StefanKittel-avatar
StefanKittel 140 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
Update the BIOS and Chipset too.
There is not much more you can do.
zimbosmurf-avatar
zimbosmurf 140 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
The problem is that the error appears rarely and is difficult to trigger.

I have finished the driver updates and was not able to reproduce the error since.
Currently my colleague who works with the notebook is trying to trigger it a bit more extensively.

Haven't tried a Live Linux yet.

My first thought was also bad soldering or problem with the display cable, but the problem appears (appeared?) even if you were moving the mouse cursor with a wireless mouse with absolutely no physical movement or pressure to the notebook.

I am hoping that the driver update fixed it.
terrafirma-avatar
terrafirma 140 days ago
terrafirma has registered
Focus: Windows server - User group: Administrator.
zida2k-avatar
zida2k 140 days ago
zida2k has registered
Focus: E-Commerce and Online Marketing - User group: Manager.
Spirit-of-Eli-avatar
Spirit-of-Eli 140 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
Hey,

does the error occurs even if you boot an Linux live Stick?

Regards
Spirit
StefanKittel-avatar
StefanKittel 140 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
Hello, I've seen such display errors with faulty GPU RAM.

When does this error appears?
BIOS? Linux Boot Stick? Windows safe mode?

Stefan
ghost-in-the-shell-avatar
ghost-in-the-shell 140 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
Have seen a similar problem on a Lenovo, the problem was bad soldering of the GPU-Chipset so slight pressure on the keyboard or mouse pad leaded to theses horizontal lines because of motherboard bending. It was fixed by reballing the GPU chipset. Before sending to repair check the functionality under a live linux, if this problem does not appear here it's a software rather than a hardware problem..
zimbosmurf-avatar
zimbosmurf 141 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
This problem was only brought to my attention today. I am currently updating drivers to see if that fixes the problem. But due to the short leftover warranty I wanted to ask immediately if anyone has seen this before...
cse-avatar
cse 141 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
Hi,

might be a driver problem, have you ever updated driver of GPU and mother board?
kpunkt-avatar
kpunkt 141 days ago
10 comments
Comment: Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
I've never come across this myself before.
It really looks as if this is a software error because it is so specific. However, it is also possible that the GPU is picking up something (frequency or whatever, or even just a cable error) with these two programmes, which then makes a hardware error visible on the display in combination with the GPU.
I would rather let Lenovo laugh and turn it into a warranty case.
zimbosmurf-avatar
zimbosmurf 141 days ago
Question10 comments
Strange display problem, unsure if hardware or software, on Lenovo Yoga 13
Hi!

We have one Lenovo Yoga 13 Notebook that shows some screen issues.

As you can see in the following images, there are orange "lines" appearing in the upper third of the screen sometimes:
img_8506
img_8504
img_8505

The strange things are:

- the lines are triggered by mouse pointer movement, not physical movement of the notebook or display hinge
- We can only trigger these lines in Microsoft Visual Studio, however, we can trigger them in Visual Studio 2013 as well as 2022

There are 5 days of warranty left on this device and I am afraid that Lenovo will laugh at me if I claim this as a warranty problem. It seems rather like a software- than like a hardware problem to me.

Has anybody else ever seen something like this before?
Makusu-avatar
Makusu 145 days ago
Makusu has registered
Focus: Networks - User group: Network Administrator.
mody200-avatar
mody200 146 days ago
mody200 has registered
Focus: Windows server - User group: Administrator.
Brahim-avatar
Brahim 147 days ago
Brahim has registered
Focus: Server in general - User group: Administrator.
Debra54-avatar
Debra54 147 days ago
Debra54 has registered
Focus: Blockchain/Cryptography - User group: Application Specialist.
terga09-avatar
terga09 149 days ago
terga09 has registered
Focus: Blockchain/Cryptography - User group: Cloud Architect.
M.Amalie-avatar
M.Amalie 151 days ago
4 commentsSolved
Comment: Migrate from Google WorkSpace to Office 365
Finally solved, I used Gs Richcopy 360, the Enterprise edition, it did the task very well
Thanks all for your help
verbasoft-avatar
verbasoft 151 days ago
verbasoft has registered
Focus: Web Development (Front-/Backend) - User group: Developer.
Sahra36-avatar
Sahra36 151 days ago
Sahra36 has registered
Focus: Windows in general - User group: Administrator.
rcdevs-avatar
rcdevs 152 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Thank you, @c.r.s., for your pertinent answer! 😊
C.R.S.-avatar
C.R.S. 152 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Quote from @rcdevs:

Is real-time leak detection the future of password management? What do you think?

No, because it confuses different threats and precautions, putting the latter into a context in which they are not effective.
Checking against known and weak password DBs is primarily a password quality measurement applied during password creation. It can be used for the suggested monitoring purpose, if it is considered that it detects password leaks with the considerable time delay that it takes to collect leaked passwords in the wild, that it should be expected to detect password re-use or mass psychology rather than leakage from the monitored source, and that traded leaked password databases are basically leftovers for which the skilled attacker who initially obtained the database has no further use.

Indeed, if you actually detect a data breach of the monitored source, an ad-hoc rotation (among other means) would counter that. Regular password rotation, on the other hand, is not meant to protect against such data breaches but to counter the time decay in confidentiality that affects passwords which are subject to systematic risk of disclosure, i.e. entered manually. These passwords are usually picked up through shoulder surfing or CCTV and never make it into a database release; and in most cases they are never used for malicious purposes, but with confidentiality as a key requirement for a password, you want to re-establish it from time to time.
rcdevs-avatar
rcdevs 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
You asked, I replied.
Your comments aren't really relevant. face-smile
Other solutions, like Google and Apple, also offer similar features for personal accounts.
Would companies change their minds with this kind of feature... Here is the question
ghost-in-the-shell-avatar
ghost-in-the-shell 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
I told you so... self-promotion.
rcdevs-avatar
rcdevs 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
We implemented this in the OpenOTP server, but the purpose of the post was to gather feedback on whether it would be beneficial for companies and users (for users for sure) to replace the traditional password rotation routine with this type of mechanism.
ghost-in-the-shell-avatar
ghost-in-the-shell 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
So which system do you recommend?
rcdevs-avatar
rcdevs 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
The system checks passwords against a database of millions of known weak or leaked passwords. The process starts with locally hashing the user's password. Only the first five characters of the hash are then transmitted and a service compares this partial hash to its database and returns possible matches, allowing verification if the full hash is compromised locally.
tomolpi-avatar
tomolpi 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Quote from @catrell:
Quote from @kpunkt:

Yes, but he was too stupid to put the link in.
It will come.
The moderator monitors this 😉
ghost-in-the-shell-avatar
ghost-in-the-shell 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Quote from @kpunkt:

Yes, but he was stupid to put the link in.
It will come.
kpunkt-avatar
kpunkt 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Yes, but he was stupid to put the link in. So you can just do it for him...
ghost-in-the-shell-avatar
ghost-in-the-shell 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Spam Spam Spam ...
kpunkt-avatar
kpunkt 153 days ago
13 comments
Comment: How about swapping password rotation fatigue for real-time leak detection?
Nah....How real-time is real-time? And who notices the data breach? If it's breached by capable people, it will take months for the breach to be discovered.
The problem is not the management of passwords, but the passwords themselves.
rcdevs-avatar
rcdevs 153 days ago
General13 comments
How about swapping password rotation fatigue for real-time leak detection?
Hi there!

