Subscribe FaceBook

Thursday, December 29, 2011

Calculator can be used as a web browser.
















 This Trick Will allow you to access internet through Calculator.

Calculator can be used as a web browser.

1. open your MS Calculator. This is normally found in start => All
Programs => Accessories =>Calculator.

2. Open the help-window by pressing the F1 key.

3.Click the top-left corner icon of the help window once ( Standard is a document with a
question mark ).

4. Select go to URL-address.

5.Type your address into the available field, but remember to type
http:// and not just www.(or equivalent).

Tuesday, December 27, 2011

Hack Facebook

Hi folks...
In this tutorial ill be teaching you how to hack a facebook account with cookie stealing or session hijacking. The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like:

Cookie: datr=1276721606-7f94f977295759399293c5b0767618dc02111ede159a827030fc;

Note: This Attack will only work if victim is on a http:// connection and even on https:// if end to end encryption is not enabled.


An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain access to victims account.
If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain access to victims account.
In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.
Step 1 - First of all download wireshark from the official website and install it.
Step 2 - Next open up wireshark click on capture and then click on interfaces.
Step 3 - Next choose the appropriate interface and click on start.



Step 4 - Continue sniffing for around 10 minutes.

Step 5 - After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.
Step 6 - Next set the filter to http.cookie contains datr at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.



Step 7 -  Next right click on it and goto Copy - Bytes - Printable Text only.


Step 8 - Next you’ll want to open up firefox. You’ll need both Greasemonkey and thecookieinjector script. Now open up Facebook.com and make sure that you are not logged in.
Step 9- Press Alt C to bring up the cookie injector, Simply paste in the cookie value into it.



Step 10 - Now refresh your page and voilla!! you are logged in to the victims facebook account.




If you have Any Queries Ask me in form Of Comments and don't forget to share......

Monday, December 26, 2011

Freaking notepad tricks and tips Part-1


1.Cycle a message in your friend’s computer.
Type :

@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN
Save it and...
as pc.bat and send it to your friends.



2.Make Keyboard Keys Type Continuously:
Type :

MsgBox “stop me..! if you can”
Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop
Save it as pc.vbs and send it to your friends.


3.Convey your friend a message and shut down his/ her computer.
Type :

@echo off
msg * I don’t like you
shutdown -c “Hahahah You are Doomed” -s
Save it as pc.bat and send it to your friends.


4.Toggle your friend’s Caps Lock button simultaneously
Type :

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
loop
Save it as pc.vbs and send it to your friends.


5.Frustrate your friend by making their keyboard hit Enter simultaneously whenever they press a key :
Type :

Set wshShell = wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop
Save it as pc.vbs and send it to your friends.


Sunday, December 25, 2011

Luxand Blink Pro 2.3 With Keygen

Downloading Galaxy | Luxand Blink Pro 2.3 With Keygen | Login to your PC without touching a thing! “Luxand Blink“! is a tool to let you log in to your Windows account by simply looking into a webcam – no passwords to type and no fingers to scan.



The innovative face recognition technology developed by Luxand recognizes users’ faces quickly and reliably, and is able to match the user with an associated account even with different haircuts, beards or mustaches grown or shaved off while completely eliminating false positives.

The real innovation implemented in the technology is the ability to recognize registered users no matter what. Different lighting conditions, glasses or contacts, beards grown and shaved off, make-up or dyed hair will not confuse Blink!

Based on renowned face recognition technologies developed by Luxand and used by various industries around the world, the new login system greatly simplifies everyday life eliminating the need to touch the PC to log in to it. Luxand Blink! will help you improve the security of you computer at home and in the office, too!

The product can photograph, log and timestamp each user who logs into a PC with their face recognized or otherwise, ensuring that no password has leaked to unauthorized individuals. And if it has, you’ll know exactly which password is compromised and who took advantage of it.


Face-based biometric identification is the least obtrusive, the fastest and simplest to use. It helps secure workstations in the office, too. No longer will employees have to use yellow stickers to remember their passwords!

Face login will complement your corporate security policy just perfectly, providing the benefit of few false negatives and nearly impossible false positive recognitions. Blink! is absolutely free for personal use – download your copy today, and in a week you won’t be able to imagine your life before it.

