Monthly Archives: October 2013

Dropbox – a cloud storage

Dropbox is a file hosting service operated by Dropbox, Inc that offers cloud storage, file synchronization, and client software.Dropbox provides client software for Microsoft Windows, Mac OS X, Linux, Android, iOS, BlackBerry OS and web browsers, as well as unofficial ports to Symbian, Windows Phone, and MeeGo.Both the Dropbox server and desktop client software are primarily written in Python.he Dropbox client enables users to drop any file into a designated folder that is then synchronized with Dropbox’s Internet service and to any other of the user’s computers and devices with the Dropbox client. Users may also upload files manually through a web browser.Dropbox client supports synchronization and sharing along with personal storage. It supports revision history, so files deleted from the Dropbox folder may be recovered from any of the synced computers.Dropbox supports multi-user version control, enabling several users to edit and re-post files without overwriting versions.The version history is by default kept for 30 days, with an unlimited version called “Pack-Rat” available for purchase.Dropbox uses Amazon’s S3 storage system to store the files.It also uses SSL transfers for synchronization and stores the data via AES-256 encryption, though this is done with Dropbox’s own encryption keys, and not the users.

Free version
Starting at 2 GB
Up to 18 GB (500 MB per referral)

Plans at 100, 200, or 500 GB
Starting at $9.99/month

Plans start at 1 TB for 5 users
Centralized billing and admin tools

drop-boxGetting Started


CloudBerry Windows Azure Explorer Freeware

CloudBerry Windows Azure Explorer Freeware features
Data Storage & Management
Azure Blob Storage management
Create, browse, and delete containers and files in Windows Azure Blob Storage.
Synchronize content of Azure and local folders.
Favorite Folders
Select a container (with the path) and a folder to create a Favorites entry and then quickly navigate to it when needed.
Windows PowerShell Support
Automate common tasks with Windows PowerShell.
Data Access
ACL Editor
Manage access permission to any of your objects by setting up ‘Access Control List’. ACL will also apply to all ‘child objects’ inside containers.
Data Transfer
Resumable Upload Support
Upload large files.
Website Hosting and File Sharing
URL Generation
Generate time limited/signed, CNAME or default web URLs with Azure client by CloudBerry.
HTTP headers
Manage http headers across single or multiple files.
Azure Storage Analytics support
Track, analyze, and debug your usage of Azure storage.
Capacity Reports
Quickly see within Azure client which container consumes the most of the space and how it compares to others.

cloudberry backup

Zmanda cloud backup for Amazon S3

Zmanda Cloud Backup offers a convenient and secure way for you to back up your computers, external hard drives, NAS devices, Windows Servers, Databases and Live Applications.


Protects Windows 8, 7, Vista, XP,
Server 2003 / 2008 / 2012
Live backup of SQL Server, Exchange, Hyper- v,sharePoint, MySQL & Oracle
Backup open/locked files, e.g. Outlook PST files
Backup Windows System State (including Active Directory) – enables bare metal & disaster recovery
Backup internal, external or network-mapped drives

Fully customizable backup policies
User defined backup data retention. No 30-day limit
Leverage external or network drives for faster restores. Unlimited local backups
Fully customizable scheduling of backup and uploads
Pause and resume uploads to cloud when needed

No separate license fee for backing up applications such as SQL Server, Exchange, SharePoint, Hyper-V, MySQL, Oracle and System State
No “per system” pricing — a single ZCB license can be used to back up an unlimited number of systems!
Prices are inclusive of all costs of cloud storage. No double charging!
80GB Free Tier for Storage and Transfer to Cloud (10 GB per S3 region)

Pay for just what you use – perfect when your needs are unpredictable
Store your data on Amazon S3 cloud storage and pay using an account
$4.95 monthly fee + $0.15/GB for storage and upload ($0.12/GB above 1000 GB)

screenshots are here

Importing Cloud Certificate to setup ZCB with Amazon S3 storage

Check RD License information

To check license information please open RD Licensing Manager (licmgr.exe). If you do not have a RD Licensing server then you need to install the RD Licensing Role Service using Server Manager and then use RD Licensing Manager to Activate it and install your purchased RDS CALs.

For Per Device RDS CALs you can see which devices have been issued licenses, when they expire, installed licenses, etc. For Per User RDS CALs you must right-click on the server name and choose Create Report–Per User CAL Usage, create the report, in the left pane select the server name and then Reports, then finally right-click on the Report you just created in the right pane and choose Save As to save it as a .csv file. You can open the csv file in Notepad to view issued Per User CALs, total, expiration dates, etc.

