Resolving exchangesyncd memory leaks and synchronization issues on macOS

Posted by admin on May 12, 2024 under Tech Tips | Be the First to Comment

Exchangesyncd is a vital process that allows macOS users to seamlessly synchronize their Exchange emails, contacts, calendars, and tasks with their devices. This functionality is particularly essential for individuals and organizations that rely on Microsoft Exchange servers for email communication and collaboration needs.

How exchangesyncd works

Exchangeіyncd establishes a connection between native macOS applications, including Mail, Calendar, Contacts, and Reminders, and Microsoft Exchange servers. A key element of ExchangeSyncd’s functionality is the ActiveSync protocol, developed by Microsoft. ActiveSync facilitates seamless data transfer, allowing macOS applications and Exchange servers to communicate efficiently. This protocol supports synchronization not only across macOS devices but also on other platforms, including iOS and Android, making уxchangeіyncd a versatile solution for users managing data across multiple devices.

Resolving exchangesyncd memory leaks and sync issues

To set up Exchangeіyncd on a Mac, users must input their Exchange server details in the settings of the Mail, Calendar, Contacts, and Reminders applications. This includes entering the server address, username, and password. Once set up, exchangesyncd continuously syncs data between these applications and the Exchange server, ensuring up-to-date information across all connected devices.

Exchangesyncd also supports push notifications, delivering new emails, calendar events, and contact updates in real-time. This ensures users stay informed and on top of their email communication and schedules. By enabling seamless synchronization of email, calendar events, contacts, and tasks, exchangesyncd enhances productivity and efficiency for macOS users relying on Microsoft Exchange servers for collaboration needs.

Read more of this article »

Tips to combat the “Ryder will damage your computer” alert on Mac

Posted by admin on December 26, 2023 under Tech Tips | Be the First to Comment

The alert stating “Ryder will damage your computer” serves as a critical warning linked to a specific ad-generating entity known as Ryder, meticulously engineered to infiltrate Mac systems. As a potent advertising mechanism, Ryder seamlessly integrates with prevalent Mac browsers such as Safari, Chrome, and Firefox, functioning as a browser extension. Its primary operation involves inundating the browser with a diverse spectrum of online advertisements and directing users toward particular sponsored web domains. Recognized as a browser hijacker, Ryder’s invasive actions include altering vital browser configurations, such as the homepage and search engine, coupled with initiating unexpected navigational redirects. These modifications are not merely inconvenient; they significantly amplify the risk of exposure to harmful online material.

The adaptability and tenacity of Ryder, particularly in its compatibility with an extensive array of Mac browsers, are sources of significant concern. Its design allows for a challenging removal process, often possessing the capability to reinstate itself post-initial eradication efforts. This enduring presence signifies an ongoing hazard to the user’s online safety and the overall integrity of the system. The dangers linked to Ryder surpass mere irritation. Although Ryder in itself is not inherently damaging, the advertisements and web domains it endorses could lead users towards more severe threats such as Trojan horses, spyware, or ransomware. Moreover, Ryder’s ability to track browsing patterns and gather personal data introduces grave privacy issues. It has the potential to reroute searches to unverified and possibly malicious sites, thereby endangering personal information and system security.

“Ryder will damage your computer” alert on Mac

Confronting the persistent and vexing alerts like “Ryder will damage your computer” necessitates an understanding that these warnings often originate from more profound systemic issues. The designations displayed in these alerts are typically arbitrary and devoid of meaning, with a slim likelihood of corresponding to any readable file on the Mac. This complexity renders the resolution process arduous, as comprehensive searches may fail to produce the expected outcomes.

Read more of this article »

Tackling coreaudiod high CPU usage on Mac

Posted by admin on August 20, 2023 under Tech Tips | Be the First to Comment

In the intricate world of macOS, the coreaudiod process plays a pivotal role in managing audio functionalities. However, like many system processes, it can sometimes behave erratically, leading to high CPU and memory usage. This comprehensive article aims to shed light on the intricacies of the coreaudiod process, its association with high CPU consumption, and the steps to address such challenges.

The role of coreaudiod in macOS

The coreaudiod daemon is the backbone of Core Audio, the primary API responsible for all sound functionalities on macOS. Daemons in macOS are background processes, often identifiable by the “d” suffix in their names. While coreaudiod is indispensable for a myriad of tasks, from audio playback to recording, there are instances where it consumes disproportionate memory and CPU resources, leading to system sluggishness.

