Posts

Decrypter for Locky and TeslaCrypt ransomwae Virus

Image
How do I clean a TeslaCrypt infection using the ESET TeslaCrypt & locy ransomware decrypter? Your personal files became encrypted and the following information may be displayed in your computer, or in a .txt, .html or .png file ​ our ESET product detects the infection Win32/Filecoder.TeslaCrypt   How to decrypt your files using the ESETTeslaCryptDecryptor.exe tool Details Solution Download the ESETTeslaCryptDecryptor.exe tool and save the file to your Desktop.   Click Start → All Programs → Accessories , right-click Command prompt and then select Run as administrator from the context menu. Windows 8 / 8.1 / 10 users : press the Windows key + Q to search for applications, type Command prompt into the Search field, right-click Command prompt and then select Run as administrator from the context menu.   Type the command cd %userprofile%\Desktop

Google Apps for Work.

Image
Google Apps for Work. Here are three reasons to give it a try: You can get customised email and more with Gmail for work. It helps employees get things done while collaborating more quickly and efficiently. Millions of businesses, large and small, have already made the switch. Get all of these tools in the Google Apps suite for Rs. 150 /user/month. Google Apps for Work. ​ Get a Free trail

What is a common security feature that often relies on a mobile phone to verify an account when logging in?

Image
  ​ What is a common security feature that often relies on a mobile phone to verify an account when logging in? Texting Two-Factor Authentication Mobile Code QR Code Explanation Two-factor authentication (also known as 2FA or 2-Step Verification) is a technology patented in 1984 that enables confirmation of a user's claimed identity by using a combination of two different components. These components are usually a password and username as well as something that only that user would have immediately at hand, like their mobile phone. Using a username and password together with a piece of information that only the user knows makes it harder for potential intruders to gain access and steal that person's personal data or identity.        

IP Address Automation

Image
IP Address Automation Autohotkey Script  UrlDownloadToFile, https://api.ipify.org/ , %temp%\Ip.txt Fileread, Ipaddress, %temp%\Ip.txt Gui, Font, S16 CDefault, Verdana Gui, Add, Text, x12 y49 w100 h30 , Public IP Gui, Add, Edit, x122 y49 w220 h30 vIpaddress, %ipaddress% Gui, Add, Text, x352 y49 w50 h30 vTXT, UP Gui, Add, Text, x12 y89 w100 h30 , Local IP localip:=A_ipaddress1 Gui, Add, Edit, x122 y89 w220 h30 vlocalip,%localip% Gui, Show, x608 y329 h183 w432, Pro_IPCheckerV1 return GuiClose: ExitApp    IP automation links https://wtfismyip.com/text https://api.ipify.org/

Active Directory Q& A

Image
Q: ​What is global catalog and why is it important​ ?  ​ Ans: Global Catalog  Servers contain a partial replica for every object in Active Directory. A  Global Catalog Server is used to find objects in any domain in the forest. Any Domain Controller can be made into a Global Catalog  Server. Q: what does system state backup contain Ans:  The system state contains a number of items: System Registry COM + Database Certificate Services Active Directory SysVol IIS Metabase Some of these items are only included if the specified service is installed (AD, IIS, Certificates). (Details are online. TechNet:  Server 2003/2003R2 . MSDN:  Server 2003/2003R2 .TechNet forums: Server 2008 . MSDN:  Server 2008 and upwards ) If you need to restore a server, you will need this state to recover the registry, or your AD Domain, or IIS sites. You can restore system state to the same server, or another server with identical hardware. Microsoft does not support restor

Find Manufacturer from MAC address

Image
  I ts was very difficult when the IP goes Conflict and we are having only the MAC Address of the conflict system. From find finding MAC address vendor we can have an idea what system would be like For Sharp, Canon, or like Brother we can identify it's for a printer. Matrix like it's for a EPBX system, for Samsung we can think may it will be Mobile or Camera. The Standard for the MAC address is below MA-L: IEEE MAC Address Large (24-bit block size) MA-M: IEEE MAC Address Medium (28-bit block size) MA-S: IEEE MAC Address Small (36-bit block size) OUI24: Organizationally Unique Identifier (24-bit block size) OUI36: Organizationally Unique Identifier (36-bit block size) IAB: Individual Address Blocks (36-bit block size) CID: Company ID Blocks (24-bit block size) EUI48: Extended Unique Identifier (48-bit block size) Helpful link to find out the manufacturer vendor from the MAC address Macvendors.c

India ranked No 4 among countries that clicked on malicious links last year

Image
India ranked No 4 among countries that clicked on malicious links last year Soure: .techradar.com Malicious code or links are available practically everywhere on the internet. Sometimes they're masked so well that users can easily get fooled by it. So it's no surprise that a large number of the users who clicked on the malicious links come from India. A new report by Trend Micro has revealed that Indians rank at No 4 among countries that click on these malicious links the most. The United States is in the first place at 34%, while Japan takes the 2nd spot at 20%. Australia and Taiwan are tied at the third place with about 4% of their users said to be falling prey to malicious links, while India, China, Germany and France are tied for the fourth place at 3%.  Read More..

Configure SNMP in SonicWALL device

Image
Configure SNMP in SonicWALL device Article Applies To: Gen6 SM E10000 series: NSA E10800, NSA E10400, NSA E10200, NSA E10100 Gen6 SM 9000 series: NSA 9600, NSA 9400, NSA 9200 Gen6 NSA Series: NSA 6600, NSA 5600, NSA 4600, NSA 3600, NSA 2600 Gen5 NSA E-Class series: NSA E8510, E8500, NSA E7500, NSA E6500, NSA E5500 Gen5 NSA series: NSA 5000, NSA 4500, NSA 3500, NSA 2400, NSA 2400 MX, NSA 240, NSA 220, NSA 220 /W. NSA 250M, NSA 250M /W. Gen5 TZ Series : TZ 215, TZ 215 W, TZ 210, TZ 210 W,  TZ 205, TZ 205 W, TZ 200, TZ 200 W, TZ 105, TZ 105 W, TZ 100, TZ 100 W Firmware/Software Version: SonicOS   (5.9 & above) and SonicOS (6.1 & above) Services: SNMP Traffic Feature/Application: SNMP (Simple Network Management Protocol) is a network protocol used over User Datagram Protocol (UDP) that allows network administrators to monitor the status of the SonicWALL security appliance and receive notification of critical events as they occur on the network

How Backup configuration Sonicwall Firewall

Image
How to Save a Backup Copy of Your Configuration Preferences (Current Settings) Article Applies To:   SonicWALL Security Appliance Platforms:   Gen6 SM E10000 series : NSA E10800, NSA E10400, NSA E10200, NSA E10100 Gen6 SM 9000 series : NSA 9600, NSA 9400, NSA 9200 Gen6 NSA Series: NSA 6600, NSA 5600, NSA 4600, NSA 3600, NSA 2600 Gen5: NSA E7500, NSA E6500, NSA E5500, NSA 5000, NSA 4500, NSA 3500, NSA 2400, NSA 240 Gen5 TZ Series: TZ 100, TZ 100W, TZ 200, TZ 200W, TZ 210 and TZ 210W. Gen4: PRO series: PRO 5060, PRO 4100, PRO 4060,PRO 3060, PRO 2040, PRO 1260 Gen4 TZ series: TZ 190, TZ 190 Wireless, TZ 180, TZ 180 Wireless, TZ 170, TZ 170 Wireless, TZ 170 SP, TZ 170 SP Wireless, TZ 150, TZ 150 Wireless, TZ 150 Wireless (RevB) Firmware versions:  All Gen 6, Gen 5 and Gen 4 firmware versions (SonicOS Standard and Enhanced) Video Tutorial:  Click here  for the video tutorial of this topic Question/Topic: Be

