Office 2010 ospp.vbs ospprearm.exe
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&biw=1440&bih=799&q=%2Bospp.vbs+%2Bospprearm.exe&btnG=Search&aq=f&aqi=&aql=&oq=
Rearm the Office 2010 installation
(http://technet.microsoft.com/en-us/library/ee624357.aspx#section4)
Wednesday, February 23, 2011
Tuesday, February 22, 2011
Tuesday, February 15, 2011
Title of post to be decided
http://technet.microsoft.com/en-us/library/ee624057(WS.10).aspx
Rundll32 printui.dll,PrintUIEntry
Automates many printer configuration tasks. Printui.dll is the executable file that contains the functions used by the printer configuration dialog boxes. These functions can also be called from within a script or a command-line batch file, or they can be run interactively from the command prompt.
http://technet.microsoft.com/en-us/library/cc179062.aspx
Customize Outlook profiles by using an Outlook Profile (PRF) file
http://www.windowsitpro.com/article/internet/jsi-tip-5130-how-can-i-manage-internet-explorer-security-zones-via-the-registry-.aspx
How can I manage Internet Explorer Security Zones via the registry?
Rundll32 printui.dll,PrintUIEntry
Automates many printer configuration tasks. Printui.dll is the executable file that contains the functions used by the printer configuration dialog boxes. These functions can also be called from within a script or a command-line batch file, or they can be run interactively from the command prompt.
http://technet.microsoft.com/en-us/library/cc179062.aspx
Customize Outlook profiles by using an Outlook Profile (PRF) file
http://www.windowsitpro.com/article/internet/jsi-tip-5130-how-can-i-manage-internet-explorer-security-zones-via-the-registry-.aspx
How can I manage Internet Explorer Security Zones via the registry?
Wednesday, February 2, 2011
Information about the User State Migration Tool (USMT) 4.0 update
http://support.microsoft.com/kb/2023591
Upgrade and Migration / User State Migration Tool 4.0 User's Guide
(http://technet.microsoft.com/en-us/library/ee461274(WS.10).aspx)
Step-by-Step: Basic Windows Migration using USMT for IT Professionals
(http://technet.microsoft.com/en-us/library/dd883247(WS.10).aspx)
This article describes the User State Migration Tool (USMT) software update. The update includes fixes and support for migration scenarios for when the source or destination computer have Microsoft Office 2010 installed. You can download the USMT 4.0 update from the Microsoft Windows Download Center.
This update is required if the source or destination computers in a USMT migration have Microsoft Office 2010 installed.
About USMT
USMT is included in the Windows Automated Installation Kit (Windows AIK). Administrators can use USMT to migrate user data and user settings. The tool supports several operating systems, application settings, and user data migration scenarios that include the following scenarios:
Migrating operating system settings, application data, or user data from a Windows installation that is running on an older computer to a Windows installation that is running on a newer computer.
Migrating operating system settings, application data, or user data from an older Windows installation to a newer Windows installation that are running on the same computer in a "refresh" scenario.
USMT migrates user data, operating system settings, and application settings for applications such as Microsoft Office.
Upgrade and Migration / User State Migration Tool 4.0 User's Guide
(http://technet.microsoft.com/en-us/library/ee461274(WS.10).aspx)
Step-by-Step: Basic Windows Migration using USMT for IT Professionals
(http://technet.microsoft.com/en-us/library/dd883247(WS.10).aspx)
This article describes the User State Migration Tool (USMT) software update. The update includes fixes and support for migration scenarios for when the source or destination computer have Microsoft Office 2010 installed. You can download the USMT 4.0 update from the Microsoft Windows Download Center.
This update is required if the source or destination computers in a USMT migration have Microsoft Office 2010 installed.
About USMT
USMT is included in the Windows Automated Installation Kit (Windows AIK). Administrators can use USMT to migrate user data and user settings. The tool supports several operating systems, application settings, and user data migration scenarios that include the following scenarios:
Migrating operating system settings, application data, or user data from a Windows installation that is running on an older computer to a Windows installation that is running on a newer computer.
Migrating operating system settings, application data, or user data from an older Windows installation to a newer Windows installation that are running on the same computer in a "refresh" scenario.
USMT migrates user data, operating system settings, and application settings for applications such as Microsoft Office.
Monday, January 31, 2011
Creating a default windows 7 profile before imaging - outlook 2010
http://social.technet.microsoft.com/Forums/en-US/w7itproinstall/thread/594eebea-a37a-4fd6-89ae-9eea83b7f24f
Regarding the white background, I would suggest that you create your own theme with required settings and then save the settings as a file and apply this within the sysprep xml file. This should be set in the specialize, microsoft-windows-shell-setup section.
(The below is the process I use for Outlook 2007 and haven't yet tried it with 2010, but I assume it's the same)
For Outlook, it sounds as though you might have run Outlook on the master workstation before creating your master image.
For installing and configuring Outlook I would firstly create an Outlook PRF file that configures Outlook as you require, including defining which server to use etc.
You then need to set a couple of settings within the registry of the user that will become Default User (Administrator code probably) to define which PRF file to use, and that the Outlook profile has not been configured and so needs configuring.
To do this, import the following REG file, obviously with the PRF file in c:\prf for this example. A network share would be a better option though really.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Setup]
"First-Run"=-
"ImportPRF"="C:\\PRF\\Outlook.PRF"
Regarding the white background, I would suggest that you create your own theme with required settings and then save the settings as a file and apply this within the sysprep xml file. This should be set in the specialize, microsoft-windows-shell-setup section.
(The below is the process I use for Outlook 2007 and haven't yet tried it with 2010, but I assume it's the same)
For Outlook, it sounds as though you might have run Outlook on the master workstation before creating your master image.
For installing and configuring Outlook I would firstly create an Outlook PRF file that configures Outlook as you require, including defining which server to use etc.
You then need to set a couple of settings within the registry of the user that will become Default User (Administrator code probably) to define which PRF file to use, and that the Outlook profile has not been configured and so needs configuring.
To do this, import the following REG file, obviously with the PRF file in c:\prf for this example. A network share would be a better option though really.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Setup]
"First-Run"=-
"ImportPRF"="C:\\PRF\\Outlook.PRF"
Secure domain join
Secure domain join
http://technet.microsoft.com/en-us/library/cc732280(WS.10).aspx#Image2
http://technet.microsoft.com/en-us/library/cc732280(WS.10).aspx#Image2
Labels:
Secure domain join
Saturday, January 29, 2011
Dell Client Manager / Dell Management Console
Dell and Altiris (Symantec)
How to Easily Evaluate Intel vPro Technology Features on Dell Optiplex Systems
How to Easily Evaluate Intel vPro Technology Features on Dell Optiplex Systems
Dell Management Console, powered by Symantec
Because Dell and Symantec have released a new version of Dell Client Manager that can
coexist with the Dell Management Console, no migration utility is provided. Dell Client
Manager functionality is expected to be incorporated into future releases of the Dell
Management Console, at which time a migration tool is expected to be provided
Dell Client Manager
Dell Management Console
Are you talking about the Dell Management Console (DMC) , or the Dell Client Manager (DCM) ? ... DMC is more server centric, and DCM being more client (Optiplex) centric.
DMC will manage all "non-workstation" h/w. To manage workstations and notebooks, you also need to install Dell Client Manager. DCM is also on the DMC install media. That will manage Optiplex, Precision and Latitude. Once you install, follow the quickstart steps on the DCM portal page. You will need to push the Altiris agent and OMCI.
http://www.dmcswat.com/
Dell Management Console, powered by Symantec
DMC for Clients = Dell Client Manager
Because Dell and Symantec have released a new version of Dell Client Manager that can
coexist with the Dell Management Console, no migration utility is provided. Dell Client
Manager functionality is expected to be incorporated into future releases of the Dell
Management Console, at which time a migration tool is expected to be provided
Dell Client Manager
Dell Management Console
Are you talking about the Dell Management Console (DMC) , or the Dell Client Manager (DCM) ? ... DMC is more server centric, and DCM being more client (Optiplex) centric.
DMC will manage all "non-workstation" h/w. To manage workstations and notebooks, you also need to install Dell Client Manager. DCM is also on the DMC install media. That will manage Optiplex, Precision and Latitude. Once you install, follow the quickstart steps on the DCM portal page. You will need to push the Altiris agent and OMCI.
http://www.dmcswat.com/
Dell Management Console, powered by Symantec
DMC for Clients = Dell Client Manager
Sunday, January 16, 2011
Thursday, January 13, 2011
Vista's MBR Disk Signature
http://www.multibooters.co.uk/mbr.html
The Disk Signature and Drive Letters
The Disk Signature and Drive Letters
Windows NT operating systems will remember the drive letters that have previously been assigned to partitions and drives. This differs from Win9x where drive letters are assigned on every bootup in a default order as the partitions and drives are discovered, which means changes to partitions or the adding of drives can cause letters to change. With NT the current hard drive partition drive letters can be maintained by linking them to a partition by using a unique number that is assigned to each partition and stored in the Windows registry. This unique partition number is generated from the disk signature of the hard drive and the partition offset. On Windows bootup the partition number is compared with the disk signature and if they match then the partition will be assigned the same drive letter that had previously been allocated to it.
If a disk signature is changed then Windows unique partition numbers become invalid. They no longer match the MBR disk signature and therefore drive letter assignments are lost. On first reboot after a signature change each partition on the affected drive will have its unique number recreated to match the new disk signature, then be reassigned a drive letter. These reassigned letters may not match the originals and so your drive letters may change. (You will also be informed that your new device/s have been installed and a reboot is required).
When you are using the Windows built-in bootmanager to dual or multiboot it is vital to maintain drive letters because Windows might not see itself as the default C: drive. If you have a Windows install that considers itself to be say the E: drive and a disk signature change causes this assignment to be lost, then during early bootup Windows will reassign drive letters in the default order, which will be the System partition as C: and the Boot partition as D:, which means later in the boot process the registry paths such as E:/Windows and E:/Documents and Settings, will be invalid. Windows 2K and XP cannot recover from such a drive letter change, but Vista seems to be a bit more adaptable and will struggle to the desktop, from where it is possible to edit the registry to restore the required drive letters, (see Drive Letter Problems). Be aware that with Vista it is possible when using the Microsoft bootmanager to have the Vista install see itself as the C: drive even when it is in fact a Boot partition to a different System partition. In this situation a drive letter re-ordering event caused by a signature change will assign the default D: letter to the Boot partition, causing the aforementioned problems.
Saturday, January 8, 2011
Registry Replacer - This is a simple program used to do a quick Search or a Search and Replace of Strings in your Registry
http://en.wikipedia.org/wiki/Windows_Registry
Registry Replacer
http://bladesdev.com/regreplace.htm
This is a simple program used to do a quick Search or a Search and Replace of Strings in your Registry.
Others:
RegEditX 3.0 - Tweaks for the Windows Registry Editor (REGEDIT)
http://www.dcsoft.com/products/regeditx/
Funduc Registry Toolkit
http://www.funduc.com/registry_toolkit.htm
Registry Replacer
http://bladesdev.com/regreplace.htm
This is a simple program used to do a quick Search or a Search and Replace of Strings in your Registry.
Others:
RegEditX 3.0 - Tweaks for the Windows Registry Editor (REGEDIT)
http://www.dcsoft.com/products/regeditx/
Funduc Registry Toolkit
http://www.funduc.com/registry_toolkit.htm
Labels:
Registry Replacer Search Replace
Friday, January 7, 2011
ImgBurn
http://en.wikipedia.org/wiki/ImgBurn
http://www.imgburn.com/
ImgBurn is a lightweight CD / DVD / HD DVD / Blu-ray burning application that everyone should have in their toolkit!
It has several 'Modes', each one for performing a different task:
Read - Read a disc to an image file
Build - Create an image file from files on your computer or network - or you can write the files directly to a disc
Write - Write an image file to a disc
Verify - Check a disc is 100% readable. Optionally, you can also have ImgBurn compare it against a given image file to ensure the actual data is correct
Discovery - Put your drive / media to the test! Used in combination with DVDInfoPro, you can check the quality of the burns your drive is producing
ImgBurn is a freeware program that allows the recording of many types of CD/DVD images to recordable media (.cue files are supported as of version 2.4.0.0).[3] Starting with version 2.0.0.0, ImgBurn can also burn files and data directly to CD/DVD.
ImgBurn supports a wide range of image file formats - including BIN, CCD, CUE, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI.
http://www.imgburn.com/
ImgBurn is a lightweight CD / DVD / HD DVD / Blu-ray burning application that everyone should have in their toolkit!
It has several 'Modes', each one for performing a different task:
Read - Read a disc to an image file
Build - Create an image file from files on your computer or network - or you can write the files directly to a disc
Write - Write an image file to a disc
Verify - Check a disc is 100% readable. Optionally, you can also have ImgBurn compare it against a given image file to ensure the actual data is correct
Discovery - Put your drive / media to the test! Used in combination with DVDInfoPro, you can check the quality of the burns your drive is producing
ImgBurn is a freeware program that allows the recording of many types of CD/DVD images to recordable media (.cue files are supported as of version 2.4.0.0).[3] Starting with version 2.0.0.0, ImgBurn can also burn files and data directly to CD/DVD.
ImgBurn supports a wide range of image file formats - including BIN, CCD, CUE, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI.
Labels:
ImgBurn
Saturday, January 1, 2011
ISO images via Virtual Drives
http://msdn.microsoft.com/en-us/subscriptions/aa948864.aspx
Writing ISO images to CD-Rs and DVD-Rs
The Windows Server 2003 Resource Kit includes the DVDBURN.EXE command line tool. Though it has not been tested by Microsoft, many customers also report success using ISO Recorder.
Testing CD-Rs and DVD-Rs
After a CD/DVD-R has been written, you can use the CRC tool to verify that the process was successful.
Accessing ISO images via Virtual Drives
Certain tools exist which create a virtual disc drive on your PC and mount an ISO image on that drive. These tools typically assign a new drive letter to this drive, and the contents of the image can be accessed by opening “My Computer” and double clicking on the new drive.
Though they have not been tested nor are supported by the Subscriptions team, customers report that Daemon Tools offers such capability as well as Microsoft Virtual CD Control Tool.
Other products like IsoBuster and WinRar can access the contents of ISO images directly and verify ISO files, but also have not been tested nor are supported by the Subscriptions team.
Using ISO Image Files
Many products are posted as ISO-9660 image files. An ISO-9660 image file is an exact representation of a CD or DVD, including the content and the logical format. The most common use of an image file is to write it to a blank CD-R or DVD-R, resulting in an identical copy of the original disc including file name and volume label information. ISO image files may also be opened and their contents copied to a local folder, much like ZIP files. ISO files may also be virtually mounted and accessed as a device. These three methods of using ISO images are described below. Note: you may have to rename the file extension from .IMG or .UDF to .ISO, depending on your software.Writing ISO files to CD-R or DVD-R
Most CD-R/DVD-R writing software includes a feature to create a disc from an image file. Note: you must use the special "copy image to CD" or "burn image" functionality. See your software’s Help for detailed information.Writing ISO images to CD-Rs and DVD-Rs
The Windows Server 2003 Resource Kit includes the DVDBURN.EXE command line tool. Though it has not been tested by Microsoft, many customers also report success using ISO Recorder.
Testing CD-Rs and DVD-Rs
After a CD/DVD-R has been written, you can use the CRC tool to verify that the process was successful.
- The CRC305.exe tool can be downloaded from MSDN Subscriber Downloads in the Tools and Resources folder.
- From a command prompt, run CRC305 filename (where filename is the image file name.)
- Run CRC305 x: (where x is the drive letter of the drive containing the CD/DVD-R). The CRC values should match.
Accessing ISO images via Virtual Drives
Certain tools exist which create a virtual disc drive on your PC and mount an ISO image on that drive. These tools typically assign a new drive letter to this drive, and the contents of the image can be accessed by opening “My Computer” and double clicking on the new drive.
Though they have not been tested nor are supported by the Subscriptions team, customers report that Daemon Tools offers such capability as well as Microsoft Virtual CD Control Tool.
Other products like IsoBuster and WinRar can access the contents of ISO images directly and verify ISO files, but also have not been tested nor are supported by the Subscriptions team.
Labels:
ISO image Virtual Drive
Tuesday, December 28, 2010
Flashgot JDownloader Orbit IDM Real-Debrid download manager
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=Flashgot+JDownloader+Orbit+IDM+%22Real-Debrid%22+OR+%22download+manager%22&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
Flashgot JDownloader Orbit IDM Real-Debrid
download manager
http://www.jdownloader.org/
JDownloader Alternative:
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&tbo=1&prmdo=1&q=%2Bjdownloader+AND+%2BMipony+AND+%2BFreerapid&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
+jdownloader AND +Mipony AND +Freerapid
Mipony (http://www.mipony.net/)
FreeRapid (http://wordrider.net/freerapid/)
Flashgot JDownloader Orbit IDM Real-Debrid
download manager
http://www.jdownloader.org/
JDownloader Alternative:
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&tbo=1&prmdo=1&q=%2Bjdownloader+AND+%2BMipony+AND+%2BFreerapid&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
+jdownloader AND +Mipony AND +Freerapid
Mipony (http://www.mipony.net/)
FreeRapid (http://wordrider.net/freerapid/)
Sunday, December 26, 2010
Uninstallers
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2B%22Total+Uninstall%22+AND+%2B%22Revo+Uninstaller%22+AND+%2B%22ZSoft+Uninstaller%22+AND+%2B%22Your+Uninstaller%22+AND+%2B%22Ashampoo+UnInstaller%22+AND+%2B%22IObit+Uninstaller%22&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
1) Total Uninstall
2) Revo Uninstaller
3) ZSoft Uninstaller
4) Your Uninstaller
5) Ashampoo UnInstaller
6) IObit Uninstaller
1) Total Uninstall
2) Revo Uninstaller
3) ZSoft Uninstaller
4) Your Uninstaller
5) Ashampoo UnInstaller
6) IObit Uninstaller
Labels:
Uninstallers
Sunday, December 19, 2010
Sysprep - Description of the Windows XP Corporate Deployment tools and documentation
Sysprep
http://support.microsoft.com/kb/321880
The Windows XP Corporate Deployment tools contain the following tools and documentation:
Deploy.chm: This is the "Microsoft Windows Corporate Deployment Tools User's Guide" documentation.
Ref.chm: This is the "Microsoft Windows Preinstallation Reference" documentation.
Factory.exe, Setupcl.exe, and Sysprep.exe: These are the Sysprep components. Sysprep is a tool that prepares the hard disk on a source computer for duplication on other computers with the same hard disks.
Oformat.com: This is a command-line tool to create a volume that uses the FAT32 file system. The tool creates a FAT32 volume with clusters that are aligned in an optimal way for later conversion to the NTFS file system.
Cvtarea.exe: This is a command-line tool to create files and to analyze the placement of those files on a volume that uses the FAT32 or FAT file system. You can use this tool to create a contiguous file in a specific location on the disk. This may be useful if your manufacturing processes requires you to format a hard disk with the FAT or FAT32 file system before you convert the hard disk to the NTFS file system. You can use the Cvtarea tool to create a reserved, contiguous, placeholder file that is to be used for the NTFS metadata files after the conversion. This causes the resulting file system to be less fragmented and more efficient.
Setupmgr.exe: This is the Setup Manager Wizard. You can use this to create or to modify the files that control an unattended Setup.
Readme.txt: This is the Readme documentation for the Windows XP Corporate Deployment tools.
http://support.microsoft.com/kb/321880
The Windows XP Corporate Deployment tools contain the following tools and documentation:
Deploy.chm: This is the "Microsoft Windows Corporate Deployment Tools User's Guide" documentation.
Ref.chm: This is the "Microsoft Windows Preinstallation Reference" documentation.
Factory.exe, Setupcl.exe, and Sysprep.exe: These are the Sysprep components. Sysprep is a tool that prepares the hard disk on a source computer for duplication on other computers with the same hard disks.
Oformat.com: This is a command-line tool to create a volume that uses the FAT32 file system. The tool creates a FAT32 volume with clusters that are aligned in an optimal way for later conversion to the NTFS file system.
Cvtarea.exe: This is a command-line tool to create files and to analyze the placement of those files on a volume that uses the FAT32 or FAT file system. You can use this tool to create a contiguous file in a specific location on the disk. This may be useful if your manufacturing processes requires you to format a hard disk with the FAT or FAT32 file system before you convert the hard disk to the NTFS file system. You can use the Cvtarea tool to create a reserved, contiguous, placeholder file that is to be used for the NTFS metadata files after the conversion. This causes the resulting file system to be less fragmented and more efficient.
Setupmgr.exe: This is the Setup Manager Wizard. You can use this to create or to modify the files that control an unattended Setup.
Readme.txt: This is the Readme documentation for the Windows XP Corporate Deployment tools.
Labels:
Sysprep
Friday, December 17, 2010
Wednesday, December 15, 2010
Good AntiMalware
Malwarebytes' Anti-Malware (MBAM)
http://en.wikipedia.org/wiki/Malwarebytes%27_Anti-Malware
http://malwarebytes.org/
Hitman Pro
http://en.wikipedia.org/wiki/Hitman_Pro
http://www.surfright.nl/en
http://en.wikipedia.org/wiki/Malwarebytes%27_Anti-Malware
http://malwarebytes.org/
Hitman Pro
http://en.wikipedia.org/wiki/Hitman_Pro
http://www.surfright.nl/en
Create ISO from folder
Folder2Iso just creates an iso from any kind of folder (with the subfolders).
Its a GUI of mkisofs
mkisofs, a CD filesystem image creator. Because these tools don't include any GUI, many graphical front-ends have been created
http://www.trustfm.net/divx/SoftwareFolder2Iso.php
http://en.wikipedia.org/wiki/Cdrtools
Its a GUI of mkisofs
mkisofs, a CD filesystem image creator. Because these tools don't include any GUI, many graphical front-ends have been created
http://www.trustfm.net/divx/SoftwareFolder2Iso.php
http://en.wikipedia.org/wiki/Cdrtools
Cdrtools - Highly portable CD/DVD/BluRay command line recording software
http://cdrecord.berlios.de/old/private/cdrecord.html
Labels:
folder ISO
Monday, December 13, 2010
Acronis Backup & Recovery 10 Clean Up Utility
The utility removes Acronis Backup & Recovery 10 and its components from Windows
Description
Acronis Clean Up Utility is a console application that removes Acronis Backup & Recovery 10 and its components from Windows.
The utility is written using plain commands of command line interpreter (cmd.exe) included in Windows 2000 and higher.
Restore to Dissimilar Hardware
P2V restoration:
V2P restoration:
Dissimilar hardware restoration:
Restore to different hardware:
Troubleshooting tips and tricks for the Restore Anyware Option (RAO)
Using the Hidden Options for Restore Anyware when restoring an image from the Symantec Recovery Disk (SRD)
V2P restoration:
Dissimilar hardware restoration:
Restore to different hardware:
- StorageCraft Shadowprotect - "Hardware Independent Restore" (HIR)
- Acronis Backup & Recovery - "Universal Restore"
- Symantecs Backup Exec System Recovery - "Restore Anyware"
Troubleshooting tips and tricks for the Restore Anyware Option (RAO)
Using the Hidden Options for Restore Anyware when restoring an image from the Symantec Recovery Disk (SRD)
Sunday, December 12, 2010
Hardware Identification Programs / System Profiler Software
computer diagnostics, system profiling, benchmark, overclocking, troubleshooting, hardware and software installed.
system profiler software
http://en.wikipedia.org/wiki/System_profiler
Hardware Identification Programs:
Sandra, Everest/Aida, HWInfo
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2BSandra+%2BEverest+%2BHwinfo&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
How to Find Device ID’s to Resolve Unknown Device Problems
(http://www.webcitation.org/5uvnKqRwc)
http://www.pcidatabase.com/
To identify the device by its PCI ID, refer to http://pciids.sourceforge.net/
http://driveragent.com/
http://biosagentplus.com/
http://esupport.com/
http://en.wikipedia.org/wiki/Phoenix_Technologies
eSupport.com Partners With FinalWire Ltd., the Creators of AIDA64 Extreme Edition)
Newest version of AIDA64 Extreme Edition features DriverAgent & BIOSAgentPlus
http://www.aida64.com/
Phoenix Technologies(R) Helps Consumers Recover Lost Files With New FileRestorePlus(TM)
Upgraded FileRestorePlus expands PC tools and Optimization products available through eSupport.com
http://filerestoreplus.com/
system profiler software
http://en.wikipedia.org/wiki/System_profiler
Hardware Identification Programs:
Sandra, Everest/Aida, HWInfo
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2BSandra+%2BEverest+%2BHwinfo&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
How to Find Device ID’s to Resolve Unknown Device Problems
(http://www.webcitation.org/5uvnKqRwc)
http://www.pcidatabase.com/
To identify the device by its PCI ID, refer to http://pciids.sourceforge.net/
http://driveragent.com/
http://biosagentplus.com/
http://esupport.com/
http://en.wikipedia.org/wiki/Phoenix_Technologies
eSupport.com Partners With FinalWire Ltd., the Creators of AIDA64 Extreme Edition)
Newest version of AIDA64 Extreme Edition features DriverAgent & BIOSAgentPlus
http://www.aida64.com/
Phoenix Technologies(R) Helps Consumers Recover Lost Files With New FileRestorePlus(TM)
Upgraded FileRestorePlus expands PC tools and Optimization products available through eSupport.com
http://filerestoreplus.com/
Labels:
Aida Everest,
HWInfo,
Sandra
Friday, December 10, 2010
SysTracer - Track file and registry changes in your computer
http://www.blueproject.ro/systracer
SysTracer v2.2: trace your system changes
SysTracer is a system utility tool that can scan and analyze your computer to find changed (added, modified or deleted) data into registry and files.SysTracer can scan your system and record information about:
- changed files and folders
- modified registry entries
- system services
- system drivers
- applications that are configured to run at computer startup
- running processes
- loaded dlls
Recording the snapshot usually takes a few minutes depending on your system complexity. You can choose to scan only specific parts from folders or registry, in order to speed up the recording process.
By comparing snapshots from before and after a new program installation or execution, you can determine which files or registry entries were added, changed, or deleted.
You can create as many snapshots as you may want or need, and you can compare anytime any pair of them, having the possibility to export differences to HTML list.
SysTracer Pro
SysTracer Pro is an enhanced version of SysTracer. SysTracer Pro have advanced functionality like exporting and importing snapshots, useful in order to compare snapshots taken on different computers.With SysTracer Pro you can search for files, folders and registry information into recorded snapshots.
SysTracer Pro have command line support, for automating recording snapshots and exporting snapshots differences.
Visit SysTracer features section for a detailed comparison matrix between SysTracer and SysTracer Pro.
Remote scanning - track changes from network computers
SysTracer have support for remote scanning, providing you an easy way to take snapshots of your network computers.In order to allow scanning, each computer from your network will have a SysTracer executable installed as windows service.
The management of the entire process is done from a single computer (server) with a SysTracer instance running in normal desktop mode. From this server you will be able to control each SysTracer client by selecting scan targets, sending scan commands and receiving resulted snapshots.
Portable version
SysTracer can be used with or without installation.Using the portable version - without installation - you can take snapshots of your system without making any changes to the current files or Windows registry.
The application can be used directly from the HDD or from an USB flash drive.
http://www.blueproject.ro/systracer
Tuesday, December 7, 2010
Thursday, December 2, 2010
Tuesday, November 30, 2010
Wednesday, November 24, 2010
Elevation PowerToys / Execute programs elevated from command prompt
Microsoft Elevation PowerToys
Elevation from command line
Run elevated from CMD
http://technet.microsoft.com/en-us/magazine/2008.06.elevation.aspx
http://download.microsoft.com/download/f/d/0/fd05def7-68a1-4f71-8546-25c359cc0842/Elevation2008_06.exe
Elevation from command line
Run elevated from CMD
http://technet.microsoft.com/en-us/magazine/2008.06.elevation.aspx
http://download.microsoft.com/download/f/d/0/fd05def7-68a1-4f71-8546-25c359cc0842/Elevation2008_06.exe
Labels:
Elevation Elevated PowerToys
Powershell scripts
$Win32_OS = Get-WmiObject Win32_OperatingSystem -computer PutHereComputerName -credential domain\administrator | select *
Labels:
Powershell scripts
Delete Windows User Profile
The users hive is located under their user directory (NTUSER.DAT) so deleting the directory with an
If the user logs in and the directory doesn't exist, it'll be created again.
Unfortunately, without having them elevate themselves as admins, they won't be able to delete user profiles.
Batch file:
rmdir /s /q {username}
should suffice. The only part that wouldn't be deleted is under the profile list in the registry HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList
but all that does is map the SID to a profile location.If the user logs in and the directory doesn't exist, it'll be created again.
Unfortunately, without having them elevate themselves as admins, they won't be able to delete user profiles.
Batch file:
set /p USERTODEL=Enter the username to delete: set USERTODEL=C:\Users\%USERTODEL%
if exist "%USERTODEL%" rmdir /s /q %USERTODEL%
Tuesday, November 23, 2010
Monday, November 22, 2010
Saturday, November 20, 2010
Friday, November 19, 2010
Wednesday, November 17, 2010
Microsoft Security Essentials (MSE)
How to uninstall Symantec Endpoint Protection (SEP) client silently using the command line
Repair Microsoft Security Essentials using MSE Restore Tool v1.0
http://wpkg.org/MSSecurityEssentials
http://www.winhelponline.com/blog/updating-microsoft-security-essentials-using-command-line/
http://www.appdeploy.com/packages/detail.asp?id=1647
Repair Microsoft Security Essentials using MSE Restore Tool v1.0
http://wpkg.org/MSSecurityEssentials
http://www.winhelponline.com/blog/updating-microsoft-security-essentials-using-command-line/
http://www.appdeploy.com/packages/detail.asp?id=1647
Saturday, October 23, 2010
Circumventing Group Policy as a Limited User
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=gpdisable+cmd+GPCul8r+OR+bpmtk&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
Quanto sono sicure le Group Policy? – How secure is Group Policy?
DisableCMD DisableRegistryTools DisableTaskMgr
Group Policy Registry Reference (http://msdn.microsoft.com/en-us/library/ms815238.aspx)
The command prompt has been disabled by your administrator: http://windowsxp.mvps.org/disablecmd.htm
Quanto sono sicure le Group Policy? – How secure is Group Policy?
DisableCMD DisableRegistryTools DisableTaskMgr
Group Policy Registry Reference (http://msdn.microsoft.com/en-us/library/ms815238.aspx)
The command prompt has been disabled by your administrator: http://windowsxp.mvps.org/disablecmd.htm
Labels:
Group Policy Group Policies GPO
Thursday, October 21, 2010
Windows XP Recovery Console / Windows Recovery Environment (WinRE)
http://en.wikipedia.org/wiki/Windows_Recovery_Environment
http://blogs.msdn.com/b/winre/archive/2006/10/20/where-are-recovery-console-commands.aspx
Windows XP Recovery Console Equivalents in Windows Vista (http://technet.microsoft.com/en-us/magazine/dd367881.aspx?pr=blog)
http://blogs.msdn.com/b/winre/archive/2006/10/20/where-are-recovery-console-commands.aspx
Windows XP Recovery Console Equivalents in Windows Vista (http://technet.microsoft.com/en-us/magazine/dd367881.aspx?pr=blog)
Friday, October 15, 2010
Microsoft Windows SteadyState alternatives
- Returnil
- Deep Freeze
- Comodo Time Machine (CTM)
Vedere anche: Fortres Grand
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2B%22Fortres+Grand%22+%2Bcomodo+%2B%22time+machine%22+%2Breturnil+%2B%22deep+freeze%22+%2Bsteadystate&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
http://www.wilderssecurity.com/showthread.php?t=276210
http://alternativeto.net/software/sandboxie/?platform=windows
Wednesday, October 13, 2010
SteadyState for Windows 7
http://technet.microsoft.com/en-us/library/gg176676(WS.10).aspx?ITPID=sprblog
http://blogs.technet.com/b/stephenrose/archive/2010/09/27/steady-state-for-windows-7.aspx
http://blogs.technet.com/b/seanearp/archive/2010/09/11/a-steady-state-without-steadystate.aspx
http://windowsteamblog.com/windows/b/springboard/archive/2010/09/27/steady-state-for-windows-7.aspx
http://en.wikipedia.org/wiki/Windows_SteadyState
http://social.technet.microsoft.com/Forums/en/windowssteadystate/threads
http://www.infoworld.com/t/malware/microsoft-releases-steadystate-documents-windows-7-234?source=footer
http://www.instantfundas.com/2010/09/5-alternatives-to-windows-steadystate.html
http://blogs.technet.com/b/stephenrose/archive/2010/09/27/steady-state-for-windows-7.aspx
http://blogs.technet.com/b/seanearp/archive/2010/09/11/a-steady-state-without-steadystate.aspx
http://windowsteamblog.com/windows/b/springboard/archive/2010/09/27/steady-state-for-windows-7.aspx
http://en.wikipedia.org/wiki/Windows_SteadyState
http://social.technet.microsoft.com/Forums/en/windowssteadystate/threads
http://www.infoworld.com/t/malware/microsoft-releases-steadystate-documents-windows-7-234?source=footer
http://www.instantfundas.com/2010/09/5-alternatives-to-windows-steadystate.html
Labels:
SteadyState
Saturday, October 9, 2010
Internet Explorer extensibility
http://en.wikipedia.org/wiki/Internet_Explorer#Extensibility
Internet Explorer Architecture
Internet Explorer Browser Extensions
Adding Toolbar Buttons
Adding Menu Items
Class for Adding Buttons, Menu Items and Explorer Bars to Internet Explorer
SpicIE - Simple Plug-In Creator for Internet Explorer
SpicIEContrib - SpicIE plug-in samples & guidance
Sample showing how to handle refresh and drop down buttons in IE
Internet Explorer Architecture
Internet Explorer Browser Extensions
Adding Toolbar Buttons
Adding Menu Items
Class for Adding Buttons, Menu Items and Explorer Bars to Internet Explorer
SpicIE - Simple Plug-In Creator for Internet Explorer
SpicIEContrib - SpicIE plug-in samples & guidance
Sample showing how to handle refresh and drop down buttons in IE
Tuesday, October 5, 2010
Powershell GUI IDE RAD editor
http://www.google.com/search?num=100&hl=en&safe=off&biw=1440&bih=704&q=powershell+quest+PowerGUI+sapien+PrimalForms+OR+PrimalScript&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2BpowerShell+%2BISE+%2Bquest+%2Bpowergui+%2BSAPIEN+%2Bidera&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
PowerShell Editor Roundup: Who's the Winner?
(cache: http://www.webcitation.org/5tLsyzgv5)
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%2BpowerShell+%2BISE+%2Bquest+%2Bpowergui+%2BSAPIEN+%2Bidera&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
PowerShell Editor Roundup: Who's the Winner?
(cache: http://www.webcitation.org/5tLsyzgv5)
- Quest PowerGUI (http://www.powergui.org / http://www.quest.com/powershell/)
- Sapien PrimalForms OR PrimalScript (http://www.sapien.com/)
- Idera PowerShell Plus (http://www.idera.com/products/powershell/)
- Microsoft Windows PowerShell ISE (http://msdn.microsoft.com/en-us/library/dd367962(VS.85).aspx / http://technet.microsoft.com/en-us/library/dd315244.aspx)
Labels:
Powershell GUI IDE RAD editor
Sunday, October 3, 2010
Anti-Virus Testing Websites
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=Andreas+Marx+www.av-test.org+Andreas+Clementi+www.av-comparatives.org+VirusBulletin&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
http://www.av-test.org
http://www.av-comparatives.org
http://www.virusbtn.com
Anti-Malware Testing Standards Organization (AMTSO)
http://www.av-test.org
http://www.av-comparatives.org
http://www.virusbtn.com
Anti-Malware Testing Standards Organization (AMTSO)
Labels:
Anti-Virus Test
Saturday, October 2, 2010
Internet Explorer Administration Kit (IEAK)
Internet Explorer Administration Kit (IEAK)
http://en.wikipedia.org/wiki/IEAK
Managing Browser Settings Through IEAK 8 Profile Manager (http://technet.microsoft.com/en-us/library/cc985349.aspx)
Automatic configuration .ins file
The default name of this file is Install.ins
IEAK Profile Manager
(http://technet.microsoft.com/en-us/library/cc961382.aspx)
http://en.wikipedia.org/wiki/IEAK
Managing Browser Settings Through IEAK 8 Profile Manager (http://technet.microsoft.com/en-us/library/cc985349.aspx)
Automatic configuration .ins file
The default name of this file is Install.ins
IEAK Profile Manager stamps each .ins file with a version number. The version number combines the date that the .ins file was modified and the number of times the file has been revised. For example, 2007.02.14.01 shows that the file was modified only once and that modification occurred on February 14, 2007.
IEAK Profile Manager
(http://technet.microsoft.com/en-us/library/cc961382.aspx)
Files Generated by the IEAK Profile Manager
When you update and save your configuration settings, the IEAK Profile Manager generates the following files:
Auto-configuration .ins file - This file contains the browser and component settings that Internet Explorer uses to update the browser configuration on users' computers. You can specify these settings in the Wizard Settings section of the IEAK Profile Manager.
Cabinet (.cab) files - These files are used to organize the installation files that are downloaded to the users' computers. You should digitally sign the .cab files created by the IEAK Profile Manager. For more information about signing your .cab files, see Chapter 12 , "Preparing for the IEAK."
The auto-configuration .cab files also contain information (.inf) files.
Information (.inf) files - These files contain the system policies and restrictions that the operating system uses to update the system configuration on users' computers. You can specify these settings in the Policies and Restrictions section of the IEAK Profile Manager.
Each .inf file also contains version information. When you change configuration settings, the IEAK Profile Manager updates the affected .inf files and their version information and repackages the companion .cab files.
Internet Explorer downloads and processes the contents of the auto-configuration .ins file and makes the necessary configuration changes on the users' computers. Internet Explorer also downloads and unpacks the companion .cab files for the operating system to process. If the version number of the auto-configuration .ins file does not change, new .cab files are not downloaded. The version number consists of the date the .ins file was modified and the number of times the file has been revised.
Thursday, September 30, 2010
Run a program with administrator rights / Tools that allow one to run a program as other user without giving password each time / How to run a process using different credentials
joeware.net - CPAU (Create Process As User) like RunAs but with an options to encrypt the password
Run a program with administrator rights – RUNASSPC, CPAU and Steel Run As compared
http://www.robotronic.de/runasspcEn.html
http://www.joeware.net/freetools/tools/cpau/index.htm
http://minasi.com/forum/topic.asp?TOPIC_ID=13514
I would recommend the following runas utilities:
CPAU (http://www.joeware.net)
PsExec (http://www.sysinternals.com)
LSrunas/LSrunasE (http://www.lansweeper.com/) - (uses non-standard encryption)
Runasspc (http://robotronic.de/runasspcEn.html) - (uses AES-256 encryption)
I would highly recommend using Runasspc for security reasons as the other programs have no or weak encryption. Keep in mind when you don't use encryption the password is being sent as clear-text over the wire and can be easily captured by a network sniffer. Also I would recommend not executing the runas command line in a batch file - this should be embedded in a compiled and obfusticated .exe program.
Also when using runas to install some software that particular installation software may need to be installed as the active user. To get around this issue without logging off, you will need to launch a hidden command prompt as an Administrator, add the current user to the Administrators group and then run the runas command. After this you will want to remove the current user from the Administrators group. Always check the return code for the command (i.e. NET LOCALGROUP Administrators username /DELETE) that removes the user from the Administrators group so you can verify this has worked.
Run a program with administrator rights – RUNASSPC, CPAU and Steel Run As compared
http://www.robotronic.de/runasspcEn.html
http://www.joeware.net/freetools/tools/cpau/index.htm
http://minasi.com/forum/topic.asp?TOPIC_ID=13514
I would recommend the following runas utilities:
CPAU (http://www.joeware.net)
PsExec (http://www.sysinternals.com)
LSrunas/LSrunasE (http://www.lansweeper.com/) - (uses non-standard encryption)
Runasspc (http://robotronic.de/runasspcEn.html) - (uses AES-256 encryption)
I would highly recommend using Runasspc for security reasons as the other programs have no or weak encryption. Keep in mind when you don't use encryption the password is being sent as clear-text over the wire and can be easily captured by a network sniffer. Also I would recommend not executing the runas command line in a batch file - this should be embedded in a compiled and obfusticated .exe program.
Also when using runas to install some software that particular installation software may need to be installed as the active user. To get around this issue without logging off, you will need to launch a hidden command prompt as an Administrator, add the current user to the Administrators group and then run the runas command. After this you will want to remove the current user from the Administrators group. Always check the return code for the command (i.e. NET LOCALGROUP Administrators username /DELETE) that removes the user from the Administrators group so you can verify this has worked.
Wednesday, September 29, 2010
Validate domain username and password from workgroup computer / Running Dsa.Msc (Active Directory Users and Computers snap-in) From A Computer Not Joined Into Domain
Remotely administer a domain from a workgroup PC
http://forums.asp.net/p/1436962/3244988.aspx
http://us.generation-nt.com/answer/viewing-event-logs-remote-domain-help-68650162.html
Create a shortcut like this:
runas /netonly /user:domain\userid "mmc dsa.msc"
http://www.markwilson.co.uk/blog/2008/03/the-windows-runas-command-and-the-netonly-switch.htm
Then I found out about an obscure switch for the runas command – /netonly, used to indicate that the supplied credentials are for remote access only. By changing my command to:
runas /netonly /user:remotecomputername\username mmc
I was able to authenticate against the remote computer without needing the credentials to also be valid on the local computer, as described by Craig Andera
http://www.pluralsight-training.net/community/blogs/craig/archive/2003/06/04/785.aspx
Today I ran across an entirely new option: the /netonly switch. Using it means that the credentials you supply don’t have to be valid on the machine you’re running it on, but will still be passed on when remote calls are made! So cool. Why? Because I’m doing work with Microsoft, and I need to do things against their servers that require authentication. I don’t want to join my machine to their domain, which means I can’t get a process running under my Microsoft domain account. However, using this switch, I can make a process look to remote systems as if it were running under my Microsoft domain account. This turned out to be crucially important for getting our build process working on my machine.
The one caveat is that since it doesn’t do an actual login, it’ll take whatever password you throw at it. Even if it’s wrong – you won’t find out until you try to actually use those credentials.
Running Dsa.Msc From A Computer Not Joined Into Domain
I'm trying to figure out if this is possible:
I have a laptop that I take to numerous clients, and I
really don't like to join it to the domain because it's a
pain to do that constantly and deal with user accounts,
etc.
But, I would still like to use dsa.msc (AD Users and
Computers) and related tools to manage domains from my
laptop. Is there a way to do this?
I have tried all combinations of runas.
Additionally, "Connect To Another Computer/Domain:" (i.e.
from compmgmt.msc or something) only works on non-DC's
near as I can tell, so in this configuration it's useless
for dsa.msc. It just says, "Access is Denied" without
possibility of prompting for credentials.
I think it all boils down to the domain not trusting my
computer and vice versa. This is why I think this may
not be possible. But, I'm hoping some of you can think
of a way around this problem.
Thanks in advance,
Matt
You need to be joined to a domain. If the laptop has enough
horsepower, load Virtual PC and create a XP imeage which you just join
to client domains.
No you don't. Assuming you've installed the adminpak.msi on the XP
machine, you can:
runas /netonly /user:somedomain\someuserid "mmc dsa.msc"
Wayne
http://forums.asp.net/p/1436962/3244988.aspx
All you need is here:
Declare Function LogonUser Lib "ADVAPI32.dll" Alias "LogonUserA" (ByVal lpszUsername As String, ByVal lpszDomain As String, ByVal lpszPassword As String, ByVal dwLogonType As LogonType, ByVal dwLogonProvider As LogonProvider, ByRef phToken As IntPtr) As Int32
Declare Function GetLastError Lib "kernel32.dll" () As Int32
_
Private Shared Function GetWindowsIdentity(ByVal UserName As String, ByVal Domain As String, ByVal Password As String) As WindowsIdentity
Dim SecurityToken As IntPtr
Dim Success As Boolean = CBool(LogonUser(UserName, Domain, Password, LogonType.LOGON32_LOGON_NETWORK_CLEARTEXT, LogonProvider.LOGON32_PROVIDER_DEFAULT, SecurityToken))
If Not Success Then
Throw New System.Exception("Logon Failed. Error: " & GetLastError())
End If
Return New WindowsIdentity(SecurityToken)
End Function
Public Enum LogonType As Integer
LOGON32_LOGON_INTERACTIVE = 2
LOGON32_LOGON_NETWORK = 3
LOGON32_LOGON_BATCH = 4
LOGON32_LOGON_SERVICE = 5
LOGON32_LOGON_UNLOCK = 7
LOGON32_LOGON_NETWORK_CLEARTEXT = 8
LOGON32_LOGON_NEW_CREDENTIALS = 9
End Enum
Public Enum LogonProvider As Integer
LOGON32_PROVIDER_DEFAULT = 0
End Enum
To test:
Dim o As Security.Principal.WindowsIdentity = GetWindowsIdentity("user", "domain", "pass")
http://us.generation-nt.com/answer/viewing-event-logs-remote-domain-help-68650162.html
Create a shortcut like this:
runas /netonly /user:domain\userid "mmc dsa.msc"
http://www.markwilson.co.uk/blog/2008/03/the-windows-runas-command-and-the-netonly-switch.htm
Then I found out about an obscure switch for the runas command – /netonly, used to indicate that the supplied credentials are for remote access only. By changing my command to:
runas /netonly /user:remotecomputername\username mmc
I was able to authenticate against the remote computer without needing the credentials to also be valid on the local computer, as described by Craig Andera
http://www.pluralsight-training.net/community/blogs/craig/archive/2003/06/04/785.aspx
Today I ran across an entirely new option: the /netonly switch. Using it means that the credentials you supply don’t have to be valid on the machine you’re running it on, but will still be passed on when remote calls are made! So cool. Why? Because I’m doing work with Microsoft, and I need to do things against their servers that require authentication. I don’t want to join my machine to their domain, which means I can’t get a process running under my Microsoft domain account. However, using this switch, I can make a process look to remote systems as if it were running under my Microsoft domain account. This turned out to be crucially important for getting our build process working on my machine.
The one caveat is that since it doesn’t do an actual login, it’ll take whatever password you throw at it. Even if it’s wrong – you won’t find out until you try to actually use those credentials.
Running Dsa.Msc From A Computer Not Joined Into Domain
I'm trying to figure out if this is possible:
I have a laptop that I take to numerous clients, and I
really don't like to join it to the domain because it's a
pain to do that constantly and deal with user accounts,
etc.
But, I would still like to use dsa.msc (AD Users and
Computers) and related tools to manage domains from my
laptop. Is there a way to do this?
I have tried all combinations of runas.
Additionally, "Connect To Another Computer/Domain:" (i.e.
from compmgmt.msc or something) only works on non-DC's
near as I can tell, so in this configuration it's useless
for dsa.msc. It just says, "Access is Denied" without
possibility of prompting for credentials.
I think it all boils down to the domain not trusting my
computer and vice versa. This is why I think this may
not be possible. But, I'm hoping some of you can think
of a way around this problem.
Thanks in advance,
Matt
You need to be joined to a domain. If the laptop has enough
horsepower, load Virtual PC and create a XP imeage which you just join
to client domains.
No you don't. Assuming you've installed the adminpak.msi on the XP
machine, you can:
runas /netonly /user:somedomain\someuserid "mmc dsa.msc"
Wayne
Monday, September 27, 2010
Transfer applications settings PCmover USMT
http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=transfer+applications+settings+PCmover+USMT+Zinstall&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=
http://en.wikipedia.org/wiki/User_State_Migration_Tool
Understanding Windows 7 migration tools
A comparison of Windows 7 migration tools
"Office Profile Wizard" PROFLWIZ
(http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%22Office+Profile+Wizard%22+PROFLWIZ&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=)
http://en.wikipedia.org/wiki/User_State_Migration_Tool
Understanding Windows 7 migration tools
A comparison of Windows 7 migration tools
"Office Profile Wizard" PROFLWIZ
(http://www.google.com/search?num=100&hl=en&newwindow=1&safe=off&q=%22Office+Profile+Wizard%22+PROFLWIZ&btnG=Search&aq=f&aqi=&aql=&oq=&gs_rfai=)
Saturday, September 25, 2010
Online Antivirus scanners
http://www.av-test.org/links
Online Virus Scan for Single File
(http://lhsp.s206.xrea.com/misc/virusscan.en.html)http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
Online-scanners |
File scanning with several scanners: Virustotal (Uploader) Novirusthanks (Uploader) Jotti Virscan Filterbit Viruschief Scanning of several zipped files: Avira Online-scanners: Kaspersky ![]() F-Secure BitDefender BitDefender qscan Eset Panda Software ![]() a-squared OneCareSuperantispyware Mcafee ![]() CA Comodo |
Labels:
Online Antivirus scanners
Wednesday, September 22, 2010
Saturday, September 18, 2010
Submit virus samples to AV companies
--------------------------------------------------------------------------------------------
Agnitum: http://www.agnitum.com/support/submit_files.php
Ahnlab: v3sos(at)ahnlab.com, e-support(at)ahnlab.com
http://global.ahnlab.com/global/virusreport_main.ESD
ANSAV: http://www.ansav.com (check right sidebar)
Antiy: submit(at)virusview.net
Arcabit: wirus(at)arcabit.pl
http://www.arcabit.pl/sprawdz_pliki
Avast: virus(at)avast.com
AVG: virus(at)grisoft.cz
Avira: virus(at)avira.com, heuristik2(at)avira.com (gen/heur fp)
http://analysis.avira.com/samples/
BitDefender: virus_submission(at)bitdefender.com
http://www.bitdefender.com/site/Know...se/getSupport/ (note)
BKAV: bkav(at)bkav.com.vn
BullGuard: support(at)bullguard.com
Bytehero: virus(at)bytehero.com
ByteHero: support(at)bytehero.com
CA: virus(at)ca.com
http://home3.ca.com/Support/VirusSampleForm.aspx?
ClamAV: http://cgi.clamav.net/sendvirus.cgi
CMC: support.is(at)cmclab.net, contact(at)cmcinfosec.com
Command: virus(at)authentium.com
Comodo: malwaresubmit(at)avlab.comodo.com, falsepositive(at)avlab.comodo.com
http://internetsecurity.comodo.com/submit.php
CyberDefender: support(at)cyberdefender.com
Dr.Web: vms(at)drweb.com
https://vms.drweb.com/sendvirus/?lng=en
eAcceleration: http://research.eacceleration.com/submit_sample/
eEye: malware(at)eeye.com
EmsiSoft: submit(at)emsisoft.com, fp(at)emsisoft.com (fp)
http://www.emsisoft.com/en/support/submit/
eSafe: esafe.virus(at)eAladdin.com, virus(at)esafe.com
ESET: samples(at)eset.com
eXtendia/Guardian: TechSupport(at)BoomerangSoftware.com
Filseclab: virus(at)filseclab.com
FireAV: service(at)fireav.com
Fortinet: submitvirus(at)fortinet.com
F-Prot: viruslab(at)f-prot.com
http://www.f-prot.com/virusinfo/submission_form.html
http://www.f-prot.com/virusinfo/fals...tive_form.html (fp)
F-Secure: vsamples(at)f-secure.com
https://analysis.f-secure.com/
Gdata: http://www.gdatasoftware.com/support.html
Hacksoft: virus(at)hacksoft.com.pe
Hauri: hauri98(at)hauri.co.kr
http://www.hauri.net/support/virus_report.html
http://www.hauri.net/support/false_report.html (fp)
Ikarus: samples(at)ikarus.at, false-positive(at)ikarus.at (fp)
http://www.ikarus-software.at/cgi-bi...s&submit=more+
Immunet: submit(at)samples.immunet.com, support(at)immunet.com (fp)
Iolo: support-crm(at)iolo.com
http://www.iolo.com/customercare/technicalsupport.aspx
Jiangmin: virus(at)jiangmin.com, open-file(at)jiangmin.com (fp)
K7 Computing: k7viruslab(at)k7computing.com
Kaspersky: newvirus(at)kaspersky.com
Kingsoft: support(at)kingsoftresearch.com
http://www.kingsoftsupport.com/kingsoft/upload.php
Lavasoft: research(at)lavasoft.com
http://upload.lavasoft.com/upload/submit_file.php
Mcafee: virus_research(at)avertlabs.com, spyware_research(at)avertlabs.com (note)
datasubmission(at)mcafee.com (fp) (note)
Micropoint: virus(at)micropoint.com.cn, support(at)micropoint.cn
http://service.micropoint.com.cn/mail.php (tick 2nd option - To report suspicious files)
Microsoft: avsubmit(at)submit.microsoft.com, windefend(at)submit.microsoft.com, mfcs(at)submit.microsoft.com
https://www.microsoft.com/security/portal/submit.aspx
Microworld: support(at)mwti.net
MKS-Vir: pomoc(at)mks.com.pl
http://www.mks.com.pl/pomoc/wyslij_zarazony_plik (1.5 mb limit)
Moonsecure: http://www.moonsecure.com/vsubmit.php (note)
MyFreeAntivirus: http://smartpctools.com/support.html
Net Protector: service(at)indiaantivirus.com
http://indiaantivirus.com/virussample.html
Netgate: research(at)spy-emergency.com
http://www.spy-emergency.com/content/view/43/58/
Nictasoft: http://www.nictasoft.com/new-virus/
Norman: analysis(at)norman.no
http://www.norman.com/security_cente...mit_file/en-us
http://www.norman.com/support/fp/en (fp)
nProtect: http://global.nprotect.com/support/contactus.php
Nuwavesoft: support(at)nuwavesoft.com
Panda: virus(at)pandasecurity.com, falsepositives(at)pandasecurity.com (fp) (note)
ParetoLogic: SWAT(at)Paretologic.com
http://www.paretologic.com/community/submissions/ (check left sidebar)
PCMAV: redaksi(at)pcmedia.co.id
PCSecurityShield: customersupport(at)pcsecurityshield.com
PC Tools: http://www.pctools.com/mrc/submit/
Prevx: virus(at)prevxresearch.com, report(at)prevxresearch.com (note)
Proland: virsample(at)pspl.com
http://www.pspl.com/support/samplesubmit.htm
QuickHeal: viruslab(at)quickheal.com
http://www.quickheal.co.in/submit_sample.asp
http://www.quickheal.co.in/submit_fp.asp (fp)
Returnil: support-tech(at)returnil.com (note)
Rising: master(at)rising.com.cn
http://mailcenter.rising.com.cn/FileCheck/
http://support.rising-global.com/ind...departmentid=1
Sophos: samples(at)sophos.com
http://www.sophos.com/support/samples
Srnmicro: vlab(at)srnmicro.com
Sunbelt: malware-cruncher(at)sunbelt-software.com, spywarereport(at)sunbelt-software.com
http://www.sunbeltsecurity.com/Submi...5D4A0825C756EA
http://www.sunbeltsecurity.com/Submi...7BCD8BFF85EB45 (fp)
Sybari: submit_virus(at)research.sybari.com (note)
Symantec: avsubmit(at)symantec.com
https://submit.symantec.com/websubmit/retail.cgi
https://submit.symantec.com/dispute/false_positive (fp)
TrendMicro: virus_doctor(at)trendmicro.com
http://subwiz.trendmicro.com/SubWiz/Default.asp
Trustport: support(at)trustport.com
VBA32: newvirus(at)anti-virus.by
Vexira: virus_submission(at)centralcommand.com
Vir.it: assistenza(at)viritpro.com
VirusBuster: virus(at)virusbuster.hu
https://support.virusbuster.hu/index...kets&_a=submit (tick Virus Lab)
Virus Chaser: inquiry(at)viruschaser.com.hk
http://www.viruschaser.hk/e_contact.php (select Virus Support)
Webroot: submissions(at)webroot.com
http://www.webroot.com/En_US/about-vendorcomplaint.html (fp)
Websense: submit(at)websensesecuritylabs.com
http://securitylabs.websense.com/con...Malicious.aspx (select Malicious Application)
Zonelabs: malware(at)zonelabs.com
Greatis: support(at)greatis.com
Hazard Shield: andy(at)orbitech.org
Iobit Security 360: is360submit(at)iobit.com
http://db.iobit.com/deal/sdsubmit/index.php
Malwarebytes: http://uploads.malwarebytes.org
Nemesis: support(at)usec.at
NoVirusThanks (?): robert(at)novirusthanks.org
PC DoorGuard (?): astonsupport(at)astonsoft.com
Remove Fake Antivirus (?): olzenkhaw(at)hotmail.com
Spybot: detections(at)spybot.info
http://www.safer-networking.org/en/c...etections.html
Spyware Terminator: contact(at)spywareterminator.com
http://www.spywareterminator.com/sup...rt-ticket.aspx
Superantispyware: samples(at)superantispyware.com
http://www.fileresearchcenter.com/submitfile.html
http://www.fileresearchcenter.com/vendordispute.html (fp)
The Cleaner: trojans(at)moosoft.com
http://www.moosoft.com/TheCleaner/WebSubmit
TheStubware: support(at)thestubware.com
Trojan Hunter: submit(at)trojanhunter.com
Trojan Remover: submit(at)simplysup.com
ZeroSpyware: support(at)zerospyware.com
http://www.spyware-net.com/ReportSpyware
AVLab-UA: newvirus(at)avlab-ua.com
http://www.avlab-ua.com/component/op...mid,2/lang,ru/
http://www.avlab-ua.com/component/op...mid,3/lang,ru/ (fp)
UNA: newvirus(at)unasoft.com.ua
UploadMalware: http://www.uploadmalware.com
Most security vendors suggest that you put your sample(s) inside a password-protected archive* (preferably zip) to prevent being filtered/corrupted. In the e-mail/web form body include the archive password, symptom(s) of the infection(s) and if possible the site url(s) where you got the suspect file(s). In some cases if you can't locate the file(s), just e-mail the malware url(s) to your vendor and ask for removal assistance.
If you suspect your security vendor has produced a false positive (fp), put the detected file(s) inside a password-protected archive* (preferably zip). To get hold of the file(s), temporarily disable the real-time shield of your security software, restore the file(s) from quarantine and put the file(s) in your software's exclusion list. Refer to the help file of your security software to do those. In the e-mail/web form body include the archive password, site url(s) where you got the file(s) and reason(s) why the file(s) is/are safe.
*How to password protect zip files in windows XP/windows vista? If you're using an older Windows Operating System you need a 3rd party archiver (like 7-zipthat is free). Refer to the archiver's help file.
If you spot any mistakes, wrong contacts/links or would like to add other vendor contacts please post them. Thanks.
PS: Don't forget to change (at) to @. Some forms/links are not in English so use online translators like Google's or Yahoo's to translate them into English or your language.
Ahnlab: v3sos(at)ahnlab.com, e-support(at)ahnlab.com
http://global.ahnlab.com/global/virusreport_main.ESD
ANSAV: http://www.ansav.com (check right sidebar)
Antiy: submit(at)virusview.net
Arcabit: wirus(at)arcabit.pl
http://www.arcabit.pl/sprawdz_pliki
Avast: virus(at)avast.com
AVG: virus(at)grisoft.cz
Avira: virus(at)avira.com, heuristik2(at)avira.com (gen/heur fp)
http://analysis.avira.com/samples/
BitDefender: virus_submission(at)bitdefender.com
http://www.bitdefender.com/site/Know...se/getSupport/ (note)
BKAV: bkav(at)bkav.com.vn
BullGuard: support(at)bullguard.com
Bytehero: virus(at)bytehero.com
ByteHero: support(at)bytehero.com
CA: virus(at)ca.com
http://home3.ca.com/Support/VirusSampleForm.aspx?
ClamAV: http://cgi.clamav.net/sendvirus.cgi
CMC: support.is(at)cmclab.net, contact(at)cmcinfosec.com
Command: virus(at)authentium.com
Comodo: malwaresubmit(at)avlab.comodo.com, falsepositive(at)avlab.comodo.com
http://internetsecurity.comodo.com/submit.php
CyberDefender: support(at)cyberdefender.com
Dr.Web: vms(at)drweb.com
https://vms.drweb.com/sendvirus/?lng=en
eAcceleration: http://research.eacceleration.com/submit_sample/
eEye: malware(at)eeye.com
EmsiSoft: submit(at)emsisoft.com, fp(at)emsisoft.com (fp)
http://www.emsisoft.com/en/support/submit/
eSafe: esafe.virus(at)eAladdin.com, virus(at)esafe.com
ESET: samples(at)eset.com
eXtendia/Guardian: TechSupport(at)BoomerangSoftware.com
Filseclab: virus(at)filseclab.com
FireAV: service(at)fireav.com
Fortinet: submitvirus(at)fortinet.com
F-Prot: viruslab(at)f-prot.com
http://www.f-prot.com/virusinfo/submission_form.html
http://www.f-prot.com/virusinfo/fals...tive_form.html (fp)
F-Secure: vsamples(at)f-secure.com
https://analysis.f-secure.com/
Gdata: http://www.gdatasoftware.com/support.html
Hacksoft: virus(at)hacksoft.com.pe
Hauri: hauri98(at)hauri.co.kr
http://www.hauri.net/support/virus_report.html
http://www.hauri.net/support/false_report.html (fp)
Ikarus: samples(at)ikarus.at, false-positive(at)ikarus.at (fp)
http://www.ikarus-software.at/cgi-bi...s&submit=more+
Immunet: submit(at)samples.immunet.com, support(at)immunet.com (fp)
Iolo: support-crm(at)iolo.com
http://www.iolo.com/customercare/technicalsupport.aspx
Jiangmin: virus(at)jiangmin.com, open-file(at)jiangmin.com (fp)
K7 Computing: k7viruslab(at)k7computing.com
Kaspersky: newvirus(at)kaspersky.com
Kingsoft: support(at)kingsoftresearch.com
http://www.kingsoftsupport.com/kingsoft/upload.php
Lavasoft: research(at)lavasoft.com
http://upload.lavasoft.com/upload/submit_file.php
Mcafee: virus_research(at)avertlabs.com, spyware_research(at)avertlabs.com (note)
datasubmission(at)mcafee.com (fp) (note)
