Monday, January 31, 2011

Customize Outlook profiles by using an Outlook Profile (PRF) file

Customize Outlook profiles by using an Outlook Profile (PRF) file

Sysprep Windows 7

Building a Standard Image of Windows 7: Step-by-Step Guide

What Is Sysprep? 

How Sysprep Works

Sysprep functions and known issues 

Manage the Activation Clock

Sysprep a Windows 7 Machine – Start to Finish V2



Creating a default windows 7 profile before imaging - outlook 2010

http://social.technet.microsoft.com/Forums/en-US/w7itproinstall/thread/594eebea-a37a-4fd6-89ae-9eea83b7f24f

Regarding the white background, I would suggest that you create your own theme with required settings and then save the settings as a file and apply this within the sysprep xml file. This should be set in the specialize, microsoft-windows-shell-setup section.

(The below is the process I use for Outlook 2007 and haven't yet tried it with 2010, but I assume it's the same)


For Outlook, it sounds as though you might have run Outlook on the master workstation before creating your master image.

For installing and configuring Outlook I would firstly create an Outlook PRF file that configures Outlook as you require, including defining which server to use etc.

You then need to set a couple of settings within the registry of the user that will become Default User (Administrator code probably) to define which PRF file to use, and that the Outlook profile has not been configured and so needs configuring.

To do this, import the following REG file, obviously with the PRF file in c:\prf for this example. A network share would be a better option though really.

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Setup]
"First-Run"=-
"ImportPRF"="C:\\PRF\\Outlook.PRF"

Creating Unattended Windows 7 Installation

http://social.technet.microsoft.com/Forums/en/w7itproinstall/thread/c784a63f-a49d-4ff1-808c-6bc110e92497



Secure domain join

Secure domain join
http://technet.microsoft.com/en-us/library/cc732280(WS.10).aspx#Image2

Automated method to change a workstations name / Workstation Name Changer / WSName.exe

Workstation Name Changer
WSName.exe
http://mystuff.clarke.co.nz/MyStuff/wsname.asp

Saturday, January 29, 2011

Dell Client Manager / Dell Management Console

Dell and Altiris (Symantec)

How to Easily Evaluate Intel vPro Technology Features on Dell Optiplex Systems



Dell Management Console, powered by Symantec

Because Dell and Symantec have released a new version of Dell Client Manager that can
coexist with the Dell Management Console, no migration utility is provided. Dell Client
Manager functionality is expected to be incorporated into future releases of the Dell
Management Console, at which time a migration tool is expected to be provided

Dell Client Manager
Dell Management Console

Are you talking about the Dell Management Console (DMC) , or the Dell Client Manager (DCM) ? ... DMC is more server centric, and DCM being more client (Optiplex) centric.

DMC will manage all "non-workstation" h/w.  To manage workstations and notebooks, you also need to install Dell Client Manager.  DCM is also on the DMC install media.  That will manage Optiplex, Precision and Latitude.  Once you install, follow the quickstart steps on the DCM portal page.  You will need to push the Altiris agent and OMCI.

http://www.dmcswat.com/

Dell Management Console, powered by Symantec


DMC for Clients = Dell Client Manager



Thursday, January 13, 2011

Vista's MBR Disk Signature

http://www.multibooters.co.uk/mbr.html

The Disk Signature and Drive Letters
Windows NT operating systems will remember the drive letters that have previously been assigned to partitions and drives. This differs from Win9x where drive letters are assigned on every bootup in a default order as the partitions and drives are discovered, which means changes to partitions or the adding of drives can cause letters to change. With NT the current hard drive partition drive letters can be maintained by linking them to a partition by using a unique number that is assigned to each partition and stored in the Windows registry. This unique partition number is generated from the disk signature of the hard drive and the partition offset. On Windows bootup the partition number is compared with the disk signature and if they match then the partition will be assigned the same drive letter that had previously been allocated to it.
If a disk signature is changed then Windows unique partition numbers become invalid. They no longer match the MBR disk signature and therefore drive letter assignments are lost. On first reboot after a signature change each partition on the affected drive will have its unique number recreated to match the new disk signature, then be reassigned a drive letter. These reassigned letters may not match the originals and so your drive letters may change. (You will also be informed that your new device/s have been installed and a reboot is required).
When you are using the Windows built-in bootmanager to dual or multiboot it is vital to maintain drive letters because Windows might not see itself as the default C: drive. If you have a Windows install that considers itself to be say the E: drive and a disk signature change causes this assignment to be lost, then during early bootup Windows will reassign drive letters in the default order, which will be the System partition as C: and the Boot partition as D:, which means later in the boot process the registry paths such as E:/Windows and E:/Documents and Settings, will be invalid. Windows 2K and XP cannot recover from such a drive letter change, but Vista seems to be a bit more adaptable and will struggle to the desktop, from where it is possible to edit the registry to restore the required drive letters, (see Drive Letter Problems). Be aware that with Vista it is possible when using the Microsoft bootmanager to have the Vista install see itself as the C: drive even when it is in fact a Boot partition to a different System partition. In this situation a drive letter re-ordering event caused by a signature change will assign the default D: letter to the Boot partition, causing the aforementioned problems.

