Why windows takes so long to start up.

September 09, 2006

0 comments  

Most of us have had a brand new computer at one time. It's a great feeling. You boot up windows and within 30 seconds you are surfing the net, checking your email, or playing your favorite game. 10 months down the road things aren't so nice anymore. You power up your computer and it seems to take forever to load.

read more | digg story

Do Everything Right From the Command Line: the Internet

September 07, 2006

0 comments  

UNIX provides hundreds, if not thousands, of commands with which you can manipulate a large variety of resources available in the kernel and user space. Martin Streicher, Editor-in-Chief, Linux Magazine, looks at three essential UNIX utilities that deliver the entire Internet to your command line.

read more | digg story

Have a spare working PC around? FREEnas it.

0 comments  

What is FreeNAS ?

FreeNAS is a small (less than 32Mo) Operating System based on FreeBSD 6 that provide Free Network-Attached Storage services (CIFS, FTP and NFS).

read more | digg story

Wormy bots exploiting Windows Server flaw

September 01, 2006

0 comments  

Wormy bots exploiting Windows Server flaw: "It took less than a week for underground programmers to modify their bot software to take advantage of the latest Windows flaw, described in security bulletin MS06-040."

IP, TCP, UDP, and ICMP Header Drawings

August 23, 2006

0 comments  

"Here are some drawings I did to better understand the structure of the headers for IP, TCP, UDP and ICMP. Please feel free to used them for personal uses. If you would like to include them in a publication, please contact me at the address in the drawings. I created the drawings in OmniGraffle on a Mac."

read more | digg story

Imminent Worm Attack: Experts Warn Of 'The Big One'

August 11, 2006

0 comments  

As the spotlight on a dangerous Windows vulnerability grows brighter by the hour, security analysts Thursday said that it's not hype driving the alarms, but genuine fear that a major worm attack is just days away. This is no drill. Thursday's deepening concern was fueled by several releases of new exploit code.

A lot of exploit code activity over this one. See yesterday's post about eEye's scanner for help identifying systems that haven't been patched.

read more | digg story

Retina MS06-040 NetApi32 Scanner

August 10, 2006

0 comments  

eEye Digital Security Retina MS06-040 NetApi32 Scanner: "The Retina MS06-040 NetApi32 Scanner is being made available free of charge by eEye. The tool will scan multiple addresses at once to determine if any are vulnerable to the Server Service flaw reported in the Microsoft Bulletin MS06-040. If an IP address is found to be vulnerable, the Retina MS06-040 NetApi32 Scanner will flag that IP address.

This tool does not require administrative privileges on the scanned machines in order to determine if the systems are vulnerable."

Much props to Marc Maiffret, the Chief Hacking Officer at eEye Digital Security. I applaud his company's community involvement.. It's nice to see a company ask the community if they have a need for a product and then go out of their way to deliver, free of charge.

Ultimate boot CD

August 06, 2006

0 comments  

A Linux boot diagnostic CD that has many different anti virus,hard disk,networking,bios,system info, and benchmarking apps

read more | digg story

Excel tutorial for beginners

July 22, 2006

0 comments  

This is a basic, useful tutorial of Excel.

read more | digg story

Guide to Those Useless Windows XP Services

July 19, 2006

0 comments  

here is a look at the default set of services that come with a fresh installation of Windows XP. "We'll tell you the ones that you don't need and try to tell you why, so you can disable them without any problems."

read more | digg story

One in The Hand

0 comments  

One in The Hand: "Weekly video cast that promotes knowledge in the handheld arena specifically treos which also contributes to the destruction of the digital divide between the have(knowledge) and have nots."

Reinstall and Restore Win XP Activation

0 comments  

If you have to reinstall Win XP on the same equipment, you know what a pain it is to reactivate XP. This simple guide tells how to backup and restore two small files so you can avoid reactivation.

read more | digg story

ISO Recorder v 2

July 18, 2006

0 comments  

ISO Recorder v 2: "ISO Recorder is a tool (power toy) for Windows XP, 2003 and now Windows Vista, that allows (depending on the Windows version) to burn CD and DVD images, copy disks, make images of the existing data CDs and DVDs and create ISO images from a content of a disk folder."

TechNet Webcast: Windows Hang and Crash Dump Analysis (Level 400)

July 13, 2006

0 comments  

TechNet Webcast: Windows Hang and Crash Dump Analysis (Level 400): "Learn to analyze Microsoft Windows crash dumps, diagnose the cause, pinpoint a solution, and resolve the problem. Intended for system administrators, this webcast explains how system crashes occur and what happens when you reboot a crashed system. We lead you through the crash dump analysis process step by step, introducing the latest tools from Microsoft and handy tricks for isolating the cause of a crash.

Presenter: Mark Russinovich, Chief Software Architect and Cofounder, Winternals Software"

Confessions of an IT Pro: My Nine Biggest Professional Blunders

0 comments  

Over the past 16 years of being paid to make computers and people work together in perfect harmony, I have collected a number of incidents that make me wince and blush in embarrassment when I think of them. The mistakes I've made fall roughly into three categories: technical, political, and career management.

read more | digg story

Information Tools - Part 2: RSS Feeds

July 12, 2006

1 comments  

This post contains some of the RSS feeds I subscribe to:

Ars Technica
http://arstechnica.com/index.ars/rss

CNET News.com - Security
http://news.com.com/2547-1009_3-0-10.xml

Digg.com
http://www.digg.com/rss/index.xml

k-otik Exploits
http://www.k-otik.com/exploits.xml

Help Net Security - News
http://www.net-security.org/dl/bck/news.rss

IronGeek's Security Site
http://www.irongeek.com/irongeek.rss

Lockergnome's IT Professionals
http://feeds.lockergnome.com/rss/it.xml

Microsoft Security Bulletins
http://www.microsoft.com/technet/security/bulletin/secrss.aspx

Schneier on Security
http://www.schneier.com/blog/index.rdf

SecurityFocus News
http://www.securityfocus.com/rss/news.xml

Slashdot
http://slashdot.org/slashdot.rss

Slipstick - Outlook and Exchange News
http://www.slipstick.com/rssnews/rssnews.aspx

SysAdminHell
http://sysadminhell.blogspot.com/atom.xml

Sysinternals
http://www.sysinternals.com/sysinternals.xml

Techdirt
http://www.techdirt.com/techdirt_rss.xml

TechNet Events (Texas)
http://www.technetbriefings.com/public/RSS/TX.xml

TechNet Magazine
http://www.microsoft.com/technet/technetmag/rss/recent.xml

The Blogcast Repository
http://blogcastrepository.com/roller/rss.ashx

Wired News: Top Stories
http://www.wired.com/rss//index.xml

I use RSS Popper: http://rsspopper.blogspot.com/. It integrates into Outlook. Others that I've used are FeedReader www.feedreader.com (standalone) and Wizz RSS Reader https://addons.mozilla.org/firefox/424/ (Firefox extension).

Information Tools - Part 1: Magazines

0 comments  

Part of being a SysAdmin is collecting information and staying on top of the change curve. Our industry is in constant change; things you learned a year ago can be obsolete now, and new products are introduced every day. Many issues affect the way things are done, and new concepts change the landscape of IT.

How do you stay on top of these changes? Stay informed. With the shear volume of information out there, it's not an easy task. Magazines, RSS feeds, Email lists are just some of the ways to stay informed.

This post focuses on Magazines. These are the ones I get:


Free (as in no money) Magazines

Network World
www.networkworld.com

InfoWorld
www.infoworld.com

Technet
www.technetmagazine.com

Computer World
www.computerworld.com

Information Week
www.nwc.com

eWeek
www.eweek.com

Information Security
www.infosecuritymag.com

SC Magazine
www.scmagazine.com

Network Computing
www.networkcomputing.com

InfoStor
www.infostor.com

Continuity Insights
www.continuityinsights.com

Most of the free magazines can be found at TradePub.com http://www.tradepub.com/ . They link to the subscription page for quick application.

Cost Magazines

Wired
www.wired.com

Windows IT Pro
www.windowsitpro.com/

Learn the Linux Command Line and Shell Scripting

June 29, 2006

0 comments  

You have Linux installed and running. The GUI is working fine, but you are getting tired of changing your desktop themes. You keep seeing this "terminal" thing. Don't worry, we'll show you what to do.

read more | digg story

The COMPLETE command line list for Linux, Windows, Oracle, and MacOS

June 21, 2006

0 comments  

Complete list of command line tools you would need. Check it out!

read more | digg story

How to enable remote desktop - Remotely

0 comments  

Remote desktop is a nice feature of Windows that lets you remotely work on the system as if you were there. Many times you find that you need it enabled - but the machine you are trying to access is tough to reach. This is a simply way to remotely enable it.

read more | digg story

ReviewLinux.Com: GParted LiveCD 0.2.5-1 A Must Have Disc!

0 comments  

Excellent review on GParted LiveCD 0.2.5-1 ( Gnome Partition Editor ). This review works you through the process of repartitioning a WindowsXP NTFS hard drive. The LiveCD is a must have for all Linux users.

read more | digg story

Tutorials bringing you from newbie to coding pro

0 comments  

I was looking for a way to learn coding (PHP, Javascript, CSS), and I found this website. Its created by Ron, the maker of "SayBox". It brings you from the ground up with extremely descriptive tutorials in many different coding subjects. Its growing quickly, and more tutorials are being added very often... give it a look and digg on!

read more | digg story

97% of IT workers feel "traumatized" by their job

June 15, 2006

0 comments  

According to a survey released this month by Dublin-based consulting firm SkillSoft, 97 percent of IT professionals feel traumatized by their daily work. Indeed, 80 percent of them get tense just thinking about going to the office.

read more | digg story

Running any Linux in Windows without a CD-ROM (for free)

June 13, 2006

0 comments  

Running any Linux in Windows without a CD-ROM (for free): "If you are afraid of installing Linux in your hard drive, here you have an article on how to run any version of Linux inside windows without using a CD ROM and with only freeware. Using Easyvmx, VMWare player and a Linux ISO file."


This is incredibly awesome. I've used VirtualPC and VirtualServer (from MS), and both seemed to be fairly good (although I never used them for Linux). I've been plesantly surprised by the performance of VMWare player, and my installation of Ubuntu was quick, easy, and painless using the methods above.

Slashdot | Visual Tour of Office 2007 Beta 2

May 24, 2006

0 comments  

Slashdot | Visual Tour of Office 2007 Beta 2: "'Computerworld has a review and visual tour of the newest installment of Office. No more toolbars & menus; those have been replace with 'ribbons.' Of the various products in the suite, Word is the most changed. Styles are easier to invoke, but no easier to create or understand. A couple of the redeeming characteristics is the ability to save as PDF and XPS and an improved Track Changes. Bigger spreadsheets are available in Excel -- over 1 million rows and over 16,000 columns per worksheet -- and new and better visualization abilities. Lots new in Outlook including multiple calendars and direct support for RSS feeds. And the apps all work together better than before."

The RFID Hacking Underground

May 05, 2006

0 comments  

Wired 14.05: The RFID Hacking Underground: "They can steal your smartcard, lift your passport, jack your car, even clone the chip in your arm. And you won't feel a thing. 5 tales from the RFID-hacking underground."

The best person to hack your system is you

May 01, 2006

0 comments  

Computerworld > The best person to hack your system is you: "I’ve always been a firm believer in the idea of hacking yourself. After all, if you don’t hack yourself, the hackers will. So, if you’re a good security administrator, you must learn about the various hacking tools that might be used against your environment, become familiar with them, and use them. "

Security Reference Guide > Handheld War-driving

April 30, 2006

0 comments  

Security Reference Guide > Handheld War-driving: "This article will take a look at handheld devices and the tools/equipment that are available for the war-driver on the go. As you will see, there are some facets of PDA based war-driving that have no equal in the PC world (for the price)."

How to Get Vista Back on Track: Open Source It

0 comments  

How to Get Vista Back on Track: Open Source It: "Opinion: Seriously. It's clear that Microsoft can't do the job right, so why not embrace the enemy and be done with it? "

Theoretical Hacking for IT Managers | Linux Journal

0 comments  

Theoretical Hacking for IT Managers | Linux Journal: "Not everyone has 'l33t skilz' or mass amounts of hardened TCP/IP stack programming experience. When I'm at work, I don't look at logs all day long, nor do I run security audits every five minutes. I do my job, which takes all of my time. This is the situation for most small to medium sized companies that have only a few IT guys. So how does an everyday IT guy handle the constant threat of impending attack?"

Beyond Rootkits: World's First Standalone Kernel Mode Bot?

