Black Jack Experiment

Black Jack Experiment

Casino Advantage

  • 6 Deck: 0.597%
  • 4 Deck: 0.558%
  • 2 Deck: 0.550%
  • 1 Deck 0.168%
  • Blackjack House Edge Calculator – http://wizardofodds.com/games/blackjack/calculator/
  • Depth of Deal –  Depth of deal, or deck penetration, between shuffles. Anywhere from 2% to 90% of the cards may be dealt out
Advertisements

Engagement Contract Examples

Engagement Contract Examples

Microsoft CRM Dynamics HTTP Error 401 – Unauthorized: Access denied

Microsoft CRM Dynamics HTTP Error 401 – Unauthorized: Access denied

This article resolve this issue :- http://support.microsoft.com/kb/2686840

This seems to be triggered by Certificate rollover. You can check this here – AD FS 2.0 Consule / Service / Certificates

Application Evenlog


Event code: 3005

Event message: An unhandled exception has occurred.

Event time: 27/10/2014 11:52:18 AM

Event time (UTC): 27/10/2014 12:52:18 AM

Event ID: 19af9020e2484e83bd3bde0e0ad02613

Event sequence: 76270

Event occurrence: 65

Event detail code: 0

Application information:

Application domain: /LM/W3SVC/2/ROOT-1-130588374206093750

Trust level: Full

Application Virtual Path: /

Application Path: C:\Program Files\Microsoft Dynamics CRM\CRMWeb\

Machine name: CRM

Process information:

Process ID: 2828

Process name: w3wp.exe

Account name: NT AUTHORITY\NETWORK SERVICE

Exception information:

Exception type: SecurityTokenException

Exception message: ID4175: The issuer of the security token was not recognized by the IssuerNameRegistry. To accept security tokens from this issuer, configure the IssuerNameRegistry to return a valid name for this issuer.

at Microsoft.IdentityModel.Tokens.Saml11.Saml11SecurityTokenHandler.CreateClaims(SamlSecurityToken samlSecurityToken)

at Microsoft.IdentityModel.Tokens.Saml11.Saml11SecurityTokenHandler.ValidateToken(SecurityToken token)

at Microsoft.IdentityModel.Tokens.SecurityTokenHandlerCollection.ValidateToken(SecurityToken token)

at Microsoft.IdentityModel.Web.TokenReceiver.AuthenticateToken(SecurityToken token, Boolean ensureBearerToken, String endpointUri)

at Microsoft.IdentityModel.Web.WSFederationAuthenticationModule.SignInWithResponseMessage(HttpRequest request)

at Microsoft.IdentityModel.Web.WSFederationAuthenticationModule.OnAuthenticateRequest(Object sender, EventArgs args)

at Microsoft.Crm.Authentication.Claims.CrmFederatedAuthenticationModule.OnAuthenticateRequest(Object sender, EventArgs args)

at System.Web.HttpApplication.SyncEventExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()

at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)

Request information:

Request URL: <a href="https://crm.resimac.com.au:443/default.aspx">https://crm.443/default.aspx</a>

Request path: /default.aspx

User host address: ::1

User:

Is authenticated: False

Authentication Type:

Thread account name: NT AUTHORITY\NETWORK SERVICE

Thread information:

Thread ID: 3

Thread account name: NT AUTHORITY\NETWORK SERVICE

Is impersonating: True

Stack trace:    at Microsoft.IdentityModel.Tokens.Saml11.Saml11SecurityTokenHandler.CreateClaims(SamlSecurityToken samlSecurityToken)

at Microsoft.IdentityModel.Tokens.Saml11.Saml11SecurityTokenHandler.ValidateToken(SecurityToken token)

at Microsoft.IdentityModel.Tokens.SecurityTokenHandlerCollection.ValidateToken(SecurityToken token)

at Microsoft.IdentityModel.Web.TokenReceiver.AuthenticateToken(SecurityToken token, Boolean ensureBearerToken, String endpointUri)

at Microsoft.IdentityModel.Web.WSFederationAuthenticationModule.SignInWithResponseMessage(HttpRequest request)

at Microsoft.IdentityModel.Web.WSFederationAuthenticationModule.OnAuthenticateRequest(Object sender, EventArgs args)

at Microsoft.Crm.Authentication.Claims.CrmFederatedAuthenticationModule.OnAuthenticateRequest(Object sender, EventArgs args)

at System.Web.HttpApplication.SyncEventExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute()

at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously)

SCRIPT: Remotely install Windows Updates

SCRIPT: Remotely install Windows Updates


net use \\%computer%\admin$

xcopy wua.vbs \\%computer%\admin$

<span style="font-family: Calibri; font-size: 11pt;">psexec.exe @.txt -s " C:\Windows\System32\cscript.exe" "</span><span style="font-family: Calibri; font-size: 11pt;">c:\Windows\wua.vbs</span><span style="font-family: Calibri; font-size: 11pt;">" /Nologo</span>

wmic /node%computer% qfe list full /format:htable > %computer%_hotfixes.htm

Operation Procedure

  1. Preparation Reboot
  2. Services Check
  3. Updates
  4. Services Check
  5. Services Compare
  6. MBSA report

Config Manager Software Center

wmic /node:localhost ComputerSystem get PCSystemType

wmic /node:localhost qfe list full

Systeminfo

MBSA Scan

http://msdn.microsoft.com/en-us/library/windows/desktop/aa387102(v=vs.85).aspx

Realtime Dashboards

Realtime Dashboards

It always good to keep a eye on the world. Here are a few global real-time visualisation tools: