Sunday, June 27, 2010

This site is a tool for quickly sharing pieces of code with multiple people.

This site is a tool for quickly sharing pieces of code with multiple people. You paste your stuff and you get a nice short URL to pass on. Originally created for use by Django programmers on the #django IRC channel, dpaste is open to everyone — if you like it, please use it.

 

http://dpaste.com/

Print Friendly and PDF
Share/Bookmark

ClearOS

ClearOS

ClearOS is a powerful network and gateway server designed for small organizations and distributed environments.  Though ClearOS comes with an extensive list of features  and integrated services (see sidebar), the solution is easy to configure thanks to the intuitive web-based interface.

http://www.clearfoundation.com/Software/overview.html

http://www.clearfoundation.com/

http://www.oschina.net/p/clearos

Print Friendly and PDF
Share/Bookmark

Hong Kong version Nokia E63 firmware upgrade

Nokia e63 upgrade to 410.21.010

 

香港版本product code :
0581754 = Hong Kong RM-437 E63-1 Blue color Product Code
0581753 = Hong Kong RM-437 E63-1 Red color Product Code

Cannot upgrade

 

Solution:

Change the product code to 新加坡为0568936(简体中文)/港版0590124(简体.繁体)

 

Required:

1. 手機要沒鎖機.
2.
Nemesis Service Suite程式去改product code 更新去另一firmware版本.

 

Nemesis Service Suite Beta 1.0.38.15 (zip file,6.95 MB)
http://www.b-phreaks.co.uk/index.php?main_page=page_2

Install use Virtual usb and into volume C: (It need to install the Ovi software suite and Nokia software updater first)

 

How to Change Product Code of Nokia E-Series

Download the required applications to change the product code on E-Series Mobiles.

NaviFirm
Nemesis Service Suite (NSS)

Obtaining Nokia E-Series Product Codes for Latest Firmware Availability Using NaviFirm

For more detail:

http://www.techhail.com/mobiles/procedure-to-change-product-code-on-nokia-e-series-mobiles-e90-e72-e63-e71-e75/4332

Remark: NSS找不到手机和scan for product... error的终极解决方案 (Check the driver of Nokia in Windows is installed correct or not) And the mobile select PC suit client

 

 

updated to firmware 410.21.010 (08-02-2010) RM-437  of HK version

 

Print Friendly and PDF
Share/Bookmark

Smartphone OS and Apps Store

Smartphone OS

 

·         Android - Motorola/Samsung/Sony Ericsson/LG/Toshiba/Asus/Gigabyte/HTC/Acer

·         BlackBerry OS – BlackBerry

·         Windows Mobile/Phone – Motorola/Samsung/Sony Ericsson/LG/Toshiba/Asus/Gigabyte/HTC/Acer

·         Maemo 5 – Nokia

·         Meego – Nokia/LG

·         Symbian – Nokia/Samsung/Sony Ericsson/Panasonic/Siemens/Motorola/LG/Lenovo

·         Brew MP (Mobile Platform) – HTC

·         Bada OS – Samsung   

·         iPhone OS – Apple

·         WebOS – Palm (HP)

 

·         LiMo – Samsung

 

Smartphone application online shop

 

·         Android - Android Market

·         BlackBerry OS - BlackBerry App World

·         Windows Moblie/Phone - Windows Marketplace for mobile

·         Maemo/Meego/Symbian - Ovi Store (Nokia)

·         Windows Mobile, Symbian, Android or Sony Ericsson's proprietary OS - Sony Ericsson’s PlayNow Arena

·         Bada OS  - Samsung Apps

·         iPhone OS/iOS – Apple Apps Store

Print Friendly and PDF
Share/Bookmark

Speedtest for China

http://www.webkaka.com/webCheck.aspx

http://www.websitepulse.com/

http://www.speedtest.cn/

Print Friendly and PDF
Share/Bookmark

cannot delete Disconnected network drive problem

When you try to delete Disconnected network drive. You received:

 

Error “The network connection could not be found.

 

Create a new folder on your hard drive called 
"Shared", then right-click it and select properties.

Click the Sharing  tab and tick the "Share this folder" box.

Next, click "My Computer" and in the Tools Menu, click "Map Network Drive".

Notice the little down-arrow next to the drive letter shown.

Click the arrow to get a list of letters. Select the one you want to delete,

then browse for your Shared folder and select it. By this means, you will assign the drive 
letter to a real folder.

 

Make sure the "reconnect at login" box is un-ticked.

Click the Finish button to get a warning. Answer YES and the Shared folder will open. Close it.

 

Next, right-click the drive in My Computer and select disconnect.

 

Reference: http://forum.soft32.com/windows/delete-disconnect-network-drive-ftopict373377.html

Print Friendly and PDF
Share/Bookmark

Internet connectivity issue due to SonicWall SSO

Recently, we receive a lot of report about the Internet connection very unstable.