Here are some key features of “Luxand Blink!”:

Login to Your PC by Simply Looking at It:
· Get “Luxand Blink“! Now! Logging into Windows has never been easier! Simply look into your webcam and you’ll be logged into your account in the blink of an eye. Blink! employs advanced face recognition technologies to provide automatic, quick and reliable login for one, or multiple, computer users.

ONLY WINDOWS VISTA AND WINDOWS 7 32 BIT

Download key  
Download Luxand Pro. 

Saturday, December 24, 2011

This trick will allow you to create files and folders without any name.

This trick will allow you to create files and folders without any name.

Just follow the steps:

1. Select any file or folder.

2. Rignt click on it, press rename or simple press F2.

3. Press and hold the alt. key. while holding the alt key, type numbers 0160 from the numpad.

Note : thype the numbers0160from the numpad, that is, the numbers on the right side of the keyboard.
don't type the numbers which are present on the top of the character keys.

4. Press Enter and nameless file or folder will be created.

Reason : The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you have to rename the file with 2 spaces. just follow these steps below.

1. Select file and press F2.

2. Hold Alt key and type 0160 from the numpad.

3. Release the alt key. now without doing anything else, again hold alt key and press 0160 from numpad

4.Press enter and you will have second nameless file in the same directory.

5. Repeat step 3 to create as many nameless files or folders in the same directory.

Enjoy namelessness . . . . xD



Friday, December 23, 2011

Hidden Tricks and Tips For VLC Player.


 
VLC Player Hidden Tips and Tricks
VLC is the most popular media player used by many people all over the world. It has all the popular codecs which helps you to play any kind of major video files.

1. Ripping DVD’s: VLC player can be used to Rip DVD’s in a very easy manner. To rip any dvd just go to media menu and click covert/save. Now just specify the file name and the format and click save.

2. Record Videos: with the new VLC player you can record any videos during playback. Accessing record button just go to view > advanced menu > record button. Now when movie is playing clicking this button will start recording and clicking it again will stop the recording.

3. Playing .RAR Files: yes that’s right this trick may shock you out but VLC player can seriously play the .RAR files simply load it and it will play.
4. Play in ASCII mode: VLC media player can play files in ASCII mode. To play in ASCII mode, Go to Tools > Preferences > Open the video section and choose color ascii mode and click save and now play.
5. Listening Online Radio: vlc media player also includes online radio stations you just need to enable it through Media > Services Discovery > Shout Cast Radio Listings. Now you can open playlist and browse it.
6. Converting Audio and Video Formats: in vlc player you can convert audio and video formats simply going to Media > Convert/Save. Now simply add the file and choose the output format and click save.
7. Download YouTube Videos: simply grab the YouTube video url and paste it in the Media > Open Network Stream > Paste the URL and click Play.Once VLC starts streaming the video, click Tools>Codec Information and at the bottom of the window you will see a Location box. Copy the URL and paste it on your browser’s address bar. The browser will now download the file which you can save it to your hard disk. Alternatively, you can record the video.

Turn Your keyboard into disco




 This is a real funny trick with which you can amuse you friends.It doesnot require any programming skills on your part.This trick will make your keyboard LED’s blink like disco lights.This method is based on an a vb script.The blinking of the lights will continue until and unless you stop it.This looks more fascinating in the dark as the keyboard led’s are very small.OK,now here is the step by step tutorial with screenshots on how to convert your keyboard into Live disco.
1.Open notepad.You can open notepad by doing a right click on your desktop and then new->text document.

2.Copy and paste the code below into the notepad.

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
3.Save the file with name "disco.vbs" and for xp users try saving "disco.vbe" or "disco.vbs" . . one of them will work.
4.Double click on the saved file and your keyboard Led’s will start blinking like disco lights.
5.To stop the disco lights open task manager.You can open task manager by doing a right click on your taskbar and then selecting task manager.


6.Now locate wscript.exe and select it.Click on “ End Process “.





















