To search Particular set of File Types in a large set of Folders or in a drive, Instead of Windows Search which take long time usually, You can Run a Command which gives you the Log File with the Details of the File name, Location, Drive, space consumed.

To Proceed to Search the files:

1. Open Command Prompt

2. Get to Root Directory (i.e The Drive name in which you want to search)

3. Run the Command “dir /b /n /s *.wma,*.mp3,*.mp4,*.avi,*.mpg,*.mov,*.jpg,*.bmp >C:\ drivespace.txt”

 

You can search any kind of file by editing the above command, I have shown the command to search the Media and Photo files.

The Part (>c:\drivespace.txt) : here you can mention the file name and the path to save the file after execution.

 

Net Use Command:

 

To Add a Drive

net use (drive-name): \\Servername\Foldername :persistent

 

To Delete a Mapped Drive

net use (Drivename): /del                           or                                net use (Drivename): /delete

 

In case if you get any error while running the Net use command like : NET NOT RECOGNIZED AS A COMMAND

Then Follow the Below Steps:

Open Command Prompt> Go To “C” Drive> “Windows” Folder> “System 32″ Folder”

and then run the Net Use Command mentioned above.

Also check the below Value:

HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment\Path

I suspect it is a Reg_SZ value. It should be a Reg_Expand_SZ value

 

 

Active Directory is Microsoft’s implementation of a directory service. A directory service holds information about resources within the domain. Resources are stored as objects and include users, computers, groups, printers, and more.

In Windows Server 2008, five different server roles support Active Directory:

 

>Active Directory Domain Services

>Active Directory Certificate Services

>Active Directory Federation Services

>Active Directory Lightweight Directory Services

>Active Directory Rights Management Services

 

The primary role is Active Directory Domain Services. The other roles add to the capabilities of Active Directory. Objects include users, computers, groups, and more. The Active Directory database is stored only on servers holding the role of domain controllers.

 

A significant benefit of using Active Directory Domain Services is that it enables you as an administrator to manage desktops, network servers, and applications all from a centralized location.

 


A read-only domain controller (RODC) hosts a read-only copy of the Active Directory database. This is somewhat of an untrue, because changes can be made to the database. However, the changes can come only from other domain controllers, and the entire database isn’t replicated; instead, only a few select objects are replicated.

 

Usually, domain controllers are considered peers where they are all equal (with a few exceptions). Any objects can be added or modified such as adding a user or a user changing their password on any domain controller. These changes are then replicated to other domain controllers. However, with RODCs, changes to the domain controller can come only from other domain controllers. Moreover, the changes are severely restricted to only a few select objects.

 

The huge benefit of the RODC is that credentials of all users and computers in Active Directory are not replicated to the RODC. This significantly improves the security of domain controllers that are placed at remote locations.

 


Network Access Protection (NAP) is an added feature that can help protect your network

from remote access clients. NAP helps you protect the network from the clients.

Within a local area network (LAN), you can control client computers to ensure they are safe and healthy. You can use Group Policy to ensure that it’s locked down from a security perspective and that it is getting the required updates. Antivirus and spyware software can be pushed out, regularly updated and run on clients. You can run scripts to ensure that all the corporate policies remain in place.

 

However, you can’t control a client accessing your network from a hotel or someone other Place. It’s entirely possible for a virus-ridden computer to connect to your network and cause significant problems. The solution is NAP, which is a set of technologies that can be used to check the health of a client. If the client is healthy, it’s allowed access to the network. If unhealthy, it’s quarantined and allowed access to remediation servers that can be used to bring the client into Compliance with the requirements. Health policies are determined and set by the administrator.

 

In the network you  use Windows Software Update Services (WSUS) to approve and  install the updates on clients. Since the VPN client isn’t in the network, they might not have the required updates. The client would be quarantined, and a WSUS server could be used as a remediation server to push the updates to the client. Once the updates are installed, the client could be rechecked and issued a health certificate and then granted access to the network.

 

2010 in review

Posted: January 2, 2011 in Uncategorized

The stats helper monkeys at WordPress.com mulled over how this blog did in 2010, and here’s a high level summary of its overall blog health:

Healthy blog!

The Blog-Health-o-Meter™ reads Wow.

Crunchy numbers

Featured image

A helper monkey made this abstract painting, inspired by your stats.

The average container ship can carry about 4,500 containers. This blog was viewed about 19,000 times in 2010. If each view were a shipping container, your blog would have filled about 4 fully loaded ships.

 

In 2010, there were 140 new posts, growing the total archive of this blog to 309 posts. There were 3 pictures uploaded, taking up a total of 258kb.

The busiest day of the year was January 8th with 1,136 views. The most popular post that day was Secure Your Vista In 10 Steps.

Where did they come from?

The top referring sites in 2010 were orkut.co.in, orkut.com, google.com, en.wordpress.com, and rachanon.wordpress.com.

