Tuesday, May 19, 2009

Tuesday, March 10, 2009

Saturday, February 28, 2009

Analyze Security Descriptors with searchSd    Download the code for this article: searchSd.exe (126KB)

Thursday, February 26, 2009

run .msi files as admin

If you are using Vista with UAC enabled, you may have noticed that some existing MSI packages may not install as expected.
Here's a fix.
The reason is because Windows Installer by default doesn't elevate to higher privileges until it is about to actually start doing work in the install sequence.
The attached .REG file adds a "Run as administrator" option to the context menu for .MSI files. This forces an elevation prompt before the .MSI is run so the entire install session is run with elevated privileges.

this dose not seem to work with .msi's living on network drives once moved to a local drive life is fine

getip




====================== ie progress msg/bar ==================







===================== network adaptot settings=================


Assign a Static IP Address
Assign the DNS Domain for a Network Adapter
Assign the WINS Server for a Network Adapter
Enable Dead Gateway Detection for All Network Adapters
Enable DHCP
Enable DNS on All Network Adapters

Enable WINS for All Network Adapters

. Send an empty array to the settings
errWins = objitem.SetWINSServers()

This eliminates the servers.


Sample scripts for configuring TCP/IP settings (IP address, DNS Server, WINS Server, etc.) on client computers.


Retrieving Network Configuration Information

Sample scripts for retrieving information about TCP/IP settings on client computers.






'==========================================================================
'
' VBScript Source File -- Created with SAPIEN Technologies PrimalScript 2007
'
' NAME: getGatewayAD
'
' AUTHOR: mmccafferty1 , pps
' DATE : 3/3/2009
'
' COMMENT:
'
'==========================================================================

Sub getGatewayAD()

Set objShell = CreateObject("WScript.Shell")
Set objWshScriptExec = objShell.Exec("ipconfig /all")
Set objStdOut = objWshScriptExec.StdOut
Set objRegEx = CreateObject("VBScript.RegExp")

objRegEx.Global = True
objRegEx.Pattern = "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}"


While Not objStdOut.AtEndOfStream
strLine = objStdOut.ReadLine
Set colMatches = objRegEx.Execute(strLine)

If InStr(strLine,"Gateway") And colMatches.Count > 0 Then
For Each strMatch in colMatches
Wscript.Echo strMatch.Value
arroctetts = Split(strMatch.Value,".")
Next
WScript.Echo UBound(arroctetts)
End If
Wend

For octett = 0 To UBound(arroctetts)
WScript.Echo octett & " " & arroctetts(octett)
Next

End Sub

Sub pingsubnet()
getGatewayAD
Dim WshShell, WshPing, strPingResults

Set WshShell = WScript.CreateObject("WScript.Shell")

'ping the subnet & put non ping addrs In a file
' Wscript.StdOut.Write strPingIP
For host = 2 To 254
Set WshPing = WshShell.Exec("ping -n 3 -w 1000 " & strPingIP) 'send 3 echo requests, waiting 1 sec each
strPingResults = LCase(WshPing.StdOut.ReadAll)
Next
End sub





Access 2007 Download: Access Runtime

Windows XP and Windows Server 2003 Behavior When Connected to Both Wired and Wireless Networks

How Can I Tell If a Wireless Network Adapter is Connected to the Network?

Querying wireless status in Windows with VBScript and WMI

MSNdis_80211_ServiceSetIdentifier

How Do I Find Information About the Network Adapter Cards on My Computer?
vba-ping

Function PingSilent(strComputer)




Set objPing = GetObject("winmgmts:{impersonationLevel=impersonate}")._

ExecQuery("select * from Win32_PingStatus where address = '"_

& strComputer & "'")



For Each objStatus in objPing

If IsNull(objStatus.StatusCode) or objStatus.StatusCode<>0 Then

'WScript.Echo("Computer " & machine & " is not reachable")

PingSilent = 0

Else

'WScript.Echo("Computer " & machine & " is Live")

PingSilent = 1

End If

Next



End Function


IcmpSendEcho: Ping a Machine by IP Address

Tuesday, February 24, 2009

comcast info

Comcast High Speed Internet FAQ

list of comcast approved modems

self install.  info from comcast

how 2

Connecting the modem and a television to the same cable wall outlet

Step 1: Connect the modem to the cable outlet.
Disconnect the cable going to your television from the cable wall outlet.
Use the short coaxial cable to connect the cable wall outlet to the single input on the splitter.
Connect the cable going to your television to one of the outputs on the splitter (the outputs are the two jacks on the same side).
Connect one end of the long coaxial cable to the second output on the splitter.
Connect the other end of the long coaxial cable to the cable input on your cable modem.
Step 2. Connect the modem to the computer, depending on the type of port available.
For Ethernet ports, use the Cat-5E cable to connect the port on the cable modem to the port on your computer.
For USB ports, use a USB cable (not included) to connect the port on the cable modem to the port on your computer.
Step 3. Install the software.
Insert the High-speed Internet Install Wizard CD to install the software.

Connecting the modem to a different cable wall outlet than a television

Step 1: Connect the modem to the cable outlet.
Use the long coaxial cable to connect the cable wall outlet to the cable input on your cable modem.
Step 2. Connect the modem to the computer, depending on the type of port available.
For Ethernet ports, use the Cat-5E cable to connect the port on the cable modem to the port on your computer.
For USB ports, use a USB cable (not included) to connect the port on the cable modem to the port on your computer.
Step 3. Install the software.
Insert the High-speed Internet Install Wizard CD to install the software.


 

Friday, February 20, 2009

home networking

However, to really secure this so that there isn't an inadvertant hole that someone else might sneak through when you're elswhere you need to make sure the local, approved address (all this traffic management will be IP address based) of the Toshi. is not likely to be replicated at the library.




There are 3 "private" address ranges available for use that never appear on the internet. They are:

a) 10.0.0.0 to 10.255.255.255 - this is a single class A range. Mask is 255.0.0.0

b) 172.16.0.0 to 172.31.255.255 - These are 16 class B ranges. Mask is 255.255.0.0

c) 192.168.0.0 through 192.168.255.255. These are 256 class C addresses and thus normally have a 255.255.255.0 mask



The library network will be on one of these 3 sets of addresses, as will your home LAN.



You will most commonly see either 192.168.0.0/24 (the /24 means 24 bit mask, or 255.255.255.0) or 192.168.1.0/24. The next most common is 10.0.0.0/8 (the /8 is, of course, an 8 bit mask or 255.0.0.0)



If you select a very uncommon range for your LAN at home then you can be reasonably confident of leaving your firewall open for that range. I would also consider using a non-standard mask for the local LAN IF your router/access point will allow and the built in DHCP server can cope.



Perhaps use a 172 range, like 172.29.0.0/28 - this would make available the address range 172.29.0.0 to 172.29.0.15 (14 usable addresses the lowest is always the network identifier and the highest is the broascast address so you always lose 2) - the decimal mask would be 255.255.255.240 - a most unusual mask to use with a class B address as well as being a largely unused private range allocation. Not perfectly secure, but the first step in security should always be obscurity. The reason for the non-standard mask is to further secure things. Even if you happen to connect to a LAN using the same base address range (the 172.329.0.0 part) your machine will still be inaccessible UNLESS they have also picked the same mask.

So, the easy way to alleviate this is to fix the addresses on the AD HOC network. Make the addresses from one of the ranges mentioned in my previous post (192.168.x.x, 172.17 to 21.x.x or 10.x.x.x - I suggest you use something from the 172 ranges to reduce the possibility of a conflict with any wired network you might connect to). Masks on both machines should match, addresses should be different but within the range defined by the mask. E.G. 172.18.1.1 and 172.18.1.2 with a mask of 255.255.255.248 (this will define a range of 172.18.1.0 to 172.18.1.7. Remember, the 0 and 7 are network and broadcast respectively so only 1 to 6 are available.