April 07, 2006

0 comments  

Beyond Rootkits: World's First Standalone Kernel Mode Bot?: "A European student has just developed a Proof of Concept for what the developer believes is the world's first kernel mode IRCbot.

The creator, Tibbar ('Rabbit' spelled backwards), says the difference between this innovation and standard Windows rootkits lies in its crossover ability. Most Windows-based rootkits hide in device drivers, then depend on outside, usermode applications to get anything done."

Microsoft Virtual Server 2005 R2

April 04, 2006

0 comments  

Microsoft Virtual Server 2005 R2: "Discover the most cost-effective server virtualization technology engineered for the Windows Server System platform, now available as a free download. A key part of any server consolidation strategy, Virtual Server increases hardware utilization and enables organizations to rapidly configure and deploy new servers."

Wink - Tutorial and Presentation Creator

March 29, 2006

0 comments  

Wink - [Homepage]: " Wink is a Tutorial and Presentation creation software, primarily aimed at creating tutorials on how to use software (like a tutor for MS-Word/Excel etc). Using Wink you can capture screenshots, add explanations boxes, buttons, titles etc and generate a highly effective tutorial for your users."

Freeware (for personal and business use), cross-platform, multiple output formats (Flash, exe, PDF, HTML)... Awesome.

Microsoft Delays IE's Active X D-Day

0 comments  

Microsoft Delays IE's Active X D-Day: "Microsoft is moving full steam ahead with a plan to permanently modify the way Internet Explorer renders multimedia content on Web pages, but in what amounts to an admission that the changes could be disruptive, the software maker plans to give Web developers an extra 60 days to continue making preparations.

The IE update, which results from a multimillion-dollar patent spat with Eolas Technologies, changes the way the browser handles ActiveX controls and could have a significant impact on how online advertising and streaming media content is delivered over the Internet."

Nice. MS is having some issues of late with patent disputes. Not too long ago I received a letter saying that due to a patent dispute, all Office 2003 users need to upgrade to Service Pack 2. Now they're forcing a major change in IE. My suggestion to Microsoft: Think about forcing a major change in your legal department.

GPO Software Restrictions: Software List for Path Restrictions

March 27, 2006

5 comments  

So I decided to set up Software Restrictions on my Active Directory network. Of course, I needed a good list of paths to block (I'm using the path method). Unfortunately, I could find no such list and had to resort to digging through HiJackThis logs on Usenet and searches on Google. To help others, here's the list I'm using:

Chat

%ProgramFiles%\MSN\MSNCoreFiles\msn.exe - MSN IM Client 1
%ProgramFiles%\MSN\MSNIA\msniasvc.exe - MSN IM Client 2
%ProgramFiles%\MSN Messenger\msnmsgr.exe - MSN IM Client 3
%ProgramFiles%\Messenger\msmsgs.exe - Messenger IM Client
%ProgramFiles%\AIM\aim.exe - AOL IM Client
%ProgramFiles%\skype\phone\skype.exe - Skype VOIP/IM Client
%ProgramFiles%\AIM+\AIM+.exe - Aim+ IM Client

P2P

%ProgramFiles%\Kazaa Lite K++\kpp.exe - Kazaa Lite P2P Software
%ProgramFiles%\kazaa\kazaa.exe - Kazaa P2P Software
%ProgramFiles%\BearShare\BearShare.exe - Bearshare P2P Software
%ProgramFiles%\LimeWire\LimeWire.exe - Limewire P2P Software
%ProgramFiles%\Shareaza\Shareaza.exe - Shareaza P2P Software
%ProgramFiles%\Gnucleus\*.exe - Gnucleus P2P Software
%ProgramFiles%\Grokster\*.exe - Grokster P2P Software
%ProgramFiles%\eDonkey2000\edonkey2000.exe - eDonkey P2P Software
%ProgramFiles%\Audiogalaxy Satellite\AGSatellite.exe - AudioGalaxy P2P Software
%ProgramFiles%\WinMX\WinMX.exe - WinMX P2P Software
%ProgramFiles%\iMesh\Client\iMeshClient.exe - iMesh P2P Software

Spyware

%ProgramFiles%\free surfer\fs20.exe - Free Surfer Spyware
%ProgramFiles%\MyWay\bar\2.bin\MWSOEMON.EXE - MyWebSearch Email Spyware
%ProgramFiles%\WEBSHOTS\WEBSHOTSTRAY.EXE - Webshots Spyware
%ProgramFiles%\HOTBAR\BIN\4.1.8.0\HBSRV.EXE - HotBar Spyware 1
%ProgramFiles%\Hotbar\bin\Hbinst.exe - HotBar Spyware 2
%ProgramFiles%\COMMON FILES\GMT\GMT.EXE - Gator Spyware 1
%ProgramFiles%\COMMON FILES\CMEII\CMESYS.EXE - Gator Spyware 2
%ProgramFiles%\webHancer\Programs\whAgent.exe - WebHancer Spyware
%ProgramFiles%\AllSpamGone\AllSpamGone.exe - AllSpamGone Spyware
%ProgramFiles%\AdsGone\adsgone.exe - AdsGone Spyware
%ProgramFiles%\Morpheus\Morpheus.exe - Morpheus P2P Software
%ProgramFiles%\iMesh\Client\FTP_back.exe - iMesh Trojan
%ProgramFiles%\POP Peeper\POPPeeper.exe - PopPeeper Spyware
%ProgramFiles%\Power Soft\Free Notes\FreeNotes.exe - FreeNotes Spyware
%ProgramFiles%\SmartBarXP BETA4.9\SmartBarXP.exe - SmartBarXP Spyware
%ProgramFiles%\MYWEBSEARCH\bar\1.bin\mwsoemon.exe - MyWebSearch Toolbar Spyware
%ProgramFiles%\SAVE\SAVE.EXE - WhenU SaveNow Spyware
%ProgramFiles%\BullsEye Network\bin\bargains.exe - Bargain Buddy Spyware 1
%ProgramFiles%\Bargain Buddy\bin2\bargains.exe - Bargain Buddy Spyware 2
%ProgramFiles%\Internet Optimizer\optimize.exe - MoneyTree Dialer Spyware
%ProgramFiles%\Web_Rebates\WebRebates1.exe - TopRebates Spyware 1
%ProgramFiles%\Web_Rebates\WebRebates0.exe - TopRebates Spyware 2
%ProgramFiles%\Speed Disk\nopdb.exe - Speed Disk Spyware
%ProgramFiles%\GetRight\getright.exe - GetRight Spyware
%ProgramFiles%\Common files\WinTools\WToolsA.exe - HuntBar Spyware 1
%ProgramFiles%\Common files\WinTools\WSup.exe - HuntBar Spyware 2
%ProgramFiles%\Common files\WinTools\Wtoolss.exe - HuntBar Spyware 3
%ProgramFiles%\EbatesMoeMoneyMaker\EbatesMoeMoneyMaker.exe - Ebates Spyware
*\win*\System32\msbb.exe - 180Solutions Spyware
%ProgramFiles%\INTERNET OPTIMIZER\ACTALERT.EXE - MoneyTree Dialer Spyware
%ProgramFiles%\ISTsvc\istsvc.exe - IST Spyware
%ProgramFiles%\PrecisionTime\PrecisionTime.exe - Gator Spyware 2

Of course, there are probably hundreds of spyware entries that I didn't include, but these are the most common I've seen. I also could have included more chat apps, like Gaim, Trillian, or Yahoo, but we currently use those in limited deployment. I'm also sure there's more P2P apps, but I don't use P2P so I've just included the ones I've heard of. Also, other apps like iTunes, Winamp, etc could also be inappropriate on other networks, but I tolerate it here.

Please feel free to comment with additional programs that you block...

Here's a link on how to set this up for your network:
Microsoft Windows XP: Using Software Restriction Policies to Protect Against Unauthorized Software: "Using Software Restriction Policies to Protect Against Unauthorized Software"

Microsoft Confirms 'Highly Critical' IE Hole

March 23, 2006

0 comments  

Microsoft Confirms 'Highly Critical' IE Hole: "Microsoft plans to release a pre-patch advisory with workarounds for a 'highly critical' vulnerability that could put millions of Internet Explorer users at the mercy of malicious hackers."

Microsoft Windows XP: Using Software Restriction Policies to Protect Against Unauthorized Software

March 15, 2006

0 comments  

Microsoft Windows XP: Using Software Restriction Policies to Protect Against Unauthorized Software: "Software restriction policies are a new feature in Microsoft® Windows® XP and Windows Server 2003. This important feature provides administrators with a policy-driven mechanism for identifying software programs running on computers in a domain, and controls the ability of those programs to execute. Software restriction policies can improve system integrity and manageability—which ultimately lowers the cost of owning a computer."

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

March 14, 2006

0 comments  

A summary of the 10 best LiveCD distributions dealing with security (pen testing, forensics & recovery). With links to download and a little information about each one.

read more | digg story

MSFN's Unattended Windows Guide

March 10, 2006

0 comments  

MSFN's Unattended Windows : Unattended Windows Introduction: "Have you ever wanted a Windows CD that would install Windows by automatically putting in your name, product key, timezone and regional settings? And have it merged with the latest Service Pack to save time? Followed by silently installing all your favourite applications along with DirectX 9.0c, .Net Framework 1.1 and then all the required hotfixes, updated drivers, registry tweaks, and a readily patched UXTheme.dll without any user interaction whatsoever? Then this guide will show you how you can do just that! "

Awesome guide, very detailed, easy to read, tons of screenshots.

Checklist: What to do when you've been hacked

February 20, 2006

0 comments  

Checklist: What to do when you've been hacked: "You have just gotten the call from an associate at work that the network you're responsible for has been hacked. You're going to need to make some decisions very quickly as to what needs to be done. Individuals who haven't planned for such an event may actually be thinking, 'Do I have a current copy of my resume?'"

Windows XP 15 Minute Tune-Up - Fix Sluggish Performance for Free

February 19, 2006

0 comments  

Windows XP 15 Minute Tune-Up - Fix Sluggish Performance for Free: "We've seen Pentium II machines with 128 MB RAM run XP faster than Pentium IVs with 4x the clock speed and 4x the RAM - so what gives? This article will help you figure out why your PC is running slow and outline exact steps to fix it quickly, before throwing in the towel with a format, restore, or new PC purchase."

- A bit newbie -ish but could be a decent resource for a poweruser aspiring user.

Anatomy of a Break In (w/ Ira Wrinkler)

February 17, 2006

0 comments  

In two days, Ira Wrinkler and Co. not only pwned a multinational Fortune 500 company's data, but also did so while sitting in their offices and wondering around their data center!!

Awesome read.

read more | digg story

Irongeek: Coffee and Confidential Computer Communications

February 16, 2006

0 comments  

The focus of this article is on keeping others from intentionally violating your privacy while you use your laptop at a local coffee house, but most of the principles also apply to other wireless networks you may encounter. - A simple (less-technical) explaination...

read more | digg story

Black Tuesday

February 14, 2006

0 comments  

Microsoft Security Bulletin Summary for February, 2006: "Included in this advisory are updates for newly discovered vulnerabilities. These vulnerabilities, broken down by severity are 2 Critical and 5 Important"

Only seven this month. Also, due to laziness, I'm just going to link to the Summary from now on.

How To Troubleshoot Any Networking Problem

0 comments  

Tech author extraordinaire Mark Minasi shares a bit over two dozen "rules of network troubleshooting." This will be new for some, a good review for others, and a handy reference for all.

read more | digg story

Experience of Migrating from WinXP to Linux (Kubuntu)

February 11, 2006

0 comments  

Blogger talks about his experiences in switching from WinXP to Kubuntu linux for his primary desktop. Mentions some great apps you may not have heard of (Katapult), screenshots of Amarok in action etc. He also compares some of the Kubuntu apps to the equivalent app in Mac OS X (he has an iBook too).

read more | digg story

Bill Xia, Chinese Firewall Killer

0 comments  

I know China's firewall has been covered extensively before, but this is an interesting article about Bill Xia, a member of a banned Chinese sect Falun Gong, whose mission is to bring banned information to the Chinese masses.

read more | digg story

Slashdot | Time Management for System Administrators

February 10, 2006

0 comments  

Slashdot | Time Management for System Administrators: "'System administrators have a stereotypical reputation for grumpiness and irritability. Sometimes this misanthropy is a cultivated pose, designed to deter casual or trivial requests that would take time away from more important activities like playing nethack and reading netnews. More often, however, sysadmins are disgruntled simply because they can't seem to make any headway on the dozens of items clogging up their todo lists. If you're an example of the latter case, you may find some help in Time Management for System Administrators, the new book from Thomas Limoncelli (who you may recognize as one of the co-authors of the classic The Practice of System and Network Administration). Read the rest of genehack's review."

99 performance tips for WinXP

0 comments  

Massive list of simple tweaks to improve your rig's performance.

read more | digg story

Programmers get their own search engine

February 08, 2006

0 comments  

A tool, known as Krugle, is designed to deliver easy access to source code and other highly relevant technical information in a single, clean, easy-to-use interface for programmers. Krugle works by crawling, parsing, and indexing code found in open source repositories and code that exists in archives, mailing lists, blogs, and Web pages.

read more | digg story

How to Add Patches/Modules to the Back|Track Pen-testing Live CD

February 07, 2006

1 comments  

New video from IronGeek showing how to add patches and extra modules to the Back|track pen-testing Live CD using MySlax.

read more | digg story

Security of Live Web Services

February 03, 2006

0 comments  

Marc Maiffret is a worried man.

...

"Today I can buy software, test it and confirm for myself that it's secure for my use. In the new world, even if Live.com is secure today, Microsoft could make changes tomorrow and there's no way to know if I'm secure tomorrow. That's a legitimate concern."

read more | digg story

DNS Stub Zones in Windows Server 2003

0 comments  

DNS Stub Zones in Windows Server 2003: "Stub zones are a new feature of DNS in Windows Server 2003 that can be used to streamline name resolution, especially in a split namespace scenario. They also help reduce the amount of DNS traffic on your network, making DNS more efficient especially over slow WAN links. This article will look in detail at what stub zones are, how they work, and when to use them."

Active Directory Sites and Services

0 comments  

Active Directory Sites and Services: "This guide explains how to use the Active Directory Sites and Services snap-in to administer replication topology both within a site in a local area network (LAN) and between sites in a wide area network (WAN)."

Portable Apps Suite

February 01, 2006

0 comments  

Portable Apps Suite | PortableApps.com: "Portable Apps Suite™ is a collection of portable apps including a web browser, email client, web editor, office suite, word processor, calendar/scheduler, instant messaging client and FTP client, all preconfigured to work portably and be easy to back up. Just drop it on your portable device and you're ready to go.

Portable Apps Suite Contains: Portable Firefox (web browser), Portable Thunderbird (email client), Portable OpenOffice.org (office suite), Portable AbiWord (word processor), Portable NVU (web editor), Portable Sunbird (calendar & task list), Portable FileZilla (FTP client), Portable Gaim (instant messenger) and will fit on a 256Mb USB thumbdrive."

Removing unused device drivers from Windows XP machines

0 comments  

"Did you know that unless you uninstall a device driver on a Windows XP machine that it still may be sucking up valuable system resources? Here are step-by-step instructions on how you can view and remove these unnecessary devices."

read more | digg story

The Top 10 Infosec Myths

0 comments  

The Top 10 Infosec Myths: "When it comes to information security, there's a lot of popular wisdom available, but much of it is unfounded and won't necessarily improve your organization's security.

Here are 10 network security myths that bear further examination."

Why Reboot?

January 30, 2006

0 comments  

Exodus WhyReboot is a small (60KB) Windows application that displays a list of pending file operations that will occur after rebooting your computer. This is useful in determining why an installer has notified you that a reboot is needed.

- Nice utility.. I've needed something like this many times in the past.

read more | digg story

List of RSS readers

January 29, 2006

0 comments  

This is a comprehensive list of RSS aggregators, organized by platform. It includes many lesser-known ones, as well.

Lists for Windows, Mac, Linux, Mobile phone, PDA, and Blackberry.

read more | digg story

Make your own VMs with hard drive for free: VMware Player + VMX Builder (Hacking Illustrated Series)

January 25, 2006

0 comments  

Make your own VMs with hard drive for free: VMware Player + VMX Builder (Hacking Illustrated Series): "In my last video I showed how to use the free VMware Player to boot a Live CD ISOs. This time I’m going to show how to use Robert D. Petruska’s VMX Builder to make your own VMs with hard drives (vmdk file) and pretty much any virtual hardware you want."

Active Directory Step-by Step-Guides

January 24, 2006

0 comments  

Active Directory Step-by Step-Guides: "These guides step through the fundamentals of the Windows Server 2003 operating system, with emphasis on features enabled by Active Directory. Learn about common scenarios, including desktop and server management, the Group Policy Management Console, and using Active Directory to strengthen security. Whether you support a small, medium, or large enterprise, these guides help you take advantage of Active Directory's key benefits: increased operational efficiency, improved security, and enhanced productivity."

