Monthly Archives: October 2015
System Center 2012 – Data Protection Manager (DPM) is an enterprise backup system. Using DPM you can backup (copy) data from a source location to a target secondary location. If original data is unavailable because of planned or unexpected issues, you can restore data from the secondary location. Using DPM you can back up application data from Microsoft servers and workloads, and file data from servers and client computers. You can create full backups, incremental backups, differential backups, and bare-metal backups to completely restore a system.
•DPM deployment—DPM can be deployed as follows: For more information see System requirements for DPM(https://technet.microsoft.com/en-in/library/hh757829.aspx), Install DPM(https://technet.microsoft.com/en-in/library/hh758153.aspx), and Plan DPM server deployment(https://technet.microsoft.com/en-in/library/hh757988.aspx).
Physical standalone server—You can’t deploy physical DPM servers in a cluster, but you can manage multiple physical servers from a single console by installing Central Console(https://technet.microsoft.com/en-in/library/dn789204.aspx) on System Center Operations Manager.
Hyper-V virtual machine—You can run DPM as a virtual macine hosted on an on-premises Hyper-V host server. In this configuration you’ll need to make sure that DPM has access to all necessary resources and to the disks it needs for the storage pool. For details see Install DPM as a virtual machine on an on-premises Hyper-V server(https://technet.microsoft.com/en-in/library/dn440941.aspx).
Azure virtual machine—From DPM 2012 R2 Update 3 onwards you can run DPM as a virtual machine in Azure. Note that not all workloads can be backed up in this type of deployment.
•Data backup—Using DPM you can backup and recover data to and from Windows servers, Windows client computers, and Microsoft applications. For see the DPM protection support matrix(https://technet.microsoft.com/en-in/library/jj860400.aspx), and Plan for data backup and protection(https://technet.microsoft.com/en-in/library/hh758123.aspx).
•Data storage—You can backup data to a number of types of storage, including tape, disk, and the Azure cloud. For more information, see Plan DPM storage(https://technet.microsoft.com/en-in/library/hh757941.aspx).
•Data recovery—You can easily recover data from all backed up data sources from within the DPM console. For more information, see Plan for data recovery(https://technet.microsoft.com/en-in/library/hh757783.aspx).
If you cannot connect to the Internet, your Internet Protocol or TCP/IP may have been corrupted,You can try to reset TCP/IP . This article describes two ways to reset TCP/IP
For Windows 8 and Windows 8.1
1.On the Start screen, type CMD. In the search results, right-click Command Prompt, and then click Run as administrator.
2.At the command prompt, enter the following command, and then press Enter:
netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset
3.Restart the computer.
For Windows 7 and Windows Vista
1.To open a command prompt, click Start and then type cmd in the Search programs and files box.
2.Under Programs, right-click the CMD.exe icon, and then click Run as administrator.
3.When the User Account Control box appears, click Yes.
4.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:netsh int ip reset resetlog.txt
5.Restart the computer.
For Windows XP
1.To open a command prompt, click Start, and then click Run. In the Open box, enter the following command, and then press ENTER:
2.At the command prompt, enter the following command, and then press Enter:netsh int ip reset c:\resetlog.txt
Note If you don’t want to specify a directory path for the log file, run the following command instead:
netsh int ip reset resetlog.txt
3.Restart the computer.
When you run the reset command, it overwrites the following registry keys, both of which are used by TCP/IP:
why windows asking reboot often,Whether it’s for Windows updates or just when installing, uninstalling, or updating software.
“Error – Installation cannot proceed: Setup cannot continue because a pending restart is required.Restart the computer and then try running Setup again”
Because it can’t modify system files while they’re being used. Those files are locked, and can only be modified when they’re not being used.
So how we can update instead of rebooting.
from below registery ,remove contents of PendingFileRenameOperations.
Windows Update keeps asking for a reboot to apply nonexistent modifications
Many applications to send mails(send email through Office 365, there are some cases where the device or application can’t connect directly to Office 365).Here is a document how can setup SMTP on a windows 2012 servers.