Traditional password rotation policies, while meant to enhance security, can lead to user fatigue and even weaker security as users struggle to keep up with frequent changes. Instead, real-time password leak detection offers a more effective and user-friendly approach. By actively monitoring for compromised credentials, real-time checks alert users the moment a password is detected in a data breach. This proactive approach minimizes disruption, enhances security, and provides peace of mind, all without the burden of constant password changes.
Is real-time leak detection the future of password management? What do you think?
rcdevs-avatar
rcdevs 153 days ago
rcdevs has registered
Focus: Security - User group: Developer.
ghost-in-the-shell-avatar
ghost-in-the-shell 159 days ago
4 commentsSolved
Comment: Migrate from Google WorkSpace to Office 365
Will this copy between Google Workspace and Office 365 directly ?
Yes it does.
Perform an automated Google Workspace migration to Microsoft 365 or Office 365 in EAC in Exchange Online
M.Amalie-avatar
M.Amalie 159 days ago
4 commentsSolved
Comment: Migrate from Google WorkSpace to Office 365
Will this copy between Google Workspace and Office 365 directly ?
ThiloR-avatar
ThiloR 161 days ago
ThiloR has registered
Focus: Networks - User group: Administrator.
Ambushclothing-avatar
Ambushclothing 161 days ago
Ambushclothing has registered
Focus: Android/ChromeOS - User group: Application Specialist.
ghost-in-the-shell-avatar
ghost-in-the-shell 161 days ago
4 commentsSolved
Comment: Migrate from Google WorkSpace to Office 365
Why you don't run an migration batch in Admin Center?
M.Amalie-avatar
M.Amalie 162 days ago
Question4 commentsSolved
Migrate from Google WorkSpace to Office 365
I need a direct way to migrate from Google Workspace to Office 365 without needing to download and re-upload!
form a Google search I found some tools like AvePoint, Gs Richcopy 360, MultCloud, and more but I don't have experience choosing one, also If there is a free way instead, I will be happy for the help
M.Amalie-avatar
M.Amalie 162 days ago
M.Amalie has registered
Focus: Networks - User group: Consultant.
christosmistos-avatar
christosmistos 163 days ago
christosmistos has registered
Focus: Project Management and Agile Methods - User group: Manager.
Pjordorf-avatar
Pjordorf 169 days ago
1 comment
Comment: MaharaProject Docker container not working
hI;

Quote from @d.jaeger:
Can anyone help?
You didn't read everything "This repository is not maintained any more and only made available for historical purposes" from here https://github.com/MaharaProject/mahara-scripts

Gruss,
Peter
HAL-9000-avatar
HAL-9000 169 days ago
HAL-9000 has registered
Focus: Networks - User group: Administrator.
ghost-in-the-shell-avatar
ghost-in-the-shell 169 days ago
Question1 comment
MaharaProject Docker container not working
Hey Everyone,

i have an mahara-docker-container

-rw-rw-r--  1 daniel   daniel     267 Okt 28 17:16 000-default.conf
-rw-rw-r--  1 daniel   daniel     278 Okt 23 16:42 apache.conf
-rw-rw-r--  1 daniel   daniel     464 Okt 23 15:42 composer.json
-rw-rw-r--  1 daniel   daniel   65349 Okt 23 15:42 composer.lock
drwxrwxrwx  2 daniel   daniel    4096 Okt 24 17:10 config/
drwxr-xr-x  9 www-data www-data  4096 Okt 22 16:38 data/
-rw-rw-r--  1 daniel   daniel     659 Okt 23 16:58 docker-compose.yml
-rw-rw-r--  1 daniel   daniel    2554 Okt 24 17:22 Dockerfile
-rw-rw-r--  1 daniel   daniel     213 Okt 23 20:14 readme.txt
drwxrwxr-x 12 daniel   daniel    4096 Okt 23 15:42 vendor/

The content of the separate files ist
000-default:

<VirtualHost *:80>
    DocumentRoot /var/www/html/mahara/htdocs
    <Directory /var/www/html/mahara/htdocs>
        Options Indexes FollowSymLinks
        AllowOverride All
        Require all granted
        DirectoryIndex index.php
    </Directory>
</VirtualHost>


<VirtualHost *:80>
    DocumentRoot /var/www/html/mahara/htdocs
    <Directory /var/www/html/mahara/htdocs>
        Options Indexes FollowSymLinks
        AllowOverride All
        Require all granted
        DirectoryIndex index.php index.html
    </Directory>
</VirtualHost>

{
    "name": "mahara/mahara",  
    "description": "Mahara is an open-source ePortfolio and social networking web application.",  
    "require": {  
        "php": ">=7.2",  
        "ext-gd": "*",  
        "ext-mysqli": "*",  
        "ext-intl": "*",  
        "cweagans/composer-patches": "^1.7"  
    },
    "require-dev": {  
        "phpunit/phpunit": "^9.0"  
    },
    "config": {  
        "allow-plugins": {  
            "cweagans/composer-patches": true  
        }
    }
}


version: '3.8'  
services:
  mahara:
    build: .
    ports:
      - "8080:80"  
    volumes:
      - ./data:/var/www/html/mahara/data
      - ./config/config.php:/var/www/html/mahara/htdocs/config.php
      - ./000-default.conf:/etc/apache2/sites-available/000-default.conf  # Füge diese Zeile hinzu
    environment:
      - MYSQL_HOST=db
      - MYSQL_DATABASE=mahara
      - MYSQL_USER=mahara
      - MYSQL_PASSWORD=secret
  db:
    image: mysql:5.7
    environment:
      - MYSQL_ROOT_PASSWORD=rootpassword
      - MYSQL_DATABASE=mahara
      - MYSQL_USER=mahara
      - MYSQL_PASSWORD=secret
    volumes:
      - db_data:/var/lib/mysql
volumes:
  db_data:


FROM php:7.4-apache

# Install necessary packages
RUN apt-get update && apt-get install -y \
    libpng-dev libjpeg-dev libfreetype6-dev libmcrypt-dev libicu-dev libxml2-dev \
    mariadb-client git zip unzip make curl \
    && docker-php-ext-install gd mysqli intl xmlrpc \
    && a2enmod rewrite

# Install Composer
RUN curl -sS https://getcomposer.org/installer | php -- --install-dir=/usr/local/bin --filename=composer

# Install nvm and Node.js
ENV NVM_DIR=/root/.nvm
ENV NODE_VERSION=16

RUN curl -o- https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.4/install.sh | bash && \
    . "$NVM_DIR/nvm.sh" && \  
    nvm install $NODE_VERSION && \
    nvm use $NODE_VERSION && \
    ln -s "$NVM_DIR/versions/node/$(nvm version)/bin/node" /usr/bin/node && \  
    ln -s "$NVM_DIR/versions/node/$(nvm version)/bin/npm" /usr/bin/npm && \  
    npm install --global yarn gulp && \
    ln -s "$NVM_DIR/versions/node/$(nvm version)/bin/yarn" /usr/bin/yarn && \  
    ln -s "$NVM_DIR/versions/node/$(nvm version)/bin/gulp" /usr/bin/gulp && \  
    chmod +x "/usr/bin/node" "/usr/bin/npm" "/usr/bin/yarn" "/usr/bin/gulp"  

# Set the working directory
WORKDIR /var/www/html

# Clean the html directory and clone Mahara source code
RUN rm -rf /var/www/html/* && git clone https://git.mahara.org/mahara/mahara.git /var/www/html/mahara

# Mark the directory as safe for Git
RUN git config --global --add safe.directory /var/www/html/mahara

# Copy composer.json and composer.lock
COPY ./composer.json ./composer.lock /var/www/html/mahara/

# Kopiere die angepasste 000-default.conf in den Apache-Konfigurationsordner
COPY ./000-default.conf /etc/apache2/sites-available/000-default.conf

