Software - AnonymoX Firefox extention and proxy capability

There is an interesting Firefox extention with anonymization capability on the internet. The aim is to restore the users right of anonymity in the web. Most websites monitor the behaviour of their users, giving the websites hosts the ability to analyze the general users behaviour and create detailed user profiles, which are frequently sold to third parties.

anonymoX enables to:


  1. Browse the web anonymously
  2. Change your IP address (to one provided by us)
  3. Visit blocked/censored websites
  4. Appear to originate from another country
  5. Delete cookies, show your public ip, change browser id, ....


Short summary of its functionality
Instead of accessing a website directly, it will be first opened by one of our servers, called a Proxy.
This Proxy hides your true internet identity and makes it look as if not you, but the Proxy is currently visiting the website.

anonymoX is more than just an Add-On. The actual anonymization and country faking is done by an anonymization network. It consists of many servers, in every country of your country list. These servers are provided and managed by us.
If you use anonymoX's anonymization network without paying, that is only possible because you indirectly participate in the server funding by viewing advertisements.

For ad-free and unrestricted usage of the anonymization network and the Add-On, you need anonymoX Premium.

https://addons.mozilla.org/it/firefox/addon/anonymox/?src=search

Vmware - Vcenter 5.X/6.X Antivirus exclusions


VMware vCenter Server 4.x and above is not able to send an email after an alarm has been triggered (2021458)


Considerations for installing anti-virus software on VMware vCenter Server (2062805)



Summarizing here they are exclusions on Windows 200X/2012 Server vCenter server:

C:\ProgramData\Vmware

And process vpxd.exe if it stops to send emails.

Software - Free DVD/CD burning software Ashampoo Burning Studio FREE

The Ashampoo Burning Studio FREE is a very powerful and free cd/dvd burning tool.

Here they are features:


Burn files and folders
Create CD, DVD and Blu-ray data discs
NEW
Update existing discs and add/remove files and folders
NEW
Erase rewritable CD/DVD/Blu-ray discs such as BD-RE and CD-RW discs
NEW
Burn movies
Create video DVD from prepared folder
NEW
Create video Blu-ray from prepared folder
NEW
Create Video CD (VCD)
NEW
Create Super Video CD (VCD)
NEW
Burn music
Create audio CDs
NEW
Create MP3 and WMA CD/DVD/Blu-ray discs
NEW
Extract audio from audio discs
NEW
Disc images
Create and disc images from CD/DVD/Blu-ray discs
NEW
Create disc images from projects
NEW
Backup files and folders
Create file and folder backups
NEW
Compress and encrypt backups
NEW


Download

https://www.ashampoo.com/uk/eur/pin/7110/burning-software/Ashampoo-Burning-Studio-FREE

Bitlocker - Add the BitLocker Drive Encryption Administration Utilities

You can read more about Bitlocker deployment reading these old blogs posts:

Programs - Bitlocker how to implement in your organization

http://www.alessandromazzanti.com/2014/11/programs-bitlocker-how-to-implement-in.html

Server - BitLocker: Planning and Policies

http://www.alessandromazzanti.com/2014/03/server-bitlocker-planning-and-policies.html

Windows 7 - How to utilize Bitlocker without TPM

http://www.alessandromazzanti.com/2012/11/windows-7-utilizzare-bitlocker-senza-tpm.html

If you published Bitlocker key on Active Directory, other than procedure itself (schema extension if  your AD is not compatible)

Microsoft - Determine Microsoft Domain controller Schema Version

Server - Commands to verify Domain Controller/Domain Status, schema version, move 5 PDC roles, export DHCP

You must install snap-in to manage tpm key stored in Active directory, here they are procedure

The BitLocker Drive Encryption Administration Utilities are added as features via Server Manager (or Windows PowerShell):
  1. On DC01, log on as CONTOSO\Administrator, and, using Server Manager, click Add roles and features.
  2. On the Before you begin page, click Next.
  3. On the Select installation type page, select Role-based or feature-based installation, and click Next.
  4. On the Select destination server page, select DC01.contoso.com and click Next.
  5. On the Select server roles page, click Next.
  6. On the Select features page, expand Remote Server Administration Tools, expand Feature Administration Tools, select the following features, and then click Next:
    1. BitLocker Drive Encryption Administration Utilities
    2. BitLocker Drive Encryption Tools
    3. BitLocker Recovery Password Viewer
  7. On the Confirm installation selections page, click Install and then click Close.
Figure 3

Figure 2

[more details https://technet.microsoft.com/en-us/library/mt297542(v=vs.85).aspx ]

[update 2016.12.31]

You should be aware that TrueCrypt development was no longer maintained/updated  since 2014.


