Thursday, 19 June 2014

Apple: Adware Removal Tool

This tool is an AppleScript application designed to remove all known Mac adware. The tool is updated frequently.


Reference:
Adware Removal Tool
http://www.thesafemac.com/art/

Microsoft: Internet Explorer Maintenance not Available for Internet Explorer ( IE ) 11

Internet Explorer Maintenance is no longer available for Internet Explorer 11 in the Local Computer Policy.

<< Internet Explorer 8 >>

<< Internet Explorer 11 >>

Wednesday, 18 June 2014

Microsoft: Set Internet Explorer ( IE ) Home Page with Group Policy

You can use the steps below to set the IE home page with Group Policy.
1. Create a GPO and link it to a scope (Site, Domain or OU level not group) that contains all your specified user accounts.
2. Edit the GPO: GPO name-->User Configuration-->Policies-->Administrative Templates-->Windows Components-->Internet Explorer-->Disable changing home page settings-->Enable-->Home Page: input your specified home page
3. Logoff or restart user computer to apply this GPO


Reference:
Enforcing an IE default page via GPO
http://social.technet.microsoft.com/Forums/en-US/20061e82-f857-4d38-a494-e8af18a5b51a/enforcing-an-ie-default-page-via-gpo?forum=winserverGP

Microsoft: How To Disable Internet Explorer First Run Welcome Screen Pop Up


Method #1: Using Group Policy Editor
Using Group Policy Editor is probably the best method, because it can be used either locally, on one computer, or in an Active Directory environment by utilizing the GPO power.
1. Press Start button + R (the Run command), type gpedit.msc and press Enter to launch the Group Policy Editor.

Note: In an Active Directory environment, open gpmc.msc and either edit an existing GPO, or create a new one and link it to the domain level, or to an OU of your choice.

2. In the left pane, expand User Configuration > Administrative Templates > Windows Components > Internet Explorer.

3. On the right pane, double-click on “Prevent running First Run wizard". A new settings window will open up.

4. Set the value to “Enabled”.

5. In the options section you must choose one of the two options from the drop-down menu:

  • Go directly to “Welcome To IE” page
  • Go directly to home page

You need to choose one of the two, otherwise the configuration will not work.

The first option configures IE to skip the Welcome screen and go directly to your home page, whatever it is.

The second option configures IE to skip the Welcome screen and and go to the “Welcome to Internet Explorer” page directly.

6. Click Apply to save the settings then click OK and close the Group Policy Editor window.

7. Press Start button + R (the Run command) and type gpupdate /force and press Enter to refresh the Group Policy on the computer.



Method #2: Using Registry Editor
You can use this method to either manually configure one computer, or generate a .REG file to import it on other machines.

Warning:
This document contains instructions for editing the registry. If you make any error while editing the registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall Windows. Edit the registry at your own risk. Always back up the registry before making any changes. If you do not feel comfortable editing the registry, do not attempt these instructions. Instead, seek the help of a trained computer specialist.

1. Press Start button + R to open run command dialog box. Type regedit and press Enter to open the Registry Editor. You may be prompted with a UAC prompt, click "Yes".

2. Navigate to the following path:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main

Note: The above branch does not exist by default, and has to be created manually, or by running the .REG file available at the end of this article.

3. Right click on the right pane and select New > DWORD (32-bit) Value.

4. Enter DisableFirstRunCustomize.

5. Right-click on the new entry it and choose “Modify”.

6. Modify its DWORD (32-bit) Value to “1” (without the quotes) and click OK.

7. Exit the Registry Editor.

Note: You can use this .REG file to import the same setting to your computer:
Windows Registry Editor Version 5.00
;Disable IE11 Welcome Screen
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\Main]
"DisableFirstRunCustomize"=dword:00000001

Copy the above text into a new text file, and save it as "DisableIEWelcome.reg".


Refernce:
How To Disable Internet Explorer First Run Welcome Screen Pop Up
http://www.petri.co.il/disable-ie8-ie9-welcome-screen.htm

Microsoft: Temporary Profile Issue in Windows

<< Method 1 >>
Before do anything, restart the computer 2 or 3 times to see whether it’s going back to your old correct profile. Go to next step if this doesn’t work.