Factors leading to high CPU usage by coreaudiod

coreaudiod and WindowServer high CPU usage

Several underlying issues can cause coreaudiod to consume an excessive amount of CPU:

Absence of Critical Directories

A significant trigger is the disappearance of the /Library/Preferences/Audio/ directory. This directory is paramount for storing user-specific audio settings. If it’s missing, coreaudiod can get trapped in a loop, repeatedly trying to access a non-existent directory, culminating in high CPU usage.

Application Interference

Certain applications might not relinquish audio resources appropriately or prevent sleeping mechanisms in the system, causing coreaudiod to remain active and consume resources unnecessarily.

System Thermal Issues

The coreaudiod process, in conjunction with others like WindowServer, can experience a surge in CPU usage when the system detects potential overheating. This is a protective mechanism to avert hardware damage.

Read more of this article »

Active Directory password management tips to make an admin’s day

Posted by admin on March 10, 2023 under Tech Tips | Be the First to Comment

Ensuring safe password practices in an organization can be challenging, but thankfully, there are ways to make complex things easy in this area.

If you are no stranger to Active Directory, then you probably know how important it is to enforce the use of strong passwords across the network. The human element has always been in the crosshairs of cybercriminals who look for shortcuts to infiltrate enterprise environments, with weak authentication undermining the whole security architecture no matter how sophisticated the rest of the defenses are.

In an ideal world, every user on your team takes password hygiene seriously. In practice, admins can’t leave it to chance. Building your authentication hardening strategy around password policies is certainly the right approach. But what if Active Directory’s default tools don’t suffice or make this process too complicated? A great way to get around these limitations is to use Specops Password Policy, a tried-and-tested toolkit with unparalleled flexibility at its core.

Specops Password Policy

In addition to its user-friendly gist, there’s a handful of other things on the plus side of this solution. I would single out the following advantages:

  • Turnkey policy templates based on recommendations from Microsoft, NCSC, NIST, and NSA
  • Custom dictionaries of prohibited passwords
  • Support for passphrases
  • Indication of password entropy level
  • Feature that checks for and disallows passwords found in breach lists
  • Real-time feedback during password change
  • Extensive user messaging options (email and SMS)
  • Password Auditor free feature that pinpoints password-related vulnerabilities
  • More than 25 languages are available
  • Volume pricing model

Overall, this software is a terrific choice for companies that seek to enhance their password workflows. Furthermore, it facilitates compliance with increasingly rigid cybersecurity regulations in different industries. Read this Specops Password Policy review to learn how it works, from the installation of its components to the creation of a policy that fits your organization’s context to the fullest.

Fix “MSVCP140.dll was not found” error in Windows

Posted by admin on February 10, 2023 under Tech Tips | Be the First to Comment

This is a problem you might get while starting a particular program on your Windows computer.

MSVCP140.dll was not found error

System Error

The code execution cannot proceed because MSVCP140.dll was not found. Reinstalling the program may fix the problem.

This error occurs with the program which is dependent on the MSVCP DLL libraries. MSVCP means Microsoft Visual C++ Redistributable package. It contains different DLL files and if those DLL files are missing then the dependent program will throw this kind of error. In this tutorial you will find different ways to fix MSVCP related DLL errors. It is not only for the MSVCP140.dll but all kinds of MSVCP related DLL errors.

Read more of this article »

GandCrab v3 ransomware released: not really a game-changer

Posted by admin on February 8, 2021 under Tech Tips | Be the First to Comment

With ransomware in general plummeting so far in 2018, GandCrab is one of the few strains that stay afloat and keep evolving. This infection was apparently coined by skilled cybercrooks as it exhibits a rock-sold crypto functionality, clever distribution and enviable durability in the face of the law enforcement’s efforts to counter the plague. Although it has gone through C2 server takedown by the police earlier this year, it revived with yet more vicious, well-orchestrated attacks.

Security researchers spotted a brand new variant of this ransomware in early May. It has reached version 3, and the changes aren’t isolated to the number alone. GandCrab v3 goes equipped with a desktop wallpaper replacement feature similar to how the nasty Locky and Cerber used to instill fear to its victims. The way it handles hostage files, though, remains unaltered – each one is still appended with the .CRAB extension. The ransom note continues to be a document named CRAB-DECRYPT.txt.