Several security bugs have been not resolved.

You fan review this article about some alternatives that I summarize them in this article too.

Here they are Truecrypt alternatives (from my side I use, normally, 2. and 7. options):
  1. VeraCrypt You can find a full list of improvements and corrections that VeraCrypt made on TrueCrypt here. It is open source and free.
  2. Bitlocker no encrypted containers ability and not open source.
  3. DiskCryptor supports encryption of external devices including hard drives, USB drives, CDs, and DVDs
  4. CipherShed
  5. FileVault 2 Apple’s answer to Bitlocker, no encrypted containers ability and not open source.
  6. LUKS
  7. SafeHouse Explorer – 3.01 Portable

Veeam and Vmware 6.x CBT problems.

VMware 6.0 has a bug with CBT (http://kb.vmware.com/kb/2136854) and VMware has released patch that fixes this bug.

However, installation of this fix is not the only action that should be performed to get consistent backups with Veeam or any other backup software. 


CBT reset is mandatory for the VMs, and you could do it with help of Powershell script provided by this KB article: http://veeam.com/kb1492

If you do not want to install the patch, CBT should be disabled to avoid any possible issues.

For the Veeam upgrade to version 8 update 3 - it is highly advisable not only in terms of compatibility, but also ij terms of number of varuios fixes and improvements, coming with the upgrade.


We had no issue with disabling CBT other then increased time needed for the backups, therefore I confirm that performance is the only one thing affected with CBT disabled.

Windows 2008 - Activation Problem 0xC004C020.

The Error 0xC004C020 means the Activation key has exceeded its limit as described in the Microsoft Knowledge Base article below. As you have activated the server once, it is expected behavior.

KB 942969 http://support.microsoft.com/kb/942969/en-us


In this case, you need to call Activation Center to activate the server.

Please perform the following the steps:

1, Run the command "slui 4" from the Elevated Command Prompt
2, Please choose the nearest location where you live, click next
3, Call the Activation Department with the telephone number provided by the last step
4, Provided them with the Installation ID and they generate a corresponding Confirmation ID.
5, Enter the Confirmation ID
You will be able to activate the Windows Server 2008 Successfully.

For more information about the Windows Activation, please refer to:

933177  You may be unable to activate Windows Vista over the Internet by using the Windows Activation Wizard
http://support.microsoft.com/default.aspx?scid=kb;EN-US;933177

[original article https://social.technet.microsoft.com/Forums/windowsserver/en-US/7df79f6c-3d89-42ce-bebd-833dce637221/windows-2008-activation-problem]

Extra IT - Italian Engineer Order Training requirement

Since 2014 about Italian Engineer Order there are new training and credits requirements that each graduated must satisfy to practice Engineer profession.

Here is an official video that well explain these requirements:

Tips - Granting "Logon as a batch job" on windows Server - Error: this task requires that the user account specified has log on as batch job rights

How do I grant the Logon as a batch job privilege to my user account?

On Windows, this privilege is granted through the Local or Domain Security Policy. To do this using the Local Security Policy, follow these steps.

In the Control Panel, open Administrative Tools, then Local Security Policy.
Beneath Security Settings, open Local Policies and highlight User Rights Assignment.
Locate Log on as a batch job. Open the properties and add any users that need this right.
When finished, save your changes and close the Local Security Settings window.
Your changes should take effect immediately. 

To make changes to the Domain Security Policy, on a domain controller, use the Domain Security Policy utility in the Control Panel.

KB3114409 - Outlook 2010 only starts in Safe Mode after installing KB3114409

Last December 2015 outlook 2010 patch KB3114409 creates these problems:


  • Outlook start in safe mode.
  • Outlook 2010 is loaded with the default settings.
  • Reading Pane is turned off.
  • Modified settings aren’t being retained upon restarting Outlook.
  • Add-ins are disabled.
  • The Quick Access Toolbar and Ribbon have been reset and can’t be customized.
  • Instant Search doesn’t work.
Other than remove it in add/remove program if you have a WSUS server with patch approved you need to:


1. In the WSUS administrative console, --> click Updates.

2. In the list of updates, select one or more updates that you want to approve for removal and right-click them.

3. In the Approve Updates dialog box, select the computer group from which you want to remove the update, and click the arrow next to it.

