Happy Cat Technologies welcomes you to its business web site. For 2016 we will continue to focus of phishing and hacking eradication. Help is an email away, and we intend to expose as many sites as possible to authorities, victims, and businesses affected by such activities.Alfred P. Reaud, Proprietor, Happy Cat Technologies.
- The oracle speaks -- Kanye West tweets McDonald's is his favorite brand - CNET
- Real men wear Samsung watches (says new Samsung ad) - CNET
- Dropbox hack leaks 68 million usernames and passwords - CNET
- More mystery and monsters in 'Stranger Things' season 2? - CNET
- CBS All Access launches ad-free option for $9.99 - CNET
- SF Man logs nearly 300 complaints against tech buses - CNET
- IFA 2016: All of the gadgets from Europe's biggest tech show - CNET
- Google adds new muscle to Snapseed photo editor for iPhone, iPad - CNET
- iPhone packaging pics boost headphone rumors - CNET
- Holmes and Watson look extra pensive in 'Sherlock' season 4 image - CNET
Wired Top Stories
- That Crazy Hyperloop Lawsuit Just Got Even Nastier
- Dear College Students: You Should Take Geology
- Techies Donate to Clinton in Droves. To Trump? Not So Much
- One Guy’s Years-Long Quest to Turn a Wrecked Classic Into a Racecar
- In Honor of The Night Of, We Pick the Greatest Finales Ever
- Nextdoor Breaks a Sacred Design Rule to End Racial Profiling
- Samsung’s Gear S3 Smartwatches Look Beautiful. You Know, Like Normal Watches
- Thanks For the Mortality Check, CNN’s Many Countdown Clocks!
- WIRED Binge-Watching Guide: Eastbound & Down
- Review: Hasselblad True Zoom Camera for Moto Z
- Half Of People Click Anything Sent To Them
- Lenovo's 'Yoga Book' Laptop Is So Thin It Needs A Touchscreen Keyboard
- Senate Committee Expected To OK Autonomous Car Bills in Michigan
- FDA Finds Flaws In Theranos' Zika Tests
- SETI's 'Strong Signal' Came From Earth
- No Coding in Palo Alto? City Takes On Silicon Valley Growth
- Google Search For Android Now Finds Info Hidden Inside Apps
- After Breaches At Other Services, Spotify Is Resetting Users' Passwords
- Samsung Delays Shipments of Galaxy Note 7 For Quality Control Testing
- SWIFT Discloses More Cyber Thefts, Pressures Banks On Security
FORT COLLINS/LOVELAND/LARIMER COUNTY AREAS -
AVOID BAJA BROADBAND/TDS AT ALL COSTS!
I run the secure shell service on a server to allow secure file transfer (sftp) and a remote terminal (ssh) between my mobile device at work and my computers at home. I don't use it often, and when I last used it from work, it didn't connect. So I figured that Baja Broadband changed the IP address, which ISP's are wont to do for home IP addresses.
So I go home, open the cable modem router, get the new IP address and plug it into the mobile device, and guess what, it doesn't work! Hours of work later, doing numerous tests both on the intranet and internet, port redirection, nmap, etc., I come to the disgusting conclusion that Baja Broadband/TDS is not just blocking the port, they are blocking the SSH protocol. Plainly, this is bullshit. Not only is SSH one of the most secure methods of remote login available, but they are allowing all the unsecured ports to function, like the cleartext http,
About a month ago I started having trouble with my Kali installation. It no longer found the repositories. I wound up having to use the TOR Browser Bundle to perform updates. This appeared strange, but I thought well, maybe there is a problem with the Kali repositories.
