log

Microsoft Windows Security Audit Event Accesses IDs

I’m working on a powershell script extracting the file server audit log and creating a human readable html out of it when I got stumbled by the beautiful codes below (which are really hard to find) and decided that they deserve a re-post. Thanks to this guy for translating them. The list below is from WinXP, there are more codes in the newer windows versions, however, these are still valid. Here is the link to the TechNet post. BTW the Resource Hacker  still works and you can use it to extract the codes from %windir%\system32\msobjs.dll . Please note that you’ll have to translate them from HEX to decimal to receive the values you got from the… Read More »Microsoft Windows Security Audit Event Accesses IDs

SSL routines:SSL3_GET_CLIENT_HELLO:wrong version number or similar

After experiencing a pfsense log overflow with SSL routines:SSL3_GET_CLIENT_HELLO:wrong version number, SSL: 1 error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol and similar errors for a while I finally figured a way to reduce them to the more reasonable level by simply checking Disable webConfigurator redirect rule in the advanced settings. There are still some errors in the log though, however, way less than before. Remarks – Captive Portal is disabled, webConfigurator is accessible from Internet, pfsense version is 2.2.5-RELEASE (amd64) – there is a setting to completely disable lighthttpd logging (as it was before version 2) under settings of the system log