Here is a link to an online utility that can check your router to see if it has been hacked. In the last couple of months, the number of routers that have fallen victim to certain vulnerabilities has risen drastically. I will add that this appears to be more of an issue with European countries, but for the sake of a minute to run the check, it is worth it as these compromised routers can give an attacker full access to your home network and all of the devices on it.
Here is the link: Wordfence Router Check
The page explains what is going on and the button for the utility is about half way down – once again, just for the peace of mind, I would urge you to run this. The site also gives some suggestions if it comes back with a vulnerability detection.
This post is about how to process a Windows Server 2012 or 2016 domain controller to synchronize its time with a trusted external resource. Having a valid and accurate time source is critical for a properly configured domain.
Use your favorite search engine to locate the trusted NTP time servers for your area. I am located in Canada and so I will be using
Log into your domain controller with administrative credentials and launch a command prompt.
Stop the time service:
net stop w32time
Enter the following to configure your NTP time servers:
w32tm /config /syncfromflags:manual /manualpeerlist:"0.ca.pool.ntp.org, 1.ca.pool.ntp.org, 2.ca.pool.ntp.org, 3.ca.pool.ntp.org"
and then hit Enter. Remember to use your time servers in place of *.ca.pool.ntp.org.
Let the domain controller know that these are your trusted servers:
w32tm /config /reliable:yes
Restart the Time Service:
net start w32time
Review the results:
w32tm /query /configuration
Ensure everything is proper and typed correctly and if so, close the command prompt.
OK, every now and then, I admit I create a post for my own benefit and to make sure I have the ‘fix’ in a handy place for later reference. This post is about how to clear out the ‘hidden’ cache credentials that Microsoft creates when you use your system to access network related objects like a remote drive share.
If you get into a position where Windows tells you that you have ‘too many failed log on attempts’ or that your ‘credentials are out of date’, than this little shortcut might be the fix.
From and Administrative command prompt, run the following:
rundll32.exe keymgr.dll, KRShowKeyMgr
and hit Enter. You should be presented with a list of cached credentials. All you need to do is to ‘Remove’ the one that you are having issues with like a remote network drive share.