Monthly Archives: October 2015

System Center 2012 – Data Protection Manager (DPM)

System Center 2012 – Data Protection Manager (DPM) is an enterprise backup system. Using DPM you can backup (copy) data from a source location to a target secondary location. If original data is unavailable because of planned or unexpected issues, you can restore data from the secondary location. Using DPM you can back up application data from Microsoft servers and workloads, and file data from servers and client computers. You can create full backups, incremental backups, differential backups, and bare-metal backups to completely restore a system.

•DPM deployment—DPM can be deployed as follows: For more information see System requirements for DPM(https://technet.microsoft.com/en-in/library/hh757829.aspx), Install DPM(https://technet.microsoft.com/en-in/library/hh758153.aspx), and Plan DPM server deployment(https://technet.microsoft.com/en-in/library/hh757988.aspx).

Physical standalone server—You can’t deploy physical DPM servers in a cluster, but you can manage multiple physical servers from a single console by installing Central Console(https://technet.microsoft.com/en-in/library/dn789204.aspx) on System Center Operations Manager.

Hyper-V virtual machine—You can run DPM as a virtual macine hosted on an on-premises Hyper-V host server. In this configuration you’ll need to make sure that DPM has access to all necessary resources and to the disks it needs for the storage pool. For details see Install DPM as a virtual machine on an on-premises Hyper-V server(https://technet.microsoft.com/en-in/library/dn440941.aspx).

Azure virtual machine—From DPM 2012 R2 Update 3 onwards you can run DPM as a virtual machine in Azure. Note that not all workloads can be backed up in this type of deployment.

•Data backup—Using DPM you can backup and recover data to and from Windows servers, Windows client computers, and Microsoft applications. For see the DPM protection support matrix(https://technet.microsoft.com/en-in/library/jj860400.aspx), and Plan for data backup and protection(https://technet.microsoft.com/en-in/library/hh758123.aspx).

•Data storage—You can backup data to a number of types of storage, including tape, disk, and the Azure cloud. For more information, see Plan DPM storage(https://technet.microsoft.com/en-in/library/hh757941.aspx).

•Data recovery—You can easily recover data from all backed up data sources from within the DPM console. For more information, see Plan for data recovery(https://technet.microsoft.com/en-in/library/hh757783.aspx).

https://technet.microsoft.com/en-in/library/hh758104.aspx
https://redmondmag.com/articles/2014/04/01/microsoft-dpm.aspx
http://www.tomsitpro.com/articles/microsoft-system-center-data-protection-backup-recovery,2-588.html
http://blogs.technet.com/b/dpm/
http://windowsitpro.com/data-protection-manager/retrospective-microsoft-vss-and-system-center-data-protection-manager

Advertisements

Reset TCP-IP with Netsh

If you cannot connect to the Internet, your Internet Protocol or TCP/IP may have been corrupted,You can try to reset TCP/IP . This article describes two ways to reset TCP/IP

For Windows 8 and Windows 8.1
1.On the Start screen, type CMD. In the search results, right-click Command Prompt, and then click Run as administrator.
2.At the command prompt, enter the following command, and then press Enter:

netsh int ip reset c:\resetlog.txt

Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset

3.Restart the computer.

For Windows 7 and Windows Vista
1.To open a command prompt, click Start and then type cmd in the Search programs and files box.
2.Under Programs, right-click the CMD.exe icon, and then click Run as administrator.
3.When the User Account Control box appears, click Yes.
4.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset resetlog.txt

5.Restart the computer.

For Windows XP
1.To open a command prompt, click Start, and then click Run. In the Open box, enter the following command, and then press ENTER:
cmd

2.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:

netsh int ip reset resetlog.txt

3.Restart the computer.

When you run the reset command, it overwrites the following registry keys, both of which are used by TCP/IP:

SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
SYSTEM\CurrentControlSet\Services\DHCP\Parameters

Why windows asking reboot often

why windows asking reboot often,Whether it’s for Windows updates or just when installing, uninstalling, or updating software.

“Error – Installation cannot proceed: Setup cannot continue because a pending restart is required.Restart the computer and then try running Setup again”

Because it can’t modify system files while they’re being used. Those files are locked, and can only be modified when they’re not being used.

So how we can update instead of rebooting.

from below registery ,remove contents of PendingFileRenameOperations.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager
\PendingFileRenameOperations

Windows Update keeps asking for a reboot to apply nonexistent modifications

https://social.technet.microsoft.com/Forums/en-US/46f25644-aa90-4c7a-a72d-531ad1b65835/windows-update-keeps-asking-for-a-reboot-to-apply-nonexistent-modifications

Refer
http://www.howtogeek.com/howto/31204/why-do-application-installs-make-you-reboot-and-close-other-apps/
http://answers.microsoft.com/en-us/office/forum/office_xp-outlook/error-installation-cannot-proceed-setup-cannot/217b743c-8a60-e011-8dfc-68b599b31bf5?auth=1

SMTP server installing and configuring on windows 2012 server

Many applications to send mails(send email through Office 365, there are some cases where the device or application can’t connect directly to Office 365).Here is a document how can setup SMTP on a windows 2012 servers.

smtp-2k12

Windows Authenticator(WinAuth)

WinAuth is a portable, open-source Authenticator for Windows that can

be used as a 2FA including Bitcoin / crypto-currency websites, any

service that requires the Google Authenticator, and games such as

World of Warcraft, Diablo III, Guild Wars 2, Rift, ArcheAge. WildStar,

Runescape and Steam.