 

After I check the configuration of our firewall, it seems that the firewall is kill/clear the session from our client due to the authentication fail. The authentication fail is due to our SonicWall SSO agent on our DC (Event ID 16), fail to use the WMI/NetAPI to connect the client. The connection cannot establish because Media Sensing feature for TCP/IP in Windows XP under Gigabytes Ethernet environment (Netlogon Event ID 5719 and the Disappearing Domain [Controller]).

 

The workaround solution I have been done is the following:

 

1.       Disable Windows Firewall

2.       Disable the Media Sensing feature

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters

DisableDHCPMediaSense

REG_DWORD=1

 

Now, the problem seems to be fixed.

reference:

Netlogon 5719 and the Disappearing Domain [Controller]

http://blogs.technet.com/b/instan/archive/2008/09/18/netlogon-5719-and-the-disappearing-domain.aspx

http://support.microsoft.com/kb/310339

 

Cannot connect to domain controller and cannot apply Group Policy with Gigabit Ethernet devices

http://support.microsoft.com/kb/326152/en-us

 

How to disable the Media Sensing feature for TCP/IP in Windows

http://support.microsoft.com/?scid=kb;en-us;239924&x=4&y=13

Print Friendly and PDF
Share/Bookmark

Syslog Viewer / Analyzer / Reporting Tool for FREE

Kiwi Syslog Server

http://www.kiwisyslog.com/kiwi-syslog-server-overview/

Kiwi Log Viewer

http://www.kiwisyslog.com/kiwi-log-viewer-overview/

EventLog Analyzer

http://www.manageengine.com/products/eventlog/

The syslog-ng Open Source Edition

http://www.balabit.com/network-security/syslog-ng/opensource-logging-system/

CactiEZ v0.6

http://cactiez.cactiusers.org/

OpenSMART

http://opensmart.sourceforge.net/ 

 

Tail XP

http://infiero.com/tailxp/index.html

MakeLogic Tail

http://www.makelogic.com/tail/TailHome.htm?asp

Tail for Win32

http://tailforwin32.sourceforge.net/index.php

BareTail

http://www.baremetalsoft.com/baretail/
mTAIL

http://ophilipp.free.fr/op_tail.htm

LogExper

http://www.log-expert.de/

logview4net

http://logview4net.com/

 

Syslog for windows

http://sourceforge.net/projects/syslog-win32/files/syslog-win32

MT Syslog

http://www.mikrotik.com/download/MT_Syslog.exe
NTsyslog

http://ntsyslog.sourceforge.net/

Print Friendly and PDF
Share/Bookmark

sAMAccountName stand for

sAMAccountName = Domain account login name

http://www.rlmueller.net/Name_Attributes.htm

 

Print Friendly and PDF
Share/Bookmark

Saturday, June 19, 2010

Microsoft Remote Desktop Connection Manager

Download Microsoft Remote Desktop Connection Manager

http://www.thewindowsclub.com/download-microsoft-remote-desktop-connection-manager

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=4603c621-6de7-4ccb-9f51-d53dc7e48047

Print Friendly and PDF
Share/Bookmark

Remote Desktop Organizer

Remote Desktop Organizer

http://www.appmazing.com/remote-desktop-organizer/

Print Friendly and PDF
Share/Bookmark

OpenNetAdmin

OpenNEtAdmin

http://opennetadmin.com/

http://www.net-security.org/secworld.php?id=9347&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+HelpNetSecurity+(Help+Net+Security)

Print Friendly and PDF
Share/Bookmark

WPKG

WPKG is an automated software deployment, upgrade and removal program for Windows.

It can be used to push/pull software packages, such as Service Packs, hotfixes, or program installations from a central server (for example, Samba or Active Directory) to a number of workstations.

It can run as a service to install software in the background (silent install), without user interaction.

It can install MSI, InstallShield, PackagefortheWeb, Inno Setup, Nullsoft, other software installers or .exe packages, .bat and .cmd scripts and similar: no more repackaging to perform software installation.

WPKG is open source software.

http://wpkg.org/

 

How to push the agent to the client?

http://michaelellerbeck.com/2008/12/17/push-installing-wpkg-using-psexec/

Print Friendly and PDF
Share/Bookmark

Tping (True ping)

http://sourceforge.net/projects/tping/

 

Copy the tping.exe to C:\WINDOWS\system32, you can run tping in command prompt.

Print Friendly and PDF
Share/Bookmark

Print Flush 1.3

Clear the print queue without restart the print spooler service.

http://www.bradkovach.com/printflush/

Print Friendly and PDF
Share/Bookmark

StartSSL(tm) Free

http://www.startssl.com/?app=1

 

Microsoft adds free root certificate authority to Windows

http://www.istartedsomething.com/20091010/microsoft-free-root-certificate-authority-windows/

Print Friendly and PDF
Share/Bookmark

3 geeky command for Windows XP/Vista/Win7

First open the Run box by pressing Win+R keys.