Friday, January 7, 2011

ImgBurn

http://en.wikipedia.org/wiki/ImgBurn
http://www.imgburn.com/

ImgBurn is a lightweight CD / DVD / HD DVD / Blu-ray burning application that everyone should have in their toolkit!

It has several 'Modes', each one for performing a different task:
Read - Read a disc to an image file
Build - Create an image file from files on your computer or network - or you can write the files directly to a disc
Write - Write an image file to a disc
Verify - Check a disc is 100% readable. Optionally, you can also have ImgBurn compare it against a given image file to ensure the actual data is correct
Discovery - Put your drive / media to the test! Used in combination with DVDInfoPro, you can check the quality of the burns your drive is producing

ImgBurn is a freeware program that allows the recording of many types of CD/DVD images to recordable media (.cue files are supported as of version 2.4.0.0).[3] Starting with version 2.0.0.0, ImgBurn can also burn files and data directly to CD/DVD.

ImgBurn supports a wide range of image file formats - including BIN, CCD, CUE, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI.

Saturday, January 1, 2011

ISO images via Virtual Drives

http://msdn.microsoft.com/en-us/subscriptions/aa948864.aspx


Using ISO Image Files

Many products are posted as ISO-9660 image files. An ISO-9660 image file is an exact representation of a CD or DVD, including the content and the logical format. The most common use of an image file is to write it to a blank CD-R or DVD-R, resulting in an identical copy of the original disc including file name and volume label information. ISO image files may also be opened and their contents copied to a local folder, much like ZIP files. ISO files may also be virtually mounted and accessed as a device. These three methods of using ISO images are described below. Note: you may have to rename the file extension from .IMG or .UDF to .ISO, depending on your software.

Writing ISO files to CD-R or DVD-R

Most CD-R/DVD-R writing software includes a feature to create a disc from an image file. Note: you must use the special "copy image to CD" or "burn image" functionality. See your software’s Help for detailed information.
Writing ISO images to CD-Rs and DVD-Rs
The Windows Server 2003 Resource Kit includes the DVDBURN.EXE command line tool.   Though it has not been tested by Microsoft, many customers also report success using ISO Recorder.
Testing CD-Rs and DVD-Rs
After a CD/DVD-R has been written, you can use the CRC tool to verify that the process was successful.
  1. The CRC305.exe tool can be downloaded from MSDN Subscriber Downloads in the Tools and Resources folder.
  2. From a command prompt, run CRC305 filename (where filename is the image file name.)
  3. Run CRC305 x: (where x is the drive letter of the drive containing the CD/DVD-R). The CRC values should match.
Alternatively, there are many freeware programs available for calculating an SHA-1 hash value that is provided on each download page on MSDN Subscriber Downloads. Use your favorite Internet search engine to look for sha1 hash to find them.
Accessing ISO images via Virtual Drives
Certain tools exist which create a virtual disc drive on your PC and mount an ISO image on that drive.  These tools typically assign a new drive letter to this drive, and the contents of the image can be accessed by opening “My Computer” and double clicking on the new drive.
Though they have not been tested nor are supported by the Subscriptions team, customers report that Daemon Tools offers such capability as well as Microsoft Virtual CD Control Tool.
Other products like IsoBuster and WinRar can access the contents of ISO images directly and verify ISO files, but also have not been tested nor are supported by the Subscriptions team.

Sunday, December 19, 2010

Sysprep - Description of the Windows XP Corporate Deployment tools and documentation

Sysprep
http://support.microsoft.com/kb/321880

The Windows XP Corporate Deployment tools contain the following tools and documentation:
Deploy.chm: This is the "Microsoft Windows Corporate Deployment Tools User's Guide" documentation.
Ref.chm: This is the "Microsoft Windows Preinstallation Reference" documentation.
Factory.exe, Setupcl.exe, and Sysprep.exe: These are the Sysprep components. Sysprep is a tool that prepares the hard disk on a source computer for duplication on other computers with the same hard disks.
Oformat.com: This is a command-line tool to create a volume that uses the FAT32 file system. The tool creates a FAT32 volume with clusters that are aligned in an optimal way for later conversion to the NTFS file system.
Cvtarea.exe: This is a command-line tool to create files and to analyze the placement of those files on a volume that uses the FAT32 or FAT file system. You can use this tool to create a contiguous file in a specific location on the disk. This may be useful if your manufacturing processes requires you to format a hard disk with the FAT or FAT32 file system before you convert the hard disk to the NTFS file system. You can use the Cvtarea tool to create a reserved, contiguous, placeholder file that is to be used for the NTFS metadata files after the conversion. This causes the resulting file system to be less fragmented and more efficient.
Setupmgr.exe: This is the Setup Manager Wizard. You can use this to create or to modify the files that control an unattended Setup.
Readme.txt: This is the Readme documentation for the Windows XP Corporate Deployment tools.