GandCrab v3 payment pageThe overhauled culprit boasts multi-vector propagation. One of the payload delivery techniques comes down to malspam, where would-be preys receive emails masqueraded as customer support notifications from a bank. These phishing emails contain a ZIP archive attachment that, when unpacked, fires up a VBS downloader behind the scenes. This entity is the one liable for installing GandCrab v3 onto a target host. Another mechanism of infection is based on the Magnitude exploit kit. In this case, all it takes to get contaminated is visit a hacked website with toxic scripts surreptitiously running on it.

The above-mentioned desktop background can be sort of an issue to the attackers. Due to a bug in this routine, the ransomware may lock the user’s screen altogether instead of simply displaying the alert. This may prevent victims from even getting to the point where they learn the ransom demands and possibly decide to pay up. By the way, the extortionists instruct those infected to visit a dedicated payment page via Tor Browser. The size of the ransom indicated on that page is 800 USD, and it’s payable in Dash or Bitcoin cryptocurrency.

Overall, this update of the notorious GandCrab pest has introduced hardly anything revolutionary. However, it is still an extremely dangerous blackmail malware that cannot be decrypted without submitting the ransom.

Beware of New Android Ransomware Called DoubleLocker

Posted by admin on November 2, 2017 under Tech Tips | Be the First to Comment

DoubleLocker is the first Android ransomware that utilizes the Accessibility Service. Malware may encrypt user data; it can also lock the device.

DoubleLocker is built on the basis of a famous bank Trojan called Svpeng. DoubleLocker uses Svpeng’s code parts to encrypt and lock files but cannot collect user’s bank data and delete accounts.

DoubleLocker can change the device PIN and block the access for the victim. It also encrypts all data. This combination of Android malware features is seen for the first time.

Given the origin of the Svpeng bank malware, DoubleLocker could be turned into what we call ransomware. The malware acts in two stages – it tries to delete the bank or PayPal account and then blocks the data and device to demand a ransom. We found a test version of this ransomware in May 2017.
DoubleLocker is distributed in a very simple way. Like its ancestor the Svpeng banking Trojan, it pretends to be an Adobe Flash Player being pushed on hacked websites.

Once activated, the malware suggests allowing a special feature called Google Play Service. Having received the necessary permissions, the malware uses them to put its hands on administrator rights and becomes the sole launcher app – all without the user’s approval.

Self-promotion as a default launcher increases the persistence of the malware. When the person pushes the Home button, the ransomware is being re-activated and the device gets locked again.

Once launched on the device, DoubleLocker uses several strong arguments to force the user to pay the ransom.

First of all, DoubleLocker changes the device PIN and prevents the user to operate it. A new PIN is selected from a random value. The PIN is not going to be stored on the device. Crooks do send anywhere outside either. So the victim and security professionals cannot recover it. But after receiving the payment, an attacker can remotely reset the PIN and unlock the device.
Secondly, DoubleLocker encrypts all files located on the device’s primary storage. It makes use of the strong AES encryption algorithm and adds the strange .cryeye file extension.

The ransom amount is 0.0130 Bitcoins. The ransom note emphasizes that victims should send the payment within 24 hours. If they fail to do so, the data will remain encrypted forever.

The sole way to remove the DoubleLocker is to reset the device to the factory settings. Encrypted files cannot be restored.

For prevention, we recommend that you protect your Android-based devices with high-quality security products and make backups on a regular basis.

Using Mencoder Profile

Posted by admin on January 21, 2015 under Tech Tips | Be the First to Comment

Here’s a quick tip on using Mencoder profiles that serve as shortcuts for all of your favorite settings. This can save you a lot of time, especially when your encoding syntax is lengthy and difficult to remember.

Profiles are stored in the mencoder.conf file located in the appropriate place for your operating system. For Linux users, you can create a personalized file in your own home directory, ~/.mplayer/mencoder.conf.

Here’s the syntax you might use on a single-pass XviD project without using profiles.

mencoder -oac mp3lame -lameopts aq=0:q=0 -ovc xvid -xvidencopts
fixed_quant=2:max_key_interval=25:vhq=2:bvhq=1:chroma_opt:quant_type=mpeg
input.avi -o output.avi

Compare that with the following examples of some of my favorite profiles, and how easy it is to use them.

