Skip to main content

Posts

Showing posts from 2013

Configuring Proxy Using GPO in Microsoft Server 2008

Configuring Machine as the Default Proxy Using GPO in Windows ® Server 2008 To configure the Proxy Settings on all client machines to use GFI WebMonitor as a proxy server through Windows ® Server 2008 GPO: 1. In command prompt, key in mmc.exe and press Enter . 2. In the Console Root window, navigate to File > Add/Remove Snap-in… to open the Add or Remove Snap-ins window. Screenshot 14: Add/Remove Snap-ins window 3. Select Group Policy Management from the Available snap-ins list, and click Add . 4. Click OK . Screenshot 15: Console Root domain window 5. Expand Group Policy Management > Forest > Domains and <domain>, then select the organizational unit where you wish to apply the group policy. NOTE To apply the group policy to all domain computers , select the domain node directly. 6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor . Screenshot 16: GPO

Disabling Internet Connections Page Using GPO in Microsoft Windows Server 2008

Disabling Internet Connections Page Using GPO in Windows ® Server 2008 To disable Connections settings on clients’ machines through Windows ® Server 2008 GPO: 1. In the command prompt key in mmc.exe and press Enter . 2. In the Console Root window, navigate to File > Add/Remove Snap-in… to open the Add or Remove Snap-ins window. Screenshot 102: Add/Remove Snap-ins window 3. Select Group Policy Management from the Available snap-ins list, and click Add . 4. Click OK . Screenshot 103: Console Root domain window 5. Expand Group Policy Management > Forest > Domains and <domain> . 6. Right-click Default Domain Policy and click Edit to open the Group Policy Management Editor . Screenshot 104: Group Policy Management Editor window 7. Expand User Configuration > Policies > Admin

Configuring netflow data export on an IOS device

In the configuration mode on the router or MSFC, issue the following to start NetFlow Export. First enable Cisco Express Forwarding: router(config)# ip cef router(config)# ip cef distributed And turn on flow accounting for each input interface with the interface command: interface ip flow ingress or use old (depricated) command: interface ip route-cache flow For example: interface FastEthernet0 ip flow ingress interface Serial2/1 ip flow ingress It is necessary to enable NetFlow on all interfaces through which traffic (you are interested in) will flow. Now, verify that the router (or switch) is generating flow stats - try command 'show ip cache flow'. Note that for routers with distributed switching (GSR's, 75XX's) the RP cli will only show flows that made it up to the RP. To see flows on the individual linecards use the 'attach' or 'if-con' command and issue the 'sh ip ca fl' on each LC. Enable the exports of

Duplicate IP Address has been Detected Rule

A duplicate IP address has been detected on the network Rule Knowledgebase Summary This rule generates an alert when Windows® detects that he local machine’s IP address is in conflict with one or more identical IP addresses on the network. Until the IP address conflict is resolved, remote clients and applications may have difficulty accessing resources on any of the effected computers. Additionally, the local computer may not be able to access network resources. Related Events This rule generates an alert whenever the following events occur and are recorded in the System Event Log: The system detected an address conflict for IP address %2 with the system having network hardware address %3. The local interface has been disabled. Source: TCPIP; Event ID: 4198; The system detected an address conflict for IP address %2 with the system having network hardware address %3. The local interface has been disabled. Source: TCP

How to Delete Wireless Profiles in Windows 8

Missing in Windows 8 is the ability to view and delete all wireless profiles from your PC.  For some unknown reason Microsoft removed that feature which is very problematic if you ever need to edit a saved profile or delete one. I recently had an issue with a wireless access point that had a hidden SSID.  I had to manually setup the connection but I forgot to check the box to connect even if the network is not broadcasting. So I was able to connect the first time but all other attempts failed because the network would not show up on the new wireless charm list. When I would try to re-add the profile again using the manually create wireless screen it would fail because there was another wireless profile with the exact same name.  Since Microsoft tore out the GUI t delete and edit profiles, I was stuck. After some research I found that there is a command line utility that will let you delete profiles.  To use that follow these steps: Open up an administrative level comm

Portable Executable, .EXE, .DLL viewer

Online PE (Portable Executable, .EXE, .DLL) header viewer, no upload needed Direct URL This webapp reads the selected executable file with the HTML5 FileReader and displays the PE headers. The most important information is the "Import directory" where you can check what dlls are used by the application and see the functions imported from the dlls. This will work in browsers supporting HTML5 FileReader API and typed arrays. Tested with Firefox 4 and Google Chrome 11.

HOW TO SOLVE PROBLEM, SERVER SECURITY CERTIFICATE IS NOT YET VALID

Some time you install fresh Operating system in your computer and then you install Browser, google chrome. After installation you try to open gmail, yahoo, or facebook in google chrome but you do not see your required page and see a message “Server Security Certificate is not yet valid”.  Then you also try to open the page by clicking on “continue anyway” but the result is same. Infect this problem occurs due to incorrect date and time of your computer. By synchronizing your system clock you can solve this problem. I will tell you the best solution of this problem. Just follow these steps and after completion you will be able to login to facebook, yahoo, gmail etc. Click on Start Menu and then control penal.  Open Date/Time setting  Adjust correct date and time according to your region.   Open "Internet Time Zone" tab.    Click on "Update Now" button. After clicking on button, It will start synchronzing your internet server timing.  After

Data Security

Disable Remote Registry Editing Only you should be editing your Windows registry, so make sure this service is disabled by clicking Start, Run, and then typing "services.msc." Scroll down to Remote Registry and make sure the service is stopped, and then set it to either manual or disable. Lock It Down It's always a good idea to lock your PC if strangers are nearby and you step away for a few minutes. Just press Windows key+L to lock your PC. Alternatively, you can set your screensaver (via the Screensaver tab in Display Settings under Control Panel) to require a password if it's deactivated by checking the box in "Settings" that says "On resume, password protect." Prevent Phishing Attacks Protect yourself from identity theft and phishing attacks by using the the latest versions of Firefox, Internet Explorer, and Opera. These browsers include protection that double-checks URLs against a blacklist, and will notify you if you&#

Wireless Home Networking

Fix Connectivity Issues It sounds crazy, but 95 percent of all Internet connectivity problems can be solved by power-cycling both the router and the modem. Turn them both off, and then turn the modem back on first. Once its "sync" or signal light comes on, turn on your router. Use Encryption You've probably heard this before, but it bears repeating: Always enable your router's wireless security! Wired Equivalent Privacy (WEP) encryption is the oldest (and weakest) form of security; the newer (and stronger) Wi-Fi Protected Access (WPA) and WPA-2 are the best protection available today for home users. Update Your Router's Firmware All routers include internal read-only chips with embedded instructions that can be updated by the manufacturer. Router manufacturers generally update a product's firmware to increase performance as well as to resolve bugs and security issues, so it's wise to keep your router's firmware up-to-date. C

General Computer Tricks Everyone Should Know

Windows hidden "god mode" folder Windows offers a centralized Control Panel for all of the OS settings, which makes it easy for users to tweak everything from desktop background to setting up a VPN. To enter this mode, create a new folder with this exact name (copy and paste it): God Mode.{ED7BA470-8E54-465E-825C-99712043E01C} . The folder icon will change to a Control Panel-style icon, and you will be able to jump in and change all kinds of settings. Note: Don't try this on Windows Vista 64-bit as it's known to cause a reboot loop. Use Problem Steps Recorder This handy tool automatically records any mouse clicks and takes screenshots for you. If you need tech assistance with your computer, go to Run by typing Windows + R, and then type "psr." Use the tool and by the time you are finished, you can send this information, neatly compiled automatically, to the person helping you with the issue. It will make the process of finding the problem muc

Backup Registry

Backup Registry Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state. How to Export Registry Keys Click Start, and then click Run. In the Open box, type regedit, and then click OK. On the File menu, click Export. In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry. Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save. How to Restore the Registry To restore registry keys that you exported, double-click the .reg file that you saved. __________________

Automatic Windows Installation...no keypress required !!!

Automatic Windows Installation...no keypress required !!! -------------------------------------------------------------------------------- An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here: Code: http://unattended.msfn.org Make your unattended setup now!

Auto Shutdown Pc without using any external program

Auto Shutdown Pc without using any external program -------------------------------------------------------------------------------- Auto Shutdown Pc without using any external program ::::::::::::::::::: ********** METHOD # 1 *************** Do you know that you can make your PC shutdown at a time u wish to? Here is the trick!! How To Make A Shutdown Timer! Step 1: Right click on your desktop and choose "New=>shortcuts". Step 2: In the box that says "Type the location of the shortcut", type in "shutdown -s -t 3600" without the quotation marks and click next. Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs. Step 3: Make up a name for the shortcut and you're done. You can change the icon by right clicking=>properities=>change icon=>browse. To abort To make an abort key to stop the shutdown timer just create another shortcut and make the "location of the shortcut" to " shutdown

Auto End Tasks to Enable a Proper Shutdown

Auto End Tasks to Enable a Proper Shutdown This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTE Windows Registry Editor Version 5.00 Code: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] "AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control] "WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg 3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Application and Boot file Defrag

Application and Boot file Defrag This type of defrag pushes all commonly used programs and boot files to the edge of the hard drive for faster access. Windows XP normally schedules this every three days when it is idle, however you can force it to do this by useing the b switch anytime i.e defrag c: -b

Another Hidden Windows XP Application : Windows Event Viewer

Another Hidden Windows XP Application : Windows Event Viewer Windows Event Viewer is a little-known tool that can help you troubleshoot PC problems. It keeps a log of things that happen on your system. But you will have to do some work to find it. Now, if you want to know if little Billy has been playing computer games, you'll have to look elsewhere. Event Viewer just tracks system events. For example, you'll see entries for when the computer is booted or shut down. To locate the Event Viewer, click Start>>Control Panel. Double-click Administrative Tools and double-click Event Viewer. In the left side of the window, you'll see three entries: Application, Security and System. You'll probably be most interested in System events, or maybe Application events. To view the events for a specific category, click its name in the left pane. The events for that category will be listed in the right pane. The events listed probably won't mean much to you. For example, it

Anonymous visit to windows update

Code: Please back up your registry before trying any of these registry tricks. Would you like to use the Windows Update feature without being forced to register with Microsoft? OK then, this is what you can do: Launch good ol' Regedit. Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion. Look for a value named RegDone. If it isn't there create a new value with that name. Right click the new value and choose Modify. Make the value 1. Close Regedit and Enjoy!

add the open cmd prompt to folder context menus

add the open cmd prompt to folder context menus also drives and My Computer copy what's in the code area to notepad and save as cmdhere.reg CODE Windows Registry Editor Version 5.00 Code: [HKEY_CLASSES_ROOT\Drive\shell\cmd] @="Command Prompt" [HKEY_CLASSES_ROOT\Drive\shell\cmd\command] @="cmd.exe /k \"cd %L\"" [HKEY_CLASSES_ROOT\Directory\shell\cmd] @="Command Prompt" [HKEY_CLASSES_ROOT\Directory\shell\cmd\command] @="cmd.exe /k \"cd %L\"" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd] @="Command Prompt" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd\command] @="cmd.exe /k \"cd %L\""

Add on your Window tips

Add on your Window tips Are you sick of seeing the same tips again and again when you first logon to Windows? Now you can change them to whatever you want, whether it's quotes, jokes or a to-do list, anything is possible. Open your registry and find the key below. Code: HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Tips Create a new string valued named by incrementing the existing value names and set it to the required tip text.

A small tutorial on Real Media Format

A small tutorial on Real Media Format You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files. Very easy. Use notepad to open a new file, type this inside: Code: file://link to file1 file://link to file2(type as many as you want) Close file. Rename it to FileName.rm Then you`re done!!!! Ex: I put my playlist file here: C:\Movies\7VNR And the movie files are in C:\Movies\7VNR\DragonBall Then inside my playlist file I`ll have something like this: file://DragonBall/db134.rm file://DragonBall/db135.rm file://DragonBall/db136.rm file://DragonBall/db137.rm file://DragonBall/db138.rm

How To Compare Two Text Files Using Notepad++

Let’s say you have two text files that are pretty similar in content and you want to find out what the differences are between those two. You can easily do so using Notepad++. Basically, once you have Notepad++ installed, here is what you do: 1. Open up the two files that you want to compare in Notepad++. 2. Goto Plugins > Compare > Compare 3. That’s it! Both files will show up side by side and you will see the differences highlighted. Update 1 : For those who have downloaded newer versions and can’t find the Plugins > Compare > Compare menu, please read how to get compare plugin back into notepad++. Update 2 : There’s now an even easier way to get new plugins such as the “compare plugin” installed into Notepad++. Just use the new Notepad++ Plugin Manager introduced since Notepad v5.6. Go to the Plugins menu > Plugin Manager , check the Compare check box and press install.