YubiKey
WinAuth can use a YubiKey to encrypt its data, ensuring your

authenticators’ information cannot be read by anyone even when they

have physical access to your computer.

A YubiKey Standard or NEO 2.2.x or later is required.

HOTP / Counter-based Authenticator
A HOTP authenticator can be Adding a normal “Authenticator” and either

pasting in a counter-based KeyUri or choosing the counter option.

Code
CodeIssues
IssuesPull requests
Pull requestsPulse
PulseGraphs
GraphsHTTPS clone URL
Copy to clipboard Subversion checkout URL Copy to clipboard
You can clone with HTTPSor Subversion. Get help on which URL is right

for you.Clone in Desktop Download ZIP Authenticator for Battle.net /

Steam / Guild Wars 2 / Glyph / WildStar / Runescape / SWTOR / Bitcoin
https://winauth.com 367 commits 5 branches 55 releases 2

contributors C# 97.3% C 2.5% Other 0.2% C# C Other
Quickly jump between filesCompare, review, create a pull

requestBranch: master Switch branches/tags  Branches Tags 2.x MONO

master origin/master wiki Nothing to showWM6_0.5.1018 3.2.15

3.2.13 3.2.12 3.2.6 3.2.5 3.2.4 3.2.3 3.1.8 3.1.6 3.1.5

3.0.22.2 3.0.21 3.0.20 3.0.17 3.0.14 3.0.12 3.0.11 3.0.10

3.0.8 3.0.7 3.0.6 3.0.5 3.0.0 2.0.10 2.0.9 2.0.8 2.0.7 2.0.6

2.0.5 2.0.4 1.8.1323 1.7.1314 1.7.1311 1.5.1116 1.5.0 1.4.1170

1.4.1168 1.4.1166 1.4.1163 1.4.1161 1.4.1159 1.4.1156 1.3.1051

1.2.1045 1.2.1041 1.1.1035 1.0.1030 0.9.1025 0.8.1016 0.8.1010

0.7.107 0.5.103 0.4.1 0.4 Nothing to showwinauth /  You must be

signed in to make or propose changesFix #226: upgrade to .Net 4.5 and

force TLS

Copy SHA latest commit 618f11fbef
winauth authored Sep 23, 2015
Permalink  Failed to load latest commit information.
  Authenticator  Fix #226: upgrade to .Net 4.5 and force TLS  Sep 23,

2015
  Third Party  Fix #226: upgrade to .Net 4.5 and force TLS  Sep 23,

2015
  WinAuth.YubiKey  Clear password field.  Jul 1, 2015
  WinAuth  Fix #226: upgrade to .Net 4.5 and force TLS  Sep 23, 2015
  packages  Add Steam authenticator  May 28, 2015
  LICENSE  Initial upload of beta version.  Jul 27, 2010
  README.md  Add 3.2.16  Sep 17, 2015
  WinAuth.sln  Issue#201: don’t decode URI on TextChanged but on

button  Jun 18, 2015
  winauth3-preview.png  Update v3 preview  Jul 18, 2013

README.md
Windows Authenticator
WinAuth is a portable, open-source Authenticator for Windows that

provides a time-based RFC 6238 authenticator and common

implementations, such as the Google Authenticator. WinAuth can be used

with many Bitcoin trading websites as well as games, supporting

Battle.net (World of Warcraft, Hearthstone, Heroes of the Storm,

Diablo), Guild Wars 2, Glyph (Rift and ArcheAge), WildStar, RuneScape,

SWTOR and Steam.

———————————————————————-

———-

Download Latest Version
The latest stable version is WinAuth 3.1.8, and is available to

download from this source repository to compile yourself, or as a

pre-compiled binary from WinAuth downloads.

———————————————————————-

———-

WinAuth 3.2 (development)
The next version of WinAuth is in development. This release includes

both the new Steam Guard Mobile Authenticator, integration with

YubiKey to enhance your authenticator security and a HOTP

implementation.

Steam Guard
WinAuth can be registered as a new mobile device to create a Steam

authenticator and displays the appropriate 5 character codes.

Please read about the Steam Guard Mobile Authenticator for more

information.

YubiKey
Anyone with a YubiKey can now use it with WinAuth to further protect

their data. This will help ensure the authenticators’ secret keys

cannot be read by anyone even when they have physical access to your

computer.

A YubiKey Standard / NEO 2.2.x or later is required.

WinAuth 3.2.16 is available to download.