Some visitors came searching, mostly for different types of threats, asus k8n-vm drivers, con2prt windows 7, windows server 2003 active directory domain rename tools, and asus k8n-vm driver.

Attractions in 2010

These are the posts and pages that got the most views in 2010.

1

Secure Your Vista In 10 Steps November 2009

2

Using the Group Policy Editor to Customize the Start Menu and Taskbar August 2009
1 comment

3

Asus K8N VM Drivers [on request] September 2009
3 comments

4

Windows Server 2003 Active Directory Domain Rename Tool January 2010
1 comment

5

Enabling DNS Server Debug Logging March 2010

An anonymous proxy server (from time to time called a trap factor) mainly attempts to anonymize trap surfing. There are discrete varieties of anonymizers. One of the more routine variations is the bare proxy. Because they are typically difficult to track, introduce proxies are principally profitable to those seeking online anonymity, from governmental dissidents to computer criminals. Some users are essentially interested in anonymity for added security, hiding their identities from potentially malicious websites appropriate for illustration, or on grounds, to further constitutional charitable rights of naturalness of philippic, instead of instance. The server receives requests from the anonymizing representative server, and thus does not profit information forth the intent purchaser’s address. Though, the requests are not anonymous to the anonymizing proxy server, and so a rank of conviction is today between the proxy server and the user. Many of them are funded through a continued advertising link to the user.

Access hold sway over: Some proxy servers implement a logon requirement. In large organizations, authorized users obligated to log on to attain access to the web. The organization can thereby track usage to individuals.

Some anonymizing surrogate servers may forward figures packets with header lines such as HTTP_VIA, HTTP_X_FORWARDED_ALSO IN BEHALF OF, or HTTP_FORWARDED, which may reveal the IP address of the client. Other anonymizing delegate servers, known as elite or ear-splitting anonymity proxies, but number the SLIGHT_ADDR header with the IP address of the agent server, making it show that the delegate server is the client. A website could quiescent be suspicious of a proxy is being toughened if the client sends packets which encompass a cookie from a antecedent to by that did not put to use the high anonymity surrogate server. Clearing cookies, and by any chance the cache, would solve this problem.

 

A surrogate that focuses on Life Major Web traffic is called a “web proxy”. The most general use of a web surrogate is to perform as a web cache. Most delegate programs specify a means to forbid access to URLs specified in a blacklist, thus providing text filtering. This is over again adapted to in a corporate, pedagogical, or library circumstances, and anywhere else where content filtering is desired. Some trap proxies reformat web pages for a specific deliberateness or audience, such as to go to chamber phones and PDAs.Web Server is an medial server between patient petition and server resource
Content-filtering net surrogate
A content-filtering web substitute server provides administrative direction over the please that may be relayed sometimes non-standard due to the proxy. It is commonly employed in both commercial and non-commercial organizations  to secure that Internet form conforms to tolerable make use of policy. In some cases users can circumvent the delegate, since there are services designed to representative message from a filtered website through a non filtered locality to sanction it through the user’s proxy.

Some proverbial methods acclimated to inasmuch as essence filtering list: URL or DNS blacklists, URL regex filtering, MIME filtering, or peacefulness keyword filtering. Some products comprise been known to employ content dissection techniques to look in the direction of traits commonly old by standard types of content providers.

A content filtering substitute leave often bolstering user authentication, to supervision web access. It also usually produces logs, either to recite full information in all directions the URLs accessed past unequivocal users, or to prefect bandwidth usage statistics. It may also communicate to daemon-based and/or ICAP-based antivirus software to care for insurance against virus and other malware by scanning arriving purport in real hour in advance it enters the network.
Anonymizing proxy server

 

Ip Address is a unique address assigned to each computer on a network in order to identify and communicate with each other utilizing the Internet Protocol standard (IP)

Basic Format

A IP address consists of 4 parts (known as Octet), each having three digit ranging from 0 -255 separated by a decimal point.

Example of Valid IP:

10.31.11.25

10.31.11.* (* means all numbers ranging from 0-255 in last octet)

10.31.*.* (* means all numbers ranging from 0-255 in 3rd and 4th octet)

10.31.11.25-155 (25-155 means all number ranging from 25 to 155).

CHKDSK —  Creates and displays a status report for a hard disk and can correct errors on the disk if required. Used without any parameters, CHKDSK simply displays the status of the disk in the current drive. Used with parameters. CHKDSK can locate bad sectors, repair the disk and recover readable information.

To see a status report of the disk, at a command prompt, type, chkdsk and press ENTER. If errors are found, any error message will appear.

To repair errors with the disk, at the command prompt, type chkdsk /f/r and press ENTER. The parameter /f fixes errors on the disk, /r locates bad sectors and recovers readable information. If  you receive a message that chkdsk cannot run because the volume is in use by another process, this probably means that you are trying to fix errors  on the disk that you are currently using. You cannot do that but the computer can repair errors at startup, and you should schedule an autostart in the bootup.