lakkireddymadhu

  • 1.   7-Zip:

    Every desktop user needs 7-Zip. While Windows 8 (finally!) added the ability to look into ISO files — you still need 7-Zip to see them in Win7 — Win8’s Windows Explorer still doesn’t support RAR compressed files, which are becoming more common as Mac use continues to rise. 7-Zip also creates password-protected Zip files, as well as self-extracting Zips.

     You don’t need to register or pay for 7-Zip. To download go to 7-zip.org

   2.  CCleaner:

CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your       computer faster and more secure. Easy to use and a small, fast download.

It removes unused files from your system – allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully               featured registry cleaner. But the best part is that it’s fast (normally taking less than a second to run)

 Cleans the following:

 Internet Explorer
Temporary files, history, cookies, super cookies, Autocomplete form history, index.dat files.

 Firefox
Temporary files, history, cookies, super cookies, download history, form history.

 Google Chrome
Temporary files, history, cookies, super cookies, download history, form history.

  Opera
Temporary files, history, cookies, super cookies, download history.

Safari

 Temporary files, history, cookies, super cookies, form history.

Other Supported Browsers
K-Meleon, Rockmelt, Flock, Google Chrome Canary, Chromium, SeaMonkey, Chrome Plus, SRWare Iron, Pale Moon, Phoenix, Netscape Navigator, Avant and Maxthon.

 Windows
Recycle Bin, Recent Documents, Temporary files, Log files, Clipboard, DNS Cache, Error Reporting, Memory Dumps, Jump Lists.

  Registry Cleaner
Advanced features to remove unused and old entries, including File Extensions, ActiveX Controls, ClassIDs, ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files, Application Paths, Icons, Invalid Shortcuts and more…

Third-party applications

Removes temp files and recent file lists (MRUs) from many apps including Windows Media Player, eMule, Google                 Toolbar, Microsoft Office, Nero, Adobe Acrobat, WinRAR, WinAce, WinZip and many more…

 

   3.    Auslogics Duplicate File Finder:

Auslogics Duplicate File Finder is a basic program that allows users to find and delete duplicate files taking                             up valuable space on their hard drives.

Auslogics Duplicate File Finder is free. It installs and uninstalls without issues. I recommend this program to all                  users; even those with limited system maintenance experience will find it easy to use.

Auslogic

 

 

 4. VLC Media Player:

Simple, fast and powerful media player.

Plays everything: Files, Discs, Webcams, Devices and Streams.

Plays most codecs with no codec packs needed:

MPEG-2, DivX, H.264, MKV, WebM, WMV, MP3…

Runs on all platforms: Windows, Linux, Mac OS X, Unix…

Completely Free, no spyware, no ads and no user tracking.

Can do media conversion and streaming. Download VLC player VLC

 

 5. Revo Uninstaller:  

         well and truly uninstalls programs, and it does so in an unexpected way. When you use Revo, it runs the program’s           uninstaller and watches while the Uninstaller works, looking for the location of the program files and for Registry               keys that the uninstaller zaps. It then goes in and removes leftover pieces, based on the locations and keys that the           program’s Uninstaller took out. Revo also consults its own internal database for commonly-left-behind bits, and                 roots those out as well. To download go to Revo Uninstaller

 6. Recuva:

Recuva recovers files deleted from your Windows computer, Recycle Bin, digital camera card, or MP3                                      player. Recuva works on any re-writable media you have.

reuva_logo

 

If you listen to music on an iPod, Recuva can recover files directly from the iPod’s drive. Even though you can’t                  access files on your iPod directly, Recuva can. You don’t have to worry about losing music from iTunes or your iPod        anymore. To download go to Recuva

  7.  Kaspersky TDSSKiller:

The name may lead you to believe that TDSSKiller kills the TDSS rootkit, but the product does much more simply               because so many common rootkits are based on, or derived from, TDSS. The current version detects and removes             SST, Pihar, ZeroAccess, Sinowal, Whistler, Phanta, Trup, Stoned, RLoader, Cmoser, and Cidox. Unlike most rootkit             killers, this one runs in Windows.

kaspersky

To run the program, fill out the form on the TDSSKiller page, wait for Kaspersky to send you a download link.                       Download the program and run it — no installer, just an EXE. If any rootkits are found, you’ll be given the                               opportunity to Delete/Cure, Copy to quarantine, or Skip each identified interloper.

To download go to Kaspersky TDSSKiller

 

  8. YTD Video Downloader: 

YTD Video Downloader is a great solution to grab the media you need, straight from YouTube, Facebook, Vimeo and       60+ other websites. YTD allows you to manage downloads and conversions on the fly.

