HAL


Cannot find check file msexch_isclienttype in Check_MK after adding an Exchange Host?

This issue appeared when an Exchange 2013  server was added as a host in Check_MK RAW 1.2.8p9. It appears once you have added the host and are trying to activate the changes made. The error appears like this and prevents the updates from being saved / completed. The solution is to find a related check […]


ICON UK 2016 sessions announced

With only a few weeks left before ICON UK 2016 kicks off – the session lists are up on their site The sessions are listed here http://iconuk.org/iconuk.nsf/agenda.html As normal there is quite a spread of subjects and some new names for the sessions which is great to see.  The opening session is probably of most […]


Only In San Francisco – ECO-Burglary !

While staying in San Francisco recently I happened to observe the local arrangements for bin collection – basically all bins out on the same day with various companies responsible for the various types of waste picking up their bins at various times during the day. What I wasn’t quite prepared for was the sight of […]


Windows 10 update ate my wireless !

A client called me when his Dell Inspiron 14z 5423 upgraded to Windows 10 and stopped being able to see wireless networks. Diagnostics showed nothing wrong but he remembered seeing the Intel Widi was mentioned in the list of apps removed due to incompatibility with Windows 10. Suspecting driver issues a quick check of the […]


Techie’s paradise – a visit to Dell Solution Centre

I recently had an invite to visit the Limerick Dell Solution Centre with a client to consider the options for a project coming up in the next 12 months. This particular facility is used in part by Dell to provide proofs of concept for clients planning or building application stacks for their specific needs. This […]


Its an Anomoli – Jim !

At the recent Owasp meetup at the Ashby Building in Belfast we were treated to two great talks The first was “Introduction to Secure Design” by Gary Robinson – OWASP Chapter Leader (Belfast) “When it comes to high risk applications, secure design considerations can be included before a line of code is written.  This talk will […]