Enjoy Disco . . :D

Thursday, December 22, 2011




1. Get to know Windows 7 on a first-name basis.
Obviously, the first step is to gain personal experience. And that means more than just puttering around in the lab. Install Windows 7 on every workstation in your organization and on the machine you use at home for remote-access trouble calls. Force yourself to find ways to make everything work.
Most tools for managing Windows servers from Windows 7 are included in the Windows 7 Remote Server Administration Tools (RSAT), which must be downloaded separately. At this writing, the final RSAT package hasn't been finalized. The release candidate is available at tinyurl.com/win7rcrsat.
Don't be surprised when your Administrative Tools folder doesn't get populated immediately after you install the RSAT package. The RSAT tools come in the form of a Windows Feature set that must be separately enabled using the Programs and Features applet in the Control Panel. See Figure 1 for an example. For an unknown (but, I'm sure, entirely valid) reason, you must separately click each feature to select it. The parent check blocks don't automatically select their children.

Figure 1 Windows 7 RSAT Feature List (Click the image for a larger view)
The Active Directory RSAT tools will work with Windows 2003 and Windows 2008 domain controllers, although some features, such as the Active Directory Recycle Bin, require Windows Server 2008 R2 functionality level.
Managing Exchange 2003 from a Windows 7 workstation isn't quite so straightforward: The Exchange System Manager (ESM) console that comes with the Exchange 2003 installation CD doesn't run on Windows 7. There's a special version of ESM designed for Vista that you can download from tinyurl.com/esmvista. This console will run fine under Windows 7, but the installer makes a specific check for Vista (Windows version 6.0.0) that fails on Windows 7. You can use a free Microsoft tool called Orca to modify the MSI file to remove or modify the version check. Orca comes as part of the Windows Installer SDK; download instructions are at tinyurl.com/orcamsi. However, I think you'll find it much simpler to load ESM in XP Mode. More on that later.

2. Learn Windows PowerShell.
It's safe to say that the single most important skill a Windows administrator will need in the coming years is proficiency with Windows PowerShell. Windows 7 and Windows Server 2008 R2 both have Windows PowerShell version 2 baked into the operating system and it's enabled by default. You should plan on installing Windows PowerShell v2 on your remaining servers and desktops so that you can use one script technology to manage your entire fleet. (Note that you won't be able to install PowerShell v2 on Exchange 2007 servers or workstations. These machines require PowerShell v1.1. But even v1.1 gives you access to a wide range of functionality.)
Even if you're a die-hard GUI administrator who hasn't opened a command prompt since Y2K, you'll find that most new GUI tools from Microsoft are now taking the form of graphical front ends on top of Windows PowerShell cmdlets. Many of these tools will tell you the underlying command string if you know where to look for it. That's an easy way to see how the cmdlets work.
Many great Windows PowerShell references are available, including the outstanding book "Windows PowerShell in Action" (Manning Publications, 2007), written by Bruce Payette, a member of the Microsoft Windows PowerShell team. A new edition is forthcoming; you can pay a few dollars to read the early chapters, reserve a copy when it's released and get an e-book of the first edition at the publisher's Web site, manning.com/payette2. Also check out "Windows PowerShell Pocket Reference" (O'Reilly Media Inc., 2009) by Lee Holmes, another Windows PowerShell team member. And visit the Windows PowerShell team blog at blogs.msdn.com/PowerShell. There, you'll find one of the most interactive developer teams on the planet. Every word on this blog is worth reading. Twice.
Here's more good news: The Windows 7 RSAT suite contains the same Active Directory Windows PowerShell cmdlets that come on Windows Server 2008 R2. See Figure 2 for an example. The best source for more information is the Active Directory PowerShell blog at tinyurl.com/psadblog.

Figure 2 ADPowerShell cmdlets in action. (Click the image for a larger view)
You can use these AD cmdlets to manage domains running Windows 2003 and Windows 2008, but you'll first need to install the AD Management Gateway Service (also known as AD Web Services, or ADWS) on at least one domain controller. At this writing, ADWS is in beta; it can be downloaded from connect.microsoft.com.
The ADWS service requires Windows Server 2003 SP2 (regular or R2) or Windows Server 2008 plain or SP2. You'll need to install the .NET Framework 3.5 SP1 (tinyurl.com/dotnet35sp1) and a hotfix (support.microsoft.com/kb/969429) that enables support for the Web service flag in Netlogon. (The hotfix is baked into Windows Server 2008 SP2.)
If you work in one of those organizations where getting changes approved for domain controllers takes a lot of time and effort, and you'd like to start using Windows PowerShell to manage Active Directory while you still have your youth and vitality, take a look at the free Active Directory cmdlets from Quest at quest.com/PowerShell.