YTD Video Downloader

 

      KEY  FEATURES  INCLUDE

  • Video Conversion: With YTD you can convert video media to 9 different formats including WMV, AVI and MP3.
  • Conversion Quality: YTD allows you to convert video files in 5 different qualities.
  • Audio Only: With YTD you can grab a video file and then covert the file to audio-only in an MP3 format.

To download go to YTD Video Downloader

 

9.  Secunia PSI: 

The Secunia Personal Software Inspector (PSI) is a free computer security solution that identifies vulnerabilities in            non-Microsoft (third-party) programs which can leave your PC open to attacks.

Simply put, it scans software on your system and identifies programs in need of security updates to safeguard your     PC against cybercriminals. It then supplies your computer with the necessary software security updates to keep it       safe. The Secunia PSI even automates the updates for your insecure programs, making it a lot easier for you to  maintain a secure PC.

Using a scanner like Secunia PSI 3.0 is complementary to antivirus software, and as a free computer security program, is essential for every home computer.

 

10. Malwarebytes: 

Malwarebytes is different. The free version is designed to run manually — I run mine once a week. Malwarebytes       picks up all sorts of creepy crawlies that get past AV programs. When combined with the support on the                                   Malwarebytes forum, Malwarebytes is the ultimate fallback for infected systems — whether you know they’re infected       or not. To download go to Malwarebytes.

malwarebytes

 

Source:  itworld

 

How to change IP address using a Batch File:

Starting with Windows 2000, Microsoft has provided a powerful utility, Netsh, which lets you display and modify the network configuration of Windows computers. You can use the Netsh on the command line or in a batch file. Here’s an example of how you can create a batch file that changes the IP address of the local machine.

Netsh is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer. Netsh can also save a configuration script in a text file for archival purposes or to help you configure other servers.

In my environment, we don’t use DHCP. We use static IP addresses. Using static IP addresses usually doesn’t present any problems because we rarely move desktops between locations. However, the people who use laptops usually visit multiple locations. At each location, they’ve been assigned a separate IP address. Each time they change location, they look up the appropriate network settings in a .txt file, then manually change those settings. This occasionally creates problems because they have to remember the correct steps to change their network settings and sometimes they mistakenly enter wrong numbers.

I found a solution. For each location, I created a simple batch file that the laptop users can run. Whenever they want to change their IP settings, all they have to do is execute the appropriate batch file.

The batch file uses the Netsh utility and contains below given commands.

Copy the code given below in the Notepad and save it with the .bat extension.

- Run the .bat file with double click.

- In the some cases, the .bat file needs to run with administrator’s privileges. Right-click on the .bat file and choose “Run as administrator“.

@echo off
ipconfig /flushdns
ipconfig /release
netsh interface set interface "Local Area Connection" disable
netsh interface ip set dns "Local Area Connection" static
netsh interface ip set address "Local Area Connection" static
echo Wait 5 seconds...
ping -n 60 -w 1000 0.0.0.1 > nul
netsh interface set interface "Local Area Connection" enable
netsh interface ip set address "Local Area Connection" static 192.168.XXX.XX 255.255.255.0 192.168.XXX.X
netsh interface ip set dns "Local Area Connection" static 192.168.XXX.XXX

To change the IP Address to “obtain an IP address automatically” or to remove the IP Address, Copy the code given below in the Notepad and save it with the .bat extension.


@echo off

ipconfig /flushdns

ipconfig /release

netsh interface set interface "Local Area Connection" disable

netsh interface ip set dns "Local Area Connection" dhcp

netsh interface ip set address "Local Area Connection" dhcp

echo Wait 5 seconds...

ping -n 60 -w 1000 0.0.0.1 > nul

netsh interface set interface "Local Area Connection" enable

Now, whenever the users want to change their IP settings, all they have to do is run the batch file.

 Note: This entire process (IP Address change process) will take max 60 to 80 seconds.

Source: windowsitpro, sevenforums

 

Resetting a lost admin password:

Periodically a situation arises where the FortiGate needs to be accessed or the

Admin account’s password needs to be changed, but no one with the existing

password is available. If you have physical access to the device and a few other

tools then the password can be reset.

Warning:

This procedure will require the reboot of the FortiGate unit.

You need:

• Console cabel

• Terminal software such as Putty.exe (Windows) or Terminal (Mac OS)

• Serial number of the FortiGate device

 Step-1: Connect the computer to the firewall via the Console port on the

back of the unit.