Then, you should be able to connect to the other machine by IP address rather than hoping the name will work (there's that slow browser service again). You can always update your local hosts files if you really want to use names. (C:\windows\system32\drivers\etc\hosts) Edit it with Notepad - the syntax has examples in the file. Make sure you end the last line with an - this is important!



Also, in this kind of situation it is probably best to go into the TCPIP properties, Advanced button, WINS tab and make sure that either the "Default" or "Enable Netbios over TCP/IP" radio button is selected - if in doubt, select the "Enable..." option.



Get this going with your firewall disabled, then enable it to setup the additional security. Using encryption on the wireless is also a good idea, but again, get it going first then add the encryption - then if it stops working, at least you'll know where to look

Thursday, February 19, 2009

last login time

Prints out details of all users in the domain (or a speified OU)
from scripting answere
New Objects for Today zip file
ScriptingAnswers.com Essentials
W2K_User_Info.vbs
Safe WMI Query Execution I

e.Spreadsheet Designer

e.Spreadsheet Designer is for report developers and Excel experts who rely heavily on Excel to perform their jobs and want to automatically populate files with new data and modify them to accommodate different audiences. Java developers also use e.Spreadsheet Designer to design spreadsheet templates that are leveraged with the e.Spreadsheet Engine and API product as part of an application. e.Spreadsheet reports can be generated and viewed within e.Spreadsheet Designer itself or by the e.Spreadsheet Engine and API , Deployment Kit and iServer Express products.

Saturday, February 14, 2009

How Long Until My Password Expires?

How Long Until My Password Expires?

On Error Resume Next




Const ADS_UF_DONT_EXPIRE_PASSWD = &h10000

Const E_ADS_PROPERTY_NOT_FOUND = &h8000500D

Const ONE_HUNDRED_NANOSECOND = .000000100

Const SECONDS_IN_DAY = 86400



Set objUser = GetObject("LDAP://CN=myerken,OU=management,DC=fabrikam,DC=com")



intUserAccountControl = objUser.Get("userAccountControl")

If intUserAccountControl And ADS_UF_DONT_EXPIRE_PASSWD Then ' LINE 11

WScript.Echo "The password does not expire."

WScript.Quit

Else

dtmValue = objUser.PasswordLastChanged

If Err.Number = E_ADS_PROPERTY_NOT_FOUND Then ' LINE 16

WScript.Echo "The password has never been set."

WScript.Quit

Else

intTimeInterval = Int(Now - dtmValue)

WScript.Echo "The password was last set on " & _

DateValue(dtmValue) & " at " & TimeValue(dtmValue) & vbCrLf & _

"The difference between when the password was last" & vbCrLf & _

"set and today is " & intTimeInterval & " days"

End If



Set objDomain = GetObject("LDAP://DC=fabrikam,DC=com")

Set objMaxPwdAge = objDomain.Get("maxPwdAge")



If objMaxPwdAge.LowPart = 0 Then

WScript.Echo "The Maximum Password Age is set to 0 in the " & _

"domain. Therefore, the password does not expire."

WScript.Quit

Else

dblMaxPwdNano = _

Abs(objMaxPwdAge.HighPart * 2^32 + objMaxPwdAge.LowPart)

dblMaxPwdSecs = dblMaxPwdNano * ONE_HUNDRED_NANOSECOND ' LINE 37

dblMaxPwdDays = Int(dblMaxPwdSecs / SECONDS_IN_DAY) ' LINE 38

WScript.Echo "Maximum password age is " & dblMaxPwdDays & " days"



If intTimeInterval >= dblMaxPwdDays Then

WScript.Echo "The password has expired."

Else

WScript.Echo "The password will expire on " & _

DateValue(dtmValue + dblMaxPwdDays) & " (" & _

Int((dtmValue + dblMaxPwdDays) - Now) & " days from today)."