4. Select Approved for Removal, and then click the Remove button.

5. After the remove approval has completed, you may select a deadline by right-clicking the update once more, selecting the appropriate computer group, and clicking the arrow next to it. Then select Deadline.

You may select one of the standard deadlines (one week, two weeks, one month), or you may click Custom to select a specific date and time.

6. If you want an update to be removed as soon as the client computers contact the server, click Custom, and set a date in the past.





Windows 10 - edition upgrade

With Windows 10, you can quickly upgrade from one edition of Windows 10 to another, provided the upgrade path is supported. For information on what edition of Windows 10 is right for you, see Compare Windows 10 Editions.
The following table shows the methods you can use to upgrade editions of Windows 10.

More details:


SCCM 2012 - System Center 2012 R2 Configuration Manager Toolkit

I proceed to indicate these SCCM 2012 tools collections that was provided by Microsoft to help IT admins to manage and solve any sort of problems that theyare facing utilizing this exceptional product:

https://www.microsoft.com/en-us/download/details.aspx?id=50012

    he Microsoft System Center 2012 R2 Configuration Manager Toolkit contains fifteen downloadable tools to help you manage and troubleshoot Microsoft System Center 2012 R2 Configuration Manager. The following list provides specific information about each tool in the toolkit.

    Note: Items with an * are new in the R2 Toolkit and require Microsoft System Center 2012 R2 Configuration Manager for full functionality.

    Server Based Tools
    • * DP Job Manager - A tool that helps troubleshoot and manage ongoing content distribution jobs to Configuration Manager distribution points.
    • * Collection Evaluation Viewer - A tool that assists in troubleshooting collection evaluation related issues by viewing collection evaluation details.
    • * Content Library Explorer - A tool that assists in troubleshooting issues with and viewing the contents of the content library.
    • Security Configuration Wizard Template for Microsoft System Center 2012 R2 Configuration Manager - The Security Configuration Wizard (SCW) is an attack-surface reduction tool for the Microsoft Windows Server 2008 R2 operating system. Security Configuration Wizard determines the minimum functionality required for a server's role or roles, and disables functionality that is not required.
    • Content Library Transfer – A tool that transfers content from one disk drive to another.
    • Content Ownership Tool – A tool that changes ownership of orphaned packages (packages without an owner site server).
    • Role-based Administration Modeling and Auditing Tool – This tool helps administrators to model and audit RBA configurations.
    • Run Metering Summarization Tool - The purpose of this tool is to run the metering summarization task to analyze raw metering data

    Client Based Tools
    • Client Spy - A tool that helps you troubleshoot issues related to software distribution, inventory, and software metering on System Center 2012 Configuration Manager clients.
    • Configuration Manager Trace Log Viewer – A tool used to view log files created by Configuration Manager components and agents.
    • Deployment Monitoring Tool - The Deployment Monitoring Tool is a graphical user interface designed help troubleshoot Applications, Updates, and Baseline deployments on System Center 2012 Configuration Manager clients.
    • Policy Spy - A policy viewer that helps you review and troubleshoot the policy system on System Center 2012 Configuration Manager clients.
    • Power Viewer Tool – A tool to view the status of power management feature on System Center 2012 Configuration Manager clients.
    • Send Schedule Tool - A tool used to trigger a schedule on a client or trigger the evaluation of a specified DCM Baseline. You can trigger a schedule either locally or remotely.
    • Wakeup Spy – A tool that provides a view of the power state of Configuration Manager client computers and which operate as managers or manages.
  • System Requirements
    Supported Operating System
    Windows Phone 7, Windows Phone 8, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2

Recovery - Access, Excel, Word, Office and Photo recovery tools and other blog procedures

During these years I had necessity to recover various files (.doc, mdb, .xls, photos...) 

I utilized various free tools (here is an example http://www.alessandromazzanti.com/2011/03/recuperare-file-excel-xls-xls-corrotti.html


but results was not always satisfactory.


So, in some particular occasions, I purchased one of thess tools and I got results that were really more than expected.


So I take note about these software and other tools in case they would be interesting for anyone else and for me, to find related links, in case I will face again on an important problem.


AccessFIX


It recovers .mdb files and data and works with Microsoft Access 95, 97, 2000, 2002 (XP), 2003, 2007, 2010 and 2013.


Download


<------->

ExcelFIX
It recovers .xls/.xlsx files and data and works with recovers files created in Excel 95, 97, 2000, 2002 (XP), 2003, 2007, 2010 and 2013.