About two weeks ago, I had my network extender go down, and I had to replace it. I replaced it with an upgraded model, which allowed setting up a DNS search path. I just happened to use the Google Public DNS Server addresses of 188.8.131.52 and 184.108.40.206. Immediately, Kali repositories started working. Further Apple MacBook Air updates started occurring. So I looked at the cable modem, and guess what. All the DNS server entries pointed to Baja Broadband DNS servers. So what is up with that? Not only is Baja Broadband blocking Offensive Security (Kali) sites via DNS, but they are also blocking many more, such as elastic-security.com, to give an example…
I can test it simply. My network extender is set up to use Google Public DNS servers over WIFI. But it is set to use the cable modem configuration of Baja Broadband DNS servers if connected via Ethernet. If I try
As of Sunday, 5/17/2015, we are suspending all service except for emergency situations. Due to other commitments, we can only provide services on an emergency basis after seven PM on weekdays, and on weekends. The services struck out below are no longer provided until further notice. Sorry for any inconvenience, and thank you for your time and patronage.
Happy Cat Technologies provides the following services to clients in the Fort Collins/Loveland and local areas only:
Computer Maintenance, such as dust-out/cleaning, removing unwanted preinstalled applications, installing/upgrading applications, removing malware and viruses, creation of emergency boot disks, optimizing (speed up), diagnostic troubleshooting, etc. We support Windows (XP-7), OS-X, and Linux operating systems.
- Tower and laptop hardware servicing including hardware installation, upgrading, troubleshooting, and defective component replacement. Limited Mac hardware support due to Apple product policies.
- Data Recovery and Backup, to mitigate disaster situations, such as when Windows won't start. We also provide Windows password recovery. We can recommend and setup backups to local media (DVD), removable media (flash drive, external hard drive), or to Cloud (SOS Backup, Carbonite, etc).
- Network/WIFI consultation, design, installation, configuring and troubleshooting, including cable routing. We also do security evaluations of WIFI installations.
Web site provisioning from initial consultation to development,
Recently, I had the dubious pleasure of updating a friend's MacBook for OS X 10.6.8 to 10.9. It started as normal, with a backup to DVD of all data that my friend couldn't afford to loose, such as pictures, documents, etc. Normal SOP for significant OS updates.
After that, the update was started. First off, we had to figure out what the Apple ID and password were. That took a bit of time, but we finally found the piece of paper with the critical information. Once we started the update the real fun started. First off, we only had a 500KBS connection. That translates out to an approximately 3 hour download. You get what you pay for, LOL. The reason for doing this update was that my friend needed the speech to text capability that is now part of Maverick. A bit on that later, as all was not what it seems with that application.
So the update downloaded, and the MacBook updated to OS X 10.9, after more post-update updates. Maverick, BTW, has a definition as an adjective of "unorthodox". There were nothing but problems
For our two year anniversary, which was about a week ago but we were busy, we're going to offer guaranteed problem solution, or no charge for the visit.
As an example, we go out to your house to configure up your old router for allowing access to your new iPad. If we can't do so (like we didn't confirm that you had the administration password, LOL), Happy Cat Tech won't charge you for the visit.
We'll have something special around the Fourth of July holiday, so keep checking back, and thanks for the visit.
We've got a special deal for you in the month of April. During April, we'll install Ubuntu 12.04 LTS Linux and accompanying applications for the very low price of $45 per machine to allow as seamless a transition as possible from Windows to Linux. This installation includes (many more come with basic install):
- Ubuntu 12.04 LTS operating system installation, disk encryption, etc.
- LibreOffice, a OpenSource replacement for Microsoft Office Suite or Office 360.
- GIMP, the GNU Image Manipulation Program.
- A choice of Firefox, Chrome, Opera and Ephiphany web browsers with flash support available.
- Adobe Reader.
- Thunderbird Email.
- VLC Media Player by VideoLAN.
- K3b CD/DVD Burner.
This list is the minimum install for usability, and there are thousands
If you operate a content management systems (CMS), you're probably familiar with the curse of botnet attacks on the user registration and persistent spammers on comments. These are IP address that are attached to your CMS from China, i.e. the 163.com domain, sending regular, daily spam message updates about Viagra, Cialis, and faux haute couture, sometimes for years on end. Or they continuously try to attack the user registration CAPTCHA, trying to create accounts to do the same or worse, sometimes using inane responses to the CAPTCHA like "TooBad1" through "TooBad257", not really doing any damage but consuming sometimes scarce resources and filling up the logs (to mask other activity sometimes, like database attacks).
