Motioneye Raspberry Pi Zero Security System

Camera systems are so inexpensive these days that it may make sense to purchase a Zmodo or Arlo system from Amazon and call it a day. What fun would that be? I love making little electronic projects and then improving on them as I go. Rather than install a pre-packaged surveillance system, motioneye here we come.

My system consists of four Raspberry Pi units running MotioneyeOS. Three of the four units are Pi Zeros that are my actual cameras, and the fourth is a Pi 3 that aggregates the feeds to one central monitoring station. The benefit of this is there is only one IP/domain that needs to be accessed in order to monitor all the cameras on my system. Continue reading “Motioneye Raspberry Pi Zero Security System”

Easy Nginx Reverse Proxy

I’m a network engineer by trade and like many of us enjoy having an extensive home lab where I can run servers, learn and experiment in my free time. Not only do I find it very satisfying to build a “production” infrastructure at home, but it also helps me with my day-to-day work at my real job. A few years back I started converting my home lab to Hyper-V. I found a visualized environment easier to manage, plus I was able to work on various technologies without running multiple pieces of hardware (think electric bill)

Residential Internet Service = ONE IP ADDRESS

The only issue was talking to all my various projects from outside the network. I have residential internet service and am only allowed ONE IP address. This causes issues running services on separate internal servers on the same port and trying to reach them from the internet.

Continue reading “Easy Nginx Reverse Proxy”

Microsoft Edge Crashes On Launch – Faulting Module EMODEL.DLL

I had a user this week call me complaining that Microsoft Edge would freeze on launch and then crash and close. After investigating her event logs it was determined the faulting module was emodel.dll

Faulting application name: MicrosoftEdge.exe, version: 11.0.16299.371, time stamp: 0x5abdaed4
Faulting module name: EMODEL.dll, version: 11.0.16299.371, time stamp: 0x5abdaf79
Exception code: 0xc0000409
Fault offset: 0x000000000018bcae
Faulting process id: 0x2900
Faulting application start time: 0x01d3e794d12ebc95
Faulting application path: C:\WINDOWS\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
Faulting module path: C:\WINDOWS\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\EMODEL.dll
Report Id: 560abf0f-e6c8-4b45-8b96-d448f9aa934d
Faulting package full name: Microsoft.MicrosoftEdge_41.16299.371.0_neutral__8wekyb3d8bbwe
Faulting package-relative application ID: MicrosoftEdge

I have not seen this error before and there were no other users in the environment experiencing this issue. My first troubleshooting step was to see if there were any unique applications that  were specific to this user.

This particular user is the CFO of the company and logs into a number of banking websites. To enhance security many banks force customers to download additional software to supplement logins in order to prevent intrusion and hack attempts. This user was using a product from IBM

IBM Trusteer Rapport & Microsoft Edge EMODEL.DLL

Continue reading “Microsoft Edge Crashes On Launch – Faulting Module EMODEL.DLL”

Post # 100 My Favorite Blogs

It’s been a while since I have written a blog posting. I guess you can say life sometimes gets in the way and things we enjoy doing get pushed aside. I have a few spare moments today to sit down and write so here goes nothing.

First and foremost Webcommand blog has just turned ONE! I started writing exactly one year ago today. When I built this server I was setting a goal to write 5 blog posts a week about 260 in a year. Well I realized its harder to come up with content then I thought. I also realized it is even harder to monetize the site as well (your donations are welcome)  However I did manage to write 100 blog posts in the first year and I deem that a success!

Today on the anniversary of Webcommands birth and 100th post I would like to pay tribute to my favorite blogs and give each of them a brief shout out.

My favorite Blogs

Continue reading “Post # 100 My Favorite Blogs”

Don’t Throwaway That Old iMac Keyboard – Use It On Your Tablet

Cleaning out the basement yet again I stumbled on an old 20″ iMac. By today’s standards this thing is a huge piece of junk. 250GB hard drive, 1GB RAM, Core 2 processor. At 11 years old its better suited as a boat anchor then a functional computer.  However the standard equipment iMac Keyboard does function as a blue tooth keyboard and can be used with other devices.

I happen to like the iMac keyboard, it feels a little small at first, however once you get accustomed to the feel it makes a great companion to any device.

The keyboard is relatively easy to pair to your device if you follow these simple steps.

How to pair an iMac Keyboard

Continue reading “Don’t Throwaway That Old iMac Keyboard – Use It On Your Tablet”

Key To My Heart 16GB USB Drive!

I found this USB key to my heart while surfing the Internet the other day and thought it was a very unique item. A fun loving gesture to tell that special geek in your life how much you care about them.

16GB Key To My Heart – $12

Just think of the possibilities:

  • 16GB of photos to share with the one you love.
  • 16GB of videos of your favorite times together.
  • Store your love notes, letters, emails ETC.
  • Turn it into a unique way to ask someone to PROM?

Continue reading “Key To My Heart 16GB USB Drive!”

PDF files – Latest Target of Phishing Scam

Malware and viruses are always just a wrong click away, and to keep yourself protected you need to be on top of the latest trends that are targeting home and business users. This past month I have been noticing an increase in PDF attachment attacks around the office. As with previous email based attacks this is simply the latest attempt to infiltrate your network security by using the weakest link. YOU! Yes, in my opinion humans are the most vulnerable vector to attack and successfully enter a network.

How the latest PDF Phishing scam works.

A friend, coworker or client has already been infected with malware. At this point the attacker has taken control over their system and would like to spread his virus via email. The malware quickly enumerates the victims address book and fires off emails to unsuspecting targets with the viral payload attached as a PDF document. As the recipient you open the PDF, jump through a few hoops and the attacker now has control of your computer as well as your email credentials and more.

How to spot a bogus attachment, and prevent infection.

Continue reading “PDF files – Latest Target of Phishing Scam”

Commodore 64 Mini – Looks Like fun!

Well folks here’s another retro gaming platform revitalized into a mini computer.  The C=64 was and still is my all time favorite platform and this Mini version may be on my purchase list once its released in March. First we saw the NES Classic Edition hit stores before Christmas 2016 and it was an immediate sell out, followed by the Super NES was released last year for $199.99 at Amazon The next logical step was to release the Commodore 64 Mini!

Commodore 64 Mini – will be released with 64 games!

Continue reading “Commodore 64 Mini – Looks Like fun!”

Spruce up your laptop with SSD

Laptops and Notebook computers cost a fraction of what they did years ago. A decent general purpose laptop can be had today for around $500. However as time marches on our older computers can begin to feel slower due to more resource demanding applications and operating systems.

Maybe its not time to toss out that used laptop! With some easy modifications you can spruce up your laptop and get a few more years of good service life out of it.

Add a Solid State Hard Drive – SSD

Continue reading “Spruce up your laptop with SSD”

Know instantly when users are LOCKED OUT of Active Directory

One of the dreaded jobs of the Sys. Admin is getting the call, I’m locked out. Its the same call every time:”I don’t know what happened, I’m just locked out.” You say something to the effect of, “Did you forget your password? Did you type it in wrong? Caps lock on?” No matter what the case wouldn’t it be nice to know a user was locked out before they called you. Plus it would be great to know if someone was hacking away internally or externally at your network.

Passwords Are Important.

Continue reading “Know instantly when users are LOCKED OUT of Active Directory”