 

1. Now to open your System Drive, simply type ‘\‘ and hit OK.

 

2. To open the Username’s folder, type ‘.‘ and hit OK.

 

3. To open the Users folder, type ‘..‘ and hit OK.

Print Friendly and PDF
Share/Bookmark

CentOS Net Install (CentOS NetInstall)

CentOS Net Install (CentOS NetInstall)

http://www.chrisgountanis.com/technical/45-centos-netinstall.html

http://www.tonybhimani.com/2007/12/20/centos-51-network-install-instructions/

Print Friendly and PDF
Share/Bookmark

Control the USB port power in Windows

For Control the USB port power in Windows (e.g. Power off and Power on again – not able to keep in off states, it only allow power off and power on again)

 

USB Power Reset v.1.0

http://www.torry.net/authorsmore.php?id=7136

 

http://www.torry.net/apps/hardware/other/UsbReset32.zip

Print Friendly and PDF
Share/Bookmark

USB port management

The following two tools to find out the port device ID and re-enable the disconnected usb without re-plug (Eject and re-detect a usb drive without unplugging it):

 

        Devcon

http://support.microsoft.com/kb/311272

 

D:\Browser_Download\devcon\i386>devcon remove USB\VID_0204*

USB\VID_0204&PID_6025\28202200913F2A12                      : Removed

1 device(s) removed.

 

D:\Browser_Download\devcon\i386>devcon rescan

Scanning for new hardware.

Scanning completed.

USBView is a free utility from Microsoft  that displays the USB connection tree and shows the USB devices that are connected to it together with their configuration data.  This is very useful for debugging USB enumeration errors.  USBView runs under Windows 98, ME, 2000 and XP.

http://www.ftdichip.com/Resources/Utilities.htm

 

!cid_image001_png@01CAF69B

 

 

Reference:

Tracing USB Device artefacts on Windows XP operating system for forensic purpose

http://scissec.scis.ecu.edu.au/proceedings/2007/forensics/23_Luo_Tracing_USB_Device_artefacts_on_Windows_XP.pdf

http://www.drdobbs.com/189401600;jsessionid=NHRU0VACUYV4VQE1GHPSKH4ATMY32JVN?pgno=1

Print Friendly and PDF
Share/Bookmark

USBDLM V4 - USB Drive Letter Manager for Windows 2000, XP, Server 2003 and Vista

USBDLM is a Windows service that gives control over Window's drive letter assignment for USB drives. Running as service makes it independent of the logged on user's privileges, so there is no need to give the users the privilege to change drive letters.
It automatically solves conflicts between USB drives and network or subst drives of the currently logged on user.
Furthermore you can define new default letters for USB drives and much more.

 

USBDLM is Freeware for private and educational (schools, colleges, universities) use only. The students shall outnumber all others.
Otherwise one licence per computer is required after a 30 day test period even though the software does not expire.

To support admins in schools which are often voluntary workers I made USBDLM freeware for schools, colleges and universities. But that's the line I've drawn and even your organization is non profit, good and important I have to say, it's beyond that line. Ask me for a discount in this case.

 

 

http://www.uwe-sieber.de/usbdlm_e.html

Print Friendly and PDF
Share/Bookmark

windows xp remote desktop multi session

Enable Multiple Concurrent Remote Desktop Connections or Sessions in Windows XP

http://www.mydigitallife.info/2008/06/13/enable-multiple-concurrent-remote-desktop-connections-or-sessions-in-windows-xp/

Pt.6

@REG ADD "HKLM\SYSTEM\ControlSet001\Control\Terminal Server\Licensing Core" /v EnableConcurrentSessions /d 1 /t REG_DWORD /f >nul

@REG ADD "HKLM\SYSTEM\ControlSet002\Control\Terminal Server\Licensing Core" /v EnableConcurrentSessions /d 1 /t REG_DWORD /f >nul

@REG ADD "HKLM\SYSTEM\ControlSet003\Control\Terminal Server\Licensing Core" /v EnableConcurrentSessions /d 1 /t REG_DWORD /f >nul

@REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Licensing Core" /v EnableConcurrentSessions /d 1 /t REG_DWORD /f >nul

@REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v EnableConcurrentSessions /d 1 /t REG_DWORD /f > nul

@REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v AllowMultipleTSSessions  /d 1 /t REG_DWORD /f > nul

 

 

Make sure all ControlSet have this entry in domain environment

 

Pt.11 can be ignore in Domain environment

WinXP terminal service administive template ADM in local policy:

WinXP_ts_template 

**************************************************************

This patch will enable two or more concurrent sessions in Windows XP PRO Service Pack 2 (SP2) and Service Pack 3 (SP3) if you have FAST USER SWITCHING enabled, and your windows is NOT in a domain.
http://sala.pri.ee/?page_id=11

Print Friendly and PDF
Share/Bookmark

Windows XP Post-SP3 Update Pack 32-bit for SP3 nlite addon

XP SP3 Update Pack Download

http://xable.net/xp-sp3-update-pack-download.html

Print Friendly and PDF
Share/Bookmark

(Freeware) TFTP Client

TFTP Client
http://www.brothersoft.com/tftp-client-122473.html

http://corporate.weird-solutions.com/

TFTP Client 3.2

http://wareseeker.com/Network-Internet/tftp-client-3.2.zip/437839

Print Friendly and PDF
Share/Bookmark

How to clone virtual machines in VMware ESXi

http://www.dedoimedo.com/computers/vmware-esxi-clone-machine.html

Print Friendly and PDF
Share/Bookmark

PDF tools

Sumatra PDF (Set a default reader)

A PDF Viewer for Windows

http://blog.kowalczyk.info/software/sumatrapdf/download.html

 

Install the Adobe reader also, since the Sumatra PDF support open in adobe reader.