Hide your documents inside the image:

1.      To hide your documents, choose an image. 2.      Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR . 3.      In addition, most important is that paste both the files on desktop . You may do this anywhere instead of desktop if you have some basic understanding of command line. 4.      Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it. Cd Desktop CD stands for change directory by typing above command you change your directory to desktop . 5.     After that type command given below. Copy /b imagename.jpg + filename .rar finalimage.jpg     v   Replace imagename.jpg with the name of image you want use for hiding the document. Don't  forget to add image format (E.g. .jpg,.png,.gif) v   Replace filename with name of your file you want to hide. It must be in .rar format. v  Finally replace finalimage.jpg with whatever name you want your final image

How To Reset a Windows 7/windows 2008 r2 server Password

Problem:- .Insert either your Windows 7 installation DVD, or a Windows 7 System Repair disc, into your optical drive and then restart your computer. If you have either on a flash drive, that'll work too. Tip: See How to Boot From a CD, DVD, or BD Disc or How to Boot From a USB Device if you've never booted from portable media before or if you're having trouble doing so. After your computer boots from the disc or flash drive, click Next on the screen with your language and keyboard choices. Tip: Don't see this screen or do you see your typical Windows 7 logon screen? Chances are good that your computer booted from your hard drive (like it normally does) instead of from the disc or flash drive you inserted, which is what you want. See the appropriate link in the tip from Step 1 above for help. Click on the Repair your computer link. Note: If you booted with a system repair disc instead of a Windows 7 installation disc or flash drive, you won

Changing a forgotten root password on an ESX host

Note : In some cases a defective keyboard can cause problems logging into an ESX host. You might want to test with a different physical keyboard if you are having difficulties with known login credentials.   If you have forgotten or do not know the password for the root user on an ESX host, you may be able to change it without reinstalling.    Warning : This can be used maliciously and should be safeguarded against through proper physical access to the host, authenticated remote console access, monitoring and protection against reboot procedures (e.g. grub password) and limited access to the management network.   For more information on security best practices, see http://www.vmware.com/resources/techresources/726 .   Note : The procedure(s) below perform a password reset. This "blindly" replaces the existing root password with a new one. This is not a password recovery mechanism. That is, it does not allow you to learn the original root passw

Useful Websites for Networking Information

As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often. To register domains: InterNIC Network Solutions register.com To check your TCP/IP configuration: DNSstuff To see if your e-mail server has been blacklisted: DNSBL.info To stay current in the industry, try these standards organizations: Institute of Electrical and Electronics Engineers International Organization for Standardization Internet Engineering Task Force Internet Society

Basic Switch Commands to Remember for the CCENT Certification Exam

This section outlines some of the popular commands you use on a Cisco switch for the CCENT certification exam. Most of the basic router commands, such as setting passwords and banners, work on the switch. Command(s) Result Switch#show mac-address-table Used to display the MAC address table on the switch. Switch>enable Switch#config term Switch(config)#hostname NY-SW1 NY-SW1(config)# Used to change the hostname on the switch. NY-SW1>enable NY-SW1#config term NY-SW1(config)#interface vlan1 NY-SW1(config-if)#ip address 23.0.0.25 255.0.0.0 NY-SW1(config-if)#no shutdown NY-SW1(config-if)#exit NY-SW1(config)#ip default-gateway 23.0.0.1 Configures the switch for an IP address so that you can remotely connect to the switch and manage it. Also notice that the default gateway is set. If you do not set the default gateway, you will be unable to manage the switch from a different network. Switch>enable Switch#config term Switch(config)#interface f0/5 S

Network Basics: Ethernet Configurations

Network Basics: Ethernet Configurations Ethernet has a variety of possible configurations, standard, fast and gigabit. Each version operates at different speeds and use different types of media. All the versions of Ethernet are compatible with each other, so you can mix and match them on the same network by using devices such as bridges, hubs, and switches to link network segments that use different types of media. Standard Ethernet Standard Ethernet is the original Ethernet and the slowest. It runs at 10 Mbps, which was considered fast in the 1970s but is now considered slow and obsolete. Standard Ethernet comes in four incarnations, depending on the type of cable used to string the network together: 10Base5: The original Ethernet cable was thick (about as thick as your thumb), heavy, and difficult to work with. It's seen today only in museums. 10Base2: This thinner type of coaxial cable (it resembles television cable) became popular in the 1980s and l