tag:blogger.com,1999:blog-81109589315476351592024-03-13T05:34:36.981+00:00TechguySolutions I have gathered over my years of work as sysadmin.
Some info may be in portugueseTech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.comBlogger20125tag:blogger.com,1999:blog-8110958931547635159.post-14628243072642731782015-01-26T09:17:00.000+00:002015-01-26T09:17:01.455+00:00VMware vCenter 5.5 - The Storage Service is not initialized. Please try again laterThis error happened to me after a migration of a dying vCenter physical box. Because the database was still on the to be decommissioned server, the new vCenter couldn't reach it due to the service VMware vSphere Profile-Driven Storage Service being started with a local user.<br />The solution was simple, simply change the user Log On to your vCenter admin account in our case a service account called vcenter.service<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnx3IKrDBFlvMqJ-kqYGBNjreabv5ycHypvbvxNuifXXj6ou4dq3ITIVBo6nrGh0HldOUj3SMdfj9p2mNO-D5D9ohBll_3R6XkxhfQuaBF5E6rE2KKqIUXiDY9nK5IeQt5vsvowF5wHozG/s1600/vcenter.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnx3IKrDBFlvMqJ-kqYGBNjreabv5ycHypvbvxNuifXXj6ou4dq3ITIVBo6nrGh0HldOUj3SMdfj9p2mNO-D5D9ohBll_3R6XkxhfQuaBF5E6rE2KKqIUXiDY9nK5IeQt5vsvowF5wHozG/s1600/vcenter.PNG" height="320" width="280" /></a></div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
This should solve.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com2tag:blogger.com,1999:blog-8110958931547635159.post-39099104961242043622014-05-12T16:39:00.003+01:002014-05-12T16:39:38.807+01:00Convert mailboxes from user type to room, equipment or sharedOpen the Exchange Management Shell:<br />
<br />
example: Set-Mailbox mailboxname -Type Room<br />
<br />
You can use the following values for the Type parameter:<br />
Regular<br />
Room<br />
Equipment<br />
Shared<br />
For detailed syntax and parameter information, see <a href="http://technet.microsoft.com/en-us/library/bb123981.aspx" target="_blank">Set-Mailbox</a>Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-31767747850882106282013-12-09T11:32:00.002+00:002013-12-09T11:35:02.664+00:00Powershell script to get last login of a host in a readable format for humans<br />
---------Start Script------------------<br />
<br />
# Gets host and lastLogonTimestamp in UTC of specified host<br />
<br />
# Get hostname<br />
$hostname = Read-host "Enter a hostname"<br />
<br />
# find the lastLogonTimestamp attribute<br />
Get-ADComputer $hostname -Properties lastlogontimestamp |<br />
<br />
# output hostname and timestamp in human readable format<br />
Select-Object Name,@{Name="Stamp"; Expression={[DateTime]::FromFileTime($_.lastLogonTimestamp)}}<br />
pause<br />
<div>
<br />
<br />
------------End Script---------------</div>
Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-82743949479806649052013-11-27T14:34:00.002+00:002013-11-27T14:52:04.083+00:00Get specific properties with Get-ADUser and exporting to CSVAt some point we all need to obtain specific data of users to further analyze.<br />
With this PS script you can get a specific data from a certain OU and export to csv.<br />
<br />
Get-ADUser -Filter * -searchbase 'ou=your_ou_name,dc=yourdomain,dc=yourdomain' -Properties * | Select-Object Name, Pager | export-CSVresults.csv -NoTypeInformation -Encoding UTF8<br />
<br />
With this script I can get the user name and the pager number on a CSV.<br />
You can find what the objects you can use by using: Get-ADUser -Filter * -Properties *<br />
Be aware it will display all users. So Ctrl+c in the middle of and search for your desired field. Or restrict your search base.<br />
The file will appear on the path displayed on the powershell cmd when you open it.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-76574189575551592792013-10-17T15:47:00.003+01:002013-10-17T15:49:37.946+01:00CryptoLocker MalwareSince there is allready lots of info about this malware in English I am providing a few info in Portuguese:<br />
<br />
<div class="MsoNormal">
Está a circular na internet um novo tipo de malware, neste
caso um ramsonware. Entitulado de Cryptolocker.</div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><u>Como é que fico infectado?<o:p></o:p></u></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1; text-indent: -18.0pt;">
<!--[if !supportLists]--><b><span style="font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri;">1.<span style="font-size: 7pt; font-weight: normal;">
</span></span></b><!--[endif]--><b><span style="font-size: 12.0pt;">Por emails
falsos que fingem ser da UPS, Fedex, DHL, etc a indicar que temos uma encomenda
à espera de ser recebida ou algo do género.<o:p></o:p></span></b></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1; text-indent: -18.0pt;">
<!--[if !supportLists]--><b><span style="font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri;">2.<span style="font-size: 7pt; font-weight: normal;">
</span></span></b><!--[endif]--><b><span style="font-size: 12.0pt;">Através de
sites que estejam vulneráveis a este tipo de infecção.<o:p></o:p></span></b></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1; text-indent: -18.0pt;">
<!--[if !supportLists]--><b><span style="font-size: 12.0pt; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri;">3.<span style="font-size: 7pt; font-weight: normal;">
</span></span></b><!--[endif]--><b><span style="font-size: 12.0pt;">Através de
Trojans que fingem ser programas necessários para ver videos online,
típicamente encontrados em sites Porno e de SportTV online.<o:p></o:p></span></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><u>O que acontece quando fico infectado?<o:p></o:p></u></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="text-indent: 35.4pt;">
Uma vez activa a infecção no
computador vai percorrer as drives (<b>locais e de rede</b>) e encriptar os
seguintes tipos de ficheiros com uma mistura de encriptação RSA e AES: *.odt,
*.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx,
*.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg,
*.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.eps, *.ai,
*.indd, *.cdr, ????????.jpg, ????????.jpe, img_*.jpg, *.dng, *.3fr, *.arw,
*.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef,
*.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f,
*.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7cThe</div>
<div class="MsoNormal" style="text-indent: 35.4pt;">
<br /></div>
<div class="MsoNormal" style="text-indent: 35.4pt;">
Após um tempo, tipicamente o
tempo que demora a encriptar os ficheiros aparecerá uma janela semelhante a
esta abaixo, que vai pedir um resgate de 100 ou 300 US$. O pagamento pode ser
feito por Bitcoins, Moneypack, Ukash ou CashU. E aparecerá uma contagem
decrescente para o fazer!</div>
<div class="MsoNormal">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.blogger.com/blogger.g?blogID=8110958931547635159" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPojZXURTiJnQ5FDeLg3H-kmJthoxroZUDjA3pFFC8eu8K7oj6lHYoVy3ViC8c8IGqEuE3vrCZlPif9hSaw_tmHKGa2dtc6_zOK09xXer9mynlMl84C6Bo82VhCnwgmiolBmyo0HA0g-is/s1600/cryptolocker.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="497" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPojZXURTiJnQ5FDeLg3H-kmJthoxroZUDjA3pFFC8eu8K7oj6lHYoVy3ViC8c8IGqEuE3vrCZlPif9hSaw_tmHKGa2dtc6_zOK09xXer9mynlMl84C6Bo82VhCnwgmiolBmyo0HA0g-is/s640/cryptolocker.jpg" width="640" /></a></div>
<br /></div>
<div class="MsoNormal">
<!--[if gte vml 1]><v:shapetype id="_x0000_t75" coordsize="21600,21600"
o:spt="75" o:preferrelative="t" path="m@4@5l@4@11@9@11@9@5xe" filled="f"
stroked="f">
<v:stroke joinstyle="miter"/>
<v:formulas>
<v:f eqn="if lineDrawn pixelLineWidth 0"/>
<v:f eqn="sum @0 1 0"/>
<v:f eqn="sum 0 0 @1"/>
<v:f eqn="prod @2 1 2"/>
<v:f eqn="prod @3 21600 pixelWidth"/>
<v:f eqn="prod @3 21600 pixelHeight"/>
<v:f eqn="sum @0 0 1"/>
<v:f eqn="prod @6 1 2"/>
<v:f eqn="prod @7 21600 pixelWidth"/>
<v:f eqn="sum @8 21600 0"/>
<v:f eqn="prod @7 21600 pixelHeight"/>
<v:f eqn="sum @10 21600 0"/>
</v:formulas>
<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
<o:lock v:ext="edit" aspectratio="t"/>
</v:shapetype><v:shape id="_x0000_i1025" type="#_x0000_t75" alt="QjqBDRr.jpg"
style='width:565.5pt;height:441pt'>
<v:imagedata src="file:///C:\Users\RUIDUA~1.GRU\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg"
o:href="cid:image002.jpg@01CECB48.AFF44C30"/>
</v:shape><![endif]--><!--[if !vml]--><!--[endif]--></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b><u>Há alguma forma de recuperar os ficheiros?<o:p></o:p></u></b></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Infelizmente não. Desencriptação por força bruta não é
possível no tempo que é disponibilizado e todas as ferramentas que têm surgido
têm-se revelado ineficazes.<br />
<br />
A única forma de não ser infectado por este e outro tipo de malware é usar o
bom senso e não abrir emails suspeitos, sites, etc.</div>
<div class="MsoNormal">
No caso de se ter sido infectado a única forma de recuperar
os ficheiros é através de backups que tenham sido feitos.</div>
<div class="MsoNormal">
<br /></div>
<br />
<div class="MsoNormal">
<br /></div>
Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-10404719121018051272013-09-30T12:18:00.000+01:002013-09-30T12:18:18.790+01:00VMWare: unable to connect to the mks login (username/password) incorrect This error can present while opening a console for a virtual machine.<br />There can be several reasons for this error, but what I have encontered the most is a DNS problem.<br />Check if you can ping the VMWare hosts and the Vcenter server by their name, if not add them to the DNS.<div>
<br /></div>
<div>
Just like that, no firewall issues or editing vmware config files.<br /><br /><br /></div>
Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com4tag:blogger.com,1999:blog-8110958931547635159.post-38920589613536354282013-09-24T21:44:00.000+01:002013-09-24T21:46:31.360+01:00Windows 8 Black Screen / Flickering on boot with dual VGA (Intel HD Graphics & Geforce)This happened to me on my desktop whith a Asus P8Z68-V motherboard.<br />
I have 3 monitors and so I needed a second VGA for the two secondary monitors.<br />
I had an old Geforce 8400GS laying around and so I decided to use it.<br />
<br />
I wanted my main VGA to be the onboard Intel that amazingly has better performance. So I setted up on Bios as main VGA.<br />
All went fine until MS did their number... Windows update changed the Graphics adapter driver.<br />
I was unsuspected of that until I rebooted the pc. The log on screen was not to be seen but only a black flickering screen. So after some trial and error here is what I did.<br />
<br />
I went to the bios and changed the main VGA to be the Nvidia. Booted normaly. I found out after many tries that Windows keeps getting the Nvidia driver from the internet regardless if I disabled that option in Windows Update.<br />
So you need to Run "gpedit.msc" and go to: Computer Configuration - Administrative Templates - System - Internet Communication Management - Internet Communication Settings - "Turn off Windows Update Device Driver Searching" and set this to ENABLED.<br />
<br />
Download the latest Nvidia driver, run the installer, let it extract the driver and then cancel it.<br />
Delete all Nvidia folders on program files.<br />
Go to safe mode, uninstall the device in device management and make sure to tick the option to delete the driver.<br />
In the windows folder search for the usual Nvidia files such as nvdisp.ini, make a search for Nvidia and nv*.* and delete everything related to Nvidia.<br />
<br />
Reboot.<br />
<br />
On Device Manager, your Display adapter should appear as "Microsoft Display Adapter" instead of the WDDM drivers for your card model. If not you must retrace the steps.<br />
<br />
Right click the "Microsoft Display Adapter" and hit "Update Driver Software". Select "Browse my computer for driver software", then "Let me pick from a list of device drivers on my computer" and then select the "Have Disc" option.<br />
Point Windows to the file "nv_disp.inf" that will be in your Nvidia folder, mine was: C:\NVIDIA\DisplayDriver\327.23\Win8_WinVista_Win7_64\International\Display.Driver\nv_disp.inf<br />
<br />
Reboot, set your Intel VGA has main adapter once more and pray for uncle Bill for it to work.<br />
And that should be it.<br />
<br />
Hope it helps someone lost on the interwebs with the same issue as I.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-25266723479679908792013-07-26T10:05:00.001+01:002013-07-26T10:05:48.552+01:00Happy SysAdmin Day<iframe allowfullscreen="" frameborder="0" height="270" src="//www.youtube.com/embed/GoBhq9xZD4Q" width="480"></iframe><br />
<br />
Because we deserve ITTech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-67406693525481791142013-07-25T10:54:00.001+01:002013-07-25T10:54:14.151+01:00WARNING: 5 reasons you should never fix a computer for free(I am not the author of the text but I fully agree with it)<br />
<br />
It is in our nature to love the puzzle. We are obsessed. The lot of us. We love puzzles. We love the challenge. We thrive on finding the answer. We hate disarray. It bothers us deep in our soul.<br />
We love the accolades. We love to be seen as the digital white knight fixed the server, the computer, the email, and anything else that life depends on.<br />
We love it so much, we sometimes make horrible decisions. Sometimes, we work "FOR FREE."<br />
We've all done it. A friend, a neighbor, a relative, a good client, a bad client, a pretty girl... Whoever it was, and for whatever reason, we all threw them a technological bone and fixed something for free. In rare instances, it can be a rewarding experience. Perhaps your buddy gave you a beer. Maybe someone said thank you. Maybe there was a smile on their face, and that was rewarding enough.<br />
More likely, however, that five minute task you thought you were signing up for turned into 40 minutes, then an hour, then a commitment. Wow. You didn't see that coming.<br />