<< Method 2 >>
Rename the temp profile registry and revert back the old registry settings for the correct profile. This method works most of the time for me in Workgroup and domain environment.
a)      Log in with temp profile
b)      Start registry editor by typing regedit in find box of Windows
c)      Navigate the following location
d)      You will see similar keys under profile list, but one with .bak, as shown below.
e)      The key with .bak is for the correct old profile. Currently your Windows computer logged in with fresh (temporary) profile with same key. So, rename the new profile key ( which is not having.bak) and remove .bak from correct profile key. See below.
f)      That’s it. Log off and log in (or restart) with your user name and password. You must get your correct profile with icons and profile settings back in Windows, if you are lucky enough.

Still if Windows computer loads with temporary profile and creates a registry key with .bak, that means user profile is really corrupted and Operating System is not reading it properly.


<< Method 3 >>
Repair the corrupted files. Usually the corrupted ‘Ntuser’ files cause this issue. So, run the check disk for partition which is having user profile.
If above steps do not help you out, then we need to create a new profile with new user name.

Basically we need to create a new user account, login with it and transfer the data from old user profile to new user profile. It is easy in workgroup environment as you can create new user name locally, but it is tricky in domain environment. Because, the existing user account is already there on domain server and nothing wrong with it. Also, creating a new different domain user account will cause issues on corporate emails, domain groups membership and shared permissions.

So, we need to treat both cases separately.


<< Method 4 >>
Create new user name in non domain (workgroup environment) from control panel or computer management.  Make sure to add the new user to administrators group.

Login with new user name and start copying your old data from old profile. I normally copy below data,
a) My Documents (Music, videos and downloads)
b) Desktop
c) Favorites
d) Any outlook PST files (find more information about location of PST files here)

But Microsoft suggests to copy entire old user profile (except 3 files) as shown in this official site link.


<< Method 5 >>
New user profile in domain environment.

Since we can’t delete and create new domain user account for this purpose, we will play around with client computer only. Let’s completely remove the user profile and re create again.

Copy the important user data (a to d in above step 4) or entire folders from corrupted profile to new location. Double-check that you have copied all required folders and files from old profile, because we are going to delete it now.

Go to Advanced settings of System as shown below, click on Settings (user profiles), select the corrupted user profile which is not loading properly in Windows, then press Delete button. Delete button will be enabled only if you login with different user account.
This will remove the entire user profile and related user SID from computer including the registery keys we talked about earlier. You can cross check the proper removal of user account (SID) by checking the C:\Users folder. Once it is remove properly, restart the computer and login with same user name (which was not loading earlier). The computer should create a new user profile as this is the first time the user is logging on. You need to copy back your old important data to new profile and set email outlook etc..if required.


Reference:
How to Fix Temporary Profile in Windows 7
http://www.sysprobs.com/fix-temporary-profile-windows-7

Microsoft: Delete an User's Profile from Windows PC

Go to Advanced settings of System as shown below, click on Settings (user profiles), select the user profile which is not loading properly in Windows, then press Delete button. Delete button will be enabled only if you login with different user account.

This will remove the entire user profile and related user SID from computer including the registery keys we talked about earlier. You can cross check the proper removal of user account (SID) by checking the C:\Users folder. Once it is remove properly, restart the computer and login with same user name (which was not loading earlier). The computer should create a new user profile as this is the first time the user is logging on. You need to copy back your old important data to new profile and set email outlook etc..if required.


Reference:
How to Fix Temporary Profile in Windows 7
http://www.sysprobs.com/fix-temporary-profile-windows-7

Microsoft: Contact Group is Grayed Out in Outlook for Mac 2011

In Outlook Preferences, you have to make sure the 'hide items on my computer' box is unticked. Then, the option to add a group is available. To untick the option, follow the steps below:
  1. Click on the Outlook Menu and choose Preferences
  2. Click on the General button
  3. Uncheck Hide folders on my computer

Reference:
Add Contact Group is grayed out in Outlook 2011
http://oit2.utk.edu/helpdesk/kb/entry/1830/

Tuesday, 17 June 2014

IT Technology: Zero-Day Vulnerability / Attacks

A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.

In order for the vendor to rectify the vulnerability, the software company must release a patch. Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday. On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes. If, however, a critical vulnerability is discovered, a patch may be released outside of schedule.

Browsers are similarly vulnerable; it’s a good idea to update your browser often, for updated security as well as features. To check if any updates are available for your browser of choice, open the browser and click either “Help” or the browser name, depending on which browser you’re using. A quick online search will provide step-by-step instructions. Alternately, you could set up automatic updates, again, depending on browser.

