föstudagur, desember 21, 2007

Moving Outlook's Autocomplete Addresses

An Outlook PST migration doesn't include autocomplete addresses. They're not stored within your Outlook PST. Instead they're stored in a file with an .NK2 extension elsewhere in your profile. Making this migration even more challenging is that the location of the NK2 in Vista is different than where it was back on my old Windows XP machine.

For pre-Vista machines, the NK2 is stored in C:\Documents and Settings\{UserName}\Application Data\Microsoft\Outlook. What's interesting is that this is not the place where Outlook PSTs are stored by default. For pre-Vista machines, that location is C:\Documents and Settings\{UserName}\Local Settings\Application Data\Microsoft\Outlook, which is a slightly different path that meanders its way through the Local Settings folder. On Vista machines, as you probably know, the path for profile information is quite a bit different. Thus, the ultimate resting place for the NK2 is different as well.

For Vista, you'll want to deposit your NK2 into the C:\Users\{UserName}\AppData\Roaming\Microsoft\Outlook folder. Once there, Outlook will begin using that file again to populate the drop-down list.

While looking for this file, you may also want to look through it as well. If you've been annoyed by the number and uselessness of certain addresses in your drop-down list, you can eliminate them from this file to remove them from your drop-down list. Doing this, however, is no trivial task. You can't just open this file in Notepad. To edit your NK2, download a freeware tool called NK2.Info. This tool shows you the addresses stored in the file and allows you to add and remove addresses as necessary.

Efnisorð: , , , ,

þriðjudagur, október 16, 2007

WinSock XP Fix offers a last resort if your Internet connectivity has been corrupted due to invalid or removed registry entries. It can often cure the problem of lost connections after the removal of Adware components or improper uninstall of firewall applications or other tools that modify the XP network and Winsock settings. If you encounter connection problems after removing network related software, Adware or after registry clean-up; and all other ways fail, then give WinSock XP Fix a try. It can create a registry backup of your current settings, so it is fairly safe to use. We actually tested it on a test machine that was having a Winsock problem due to some Adware removal, and after running the utility and rebooting, the connectivity was restored.

Pros: May save you hours of headaches; can fix tricky connection problems

Cons: Not actively supported or developed

Efnisorð: , , , , ,

þriðjudagur, september 11, 2007

Web Form to Request Hotfixes from Microsoft

To obtain a Hotfix, submit your request via a web form to Microsoft Online Customer Service and Support – you should expect to receive a download link via email from Microsoft within 8 business hours.

The link: https://support.microsoft.com/contactus2/emailcontact.aspx?scid=sw;en;1410&WS=hotfix

Efnisorð: , , , ,

fimmtudagur, júní 21, 2007

Skoðaðu hvaða rekill tilheyrir hvaða vélbúnaði með Driverview

DriverView birtir lista yfir alla vélbúnaðarrekla sem eru í notkun á tölvunni ásamt gagnlegum upplýsingum svo sem lýsingu, útgáfu, framleiðanda og fleira.

DriverView utility displays the list of all device drivers currently loaded on your system. For each driver in the list, additional useful information is displayed: load address of the driver, description, version, product name, company that created the driver, and more

Efnisorð: , , , , , ,

Grep Windows

Fann tvö grep-forrit fyrir Windows. Annað heitir Windows Grep (frumlegt!) en hitt er BareGrep (sem er líka skipanalínutól (command line tool)). Check it out!


Fyrir nördana:
grep is a command line utility originally written for use with the Unix operating system.
The name comes from a command in the Unix text editor ed that takes the form:
g/re/p
This means "search globally for matches to the regular expression re, and print lines where they are found".

Efnisorð: , , , ,

föstudagur, júní 08, 2007

Command Line CDBURN & DVDBURN

If you use Windows XP, Windows Server 2003 or Windows Vista, you'll be able to burn an ISO image to a CD or DVD by using a pair of command-line tools. These utilities, called CDBURN and DVDBURN, are not third-party freeware—they're part of Microsoft's own Windows Server 2003 Resource Kit Tools.