<br />
1 You Break it You Bought it.<br />
When you sit down to fix a problem that presented as a simple one you are creating a contract. Not a legal contract, but a social one. The computer owner is trusting their computer with you. It's their baby, and you're the doctor. So you sit down, and begin to fix a problem.<br />
In the process, something else breaks. You fixed one thing, but something else goes awry. What's the best part? Neither you nor the user notice it is broken until a day later when they call you to blame you for breaking something else.<br />
"I thought you were going to fix it." They complain.<br />
This is the primary reason you charge money to fix something. You break it, you bought it. The user / owner will expect you to warranty your service even though THEY received all the value of your time, and you received nothing in exchange.<br />
<br />
2 People don't respect things that are free.<br />
People don't respect things that are free.<br />
I learned that quote from a man who runs a non-profit organization. Image that. A man who solicits donations for a living candidly told me "people don't respect things that are free." You know what? He's right.<br />
Free advice. Free upgrade. Free entry. None are valued. Free advice is seldom wanted. Free upgrade was something you were going to get anyway. Free entry? The band playing tonight must not be any good.<br />
People associate the value of service with the amount of money that is exchanged for it. How else do you think that lawyer can get away with charging $400 an hour? People naturally make the assumption that if it costs an arm and a leg, then it must be worth it.<br />
So, if customers and friends will assume that the most expensive car is the best one, what will they assume of the free car? Do you want the heart surgeon who charges $500,000 per surgery or the one who works for beer to operate on your mother?<br />
<br />
3 They will expect it forever.<br />
In law, the concept of a precedent is vitally important. Judges and lawyers look to previous cases to decide what the interpretation of the law was because if a case was settled one way before, chances are, it will be settled that way again.<br />
Gamblers playing craps look at the past behavior of the dice to, mistakenly, assume that the good luck will continue.<br />
Users will figure if you fixed it once for free, you'll do it forever for free. There is no reason why they should respect the thousands of hours you have spent learning and researching the art of computer science. There is no reason that they should respect the certifications you hold. There is no reason that they should honor your abilities by paying your fees. Why? Because you did it for free. Once!<br />
When they come back and you try to get fees, they will meet you with resistance in the form of guilt. "I thought we were friends" they cry. "You didn't charge me anything last time." They argue.<br />
Setup the expectation that they are going to pay (or barter) from the onset. Demand the respect that you deserve. Make sure they understand you are a professional. After all, that is the difference between a professional and an amateur. Professionals get compensated for their skills.<br />
<br />
4 The demands will only grow with time.<br />
Give them an inch, and they will take you through three operating system upgrades, two virus infections, and a crashed hard drive. Once you've set the precedent and created the expectation that you are their knight in shining armor, they will begin to call you for everything. They will suck up your time and resources. They will not be grateful. They will involve you in 30 minute hypothetical conversations then disagree with your expertise.<br />
<br />
5 It Weakens Your Backbone<br />
Working for free is not only unprofitable, it weakens your constitution as a professional consultant. For many consultants, asking for money is difficult. They email out a silent invoice after the fact and hope they get paid. This practice can lead to unbalanced books, debt, and a going out of business sign. The simple fact is: if you don't ask for your money, you're not going to get paid. No one just hands out checks.<br />
Setting up the expectation, especially when you fix a computer for the first time for a client, is vitally important in establishing boundaries that ensure you are paid in a timely fashion. Working for free, throwing out freebies, "comp"-ing your time hurts your ability to ask for the sale. It hurts your credibility because the client will assume that if you're not charging them for a given task, you didn't know what you were doing or you made mistakes.<br />
