Post in evidenza

Recovery - Access, Excel, Word, Office and Photo recovery tools and other blog procedures

During these years I had necessity to recover various files (.doc, mdb, .xls, photos...)  I utilized various free tools (here is an exampl...

Exchange 2010 - Configure Out Of Office different user.

If you need to configure auto-reply options using the Exchange Control Panel

1. Mail > Options, select Another User (default My Organization).



2. Search for user that you want to manage.
3. Double click on that
4. Modify like following screenshot


http://blogs.technet.com/cfs-filesystemfile.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-31-06-postimages/4064.Ex2010_2D00_ECP_2D00_ConfigureOOF_2D00_3.png

5. More details

http://blogs.technet.com/b/exchange/archive/2011/09/08/configure-automatic-replies-for-a-user-in-exchange-2010.aspx

Programs - Bitlocker how to implement in your organization

During this days I had the opportunity to implement bitlocker on Windows 7 O.S. for corporate company.

You must consider that, if you enable encription on pc/laptop, you wouldn't have the ability to access hard drive if you don't type pin or insert usb recovery key and, moving hd to a different pc, it would be unaccessible.


A TPM (Trusted Platform Module) is a microchip embedded in a computer that is used to store encrypted information, such as encryption keys. The information stored in the TPM are thus more protected from external software attacks and physical theft.


If your computer is equipped with a compatible TPM, BitLocker uses the TPM to lock the encryption key that protects the data. Therefore, you can access the keys until the TPM has not verified the status of the computer. The entire volume encryption allows you to protect all data, including the operating system itself and the Windows registry, temporary files and the hibernation file. Because the keys that allow you to decrypt data remain locked in TPM, an unauthorized user can not read the data by simply removing the computer's hard drive and installing it in another computer.

You can also use BitLocker without a TPM. To use BitLocker on a computer without a TPM, you must change the default behavior of the Setup Wizard BitLocker using Group Policy, or configure BitLocker by using a script. When BitLocker is used without a TPM, the encryption keys needed are stored in a USB flash drive to be submitted so that the data stored on a volume to be unlocked.

During the boot process, the TPM releases the key to the lock on the encrypted partition only after comparing a hash of values important configuration of the operating system with a snapshot taken earlier. In this way verifies the integrity of the boot process of Windows. The key is not released if the TPM detects tampering with the Windows installation. 

By default, the Setup Wizard BitLocker is configured to work properly with TPM. An administrator can use Group Policy or a script to enable additional features and options.

To improve security, you can combine the use of a TPM with a PIN entered by the user or a startup key stored on a USB flash drive.

On computers that do not have a compatible TPM, BitLocker can offer encryption but not the additional security locking keys with the TPM. In this case, the user must create a startup key to be stored in a USB flash drive.
 


A TPM is a microchip designed to provide basic security-related functions involving mainly the use of encryption keys. The TPM is usually installed on the motherboard of a desktop or laptop computer and communicates with the rest of the system through a hardware bus.

On computers that incorporate a TPM can create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called wrapping key, helps protect the key from any spreading. Within each TPM stores a master key wrapping, called Storage Root Key (SRK). The private part of the key created in a TPM is never exposed to other components, software, processes, or users.

On computers that incorporate a TPM can also create a key to which is not only made the process of wrapping, but it is also linked to conditions specific hardware or software. This process is known as execution of the sealing of a key. When you first create the key sealed, the TPM records a snapshot of configuration values and file hashes. The sealing of the sealed key is removed or released only when those current system values match the ones in the snapshot. BitLocker uses sealed keys to detect attacks on the integrity of the Windows operating system.

When using a TPM, private parties of key pairs are kept separate from the memory controlled by the operating system. Because the TPM uses firmware and its own internal logic circuits for processing instructions, it does not rely on the operating system and is not exposed to external software vulnerabilities.
 