XviD Single-pass Profile Example

[xvid]
profile-desc="MPEG4/MP3 encoding"
ovc=xvid=1
xvidencopts=fixed_quant=2:max_key_interval=25:vhq=2:bvhq=1:chroma_opt=1:quant_type=mpeg
oac=mp3lame=1
lameopts=aq=0:q=0

mencoder -profile xvid input.avi -o output.avi

XviD 2-pass Profile Examples





[xvid-pass1]
profile-desc="MPEG4/MP3 encoding - PASS 1"
ovc=xvid=1
xvidencopts=pass=1:max_key_interval=25:turbo=1:vhq=0
nosound=1
o=/dev/null
passlogfile=xvid-pass1.log

[xvid-pass2]
profile-desc="MPEG4/MP3 encoding - PASS 2"
ovc=xvid=1
xvidencopts=pass=2:max_key_interval=25:vhq=2:bvhq=1:chroma_opt=1:quant_type=mpeg:bitrate=2000
oac=mp3lame=1
lameopts=aq=0:q=0
passlogfile=xvid-pass1.log

mencoder -profile xvid-pass1 input.avi
mencoder -profile xvid-pass2 input.avi -o output.avi

x264 2-pass Profile Examples

[x264-pass1]
profile-desc="x264 encoding - PASS 1"
ovc=x264=1
x264encopts=pass=1:threads=0:subq=1:frameref=1:bframes=3:b_pyramid=normal:weight_b=1:keyint=25
nosound=1
o=/dev/null
passlogfile=x264-pass1.log

[x264-pass2]
profile-desc="x264 encoding - PASS 2"
ovc=x264=1
x264encopts=pass=2:threads=0:subq=6:frameref=5:partitions=all:8x8dct=1:me=umh:bframes=3:b_pyramid=normal:weight_b=1:keyint=25:bitrate=2000
oac=mp3lame=1
lameopts=aq=0:q=0
passlogfile=x264-pass1.log

mencoder -profile x264-pass1 input.avi
mencoder -profile x264-pass2 input.avi -o output.avi

x264 Single-pass Profile Example

[x264]
profile-desc="x264 encoding"
ovc=x264=1
x264encopts=crf=20:threads=0:subq=6:frameref=5:partitions=all:8x8dct=1:me=umh:bframes=3:b_pyramid=normal:weight_b=1:keyint=25
aspect=16/9
oac=mp3lame=1
lameopts=aq=0:q=0

mencoder -profile x264 input.avi -o output.avi

Adding Chapters to Videos Using MKV Containers

Posted by admin on November 4, 2014 under Tech Tips | Read the First Comment

If you would like to add chapters to your video files, such as XviD, x264, OGG, etc., simply use the Matroska multimedia container format.

For those of you that have never created Matroska files, visit the Matroska website to find the right software for your platform. If you’re using Ubuntu Linux, install the mkvtoolnix package from the repositories. It contains all the tools you need to start working with MKV files.

sudo apt-get-install mkvtoolnix

The easiest method of creating your chapter definitions is with any text editor, using the following format. Feel free to change the name and time values accordingly. Save the file anywhere you can remember, e.g. chapter.txt.

CHAPTER01=00:00:00.000
CHAPTER01NAME=Chapter 01
CHAPTER02=00:05:00.000
CHAPTER02NAME=Chapter 02
CHAPTER03=00:10:00.000
CHAPTER03NAME=Chapter 03
CHAPTER04=00:15:00.000
CHAPTER04NAME=Chapter 04
CHAPTER05=00:20:00.000
CHAPTER05NAME=Chapter 05

If you want to create a chapter file from an existing DVD, dvdxchap is a great tool for the job if you’re using Linux. It’s part of the ogmtools package. For more info, check out the OGMtools project web site.

Installation and three examples of how to use the tool are below.

sudo apt-get install ogmtools

dvdxchap /dev/dvd > chapter.txt
dvdxchap ./VIDEO_TS/ > chapter.txt
dvdxchap video.iso > chapter.txt

mkvmerge is the only tool you need to create an MKV file. In the following examples, your source video file is called video.avi, and your destination file is video.mkv.