This is a pre-release version and should not be used with live

accounts. The configuration file updated by 3.2 is not backward

compatible with 3.1. Please make a backup of your current

authenticator data first, which is store in c:\Users<username>

\AppData\Roaming\WinAuth\winauth.xml.

WinAuth 3.1 (stable)
WinAuth provides an alternative solution to combine various two-factor

authenticator services in one convenient place.

Download Latest Version (WinAuth-3.1.8)

License
This program is free software: you can redistribute it and/or modify

it under the terms of the GNU General Public License as published by

the Free Software Foundation, either version 3 of the License, or (at

your option) any later version.

This program is distributed in the hope that it will be useful, but

WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU

General Public License for more details.

You should have received a copy of the GNU General Public License

along with this program. If not, see http://www.gnu.org/licenses/.

Features include:

•Support for time-based RFC 6238 authenticators, and common

implementations such as Google Authenticator.
•Supports Battle.net (World of Warcraft, Hearthstone, Heroes of the

Storm, Diablo III), GuildWars 2, Trion / Glyph (Rift, ArcheAge),

RuneScape, WildStar, SWTOR and Steam
•Supports many Bitcoin trading websites such as Bitstamp, BTC-e,

Coinbase, Cryptsy
•Displays multiple authenticators simultaneously
•Codes displayed and refreshed automatically or on demand
•Data is encrypted with your own personal password and can be locked

to Windows machine or account
•Additional password protection per authenticator
•Restore features for supported authenticators, e.g. Battle.net and

Rift
•Selection of standard or custom icons
•Hot-key binding with standard or custom actions, such as code

notification, keyboard input, and copy to clipboard
•Portable mode preventing changes to other files or registry settings
•Export in UriKeyFormat
•Importing authenticators in UriKeyFormat and from Authenticator Plus

for Android

Download software from
https://github.com/winauth/winauth

Step by step
https://www.maketecheasier.com/google-authenticator-windows/

Solving error 8024402c while Windows Update

Mostly like the server is not updated a long before.

1.Open registry editor (Start menu –> Run –> regedit)
2.Find the following path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
3.Chage the value of the UseWUServer from 1 to 0 (double click on it, change the value and click OK)
4.Restart Windows Update service (Start menu –> Run –> services.msc, find the Windows Update service and click on Restart)

Try this options below; it’s most likely some problems with windows integrity

sfc /scannow

run cmd as adminsitrator and > type; DISM.exe /Online /Cleanup-image /Restorehealth

http://windows.microsoft.com/en-in/windows/windows-update-error-8024402c#1TC=windows-7

Is win32.exe is a windows file?

Most antivirus programs identify win32.exe as malware—e.g. Symantec identifies it as Trojan.Adclicker or Downloader, and Microsoft identifies it as TrojanSpy:Win32/Malintent or TrojanClicker:Win32/Hatigh.C.

Description: Win32.exe is not essential for Windows and will often cause problems. Win32.exe is located in the C:\Windows\System32 folder. Known file sizes on Windows 8/7/XP are 15,360 bytes (29% of all occurrences), 1,389,047 bytes and 8 more variants.
There is no information about the author of the file. The file is not a Windows system file. The program starts upon Windows startup (see Registry key: MACHINE\Run, Run, MACHINE\RunServices, Winlogon\Shell, User Shell Folders, RunOnce, DEFAULT\Run, DEFAULT\Runonce). The program has no visible window. The file is an unknown file in the Windows folder. The software listens for or sends data on open ports to a LAN or the Internet. Win32.exe is able to monitor applications, hide itself, record keyboard and mouse inputs and manipulate other programs. Therefore the technical security rating is 77% dangerous, however you should also read the user reviews.

Read this blog

http://www.file.net/process/win32.exe.html
http://malwaretips.com/blogs/win32-mediaget-removal/

How to Manage User Account Control (UAC) in Wk12 servers

Microsoft has modified some of its processes for managing User Account Control (UAC) in Windows Server 2012. By default, UAC will now be enabled in Windows Server 2012.

Change UAC setting from control panel
Click Settings on the right of the desktop to open the Control Panel.
Click on User Accounts to change User Account Settings.
uac1

uac2
From policy
Go to Server Manager and select Local Security Policy in the Tools
right-click User Account Controls: Run all administrators in Admin Approve Mode

uac3

uac4

uac5

Reference

http://social.technet.microsoft.com/wiki/contents/articles/13953.windows-server-2012-deactivating-uac.aspx

How to update certificate to use the SHA-2 hashing algorithm

Followed by National Institute of Standards and Technology (NIST) recommendations certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm will stop supporting after 2017.Accourding to experts, using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.SHA-1(more than 98%) is currently the most widely used digest algorithm.
Microsoft is announcing a policy change to the Microsoft Root Certificate Program and Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016.

Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm (read google blog http://googleonlinesecurity.blogspot.in/2014/09/gradually-sunsetting-sha-1.html).

Read more how to do

How to update certificate to use the SHA

%d bloggers like this: