ASP.NET MVC 5 offers an easy way to display error.
Step 1: Setup the error View
You create an error view “Error.cshtml”
Step 2: Return the Error View in your Controller Action
Peninsula Cities with Rent Control
|East Palo Alto||Measure J||Nov 2016||Yes: 79%
|Mountain View||Measure V||12/23/2016||Yes: 53%
Peninsula Cities Rejected Rent Control
|Burlingame||Measure R||Nov 2016||Yes:33%
|San Mateo||Measure Q||Nov 2016||No: 61%|
East Bay Cities with Rent Control
|Alameda||Measure A1 & L1 —
|Berkeley||Measure AA||Nov 2016||Yes: 72%
|Oakland||Measure JJ – expand eviction protection to almost all apartments||Nov 2016||Yes: 74%
|Richmond||Measure L||Nov 2016||Yes: 64%
If you enable 2-Step Verification on your free/legacy Google app account, you need to:
Note that you can use either POP or IMAP as long as you enable them in your Google account.
To regain internet access right away, the following works for me:
At this point, I can use Default Switch as the virtual switch for all my guest virtual machines under NAT.
If I want to use the old setup, I just recreate a virtual switch with an external network that connects to the host PC’s wireless network adapter.
For the missing virtual machine, I had to recreate the virtual machine (i.e. configuration):
The loss of internet connectivity and a virtual machine is scary after a Windows Update. I hope this post helps.
I like to configure my servers to download windows update automatically ahead of time.
When I can choose to manually install them later, I can install them right away without waiting for the download.
To do this in Windows Server 2016 is not straight forward, I haven’t found a way to do it using the desktop UI.
I have to do it via command line.
RingCentral has this feature that can forward an incoming extension call to your cell phone. However, it does not work for me. My cell phone never rings and the caller goes into Ring Central voice mail.
If you get hundreds of these 4625 events, it is probably because your server has remote desktop enabled and your server is facing the internet. For example, your server may be on the AWS or Azure with RDP port 3389 allowed for any public source IPs.
Cloud Network Firewall Fix:
Assuming you keep remote desktop service running, then you should configure AWS / Azure Security Group’s inbound rules to allow only your IP to connect to port 3389. All these events should stop occurring. In summary, you are blocking all IP addresses except yours.
Windows Server Firewall Fix:
As usual, please backup your servers. If you block your own IP from accessing server’s remote desktop port using Windows Server firewall, you need to do a restore.
What if you cannot just do block all and except? or maybe you want to find out the specific IP that is causing that event?
If you examine the event, you will see that there is no network info: workstation name, source network address, source port. I will show to how to find out the source network address.
In fact, there is little useful info. We know Logon Type: 3 means a “network logon”.
We know Account Name: “ADMIN1” does not exist on our server and so it is a guessed account name. The Sub Status: 0xc0000064 confirms that.
If you see Account Name: “Administrator” and the Sub Status: 0xc000006a means the hacker guess the wrong password.
You need to write a key info and that is the event date time (in Event Xml), down to the sub seconds level.
You download and run Process Monitor (not Process Explorer). You run it and let it start capturing data. When you see a new event 4625, you can stop the capture and start looking through the big log. You locate the log entries closest to the event date time. You may see errors such as LOGON FAILURE or NAME NOT FOUND. Go backward in time, you may come across some logs regarding remote desktop connection. Note “ms-wbt-server” is port 3389, used by RDP.
It tells you the source IP of the machine trying to connect and logon. That is the source IP you can add to Windows Firewall and block.
Again, DO NOT BLOCK your own IP. Otherwise, you cannot remote desktop to the server any more.
An account failed to log on.
Security ID: NULL SID
Account Name: –
Account Domain: –
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: NULL SID
Account Name: ADMIN1
Failure Reason: Unknown user name or bad password.
Sub Status: 0xc0000064
Caller Process ID: 0x0
Caller Process Name: –
Source Network Address: –
Source Port: –
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: –
Package Name (NTLM only): –
Key Length: 0