Wednesday, December 15, 2010

Good AntiMalware

Malwarebytes' Anti-Malware (MBAM)
http://en.wikipedia.org/wiki/Malwarebytes%27_Anti-Malware 
http://malwarebytes.org/ 


Hitman Pro
http://en.wikipedia.org/wiki/Hitman_Pro 
http://www.surfright.nl/en 

Create ISO from folder

Folder2Iso just creates an iso from any kind of folder (with the subfolders).
Its a GUI of mkisofs
mkisofs, a CD filesystem image creator. Because these tools don't include any GUI, many graphical front-ends have been created

http://www.trustfm.net/divx/SoftwareFolder2Iso.php

http://en.wikipedia.org/wiki/Cdrtools

Cdrtools - Highly portable CD/DVD/BluRay command line recording software

http://cdrecord.berlios.de/old/private/cdrecord.html 

 

Monday, December 13, 2010

Acronis Backup & Recovery 10 Clean Up Utility

The utility removes Acronis Backup & Recovery 10 and its components from Windows

Description

Acronis Clean Up Utility is a console application that removes Acronis Backup & Recovery 10 and its components from Windows.
The utility is written using plain commands of command line interpreter (cmd.exe) included in Windows 2000 and higher.




Restore to Dissimilar Hardware

P2V restoration:
V2P restoration:
Dissimilar hardware restoration:
Restore to different hardware:
  • StorageCraft Shadowprotect - "Hardware Independent Restore" (HIR)
  • Acronis Backup & Recovery - "Universal Restore"
  • Symantecs Backup Exec System Recovery - "Restore Anyware"

Troubleshooting tips and tricks for the Restore Anyware Option (RAO)
Using the Hidden Options for Restore Anyware when restoring an image from the Symantec Recovery Disk (SRD)

    Sunday, December 12, 2010

    Hardware Identification Programs / System Profiler Software

    computer diagnostics, system profiling, benchmark, overclocking, troubleshooting, hardware and software installed.

    system profiler software
    http://en.wikipedia.org/wiki/System_profiler

    Hardware Identification Programs:
    Sandra, Everest/Aida, HWInfo

    http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2BSandra+%2BEverest+%2BHwinfo&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=


    How to Find Device ID’s to Resolve Unknown Device Problems 
    (http://www.webcitation.org/5uvnKqRwc)

    http://www.pcidatabase.com/ 

    To identify the device by its PCI ID, refer to http://pciids.sourceforge.net

    http://driveragent.com/ 
    http://biosagentplus.com/ 
    http://esupport.com/ 
    http://en.wikipedia.org/wiki/Phoenix_Technologies 

    eSupport.com Partners With FinalWire Ltd., the Creators of AIDA64 Extreme Edition)
    Newest version of AIDA64 Extreme Edition features DriverAgent & BIOSAgentPlus

    http://www.aida64.com/ 

    Phoenix Technologies(R) Helps Consumers Recover Lost Files With New FileRestorePlus(TM)
    Upgraded FileRestorePlus expands PC tools and Optimization products available through eSupport.com

    http://filerestoreplus.com/ 


     


     

    Friday, December 10, 2010

    Program to manage other computers on the network?

    Alchemy Remote Executor

    EMCO Remote Installer

    SysTracer - Track file and registry changes in your computer

    http://www.blueproject.ro/systracer 

    SysTracer v2.2: trace your system changes

    SysTracer is a system utility tool that can scan and analyze your computer to find changed (added, modified or deleted) data into registry and files.
    SysTracer can scan your system and record information about:
    • changed files and folders
    • modified registry entries
    • system services
    • system drivers
    • applications that are configured to run at computer startup
    • running processes
    • loaded dlls
    Each scan operation performed with SysTracer generates a binary image file representing a snapshot of your system.
    Recording the snapshot usually takes a few minutes depending on your system complexity. You can choose to scan only specific parts from folders or registry, in order to speed up the recording process.
    By comparing snapshots from before and after a new program installation or execution, you can determine which files or registry entries were added, changed, or deleted.
    You can create as many snapshots as you may want or need, and you can compare anytime any pair of them, having the possibility to export differences to HTML list.

    SysTracer Pro

    SysTracer Pro is an enhanced version of SysTracer. SysTracer Pro have advanced functionality like exporting and importing snapshots, useful in order to compare snapshots taken on different computers.
    With SysTracer Pro you can search for files, folders and registry information into recorded snapshots.
    SysTracer Pro have command line support, for automating recording snapshots and exporting snapshots differences.
    Visit SysTracer features section for a detailed comparison matrix between SysTracer and SysTracer Pro.