Download


Recuperare file Excel .xls .xls corrotti - Programma gratuito


<------->

WordFIX
It recovers .doc/.docx files and data and works with Word 2.0, 6.0, 95, 97, 2000, 2002 (XP), 2003, 2007, 2010, 2013 and all versions of Word for Macintosh.

Download


<------->

OutlookFIX
It recovers .PST files and data and works with with Outlook 95, 97, 2000, 2002 (XP), 2003, 2007, 2010 and 2013.

Download

Here they are some related blog articles:


Office 200x/201X - How to repair your Outlook personal folder file (.pst)


Office - Riparare i file .pst corrotti di Office 200x/201x


<------->

OfficeFIX

OfficeFIX includes three or all the four recovery programs with savings of more than 40%.




<------->

About file recovery I proceed to indicated in this article:

Tools - Differents Recovery tools


and here is an alternative that worked fine on issue that precedents tools was not able to help me


Photo undelete


DeleteFIX Photo recovers deleted or formatted digital photos and videos from almost all digital cameras. Also recovers from any other storage media such as hard drives, USB devices or pen drives.


Download


Freeware - Delprof2 – User Profile Deletion Tool

I got this tool suggest from an IT colleague and, considering that is useful, I proceeded to publish relative article.

More details:

https://helgeklein.com/free-tools/delprof2-user-profile-deletion-tool/

<-->

Delprof2 is the unofficial successor to Microsoft’s Delprof which does not work with operating systems newer than Windows XP. Here are the main facts:
  • Delprof2 is syntax compatible to the original Delprof, but more powerful
  • Delprof2 lets you explicitly specify which profiles to delete
  • Delprof2 bypasses security to delete profiles regardless of current permissions/owner
  • Delprof2 supports very long paths
  • Delprof2 works on nearly all versions of Windows
  • Delprof2 is free for private use, for educational and non-profit organizations. All other organizations may use Delprof2 for free, too, if they allow us to publish their name.
    Otherwise a commercial license must be purchased.

What Does it Do?

Delprof2 deletes inactive user profiles. If you want to reclaim disk space just run it without parameters and it will delete all profiles except your own and some special profiles needed by the operating system (like “Default”).
Delprof2 has additional filtering options: you might want to delete locally cached copies of roaming profiles only or delete only those profiles that have not been used in a specified number of days. Delprof2 does it all, both on the local system and remotely.

Special Features

Exclusions and Inclusions with Wildcards

It is a frequent requirement to delete all profiles except one or two which should be left unchanged. With version 1.5 of Delprof2 that is easily possible: profiles can be excluded from deletion using a wildcard notation. If, on the other hand, only a few known profiles are to be deleted, use the inclusion feature and Delprof2 ignores everything else. Combining excludes and includes is possible, too, of course.

Bypassing Security

User profiles often have permissions set on them in such a way that not even administrators have access without prior ACL manipulation. Delprof2 circumvents this requirement by making use of backup and restore privileges to analyze and delete even the most tightly secured profiles.

Long Paths

Some programs store files in paths with more than 260 characters. Most tools cannot deal with such paths that are longer than the value of MAX_PATH (260). Windows Explorer is a prominent example. Delprof2, on the other hand, makes use of special APIs to be able to delete files in the remotest areas of your hard drive.

Syntax and Examples

The program’s help screen describes the available options in detail:
Delprof2 by Helge Klein (https://helgeklein.com)
 
Delprof2 deletes inactive Windows user profiles (profiles that are not currently loaded).
Delprof2 is syntax compatible with the original Delprof by Microsoft. Unlike the original it works on all versions of Windows 
(XP/2003/Vista/2008/7/2008 R2/8).
If possible, Delprof2 uses the backup and restore privileges to bypass security and delete even profiles the executing user does not 
normally have access to.
Delprof2 has no problem whatsoever deleting files in very long paths (longer than MAX_PATH, 260 characters).
Delprof2 also cleans up stale ProfileList SID.bak registry entries, a common cause of temporary profiles.
 