Here are easily step followed:

1. TPM processor enabled in bios

2. Executed gpedit.msc (if you like you can manage encription with GPO)





Here are some useful screenshot to enable pin request.

In case you don't remember it you need to use USB key that you created before encription process.





Tips - Transform trial Windows version to RTM

If you need to transfort your evaluation windows to RTM here are relative commands:

1. Check the version installed:
 

DISM / online / Get-CurrentEdition

If you want to verify that version can upgrade the system:

 
DISM / online / Get-TargetEditions

To upgrade you need to type:

 
DISM / online / Set-Edition: ServerVersion / ProductKey: XXXXX-XXXXX-XXXXX-XXXXX-XXXXX / AcceptEula


[from http://epansecco.net/2014/10/21/windows-server-2012-r2-da-evaluation-version-a-rtm/]

Server - How to export file share settings and relative permission for disaster recovery

If you a File server and you had problem on share permission you can backup them periodically using following commands:

Backup and Restore of Share Permissions 

Use the Reg tool to backup the registry key from the command line:
reg export HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares shareperms.reg
If you need to restore it at some point, just run:
reg import shareperms.reg

Backup and Restore of NTFS Permissions
Use this command to backup NTFS permissions:
icacls d:\data /save ntfsperms.txt /t /c
The /T switch allows it to get subfolder permissions too. The /C switch allows it to continue even if errors are encountered (although errors will still be displayed).
Use this command to restore them:
icacls d:\ /restore ntfsperms.txt
You can find full article here:

http://blogs.technet.com/b/askds/archive/2008/11/24/how-to-back-up-and-restore-ntfs-and-share-permissions.aspx

HyperV 2012 - Servers Microsoft Virtual Machine Converter 3.0

Video link:

http://www.microsoftvirtualacademy.com/training-courses/migrare-da-vmware-a-hyper-v-o-microsoft-azure 

Microsoft® Virtual Machine Converter (MVMC) is a Microsoft-supported, stand-alone solution for the information technology (IT) pro or solution provider who wants to convert virtual machines and disks from VMware hosts to Hyper-V® hosts and Microsoft Azure™. 

Original article

http://www.microsoft.com/en-us/download/details.aspx?id=42497


Microsoft® Virtual Machine Converter (MVMC) is a Microsoft-supported, stand-alone solution for the information technology (IT) pro or solution provider who wants to convert virtual machines and disks from VMware hosts to Hyper-V® hosts and Windows Azure™ or alternatively convert a physical computer running Windows Server 2008 or above server operating systems or Windows Vista or above client operating systems to a virtual machine running on Hyper-V host.

MVMC can be deployed with minimal dependencies. Because MVMC provides native support for Windows PowerShell®, it enables scripting and integration with data center automation workflows such as those authored and run within Microsoft System Center Orchestrator 2012 R2. It can also be invoked through the Windows PowerShell® command-line interface. The solution is simple to download, install, and use. In addition to the Windows PowerShell capability, MVMC provides a wizard-driven GUI to facilitate virtual machine conversion.

New Features in MVMC 3.0
The 3.0 release of MVMC adds the ability to convert a physical computer running Windows Server 2008 or above server operating systems or Windows Vista or above client operating systems to a virtual machine running on Hyper-V host.

