amount of data that we store and use isn’t going to go down in size over time and largely the mortality of man isn’t considered when these systems are designed.

An anecdote that I can share is that I have a Great Grandfather who is currently 92 years old. He has a large sum of computational equipment and I believe that he was a great inspiration to myself in getting interested in computers. He has purchased video cameras since they were available and has recorded a myriad of family memories with them as well as a small collection of DSLR styled cameras and I believe he has 3 computers in his home office at my time of this writing. His wife or my Great Grandmother passed away leaving him a widow and it was at this moment that I started to ponder the implications of his passing as it isn’t a question of if so much as a question of when. This view depending on interpretation is “dark” or perhaps “removed” but the immediate thought of this being, I am the computer guy in the family and they are probably going to ask me for assistance on this. What would he want done with his records? Which ones would he want purged? What things should be cherished and where are they? What accounts currently exist in his name? What does he want done with them if anything? The ideas here being to honor my grandfather by honoring his wishes in the same way a will would be honored after his passing.

This post got a little into the weeds per say but the question that will be left here is this: What is your plan for your computers, DNS records and online accounts after you pass?

Update: I had read about this previously but I wasn’t able to find the information but now I have it! Andrew Kalat (@Lerg) wrote a book called “Managing Digital Legacies” and did a talk titled “Online No One Knows You’re Dead” at Shmoocon 2016.