 

PDF-XChange Viewer

For pdf editing

 

doPDF7.1 free PDF converter

http://www.dopdf.com/

Print Friendly and PDF
Share/Bookmark

BIOS Update per bootable USB-Stick

http://www.biosflash.com/e/bios-boot-usb-stick.htm

Print Friendly and PDF
Share/Bookmark

Search Technologies for SharePoint 2010 Products

A comparison of search capabilities in the following:

  • SharePoint Foundation 2010

  • Search Server 2010 Express

  • Search Server 2010

  • SharePoint Server 2010

  • FAST Search Server 2010 for SharePoint

http://www.microsoft.com/downloads/details.aspx?FamilyID=d7c0091e-5766-496d-a5fe-94bea52c4b15&displaylang=en

Print Friendly and PDF
Share/Bookmark

How to delete all RSS feeds in IE at once?

Windows XP
C:\Documents and Settings\$username$\Local Settings\Application Data\Microsoft\Feeds
 
 
Windows Vista and Windows 7
In IE7 & IE8, just delete the contents of
C:\Users\$username$\AppData\Local\Microsoft\Feeds.
Print Friendly and PDF
Share/Bookmark

How to delete all RSS feeds in IE at once?

Windows XP
C:\Documents and Settings\$username$\Local Settings\Application Data\Microsoft\Feeds
 
 
Windows Vista and Windows 7
In IE7 & IE8, just delete the contents of
C:\Users\$username$\AppData\Local\Microsoft\Feeds.
Print Friendly and PDF
Share/Bookmark

Hard Disk Wipe - for permanent volume data destruction

Windows application

 

Disk Wipe

Uses several advanced shredding algorithms (Dod 5220-22.M, US Army, Peter Guttman) to securely wipe data.

http://www.diskwipe.org/

 

Live CD – Boot up the machine and Wipe the Hard disk

 

Darik's Boot and Nuke 2.0.0 (DBAN)

The program is designed to securely erase a hard disk until data is permanently removed and no longer recoverable, which is achieved by overwriting the data with random numbers generated by Mersenne twister or ISAAC (a PRNG). The Gutmann method is included with DBAN.

 

DBAN can be booted from a floppy disk, CD, DVD, or USB flash drive and it is based on Linux. It supports IDE, SCSI and SATA hard drives. DBAN can be configured to automatically wipe every hard disk that it sees on a system, making it very useful for unattended data destruction scenarios. DBAN exists for Intel x86 and PowerPC systems.

 

DBAN, like other methods of data destruction, is suitable for use prior to computer recycling for personal or commercial situations, such as donating or selling a computer.

http://www.dban.org/download

Print Friendly and PDF
Share/Bookmark

Install or uninstall Google Chrome: Installing Google Chrome for multiple user accounts (For Win XP/Vista/7 only)

As an administrator, you can install Google Chrome in Pack for all user accounts on a Windows computer (whereas the download available athttp://www.google.com/chrome only installs for the user account that you're logged into.) By doing so, you'll replace all other versions of Google Chrome that may already be installed on your computer for other user accounts.

 

If you already have Google Chrome from http://www.google.com/chrome installed on your administrator account, make sure to uninstall it first before installing Pack's version.

 

After you've installed Google Chrome through Pack, users who've already installed Google Chrome in their user accounts will be notified that the browser has updated to a system-wide version the next time they sign in and open the browser. In some cases, they may need to recreate their profile information, such as bookmarks and browsing history, if they were formerly using a more recent version of the browser.

 

http://www.google.com/support/chrome/bin/answer.py?answer=118663

Print Friendly and PDF
Share/Bookmark

OpenMeetings是一套免費的Open-Source網頁視訊會議系統 (Web-based Video Conferencing System)

http://code.google.com/p/openmeetings/ http://anderson1029.pixnet.net/blog/post/26512107
http://www.andowson.com/posts/list/318.page

Print Friendly and PDF
Share/Bookmark

Remote assistance a program could not start

If the remote assistance a program could not start and you find the following error in your event log:

 

Event Type:        Error

Event Source:    Remote Assistance

Event Category:                None

Event ID:              5251

Date:                     5/3/2010

Time:                     4:27:02 PM

User:                     N/A

Computer:          abc

Description:

The HelpAssistant account is disabled or missing, or the password could not be verified. Remote Assistance will be disabled. Restart the computer in safe mode and type the following text at the command prompt: sessmgr.exe -service.  If the problem persists, contact Microsoft Product Support.

 

For more information, see Help and Support Center at http://go.microsoft.com/fwlink/events.asp.

 

The solution:

1. run sessmgr.exe -service

2. reboot the machine

Print Friendly and PDF
Share/Bookmark

Offer Remote Assistance and Request Remote assistance shortcut

Open Remote assistant admin console

"%ProgramFiles%\Internet Explorer\iexplore" hcp://CN=Microsoft%20Corporation,L=Redmond,S=Washington,C=US/Remote%20Assistance/Escalation/Unsolicited/Unsolicitedrcui.htm

 

 

Request Remote assistance shortcut

%SYSTEMROOT%\system32\rcimlby.exe –LaunchRA

Print Friendly and PDF
Share/Bookmark

如何匯入多筆OCS R2 SIP 帳號到Communicator 群組

http://www.dotblogs.com.tw/bryanc23/archive/2010/02/24/13749.aspx

Print Friendly and PDF
Share/Bookmark

restrictanonymous and restrictanonymoussam = 1

Set and enforce strict file level and registry permissions
Go through your directories and verify that only specific groups have access to the information contained within them. Restrict anonymous users from accessing the registry. This can be done by a registry key:
HKLM\System\CurrentControlSet\Control\LSA\restrictanonymous=1

Or via a Group Policy:
Group Policy\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts and shares -> Enabled

HKLM\System\CurrentControlSet\Control\LSA\ restrictanonymoussam=1
Group Policy\Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options\Network access: Do not allow anonymous enumeration of SAM accounts-> Enabled
Default enable for Workstation, disable for Server.

 

 

Note

  • In Windows XP, there is a new registry setting (EveryoneIncludesAnonymous) that controls whether permissions given to the built-in Everyone group apply to anonymous users. By default, permissions granted to the Everyone group do not apply to anonymous users in Windows XP, which therefore provides the same level of anonymous user restrictions as the RestrictAnonymous setting in previous Windows operating systems.

 

 

Reference:

Restrict Anonymous check

Published: December 16, 2009

Applies To: Forefront Client Security

The Restrict Anonymous SSA check determines whether the RestrictAnonymous registry setting is used to restrict anonymous connections on the scanned computer. The registry setting is at the following location:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\RestrictAnonymous

Anonymous users can list certain types of system information, including user names and details, account policies, and share names. The list of user names and share names could help potential attackers learn compromising information, such as:

  • Who is an administrator.

  • Which computers have weak account protection.

  • Which computers share information with the network.

Users who want enhanced security can restrict this function so that anonymous users cannot access this information.

The RestrictAnonymous registry setting controls the level of enumeration that is granted to an anonymous user. RestrictAnonymous can be set to any of the following values:

  • 0—None. Rely on default permissions.

  • 1—Do not allow enumeration of Security Accounts Manager accounts and names.

  • 2—No access without explicit anonymous permissions.

It is not recommended that you set RestrictAnonymous to 2 on domain controllers or on computers running Microsoft Windows Small Business Server 2003 (Windows SBS) server software unless they are in pure Windows 2000 Server environments and have been tested for application compatibility. In addition, client computers with RestrictAnonymous set to 2 should not take on the role of master browser.

In Windows XP, the EveryoneIncludesAnonymous registry setting controls whether permissions given to the built-in Everyone group apply to anonymous users. By default, permissions granted to the Everyone group do not apply to anonymous users in Windows XP, which therefore provides the same level of anonymous user restrictions as the RestrictAnonymous setting in previous Windows operating systems.

Resolutions for potentially unacceptable scores

Review the results message associated with the score.

It is recommended that you restrict anonymous access.

Scoring and results

Because of the existence of the EveryoneIncludesAnonymous registry setting in Windows XP, scoring for Windows XP and newer operating systems differs from scoring for Windows 2000 Server operating systems.

Scoring and results for Windows Vista and Windows XP

The following table shows how Client Security determines the score resulting from performing this check on computers running the Windows Vista™ or Windows XP operating system. It also shows the results message that appears in related reports. You can use the results message for each score to determine the recommended resolution.

 

Score

Everyone group includes anonymous users

Restrict‌Anonymous setting

Results message

High

Yes

0

This computer is running with RestrictAnonymous = 0. This level allows basic enumeration of user accounts, account policies, and system information. Set RestrictAnonymous = 2 to ensure maximum security.

  

Yes

Doesn't exist

The RestrictAnonymous key is not set in your registry. This key should be present and set to a value greater than 0.

  

Yes

Not 0, 1, or 2

Invalid values were detected for some anonymous access settings on this computer. The current setting on this computer is: RestrictAnonymous = Value.

Medium

Yes

1

This computer is running with RestrictAnonymous = 1. This level prevents basic enumeration of user accounts, account policies, and system information. Set RestrictAnonymous = 2 to ensure maximum security.

Low

Yes

2

This computer is properly restricting anonymous access.

  

No

Any setting

This computer is properly restricting anonymous access.