WinAuth is a portable, open-source Authenticator for Windows that can
be used as a 2FA including Bitcoin / crypto-currency websites, any
service that requires the Google Authenticator, and games such as
World of Warcraft, Diablo III, Guild Wars 2, Rift, ArcheAge. WildStar,
Runescape and Steam.
WinAuth can use a YubiKey to encrypt its data, ensuring your
authenticators’ information cannot be read by anyone even when they
have physical access to your computer.
A YubiKey Standard or NEO 2.2.x or later is required.
HOTP / Counter-based Authenticator
A HOTP authenticator can be Adding a normal “Authenticator” and either
pasting in a counter-based KeyUri or choosing the counter option.
GraphsHTTPS clone URL
Copy to clipboard Subversion checkout URL Copy to clipboard
You can clone with HTTPSor Subversion. Get help on which URL is right
for you.Clone in Desktop Download ZIP Authenticator for Battle.net /
Steam / Guild Wars 2 / Glyph / WildStar / Runescape / SWTOR / Bitcoin
https://winauth.com 367 commits 5 branches 55 releases 2
contributors C# 97.3% C 2.5% Other 0.2% C# C Other
Quickly jump between filesCompare, review, create a pull
requestBranch: master Switch branches/tags Branches Tags 2.x MONO
master origin/master wiki Nothing to showWM6_0.5.1018 3.2.15
3.2.13 3.2.12 3.2.6 3.2.5 3.2.4 3.2.3 3.1.8 3.1.6 3.1.5
22.214.171.124 3.0.21 3.0.20 3.0.17 3.0.14 3.0.12 3.0.11 3.0.10
3.0.8 3.0.7 3.0.6 3.0.5 3.0.0 2.0.10 2.0.9 2.0.8 2.0.7 2.0.6
2.0.5 2.0.4 1.8.1323 1.7.1314 1.7.1311 1.5.1116 1.5.0 1.4.1170
1.4.1168 1.4.1166 1.4.1163 1.4.1161 1.4.1159 1.4.1156 1.3.1051
1.2.1045 1.2.1041 1.1.1035 1.0.1030 0.9.1025 0.8.1016 0.8.1010
0.7.107 0.5.103 0.4.1 0.4 Nothing to showwinauth / You must be
signed in to make or propose changesFix #226: upgrade to .Net 4.5 and
Copy SHA latest commit 618f11fbef
winauth authored Sep 23, 2015
Permalink Failed to load latest commit information.
Authenticator Fix #226: upgrade to .Net 4.5 and force TLS Sep 23,
Third Party Fix #226: upgrade to .Net 4.5 and force TLS Sep 23,
WinAuth.YubiKey Clear password field. Jul 1, 2015
WinAuth Fix #226: upgrade to .Net 4.5 and force TLS Sep 23, 2015
packages Add Steam authenticator May 28, 2015
LICENSE Initial upload of beta version. Jul 27, 2010
README.md Add 3.2.16 Sep 17, 2015
WinAuth.sln Issue#201: don’t decode URI on TextChanged but on
button Jun 18, 2015
winauth3-preview.png Update v3 preview Jul 18, 2013
WinAuth is a portable, open-source Authenticator for Windows that
provides a time-based RFC 6238 authenticator and common
implementations, such as the Google Authenticator. WinAuth can be used
with many Bitcoin trading websites as well as games, supporting
Battle.net (World of Warcraft, Hearthstone, Heroes of the Storm,
Diablo), Guild Wars 2, Glyph (Rift and ArcheAge), WildStar, RuneScape,
SWTOR and Steam.
Download Latest Version
The latest stable version is WinAuth 3.1.8, and is available to
download from this source repository to compile yourself, or as a
pre-compiled binary from WinAuth downloads.
WinAuth 3.2 (development)
The next version of WinAuth is in development. This release includes
both the new Steam Guard Mobile Authenticator, integration with
YubiKey to enhance your authenticator security and a HOTP
WinAuth can be registered as a new mobile device to create a Steam
authenticator and displays the appropriate 5 character codes.
Please read about the Steam Guard Mobile Authenticator for more
Anyone with a YubiKey can now use it with WinAuth to further protect
their data. This will help ensure the authenticators’ secret keys
cannot be read by anyone even when they have physical access to your
A YubiKey Standard / NEO 2.2.x or later is required.
WinAuth 3.2.16 is available to download.
This is a pre-release version and should not be used with live
accounts. The configuration file updated by 3.2 is not backward
compatible with 3.1. Please make a backup of your current
authenticator data first, which is store in c:\Users<username>
WinAuth 3.1 (stable)
WinAuth provides an alternative solution to combine various two-factor
authenticator services in one convenient place.
Download Latest Version (WinAuth-3.1.8)
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or (at
your option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see http://www.gnu.org/licenses/.
•Support for time-based RFC 6238 authenticators, and common
implementations such as Google Authenticator.
•Supports Battle.net (World of Warcraft, Hearthstone, Heroes of the
Storm, Diablo III), GuildWars 2, Trion / Glyph (Rift, ArcheAge),
RuneScape, WildStar, SWTOR and Steam
•Supports many Bitcoin trading websites such as Bitstamp, BTC-e,
•Displays multiple authenticators simultaneously
•Codes displayed and refreshed automatically or on demand
•Data is encrypted with your own personal password and can be locked
to Windows machine or account
•Additional password protection per authenticator
•Restore features for supported authenticators, e.g. Battle.net and
•Selection of standard or custom icons
•Hot-key binding with standard or custom actions, such as code
notification, keyboard input, and copy to clipboard
•Portable mode preventing changes to other files or registry settings
•Export in UriKeyFormat
•Importing authenticators in UriKeyFormat and from Authenticator Plus
Download software from
Mostly like the server is not updated a long before.
1.Open registry editor (Start menu –> Run –> regedit)
2.Find the following path HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
3.Chage the value of the UseWUServer from 1 to 0 (double click on it, change the value and click OK)
4.Restart Windows Update service (Start menu –> Run –> services.msc, find the Windows Update service and click on Restart)
Try this options below; it’s most likely some problems with windows integrity
run cmd as adminsitrator and > type; DISM.exe /Online /Cleanup-image /Restorehealth
Most antivirus programs identify win32.exe as malware—e.g. Symantec identifies it as Trojan.Adclicker or Downloader, and Microsoft identifies it as TrojanSpy:Win32/Malintent or TrojanClicker:Win32/Hatigh.C.
Description: Win32.exe is not essential for Windows and will often cause problems. Win32.exe is located in the C:\Windows\System32 folder. Known file sizes on Windows 8/7/XP are 15,360 bytes (29% of all occurrences), 1,389,047 bytes and 8 more variants.
There is no information about the author of the file. The file is not a Windows system file. The program starts upon Windows startup (see Registry key: MACHINE\Run, Run, MACHINE\RunServices, Winlogon\Shell, User Shell Folders, RunOnce, DEFAULT\Run, DEFAULT\Runonce). The program has no visible window. The file is an unknown file in the Windows folder. The software listens for or sends data on open ports to a LAN or the Internet. Win32.exe is able to monitor applications, hide itself, record keyboard and mouse inputs and manipulate other programs. Therefore the technical security rating is 77% dangerous, however you should also read the user reviews.
Read this blog
Microsoft has modified some of its processes for managing User Account Control (UAC) in Windows Server 2012. By default, UAC will now be enabled in Windows Server 2012.
Followed by National Institute of Standards and Technology (NIST) recommendations certificates encrypted with the Secure Hash Algorithm-1 (SHA-1) algorithm will stop supporting after 2017.Accourding to experts, using the SHA-1 hashing algorithm in digital certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks.SHA-1(more than 98%) is currently the most widely used digest algorithm.
Microsoft is announcing a policy change to the Microsoft Root Certificate Program and Windows will stop accepting SHA-1 end-entity certificates by January 1, 2017, and will stop accepting SHA-1 code signing certificates without timestamps after January 1, 2016.
Google Chrome has started warning end users when they connect to a secure website using SSL certificates encrypted with the SHA-1 algorithm (read google blog http://googleonlinesecurity.blogspot.in/2014/09/gradually-sunsetting-sha-1.html).
Read more how to do