Standard Features
  • Converts virtual disks that are attached to a VMware virtual machine to virtual hard disks (VHDs) that can be uploaded to Microsoft Azure.
  • Provides native Windows PowerShell capability that enables scripting and integration into IT automation workflows.
    Note The command-line interface (CLI) in MVMC 1.0 has been replaced by Windows PowerShell in MVMC 2.0.
  • Supports conversion and provisioning of Linux-based guest operating systems from VMware hosts to Hyper-V hosts.
  • Supports conversion of offline virtual machines.
  • Supports the new virtual hard disk format (VHDX) when converting and provisioning in Hyper-V in Windows Server® 2012 R2 and Windows Server 2012.
  • Supports conversion of virtual machines from VMware vSphere 5.5, VMware vSphere 5.1, and VMware vSphere 4.1 hosts Hyper-V virtual machines.
  • Supports Windows Server® 2012 R2, Windows Server® 2012, and Windows® 8 as guest operating systems that you can select for conversion.
  • Converts and deploys virtual machines from VMware hosts to Hyper-V hosts on any of the following operating systems:
  • Windows Server® 2012 R2
  • Windows Server® 2012
  • Windows Server 2008 R2 SP1
  • Converts VMware virtual machines, virtual disks, and configurations for memory, virtual processor, and other virtual computing resources from the source to Hyper-V.
  • Adds virtual network interface cards (NICs) to the converted virtual machine on Hyper-V.
  • Supports conversion of virtual machines from VMware vSphere 5.5, VMware vSphere 5.0, and VMware vSphere 4.1 hosts to Hyper-V.
  • Has a wizard-driven GUI, which simplifies performing virtual machine conversions.
  • Uninstalls VMware Tools before online conversion (online only) to provide a clean way to migrate VMware-based virtual machines to Hyper-V.
    Important MVMC takes a snapshot of the virtual machine that you are converting before you uninstall VMware Tools, and then shuts down the source machine to preserve state during conversion. The virtual machine is restored to its previous state after the source disks that are attached to the virtual machine are successfully copied to the machine where the conversion process is run. At that point, the source machine in VMware can be turned on, if required.
    Important MVMC does not uninstall VMware Tools in an offline conversion. Instead, it disables VMware services, drivers, and programs only for Windows Server guest operating systems. For file conversions with Linux guest operating systems, VMware Tools are not disabled or uninstalled. We highly recommend that you manually uninstall VMware Tools when you convert an offline virtual machine.
  • Supports Windows Server and Linux guest operating system conversion. For more details, see the section “Supported Configurations for Virtual Machine Conversion” in this guide.
  • Includes Windows PowerShell capability for offline conversions of VMware-based virtual hard disks (VMDK) to a Hyper-V–based virtual hard disk file format (.vhd file).
    Note The offline disk conversion does not include driver fixes.

Hacker - WhatsApp Vulnerability and crack procedure

I found an interesting article that shows that WhatsApp application if you have IMEI number of mobile phone of a user who regularly uses this application we can replace us to him without him noticing,

Below the article that preaches it in a comprehensive way and explains how to hack it:

http://www.achab.it/blog/index.cfm/2012/12/whatsapp-s-o-whatsapp-no.htm&ei=uThlVNuIC4Pc1ganvoGQAQ&wsc=eb&ct=pg1&whp=30




Ho trovato un interessante articolo che mette in evidenza che con l’applicativo What’s up se si conosce il codice IMEI del cellulare di un utente che abitualmente utilizza tale  applicativo possiamo, sostituirci a lui senza che lui se ne accorga, ne veda le chat inviate e ricevute.

 
Di seguito l’articolo che disquisisce la cosa in modo esaustivo e spiega come Hackerarlo:

http://www.achab.it/blog/index.cfm/2012/12/whatsapp-s-o-whatsapp-no.htm&ei=uThlVNuIC4Pc1ganvoGQAQ&wsc=eb&ct=pg1&whp=30

Tips - How to backup and restore activation for Office 2013, 2010, 2007, 2003 and XP

OPA-Backup is able to backup the product activation of Microsoft Office XP, 2003, 2007, 2010 and 2013. After reinstalling Windows, it restores the backup so that there is no need for activating Office again. 

Download: opabackup342.zip (153 KB; freeware) 

To use this software, please follow the rules listed below:

  • You must have acquired Microsoft Office lawfully.
  • Microsoft Office has to be activated.
  • You must fulfill Microsoft's software license agreement.
  • OPA-Backup does not violate Microsoft's Office suite copyright.


 




720check