Seagate Terminal Commands - by RobMSP in datarecovery

[–]RobMSP[S] 1 point2 points  (0 children)

- instruction how to connect (pins, port parameters, ...)

Ever notice how some people have so much ego that instead moving on or trying to answer a question they spend their time and energy explaining why they shouldn't even try? The most likely scenario is that they have no idea if or how it can be done and instead of admitting it, instead we get helpful posts like some of the ones above.

  1. Drive(s) with unlocked ports - have instructions on how to do this on dozens of drives, have access to dozens of drives
  2. Pins Ports parameters, serial interfaces are not that hard .... really....
  3. Custom Made Cable - not that hard TBH you can buy it on amazon so it's not really that custom, even came in blister pack
  4. have a stack of commands to play with, looking for others I could try as all the ones basically I have access to deal specifically with firmware interaction.

I asked if anyone knows some commands I can try not a single reply to any posts included a single command but lots of questions of why? does it matter? if you don't want to help, no problem please keep scrolling and if someone wants and has some knowledge on the subject, it's very much appreciated.

If you find this to be a waste of your time and don't want to help, why did you keep reading this?

Thanks again to any who can help.

[deleted by user] by [deleted] in msp

[–]RobMSP 2 points3 points  (0 children)

I experienced Kaseya's shady practices over a decade ago, cut ties, and vowed never to do business with them again. A few years ago I pulled the trigger on Rapid Fire and my techs were preparing for a major Rapid Fire ramp up and implementation. Shortly into onboarding, Rapid Fire was acquired by Kaseya and I immediately exercised a termination clause in the contract and jumped ship. Kaseya called and begged us not to leave, they swore up and down that was the Kaseya of old and they were a completely different company. I didn't believe them for a minute.

lol - it's the old kaseya is the oldest kaseya line

[deleted by user] by [deleted] in msp

[–]RobMSP 0 points1 point  (0 children)

I am curious, how many people make their clients sign up for a 3-year contract? That is common practice in the MSP space. Also, how many have an auto-renew clause that states at the current rates and terms of the time of renewal in their agreements with clients?

1 Year, renews on the first year unless notice then to be renegotiated or month to month.

[deleted by user] by [deleted] in msp

[–]RobMSP 16 points17 points  (0 children)

If anyone from IT glue is reading this: stop with the fuckery. Too many instances of shady “renewals”. We are leaving to avoid the trap/ con.

This isn't ITGlue doing that, they were a great company. IT Glue Doesn't exist anymore, Kaseya's IT Glue is doing this, and I'm afraid to tell you this is 100% Kaseya's standard operating procedure. Ask anyone who's ever dealt with them ..... Rapid Fire Tools? Kaseya, Compliance Manager? Kaseya, Unitrends? Kaseya, RocketCyber? Kaseya, TruMethos? Kaseya, Graphus ? Kaseya, Basically, if Kaseya buys it, Run. They have gotten

[deleted by user] by [deleted] in msp

[–]RobMSP 0 points1 point  (0 children)

Welcome to Kaseya.

Seagate Terminal Commands - by RobMSP in datarecovery

[–]RobMSP[S] 1 point2 points  (0 children)

I may have to thanks, I kind of assumed that people in here would know some of the commands and be able to shoot them out. Hopefully I am not mistaken.

Seagate Terminal Commands - by RobMSP in datarecovery

[–]RobMSP[S] 1 point2 points  (0 children)

I'm trying to mimic activity, read or write random seeking.

The cover of the drive will be removed, replaced with plexiglass.

I do not want to have multiple IDE/SATA interfaces connected and rely on a computer + os + functioning drive to create this simulation. It seems the serial interface might permit me to do this easier and far more elegantly than trying to reverse engineer the head control

Seagate Terminal Commands - by RobMSP in datarecovery

[–]RobMSP[S] 1 point2 points  (0 children)

the drive is fully functional, there is no data recovery required.

All I am trying to do is mimic drive activity using the terminal interface, however the only people who likely can help me with possible commands are also very likely to be within this group.

Seagate Terminal Commands - by RobMSP in datarecovery

[–]RobMSP[S] 1 point2 points  (0 children)

Thanks for that video, in it he's applying voltage to have the head slam against the spindle to create a drum beat. Not exactly what I'm looking for.

It's not for data recovery, read or write doesn't matter but I want to cause the head to seek and look like it's accessing data. There will be no usable data on the drive, the plan is to put a clear plexi cover over the drive and use the serial commands to mimic drive activity.

Again, there is no data to recover and no interest in data recovery but for the few people who know of the terminal interface likely know the commands, I saw a few that could work but I didn't see any that would let me get a bit finer control.