Please verify that you have Specified your RD Licensing server in RD Session Host Configuration (tsconfig.msc) and that you have set your Licensing mode to match the type of purchased RDS CALs that you have.

wmic /namespace:\\root\CIMV2\TerminalServices PATH Win32_TerminalServiceSetting WHERE (__CLASS !=””) CALL GetGracePeriodDays

Chrome VS IE

Many of us have asked the question ,which is a good browser?
Answering to this questian is little confuse because it depend on its own OS (safari will good performance in apple system).Each browser has strengths and weaknesses.In 2008 google come with chrome. Now 75 crore users are using it.Chrome is the top browser and 36 percent of the global browser market share compairing 31 percent IE and firefox 21 Percent.

There are some blogs compairing difeerent browsers.,2817,2365692,00.asp,3534.html

What is SVCHOST?

You will notice that most ports are held by one of the many instances of svchost.exe. Most Windows services are not full executables, merely DLLs. These DLLs must be loaded by a host executable like SVCHOST. This saves system resources at the expense of security. To determine which services are running under a specific instance of SVCHOST, open a command prompt and enter:

tasklist /svc

Svchost usually runs as one of three special users: SYSTEM, LOCAL SERVICE, or NETWORK SERVICE. Unfortunately, even the system administrator does not have sufficient rights to kill SVCHOST when it runs as one of these three users.

Few basic unix command to remember

#command to find linux model and versios
uname -m = i686
uname -r = 2.6.9-42.0.3.ELsmp or2.6.18-8.el5(centos)or2.6.16-xenU(fc-xen)
uname -s = Linux
uname -v = #1 SMP Fri Oct 6 06:21:39 CDT 2006
uname -a =Linux 2.6.18-8.el5 #1 SMP Thu Mar 15 19:57:35 EDT 2007 i686 i686 i386 GNU/Linux

#cat /etc/distro for linux
#cat /etc/issue for ubuntu

#add a user to home directory
useradd -d /home user
#give permission to a file
chmod 755 filename(755-wrx rx rx)

#user with nologon permission
vi /etc/passwd
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin

#ownership to file
chown root:root file(user:group)

#delete a user
userdel user

#adding a user to group
usermod -g group user

#check user present in that group
groups user

#delete a user from group
usermod -a -G group user

#add a user to wheel group
vi /etc/group

#permission wheel user to system
## Allows people in group wheel to run all commands
%wheel ALL=(ALL) ALL

## Same thing without a password

##permission to user to few services

user ALL=/etc/init.d/httpd /sbin/httpd

#setuid user
chmod u+s file
it willbe like -rwsr-xr-x user group file

#setuid user
chmod g+s file

#command to check uid for user
uid=502(user) gid=10(wheel) groups=10(wheel)

id root
uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)

#process to background

#check with jobs -l

#put it front
fg %id

#command to run the process when shell is closed
nohup process

#command to check memery usage of procees
top or htop

#command to kill process
kill -9 pid or process

#part of the name
pkill -9 httpd

#kill all
killall -l httpd

# Kill TERM processes owned by www
pkill -TERM -u www
# Kill every process accessing /home (to umount)
fuser -k -TERM -m /home

#switch to other user
su -l user

#run a program using a sudo user(edit /etcsudoers and add user
user ALL=/etc/init.d/httpd or allow wheel and add user to wheel group)
sudo /etc/init.d/httpd start
sudo restart

#enable/disable firewall

#delete a oneday previous file in a dir

find /tmp -mtime +1 -type f -exec rm -f {} \;

# find all files last modififed yesterday
find . -mtime 1 -type f -print

#Delete log and use crontab
20 8 * * * echo “” > /usr/local/apache2/logs/access_log

# List the crontab
crontab -l crontab -e (edit)

#check if cron run
egrep -ir “access_log” /var/log/cron (check if run)

#check last accessed time from log
head -n10 /usr/local/apache2/logs/access_log

Symantec End Point Protection 11

This is brief document for installing and configuring Symantec EPP

Symantec End Point Protection 11

Active Directory Logical and Physical Components

Active directory introduced in windows 2000 operating system(little old stuff).
Active Directory can be considered to have both a logical and physical structure, and there is no correlation between the two. The logical parts of Active Directory include forests, trees, domains, OUs and global catalogs. Each element of the logical structure of Active Directory is defined below:

Domain – a domain in Windows 2000 is very similar to a domain is Windows NT. It is still a logical group of users and computers that share the characteristics of centralized security and administration. A domain is still a boundary for security – this means that an administrator of a domain is an administrator for only that domain, and no others, by default. A domain is also a boundary for replication – all domain controllers that are part of the same domain must replicate with one another. Domains in the same forest automatically have trust relationships configured.