    Remote scanning - track changes from network computers

    SysTracer have support for remote scanning, providing you an easy way to take snapshots of your network computers.
    In order to allow scanning, each computer from your network will have a SysTracer executable installed as windows service.
    The management of the entire process is done from a single computer (server) with a SysTracer instance running in normal desktop mode. From this server you will be able to control each SysTracer client by selecting scan targets, sending scan commands and receiving resulted snapshots.

    Portable version

    SysTracer can be used with or without installation.
    Using the portable version - without installation - you can take snapshots of your system without making any changes to the current files or Windows registry.
    The application can be used directly from the HDD or from an USB flash drive.

    http://www.blueproject.ro/systracer

    Thursday, December 2, 2010

    http://decoder.comunicazioni.it/

    http://decoder.comunicazioni.it/

    Wednesday, November 24, 2010

    Microsoft Sync Framework SyncToy PowerToy

    http://en.wikipedia.org/wiki/Microsoft_Sync_Framework

    http://en.wikipedia.org/wiki/SyncToy

    SyncToy 2.1

    Elevation PowerToys / Execute programs elevated from command prompt

    Microsoft Elevation PowerToys

    Elevation from command line
    Run elevated from CMD

     http://technet.microsoft.com/en-us/magazine/2008.06.elevation.aspx

    http://download.microsoft.com/download/f/d/0/fd05def7-68a1-4f71-8546-25c359cc0842/Elevation2008_06.exe

    Powershell scripts

    $Win32_OS = Get-WmiObject Win32_OperatingSystem -computer PutHereComputerName -credential domain\administrator | select *

    Delete Windows User Profile

    The users hive is located under their user directory (NTUSER.DAT) so deleting the directory with an rmdir /s /q {username} should suffice. The only part that wouldn't be deleted is under the profile list in the registry HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList but all that does is map the SID to a profile location.
    If the user logs in and the directory doesn't exist, it'll be created again.
    Unfortunately, without having them elevate themselves as admins, they won't be able to delete user profiles.
    Batch file:
    set /p USERTODEL=Enter the username to delete: set USERTODEL=C:\Users\%USERTODEL%
    if exist "%USERTODEL%" rmdir /s /q %USERTODEL%
      

    Saturday, October 2, 2010

    Internet Explorer Administration Kit (IEAK)

    Internet Explorer Administration Kit (IEAK)

    http://en.wikipedia.org/wiki/IEAK

    Managing Browser Settings Through IEAK 8 Profile Manager (http://technet.microsoft.com/en-us/library/cc985349.aspx)

    Automatic configuration .ins file
    The default name of this file is Install.ins 
    IEAK Profile Manager stamps each .ins file with a version number. The version number combines the date that the .ins file was modified and the number of times the file has been revised. For example, 2007.02.14.01 shows that the file was modified only once and that modification occurred on February 14, 2007. 

    IEAK Profile Manager
    (http://technet.microsoft.com/en-us/library/cc961382.aspx)

    Files Generated by the IEAK Profile Manager

    When you update and save your configuration settings, the IEAK Profile Manager generates the following files:

    Auto-configuration .ins file - This file contains the browser and component settings that Internet Explorer uses to update the browser configuration on users' computers. You can specify these settings in the Wizard Settings section of the IEAK Profile Manager.

    Cabinet (.cab) files - These files are used to organize the installation files that are downloaded to the users' computers. You should digitally sign the .cab files created by the IEAK Profile Manager. For more information about signing your .cab files, see Chapter 12 , "Preparing for the IEAK."
    The auto-configuration .cab files also contain information (.inf) files.

    Information (.inf) files - These files contain the system policies and restrictions that the operating system uses to update the system configuration on users' computers. You can specify these settings in the Policies and Restrictions section of the IEAK Profile Manager.
    Each .inf file also contains version information. When you change configuration settings, the IEAK Profile Manager updates the affected .inf files and their version information and repackages the companion .cab files.

    Internet Explorer downloads and processes the contents of the auto-configuration .ins file and makes the necessary configuration changes on the users' computers. Internet Explorer also downloads and unpacks the companion .cab files for the operating system to process. If the version number of the auto-configuration .ins file does not change, new .cab files are not downloaded. The version number consists of the date the .ins file was modified and the number of times the file has been revised.

     

    Thursday, September 30, 2010

    Run a program with administrator rights / Tools that allow one to run a program as other user without giving password each time / How to run a process using different credentials

    joeware.net - CPAU (Create Process As User) like RunAs but with an options to encrypt the password

    Run a program with administrator rights – RUNASSPC, CPAU and Steel Run As compared

    http://www.robotronic.de/runasspcEn.html

    http://www.joeware.net/freetools/tools/cpau/index.htm

    http://minasi.com/forum/topic.asp?TOPIC_ID=13514

    I would recommend the following runas utilities:

    CPAU (http://www.joeware.net)
    PsExec (http://www.sysinternals.com)
    LSrunas/LSrunasE (http://www.lansweeper.com/) - (uses non-standard encryption)
    Runasspc (http://robotronic.de/runasspcEn.html) - (uses AES-256 encryption)

    I would highly recommend using Runasspc for security reasons as the other programs have no or weak encryption. Keep in mind when you don't use encryption the password is being sent as clear-text over the wire and can be easily captured by a network sniffer. Also I would recommend not executing the runas command line in a batch file - this should be embedded in a compiled and obfusticated .exe program.