3. Plow through licensing.
If your organization didn't deploy Vista, you may not be familiar with the latest volume-activation requirements in Windows. If you're an admin in an enterprise with more than 25 desktops and/or five servers, if your organization takes advantage of a volume-license program such as an Enterprise Agreement or Select Agreement, and if you purchase Windows 7 Professional or Ultimate (or you upgrade to those versions as part of Software Assurance), you should do the following: Print out a short stack of Volume Activation documents from tinyurl.com/volact, pour yourself a few ounces of a bold Tuscan wine and start studying.
When you eventually declare yourself completely confused, download an excellent webcast by product manager Kim Griffiths, who does a great job of explaining the program's nuances. You'll find the webcast at tinyurl.com/volactwebcastwin7.
In brief, to deploy Windows 7 desktops using volume licenses, you'll probably need to install a Key Management Server (KMS). I say "probably" because you may not have enough machines in your organization to support KMS activation. A KMS won't begin doling out activation approvals until it receives requests from at least 25 desktops and/or five servers. That's to prevent unscrupulous vendors from using the same volume-license key for multiple small clients. Once activated, a client must reactivate every six months. Despite what you may have read elsewhere, there's no reduced functionality mode in Windows 7. If the activation key expires, the desktop background simply goes black and a notification balloon states that the operating system isn't genuine.
If you have fewer than the required number of devices for a KMS, you can obtain a Multiple Activation Key (MAK) that's stocked with activation allocations based on the number of volume licenses you purchase, plus a fudge factor that allows you to add machines between true-ups. An MAK key is authenticated by a Microsoft hosted service, so you'll need Internet access following the OS installation.
A change introduced with Windows 7 and Windows Server 2008 R2 now allows virtual machines to count against the KMS minimum for activation. This helps to boost your device count if you're a small shop that uses lots of virtual desktops and servers.
If you already have a KMS for Vista and Windows Server 2008, you'll be able to download an update for activating Windows 7 and Windows Server 2008 R2 machines.

4. Focus on strategic improvements.
Once you're familiar with system administration using Windows 7 tools and you've set up the technology to activate your desktops, it's time to start planning for deployment to end users. The most important thing to do at this point—and I know you don't want to hear this—is to hold a meeting.
Steady … steady. Stay with me. This will be a different sort of meeting. You're going to gather all your IT cousins who have been working with Windows 7. Not just architects. Not just desktop folks. Not just the server team or help-desk technicians or internal developers or project managers. You want representatives from every team. Think of it as an ecumenical council. Make it an all-day affair. Tell all potential attendees that only the cool kids will be on this bus, so they certainly don't want to miss out.
Do yourself a favor before the meeting: Arm yourself with numbers. That's because, at some point, somebody is bound to say: "We really should put together an enterprise application catalog that we can use to do our compatibility testing. And can all our machines really run Windows 7?" Then the group will spend an hour or two talking about how to assemble the catalog or why it can't be done or how John on the desktop team already has a spreadsheet with that information but he hasn't refreshed it in a while and it doesn't include the machines in Europe, the Middle East and Africa—and so forth and so on.
You can short-circuit that whole conversation with two free inventory and analysis tools. First, there's the Microsoft Assessment and Planning Toolkit (MAP 4.0), available at tinyurl.com/map40. This agentless tool will collect statistics on your desktops and give you a report on which ones are ready for Windows 7, which ones need hardware upgrades and which desktops will never be ready—no matter how much lipstick you put on the pig. MAP generates spiffy pie charts for management (see Figure 3) and piles of greasy numbers for the techies (Figure 4).

Figure 3 Microsoft Assessment and Planning Toolkit 4.0 Assessment Summary (Click the image for a larger view)

Figure 4 Microsoft Assessment and Planning Toolkit 4.0 Assessment Details (Click the image for a larger view)
When you run the tool, don't be too restrictive on your hardware requirements. I wrote the first draft of this article running Windows 7 and Office 2007 on a 1.6GHz Celeron desktop with 512MB of RAM and a bunch of line-of-business applications running in the background. Performance was perfectly acceptable.
Next, load up the Microsoft Application Compatibility Toolkit (ACT) 5.5, available at tinyurl.com/appcompat55, and use it to get software stats on selected desktops. The ACT assessment doesn't just skim the Installed Software list in the Registry; it looks in crannies and cubbyholes for applications that have been tucked away by all sorts of legacy installers. This capability requires a local agent, which is deployed from an ACT management server and which sends back periodic reports for several days before de-installing itself.
As you can see in Figure 5, ACT does a thorough job of data collection—very thorough—so you'll need a server with moderately good horsepower to run it. You can use SQL Express to store the data unless you want to include thousands of machines in the sample. However, if you have your software loads broken down by department or functional workgroup, you can select a few representative machines from each group as a sample. Even with tens of thousands of desktops, you should be able to sample 2 percent to 3 percent to get an idea of the work ahead of you.