A simplified version of the mkvmerge syntax is as follows.

mkvmerge video.avi --chapters chapter.txt -o video.mkv

I typically like to set my default language to English, and also turn off header compression for all tracks since some players don’t play nicely with compression enabled. The syntax and example output is displayed below.

mkvmerge video.avi --default-language eng
--compression -1:none --chapters chapter.txt -o video.mkv

mkvmerge v4.2.0 ('No Talking') built on Jul 28 2010 16:47:39
'video.avi': Using the AVI demultiplexer. Opening file. This may take some time depending on the file's size.
'video.avi' track 0: Using the MPEG-4 part 2 video output module.
'video.avi' track 1: Using the MPEG audio output module.
The file 'video.mkv' has been opened for writing.
'video.avi' track 0: Extracted the aspect ratio information from the MPEG4 layer 2 video data and set the display dimensions to 712/416.
Progress: 100%
The cue entries (the index) are being written...
Muxing took 30 seconds.

That’s really all there is to it. Now any media player that supports MKV chapters will allow you to navigate them. My favorites are VLC, Mplayer, and my Western Digital media player, the WD TV Live Plus.

Verify the contents of your MKV using mkvmerge or mkvinfo.

mkvmerge -i video.mkv
File 'video.mkv': container: Matroska
Track ID 1: video (V_MS/VFW/FOURCC, XVID)
Track ID 2: audio (A_MPEG/L3)
Chapters: 13 entries

mkvinfo video.mkv
+ EBML head
|+ EBML version: 1
|+ EBML read version: 1
|+ EBML maximum ID length: 4
|+ EBML maximum size length: 8
|+ Doc type: matroska
|+ Doc type version: 2
|+ Doc type read version: 2
+ Segment, size 1325519138
|+ Seek head (subentries will be skipped)
|+ EbmlVoid (size: 4029)
|+ Segment information
| + Timecode scale: 1000000
| + Muxing application: libebml v1.0.0 + libmatroska v1.0.0
| + Writing application: mkvmerge v4.2.0 ('No Talking') built on Jul 28 2010 16:47:39
| + Duration: 5004.680s (01:23:24.680)
| + Date: Thu Aug 5 00:26:03 2010 UTC
| + Segment UID: 0x81 0x4b 0xc4 0xf1 0xf4 0x5b 0x6d 0xda 0xc5 0x40 0xc1 0x03 0x3f 0x36 0x0f 0xd9
|+ Segment tracks
| + A track
| + Track number: 1
| + Track UID: 1318207700
| + Track type: video
| + Lacing flag: 0
| + MinCache: 1
| + Codec ID: V_MS/VFW/FOURCC
| + CodecPrivate, length 40 (FourCC: XVID, 0x44495658)
| + Default duration: 40.000ms (25.000 fps for a video track)
| + Video track
| + Pixel width: 480
| + Pixel height: 416
| + Display width: 712
| + Display height: 416
| + A track
| + Track number: 2
| + Track UID: 3206714560
| + Track type: audio
| + Codec ID: A_MPEG/L3
| + Default duration: 24.000ms (41.667 fps for a video track)
| + Audio track
| + Sampling frequency: 48000
| + Channels: 2
|+ EbmlVoid (size: 1099)
|+ Chapters
| + EditionEntry
| + EditionFlagHidden: 0
| + EditionFlagDefault: 0
| + EditionUID: 585228242
| + ChapterAtom
| + ChapterUID: 4059317607
| + ChapterTimeStart: 00:00:00.000000000
| + ChapterFlagHidden: 0
| + ChapterFlagEnabled: 1
| + ChapterDisplay
| + ChapterString: Chapter 01
| + ChapterLanguage: eng
| + ChapterAtom
| + ChapterUID: 3065648262
| + ChapterTimeStart: 00:05:00.000000000
| + ChapterFlagHidden: 0
| + ChapterFlagEnabled: 1
| + ChapterDisplay
| + ChapterString: Chapter 02
| + ChapterLanguage: eng
| + ChapterAtom
| + ChapterUID: 2388361707
| + ChapterTimeStart: 00:10:00.000000000
| + ChapterFlagHidden: 0
| + ChapterFlagEnabled: 1
| + ChapterDisplay
| + ChapterString: Chapter 03
| + ChapterLanguage: eng
| + ChapterAtom
| + ChapterUID: 1448933008
| + ChapterTimeStart: 00:15:00.000000000
| + ChapterFlagHidden: 0
| + ChapterFlagEnabled: 1
| + ChapterDisplay
| + ChapterString: Chapter 04
| + ChapterLanguage: eng
| + ChapterAtom
| + ChapterUID: 1319721142
| + ChapterTimeStart: 00:20:00.000000000
| + ChapterFlagHidden: 0
| + ChapterFlagEnabled: 1
| + ChapterDisplay
| + ChapterString: Chapter 05
| + ChapterLanguage: eng
|+ EbmlVoid (size: 101)
|+ Cluster