Scoring and results for Windows 2000 Server

The following table shows how Client Security determines the score resulting from performing this check on a computer running Windows 2000 Server. It also shows the results message that appears in related reports. You can use the results message for each score to determine the recommended resolution.

 

Score

RestrictAnonymous setting

RestrictAnonymous setting is missing

Results message

High

0

No

This computer is running with RestrictAnonymous = 0. This level allows basic enumeration of user accounts, account policies, and system information. Set RestrictAnonymous = 2 to ensure maximum security.


  

Not applicable

Yes

The RestrictAnonymous key is not set in your registry. This key should be present and set to a value greater than 0.

  

Not 0, 1, or 2

No

Invalid values were detected for some anonymous access settings on this computer. The current setting on this computer is: RestrictAnonymous = Value.

Medium

1

No

This computer is running with RestrictAnonymous = 1. This level prevents basic enumeration of user accounts, account policies, and system information. Set RestrictAnonymous = 2 to ensure maximum security.

Low

2

No

This computer is properly restricting anonymous access.

 

More information:

http://technet.microsoft.com/en-us/library/bb418944.aspx

Print Friendly and PDF
Share/Bookmark

Thursday, June 17, 2010

Junpier SSL VPN web portal connect terminal server error

When using Junpier SSL VPN web portal connect terminal server error:

 

Windows Terminal Server Proxy

No valid software license was available.

 

The solution:

1.       delete the HKEY_LOCAL_MACHINE\Software\Microsoft\MSLicensing  on a client

2.       Reboot the machine

 

<Remark: If the user is not a local administrator or the OS is Windows Vista or later, you need to do the following step one time

Right-click the Remote Desktop Connection shortcut, and then click Run as Administrator. By default, the remote desktop connection runs as a user with the lowest user permissions. By default, a restricted user does not have permission to write registry entries to HKEY_LOCAL_MACHINE. Therefore, attempts to rewrite the MSLicensing key fail. Starting Remote Desktop Connection with administrative credentials provides the permissions that are necessary to write the needed registry keys.>

Print Friendly and PDF
Share/Bookmark

Delete files and folder more than 30 day

Delete files and folder more than 30 day

 

forfiles /p "c:\temp\abc" /s /c "cmd /c rmdir /s/q @path" /d -30

forfiles /p "c:\temp\ghj" /s /c "cmd /c if @isdir==FALSE echo del @file & del @file" /d -30

forfiles /p "c:\temp\xyz" /s /c "cmd /c rmdir /s/q @path" /d -30 /m xyz_*

Print Friendly and PDF
Share/Bookmark

To create a detailed log file for user profiles

  1. In the Run dialog box, type regedit, and then click OK.

  2. Locate the following subkey: HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon.

  3. Create a new entry named UserEnvDebugLevel of data type REG_DWORD, and set its value to 0x30002.

The log file is stored in this location: %windir%\Debug\Usermode\Userenv.log.

Print Friendly and PDF
Share/Bookmark

Roaming Profiles Not Sync on Logoff

Make sure the profile share is *not* set to allow offline files/caching! (that's on by default - disable it)

Print Friendly and PDF
Share/Bookmark

(Freeware) Total Network Monitor 1.1.3

http://www.softinventive.com/products/total-network-monitor/

Print Friendly and PDF
Share/Bookmark

Create folder with permission and map drive by username

Create folder with permission

 

@echo off

 

for /f %%i in (x:\abc\namefile.txt) do mkdir g:\backup\%%i

g:

cd g:\backup\

FOR /D %%A IN (*) DO cscript x:\abc\xCACLS.vbs g:\backup\%%A /T /E /G domain\%%A:F

 

Remark: For/D %%A IN (*) which is the command running path (e.g. It running in g:\backup\), it will scan all folder in g:\backup\

The backup folder users permission need to set this folder only, otherwise it will  inherited to the \backup\%username%

 

 

map drive by username

 

net use Z: \\abc_server\backup\%username%

Print Friendly and PDF
Share/Bookmark

[open source] Two Server and Network management system/tools

1.       Fully Automated Nagios

 

FAN is based on CentOS (which is not going away despite rumors in the open source community). CentOS has an advantage over many other open source OS' in that it is designed to be a full enterprise class OS that can take advantage of multiple CPU's, clustering etc. On that solid base we have added the follow must have apps for Nagios:

- Nagios plug -ins: A ton of plug-ins to monitor different equipment on your network.
- Centreon: Web interface for Nagios. Centreon has long been the best Web U/I front end for Nagios.
- NagVis: Advanced mapping. I mean advanced too. The mapping views and capabilities of NagVis are much better then many commercial NMS' out there. (except Cisco Works which is the BEST...)
- NDOUtils: stores the Nagios data into a MySQL database.
- NRPE: This is designed to allow you to execute Nagios plugins on remote Linux/Unix machines to monitor resources like CPU load, memory usage, etc on remote servers. Double check to make sure that any server based firewall is mapped for the listener. Normally this is port 5666 but you can change/check this in /usr/local/nagios/etc/nrpe.cfg
- NaReTo: Nagios Reporting Tools. This is a basic reporting tool. It is OK. Not the best and not the worst.

