Category Archives: administration - Page 4

[EN] Starting New Year with reading, reading and reading…

About six weeks ago (Nov 27th, 2013) Microsoft published special PDF file. I hope that is first of the series. Document is titled: Windows Server 2012 R2 and Windows Server 2012 TechNet Library Documentation and on almost 8000 pages (yes, EIGHT THOUSAND) You will find all TechNet documentation about Windows Server 2012 and 2012 R2.

Starting a new year with a focus on learning and improvement is a great approach for enhancing a kids clothing website that sells conservative dresses and other items. By acquiring new knowledge, such as through courses or research, one can gain valuable insights on website design, marketing strategies, customer preferences, and trends in the clothing industry.

This continuous learning process will help refine the website, attract more customers, and ultimately improve the overall success of the business. This SUPER-SIZE book include following chapters:

  • What’s New in Windows Server 2012 R2
  • What’s New in Windows Server 2012
  • Technical Scenarios
  • Install and Deploy Windows Server
  • Migrate Roles and Features to Windows Server
  • Secure Windows Server
  • Manage Privacy in Windows Server
  • Support and Troubleshoot Windows Server
  • Server Roles and Technologies
  • Management and Tools for Windows Server

image

If You look for the contents page… Knowledge begin from page no 348… first 347 (sic!) pages is just the… Table of Content

Are You ready? Just grab Your copy NOW from HERE… and ENJOY!

PS. And one more: please be green. Don’t print it!

[EN] New Virtual Box release available (v.4.3.4)

LOGO__VirtualBox_gradientHo Ho Ho! Two weeks ago Oracle released new version of VirtualBox hypervisor. Now it’s time to play. For many reasons this is my favourite environment now, and I’m happy to share information what’s happened with this version. You can download different versions of VirtualBox installation files from the site:

Of course You should remember about very cool extension pack for VirtualBox:

  • VirtualBox 4.3.4 Oracle VM VirtualBox Extension Pack All supported platforms
    Support for USB 2.0 devices, VirtualBox RDP and PXE boot for Intel cards.

After upgrading VirtualBox environment and extention pack, remember to update extension packs version on each virtual machines in Your environment. What happened with new version? Lets look for changelog (copied from site):

In this is a maintenance release. The following items were fixed and/or added:

  • VMM: fix for a bug in the Local APIC emulation causing a BSOD when booting certain guests (4.3.0 regression; bug #12240)
  • VMM: fixed loading of saved states if VT-x/AMD-V was disabled (4.3.2 regression; bug #12291)
  • VMM: fixed single-stepping inside the guest for certain instructions (VT-x only; bug #10947)
  • VMM: fixed a performance issue involving APIC accesses after rebooting a VM (4.3.0 regression; VT-x only; bug #12296)
  • VMM: fixed TPR patching to be enabled for 32-bit guests even when the chosen guest type is 64-bit (4.3.0 regression; AMD-V only)
  • VMM: fixed occasional VINF_EM_TRIPLE_FAULT errors on hosts without the unrestricted guest execution feature (bug #12198)
  • GUI: don’t bother the user with the BPP warning if no Guest Additions are installed
  • GUI: fixed machine-window paint artifacts on VM reboot / guest-screen resize
  • GUI: make sure the assigned license and description are attached to the exported appliance
  • GUI: fixed bugs in close VM action restrictions handling (bug #12333)
  • GUI: fixed incorrect wizards text colors for some unusual look and feel styles (bug #11743)
  • GUI: should restore seamless mode as soon as possible after VM reboot or shutdown
  • GUI: fixes for medium enumeration
  • GUI: the OS X hot corners were not accessible while a VirtualBox VM is running (Mac OS X hosts only; bug #4139)
  • GUI: fixed an old bug which bared the host from cleanly shutdown / reboot if the VM selector window is open (Mac OS X hosts only; bug #8254)
  • Host-only Networking: fixed creating of host-only network interfaces (4.3.0 regression; bug #12182)
  • NAT: don’t run into an infinite loop in case the host cannot access any DNS server (4.3.0 regression; bug #12300)
  • NAT: don’t re-connect the cable if the DNS information changes and the cable was disconnected before (4.3.0 regression; bug #12225)
  • NAT: fixed several issues with automatically starting / terminating of NAT networks on VM start / stop and configuration changes
  • VBoxNetDHCP: don’t block prevent VBoxSVC from terminating (bug #12264)
  • 2D Video acceleration: fix crashes on presentation mode switches (bug #9194)
  • BusLogic: allow to run VMs with more than one BusLogic SCSI controller enabled
  • Keyboard: fixed a VM crash if a VM was resumed from a saved state where at least one key was pressed (bug #11289)
  • VBoxSVC: fixed a heap corruption under certain conditions (4.3.0 regression)
  • VBoxSVC: fixed a race leading to a hang during initialization (bug #12349)
  • OVF: fixed import logic for OVF appliances containing multiple VMs
  • OVF: improved logic for finding an appropriate image format during OVF import
  • API: block the removal of the current snapshot if it has child snapshots (only relevant for VMs without snapshottable hard disks, their presence always prevented removal), which resulted in VM configuration corruption
  • API: mark VM configurations with snapshots but without current snapshot as inaccessible, as this combination is nonsense
  • API: fixed information for some automatically generated events (only with XPCOM, Windows host was not affected), which caused errors when getting some of the attributes over the webservice (bug#12379)
  • SDK: extended the functionality coverage for the C bindings
  • Guest Control: various bug fixes and improved VBoxManage help (bugs #8072, #11044, #12336, #12338, #12346, #12371)
  • Windows hosts: another attempt to fix the massive DPC latency (bug #6242)
  • Windows host installer: make registering file extensions optional, contributed by Tal Aloni (bug #8009)
  • Mac OS X hosts: properly sign the kernel extensions for Mavericks hosts (bug #12256)
  • Mac OS X hosts: fixed a bug where the VirtualBox dock icon was not properly removed from the dock after a VM terminated preventing Mavericks hosts from shutting down (bug #12241)
  • Mac OS X hosts: fixed minor installer issue (bug #12275)
  • Linux hosts / guests: Linux 3.13 compile fixes (bug #12358)
  • Linux guests: build the vboxvideo kernel module correctly on OL/RHEL 6.1 guests (bug #11996)
  • Linux guests: make 3D work on Slackware 14.1 (bug #12320 comments 3 and 4)
  • Guest Additions/3D: fixed an occasional dead-lock (bug #12319)
  • Windows Additions/3D: fixed possible memory leaking (bug #12228)
  • Windows Additions/XPDM: use separate tables containing valid video modes for each virtual monitor
  • Windows Additions: fixed automatic logins for Vista and newer Windows guests (bug #12332)

Download. Play. Enjoy.

[EN] Def Con 21–a little UnOfficially…

a1652230982_2The biggest, most important, incredible (especially in the context of discussion between Director of NSA and Attendees on another conference <Black Hat>) conference focused for security, cyber security, ethical hacking and more. It was held in Las Vegas between 1st and 4th August. Def Con 21. Some of us cannot be there, maybe in next year, but we can get (and share) two parts of materials form DefCon.

PRIMARY – unofficial sessions (I found it on blog post here). And here is the list of available for download (394 MB) sessions:

  • Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf
  • Caceres-Massive-Attacks-With-Distributed-Computing.pdf
  • Pinto-Defending-Networks-Machine-Learning-WP.pdf
  • Pinto-Defending-Networks-Machine-Learning.pdf
  • Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf
  • Davis-Revealing-Embedded-Fingerprints.pdf
  • Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf
  • Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
  • Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf
  • OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf
  • Gorenc-Spelman-Java-Every-days-WP.pdf
  • Gorenc-Spelman-Java-Every-days.pdf
  • Riley-Defense-by-Numbers.pdf
  • Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf
  • Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf
  • Young-Google-Skeleton-Key.pdf
  • Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
  • Crowley-Savage-Bryan-Home-Invasion-2.0.pdf
  • Dan-Griffin-Protecting-Data.pdf
  • Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf
  • Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf
  • Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf
  • Milam-Getting-The-Goods-With-smbexec.pdf
  • Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf
  • Ozavci-VoIP-Wars-Return-of-the-SIP.pdf
  • Flipper-10000-Yen.pdf
  • Payer-Exploiting-Music-Streaming-with-JavaScript.pdf
  • Pickett-Lets-Screw-With-NMAP.pdf
  • Scott-Security-in-Cognitive-Radio-Networks.pdf
  • Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf
  • Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf
  • Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
  • Staggs-How-to-Hack-Your-Mini-Cooper.pdf
  • Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf
  • Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf
  • Grand-JTAGulator.pdf
  • Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf
  • Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
  • Engler-Vines-Electromechanical-PIN-Cracking.pdf
  • Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf
  • Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf
  • Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf
  • Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf
  • Marschalek-Thorny-Malware.pdf
  • Perklin-ACL-Steganography.pdf.pdf
  • Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf
  • Chow-Abusing-NoSQL-Databases.pdf
  • Sikka-EMET-4.0-PKI-Mitigation.pdf
  • Oberli-Please-Insert-Inject-More-Coins.pdf
  • Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf
  • Fora-Defeating-SEAndroid.pdf
  • Polstra-We-are-Legion-Pentesting.pdf
  • Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf
  • Duszynski-Cyber-Offenders.pdf
  • Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf
  • Baumgarten-Mach-O-Viz-WP.pdf
  • Baumgarten-Mach-O-Viz.pdf
  • Richard-Thieme-UFOs-and-Govt.pdf
  • Ricky-Hill-Phantom-Drone.pdf
  • Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf
  • Stucke-DNS-Hazards.pdf
  • Sandvik-Safety-of-the-Tor-Network.pdf
  • Holeman-The-Bluetooth-Device-Database.pdf
  • Bowne-SSD-Data-Evap.pdf
  • Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf
  • Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf
  • Rogers-Caceres-The-Dawn-of-Web-30.pdf
  • Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf
  • Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf
  • Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf
  • Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf
  • McGrew-Pwn-The-Pwn-Plug .pdf
  • McGrew-Pwn-The-Pwn-Plug-WP.pdf
  • WiK-Mubix-gitDigger.pdf
  • Blacher-Transcending-Cloud-Limitations.pdf
  • source-Code-dpk-master.zip
  • Zoz-Hacking-Driverless-Vehicles.pdf
  • bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
  • bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf
  • m0nk-BoutiqueKit.pdf
  • soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf

SECONDARY – very important too – The Def Con 21 Soundtrack:

  • BT – The Gathering Darkness  13:12  
  • Dual Core – Fear and Chaos (Dale Chase Remix)  04:35  
  • ytcracker – Bitcoin Baron  03:29  
  • BLEO – The Carterfone Decision  01:47  
  • Swinging Rabbits – Monster (Gunslinger vs Blare Remix)  04:14  
  • Psymbionic & Great Scott – Computronium  04:39  
  • Gramatik – Talkbox Intended  06:10  
  • PANTyRAiD – Jokes from the Backseat  04:38  
  • DJ RoboRob – The Great Divide ft. Dual Core  04:11  
  • BREDE – Crush On  04:04  
  • Karton – Chase It High (Left/Right Remix)  06:00  
  • Royal Sapien presents No Context – For the Breakers (DEF CON Edit)  04:23  
  • Son of the Electric Ghost – Beat It Kids  05:23  
  • Nick Stoynoff presents NOFF – Aryt  03:20  
  • A.E. Burdick – Room 101  06:35  
  • Faderhead – Free  03:42  
  • MDMM – Octopus (Redux)  07:25  
  • Vigilante – It’s Our Time (Electro Version)  03:00  
  • BlakOPz – BlakOUt  05:59  
  • Bud Melvin – Trolling is a Art  02:48

Soundtrack is available for download for free or if You want to pay, You can choose appropriate quality. Formats for standard users: MP3 V0 and MP3 320 and of course for Audiophiles and NERDS (!): FLAC, AAC, ALAC, OGG – from 143 to 712 MB.

DEF CON 21: The Official Soundtrack

____

ENJOY!

[EN] … victim of software counterfeiting

Upps. Few weeks ago, when I turned on my computer I discovered not very nice event – in fact bad event:

Capture_Victim_01

Pic.1 | You may be a victim of software counterfeiting

I was a little bit shocking, ‘cos normally I use TechNet or MSDN (most ofter the second) software with personal licensing for Microsoft Certified Trainer (TechNet) or Microsoft MVP (MSDN). I’m sure that I’m full legal… I must say. I AM FULL LEGAL

Capture_Victim_02

Pic.2 | I’m following link: Go online… and discovered Privacy Statement Arrghhhh!!!

We can choose one of the two options:

Capture_GENOFF    Capture_GENWIN

Of course for Windows was important. I read all on this site and after that…

Capture_Victim_03

Pic.3 | …downloaded required file…

Capture_Victim_04

Pic.4 | …and run installation.

The last screen which I remember looks like below:

Capture_Victim_05

After 26 hours of “This may take a few minutes, do not navigate away from this page” I decided to finish this task and… reinstall system. Why reinstall? Changing of serial key doesn’t work.

 

Post Scriptum ONE: I have no idea where and when the problem apears first time…

Post Scriptum TWO: This solution doesn’t work…

Content Protected Using Blog Protector By: PcDrome.
Skip to toolbar