Strip All Unwanted MP3 ID3 Tags

Posted by admin on June 20, 2014 under Tech Tips | Be the First to Comment

A while back, I wanted to find a tool that would go through my entire collection of MP3’s and remove all the extra ID3 tags I didn’t want. For example, when I purchase music from Amazon, Rhapsody, and other online music stores, there are a number of tags in the files that track things like the purchase date and sales transaction ID’s. I also like to get rid of annoying comments and other hidden tags that most editors won’t even show you.

In my search for a tool, I came across this very useful post outlining a similar project. In the authors quest to do the same thing, he came up with a shell script that searches for all MP3 files, and removes tags that are not in his list of “good” tags. I usually don’t like to rehash the work someone else has done, but since I use his script so often, I thought it would be useful to repost it with only minor modifications.

Prerequisite: Install eyeD3

The script requires the eyeD3 tag editor to parse and manipulate the tag data. So be sure to install eyeD3, which should be available in your favorite Linux repository.

sudo apt-get install eyed3

Save and Modify Script

Save the following script as strip-tags.sh somewhere in your executable path.

#!/bin/bash
# Script name: strip-tags.sh
# Original Author: Ian of DarkStarShout Blog
# Site: http://darkstarshout.blogspot.com/
# Options slightly modified to liking of SavvyAdmin.com
 
oktags="TALB APIC TCON TPE1 TPE2 TPE3 TIT2 TRCK TYER TCOM TPOS"
 
indexfile=`mktemp`
 
#Determine tags present:
find . -iname "*.mp3" -exec eyeD3 --no-color -v {} ; > $indexfile
tagspresent=`sort -u $indexfile | awk -F): '/^<.*$/ {print $1}' 
| uniq | awk -F)> '{print $1}' | awk -F( '{print $(NF)}' 
| awk 'BEGIN {ORS=" "} {print $0}'`
 
rm $indexfile
 
#Determine tags to strip:
tostrip=`echo -n $tagspresent $oktags $oktags 
| awk 'BEGIN {RS=" "; ORS="n"} {print $0}' | sort | uniq -u 
| awk 'BEGIN {ORS=" "} {print $0}'`
 
#Confirm action:
echo
echo The following tags have been found in the mp3s:
echo $tagspresent
echo These tags are to be stripped:
echo $tostrip
echo
echo -n Press enter to confirm, or Ctrl+C to cancel...
read dummy
 
#Strip 'em
stripstring=`echo $tostrip 
| awk 'BEGIN {FS="n"; RS=" "} {print "--set-text-frame=" $1 ": "}'`
 
# First pass copies any v1.x tags to v2.3 and strips unwanted tag data.
# Second pass removes v1.x tags, since I don't like to use them.
# Without --no-tagging-time-frame, a new unwanted tag is added.  :-)
 
find . -iname "*.mp3" 
-exec eyeD3 --to-v2.3 --no-tagging-time-frame $stripstring {} ; 
-exec eyeD3 --remove-v1 --no-tagging-time-frame {} ; 
 
echo "Script complete!"

To run the script, just execute it from the top level parent directory.

cd ~/Music/
strip-tags.sh

I really didn’t change a whole lot from the original, only making slight tweaks to eyeD3 options. For example, I removed colors from the eyeD3 output when creating the first list of tags, and added a line to remove v1.x ID3 tags since I don’t like to keep them around.

Be sure to edit the list of good tags identified by the “okaytags” variable. My preferred list includes the following:

oktags="TALB APIC TCON TPE1 TPE2 TPE3 TIT2 TRCK TYER TCOM TPOS"

TALB - Album/Movie/Show title
APIC - Attached picture (Album Art)
TCON - Content type (Genre)
TPE1 - Lead performer(s)/Soloist(s)
TPE2 - Band/orchestra/accompaniment
TPE3 - Conductor/performer refinement
TIT2 - Title/songname/content description
TRCK - Track number/Position in set
TYER - Year
TCOM - Composer
TPOS - Part of a set

Enjoy!