It may give you butterflies, but ask for the money. Do it openly and notoriously. Your clients will take it as a sign of confidence.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-4347461920513563222013-07-24T17:27:00.002+01:002013-07-24T17:30:09.425+01:00Sysadmin day 26-07-2013<div style="text-align: center;">
Don't forget to hug yours, every year at least</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMAfLDlozPkoxCDe5H5CK4SRo3GafOMCo0GcvJN8q1hzowRKCcWjpaX6LpT82qAEe26T3Hdv6cZVYGdP-Nf3y_UqMLBmDTE5WECKd_-SEj1YkC_S_s_ba0UYIjzhZXvfxgy6Qs72RNbXR7/s1600/sysadm.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="148" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMAfLDlozPkoxCDe5H5CK4SRo3GafOMCo0GcvJN8q1hzowRKCcWjpaX6LpT82qAEe26T3Hdv6cZVYGdP-Nf3y_UqMLBmDTE5WECKd_-SEj1YkC_S_s_ba0UYIjzhZXvfxgy6Qs72RNbXR7/s400/sysadm.jpg" width="400" /></a></div>
<br />Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-89886076218508547602013-07-24T16:53:00.000+01:002013-07-24T17:09:51.166+01:00Remote registry edition of Hkey Current User<span style="font-family: Arial, Helvetica, sans-serif;">Lets say you need to edit the registry of a currently logged on user but that user has no administration rights. You would need to grant the local admin rights, log off and log on.<br />With this simple trick you can edit the current user registry:</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">1. Open a regedit with domain admin rights</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1x_kqhXaQQrC5IfboH6Q7_o__NR27qy4-9cCWE9thv9YEQR9WDT9v1gDz5X3zBtOhM91XJT2iCT1hd4X8giWxpfBe7YK69OQUvlzck642DhxqguhBMqTLAKEVNiU1tMo598Ynq4b0INt8/s1600/reg1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1x_kqhXaQQrC5IfboH6Q7_o__NR27qy4-9cCWE9thv9YEQR9WDT9v1gDz5X3zBtOhM91XJT2iCT1hd4X8giWxpfBe7YK69OQUvlzck642DhxqguhBMqTLAKEVNiU1tMo598Ynq4b0INt8/s320/reg1.png" width="266" /></a></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">2. On the File menu, click Connect Network Registry.</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwuELw5Mh8b5ihl-n1tg5-gZKaIi56NGCeX852Ffb06gqPAnbw0JOmrJ83tnyzOrIxf4pACla9HpW8zSO8JO_M2KBq7MtOw9jVjDe-LK49vVEDozALRj1VA06DtmyM_6Twxi_wQuM0zJKk/s1600/reg2.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwuELw5Mh8b5ihl-n1tg5-gZKaIi56NGCeX852Ffb06gqPAnbw0JOmrJ83tnyzOrIxf4pACla9HpW8zSO8JO_M2KBq7MtOw9jVjDe-LK49vVEDozALRj1VA06DtmyM_6Twxi_wQuM0zJKk/s1600/reg2.JPG" /></a></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">3. In the Select Computer dialog box, type the name of the computer to whose registry you want to connect</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;">4. Navigate to HKEY_USERS and look for the longest key without "_Classes" in front. That will be the current logged on user HKEY_CURRENT_USER.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi246YHdNTIoTgFpcrYwRylBpyOzAbQCNEX8GLA8YTZikrLqYCYvAerQk0tNDYA8b0py_e_Yo2KDJrghqvRbxKodUd_VrMJPzdpnH7B61TFHC45vFyu4FtUOsgk42Tm54JVk93dSimecWfp/s1600/hkey1.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="197" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi246YHdNTIoTgFpcrYwRylBpyOzAbQCNEX8GLA8YTZikrLqYCYvAerQk0tNDYA8b0py_e_Yo2KDJrghqvRbxKodUd_VrMJPzdpnH7B61TFHC45vFyu4FtUOsgk42Tm54JVk93dSimecWfp/s400/hkey1.png" width="400" /></a></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><br />
<span style="font-family: Arial, Helvetica, sans-serif;">This way you can edit the reg keys you need without logging out the non local admin user.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-3936321844743303852013-07-24T16:37:00.001+01:002013-07-24T16:37:18.122+01:00Remove proxy option tick in Internet ExplorerIf you had a GPO applying a proxy option, but you no longer use a proxy, by disabling that option in a GPO it wont remove the tick option in Internet Explorer. So run this script on user logon (with a GPO), copy and paste on a notepad and save with .vbs extension.<br />
Place the script on your DC netlogon or a available share.<br />
<br />
<br />
Option Explicit<br />
<br />
dim strRegPath<br />
dim user<br />
dim password<br />
dim sh<br />
dim oWshShell<br />
dim message<br />
<br />
strRegPath = "HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\"<br />
Set oWshShell = CreateObject("WScript.Shell")<br />
set sh = createobject("wscript.shell")<br />
<span class="Apple-tab-span" style="white-space: pre;"> </span><br />
Call oWshShell.RegWrite(strRegPath & "ProxyEnable", "00000000", "REG_DWORD")<br />
<br />
Set oWshShell = Nothing<br />
Set sh = NothingTech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-60941757234154507362013-07-24T14:17:00.001+01:002013-07-24T14:31:19.451+01:00Change permissions to NTFS folders using the folder name<span style="font-family: Arial, Helvetica, sans-serif;"><br /><br />I found this script online, but had several bugs and was fixed by me and a coworker. </span><span style="font-family: Arial, Helvetica, sans-serif;">The purpose is to change the NTFS permissions on several folders using the folder name as basis. </span><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">You must have your username the same as the folder. </span><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">It propagates to the child objects. But you can mess around with the options a bit. </span><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span><span style="font-family: Arial, Helvetica, sans-serif;">Please test before, as always, and adjust the folders and options to your enviroment.</span><span style="font-family: Arial, Helvetica, sans-serif;"><br /><br />You must use powershell in v2 otherwise it wont work.</span><br />
<div>
<br /></div>
<div>
#############################################################################</div>
<div>
# Script: changePermissions.ps1</div>
<div>
# Date: 17/07/2013</div>
<div>
# Keywords:</div>
<div>
# Comments:</div>
<div>
# Pre-Requisites: Full Control over destination folder.</div>
<div>
#</div>
<div>
#</div>
<div>
# DISCLAIMER</div>
<div>
# ==========</div>
<div>
# THIS CODE IS MADE AVAILABLE AS IS, WITHOUT WARRANTY OF ANY KIND. THE
ENTIRE</div>
<div>
# RISK OF THE USE OR THE RESULTS FROM THE USE OF THIS CODE REMAINS WITH THE
USER.</div>
<div>
#############################################################################</div>
<div>
</div>
<div>
#############################################################################</div>
<div>
# Variables</div>
<div>
#</div>
<div>
# Where is the root of the home drives?</div>
<div>
$homeDrivesDir="inserthomedrivehere"</div>
<div>
# Report only? ($false = fix problems)</div>
<div>
$reportMode = $false</div>
<div>
# Print all valid directories?</div>
<div>
$verbose = $false</div>
<div>
# What domain are your users in?</div>
<div>
$domainName = "insertdomainhere"</div>
<div>
#</div>
<div>
#######################################################################</div>
<div>
</div>
<div>
# Save the current working directory before we change it (purely for
convenience)</div>
<div>
pushd .</div>
<div>
# Change to the location of the home drives</div>
<div>
set-location $homeDrivesDir</div>
<div>
</div>
<div>
# Warn the user if we will be fixing or just reporting on problems</div>
<div>
write-host ""</div>
<div>
</div>
<div>
if ($reportMode) {</div>
<div>
Write-Host "Report mode is on. Not fixing problems"</div>
<div>
} else {</div>
<div>
Write-Host "Report mode is off. Will fix problems"</div>
<div>
}</div>
<div>
</div>
<div>
write-host ""</div>
<div>
</div>
<div>
# Initialise a few counter variables. Only useful for multiple executions
from the same session</div>
<div>
$goodPermissions = $unfixablePermissions = $fixedPermissions =
$badPermissions = 0</div>
<div>
$failedFolders = @()</div>
<div>
</div>
<div>
# For every folder in the $homeDrivesDir folder</div>
<div>
foreach($homeFolder in (Get-ChildItem $homeDrivesDir | Where
{$_.psIsContainer -eq $true})) {</div>
<div>
</div>
<div>
# dump the current ACL in a variable</div>
<div>
</div>
<div>
$acl= (Get-Item $homeFolder).GetAccessControl("Access")</div>
<div>
#$Acl = Get-Acl $homeFolder</div>
<div>
</div>
<div>
# create a permission mask in the form of DOMAIN\Username where
Username=foldername</div>
<div>
# (adjust as necessary if your home folders are not exactly your
usernames)</div>
<div>
$compareString = "*" + $domainName + "\" + $homeFolder.Name + " Allow
FullControl*"</div>
<div>
</div>
<div>
# if the permission mask is in the ACL</div>
<div>
if ($Acl.AccessToString -like $compareString) {</div>
<div>
</div>
<div>
# everything's good, increment the counter and move on.</div>
<div>
if ($verbose) {Write-Host "Permissions are valid for" $homeFolder.Name
-backgroundcolor green -foregroundcolor white}</div>
<div>
$goodPermissions += 1</div>
<div>
</div>
<div>
} else {</div>
<div>
</div>
<div>
# Permissions are invalid, either fix or report</div>
<div>
# increment the number of permissions needing repair</div>
<div>
$badPermissions += 1</div>
<div>
# if we're in report mode</div>
<div>
if ($reportMode -eq $true) {</div>
<div>
# reportmode is on, don't do anything</div>
<div>
Write-Host "Permissions not valid for" $homeFolder.Name -backgroundcolor
red -foregroundcolor white</div>
<div>
} else {</div>
<div>
# reportmode is off, fix the permissions</div>
<div>
Write-Host "Setting permissions for" $homeFolder.Name -foregroundcolor
white -backgroundcolor red</div>
<div>
# Add the user in format DOMAIN\Username</div>
<div>
$username = $domainName + "\" + $homeFolder.Name</div>
<div>
# Grant the user full control</div>
<div>
$accessLevel = "FullControl"</div>
<div>
# Should permissions be inherited from above?</div>
<div>
$inheritanceFlags = "ContainerInherit, ObjectInherit"</div>
<div>
#$inheritanceFlags = "None" </div>
<div>
# Should permissions propagate to below?</div>
<div>
$propagationFlags = "None"</div>
<div>
# Is this an Allow/Deny entry?</div>
<div>
$accessControlType = "Allow"</div>
<div>
try {</div>
<div>
# Create the Access Rule</div>
<div>
$accessRule = New-Object
System.Security.AccessControl.FileSystemAccessRule($username,$accessLevel,$inheritanceFlags,$propagationFlags,$accessControlType)</div>
<div>
</div>
<div>
# Attempt to apply the access rule to the ACL</div>
<div>
$Acl.SetAccessRule($accessRule)</div>
<div>
Set-Acl $homeFolder $Acl</div>
<div>
# if it hasn't errored out by now, increment the counter</div>
<div>
$fixedPermissions += 1</div>
<div>
} catch {</div>
<div>
# It failed!</div>
<div>
# Increment the fail count</div>
<div>
$unfixablePermissions += 1</div>
<div>
# and add the folder to the list of failed folders</div>
<div>
$failedFolders += $homeFolder</div>
<div>
}</div>
<div>
} #/if</div>
<div>
} #/if</div>
<div>
} #/foreach</div>
<div>
</div>
<div>
# Print out a summary</div>
<div>
</div>
<div>
Write-Host ""</div>
<div>
Write-Host $goodPermissions "valid permissions"</div>
<div>
Write-Host $badPermissions "permissions needing repair"</div>
<div>
if ($reportMode -eq $false) {Write-Host $fixedPermissions "permissions
fixed"}</div>
<div>
if ($unfixablePermissions -gt 0) {</div>
<div>
Write-Host $unfixablePermissions "ACLs could not be repaired."</div>
<div>
foreach ($folder in $failedFolders) {Write-Host " -" $folder}</div>
<div>
}</div>
<div>
</div>
<div>
# Cleanup</div>
<br />
<div>
popd</div>
Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-91501135602914476482013-07-24T12:56:00.001+01:002013-07-24T16:01:21.823+01:00Internet Explorer 10 lost advanced tab in Windows 7 with all users<span style="font-family: Arial, Helvetica, sans-serif;">I had an issue with a IE10 that had no advanced tab available. No GPO was disabling it, no local restriction, user was local admin.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;">Oh, and every single user that logged on that machine would had no advanced tab as well.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">After fiddling with it for hours, the only solution was to import the following registry key from another pc with same operating system (Win7 64bit with IE 10) to that pc.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Arial, Helvetica, sans-serif;">Export from the working registry and import in the problematic pc. No need to mention to backup the registry before.<br />It worked for me.</span><br />
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span>Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-30530542530840330702009-05-09T16:14:00.002+01:002009-05-09T16:16:55.324+01:00Webcam do portátil Asus F50 do e-escolas tem a imagem ao contrárioConstatei que é um problema comum que tem assombrado vários destes equipamentos, a resolução é simples:<br />Actualizar o driver da Webcam quer através do site da Asus ou do cd fornecido com o equipamento.<br />Espero ter ajudado.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-50749932336324308802008-10-21T15:34:00.003+01:002008-10-24T14:10:55.389+01:00O simbolo do Internet Explorer como browser predefinido no menu iniciar está corruptoCaros, se após actualização para o IE7 o simbolo do mesmo fica corrompido no menu iniciar do windows, deve-se corrigir a seguinte chave no registo:<br />HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\DefaultI con<br />deve estar a aparecer o seguinte:<br />C:\Program Files\Internet Explorer\iexplore.exe,-7.<br />o que deveria aparecer é:<br />C:\Program Files\Internet Explorer\iexplore.exe,-32528<br /><br />Agora é só reiniciar ou voltar a adicionar o IE ao menu.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-67285047196605490672008-10-15T17:12:00.002+01:002008-10-15T17:15:30.554+01:00Anti malware eficazEis um antimalware que em conjunto com um bom antivirus podem limpar eficazmente malware de um sistema operativo.<br />Quem gostar pode comprar mas, funciona no scan on demand e actualiza se não o fizerem.<br /><br /><a href="http://www.malwarebytes.org/mbam.php">http://www.malwarebytes.org/mbam.php</a>Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com1tag:blogger.com,1999:blog-8110958931547635159.post-6644357462644634752008-09-30T10:09:00.004+01:002008-09-30T10:19:35.203+01:00Como instalar os Language Packs do Vista em todas as versõesNo link mencionado tem-se acesso a como se pode mudar a linguagem do Windows Vista sem ser no Ultimate, que é a única versão que suporta isso nativamente.<br />Recomendo vivamente, já utilizei com sucesso. (o link tem de ser copiado para a barra de endereço)<br /><br /><a href="http://keznews.com/4907_How_to_Install_Vista_Language_Packs_MUI_on_all_versions_of_Vista___video_tutorial">http://keznews.com/4907_How_to_Install_Vista_Language_Packs_MUI_on_all_versions_of_Vista___video_tutorial</a>Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-20849101908599034732008-09-08T12:16:00.002+01:002008-09-08T13:05:23.263+01:00antivirus xp 2008O que é que o vírus faz:<br />Ele coloca o seu núcleo em C: \ programas\ # # nomealeatorio - é fácil identificar. Geralmente algo como rhcgsbj0elj0 -- Remove o acesso aos separadores Desktop e Screen Saver na janela Propriedades do Desktop através de mudanças no registo. -- Estabelece um .Bmp e um . Scr em C: \ Windows \ system32 - fáceis de identificar. Depois de trazer de volta os separadores do Desktop e do Screensaver vai-se poder ver os seus nomes e podem-se então excluir , se o antivirus não os capturar primeiro.<br /><br /><br />Para corrigir rapidamente:<br />Use este registry fix para corrigir as diversas mudanças que ele faz.<br /> -- Trará de volta os separadores Desktop e Screensaver<br /> -- Corrige as mudanças feitas ao wallpaper e ao screensaver (permite que o vírus se propague se não for imediatamente eliminado) Salve o seguinte texto como um ficheiro . Reg (escolha o nome) e execute-o.<br /><br />=--------------------=<br /><br />Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion­\Policies\System] "NoDispBackgroundPage"=dword:00000000 [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System] "NoDispBackgroundPage"=dword:00000000 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] "NoDispScrSavPage"=dword:00000000 [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System] "NoDispScrSavPage"=dword:00000000 [HKEY_CURRENT_USER\Control Panel\Desktop] "ConvertedWallpaper"="C:\\Windows\\deserto.bmp" "OriginalWallpaper"="C:\\Windows\\deserto.bmp" "SCRNSAVE.EXE"="C:\\WINDOWS\\system32\\sspipes.scr" "Wallpaper"="C:\\Windows\\deserto.bmp"<br /><br />=--------------------=<br /><br />Navegue no regedit até Hkey_Local_Machine \ SOFTWARE \ e procure por uma pasta com nome aleatório, por exemplo, rhcgsbj0elj0, e apague tudo. O registo do Windows, tem todos os links para o . Bmp e. Scr e outros .exe maliciosos que o vírus criou. Navegue no regedit para - Hkey_Local_Machine \ Software \ Microsoft \ Windows \ CurrentVersion \ Run - e procure por vários itens aleatórios lá. Eles têm nomes absurdos e devem ser fáceis de detectar. Normalmente existem 3-4. Exemplos: SMrhcgsbj0elj0, zjyacadj, lphclsbj0elj0. Uma vez que o registo seja limpo, a remoção do vírus é muito mais fácil. Execute o taskmanager e encontre os ficheiros aleatórios .exe que estão em execução.<br /><br />Abra : C: \programas\ e procure o nome da pasta aleatória que detém o vírus, por exemplo, -- rhcgsbj0elj0 -. Existem 2 arquivos que se podem excluir de imediato, um .dat e um -- ficheiro licença --. Anote o nome do ficheiro .exe que está na pasta para que saiba quais os processos a pôr termo em primeiro lugar. Tem de se terminar o processo com o tal nome aleatório .exe e , em seguida, rapidamente mudar para a outra janela para eliminar ficheiro do vírus antes dele poder criar outra tarefa e aparecer o erro de não poder apagar o ficheiro que está em uso. Depois de a parte .exe parte do vírus ter sido apagada, o restante da pasta pode ser facilmente removido e pode-se terminar a tarefa dos restantes ficheiros de vírus. Isto normalmente mantém o vírus desativado permanentemente.<br /><br />Depois convém correr o scan de virus e de preferência outro de spyware.<br /><br />Alguma dúvida é só colocar um comment.Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0tag:blogger.com,1999:blog-8110958931547635159.post-76676387709225734422008-08-01T17:48:00.002+01:002008-08-01T17:51:57.806+01:00Office 2003 em Vista pede sempre para aceitar o EULA cada vez que se inicia uma aplicação.Isto acontece porque o utilizador não está a escrever no registo com privilégios de administrador, para corrigir esta situação aqui está o link da microsoft.<br /><br /><a href="http://support.microsoft.com/kb/884202/en-us">http://support.microsoft.com/kb/884202/en-us</a>Tech guyhttp://www.blogger.com/profile/17399753616575766611noreply@blogger.com0