NetBackup Faq-O-Matic

January 22, 2006

0 comments  

NetBackup Faq-O-Matic: "This FAQ is automatically maintained by members of the NetBackup Mailing List. "

Looks like a good resource for those "lucky" souls tasked with maintaining a Veritas NetBackup system.

Lifehacker Pack - Lifehacker

0 comments  

Geek to Live: Lifehacker Pack - Lifehacker: "Recently Google released a collection of free software for Windows called Google Pack. The big G made some good applications choices for the Pack and a couple of atrocious ones (RealPlayer *cough* Norton *cough*).

Coincidentally, a year ago, when Lifehacker was still just a turkey in the oven, my publisher and I discussed releasing a CD of the best free software. We never got around to it, but if we did, here’s a list of applications I’d include in Lifehacker Pack."

Data Mining using Google

January 20, 2006

0 comments  

CyberWyre » Data Mining using Google: "Google (and many other search engines) has the ability not only to search on keywords, but also using a more “database-ish” query language to really narrow down your search results. Below is a summary of a few of the most useful lesser known features. "

How to raise domain and forest functional levels in Windows Server 2003

0 comments  

How to raise domain and forest functional levels in Windows Server 2003: "This article describes how to raise the domain and forest functional levels that are supported by Microsoft Windows Server 2003 domain controllers. Functional levels are an extension of the mixed/native mode concept introduced in Microsoft Windows 2000 to activate new Active Directory features after all the domain controllers in the domain or forest are running the Windows Server 2003 operating system. When a computer that is running Windows Server 2003 is installed and promoted to a domain controller, new Active Directory features are activated by the Windows Server 2003 operating system over its Windows 2000 counterparts. Additional Active Directory features are available when all domain controllers in a domain or forest are running Windows Server 2003 and the administrator activates the corresponding functional level in the domain or forest. "

System Information for Windows Freeware

January 18, 2006

0 comments  

System Information for Windows by Gabriel Topala - "The Freeware SIW is a Read-Only / Display-Only System Information tool that gathers detailed information about your system properties and settings.

SIW is an utility that displays detailed specs for motherboard, BIOS, CPU, devices, memory, video, disk drives, ports, printers, operating system, installed programs, processes, services, serial numbers (CD keys), users, open files, system uptime, network, network shares, as well as real-time monitors for CPU, memory, page file usage and network traffic."

Very nice utility, especially since it does not require an install to get all of the data needed.

Scott Hanselman's 2005 Ultimate Developer and Power Users Tool List

0 comments  

ComputerZen.com - Scott Hanselman - Scott Hanselman's 2005 Ultimate Developer and Power Users Tool List: "Everyone collects utilities, and most folks have a list of a few that they feel are indispensable. Here's mine. Each has a distinct purpose, and I probably touch each at least a few times a week. For me, util means utilitarian and it means don't clutter my tray. If it saves me time, and seamlessly integrates with my life, it's the bomb."

Awesome (HUGE!) list.

nubuntu - Network Ubuntu

January 17, 2006

0 comments  

nubuntu - Network Ubuntu: "nUbuntu is a collection of network and server security testing tools, piled on top of the existing Ubuntu system. While aimed to be mainly a security testing platform, nUbuntu also operates as a desktop enviroment for the advanced linux user."

Useful Links to ASU sites

0 comments  

Quick Reference Cards - Nice collection of Reference Cards.

Linux Distribution Chooser [© 2005-06 - zegenie Studios]

January 09, 2006

0 comments  

Linux Distribution Chooser [© 2005-06 - zegenie Studios]: "Linux Distribution Chooser " - a quick test that will help you find the right linux distribution based on your answers.

Quick Online Tips: 50 Best Firefox Extensions for Power Surfing

January 01, 2006

0 comments  

Quick Online Tips: 50 Best Firefox Extensions for Power Surfing: "There are hundreds of firefox extensions on the web. Which ones do you use? Here is my attempt to collect the 50 best and popular firefox extensions which make your browsing, downloading and navigation in Firefox as easy as possible, while harnessing the full power and features of Firefox."