In most units this is done either by a Serial cable or a RJ-45 to

Serial cable. There are some units that use a USB cable and

FortiExplorer to connect to the console port.

 

                                                       Console cable

 

Virtual instances will not have any physical port to connect to so

you will have to use the supplied VM Hosts’ console connection

utility.

Step 2: Start your terminal software.

Step 3: Connect to the firewall using the following:

Step 4:

The firewall should then respond with its name or hostname. (If it

doesn’t try pressing “enter”)

Step 5:

Reboot the firewall. If there is no power button, disconnect the

power adapter and reconnect it after 10 seconds. Plugging in the

power too soon after unplugging it can cause corruption in the

memory in some units.

Step 6:

Wait for the Firewall name and login prompt to appear. The

terminal window should display something similar to the following:

 

FortiGate-60C (18:52-06.18.2010)

Ver:04000010

Serial number: FGT60C3G10016011

CPU(00): 525MHz

Total RAM: 512 MB

NAND init… 128 MB

MAC Init… nplite#0

Press any key to display configuration menu

……

reading boot image 1163092 bytes.

Initializing firewall…

System is started.

<name of Fortinet Device> login:

 

Step 7:
Type in the username:
maintainer

Step 8:

The password is
bcpb +
the serial number of the firewall (letters of

the serial number is in UPPERCASE format)

Example:

bcpbFGT60C3G10016011

 Note:

On some devices, after the device boots, you have

only 14 seconds or less to type in the username and

password. It might, therefore, be necessary to have the

credentials ready in a text editor, and then copy and paste

them into the login screen. There is no indicator of when

your time runs out so it is possible that it might take more

than one attempt to succeed.

Step 9:

Now you should be connected to the firewall. To change the admin

password you type the following…

 

In a unit where vdoms are not enabled:

config system admin

edit admin

set password <psswrd>

end

 

In a unit where vdoms are enabled:

config global

config system admin

edit admin

set password <psswrd>

end

 

Warning:

Good news and bad news. Some might be worried that there is a backdoor into

the system. The maintainer feature/account is enabled by default, but the better

news is, if you wish, there is an option to disable this feature. The bad news is

that if you disable the feature and lose the password without having someone

Else that can log in as a superadmin profile user, you will be out of options.

 

If you attempt to use the maintainer account and see the message on the

console,PASSWORD RECOVERY FUNCTIONALITY IS DISABLED“, this

means that the maintainer account has been disabled.

 

Disabling the maintainer feature/account

Use the following command in the CLI to change the status of the maintainer

Account

To disable

config system global

set admin-maintainer disable

end

To enable

config system global

set admin-maintainer enable

end

 

Source: Fortinet

July 25, 2014 (Last Friday Of July)
15th
 Annual
System Administrator Appreciation Day

sys admin

Image Source: miragestudio7

 