End If

End If

End If

Tokenmon 1.01

Tokenmon 1.01

Tokenmon is a tool which monitors and displays a variety of security-related activity taking place on a system. Tokenmon gets its name from the fact that Windows NT/2000 stores a process' security information, including the user account context in which the process executes, in an object called a token. Tokenmon monitors includes the following:




User logon/logoff

Applications enabling or disabling security privileges in their process tokens

Process startup and exit (token creation/deletion)

Impersonation

Tokenmon has advanced filtering and search capabilities that make it a powerful tool for exploring the way NT works, seeing how applications use security functions, or tracking down problems in system or application configurations.

Simply run the Tokenmon GUI (Tokenmon.exe). Note that you must have administrative privilege to run Tokenmon. Menus, hot-keys, or toolbar buttons can be used to clear the window, save the monitored data to a file, and to filter and search output.

Thursday, February 12, 2009

xml 2 pdf


Apache FOP (Formatting Objects Processor) is a print formatter driven by XSL formatting objects (XSL-FO) and an output independent formatter. It is a Java application that reads a formatting object (FO) tree and renders the resulting pages to a specified output. Output formats currently supported include PDF, PS, PCL, AFP, XML (area tree representation), Print, AWT and PNG, and to a lesser extent, RTF and TXT. The primary output target is PDF.



microsoft subscription Downloads

microsoft subscription Downloads

Tuesday, February 10, 2009

dell wmi open manage omci

[PDF] Dell OpenManage Client Instrumentation this doc contains example scripts


The namespace for access to the Dell OMCI classes is “root\DellOMCI”.

OMCI provides information in the above mentioned namespace through a number of classes in the namespace. For detailed information on the properties in the classes, refer to the OMCI Reference Guide available at www.dell.com/openmanage/.

Deploying a BIOS Update to Dell Systems

exerpt

Dell_Configuration – This class defines properties used for setting parameters in the Dell System Management BIOS. Dell_SMBIOSSettings – This class defines properties used for setting parameters in the DellSystem Management BIOS.

Dell_RemoteFlashBIOSSettings – This class defines settings for Dell Remote BIOS updates.



set an asset tag in the Dell BIOS

a = (gwmi -namespace "root/Dellomci" Dell_SystemSummary)$a.AssetTag = "MyTag123"$a.put()


The samples along with some sample output are at:
ListNameSpaces.vbs
ListClasses.vbs
ListMethods.vbs
ListProperties.vbs
DumpWmiObjectInfo.vbs


'A problem is preventing Windows from accurately checking the license for this computer - Error code: 0x80070002' on your Windows XP computer? 29-Sep-


Reset the Default Security Provider in Windows XP
  1. Start the computer. Press the F8 key during startup to start the computer in Safe mode.
  2. Start Registry Editor (Regedt32.exe).
  3. Delete the following registry keys in the Windows registry:HKEY_USERS\.DEFAULT\Software\Microsoft\Cryptography\Providers
    HKEY_USERS\S-1-5-20\Software\Microsoft\Cryptography\Providers
  4. Quit Registry Editor.
  5. Restart the computer.
Match the Default Security Provider to New Drive Letter
  1. Run Registry Editor (Regedit.exe).
  2. Navigate to the following registry key:HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Defaults\Provider
  3. You will see a few Provider key beneath the branch. In each Provider key, edit the Image Path value to match the new drive letter.
  4. Exit Registry Editor.
  5. Restart computer.
Reset the Drive Letter of the System Drive
Use Registry Editor to change the drive letter of the system drive back to its original value. Edit the following registry key to change the value of the system drive:
HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
where \DosDevices\C: and other values presents the drive letters.
This problem is caused by changing the system drive letter or by changing the security provider.
If your system drive letter has changed, undo the actions that caused it, or:
1. Use the Registry Editor to navigate toHKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Defaults\Provider.
2. In each Provider key, edit the Image Path value to match the new drive letter.
3. When you are finished, exit the Registry Editor and shutdown / restart your computer.
If the default security provider has changed:
1. Restart your computer in Safe mode by pressing F8 during startup.
2. Use the Registry Editor to delete the following keys:
HKEY_USERS\.DEFAULT\Software\Microsoft\Cryptography\Providers

HKEY_USERS\S-1-5-20\Software\Microsoft\Cryptography\Providers
3. Exit the Registry Editor and shutdown / restart your computer.