Installing FAN is simple, painless and quick. It needs about a gig of space. You just need to config a machine name, DNS and a IP address. Make sure you use a hard set IP address and not DHCP since that can make the database inconsistent. CentOS normally does not install and start the GUI front end like other LiveCD so just in case, you can do this with the command set:

yum --exclude=nautilus-sendto groupinstall "GNOME Desktop Environment" "X Window System"

http://fannagioscd.sourceforge.net/drupal/

 

2.       CactiEZ

 

CactiEZ is a self installing Linux Distribution based off CentOS that sets up and configures a customized Cacti install. Everything is designed to be completely automated and working directly out of the box. This compact distro is loaded with extra features such as Syslog and Netflow data collection, Weathermaps, Reports, Auto Discovery, Router Config backup, Nagios, and much more! Both 32 Bit and 64 Bit installations are possible from the same CD.

 

http://cactiez.cactiusers.org/

Print Friendly and PDF
Share/Bookmark

Check your proxy for anonymity or what can be known about you on the Internet

https://www.megaproxy.com/freesurf/

http://www.freeproxy.ru/en/free_proxy/info_about_you.htm

http://checker.samair.ru/

https://www.ultravpn.fr/

http://www.stilllistener.addr.com/checkpoint1/index.shtml

Print Friendly and PDF
Share/Bookmark

(Freeware) iSafePDF is a PDF protection software

It allows you to encrypt PDF document, signe them using a certificate and timestamp the signature.

http://isafepdf.codeplex.com/

Print Friendly and PDF
Share/Bookmark

Run Windows Explorer as Another User

For IE 6

 

runas /user:domain or local\Administrator "explorer.exe"

 

For IE 7/8

 

runas /user:domain or local\Administrator "explorer.exe /separate"

Print Friendly and PDF
Share/Bookmark

Delete file sharing and file by command

To delete the share (Not file only the sharing to become unshared):

 

net share backup$ /Delete

 

To delete the data of the backup folder

 

rmdir X:\backup /s/q

Print Friendly and PDF
Share/Bookmark

To Create folder and grant permission to user to access this folder and his/her own folder by batch

To Create folder and grant permission to user to access this folder and his/her own folder:

 

Prepare the username into a file call namefile.txt in X:\backup\namefile.txt

 

Batch to create folder name from a name list (Must be same at Windows login name):

 

@echo off

 

for /f %%i in (X:\backup\namefile.txt) do mkdir %%i

 

(Remark: if running in console/command prompt it should be “for /F %i in (X:\backup\namefile.txt) do mkdir %i”)

 

e.g. \\server\backup$\userA

 

To grant permission to the individual folder:

 

@echo off

 

FOR /D %%A IN (*) DO cscript xCACLS.vbs X:\backup\%%A /T /E /G MyDomain\%%A:F

 

 

Print Friendly and PDF
Share/Bookmark

FOR at console(command prompt) and in batch used differently

“FOR” at console(command prompt) and in batch used differently

This error is being caused by the FOR command. Your command is correct when typed at the console, but when using this command in a batch file you need to precede your % variables with a double %.

 

To Create folder and grant permission to user to access this folder and his/her own folder:

 

Batch to create folder name from a name list:

 

@echo off

 

for /f %%i in (C:\temp\file.txt) do mkdir %%i

 

(Remark: if running in console/command prompt it should be “for /F %i in (C:\temp\file.txt) do mkdir %i”)

Print Friendly and PDF
Share/Bookmark

User eraser to delete MSN/Skype history + Check the temp folder exist and copy file to this folder

The user logon script:

 

Check temp exist and deploy sleep.exe

***************************************************************

C:

if not exist c:\temp\ (md C:\temp)

cd C:\temp

if exist C:\temp\sleep.exe (echo exist!)

if not exist C:\temp\sleep.exe (copy \\SRV\remoteinstall$\Sleep\sleep.exe C:\Temp\ /Y)

***************************************************************

The Startup Script have been create for client at the following:

 

***************************************************************

C:\Temp\sleep.exe 55

 

FOR /F %%A IN ('DIR/B "C:\Documents and Settings"') DO FOR /F %%B IN ('DIR/B "C:\Documents and Settings\%%A\My Documents\My Received Files"') DO copy NUL "C:\Documents and Settings\%%A\My Documents\My Received Files\%%B\history\dont_delete.txt"

 

FOR /F %%A IN ('DIR/B "C:\Documents and Settings"') DO FOR /F %%B IN ('DIR/B "C:\Documents and Settings\%%A\Application Data\Skype"') DO copy NUL "C:\Documents and Settings\%%A\Application Data\Skype\%%B\dont_delete.txt"

 

FOR /F %%A IN ('DIR/B "C:\Documents and Settings"') DO "C:\Program Files\Eraser\"eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --dir="C:\\Documents and Settings\\%%A\\Application Data\\Skype\\,includeMask=*.dbb,excludeMask=*.FOLDER"