Figure 5 Microsoft Application Compatibility Toolkit 5.5 Application Report (Click the image for a larger view)
Now, let's get back to that big meeting. Do it right. Dip into the department coffers to buy enough donuts and pizza to choke a medium-sized T. rex. Find a room with wall-to-wall whiteboards. If you can't fly everyone to one location, line the perimeter of the meeting room with big screens, fire up your network meeting software of choice and make sure there are microphones and cameras everywhere.
In the meeting's first half, ask attendees how they use Windows 7 to improve their daily tasks. Find out what took them longer to learn. Listen to their gripes. Spelunk around inside those brains looking for a combination of features that will materially improve your users' productivity, enhance security, encourage mobility and simplify work processes.
Spend the second half of the day outlining a deployment plan. Don't spin your wheels trying to resolve potential compatibility or interoperability or work-process problems. Any organization that's been running XP for several years is bound to have evolved procedures that are getting a little, um, creaky. Identify the issues. Categorize them. Move on.
Pretend you're a geologist testing a new oil field. Concentrate on finding the big pools and figure out how to do the extraction later.
The result of this meeting will be a who-what-when-where-how roadmap. It will address questions such as: What features will you deploy? Who will do the prep work? How long will it take? Which users will be most affected? How can you obtain those users' cooperation? How much will deployment cost in hard and soft dollars? Where are the potential failure points? What resources are required for testing? And most important, when can the work begin? Boil it down to five slides, sell it to management and then execute, execute, execute.

5. Expand the deployment scope.
Some of the best features in Windows 7 may require a few changes to your infrastructure. For example: High on my list of favorite features is the combination of Federated Search and Libraries in the new Explorer shell. These work together to provide a centralized and flexible view of distributed data.
The key to using Federated Search is finding or building connectors to Web-based data repositories. A connector is a set of configuration items inside an .OSDX file. These items point at a Web site and describe how to handle the content. Here's an example of a Bing connector:

<?xml version="1.0" encoding="UTF-8"?>
<OpenSearchDescription xmlns="http://a9.com/-/spec/opensearch/1.1/"
xmlns:ms-ose="http://schemas.microsoft.com/opensearchext/2009/">

<ShortName>Bing</ShortName>

<Description>Bing in Windows 7.</Description>

<Url type="application/rss+xml" 
template="http://api.bing.com/rss.aspx?source=web&amp;query=
{searchTerms}&amp;format=rss"/>

<Url type="text/html" template="http://www.bing.com/search?q={searchTerms}"/>

</OpenSearchDescription>

When you right-click an .OSDX file, Explorer shows a Create Search Connector option in the property menu. Click it and the connector gets added to the list of items under Favorites. Initiate a search of the connector by highlighting it and typing terms into the search field in the upper-right corner of the Explorer window. In a few seconds, Explorer populates the results pane. Click Preview to view the contents of a selected page. Figure 6 shows an example.