Micropoint: virus(at)micropoint.com.cn, support(at)micropoint.cn
http://service.micropoint.com.cn/mail.php (tick 2nd option - To report suspicious files)
Microsoft: avsubmit(at)submit.microsoft.com, windefend(at)submit.microsoft.com, mfcs(at)submit.microsoft.com
https://www.microsoft.com/security/portal/submit.aspx
Microworld: support(at)mwti.net
MKS-Vir: pomoc(at)mks.com.pl
http://www.mks.com.pl/pomoc/wyslij_zarazony_plik (1.5 mb limit)
Moonsecure: http://www.moonsecure.com/vsubmit.php (note)
MyFreeAntivirus: http://smartpctools.com/support.html
Net Protector: service(at)indiaantivirus.com
http://indiaantivirus.com/virussample.html
Netgate: research(at)spy-emergency.com
http://www.spy-emergency.com/content/view/43/58/
Nictasoft: http://www.nictasoft.com/new-virus/
Norman: analysis(at)norman.no
http://www.norman.com/security_cente...mit_file/en-us
http://www.norman.com/support/fp/en (fp)
nProtect: http://global.nprotect.com/support/contactus.php
Nuwavesoft: support(at)nuwavesoft.com
Panda: virus(at)pandasecurity.com, falsepositives(at)pandasecurity.com (fp) (note)
ParetoLogic: SWAT(at)Paretologic.com
http://www.paretologic.com/community/submissions/ (check left sidebar)
PCMAV: redaksi(at)pcmedia.co.id
PCSecurityShield: customersupport(at)pcsecurityshield.com
PC Tools: http://www.pctools.com/mrc/submit/
Prevx: virus(at)prevxresearch.com, report(at)prevxresearch.com (note)
Proland: virsample(at)pspl.com
http://www.pspl.com/support/samplesubmit.htm
QuickHeal: viruslab(at)quickheal.com
http://www.quickheal.co.in/submit_sample.asp
http://www.quickheal.co.in/submit_fp.asp (fp)
Returnil: support-tech(at)returnil.com (note)
Rising: master(at)rising.com.cn
http://mailcenter.rising.com.cn/FileCheck/
http://support.rising-global.com/ind...departmentid=1
Sophos: samples(at)sophos.com
http://www.sophos.com/support/samples
Srnmicro: vlab(at)srnmicro.com
Sunbelt: malware-cruncher(at)sunbelt-software.com, spywarereport(at)sunbelt-software.com
http://www.sunbeltsecurity.com/Submi...5D4A0825C756EA
http://www.sunbeltsecurity.com/Submi...7BCD8BFF85EB45 (fp)
Sybari: submit_virus(at)research.sybari.com (note)
Symantec: avsubmit(at)symantec.com
https://submit.symantec.com/websubmit/retail.cgi
https://submit.symantec.com/dispute/false_positive (fp)
TrendMicro: virus_doctor(at)trendmicro.com
http://subwiz.trendmicro.com/SubWiz/Default.asp
Trustport: support(at)trustport.com
VBA32: newvirus(at)anti-virus.by
Vexira: virus_submission(at)centralcommand.com
Vir.it: assistenza(at)viritpro.com
VirusBuster: virus(at)virusbuster.hu
https://support.virusbuster.hu/index...kets&_a=submit (tick Virus Lab)
Virus Chaser: inquiry(at)viruschaser.com.hk
http://www.viruschaser.hk/e_contact.php (select Virus Support)
Webroot: submissions(at)webroot.com
http://www.webroot.com/En_US/about-vendorcomplaint.html (fp)
Websense: submit(at)websensesecuritylabs.com
http://securitylabs.websense.com/con...Malicious.aspx (select Malicious Application)
Zonelabs: malware(at)zonelabs.com
Greatis: support(at)greatis.com
Hazard Shield: andy(at)orbitech.org
Iobit Security 360: is360submit(at)iobit.com
http://db.iobit.com/deal/sdsubmit/index.php
Malwarebytes: http://uploads.malwarebytes.org
Nemesis: support(at)usec.at
NoVirusThanks (?): robert(at)novirusthanks.org
PC DoorGuard (?): astonsupport(at)astonsoft.com
Remove Fake Antivirus (?): olzenkhaw(at)hotmail.com
Spybot: detections(at)spybot.info
http://www.safer-networking.org/en/c...etections.html
Spyware Terminator: contact(at)spywareterminator.com
http://www.spywareterminator.com/sup...rt-ticket.aspx
Superantispyware: samples(at)superantispyware.com
http://www.fileresearchcenter.com/submitfile.html
http://www.fileresearchcenter.com/vendordispute.html (fp)
The Cleaner: trojans(at)moosoft.com
http://www.moosoft.com/TheCleaner/WebSubmit
TheStubware: support(at)thestubware.com
Trojan Hunter: submit(at)trojanhunter.com
Trojan Remover: submit(at)simplysup.com
ZeroSpyware: support(at)zerospyware.com
http://www.spyware-net.com/ReportSpyware
AVLab-UA: newvirus(at)avlab-ua.com
http://www.avlab-ua.com/component/op...mid,2/lang,ru/
http://www.avlab-ua.com/component/op...mid,3/lang,ru/ (fp)
UNA: newvirus(at)unasoft.com.ua
UploadMalware: http://www.uploadmalware.com
Most security vendors suggest that you put your sample(s) inside a password-protected archive* (preferably zip) to prevent being filtered/corrupted. In the e-mail/web form body include the archive password, symptom(s) of the infection(s) and if possible the site url(s) where you got the suspect file(s). In some cases if you can't locate the file(s), just e-mail the malware url(s) to your vendor and ask for removal assistance.
If you suspect your security vendor has produced a false positive (fp), put the detected file(s) inside a password-protected archive* (preferably zip). To get hold of the file(s), temporarily disable the real-time shield of your security software, restore the file(s) from quarantine and put the file(s) in your software's exclusion list. Refer to the help file of your security software to do those. In the e-mail/web form body include the archive password, site url(s) where you got the file(s) and reason(s) why the file(s) is/are safe.
*How to password protect zip files in windows XP/windows vista? If you're using an older Windows Operating System you need a 3rd party archiver (like 7-zipthat is free). Refer to the archiver's help file.
If you spot any mistakes, wrong contacts/links or would like to add other vendor contacts please post them. Thanks.

PS: Don't forget to change (at) to @. Some forms/links are not in English so use online translators like Google's or Yahoo's to translate them into English or your language.
__________________
"O miserable shadow clad in darkness! Hurting and disdaining people, a karmic soul drowning in sin... Would you try dying for once?" - Enma Ai
"O miserable shadow clad in darkness! Hurting and disdaining people, a karmic soul drowning in sin... Would you try dying for once?" - Enma Ai
Last edited by LowWaterMark : November 23rd, 2009 at 05:10 PM. Reason: additions and updates per thanatos_theos
Friday, September 17, 2010
Thursday, September 16, 2010
How To Copy Text or Error Messages from Any Dialog Boxes in Windows
http://www.raymond.cc/blog/archives/2008/05/25/how-to-copy-text-or-error-messages-from-any-dialog-boxes-in-windows/
How To Copy Text or Error Messages from Any Dialog Boxes in Windows:
How To Copy Text or Error Messages from Any Dialog Boxes in Windows:
- Scraper from PC Magazine
- SysExporter
- WinScraper
- Textractor
- TextGrabber
Wednesday, September 15, 2010
Search Engines Webmaster Tools
Search engine webmaster tools:
http://en.wikipedia.org/wiki/Google_Webmaster_Tools
http://en.wikipedia.org/wiki/Bing_Webmaster_Center
http://en.wikipedia.org/wiki/Yahoo!_Site_Explorer
----------------------------------------------------------------------------------------------------------
Google:
(mimmo1997@gmail.com / mimmo2011@gmail.com)
Bing:
http://www.bing.com/webmaster/
(mimmo2009@live.com / mimmo2011@live.com)
Yahoo:
http://siteexplorer.search.yahoo.com/
(mimmo_1997@yahoo.com / mimmo2011@ymail.com / mimmo9711@yahoo.com)
-----------------------------------------------------------------------------------------------------------
Blogger Sitemap Generator /
Sitemap Generator for Google, Bing and Yahoo:
http://digitalinspiration.com/tools/blogger/sitemap/
-----------------------------------------------------------------------------------------------------------
Facebook Account:
http://www.facebook.com/
mimmo2011@live.com
http://en.wikipedia.org/wiki/Google_Webmaster_Tools
http://en.wikipedia.org/wiki/Bing_Webmaster_Center
http://en.wikipedia.org/wiki/Yahoo!_Site_Explorer
----------------------------------------------------------------------------------------------------------
Google:
(mimmo1997@gmail.com / mimmo2011@gmail.com)
Bing:
http://www.bing.com/webmaster/
(mimmo2009@live.com / mimmo2011@live.com)
Yahoo:
http://siteexplorer.search.yahoo.com/
(mimmo_1997@yahoo.com / mimmo2011@ymail.com / mimmo9711@yahoo.com)
-----------------------------------------------------------------------------------------------------------
Blogger Sitemap Generator /
Sitemap Generator for Google, Bing and Yahoo:
http://digitalinspiration.com/tools/blogger/sitemap/
-----------------------------------------------------------------------------------------------------------
Facebook Account:
http://www.facebook.com/
mimmo2011@live.com
Subscribe to:
Posts (Atom)