Usage: delprof2 [/l] [/u] [/q] [/p] [/r] [/c:[\\]] [/d: [/ntuserini]] [/ed:] [/id:] [/i]
 
       /l   List only, do not delete (what-if mode)
       /u   Unattended (no confirmation)
       /q   Quiet (no output and no confirmation)
       /p   Prompt for confirmation before deleting each profile
       /r   Delete local caches of roaming profiles only, not local profiles
       /c   Delete on remote computer instead of local machine
       /d   Delete only profiles not used in x days
       /ntuserini
            When determining profile age for /d, use the file NTUSER.INI
            instead of NTUSER.DAT for age calculation
       /ed  Exclude profile directories whose name matches this pattern
            Wildcard characters * and ? can be used in the pattern
            May be used more than once and can be combined with /id
       /id  Include only profile directories whose name matches this pattern
            Wildcard characters * and ? can be used in the pattern
            May be used more than once and can be combined with /ed
       /i   Ignore errors, continue deleting
 
Examples:
 
Delprof2 /c:computername
 
       Deletes inactive profiles on 'computername'.
 
Delprof2 /c:computername /l
 
       Lists inactive profiles on 'computername' without deleting them.
 
Delprof2 /d:30
 
       Deletes profiles older than 30 days on the local computer.
 
Delprof2 /r
 
       Deletes locally cached roaming profiles only.
 
Delprof2 /ed:admin* /ed:pmiller
 
       Deletes all inactive profiles on the local computer except those starting with 'admin' and the one called 'pmiller'.
Here is an example of Delprof2 in action, deleting user profiles remotely on a Windows XP computer (Windows 7 / 2008 R2 work just as well):
D:\>DelProf2.exe -c:192.168.175.130 -p
 
DelProf2 by Helge Klein (https://helgeklein.com)
 
Delete inactive profiles on '192.168.175.130'? (Yes/No) y
 
Ignoring profile '\\192.168.175.130\C$\Dokumente und Einstellungen\All Users' (reason: special profile)
Ignoring profile '\\192.168.175.130\C$\Dokumente und Einstellungen\Default User' (reason: special profile)
Ignoring profile '\\192.168.175.130\C$\Dokumente und Einstellungen\LocalService' (reason: special profile)
Ignoring profile '\\192.168.175.130\C$\Dokumente und Einstellungen\NetworkService' (reason: special profile)
Ignoring profile '\\192.168.175.130\C$\Dokumente und Einstellungen\Administrator.WINXP' (reason: in use)
 
The following user profiles match the deletion criteria:
 
\\192.168.175.130\C$\Dokumente und Einstellungen\administrator.HK
\\192.168.175.130\C$\Dokumente und Einstellungen\Helge
\\192.168.175.130\C$\Dokumente und Einstellungen\test01
\\192.168.175.130\C$\Dokumente und Einstellungen\testlocal
\\192.168.175.130\C$\Dokumente und Einstellungen\testlocal2
 
Delete profile '\\192.168.175.130\C$\Dokumente und Einstellungen\administrator.HK'? (Yes/No) y
Deleting profile '\\192.168.175.130\C$\Dokumente und Einstellungen\administrator.HK' ...
   ... done.
 
Delete profile '\\192.168.175.130\C$\Dokumente und Einstellungen\Helge'? (Yes/No) n
 
Delete profile '\\192.168.175.130\C$\Dokumente und Einstellungen\test01'? (Yes/No) n
 
Delete profile '\\192.168.175.130\C$\Dokumente und Einstellungen\testlocal'? (Yes/No) n
 
Delete profile '\\192.168.175.130\C$\Dokumente und Einstellungen\testlocal2'? (Yes/No) n

License

Delprof2 may be used free of charge if either of the following is true:
  • private use
  • non-profit organization
  • educational organization such as schools and universities
Delprof2 may only be used free of charge by all other, especially commercial, organizations, if a representative authorized to do so sends an e-mail with the following text to info@helgeklein.com: “We authorize vast limits GmbH to publicly display the name and logo of our company FILL IN NAME HERE in vast limits GmbH’s marketing materials.”
Otherwise a commercial license must be purchased.

2012 R2 Essential- Update to support auto-redirection of Windows Server 2012 R2 Essentials for Windows 10 client connector

Microsoft finally delivered Windowds 10 client connector for Windows 2012 R2 Essential, here they is link and more detailis:

https://support.microsoft.com/en-us/kb/3105885

About this update
This update enables the Windows 10 clients to be joined to the Windows Server 2012 R2 Essentials. Currently, you have to download and install the client connector manually on the Windows 10 client. This manual process will not be required after you apply this update to Windows Server 2012 R2.


How to get this update
Important If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Method 1: Windows Update

This update is provided as an Optional update on Windows Update. For more information about how to run Windows Update, see How to get an update through Windows Update.

Method 2: Microsoft Download Center

This update is available for download from the Microsoft Download Center: 

DownloadDownload the Windows Server 2012 R2 package now.