When you start Windows XP and log on, your receive the subject error. When you press OK, you are returned to the Log On to Windows dialog.
NOTE: If you perform a System Restore, the problem may persist.
This behavior will occur if you are missing the %SystemRoot%\System32\secupd.dat file and / or the%SystemRoot%\System32\oembios.dat file and / or the %SystemRoot%\System32\oembios.bin file.
To resolve this problem:
1. Restart your computer and press F8 to start in Safe Mode.
2. Log on.
3. Right-click My Computer and press Manage.
4. Open the Event Viewer.
5. Check the System event log by using the View menu to Filter for an Event source of Windows File Protection since the last time you successfully logged on. You should be able to locate the files that could not be found during logon, probably as Event ID 64005.
6. Using another Windows XP computer, preferably as the same service pack and hotfix level, copy the missing files. If you don't have another Windows XP computer, you may be able to Expand the missing files from the Windows XP CD-ROM.
7. Restart your computer normally.
8. You may have to reapply the latest service pack and hotfixes, perform a SFC /SCANNOW and also check for viruses and other malware.


End of Article

===============================
A problem is preventing Windows from accurately checking the license for this computer.
Error Code: 0x80070002


When Windows XP boots up, after the Welcome Screen a message comes that shows the above message, and it does not allow you to login.
Solution!

Boot into Safemode

Press F8 While booting just after the BIOS screen or during the OS Selection menu.


Then do the following in the command promt.
cd %system root% \ system32
regsvr32 licwmi.dll
regsvr32 regwizc.dll
regsvr32 licdll.dll
regsvr32 jscript.dll
regsvr32 vbscript.dll
regsvr32 msxml.dll
regsvr32 shdocvw.dll
regsvr32 softpub.dll
regsvr32 wintrust.dll
regsvr32 initpki.dll
regsvr32 dssenh.dll
regsvr32 rsaenh.dll
regsvr32 gpkcsp.dll
regsvr32 sccbase.dll
regsvr32 slbcsp.dll
regsvr32 cryptdlg.dll


Reboot and check if the problem persists.

If not check if the following files are present in the System32 Folder

%SystemRoot%\System32\secupd.dat
%SystemRoot%\System32\oembios.dat 
%SystemRoot%\System32\oembios.bin

If any of these files are missing, restore these files, from the setup disk, I386 folder or from another system.

To restore from a setup disk, put the CD in, and browse to the I386 folder copy the file with extension XXXXX.XX_ where XXXX.XX is the file name with first 2 letters of the extension. Rename it to a .cab file and extract the file to system32.

Reboot the system and now try again.

Your problem must be solved.

If still your problem persists try the following from Microsoft knowledge base.

Reset the default security provider in Windows XP
To reset the default security provider in Windows XP, delete the relevant registry keys in the Windows registry. To do this, follow these steps:
1. Start the computer. Press the F8 key during startup to start the computer in Safe mode.
2. Start Registry Editor (Regedt32.exe).
3. Delete the following registry keys in the Windows registry:
HKEY_USERS\.DEFAULT\Software\Microsoft\Cryptography\Providers
HKEY_USERS\S-1-5-20\Software\Microsoft\Cryptography\Providers
4. Quit Registry Editor.
5. Restart the computer.

Reset the drive letter of the system drive
Use Registry Editor to change the drive letter of the system drive back to its original value. Edit the following registry key to change the value of the system drive:
HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices
Windows Update Errors: 0x80070002

Saturday, January 24, 2009

Dell OpenManage

OpenManage     wiki
OpenManage
forum search
 Dell OpenManage product page
Map your current knowledge of the HP Systems Insight Manager(tm) toolset to Dell OpenManage tools using the Systems Management Competitive Mapping chart aka the Secret Decoder Ring.

dell server info 
how you can use a few simple components to update the firmware on any number of Dell Systems automatically.

