Wednesday, 18 June 2014

Microsoft: Delete an User's Profile from Windows PC

Go to Advanced settings of System as shown below, click on Settings (user profiles), select the user profile which is not loading properly in Windows, then press Delete button. Delete button will be enabled only if you login with different user account.

This will remove the entire user profile and related user SID from computer including the registery keys we talked about earlier. You can cross check the proper removal of user account (SID) by checking the C:\Users folder. Once it is remove properly, restart the computer and login with same user name (which was not loading earlier). The computer should create a new user profile as this is the first time the user is logging on. You need to copy back your old important data to new profile and set email outlook etc..if required.


Reference:
How to Fix Temporary Profile in Windows 7
http://www.sysprobs.com/fix-temporary-profile-windows-7

Microsoft: Contact Group is Grayed Out in Outlook for Mac 2011

In Outlook Preferences, you have to make sure the 'hide items on my computer' box is unticked. Then, the option to add a group is available. To untick the option, follow the steps below:
  1. Click on the Outlook Menu and choose Preferences
  2. Click on the General button
  3. Uncheck Hide folders on my computer

Reference:
Add Contact Group is grayed out in Outlook 2011
http://oit2.utk.edu/helpdesk/kb/entry/1830/

Tuesday, 17 June 2014

IT Technology: Zero-Day Vulnerability / Attacks

A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. Uses of zero day attacks can include infiltrating malware, spyware or allowing unwanted access to user information. The term “zero day” refers to the unknown nature of the hole to those outside of the hackers, specifically, the developers. Once the vulnerability becomes known, a race begins for the developer, who must protect users.

In order for the vendor to rectify the vulnerability, the software company must release a patch. Often patches are released on a regular basis, one example being Microsoft’s Patch Tuesday. On the second Tuesday of each month, Microsoft releases security fixes that resolve identified holes. If, however, a critical vulnerability is discovered, a patch may be released outside of schedule.

Browsers are similarly vulnerable; it’s a good idea to update your browser often, for updated security as well as features. To check if any updates are available for your browser of choice, open the browser and click either “Help” or the browser name, depending on which browser you’re using. A quick online search will provide step-by-step instructions. Alternately, you could set up automatic updates, again, depending on browser.

Zero day vulnerabilities can be serious security risks. When searching for an appropriate antivirus solution, look for security software that protects against both known and unknown threats.


Reference:
What is a Zero-Day Vulnerability?
http://www.pctools.com/security-news/zero-day-vulnerability/

Monday, 16 June 2014

IT Technology: Gameover Zeus and CryptoLocker Malwares

Currently, Gameover Zeus and CryptoLocker are very popular malwares that infect Windows computer. For more information, go to the following websites:
1.  https://www.getsafeonline.org/nca/
2.  http://en.wikipedia.org/wiki/Zeus_(Trojan_horse)

You can go to the following website to test whether the application is infected ( without installing anything ):
www.f-secure.com/gameoverzeus

Hopefully you see the following image said you are not infected.

In addition, the Internet is currently seeing a surge of malicious email traffic containing the Cryptolocker malware. The bulk of this traffic is coming through trusted free file share programs disguised as voicemail messages or faxes.

Cryptolocker is an especially destructive virus that will encrypt all of your data, including data on any shared folders on the fileserver that you have access to, and any USB drives that are plugged in. Cyber criminals then force you to pay to get the data back, with no assurance they will actually follow through if you do.

Apple: Show Hidden Files in Mac OS X

To enable hidden files/folders in finder windows:
1. Open Finder
2. Open the Utilities folder
3. Open a terminal window
4. Copy and paste the following line in:
        defaults write com.apple.Finder AppleShowAllFiles YES
5. Press return
6. Now copy and paste the following line into the terminal window:
        killall Finder
7. Press return

You should find you will now be able to see any hidden files or folders. One you are done, perform the steps above however, replace the terminal command in step 4 with:
defaults write com.apple.Finder AppleShowAllFiles NO

If the above is not working for you, you may want to try switching YES/NO to TRUE/FALSE .. Beware that this is case sensitive!
defaults write com.apple.Finder AppleShowAllFiles TRUE


Reference:
Show hidden files Mac OS X 10.7, 10.8 and 10.9 Mavericks

Thursday, 5 June 2014

Symantec: Clients Unable to Get Update from Live Update Administrator ( LUA )

This is the solution for the LUA error ( the clients are unable to get the update from the LUA ):
1. In the LUA GUI, click on Configure, then Preferences. Scroll down to Server Connections. Increase the timeout, retry and retry interval to improve the chance of successful connections.
TIMEOUT: 120 seconds
RETRY: 5
RETRY INTERVAL: 10 seconds


2.  Change settings is in the file ...\Symantec\LiveUpdate Administrator\tomcat\webapps\lua\WEB-INF\classes\lua_static.properties - lua_static.properties can be opened in notepad, textpad or your favorite text editor. Change the following values to increase the number of retries and period between retries:
download.retry.corruptFile=3
download.resume.corruptFile.retry=10
download.retry.corruptFile.sleep.msec=20000
download.http.header.acceptRanges=bytes

Please restart the LUA Tomcat service in order to reflect these changes. Those changes will not go into effect until Tomcat restarts!


3.  Make sure the Download and Distribution schedules are configured with 4 hours gap in between. i.e if you have the download schedule at 8 pm, distribution schedule is to be configured at 12 .

Tuesday, 3 June 2014

Microsoft: Increase the Booking Window of the Resource Mailbox


The Resource Policy tab allows you to configure various settings that control whether or not certain users are allowed to automatically book meetings based on the characteristics of the meeting request itself.

Many of the settings that you can see in figure above should be self-explanatory from the descriptions. For example, the Allow conflicting meeting requests option means exactly that. If you allow conflicting meetings, any conflicting meeting requests will be accepted by the resource mailbox and it will be up to the meeting organizers to work things out. The Booking windows (days) option covers how far in advance users can book this meeting room and as you can see the default setting is 180 days which is approximately 6 months. If you want to effectively disable any advance booking restrictions, simply set this value to 0. The Maximum duration (minutes) option covers how long the meeting request is allowed to last. As you can see, the default value for this option is 1440 minutes which equates to 1 day. This will probably suffice in the majority of situations for a room resource mailbox but should any of your users need to book the room resource for more than 1 day you will need to alter this value here. You can control the policy for conflicting meeting requests via the Maximum conflict instances and Conflict percentage allowed options.


Reference:
Resource Mailboxes in Exchange 2010 (Part 3)
http://www.msexchange.org/articles-tutorials/exchange-server-2010/management-administration/resource-mailboxes-exchange-2010-part3.html