This blog has moved to its own domain. Please visit Ashwin's Blog for the all-new Ashwin's Tech Blog and bookmark it. The new site has much more content and some new sections, and you can read about them here and here. You can subscribe to full RSS feeds of all the sections from here. This blogspot site will no longer be updated, except in case of emergencies, if the main site suffers a prolonged outage. Thanks - Ashwin.

Saturday, May 27, 2006

Call for Action against Reservation

A Call for action against reservation. Here is a piece of my support. You too can support the Mumbai Youth For Equality. And keep yourself updated through this website.


Thursday, May 18, 2006

Microsoft announces Windows Vista Hardware requirement

Microsoft has released two sets of Hardware requirements for Windows Vista. They are Windows Vista Capable and Windows Vista Premium

A new PC that carries the Windows Vista Capable PC logo can run Windows Vista. All editions of Windows Vista will deliver core experiences such as innovations in organizing and finding information, security, and reliability. All Windows Vista Capable PCs will run these core experiences at a minimum. Some features available in the premium editions of Windows Vista—like the new Windows Aero user experience—may require advanced or additional hardware.

A Windows Vista Capable PC includes at least:

  • A modern processor (at least 800MHz1).
  • 512 MB of system memory.
  • A graphics processor that is DirectX 9 capable.

Windows Vista Premium Ready PCs
To get an even better Windows Vista experience, including the Windows Aero user experience, ask for a Capable PC that is designated Premium Ready, or choose a PC that meets or exceeds the Premium Ready requirements described below. Features available in specific premium editions of Windows Vista, such as the ability to watch and record live TV, may require additional hardware.

A Windows Vista Premium Ready PC includes at least:

  • 1 GHz 32-bit (x86) or 64-bit (x64) processor1.
  • 1 GB of system memory.
  • A graphics processor that runs Windows Aero2.
  • 128 MB of graphics memory.
  • 40 GB of hard drive capacity with 15 GB free space.
  • DVD-ROM Drive3.
  • Audio output capability.
  • Internet access capability.

You can read all of the Windows Vista Capable footnotes here.

You can review the Windows Vista Minimum Supported System Requirements here.

WindowsMarketplace has a selection of Windows Vista Capable and Premium Ready PCs that are available today.

Windows Vista enterprise hardware planning guidance is available on TechNet.


Get Ready Now!


Wednesday, May 17, 2006

Windows Media Player 11 released

Download the beta version of Windows Media Player 11. This version of Windows Media Player will be shipped with Windows Vista and other OS's. Find your experiences on Vista
With this you can try a new digital music service "URGE" by the MTV networks
Here is a good review by CNet.com


Tuesday, May 16, 2006

Test

I cannot view my blogs !!! This is a Test.
I have screwed up my previous template :(( So heres a change in template.


Monday, May 15, 2006

Smiley to be patented.... :(

You may have loved using the symbol with the colon and the right closing bracket that formed to be a smiley and may have been using it in almost every chat messages or in mail basically symbolizing to smile and share your happiness with all.
Things may now go the other way ie., :( coz the smiley Wal-Mart Inc. is now out to patent the symbol.

Wal-Mart Stores Inc., which uses a yellow happy face to try to put its shoppers in a carefree mood, is saying — with a straight face — that it has exclusive rights to the familiar image, at least among retail department stores.

The world's largest retailer is fighting a French native who has earned millions in licensing fees on smiley's back since the early 1970s, when he began securing trademarks for the happy face around the world.
Read More:
Wal-Mart Vies for Right to Put On a Happy Face on LA Times

Quoted from Slate.com:
Have A Nice Day, See You In Court: Although Wal-Mart claims exclusive rights to use "Mr. Smiley," its smiley-face logo, in connection with retail, the company's claim is being challenged by a Frenchman who holds trademarks on the smiley-face in over 80 countries, the LAT reports. Franklin Loufrani has "applied for a trademark in 16 categories that would have granted him rights to smiley on products including depilatory wax, swords—'a smiley on that would be very disarming,' his lawyer said—and even animal semen."
Wal-Mart seeks smiley face rights on BBC


Sunday, May 14, 2006

Shutdown your Windows XP computer by just sending an SMS

When was the last time you forgot to shutdown your computer before you leave your desk? Or had to rush immediately and therefore did not shutdown? No matter what now. Shutting down your computer has just got easier. Thanks to the mobile services and SMS.
Tim Matheson explains How to remote shutdown your Windows XP machine with a text message and Outlook.
Basically you setup a rule in outlook to look for say a keyword in the subject line of an email. Then you select run application as the action for when that keyword is found. Then all you have to do is write a simple dos batch file and use the shutdown command with the -f parameter to ensure the shutdown is not aborted by any running applicatios. After that the rest is simple you simply send a sms text message from your cell phone or other source to your email address.
You must have autmotic send and recieve turnned on for this to work. Outlook Rules wizard also allows you to run a script. Learn: How to create a script for the Rules Wizard in Outlook
Simple isn't it? So get started now. But do not play mischief with your friends computer ;)


Friday, May 05, 2006

"Monad" now "Windows PowerShell"

Windows PowerShell, formerly known as Monad is a new command-line shell and task-based scripting technology that provides comprehensive control and automation of system administration tasks. Windows PowerShell allows Windows administrators to be more productive by providing numerous system administration utilities, consistent syntax, and improved navigation of common management data such as the registry or Windows Management Instrumentation (WMI). Windows PowerShell also includes a scripting language which enables comprehensive automation of Windows system administration tasks. The Windows PowerShell language is intuitive and supports existing scripting investments. Exchange Server 2007 and System Center Operations Manager 2007 will be built on Windows PowerShell.

Official PowerShell Website

TechNet resources on the new PowerShell ScriptCenter

PowerShell Blog

PowerShell News Group

Download the refreshed Windows PowerShell RC1


Wednesday, May 03, 2006

Microsoft Security Resource Guide

Tools

Microsoft Baseline Security Analyzer (MBSA)
Use this tool to identify common security misconfigurations and missing security updates.
MBSA runs on the Windows Server™ 2003, Windows® 2000, and Windows XP operating systems and will scan for vulnerabilities in multiple products and technologies, including Microsoft Internet Information Services (IIS) and SQL Server™.

Software Update Services (SUS) / Windows Update Services (WUS)
Quickly and reliably deploy the latest security updates, and service packs with Software Update Services. This new site now has the latest info on WUS.

Windows Update
Scans your computer and provides a selection of updates tailored for your operating system, software, and hardware.

Microsoft Office Product Updates
Scans and updates Microsoft Office products.

IIS Web Server Lockdown Wizard
Reduces the attack surface of Internet Information Services (IIS) and includes URLScan to provide multiple layers of protection against attackers.

UrlScan Security Tool
Helps prevent potentially harmful HTTP requests from reaching IIS Web servers.

Removal Tools:

Mydoom, Zindos and Doomjuice worms
Blaster Removal Tool for Windows XP and 2000
Sasser (A-F) Worm Removal Tool
MS04-028 Enterprise Scanning Tool

Other Tools:

http://www.microsoft.com/technet/security/tools/default.mspx
Security Risk Self-Assessment for Midsize Organizations

Updating

Understanding Update Management: Microsoft’s Software Update Strategy
Updated white paper talks about the need for strong update management process.
Other Update Management info in the TechNet Topics Page

Isolation and Resiliency
Listing of resources for the IT Pro to evaluate and deploy XP SP2
Network Access Protection
Internet Security and Acceleration (ISA) Server 2004 whitepapers updated
Read about secure remote Outlook access in the Unique Protection for Microsoft Exchange Server whitepaper, a very viable business scenario with ISA Server

Engineering Excellence

Trustworthy Computing: Security
Whitepapers on Security Enhancements:
Describes the Trustworthy Computing initiative as applied to the Windows Server, Office 2003 and Exchange Server 2003 development processes respectively.
Windows Server 2003
Office 2003
Exchange Server 2003
Get the Facts:
Windows and Linux
SQL

Guidance and Training

Security Guidance Centers on Microsoft.com
Worldwide

Prescriptive guidance to help provide defence-in-depth security.
E-Learning Security Training
E-Learning self-paced clinics - 4 Developer and 8 ITPro modules
Now available in French, German, Spanish and Japanese
XP SP2
Security Guidance Kit CD (now shipping in US and Canada)
CD-ROM with tools, templates, and how-to guides
Microsoft IT Security Showcase
An insider view into Microsoft's process of deploying, and managing its own enterprise solutions.
Security Newsletter
Register for our free monthly e-mail newsletter that's packed with security news, guidance, updates, and community resources to help you protect your network.
Security Program Guide: Events and Training Information
Events, webcasts and training ivailable for both IT Professionals and Developers.
US Security Summit Keynote and Training Content
Security Notifications via e-mail
Sign up today to get e-mail alerts when an important security bulletin or virus alert has been released.
Security Update RSS Feed
Security Bulletin Search Page
Search on product, technology or KB article
Security Bulletin Webcast
Join Microsoft experts on the day after bulletin announcements to get the latest information and have the opportunity to ask questions.
How to Tell If a Microsoft Security-Related Message Is Genuine
Writing Security, 2nd edition
Best practices for writing Security and stopping malicious hackers.
Building and Configuring More Secure Web Sites
Best Practices used at OpenHack.
Recent Security Guidance Center additions:
Windows XP Guide, includes SP2
New Security Risk Management Guide
Windows NT 4.0 and Windows 98 Threat Mitigation Guide
Microsoft Identity and Access Management Series
Antivirus Defense-in-Depth
Securing Wireless LANs with PEAP and Passwords
Small Business Guidance

Guidance specifically for the smaller business
Configuring Windows XP 802.11 Wireless Networks for the Home / Small Business

Consumer Information:
http://www.microsoft.com/security/protect
http://www.microsoft.com/athome/security/default.mspx
Newsletter for home users
Security bulletin notifications for home users

More

Prescriptive Guidance, More Prescriptive Guidance
TechNet Security Guidance
How MSFT implement a secure infrastructure
Online recordings of top infrastructure speakers
Network Segmentation via IPsec
Reduce your attack surface via SCW
Secure your wireless network
Network Quarantine
Network Access Protection
Microsoft Security Response Center (MSRC)
The Microsoft Security Response Center (MSRC) blog
“Security Matters” Blog !
Microsoft Security Advisories
Microsoft Security Bulletins
Security Notification Services (regular and comprehensive)
Monthly Security Bulletin webcast
Windows Vista Security
Windows System Center Certificate Lifecycle Manager Beta 1
Microsoft Antigen and FrontBridge
Microsoft Exchange Hosted Services
ISA Server 2006 Beta
Network Access Protection – Overviews and Related Technologies
Securing Wireless LANs with Certificate Services
“Securing Wireless LANs with PEAP and Passwords”
WPA Wireless Security for Home Networks
“Advantages of Protected Extensible Authentication Protocol (PEAP)”
Security of the WEP Algorithm
IEEE 802.11 Wireless LAN Security with Microsoft Windows XP – Document Download

Tools for scanning for and dealing with rogue Wireless Access Points:
AirDefense Enterprise
AirMagnet Enterprise

CAPICOM – Platform SDK Redistributable Tool Download
PKI Enhancements in Windows XP Professional and Windows Server 2003

Windows Security Logging and Other Esoterica

The Security Monitoring and Attack Detection Planning Guide

Some presentation files from Microsoft UK technet InfoSecurity events

Reference Books:
Microsoft Windows Security Resource Kit v2.0 (ISBN: 0-7356-2174-8)
Implementing and Administering Security in a Microsoft Windows Server 2003 Network
Microsoft Preparation Guide for 70-299
Designing Security for a Microsoft Windows Server(TM) 2003 Network
Microsoft Preparation Guide for 70-298

Where can you get more information than on the Microsoft website?

Here are few other websites worth visiting!
WindowsSecurity.com
Howard, John D. “A Common Language for Computer Security Incidents” 1998. (PDF File)
The Bad Boys of Cyberspace
Great Security and Incidence Response Book Titles
CERT’s Virtual Training Environment (VTE): Link 1 and Link 2
Computer Emergency Response Team (CERT)
National Institute of Standards and Technology (NIST)
Computer Security Incident Handling Guide (PDF File)
Forum of Incident Response and Security Teams
SysInternals (Freeware utils AutoRuns, PSList, etc.)
Uninformed.org


Monday, May 01, 2006

Understanding Domain Trusts

Creation of Trusts:-
Trusts are created in 2 ways:
  1. Explicitly (Manually)
  2. Implicitly (Automatically)

Transitivity of Trusts:-
  1. Transitive
  2. Non Transitive
1. Transitive Trust:-

Domain A trusts Domain B,
Domain B trusts Domain C,
Then, Domain C trusts Domain A

2. Non – Transitive Trust:-Domain A trusts Domain B

Domain B trusts Domain C
There is no trust relationship between Domain A and Domain C

Direction of Trust:-
  1. One Way
  2. Two Way
1. One Way:-

This is a single trust relationship where only Domain A trusts Domain B
One way relationship may be either Transitive or Non Transitive depending on the type of trust that is created.

2. Two Way:-

In this method the trust is in both ways. Domain A trusts Domain B and Domain B trusts Domain A (vice versa)
The authentication request passes in both ways.

Forms of Trust:-
  1. Tree – Root
  2. Parent – Child
  3. Shortcut Trust
  4. External Trust
  5. Forest Trust
  6. Realm Trust
1. Tree - Root:-

A Tree – Root trust is:
Implicitly created,
Transitive
Two Way

2. Parent – Child

A Parent – Child trust is:
Implicitly created
Transitive
Two Way

3. Shortcut Trust:

Explicitly created
Transitive,
One Way or Two Way

This is used to improve user logon times between 2 domains in the same forest

4. External Trust:

Explicitly created
Non Transitive,
One Way or Two Way

This is created between domains in the different forests or
Between Windows Server 2003 domain and a domain running under Windows NT or earlier versions of Windows
This is used when users require access to resources in Windows NT domain or with separate forest.

5. Forest Trust:-

Explicitly created,
Transitive between 2 forests only ; Non Transitive across 3 or more forests,
OneWay or Two Way

6. Realm Trust:-

Explicitly created,
Non-transitive,
One Way or Two Way

This trust is created between a non-Windows Kerberos realm and a Windows Server 2003 domain




«           *           »

About me

  • I'm Ashwin Kini
  • From Mumbai, Maharashtra, India
My profile



Locations of visitors to this page

Enter your email address:




Add to Google

Subscribe in NewsGator Online

Subscribe in Rojo

Add Ashwin's Blog to Newsburst from CNET News.com

Add to My AOL

Subscribe in FeedLounge

Add to netvibes

Subscribe in Bloglines

Subscribe with Bloglines

Add to Bitty Browser

Add to Plusmo

Subscribe in NewsAlloy

Add Ashwin's Blog to ODEO

Subscribe in podnova

iPing-it!

Creative Commons License

Firefox 2

Firefox Flicks!

Get Thunderbird!

Get Firefox!

Firefox 2

My Blog at Adoppt
Powered by Blogger
 

india