Learn to navigate support.dell.com and figure out what parts of Dell OpenManage you should download by reading this blog entry on the SystemsEdge blog.

Dell IT Assistant is a comprehensive, standards-based console for managing Dell Servers, Storage Arrays, Tape Libraries, Network Switches, Printers, and Clients distributed throughout your network. From a central console, you can gain increased control over the availability of Dell platforms through proactive alerts and notification. 

"Installing Dell OpenManage in a VMware ESX Server Software Environment". -PDF

If you've never installed OMSA on ESX, don't start with this script ! Read this piece of documentation first, "Installing Dell OpenManage in a VMware ESX Server Software Environment". Then once you have a grasp of the steps necessary, you can use this script that will install and configure the OMSA agent on VMware ESX 3.x. It will also configure the SNMP settings, and open the default ports in the firewall to allow communication.

Tuesday, January 20, 2009

Install Windows Server 2003 Administration Tools Pack (adminpak) on Windows Vista

@echo offREM RegisterAdminPak.cmdREM (c) 2006 Microsoft Corporation. All rights reserved.set filelist=adprop.dll azroles.dll azroleui.dll ccfg95.dllset filelist=%filelist% certadm.dll certmmc.dll certpdef.dll certtmpl.dllset filelist=%filelist% certxds.dll cladmwiz.dll clcfgsrv.dll clnetrex.dllset filelist=%filelist% cluadmex.dll cluadmmc.dll cmproxy.dll cmroute.dllset filelist=%filelist% cmutoa.dll cnet16.dll debugex.dll dfscore.dllset filelist=%filelist% dfsgui.dll dhcpsnap.dll dnsmgr.dll domadmin.dllset filelist=%filelist% dsadmin.dll dsuiwiz.dll imadmui.dll lrwizdll.dllset filelist=%filelist% mprsnap.dll msclus.dll mstsmhst.dll mstsmmc.dllset filelist=%filelist% nntpadm.dll nntpapi.dll nntpsnap.dll ntdsbsrv.dllset filelist=%filelist% ntfrsapi.dll rasuser.dll rigpsnap.dll rsadmin.dllset filelist=%filelist% rscommon.dll rsconn.dll rsengps.dll rsjob.dllset filelist=%filelist% rsservps.dll rsshell.dll rssubps.dll rtrfiltr.dllset filelist=%filelist% schmmgmt.dll tapisnap.dll tsuserex.dll vsstskex.dllset filelist=%filelist% w95inf16.dll w95inf32.dll winsevnt.dll winsmon.dllset filelist=%filelist% winsrpc.dll winssnap.dll ws03res.dllfor %%i in (%filelist%) do ( echo Registering %%i ... regsvr32 /s %%i )echo.Echo Command Completed

Tuesday, January 6, 2009

What happens if two AD objects have the same RDN?

Every Active Directory (AD) object has a distinguished name (DN—e.g., CN=John Savill,CN=Users,DC=SavillTech,DC=Com) that uniquely identifies the object and its position in AD. The system also creates a relative distinguished name (RDN), which is a name relative to the container (e.g., CN=John Savill for the user).
Two objects with the same RDN can't exist in one container. For example, in the container CN=Users,DC=SavillTech, CN=John Savill and OU=John Savill are allowed because one is a user and the other is an organisational unit (OU). However, CN=John Savill and CN=John Savill aren't allowed.

The only way you can have a duplicate RDN is if two objects are created on different domain controllers (DCs). But at the next replication cycle, the system will rename the older object.


To find objects that the system has renamed because of RDN collisions, use the search.vbs script in \support\tools\support.cab as follows:

cscript search.vbs "LDAP:///dc=,dc=com" 
/C:"(CN=*\0ACNF:*)" /P:distinguishedName /S:SubTree 
Any matches will display the RDN for the renamed objects.

Script Gathers Scheduled Task Information

Script Gathers Scheduled Task Information

WMI Bulk data retrieval

Free Utility Lets You Retrieve a Little or a Lot of Inventory Information

System Inventory Mini-App Use this easily customizable script to document deployed computers or check out the health of a system