Posts

Showing posts from June, 2016

Decrypter for Locky and TeslaCrypt ransomwae Virus

Image
How do I clean a TeslaCrypt infection using the ESET TeslaCrypt & locy ransomware decrypter? Your personal files became encrypted and the following information may be displayed in your computer, or in a .txt, .html or .png file ​ our ESET product detects the infection Win32/Filecoder.TeslaCrypt   How to decrypt your files using the ESETTeslaCryptDecryptor.exe tool Details Solution Download the ESETTeslaCryptDecryptor.exe tool and save the file to your Desktop.   Click Start → All Programs → Accessories , right-click Command prompt and then select Run as administrator from the context menu. Windows 8 / 8.1 / 10 users : press the Windows key + Q to search for applications, type Command prompt into the Search field, right-click Command prompt and then select Run as administrator from the context menu.   Type the command cd %userprofile%\Desktop

Google Apps for Work.

Image
Google Apps for Work. Here are three reasons to give it a try: You can get customised email and more with Gmail for work. It helps employees get things done while collaborating more quickly and efficiently. Millions of businesses, large and small, have already made the switch. Get all of these tools in the Google Apps suite for Rs. 150 /user/month. Google Apps for Work. ​ Get a Free trail

What is a common security feature that often relies on a mobile phone to verify an account when logging in?

Image
  ​ What is a common security feature that often relies on a mobile phone to verify an account when logging in? Texting Two-Factor Authentication Mobile Code QR Code Explanation Two-factor authentication (also known as 2FA or 2-Step Verification) is a technology patented in 1984 that enables confirmation of a user's claimed identity by using a combination of two different components. These components are usually a password and username as well as something that only that user would have immediately at hand, like their mobile phone. Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person's personal data or identity.        

IP Address Automation

Image
IP Address Automation Autohotkey Script  UrlDownloadToFile, https://api.ipify.org/ , %temp%\Ip.txt Fileread, Ipaddress, %temp%\Ip.txt Gui, Font, S16 CDefault, Verdana Gui, Add, Text, x12 y49 w100 h30 , Public IP Gui, Add, Edit, x122 y49 w220 h30 vIpaddress, %ipaddress% Gui, Add, Text, x352 y49 w50 h30 vTXT, UP Gui, Add, Text, x12 y89 w100 h30 , Local IP localip:=A_ipaddress1 Gui, Add, Edit, x122 y89 w220 h30 vlocalip,%localip% Gui, Show, x608 y329 h183 w432, Pro_IPCheckerV1 return GuiClose: ExitApp    IP automation links https://wtfismyip.com/text https://api.ipify.org/

Active Directory Q& A

Image
Q: ​What is global catalog and why is it important​ ?  ​ Ans: Global Catalog  Servers contain a partial replica for every object in Active Directory. A  Global Catalog Server is used to find objects in any domain in the forest. Any Domain Controller can be made into a Global Catalog  Server. Q: what does system state backup contain Ans:  The system state contains a number of items: System Registry COM + Database Certificate Services Active Directory SysVol IIS Metabase Some of these items are only included if the specified service is installed (AD, IIS, Certificates). (Details are online. TechNet:  Server 2003/2003R2 . MSDN:  Server 2003/2003R2 .TechNet forums: Server 2008 . MSDN:  Server 2008 and upwards ) If you need to restore a server, you will need this state to recover the registry, or your AD Domain, or IIS sites. You can restore system state to the same server, or another server with identical hardware. Microsoft does not support restor

Find Manufacturer from MAC address

Image
  I ts was very difficult when the IP goes Conflict and we are having only the MAC Address of the conflict system. From find finding MAC address vendor we can have an idea what system would be like For Sharp, Canon, or like Brother we can identify it's for a printer. Matrix like it's for a EPBX system, for Samsung we can think may it will be Mobile or Camera. The Standard for the MAC address is below MA-L: IEEE MAC Address Large (24-bit block size) MA-M: IEEE MAC Address Medium (28-bit block size) MA-S: IEEE MAC Address Small (36-bit block size) OUI24: Organizationally Unique Identifier (24-bit block size) OUI36: Organizationally Unique Identifier (36-bit block size) IAB: Individual Address Blocks (36-bit block size) CID: Company ID Blocks (24-bit block size) EUI48: Extended Unique Identifier (48-bit block size) Helpful link to find out the manufacturer vendor from the MAC address Macvendors.c