Acronym

Stands for

3DES Triple Data Encryption Standard
AAA Authentication, Authorization and Accounting
ACL Access Control List
AES Advanced Encryption Standard
AES 256 Advanced Encryption Standards, 256-bit
AH Authentication Header
ARP Address Resolution Protocol
AUP Acceptable Use Policy
BCP Business Continuity Planning
BIOS Basic Input/Output System
BOTS Network Robots
CA Certificate Authority
CCTV Closed-Circuit Television
CERT Computer Emergency Response Team
CHAP Challenge Handshake Authentication Protocol
CIRT Computer Incident Response Team
CRL Certification Revocation List
DAC Discretionary Access Control
DDOS Distributed Denial of Service
DEP Data Execution Prevention
DES Data Encryption Standard
DHCP Dynamic Host Configuration Protocol
DLL Dynamic Link Library
DLP Data Loss Prevention
DMZ Demilitarized Zone
DNS Domain Name Service
DOS Denial Of Service
DRP Disaster Recovery Plan
DSA Digital Signature Algorithm
EAP Extensible Authentication Protocol
ECC Elliptic Curve Cryptography
EFS Encrypted File System
EMI Electromagnetic Interference
ESP Encapsulated Security Payload
FTP File Transfer Protocol
GPU Graphic Processing Unit
GRE Generic Routing Encapsulation
HDD Hard Disk Drive
HIDS Host-Based Intrusion Detection System
HIPS Host-Based Intrusion Prevention System
HMAC Hashed Message Authentication Code
HSM Hardware Security Module
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol over SSL
HVAC Heating, Ventilation, Air Conditioning
IaaS Infrastructure as a Service
ICMP Internet Control Message Protocol
ID Identification
IKE Internet Key Exchange
IM Internet Messaging
IMAP4 Internet Message Access Protocol v4
IP Internet Protocol
IPSEC Internet Protocol Security
IRC Internet Relay Chat
ISP Internet Service Provider
KDC Key Distribution Center
L2TP Layer 2 Tunneling Protocol
LANMAN Local Area Network Manager
LDAP Lightweight Directory Access Protocol
LEAP Lightweight Extensible Authentication Protocol
MAC Mandatory Access Control / Media Access Control
MAC Message Authentication Code
MBR Master Boot Record
MDS Message Digest 5
MSCHAP Microsoft Challenge Handshake Authentication Protocol
MTU Maximum Transmission Unit
NAC Network Access Control
NAT Network Address Translation
NIDS Network-Based Intrusion Detection System
NIPS Network-Based Intrusion Prevention System
NOS Network Operating System
NTFS New Technology File System
NTLM New Technology LANMAN
NTP Network Time Protocol
OS Operating System
OVAL Open Vulnerability Assessment Language
PAP Password Authentication Protocol
PAT Port Address Translation
PEAP Protected Extensible Authentication Protocol
PGP Pretty Good Privacy
PKI Public Key Infrastructure
PPP Point-to-Point Protocol
PPTP Point-to-Point Tunneling Protocol
PSK Pre-Shared Key
RA Recovery Agent
RADIUS Remote Authentication Dial-in User Server
RAID Redundant Array of Inexpensive Disks
RAS Remote Access Server
RBAC Role Based Access Control
RSA Rivest, Shamir & Adleman
RTP Real-Time Transport Protocol
S/MIME Secure/Multipurpose Internet Mail Extension
SaaS Software as a Service
SCAP Security Content Automation Protocol
SCSi Small Computer System Interface
SDLC Software Development Life Cycle
SDLM Software Development Life Cycle Methodology
SHA Secure Hashing Algorithm
SHTTP Secure Hypertext Transfer Protocol
SIM Subscriber Identity Module
SLA Service Level Agreement
SLE Single Loss Expectancy
SMS Short Message Service
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
SSH Secure Shell
SSL Secure Sockets Layer
SSO Single Sign-On
TACACS Terminal Access Controller Access Control System
TCP/IP Transmission Control Protocol/Internet Protocol
TLS Transport Layer Security
TPM Trusted Platform Module
UAT User Acceptance Testing
UPS Uninterrupted Power Supply
URL Universal Resource Locator
USB Universal Serial Bus
UTP Unshielded Twisted Pair
VLAN Virtual Local Area Network
VoIP Voice Over IP
VPN Virtual Private Network
VTC Video Teleconferencing
WAF Web Application Firewall
WAP Wireless Access Point
WEP Wired Equivalent Privacy
WIDS Wireless Intrusion detection System
WIPS Wireless Intrusion Prevention System
WPA Wireless Protected Access
XSRF Cross-Site request Forgery
XSS Cross-Site Scripting

Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers:

McAfee Agent cannot be removed while it is in managed mode”



Solution:

The computer must be removed from Managed Mode

  1. Steps:
    1-
    Open Command Prompt
    2- Go to the folder” C:\Program Files (x86)\McAfee\Common Framework” on X64 systems,” C:\Program Files\McAfee\Common Framework” on X86 systems
    3- Type “frminst.exe /forceuninstall” and press enter.
    command without quotes


 source: McAfee

If I had to live my life without you near me
The days would all be empty
The nights would seem so long
With you I see forever, oh, so clearly
I might have been in love before
But it never felt this strong

Our dreams are young and we both know
They’ll take us where we want to go
Hold me now, touch me now
I don’t want to live without you

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for you

If the road ahead is not so easy
Our love will lead the way for us
Like a guiding star
I’ll be there for you if you should need me
You don’t have to change a thing
I love you just the way you are

So come with me and share the view
I’ll help you see forever too
Hold me now, touch me now
I don’t want to live without you

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for you

Nothing’s gonna change my love for you
You oughta know by now how much I love you
One thing you can be sure of
I’ll never ask for more than your love

Nothing’s gonna change my love for you
You oughta know by now how much I love you
The world may change my whole life through
But nothing’s gonna change my love for
Nothing’s gonna change my love for you

SONGWRITERS:
MASSER, MICHAEL / GOFFIN, GERALD

Categories

Blog Stats

  • 92,833 hits

Calendar

August 2014
M T W T F S S
« Jul    
 123
45678910
11121314151617
18192021222324
25262728293031

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 277 other followers

Follow

Get every new post delivered to your Inbox.

Join 277 other followers