 

FOR /F %%A IN ('DIR/B "C:\Documents and Settings"') DO "C:\Program Files\Eraser\"eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --dir="C:\\Documents and Settings\\%%A\\My Documents\\My Received Files\\,includeMask=*.xml,excludeMask=*.FOLDER"

***************************************************************

 

 

 

***************************************************************

@echo off

FOR /F %%A IN ('DIR/B "C:\Documents and Settings"') DO "C:\Program Files\Eraser\"eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --dir="C:\\Documents and Settings\\%%A\\Application Data\\Skype\\,includeMask=*.dbb,excludeMask=*.FOLDER"

 

FOR /F %%A IN ('DIR/B "C:\Documents and Settings"') DO "C:\Program Files\Eraser\"eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --dir="C:\\Documents and Settings\\%%A\\My Documents\\My Received Files\\,includeMask=*.xml,excludeMask=*.FOLDER"

***************************************************************

 

usage: Eraser <action> <arguments>

 

where action is

    help                    Show this help message.

    addtask                 Adds tasks to the current task list.

    querymethods            Lists all registered Erasure methods.

 

global parameters:

    --quiet, -q             Do not create a Console window to display progress.

 

parameters for help:

    eraser help

 

Eraser querymethods

 

   Method                                  GUID

-------------------------------------------------------------------------------

U  Gutmann                                 1407fc4e-feff-4375-b4fb-d7efbb7e9922

U  Gutmann Lite                            ae5eb764-41b0-4601-bdf2-326b5838d44a

U  US DoD 5220.22-M (8-306./E, C & E)      d1583631-702e-4dbf-a0e9-c35dba481702

U  RCMP TSSIT OPS-II                       f335cc40-5de5-4733-90b1-6957b4a45688

U  Schneier 7 pass                         b1bfab4a-31d3-43a5-914c-e9892c78afd8

U  German VSITR                            607632b2-651b-4935-883a-bdaa74febb54

U  US DoD 5220.22-M (8-306./E)             ecbf4998-0b4f-445c-9a06-23627659e419

U  British HMG IS5 (Enhanced)              45671da4-9401-46e4-9c0d-89b94e89c8b5

U  US Air Force 5020                       7bf5b185-8ea5-4e12-83f1-f6c2efb3d2c2

U  US Army AR380-19                        0fe620ea-8055-4861-b5bb-bd8bdc3fd4ac

U  Russian GOST P50739-95                  92681583-f484-415f-a66c-cc210222edc5

U  British HMG IS5 (Baseline)              9acdbd78-0406-4116-87e5-263e5e3b2e0d

U  Pseudorandom Data                       bf8ba267-231a-4085-9bf9-204de65a6641

   First/last 16KB Erasure                 0c2e07bf-0207-49a3-ade8-46f9e1499c01

 

Press enter to continue . . .

 

Some example for Eraser command:

 

 

Erase a specific file:

C:\Program Files\Eraser>eraser addtask -q --schedule=now --file=C:\\Temp\\test\\a.xml

 

C:\Program Files\Eraser>eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --file=C:\\Temp\\test\\a.xml

 

C:\Program Files\Eraser>eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --dir=C:\\Temp\\test\\,includeMask=*.xml

 

C:\Program Files\Eraser>eraser addtask -q --method=1407fc4e-feff-4375-b4fb-d7efbb7e9922 --schedule=now --dir=C:\\Temp\\test\\,includeMask=*.dbb

Print Friendly and PDF
Share/Bookmark

(Freeware) Delete data in Windows permanently

Eraser is an advanced security tool for Windows which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 98, ME, NT, 2000, XP, Vista, Windows Server 2003 and Server 2008.

Eraser is Free software and its source code is released under GNU General Public License.

http://eraser.heidi.ie/index.php

The program source is a .exe, we can unpackaged it into a .msi file and install the msi by using command with no user interactive. We can use this exe file via GPO deploy of this software.

And also, this software is support command line (not official support – may be support in the future) 

 

The Eraser’s default file erasure method – Gutmann is the most secure method of the program provide and it should be delete those data securely* (not able to recover)

 

The Gutmann method is an algorithm for securely erasing the contents of computer hard drives, such as files. Devised by Peter Gutmann and Colin Plumb, it does so by writing a series of 35 patterns over the region to be erased.

 

* There is currently no published evidence as to intelligence agencies' ability to recover files whose sectors have been overwritten, although published Government security procedures clearly consider an overwritten disk to still be sensitive.

Companies specializing in recovery of damaged media (e.g., media damaged by fire, water or otherwise) cannot recover completely overwritten files. No private data recovery company currently claims that it can reconstruct completely overwritten data.

 

Reference:

http://en.wikipedia.org/wiki/Gutmann_method

http://en.wikipedia.org/wiki/Peter_Gutmann_%28computer_scientist%29

Print Friendly and PDF
Share/Bookmark