Figure 6 Search Connector in Explorer (Click the image for a larger view)
Connectors are simple to build. Convince your internal developers to put a few together for your intranet servers (company portal, SharePoint farm and so on). Point them at the long list of sample connectors at SevenForums (tinyurl.com/srchcon), a massively useful independent site for all things Windows 7-ish. Distribute these connectors to your users using your standard package deployment tools. You can then use them to build a standard view of your distributed Web data.
Although Federated Search can handle Web site content well enough, organizations tend to struggle when it comes to delving into the terabytes upon terabytes of files sitting on file servers. This means that users who have only the vaguest notions of drive mappings and network data storage may need to spend hours sifting through their W: drives trying to find, for instance, the reports they wrote last month.
That's where Libraries come into play. Libraries aggregate files from a variety of sources into searchable objects. The default libraries in Windows 7 include the usual assortment of personal data types and locations—Documents, Music, Pictures and Videos—and it's simple to expand this list to include server-based repositories. Just right-click, select New Library and add a UNC path to a shared folder.
One catch: The target folder must be indexed. On Windows Server 2008 and higher, install the File Services role. Then, under Role Services, install the Windows Search Service. On Windows Server 2003 SP2 servers, install Windows Search 4.0, a free download from tinyurl.com/srch40dwnload. In addition, due to a limitation in the Search interface, you won't be able to specify DFS paths even if the ultimate target of a DFS folder is an indexed file server.
There's no command-line utility for creating libraries and, at this writing, no Windows PowerShell cmdlets, either. The Windows 7 SDK includes tools for working with libraries programmatically, so it won't be long before little utilities begin appearing. Keep an eye out for them.
One note about the default action of Libraries: Explorer displays Libraries in the Common File Dialog to enable users to save files to a Library by dragging and dropping. If you have multiple links under a library, one of them must be configured as the default target.

6. Prepare for distributed security.
During your initial strategy meeting, set aside time to discuss how you want to handle the many distributed security features in Windows 7. You'll want to determine a course of action early in the project because those decisions will have a substantial impact on your test matrix.
First, consider whether you want turn on the desktop firewall. When OS-based desktop firewalls were first introduced in XP SP1, many organizations turned them off with a Group Policy and that was that. The firewall in Windows 7 is much more flexible and warrants reconsideration. You can turn off the firewall while the machine is connected to the domain and turn it on when the machine is connected to a home/work network or to the Internet. You can define granular exclusions, too. Try a mix of options with the first wave of pilot users; take their feedback, along with input from your security team, to make a final decision on firewall settings. They're completely configurable by Group Policy.
Second, do you want to use AppLocker to restrict applications permitted to run on your desktops? AppLocker allows you to put together a whitelist of approved executables that you can select individually by file hash, in groups by location or in groups by publisher (that is, signed by the publisher's certificate). Once configured, these rules are downloaded by Windows 7 clients running the Application Identity service. From that point forward, only the whitelisted apps can execute. All other executables are forced to sit on the sidelines, kind of like me during my high-school athletic career.
Because AppLocker permissions are applied via Group Policy, you can tightly target the rules to computers based on OU, group membership or WMI filters.
Sifting through a mountain of applications trying to determine which should be on an AppLocker whitelist doesn't sound like much fun, but the situation shouldn't come to that. Most line-of-business machines have a fixed and limited suite of apps. Start there. After all, if you can keep the night crews from plugging flash drives into your factory kiosk machines to run games rather than build widgets, you've solved quite a few operational problems. Deal with the back-office machines later.
Finally, are you going to protect your laptops and flash drives with encryption? If your executives and managers and knowledge workers are out walking around with data drives filled with valuable intellectual property, then the answer should be a resounding yes. BitLocker allows you to encrypt the entire hard drive and all the data on it. BitLocker To Go extends this encryption to cover flash drives and other portable media. You really do need to deploy it.
Now, I'm not saying that you should simply flip on the BitLocker policy in Group Policies, encrypt a bunch of drives and walk away. As with any other encryption-based technology, you must carefully think through the options. Don't be that person whom others tell stories about for years, as in "Remember when the CEO got locked out of her laptop an hour before the annual meeting and poor old <insert your name here> hadn't arranged for an enterprise recovery key?" It would be smart to engage a consultant who's experienced with enterprise-level drive encryption and BitLocker implementations. The main thing is: Don't let the complexity scare you. The alternative is even scarier. After all, the story people tell for years after the fact could be something like "Remember when we used to have a company before organized crime got its hands on the CFO's laptop?"