Zero day vulnerabilities can be serious security risks. When searching for an appropriate antivirus solution, look for security software that protects against both known and unknown threats.


Reference:
What is a Zero-Day Vulnerability?
http://www.pctools.com/security-news/zero-day-vulnerability/

Monday, 16 June 2014

IT Technology: Gameover Zeus and CryptoLocker Malwares

Currently, Gameover Zeus and CryptoLocker are very popular malwares that infect Windows computer. For more information, go to the following websites:
1.  https://www.getsafeonline.org/nca/
2.  http://en.wikipedia.org/wiki/Zeus_(Trojan_horse)

You can go to the following website to test whether the application is infected ( without installing anything ):
www.f-secure.com/gameoverzeus

Hopefully you see the following image said you are not infected.

In addition, the Internet is currently seeing a surge of malicious email traffic containing the Cryptolocker malware. The bulk of this traffic is coming through trusted free file share programs disguised as voicemail messages or faxes.

Cryptolocker is an especially destructive virus that will encrypt all of your data, including data on any shared folders on the fileserver that you have access to, and any USB drives that are plugged in. Cyber criminals then force you to pay to get the data back, with no assurance they will actually follow through if you do.

Apple: Show Hidden Files in Mac OS X

To enable hidden files/folders in finder windows:
1. Open Finder
2. Open the Utilities folder
3. Open a terminal window
4. Copy and paste the following line in:
        defaults write com.apple.Finder AppleShowAllFiles YES
5. Press return
6. Now copy and paste the following line into the terminal window:
        killall Finder
7. Press return

You should find you will now be able to see any hidden files or folders. One you are done, perform the steps above however, replace the terminal command in step 4 with:
defaults write com.apple.Finder AppleShowAllFiles NO

If the above is not working for you, you may want to try switching YES/NO to TRUE/FALSE .. Beware that this is case sensitive!
defaults write com.apple.Finder AppleShowAllFiles TRUE


Reference:
Show hidden files Mac OS X 10.7, 10.8 and 10.9 Mavericks

Thursday, 5 June 2014

Symantec: Clients Unable to Get Update from Live Update Administrator ( LUA )

This is the solution for the LUA error ( the clients are unable to get the update from the LUA ):
1. In the LUA GUI, click on Configure, then Preferences. Scroll down to Server Connections. Increase the timeout, retry and retry interval to improve the chance of successful connections.
TIMEOUT: 120 seconds
RETRY: 5
RETRY INTERVAL: 10 seconds


2.  Change settings is in the file ...\Symantec\LiveUpdate Administrator\tomcat\webapps\lua\WEB-INF\classes\lua_static.properties - lua_static.properties can be opened in notepad, textpad or your favorite text editor. Change the following values to increase the number of retries and period between retries:
download.retry.corruptFile=3
download.resume.corruptFile.retry=10
download.retry.corruptFile.sleep.msec=20000
download.http.header.acceptRanges=bytes

Please restart the LUA Tomcat service in order to reflect these changes. Those changes will not go into effect until Tomcat restarts!


3.  Make sure the Download and Distribution schedules are configured with 4 hours gap in between. i.e if you have the download schedule at 8 pm, distribution schedule is to be configured at 12 .

Tuesday, 3 June 2014

Microsoft: Increase the Booking Window of the Resource Mailbox


The Resource Policy tab allows you to configure various settings that control whether or not certain users are allowed to automatically book meetings based on the characteristics of the meeting request itself.

Many of the settings that you can see in figure above should be self-explanatory from the descriptions. For example, the Allow conflicting meeting requests option means exactly that. If you allow conflicting meetings, any conflicting meeting requests will be accepted by the resource mailbox and it will be up to the meeting organizers to work things out. The Booking windows (days) option covers how far in advance users can book this meeting room and as you can see the default setting is 180 days which is approximately 6 months. If you want to effectively disable any advance booking restrictions, simply set this value to 0. The Maximum duration (minutes) option covers how long the meeting request is allowed to last. As you can see, the default value for this option is 1440 minutes which equates to 1 day. This will probably suffice in the majority of situations for a room resource mailbox but should any of your users need to book the room resource for more than 1 day you will need to alter this value here. You can control the policy for conflicting meeting requests via the Maximum conflict instances and Conflict percentage allowed options.


Reference:
Resource Mailboxes in Exchange 2010 (Part 3)
http://www.msexchange.org/articles-tutorials/exchange-server-2010/management-administration/resource-mailboxes-exchange-2010-part3.html