    Also when using runas to install some software that particular installation software may need to be installed as the active user. To get around this issue without logging off, you will need to launch a hidden command prompt as an Administrator, add the current user to the Administrators group and then run the runas command. After this you will want to remove the current user from the Administrators group. Always check the return code for the command (i.e. NET LOCALGROUP Administrators username /DELETE) that removes the user from the Administrators group so you can verify this has worked.



    Wednesday, September 29, 2010

    Validate domain username and password from workgroup computer / Running Dsa.Msc (Active Directory Users and Computers snap-in) From A Computer Not Joined Into Domain

    Remotely administer a domain from a workgroup PC



    http://forums.asp.net/p/1436962/3244988.aspx

    All you need is here:
    Declare Function LogonUser Lib "ADVAPI32.dll" Alias "LogonUserA" (ByVal lpszUsername As String, ByVal lpszDomain As String, ByVal lpszPassword As String, ByVal dwLogonType As LogonType, ByVal dwLogonProvider As LogonProvider, ByRef phToken As IntPtr) As Int32

    Declare Function GetLastError Lib "kernel32.dll" () As Int32
    _

    Private Shared Function GetWindowsIdentity(ByVal UserName As String, ByVal Domain As String, ByVal Password As String) As WindowsIdentity
    Dim SecurityToken As IntPtr

    Dim Success As Boolean = CBool(LogonUser(UserName, Domain, Password, LogonType.LOGON32_LOGON_NETWORK_CLEARTEXT, LogonProvider.LOGON32_PROVIDER_DEFAULT, SecurityToken))

    If Not Success Then
    Throw New System.Exception("Logon Failed. Error: " & GetLastError())

    End If
    Return New WindowsIdentity(SecurityToken)

    End Function

    Public Enum LogonType As Integer

    LOGON32_LOGON_INTERACTIVE = 2

    LOGON32_LOGON_NETWORK = 3

    LOGON32_LOGON_BATCH = 4

    LOGON32_LOGON_SERVICE = 5

    LOGON32_LOGON_UNLOCK = 7

    LOGON32_LOGON_NETWORK_CLEARTEXT = 8

    LOGON32_LOGON_NEW_CREDENTIALS = 9

    End Enum

    Public Enum LogonProvider As Integer

    LOGON32_PROVIDER_DEFAULT = 0

    End Enum



    To test:

    Dim o As Security.Principal.WindowsIdentity = GetWindowsIdentity("user", "domain", "pass")

    http://us.generation-nt.com/answer/viewing-event-logs-remote-domain-help-68650162.html

    Create a shortcut like this:

    runas /netonly /user:domain\userid "mmc dsa.msc"


    http://www.markwilson.co.uk/blog/2008/03/the-windows-runas-command-and-the-netonly-switch.htm
    Then I found out about an obscure switch for the runas command – /netonly, used to indicate that the supplied credentials are for remote access only. By changing my command to:

    runas /netonly /user:remotecomputername\username mmc

    I was able to authenticate against the remote computer without needing the credentials to also be valid on the local computer, as described by Craig Andera


    http://www.pluralsight-training.net/community/blogs/craig/archive/2003/06/04/785.aspx

    Today I ran across an entirely new option: the /netonly switch. Using it means that the credentials you supply don’t have to be valid on the machine you’re running it on, but will still be passed on when remote calls are made! So cool. Why? Because I’m doing work with Microsoft, and I need to do things against their servers that require authentication. I don’t want to join my machine to their domain, which means I can’t get a process running under my Microsoft domain account. However, using this switch, I can make a process look to remote systems as if it were running under my Microsoft domain account. This turned out to be crucially important for getting our build process working on my machine.

    The one caveat is that since it doesn’t do an actual login, it’ll take whatever password you throw at it. Even if it’s wrong – you won’t find out until you try to actually use those credentials.



    Running Dsa.Msc From A Computer Not Joined Into Domain

    I'm trying to figure out if this is possible:

    I have a laptop that I take to numerous clients, and I
    really don't like to join it to the domain because it's a
    pain to do that constantly and deal with user accounts,
    etc.

    But, I would still like to use dsa.msc (AD Users and
    Computers) and related tools to manage domains from my
    laptop. Is there a way to do this?

    I have tried all combinations of runas.
    Additionally, "Connect To Another Computer/Domain:" (i.e.
    from compmgmt.msc or something) only works on non-DC's
    near as I can tell, so in this configuration it's useless
    for dsa.msc. It just says, "Access is Denied" without
    possibility of prompting for credentials.

    I think it all boils down to the domain not trusting my
    computer and vice versa. This is why I think this may
    not be possible. But, I'm hoping some of you can think
    of a way around this problem.