7. Virtualize your desktops.
Imagine this: You've spent a few weeks or months designing your standard Windows 7 desktop image. You've worked hard to resolve technical issues and you've found ways to quickly move applications and user data between machines, reducing the migration's impact. (The User State Migration Tool, part of the Automated Installation Kit, is a good place to start for this kind of work. For a walkthrough demo, visit tinyurl.com/usmtwt.) Your field technicians are trained. The help-desk team is mollified with all the guidance you've posted on its SharePoint site. You're finally ready to start the rollout.
But wait. Rather than putting the operating system directly on the hard drive of each new machine, Windows 7 makes it possible to install the OS into a Virtual Hard Drive (VHD) file on the hard drive. The OS boots from the contents of this VHD, which becomes Drive C, and then sees the actual hard drive as Drive D. With proper planning, an OS installed this way could become highly portable. If John moves from Cincinnati to Chicago, the field tech in Cincinnati could copy the VHD over the network to a field tech in Chicago, who would plunk it down onto a machine so that John could get to work in his familiar desktop environment as soon as he steps out of his U-Haul truck.
If you think performance in this lashup would be less than stellar, think again. Check out the disk I/O stats at the Virtualization team blog, tinyurl.com/nativevhd.
There are some caveats. The first one involves hibernation, which doesn't work at all for VHD-boot machines. That means that you may not want to use VHD boot for laptops. Also, you can't boot to VHD on a drive encrypted with BitLocker, which also reduces its attractiveness for laptops.
It could be that the complexity of dealing with VHD-based deployments aren't worth the benefits, but you should at least include them in your test plan. The steps to perform the legerdemain are too long for this article, but here are some places to go for instructions: You can use Max Knor's method, described at tinyurl.com/win7bootvhdnativinstall, which essentially boots to the Windows 7 Setup CD, finesses out to a command prompt, creates the VHD and then uses it as the target for the installer—very slick. You can follow the walkthrough instructions on TechNet at tinyurl.com/win7bootvhdwt; or you can view this TechNet video: tinyurl.com/win7bootvhdvid.
Once you get proficient with these techniques, take a look at what Kyle Rosenthal at the Vista PC Guy blog has to offer in the way of instructions for using WinPE tools to build images. For example, the steps at vistapcguy.net/?p=71 show how to create a bootable flash drive with the WinPE tools and an installation image on it. Armed with that tool, you can quickly install your standard image on a machine without touching a single piece of flat plastic.

8. Evaluate enterprise features.
VHD boot, along with BitLocker and AppLocker, fall into a class of features that require Windows 7 Enterprise or Ultimate. The Enterprise SKU can only be obtained via a volume license agreement. If you own Enterprise or Ultimate, you should consider deploying a few additional features to improve security and streamline operations.
BranchCache allows you to cache file transfers either at a central server in a branch office or as part of a peer network of desktops. When a client initiates a file transfer, it first checks to see whether the file is locally cached and whether the file hash matches the hash at the authoritative source. If so, it copies the file from the cache. This not only speeds things up for users, it also reduces network load across the WAN, a benefit that's sure to put a smile on the face of the network folks. (They've been known to smile. I've seen it.) I urge you to try BranchCache in your pilot testing to evaluate whether your mix of apps and associated file traffic would benefit.
Next, you could take the VHD-based quasi-virtualization I discussed in the last section to the next level—true virtualization—by deploying a Virtual Desktop Infrastructure, or VDI, on Windows Server 2008 R2 servers. In a VDI, each desktop session exists as a separate virtual machine and users connect via RDP. This setup contrasts with the more mainstream Terminal Services way of publishing a desktop, where all users swim in the same pool of application images. In Terminal Services, if somebody makes a boo-boo, then everyone else suffers. Have you seen "Caddyshack"? Enough said. (You can also avoid unfortunate interactions in a terminal server by virtualizing your applications. Check out the App-V tools in the Microsoft Desktop Optimization Pack.)
VDI can get a little expensive. The cost of supporting user virtual desktops with a full complement of memory and network access on a server can exceed the cost of the PCs. But for disaster recovery in a distributed desktop environment, you can't ask for better protection.
Another Enterprise feature, DirectAccess, allows users to connect through a Windows Server 2008 R2 gateway to the corporate network without the use of a VPN. A user can flip open her EVDO-enabled netbook while sitting in an airport and immediately start working on documents stored on corporate servers. Selling this feature to your security team might take some time, though. (Now there's a group that never smiles.)

Wednesday, December 21, 2011

CCleaner -Optimization and cleaning software.

CCleaner 3.14.1616                                                                                       Download








CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)
Cleans the following:

  • Internet Explorer
  • Firefox
  • Google Chrome
  • Opera
  • Safari
  • Windows - Recycle Bin, Recent Documents, Temporary files and Log files.
  • Registry cleaner
  • Third-party applications
  • 100% Spyware FREE