Here's a quick and dirty script that will ping with a timestamp, and save the ouput to a text file. I have used pingInfoView quite a bit, but sometimes this fits the situation better. $hostAddress = Read-Host -Prompt 'IP Address or Hostname' $fileName = Read-Host -Prompt 'Output file' ping.exe -t $hostAddress|Foreach{"{0} - {1}" -f (Get-Date),$_}| Tee-Object -file $fileName
Dropbox was slowing down my startup after logging in, so I wanted to delay startup by a minute or so to allow my computer to be usable earlier. The normal settings only allow it to either start up immediately, or entirely manually. Below are instructions on how I got it to start after 2 minutes. I did this in Windows 7, but it should work similarly in Windows 8, 8.1, and probably Windows 10. This also works with other programs, so you could stagger startup items instead of having them all hammer the system at once. 1. Disable the normal dropbox startup. a. Click on the dropbox icon, click the gear icon, and click Preferences... b. Uncheck "Start Dropbox on system startup". Click OK 1. a. Click Preferences... 1. b. Uncheck Start on system startup 2. Open the task scheduler. a. From the Start menu, click All Programs, Accessories, System Tools, and Task Scheduler. This can also be found in the control panel under System & Security, A
After installing a Palo Alto PA-220 with standard policies, there were several things that were broken. VOIP phone through Google Voice/OBi analogue - no audio on any call (STUN over port 19305) Speedtest.net find server and tests would not complete (SSL over port 8080) Our washer and drier were no longer sending notifications when laundry was done (SSL over 46030) External Plex server (SSL over port 32400) The offender was the default outbound policy to the internet/WAN. While the source/destination are any/any, the Service specified is application-default which basically means that if services are using non-standard ports they won't be allowed in this policy. There weren't any indications of dropped traffic in the logs, because default policies are not logged in Palo Alto devices by default, and this traffic was getting denied by the interzone-default policy. To resolve this easily, just change application-default to any. However, you may want to see wha
Comments
Post a Comment