We recently had a client who used account tracking on their Konica Minolta. While all the computers were configured to print from the one account they really only used it when photocopying. This created an issue because we couldn’t find a way to deploy the tracking code through group policy so each time a new user logged into a PC they would have to configure the printers authentication.
Using process manager we were able to find the registry key that stores the authentication information. It is contained in
HKEY_CURRENT_USER\Software\KONICA MINOLTA\KONICA MINOLTA C650 Series PCL\FS1\KONICA C650\AccountTrack
If you configure a printer on a PC, export that key then write a login script to import that key on login the account tracking username and password will be setup.
When Microsoft released Server 2008 they had extended Group Policy to allow for a bunch of new things. These include mapping network drives and installing printers from within group policy removing the need to make a login script. For these to work with Windows Vista and XP a plugin called Client Side Extensions needs to be installed. Deploying these extensions can be done a number of ways including WDS and WSUS. However if you don’t have WDS configured updating clients with WSUS can take time we needed a way to do it the moment a computer was connected to the domain so we wrote a login script to do it. This script only works with Windows XP 32 and 64bit however you could easily extend it to work with Server 2003 and Vista.
For quiet some time I have had a couple of Guruplugs sitting on my desk. Recently I had the chance to have a play with them and decided to put Fedora on an SD card however ran into a few issues with an old version of uBoot. I decided to update uBoot and was then required to update the kernel version as well to get it to boot.
We recently had the need to configure a Linux box to be used as a RAS. It allows for external users to create a PPTP VPN to it. It is configured on Centos 5.5 and can use Radius or Active Directory/LDAP to authenticate however in this instance we are using a local users list.
I was always surprised when working for an ISP clients would ring and ask why they have gone over their quota. These aren’t home users many of these were major corporations spanning several sites with equipment several of our datacentres. Even in small networks it is important to know what data is traversing your network even if it is just to know who is running bit torrent and slowing everyone’s internet down. But it also has many more uses then that. It is a great way to detect anomalies in your network which most often are caused by Virus/Malware/Trogens all the fun stuff.