Hello all, I had a huge durp moment when it finally clicked that I was running this on WordPress! I completely forgot that WP has plugins and one of them is a chat one, just what I need.
I’m usually around 6-7pm PST, feel free to leave a message!
On the bottom right of your screen you should see a blue button that says “Click here to chat!”
Please let me know if you can assist in debugging and I can send you an invite to a private chat room.
Hello all, I could use some help with testing out the new version. I have tried it with all of the hardware I have and so far things are running with no issues. This is a beta version (although the entire product should be considered beta as I am still writing it out) and can be downloaded below.
- Support for Server 2008/Windows10 is now working (not 100% confident, need help testing against all versions)
- Added local host support (if local machine is the VM host, it should load with no issues)
- Multi-server support added
- Double click the hostname box to enter credentials and select your server list (1 server per line).
- Added more logging (still not liking how I am doing this, will most likely revamp logging on official release)
My hopes are that I get confirmation from you lovely people that things are working better than before and from there I will start adding in support for other things (SCVMM, Clusters, etc).
Does anyone know of a good way to chat in real time? Maybe we can start up a chat group so that I can actively fix issues in real time with you guys?
Hello folks, I have sealed the deal on my new hosting and will be migrating things over very soon.
On a side note, I am working on a remake of The Hyper-V Tool with multiple server support, clustering, SCVMM and much more! Lots of things going on, never enough time but please bare with me! Thanks guys!
Hoping this will save someone from a major outtage just to reset a password. If you have a FortiManager in your environment that manages your FortiGate firewalls/proxies/etc then you’re in luck (I hope).
With the FortiManager in place, it has the ability to run CLI commands against the devices it manages. This is a nice feature because otherwise you would have to reboot the device and perform the password recovery steps, which isn’t fun in a production environment.
For those that are interested as to how this all works, during the initial setup of your HA cluster with the FortiManager, you provide it the device serial numbers. The FortiManager then uses this to log into the child devices (kind of like the bcpbSERIALNUMBER login process during password recovery), the child devices allow this communication because they’re already aware of who the FortiManager is.
- Log onto the FortiManager in the environment that you want to do the password reset in
- Once logged in, under Device Manager tab, select your ADOM
- Go to Scripts
- Double click and confirm chng-pwd script is as the following (create new if doesn’t exist)
- Right click the chng-pwd script and click Run
- Select the device you want to run against
- Test the new password!
Hey guys, long time no update :-/
Sorry about that, I recently got married and next week I start my new job….so yeah, I’ve been pretty busy with life in general.
I just uploaded Hyper-V Tools v1.6 to the cloud and if you’re running a older version, you should be prompted to update. If not, then grab the latest version from below (or original thread).
On a side note: I am a utter noob when it comes to GUI design and even the smallest things can be extremely challenging for me to implement, in this case I had to implement additional columns on a per VHD basis but failed miserably, I mean I have been trying to come up with a solution and my brain has already melted and what I produce just does not work. So there is a slight mismatch in information between what the GUI displays and what is outputted to the CSV. The main addition is that in the CSV file, you will have extra columns for VHDs and in the GUI you won’t.
Hopefully I can figure this out and make the GUI pretty but in the mean time, please bare with me.
Here is a simple tool I wrote up to check my servers uptime
The tool does not require to be installed, it can be ran directly wherever you place it. However if you want to use it via command line as I do, then place a copy in your C:\Windows\System32 folder (or a different folder per your environmental PATH variables).
In v0.2 you can now filter based on IP version by using the “-v” switch. I will add links to both version as this still requires a little bit of testing.
Finally a cool breeze and some alone time, here is a tool I wrote up because I had a need to track down and audit multiple remote servers to determine who has been logging in and from where. The tool output’s to the command prompt, you can use a “>” operator and output to file if necessary…see below for example.
The usage is fairly simple and it can be used both in interactive mode and can be ran using command line arguments.
Double click the exe and it will ask you for the target hostname or if you do not provide a hostname, tool will check the local host.
rdpaudit.exe -h dc1.uglyvpn.com -d uglyvpn -u kil0gram -p mypw
Output to file:
rdpaudit.exe -h dc1.uglyvpn.com -d uglyvpn -u kil0gram -p mypw > C:\temp\auditlog.txt
-h = Hostname or IP address of target machine
-d = Domain name (if you're using no domain, use a '.' in its place
-u = Username and -p = Password
-q = Quiet mode, tool exits after run
-v = Display filter is IPv4 by default but you may set it to '6' if you want IPv6
The tool has been tested against Server 2008/2008r2/SBS2011/Server2012/Server2012r2/Windows 7/8/8.1
Sorry for no updates to HyperVTools and no new tutorials recently, you see the thing is……I am getting married! I have been so busy and just have not had time to focus on my side projects as of late 🙁
Well anyways, I just wanted to keep you informed that there will be updates and features added to HyperVTools in the future. See you after the honey moon phase 🙂
I wanted to inform my visitors that I have accepted a new advertiser and it is Private Internet Access (PIA). Before recommending a product I do my best to test and actively use it for a lengthy period of time and PIA has been through its fare share of use.
PIA is a VPN service provider, using there servers (which are located globally) you can stay anonymous while still browsing the web at full speeds. The only time I have had issues was when I was playing online multiplayer games and I forgot that PIA was still connected, this was the reason I lost so bad (and I swear, I am not a bad player! :p)
Anyways, PIA delivers on there promise, they do not store any logs nor history of usage. They simply put a layer between you and the rest of the world, keeping you nice and safe.
If you want your product advertised on this blog, please reach out to me (by comment) and I will work closely with you to determine if your product is appropriate for my audience.
I wanted to give everyone a heads up on a major issue related to Broadcom NICs, these can be found primarily in top shelf HP/Dell servers that are used in production across the globe. The issue is related to poor network performance for virtual machines and this is due to a advance NIC setting which is referred to as “Virtual Machine Queue”.
VMQ is when network traffic is handled by the physical network adapter, it creates a queue of traffic which waits for everything to arrive and then routes it to where it should go. In my experience, this has killed file transfer speeds and what normally would take 30 seconds to complete will now take over 30min!
To disable this evil monster you can do it via Powershell like below:
Get-NetAdapter | Disable-NetAdapterVmq
another way of disabling this is locating your network card properties in Device Manager and going to the Advanced tab, the Virtual Machine Queue property will be in the list.
I originally faced this issue over a year ago and had posted a question over at ServerFault but seemed like no one had a clue on what might be the problem. Hopefully this saves someone the heads, cheers!