Until Revit comes up with some kind of advanced and granular permissions management for workshared files, we are left with a situation that requires best-practice Revit use combined with 100% obedient staff. If you would like to take matters into your own hands in the meantime, you can use this somewhat scary hack to check out worksets using a concealed user name. As with many posts on What Revit Wants – use at your own risk!
- Copy the username into Microsoft Word and change it to a different font in this example the font called AIGDT. (which is just associate symbols to letters).
- Copy the username (AIGDT font) back into Revit and as you can see Revit just shows it as bullets.
- Worksets checked out to that user will appear to others like this:
Image and idea by Navid at:
Locking WorkSet with a hidden user name!
Microsoft has released a beta version of recovery tool that can help the users to start their infected PC when all other anti-virus solutions fail…
Download Microsoft Standalone System Sweeper Beta version (1.0.856.0):
Microsoft Standalone System Sweeper Beta (32 bit): mssstool32.exe
Microsoft Standalone System Sweeper Beta (64 bit): mssstool64.exe
Download Microsoft Standalone System Sweeper for Offline Scan and Start Unbootable PC
If you require the Ask Toolbar removal tool for support purposes, you can download it from here:
From Kaspersky download page…
If you are interested in trying out the new, supposedly improved, beta of Microsoft Security Essentials, head over to this link and see if you can become part of the limited beta program.
There are 32 bit and 64 bit versions available. You will need to sign in with a Windows Live account.
I found out about this over at this post at Lifehacker. Check it out if you are interested in more details.
We run a Small Business Server box and it primarily provides our email via Exchange Server 2003.
Recently, our ISP indicated that our server was relaying or forwarding spam messages. I have tried a number of different things to correct this, and I would like to share a few of the steps of I have taken.
- Ensure that Exchange SMTP is not acting as an open relay. You can run a test at http://www.spamhelp.org/shopenrelay/
- Use SMTP Authentication (if you are forwarding mail through an SMTP smart host).
- Enable Recipient Filtering on the SMTP Virtual Server. Link here. KB Article here.
- Enable SMTP Tarpit Time. Link here.
- Enable Connection Filtering on the SMTP Virtual Server. You might use something like the Spamhaus ZEN list to start with.
- Enable Message Logging (so that you can get an idea of where spam is coming from).
- Disable Non Delivery Reports (NDRs). How to here.
- Don’t allow anonymous access to your Default SMTP Server.
- Run trojan/virus scans on your server and on your Client PCs (including remote Clients).
- Install and run the Exchange Best Practices Analyzer.
On a slightly unrelated note, some nefarious characters kept trying to login to our server via Remote Desktop. I have defended against these attacks by using a program called 2x SecureRDP. This ‘filters’ incoming RDP connections and stops repetitive RDP attacks before they occure.
I hope some of this information has been useful to you.