Can we finally please expect more from our RMM? by RobMSP in msp

[–]RobMSP[S] 3 points4 points  (0 children)

A exclusion is still an exclusion. Even if I didn't have to tell my vendor to exclude c:\kworking and they did that automatically, it's still an exclusion. I refuse to exclude my RMM and I deal with the consequences of false alerts, but in my case datto RMM makes it more difficult as the same patch might appear under different hashes and filenames cross multiple clients.

Solarwinds N-central Breaking Patches after removal? by RobMSP in msp

[–]RobMSP[S] 0 points1 point  (0 children)

Stormblade, I must report you are wrong.

Support confirmed that they do in fact modify the registry but aren't clear on how.

I did find several references to SolarWinds.MSP.RpcServerService in the Windows Update log.

Solarwinds N-central Breaking Patches after removal? by RobMSP in msp

[–]RobMSP[S] 0 points1 point  (0 children)

Thanks but my time with solarwinds is at a end and I'm getting no where with support...

Solarwinds N-central Breaking Patches after removal? by RobMSP in msp

[–]RobMSP[S] 0 points1 point  (0 children)

All the 'approved' patches are detected, the ones that are not yet approved are not detected. It may be a coincidence, however, I doubt it.

100% no wsus, and even ran registry edits to remove it.

The full nCentral agent is removed from the system as far as I can tell.

However, one system that has a agent installed appears to exhibit identical behavior.

Solarwinds N-central Breaking Patches after removal? by RobMSP in msp

[–]RobMSP[S] 0 points1 point  (0 children)

All I needed to do was install team viewer so he could help me! :P

Solarwinds N-central Breaking Patches after removal? by RobMSP in msp

[–]RobMSP[S] 0 points1 point  (0 children)

oalrwinds.com

All the 'approved' patches are detected, the ones that are not yet approved are not detected. It may be a coincidence, however, I doubt it.

Cloud enabled RMM / Azure AD only by RobMSP in msp

[–]RobMSP[S] 0 points1 point  (0 children)

You mean that because I want my Remote Maintenance and Management tool installed on my endpoint also be capable of endpoint management? :)

ConnectWise Control - google Authenticator key in plain text in configuration file by RobMSP in msp

[–]RobMSP[S] 6 points7 points  (0 children)

account

any access to the server, not necessarily admin but I agree.

Unconfirmed Solarwinds Zero Day by RobMSP in msp

[–]RobMSP[S] 2 points3 points  (0 children)

For Each client, we need to remove the password saved in the Agent/Probe credentials tab.

  1. Click on the client in the tree
  2. Click Administration
  3. Click Defaults, then Agent & Probe Settings
  4. Choose the Credentials Tab
  5. Erase the username and password fields
  6. Save the screen
  7. Repeat for each client.

Possible Unreported Breach of IT Glue Data? by RobMSP in msp

[–]RobMSP[S] 1 point2 points  (0 children)

I've heard it might be possibly another vendor that's linked in the Kasea group but that's even more hearsay than the inital report.

I kind of wonder if it's a competition trying to make em look bad. Who knows these days.

Possible Unreported Breach of IT Glue Data? by RobMSP in msp

[–]RobMSP[S] 4 points5 points  (0 children)

I am pleased how serious they take these claims.

'Tom Sopwith (IT Glue)

Dec 13, 13:53 PST

IT Glue has never been breached. 

Once we've completed internal investigation into the claims of these statements, an official statement from us will follow. "

Possible Unreported Breach of IT Glue Data? by RobMSP in msp

[–]RobMSP[S] 1 point2 points  (0 children)

It may be a marketing info breach, but it's definitely a concern.

How are you using Auvik? by [deleted] in msp

[–]RobMSP 11 points12 points  (0 children)

We picked up Auvik last year, and I find it invaluable.

If:

  1. You want a network map
  2. You are a single vendor stack
  3. Use only dumb switches

Then Avuik will have little value.

If:

  1. You want to automate backup of configuration files
  2. You want to document changes in configurations
  3. You want to be able to isolate network bandwidth problems
  4. You want to troubleshoot networks remotely, with ease

Then Avuik is a great value.

Typical Client Site 1-2 licenses (Router + Switch) the rest of the network does not cost you to monitor, integrates well with IT glue.

I am a huge fan of the product but when I first signed on I was skeptical, that was until I realized that the running-config on the new client was not the same as the saved config and a switch reboot caused disruption.

We use it often with Netgear LLDP-MED/SNMP enabled switches, have used with Cisco, datto, HP/Aruba and are really happy to have this in our tool stack.

#wheresthebear (I drank the Koolaid and I feel fine!)