    Thanks in advance,

    Matt


    You need to be joined to a domain. If the laptop has enough
    horsepower, load Virtual PC and create a XP imeage which you just join
    to client domains.

    No you don't. Assuming you've installed the adminpak.msi on the XP
    machine, you can:

    runas /netonly /user:somedomain\someuserid "mmc dsa.msc"

    Wayne


    Saturday, September 18, 2010

    Submit virus samples to AV companies

    http://www.wilderssecurity.com/showpost.php?s=d37efb74d49df6be58d88f5d37bdf1fe&p=1551851&postcount=43

    --------------------------------------------------------------------------------------------

    Agnitum: http://www.agnitum.com/support/submit_files.php
    Ahnlab: v3sos(at)ahnlab.com, e-support(at)ahnlab.com
    http://global.ahnlab.com/global/virusreport_main.ESD
    ANSAV: http://www.ansav.com (check right sidebar)
    Antiy: submit(at)virusview.net
    Arcabit: wirus(at)arcabit.pl
    http://www.arcabit.pl/sprawdz_pliki
    Avast: virus(at)avast.com
    AVG: virus(at)grisoft.cz
    Avira: virus(at)avira.com, heuristik2(at)avira.com (gen/heur fp)
    http://analysis.avira.com/samples/
    BitDefender: virus_submission(at)bitdefender.com
    http://www.bitdefender.com/site/Know...se/getSupport/ (note)
    BKAV: bkav(at)bkav.com.vn
    BullGuard: support(at)bullguard.com
    Bytehero: virus(at)bytehero.com
    ByteHero: support(at)bytehero.com
    CA: virus(at)ca.com
    http://home3.ca.com/Support/VirusSampleForm.aspx?
    ClamAV: http://cgi.clamav.net/sendvirus.cgi
    CMC: support.is(at)cmclab.net, contact(at)cmcinfosec.com
    Command: virus(at)authentium.com
    Comodo: malwaresubmit(at)avlab.comodo.com, falsepositive(at)avlab.comodo.com
    http://internetsecurity.comodo.com/submit.php
    CyberDefender: support(at)cyberdefender.com
    Dr.Web: vms(at)drweb.com
    https://vms.drweb.com/sendvirus/?lng=en
    eAcceleration: http://research.eacceleration.com/submit_sample/
    eEye: malware(at)eeye.com
    EmsiSoft: submit(at)emsisoft.com, fp(at)emsisoft.com (fp)
    http://www.emsisoft.com/en/support/submit/
    eSafe: esafe.virus(at)eAladdin.com, virus(at)esafe.com
    ESET: samples(at)eset.com
    eXtendia/Guardian: TechSupport(at)BoomerangSoftware.com
    Filseclab: virus(at)filseclab.com
    FireAV: service(at)fireav.com
    Fortinet: submitvirus(at)fortinet.com
    F-Prot: viruslab(at)f-prot.com
    http://www.f-prot.com/virusinfo/submission_form.html
    http://www.f-prot.com/virusinfo/fals...tive_form.html (fp)
    F-Secure: vsamples(at)f-secure.com
    https://analysis.f-secure.com/
    Gdata: http://www.gdatasoftware.com/support.html
    Hacksoft: virus(at)hacksoft.com.pe
    Hauri: hauri98(at)hauri.co.kr
    http://www.hauri.net/support/virus_report.html
    http://www.hauri.net/support/false_report.html (fp)
    Ikarus: samples(at)ikarus.at, false-positive(at)ikarus.at (fp)
    http://www.ikarus-software.at/cgi-bi...s&submit=more+
    Immunet: submit(at)samples.immunet.com, support(at)immunet.com (fp)
    Iolo: support-crm(at)iolo.com
    http://www.iolo.com/customercare/technicalsupport.aspx
    Jiangmin: virus(at)jiangmin.com, open-file(at)jiangmin.com (fp)
    K7 Computing: k7viruslab(at)k7computing.com
    Kaspersky: newvirus(at)kaspersky.com
    Kingsoft: support(at)kingsoftresearch.com
    http://www.kingsoftsupport.com/kingsoft/upload.php
    Lavasoft: research(at)lavasoft.com
    http://upload.lavasoft.com/upload/submit_file.php
    Mcafee: virus_research(at)avertlabs.com, spyware_research(at)avertlabs.com (note)
    datasubmission(at)mcafee.com (fp) (note)
    Micropoint: virus(at)micropoint.com.cn, support(at)micropoint.cn
    http://service.micropoint.com.cn/mail.php (tick 2nd option - To report suspicious files)
    Microsoft: avsubmit(at)submit.microsoft.com, windefend(at)submit.microsoft.com, mfcs(at)submit.microsoft.com
    https://www.microsoft.com/security/portal/submit.aspx
    Microworld: support(at)mwti.net
    MKS-Vir: pomoc(at)mks.com.pl
    http://www.mks.com.pl/pomoc/wyslij_zarazony_plik (1.5 mb limit)
    Moonsecure: http://www.moonsecure.com/vsubmit.php (note)
    MyFreeAntivirus: http://smartpctools.com/support.html
    Net Protector: service(at)indiaantivirus.com
    http://indiaantivirus.com/virussample.html
    Netgate: research(at)spy-emergency.com
    http://www.spy-emergency.com/content/view/43/58/
    Nictasoft: http://www.nictasoft.com/new-virus/
    Norman: analysis(at)norman.no
    http://www.norman.com/security_cente...mit_file/en-us
    http://www.norman.com/support/fp/en (fp)
    nProtect: http://global.nprotect.com/support/contactus.php
    Nuwavesoft: support(at)nuwavesoft.com
    Panda: virus(at)pandasecurity.com, falsepositives(at)pandasecurity.com (fp) (note)
    ParetoLogic: SWAT(at)Paretologic.com
    http://www.paretologic.com/community/submissions/ (check left sidebar)
    PCMAV: redaksi(at)pcmedia.co.id
    PCSecurityShield: customersupport(at)pcsecurityshield.com
    PC Tools: http://www.pctools.com/mrc/submit/
    Prevx: virus(at)prevxresearch.com, report(at)prevxresearch.com (note)
    Proland: virsample(at)pspl.com
    http://www.pspl.com/support/samplesubmit.htm
    QuickHeal: viruslab(at)quickheal.com
    http://www.quickheal.co.in/submit_sample.asp
    http://www.quickheal.co.in/submit_fp.asp (fp)
    Returnil: support-tech(at)returnil.com (note)
    Rising: master(at)rising.com.cn
    http://mailcenter.rising.com.cn/FileCheck/
    http://support.rising-global.com/ind...departmentid=1
    Sophos: samples(at)sophos.com
    http://www.sophos.com/support/samples
    Srnmicro: vlab(at)srnmicro.com
    Sunbelt: malware-cruncher(at)sunbelt-software.com, spywarereport(at)sunbelt-software.com
    http://www.sunbeltsecurity.com/Submi...5D4A0825C756EA
    http://www.sunbeltsecurity.com/Submi...7BCD8BFF85EB45 (fp)
    Sybari: submit_virus(at)research.sybari.com (note)
    Symantec: avsubmit(at)symantec.com
    https://submit.symantec.com/websubmit/retail.cgi
    https://submit.symantec.com/dispute/false_positive (fp)
    TrendMicro: virus_doctor(at)trendmicro.com
    http://subwiz.trendmicro.com/SubWiz/Default.asp
    Trustport: support(at)trustport.com
    VBA32: newvirus(at)anti-virus.by
    Vexira: virus_submission(at)centralcommand.com
    Vir.it: assistenza(at)viritpro.com
    VirusBuster: virus(at)virusbuster.hu
    https://support.virusbuster.hu/index...kets&_a=submit (tick Virus Lab)
    Virus Chaser: inquiry(at)viruschaser.com.hk
    http://www.viruschaser.hk/e_contact.php (select Virus Support)
    Webroot: submissions(at)webroot.com
    http://www.webroot.com/En_US/about-vendorcomplaint.html (fp)
    Websense: submit(at)websensesecuritylabs.com
    http://securitylabs.websense.com/con...Malicious.aspx (select Malicious Application)
    Zonelabs: malware(at)zonelabs.com

    Greatis: support(at)greatis.com
    Hazard Shield: andy(at)orbitech.org
    Iobit Security 360: is360submit(at)iobit.com
    http://db.iobit.com/deal/sdsubmit/index.php
    Malwarebytes: http://uploads.malwarebytes.org
    Nemesis: support(at)usec.at
    NoVirusThanks (?): robert(at)novirusthanks.org
    PC DoorGuard (?): astonsupport(at)astonsoft.com
    Remove Fake Antivirus (?): olzenkhaw(at)hotmail.com
    Spybot: detections(at)spybot.info
    http://www.safer-networking.org/en/c...etections.html
    Spyware Terminator: contact(at)spywareterminator.com
    http://www.spywareterminator.com/sup...rt-ticket.aspx
    Superantispyware: samples(at)superantispyware.com
    http://www.fileresearchcenter.com/submitfile.html
    http://www.fileresearchcenter.com/vendordispute.html (fp)
    The Cleaner: trojans(at)moosoft.com
    http://www.moosoft.com/TheCleaner/WebSubmit
    TheStubware: support(at)thestubware.com
    Trojan Hunter: submit(at)trojanhunter.com
    Trojan Remover: submit(at)simplysup.com
    ZeroSpyware: support(at)zerospyware.com
    http://www.spyware-net.com/ReportSpyware

    AVLab-UA: newvirus(at)avlab-ua.com
    http://www.avlab-ua.com/component/op...mid,2/lang,ru/
    http://www.avlab-ua.com/component/op...mid,3/lang,ru/ (fp)
    UNA: newvirus(at)unasoft.com.ua
    UploadMalware: http://www.uploadmalware.com

    Most security vendors suggest that you put your sample(s) inside a password-protected archive* (preferably zip) to prevent being filtered/corrupted. In the e-mail/web form body include the archive password, symptom(s) of the infection(s) and if possible the site url(s) where you got the suspect file(s). In some cases if you can't locate the file(s), just e-mail the malware url(s) to your vendor and ask for removal assistance.

    If you suspect your security vendor has produced a false positive (fp), put the detected file(s) inside a password-protected archive* (preferably zip). To get hold of the file(s), temporarily disable the real-time shield of your security software, restore the file(s) from quarantine and put the file(s) in your software's exclusion list. Refer to the help file of your security software to do those. In the e-mail/web form body include the archive password, site url(s) where you got the file(s) and reason(s) why the file(s) is/are safe.

    *How to password protect zip files in windows XP/windows vista? If you're using an older Windows Operating System you need a 3rd party archiver (like 7-zipthat is free). Refer to the archiver's help file.

    If you spot any mistakes, wrong contacts/links or would like to add other vendor contacts please post them. Thanks. 

    PS: Don't forget to change (at) to @. Some forms/links are not in English so use online translators like Google's or Yahoo's to translate them into English or your language.
    __________________
    "O miserable shadow clad in darkness! Hurting and disdaining people, a karmic soul drowning in sin... Would you try dying for once?" - Enma Ai

    Last edited by LowWaterMark : November 23rd, 2009 at 05:10 PM. Reason: additions and updates per thanatos_theos

    Thursday, September 16, 2010

    How To Copy Text or Error Messages from Any Dialog Boxes in Windows

    http://www.raymond.cc/blog/archives/2008/05/25/how-to-copy-text-or-error-messages-from-any-dialog-boxes-in-windows/

    How To Copy Text or Error Messages from Any Dialog Boxes in Windows:
    1. Scraper from PC Magazine
    2. SysExporter
    3. WinScraper
    4. Textractor
    5. TextGrabber 

    Wednesday, September 15, 2010

    Search Engines Webmaster Tools

    Search engine webmaster tools:

    http://en.wikipedia.org/wiki/Google_Webmaster_Tools
    http://en.wikipedia.org/wiki/Bing_Webmaster_Center
    http://en.wikipedia.org/wiki/Yahoo!_Site_Explorer

    ----------------------------------------------------------------------------------------------------------


    Google:
    (mimmo1997@gmail.com / mimmo2011@gmail.com)

    Bing:
    http://www.bing.com/webmaster/
    (mimmo2009@live.com / mimmo2011@live.com)

    Yahoo:
    http://siteexplorer.search.yahoo.com/
    (mimmo_1997@yahoo.com / mimmo2011@ymail.com / mimmo9711@yahoo.com)

    -----------------------------------------------------------------------------------------------------------

    Blogger Sitemap Generator /
    Sitemap Generator for Google, Bing and Yahoo:

    http://digitalinspiration.com/tools/blogger/sitemap/


    -----------------------------------------------------------------------------------------------------------

    Facebook Account:
    http://www.facebook.com/
    mimmo2011@live.com

    Monday, August 16, 2010

    Software products implementations / The Programming Languages Beacon

    http://www.lextrait.com/Vincent/implementations.html

    "This table contains a list of major software products or utilities, with details about the programming languages used to implement them. Information on this is difficult to find, and a few small mistakes might have escaped the author's attention. Corrections, suggestions for additions or even references are welcome. The list is not supposed to be exhaustive but the most significant products are tentatively listed. The order of the products in each family obeys no specific rule, the reader should not understand it as a ranking.
    The main programming language, the one with which most of new developments are done, is highlighted, while the ones used in older times and still present, or used only for a minority of the developments are indicated too. The pieces of software listed are usually very large, and the list of programming languages cannot be exhaustive. Miscellaneous languages are not mentioned. Sometimes, there are different products under the same line (eg "Games"), or different implementations of a single line (eg JVM implementations). In this case, the overwhelming trend is indicated. Miscellaneous counter examples are ignored.
    Some readers believe that most of the applications presented are based on old code, and that the technologies in use reflect the trends of the time. As it is an erroneous belief, some introduction dates are mentioned, like here, or here to show that what is "new" or "old" technology does not necessarily correspond to intuition.

    The difference between C and C++ is a bit artificial, as it is always possible to argue that most of C code is C++ code, or conversely (as more than a few people use C++ more or less like C). The approximation made in this document tries to correspond to intuition."

    SOS Tariffe

    http://www.sostariffe.it/

    Financial crisis of 2007–2010 / Late-2000s recession / 2010 European sovereign debt crisis

     http://en.wikipedia.org/wiki/Financial_crisis_of_2007–2010

    http://en.wikipedia.org/wiki/Late-2000s_recession

    http://en.wikipedia.org/wiki/2010_European_sovereign_debt_crisis

    Mimmo97 Blog Archive