# Allow Composer plugin
RUN composer config --no-plugins allow-plugins.cweagans/composer-patches true

# Install Mahara dependencies via Composer
RUN composer install --no-dev

# Install Yarn dependencies and check available gulp tasks
RUN /bin/bash -c "source $NVM_DIR/nvm.sh && yarn install && gulp --tasks"  

# Check if 'build' task exists before running it 
RUN /bin/bash -c "source $NVM_DIR/nvm.sh && if gulp --tasks | grep -q 'build'; then gulp build; else echo 'No build task found'; fi"  

# Copy config.php into the container
COPY ./config/config.php /var/www/html/mahara/config.php

# Set permissions for www-data
RUN chown -R www-data:www-data /var/www/html && chmod -R 755 /var/www/html

# Set the DocumentRoot to the Mahara htdocs directory
RUN echo 'DocumentRoot /var/www/html/mahara/htdocs' > /etc/apache2/sites-available/000-default.conf  

# Expose the default port
EXPOSE 80


<?php
$cfg = new stdClass();

// Datenbankkonfiguration
$cfg->dbtype = 'mysql';  // Oder 'postgres', falls du PostgreSQL verwendest  
$cfg->dbhost = 'db'; // Der Name des DB-Services in der docker-compose.yml  
$cfg->dbname = 'mahara'; // Der Name der Datenbank  
$cfg->dbuser = 'mahara'; // Der Benutzername für die Datenbank  
$cfg->dbpass = 'secret'; // Das Passwort für die Datenbank  

// Datenverzeichnis
$cfg->dataroot = '/var/www/html/mahara/data'; // Das Verzeichnis für Daten (dies sollte auf das Volume verweisen)  

// URL der Anwendung
$cfg->wwwroot = 'http://localhost:8080'; // Die URL, unter der Mahara erreichbar ist  

// Weitere Einstellungen (optional)
$cfg->theme = 'default'; // Das Standard-Theme  
$cfg->debug = false; // Debugging deaktivieren
$cfg->enablelog = true; // Logging aktivieren

// Wichtige Einstellungen
$cfg->release = '23.04.0'; // Version von Mahara (aktualisieren, wenn notwendig)  

//Loging
$cfg->debug = true;
$cfg->perftofoot = true;
$cfg->log_dbg_targets = LOG_TARGET_SCREEN | LOG_TARGET_ERRORLOG;

When i open the website in a browser, i only see

# Index of /
|![[ICO]](http://localhost:8080/icons/blank.gif)|[Name](http://localhost:8080/?C=N;O=D)|[Last modified](http://localhost:8080/?C=M;O=A)|[Size](http://localhost:8080/?C=S;O=A)|[Description](http://localhost:8080/?C=D;O=A)|
| --- | --- | --- | --- | --- |
|---|
|![[ ]](http://localhost:8080/icons/unknown.gif)|[config.php](http://localhost:8080/config.php)|2024-10-23 12:22|1.0K||
|---|

Apache/2.4.54 (Debian) Server at localhost Port 8080

Can anyone help?

Thanks 4 all
Spartak-avatar
Spartak 171 days ago
Spartak has registered
Focus: Networks - User group: Researcher.
dorjjj-avatar
dorjjj 172 days ago
dorjjj has registered
Focus: Windows in general - User group: Administrator.
fizzpin-avatar
fizzpin 173 days ago
fizzpin has registered
Focus: Other systems - User group: Administrator.
xskidy-avatar
xskidy 177 days ago
xskidy has registered
Focus: Server in general - User group: Administrator.
pegnose-avatar
pegnose 177 days ago
1 commentSolved
Comment: RDP connection to Windows 10 client fails with code 0x904
Figured it out myself. Turns out there was an issue with the TLS certificate used for RDP services. I had to delete the current one.

I found got a System error event in the logs relating to the source "Schannel" (id 36870) and the TLS server private key. I also got a security Audit failure event (id 5016) pointing me to the TSSecKeySet1, which apparently failed to open.