Tree – a tree is a collection of Active Directory domains that share a contiguous namespace. In this configuration, domains fall into a parent-child relationship, which the child domain taking on the name of the parent.

Forest – a forest is the largest unit in Active Directory and is a collection of trees that share a common Schema, the definition of objects that can be created. In a forest all trees are connected by transitive two-way trust relationships, thus allowing users in any tree access to resources in another for which they have been given appropriate permissions and rights. By default the first domain created in a forest is referred to as the root domain. Amongst other things, this is where the Schema is stored by default.
There are two types of active directory forest :-
I) Single Forest
2) Multiple forest

Organizational Unit – An organizational unit (OU) is a container object that helps to organize objects for the purpose of administration or group policy application. An OU exists within a domain and can only contain objects from that domain. OU can be nested, which allows for more flexibility in terms of administration. Different methods for designing OU structures exist including according to administration (most common), geography, or organizational structure. One popular use of OUs is to delegate administrative authority – this allows you to give a user a degree of administrative control over just the OU, and not the entire domain.

Global Catalogs – Global Catalogs are listings of every object that exists within an Active Directory forest. By default, a domain controller only contains information about objects in that domain. A Global Catalog server is a domain controller that contains information about every object (though not every attribute for each) stored in the entire forest. This facilitates and speeds up the search for information in Active Directory. By default only the first domain controller created in a forest has a copy of the global catalog – others much be designated manually.

The physical structure of Active Directory helps to manage the communication between servers with respect to the directory. The two physical elements of Active Directory are domain controllers and sites. Each is described below.

Domain Controllers – domain controllers are Windows 2000 Server-based systems that store the Active Directory database. Every Windows 2000 domain controller has a writable copy of the directory. This is different that in NT 4, where only the PDC had this capability. Domain controllers in the same domain contain replicas of the directory that must be synchronized periodically.

Site – a site is a concept that did not exist in an NT directory service structure. In Active Directory, sites are groups of IP subnets that are connected at high speed. Although the definition of ‘high speed’ is open, it is generally considered to be subnets that are connected at LAN speeds (say 10 Mb) or higher. The purpose of defining sites in Active Directory is to control network traffic relating to directory synchronization, as well as to help ensure that users connect to local resources. For example, domain controllers located in the same site replicate with one another on a 5-minute change notification interval similar to in NT 4. However, replication between domain controllers in different sites can be scheduled according to your needs. This allows a much greater degree of flexibility that in NT 4. For example, you could set things up such that replication between sites could only happen between midnight and 6am – thus ensuring that replication traffic would not interfere with normal data transfer during business hours. Sites also help ensure that users avoid accessing resources over the WAN by having client systems access servers (such as domain controllers) that are in the same physical site first.

what is wrong with the installation of Windows patches MSRT taking time

The Microsoft Malicious Software Removal Tool is an anti-malware utility

that checks computers running Windows 8, Windows 7, Windows Vista, Windows

XP, Windows 2000, Windows Server 2012, Windows Server 2008, and Windows

Server 2003 for infections by specific, prevalent malicious software—

including Blaster, Sasser, and Mydoom—and helps remove malware and any

other infections found.

When the detection and malware removal process is complete, the tool

displays a report describing the outcome, including which, if any, malware

was detected and removed

New anti-malware additions

how to run manuaaly
You can run MSRT manually at any time. In Windows XP, use Start -> Run ->

mrt.exe. You can even get away with just “mrt” in the Run box. In Vista,

type “mrt” into the search box (yes, it’s “mrt” not “msrt”). It seems to

do a lot of processing before displaying the initial window, expect a

delay of 5 to 10 seconds.

full scan :can take a few hours and may keep the processor busy.It scan

fixed and removable drives except mapped network drives.

log creating C:\Windows\debug\mrt
Microsoft Windows Malicious Software Removal Tool v4.19, April 2013
Started On Fri Apr 12 16:57:36 2013
->Scan ERROR: resource process://pid:2308 (code 0x00000490 (1168))

Results Summary:
No infection found.
Microsoft Windows Malicious Software Removal Tool Finished On Fri Apr 12

17:00:35 2013

Return code: 0 (0x0)

Download the 32 bit version of MSRT

4F54-9AB3-75B8EB148356 and the 64 bit version




%d bloggers like this: