This can happen for several reasons, mostly related to too much bogus traffic hitting your RDP port. It is best practice to only allow RDP access to a limited set of static IP's, only access via firewall or if the other two options are not possible change the default port for RDP access to help limit default bogus traffic.
With that said, the quickest way to solve this problem without a reboot is to simple disable the network adapter and reenable it.
Step by Step:
- Login to your Hyper-V manager
- Connect to the Guest VM in question
- Open the network manager and change adapter settings or Control Panel\Network and Internet\Network Connections
- Once on this screen simply right click the adapter and disable, then reenable.
Thats it, your issue should now be solved.
This error is caused because 3dm2 uses a no longer supported SSL cipher. Normally in order to fix this issue you would just issue an updated SSL cert but 3DM2 does not offer this option, so you will need to open up a legacy browser.
On windows you will need to run internet explorer
then open the local server address, https://localhost:888/
It is possible you will need to go into internet explorer > internet options > advanced and enable addition SSL protocols as well.
When adding, updating or replacing an SSL certificate you encounter the error "NET::ERR_CERTIFICATE_TRANSPARENCY_REQUIRED"
This is most common with LetsEncrypt SSL as they seem to be overutilizing resources.
The issue happens when the LetsEncrypt servers are behind on pushing transparency proof logs and google chrome caches the cert info before those logs are in place. In most cases this will resolve itself within 5 minutes or so but may require you to close the browser and reopen it or even clear the cache on the affected browser. In some cases it can take much longer and may even require a reissue of the cert.
In some cases using the HTTP Response Headers option to manually set the server still shows Microsoft IIS server headers, for example:
Open configuration editor
then go to section system.webServer/security/requestFiltering and update the removeServerHeader to True
If you're wondering why you are receiving more spam then usual this could be part of the issue.
Seems amazon.com account emails were disclosed by mistake recently.
Here is the Notification:
Sender:
Amazon.com <no-reply@amazon.com>
Header Info:
Received-SPF: pass (hidden: domain of bounces.amazon.com designates 54.240.13.69 as permitted sender)
client-ip=54.240.13.69
Received: from a13-69.smtp-out.amazonses.com ([54.240.13.69]) by hidden with
ESMTPS (version=TLS1_2 cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P521); Tue, 27 Nov 2018 14:43:50 -0600
Subject:
Important Information about your Amazon.com Account
Here is the message:
Hello, We’re contacting you to let you know that our website inadvertently disclosed your email address due to a technical error. The issue has been fixed. This is not a result of anything you have done, and there is no need for you to change your password or take any other action. Sincerely,Customer ServiceAmazonPlease note: this e-mail was sent from a notification-only address that cannot accept incoming e-mail. Please do not reply to this message.