awesome info Todd i'll get my web admin researching that ASAP, and i'll report back anything found too.
cheers niall On Fri, Dec 4, 2015 at 4:12 PM, Miller, Todd <[email protected]> wrote: > I pressed the folks at bluecoat to give us details on why windows-noob was > being blocked. “I need it to do my job and it has been blocked for a > month!,” I said and if it is just because it is hosting scripts that might > look dodgy, then that is to be expected. Lots of client management scripts > can appear to be “hacker tools” to heuristic scans. Meanwhile, I’ve > discovered the wifi in the office next to mine doesn’t go through a proxy, > so if I take a laptop and sit right next to the wall in my office I can > access windows-noob and myitforum. It is pretty inconvenient, but worth > it. > > > > This is the direct response we got from bluecoat on Wed Dec 4th about > Windows-Noob. – they did not respond to us regarding MyItForum. > > After review, this domain has been redirecting/referring to a known > exploit kit domain, smartfenia[.]com. Traffic for this has been happening > for the last week and is current (within the last 24 hours). The MO of this > attack is that a malicious injected script has been placed somewhere on > this site. I am unable to identify exactly where. The current rating will > be maintained until this behavior ends. Thank you for your submission. > > I don’t know anything about web hosting so I don’t know if that > information is useful, accurate, or relevant to you. If we start blocking > every site that LINKS to a bad site, well there is not going to be much > left on the internet. It is a “web” after all. > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Niall Brady > *Sent:* Thursday, December 03, 2015 11:56 PM > *To:* [email protected]; Rod Trent > > *Subject:* Re: [MDT-OSD] persistent Pre-TS action in WinPE? > > > > thanks Rod for that info, I did request more info several times previously > but did not get that snippet of info, however i will now run with it and > update this thread once i know more, i do appreciate that info! > > > > On Fri, Dec 4, 2015 at 12:49 AM, Rod Trent <[email protected]> wrote: > > Actually, there’s more to it and not necessarily due to out of date > plugins. Google changed its criteria recently on the “safeness” of > downloadable scripts – which myITforum has supplied for the last 15 years > for IT folks . A lot of those proxy protector sites pull information from > Google to update their own service. Until Google updates, the won’t update. > So the issue is with Google. We’re actively working on it, but, Niall, you > might also check to ensure you fit Google’s criteria. > > > > > > > *From: *Niall Brady > *Sent: *Thursday, December 3, 2015 5:57 PM > > *To: *[email protected] > *Subject: *Re: [MDT-OSD] persistent Pre-TS action in WinPE? > > > > > > no problem Todd, glad to have helped finally, > > as regards windows-noob being blocked or comprimised, *it's a farce*, it > all stems from myitforum.com having had wordpress plugins that were *out > of date*, as a result that site (myitforum) got blacklisted, and in turn > as i had *11 links back to myitforum.com <http://myitforum.com>*, > amazingly windows-noob.com got blacklisted. yes you read it right, > windows-noob was blacklisted because of out of date plugins on > myitforum.com. > > sadly, those proxy protector sites that blacklisted windows-noob aren't > that clever at updating their cached results, so even though i removed the > links about two weeks ago, my site still remains blacklisted, even at the > company i work for. > > i'm really not impressed by that at all. :( > > > > On Thu, Dec 3, 2015 at 11:44 PM, Miller, Todd <[email protected]> > wrote: > > Niall --- thank you *very* much for this tip. I have all kinds of other > ideas on how to use this. Your post at www.windows-noob.com was easy to > follow and worked great. I got it right on the first try! which is great > because updating the WinPE boot image is quite a task to have to iterate > with tweaks/changes/typos over and over. > > > > In my opinion Microsoft’s field guide for OSD 802.1x implementation should > be updated to include this method to re-establish an 802.1x connection > during WinPE phases. > > > > > > It looks like I will have to neither retire early nor take a long vacation > J > > > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Niall Brady > *Sent:* Wednesday, December 02, 2015 11:58 AM > *To:* [email protected] > *Subject:* Re: [MDT-OSD] persistent Pre-TS action in WinPE? > > > > Have a look at checkfornetwork and storage on windows noob, it runs > before sny prestarts via a reg hack > > > > Sent from my phone, please excuse any typo's as a result. > > > > > On 02 Dec 2015, at 18:21, Miller, Todd <[email protected]> wrote: > > I am interested in running a pre-TaskSequence routine *every time* my > clients boot into WinPE during a task sequence. What is the best way to > accomplish this? I’m not talking about a pre-execution hook which only > runs on *first* WinPE boot. > > > > I have added a command to unattend.xml on the WinPE image and it works > great for the first boot onto the WinPE OS, but when the TS engine stages > the Boot Image onto the disk for subsequent PE reboots, it overrides that > function with its own WinPEUnattend.xml > > > > Is there a way for me to insert anything in front of the Task Sequence > engine to run before the Task sequence takes over? > > > > I want to use this to attach to our 802.1x network, but it could be used > to re-establish DART or any of number of things. > > > > Of course I can insert items in the task sequence after every “Reboot” > item to re-establish the network, but it would be much better if I could > just make that happen at every reboot. Putting those in the TS itself > sub-optimal since there is a long delay at each TS startup if the network > is not available. Is there any way to insert my own code into the WinPE > start for all the staged PE reboots? > > > > I have started re-look at OSDInjection.xml as I used that previously to > write a custom smsts.ini file to my WinPE boot images. It doesn’t appear > that winpeshl.ini is listed in OSDInjection.xml so some other process is > creating that file? I think my best hope is to use this process to inject > the necessary 802.1x files into the WINPE image using the standard means > for extra files and then use osdinjection.xml to figure out how to modify > the WinPE startup process. Just not sure which ini file I need to > inject/modify that can survive both the WinPE build process and the TS > WinPE staging process. I think the console even overwrites the > WinPESHL.ini file if I use OSDInjection.xml to write a custom one. Ugh! > > > > > > I really could use a way to inject a network startup process into the > WinPE boot process - not only to establish 802.1x connections but I think > others could use it to establish VPN early in the WinPE boot process as > well. > > > > > > > > (Please --- I’m not interested in bypassing 802.1x in other obvious ways > like having build benches with 802.1x disabled ports or using MAC > whitelisted devices to bypass 802.1x auth… I know about those options and > am using them already. We want to get away from whitelisted USB Ethernet > adapters for deskside re-deploys) > > > > Notice: This UI Health Care e-mail (including attachments) is covered by > the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is > confidential and may be legally privileged. If you are not the intended > recipient, you are hereby notified that any retention, dissemination, > distribution, or copying of this communication is strictly prohibited. > Please reply to the sender that you have received the message in error, > then delete it. Thank you. > > > > Notice: This UI Health Care e-mail (including attachments) is covered by > the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is > confidential and may be legally privileged. If you are not the intended > recipient, you are hereby notified that any retention, dissemination, > distribution, or copying of this communication is strictly prohibited. > Please reply to the sender that you have received the message in error, > then delete it. Thank you. > > > > > > > > > > > ------------------------------ > Notice: This UI Health Care e-mail (including attachments) is covered by > the Electronic Communications Privacy Act, 18 U.S.C. 2510-2521, is > confidential and may be legally privileged. If you are not the intended > recipient, you are hereby notified that any retention, dissemination, > distribution, or copying of this communication is strictly prohibited. > Please reply to the sender that you have received the message in error, > then delete it. Thank you. > ------------------------------ >