The solution was to delete the TSL certificate used by RDP service. I did this via the mmc and the snap-in "Certificates"., where there is a section for Remote Desktop. It seems you can just delete the RDP certificate and a new one gets created upon next connection.

This old article also pointed me in the right direction:
https://oli.new-lan.de/2017/11/probleme-mit-rdp-schannel-event-id-36870- ...

Log Name:      System
Source:        Schannel
Date:          20.10.2024 19:47:00
Event ID:      36870
Task Category: None
Level:         Error
Keywords:      
User:          SYSTEM
Computer:      xxx
Description:
A fatal error occurred when attempting to access the TLS server credential private key. The error code returned from the cryptographic module is 0x8009030D. The internal error state is 10001.
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">  
  <System>
    <Provider Name="Schannel" Guid="{1f678132-5938-4686-9fdc-c8ff68f15c85}" />  
    <EventID>36870</EventID>
    <Version>0</Version>
    <Level>2</Level>
    <Task>0</Task>
    <Opcode>0</Opcode>
    <Keywords>0x8000000000000000</Keywords>
    <TimeCreated SystemTime="2024-10-20T17:47:00.7027659Z" />  
    <EventRecordID>55148</EventRecordID>
    <Correlation ActivityID="{faca067a-2310-0002-d506-cafa1023db01}" />  
    <Execution ProcessID="980" ThreadID="596" />  
    <Channel>System</Channel>
    <Computer>xxx</Computer>
    <Security UserID="xxx" />  
  </System>
  <EventData>
    <Data Name="Type">server</Data>  
    <Data Name="ErrorCode">0x8009030d</Data>  
    <Data Name="ErrorStatus">10001</Data>  
  </EventData>
</Event>

Log Name:      Security
Source:        Microsoft-Windows-Security-Auditing
Date:          20.10.2024 19:47:00
Event ID:      5061
Task Category: System Integrity
Level:         Information
Keywords:      Audit Failure
User:          N/A
Computer:      xxx
Description:
Cryptographic operation.

Subject:
	Security ID:		NETWORK SERVICE
	Account Name:		xxx
	Account Domain:		xxx
	Logon ID:		0x3E4

Cryptographic Parameters:
	Provider Name:	Microsoft Software Key Storage Provider
	Algorithm Name:	UNKNOWN
	Key Name:	TSSecKeySet1
	Key Type:	Machine key.

Cryptographic Operation:
	Operation:	Open Key.
	Return Code:	0x80090016
Event Xml:
<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">  
  <System>
    <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-a5ba-3e3b0328c30d}" />  
    <EventID>5061</EventID>
    <Version>0</Version>
    <Level>0</Level>
    <Task>12290</Task>
    <Opcode>0</Opcode>
    <Keywords>0x8010000000000000</Keywords>
    <TimeCreated SystemTime="2024-10-20T17:47:00.7027575Z" />  
    <EventRecordID>259778</EventRecordID>
    <Correlation ActivityID="{faca067a-2310-0002-d506-cafa1023db01}" />  
    <Execution ProcessID="980" ThreadID="596" />  
    <Channel>Security</Channel>
    <Computer>xxx</Computer>
    <Security />
  </System>
  <EventData>
    <Data Name="SubjectUserSid">xxx</Data>  
    <Data Name="SubjectUserName">xxx</Data>  
    <Data Name="SubjectDomainName">xxx</Data>  
    <Data Name="SubjectLogonId">0x3e4</Data>  
    <Data Name="ProviderName">Microsoft Software Key Storage Provider</Data>  
    <Data Name="AlgorithmName">UNKNOWN</Data>  
    <Data Name="KeyName">TSSecKeySet1</Data>  
    <Data Name="KeyType">%%2499</Data>  
    <Data Name="Operation">%%2480</Data>  
    <Data Name="ReturnCode">0x80090016</Data>  
  </EventData>
</Event>