This is not a problem specific to any one CMS, and will happen to Drupal, Wordpress, or Joomla. Drupal, however, logs the events as part of core functionality, allowing them to be noticed by the operator. Having dealt with it for well over a year, mostly manually, I found two great modules in the Dupal repository
My in-house server was running Fedora 16, which is at end of life, so I decided to update to the latest Fedora release, which was 18. This came about because of an OpenVAS scan of the server detecting issues with httpd and other things. Also with a philosophy of being tired of GNOME 3's idiosyncrasies, I decided to upgrade to Fedora 18-KDE instead of the Gnome version. Four operating system installations later, I wound up installing Ubuntu 12.04 with GNOME 3, LOL! Approximately 24 hours real time was used, and I'm getting damn good at it!
(Fedora KDE Live Media, i686, 844.1MB, Direct Download) Promises to be a great OS, and installed in an excellent fashion, except for the problem related below with partitioning the disk drives how you want as opposed to how Fedora 18 wants. This version requires a DVD because it's 844MB, and my problems started here, as an omen. The first thing I had to do after burning the ISO is swap out the DVD drive in the target system. Install proceeded well, and I succumbed to Fedora 18
With most modern operating systems, full disk checking requires that the device be unmounted. With Windows 7, Vista, and XP, that is true, and one has to reboot to get disk checking started. If "scan disk for bad sectors" option is selected, running disk checking can take an appreciable time, sometimes hours depending on the size of the disk. Once started, this may not be terminated, on advice of Microsoft Support. “… Please note that it is not recommended to stop or interrupt the chkdsk running on the computer until it completes by itself. …” Srinivas R, Microsoft Support.
This can cause the customer problems if the system is rebooted Monday
Happy Cat is going to be getting back in the groove and focusing more on increasing our business, as the business needs to start paying the bills. For that we need your help out there. For the month of March, we have special going on, $45 to service your PC. It's a sweet deal, as usually the process would be more than $90 at our regular rate.
Call up the office number (970) 672-8298 and set up a service call or appointment for service at the shop.
Thanks for your time, and Happy Computing!
- 24% off Zackees LED Turn Signal Bike lights
- Panasonic's new 4K camcorder does better in low light
- Panasonic's new 4K camcorder does better in low light
- Lenovo's Yoga Book makes it easy to be creative on the go
- Lenovo readies VR-ready Google Daydream devices
- Lenovo will ditch hard keyboards in planned Chromebook and 2-in-1s
- Hands on: The Moto Z Play brings down the cost of modularity
- Hands-on: The Hasselblad True Zoom adds 10x optical zoom to your Moto Z
- Windows 10's new beta lets computers download updates from other PCs
- Asus Zenbook Pro UX501VW review: Killer specs and pricing, offset by small flaws
- 'Iron Man' director's VR game lands on September 8th
- Facebook's sticker search has a queasy political reaction
- Logitech's new mouse works with three computers at once
- Democrats want FBI to investigate any Trump link to cyberattacks
- Facebook promises to stabilize shaky 360-degree videos
- Nubia's 'bezel-less' Z11 smartphone launches worldwide
- 'Second Life' studio invites VR players to try 'Project Sansar'
- The DxO One gets Wi-Fi control and a suite of accessories
- Bill Nye lands a Netflix show
- SETI's 'unusual signal' most likely came from Earth
- Two-Year-Old Prodigy Finds Viciously Perfect Solution to the Trolley Problem
- Fun Video Edits Together Your Favorite Movie Characters Into One Awesome Bathroom Scene
- Saga Is the Best Comic in the Universe Because It Shows You How Evil Robots Jack Off
- Did Tesla Quietly Remove A Safety Feature From The Model X's Falcon Doors?
- Google Coder Analyzes a Billion Files to Find a Winner in Tabs vs Spaces Debate
- The Staggering Evolution of Stop-Motion in Film History
- iPhone Glitch Transforms Cats Into Caterpillars
- How to Watch the Ring-of-Fire Solar Eclipse
- Jalopnik The BBC Wants To Close Your Top Gear-Stealing Loophole, You Thieves | Lifehacker Four Thing
- Mark Zuckerberg Wishes He Could Control People Like Code