This toolkit is itself available as a free download and doesn't require Windows Genuine Advantage validation. The tools it includes are designed to help administrators streamline management tasks such as troubleshooting operating system issues, managing Active Directory, configuring networking and security features, and automating application deployment.
Both CDBURN and DVDBURN use the built-in IMAPI CD Burning COM Service to burn images to CD and DVD. This is the same service used by Windows Media Player, so it needs to be enabled and working properly in order for these programs to function.

The syntax for CDBURN is simple enough:
cdburn : [options]
where : is the drive letter (with colon) you're burning to, is the full path to an .ISO image to burn, and [options] is one of the following command-line options available to the program:

-erase: Erases the disc before burning (valid on R/W media only).
-sao: Burns the disc in session-at-once mode (i.e., the whole disc is used and closed).
-speed: Followed by a whole number for the speed of the burning process; the default is the maximum speed available to burning services as reported by the drive.
-imagehaspostgap: Do not add a 150-sector lead-out on the burn; the image already has that built into it. If you're not sure about this option, my advice is to leave it alone.

The syntax for DVDBURN is even simpler:
dvdburn :
The only option that can be used with DVDBURN is /erase, to erase existing media if that's supported.

CDBURN and DVDBURN have the same limitation: They can only burn from an ISO image; they can't work from a collection of files. As an intermediate step, you can use Alex Feinman's tool ISO Recorder to build an ISO image from files in a directory.

Efnisorð: , , , , , , , ,

Security Command Line Tools

Security Command tools

ping
: ping –a and ping –t to determine hostnames and whether the host is alive
tracert : tracert –d for determining how your system is communicating with a remote host
find : dir c:\ /s /b find "SSN" to search your local hard drive for sensitive text such as "SSN"
findstr : findstr /s /i confidential *.* to search the current directory and all subdirectories for sensitive text such as "confidential"
nslookup :
nslookup –type=ANY domain_name to display all DNS records for a specific domain
nbtstat : nbtstat –A remote_host_IP_address to display a remote system's NetBIOS name table, computer name, domain name, MAC address and possibly the currently logged on user
net :
1. net view hostname to display shares on a remote system
2. net accounts to display local user account policies for passwords, etc.
3. net share to display local shares
4. net user to display local user names.
When used with the /add switch and a username and password, you can add users to the local system
netsh : netsh interface ip set address name="Local Area Connection" static ip_address network_mask default_gateway for quickly setting a static IP address on your default network interfacenetsh interface ip set address "Local Area Connection" dhcp for quickly obtaining IP configuration information via DHCP
netstat : netstat –a –o to determine TCP and UDP connections currently in use along with the process ID that owns each connection. Use to find out which application is talking to whom
sc : sc stop service_name to stop a Windows servicesc start service_name to start a Windows service
taskkill : taskkill /pid and taskkill /im for killing hung processes, such as a security scanner that you've maxed out or potential malware loaded in memory
tasklist : tasklist /svc shows services associated with each Windows processtasklist /n dll_name shows all processes using a specified DLLtasklist /fi /m "imagename eq process" shows the DLLs loaded into the specified Windows process
wmic : Windows Management Interface Command-line (WMIC), literally an entire control system in and of itself, allows you to control both local and remote systems. Commands of interest for security include:
1. wmic /output:c:\temp\stuff.html process list /format:htable for displaying all currently running processes in an HTML table
2. wmic /record:c:\temp\investigate.xml process list full for recording your commands. Write them to a file for an investigative trail that includes the date, time, user name, command entered and output of the command.
3. wmic useraccount list full for displaying a list of users on the local machine
4. wmic /user:userID /password:password /node:hostname share list full for displaying a list of shares on the remote machine (administrator access required)
5. wmic qfe list full for displaying a list of patches and service packs installed on the local machine

Efnisorð: , , , ,