Lava launched Budgeted Smartphone Lava A79 @ Just Rs 5,699

Image
Lava launched Budgeted Smartphone Lava A79  @ Just Rs 5,699        LAVA on Wednesday announced the launch of Lava A79 smartphone at a price of just Rs 5,699. With a 5.5" large screen, Lava A79 is powered with a 1.2 GHz quad-core processor with 1GB RAM, coupled with 8 GB storage that can be expanded up to 32GB via external microSD card. The handset comes with 5MP Rear Camera with Flash and 2 MP Front Camera with flash that helps to capture selfies even in low light. Additionally, the smartphone provides HD video recording and Digital Zoom with HDR and Photo Timer Grid. The 3G-enabled dual SIM smartphone runs on Android Lollipop 5.1 operating system, with standard Android user interface, making it a complete power-packed device. It reinforces Lava's expertise in innovation - featuring Smart Screen Gestures, Smart Music and Video PIP.

How to Rollback from Windows 10 to previous version of Windows

Image
  How to Rollback / Downgrade from Windows 10 to previous version of Windows ​ Symptom : When weupgraded your computer to Windows 10 and would like to rollback your operating system to its previous version due to compatibility issues, technical issues, or personal reason, please follow the detail instructions below : Solution : 1. Microsoft gives you 30 days from the day you upgraded to Windows 10 to roll back to your previous version of Windows. 2. Before you do so, however, it's a good practice to back up your data, even though it will remain intact for this method of roll back 3. From the Windows 10 Start Menu, click on Settings. > Update and Security 4. Click on 'Recovery ' 5. Under Go Back to Windows X (where "X" is the version of your previous Windows prior to upgrading to Windows 10), click on Get Started. Note: If you don't see go back to xxx version then you might have passed the 30 days gr

Active Directory Health Check

Image
Active Directory helpful Command   Events View Check event log in all DCs to find everything ok specifically DNS, system and Application events. Dcdiag.exe This is a must and will always tell you if there is trouble with DCs and/or services associated with it Netdiag.exe This will let me know if there are issues with the networking portion on the DC. Netsh dhcp show server This command identify DHCP in in AD infrastructure. Repadmin /showreps This shows all replication among DCs. repadmin /replsum /errorsonly reapadmin /syncall /AdeP This will identify any issues with replication among DCs. Active Directory DNS Check Dnslint /ad domain_controller_ip_address /s dns_server_ip_address Reference ..

Trust relationship error in AD - Fix

Image
The trust relationship between this workstation and the primary domain failed" The netdom command http://support.microsoft.com/k... At a command prompt on the workstation giving the error, type the following command: ð netdom resetpwd /s:server /ud:domain\User /pd:* A description of this command is: /s:server is the name of the domain controller to use for setting the machine account password. This is the server where the KDC is running. /ud:domain\User is the user account that makes the connection with the domain you specified in the /s parameter.  This must be in domain\User format. If this parameter is omitted, the current user account is used. /pd:* specifies the password of the user account that is specified in the /ud parameter. Use an asterisk (*) to be prompted for the password.

Best Smart Phone Under 5000

Image
Android Smartphone under Rs. 5000 with competitive config 1)  Switel S53d Rs. 3,090 on Flipkart.com Key Features 5 inch HD Display 8 MP | 2 MP Cameras 8 GB Internal Memory 1 GB RAM & QUAD Core Free 8GB Memory Card 3G & Wifi Large Battery Android OS Dual Sim Standby Specifications of Switel S53d (Black, 8 GB) GENERAL FEATURES Brand Switel Handset Color Black Business Features Document Viewer, VOIP Support, Pushmail, Easy Touch, Smart Somatosensory, Curved and Streamlined Design For Excellent Grip, Scratch Resistant Polycarbonate Material Cover, Magnesium Aluminium Alloy Structure for Extra Shock Protection, Big Screen, Convenient Size, Battery Efficient Cortex A7, HD Aud... View More Keypad Yes SIM Size Micro SIM Call Features Conference Call, Speed Dialing, Hands Free, Call Timer, Call Divert Model