Wednesday, December 31, 2008

Generic Virus Removal Guide

STEP 1: SCAN COMPUTER FOR INFECTIONS AND FIX OPTIONS

1. The most important thing you can do is make sure you know what you’re up against. Run these online scanners to help figure out what is infecting your system:
-http://housecall.trendmicro.com/
-http://www.pandasecurity.com/homeusers/solutions/activescan/


STEP 2: TURN OFF SYSTEM RESTORE

1. Turn off Windows System Restore Points:
a. Right Click on My Computer
b. Click Properties
c. Click System Restore Tab
d. Check the box next to: Turn off System Restore on all Hard drives
i. Malware can sometimes be restored from previous restore points, this will help the removal process run more smoothly
2. Click Apply and OK


STEP 3: GO TO ADD/REMOVE PROGRAMS TO CLEAR KNOWN MALWARE

1. Before scanning the computer you can remove certain malware programs from the Add/Remove Programs list in the Control Panel in Windows XP
2. Open the Start Menu and select Control Panel
3. In the Control Panel, select Add or Remove Programs
4. Look through the list for anything suspicious
5. Search http://www.google.com/ for any program you are not sure about.
6. Uninstall and follow the directions on any program that you decide to remove.


STEP 4: REMOVE TEMPORARY FILES

1. Go to the Start Menu and select Control Panel and click Internet Options.
a.Click the “Delete” button and delete all browsing history (temp files, internet files, cookies) and any settings stored by add-ons.
2. Open My Computer and click the Tools Menu and select “Folder Options.”
a. Next click on the View Tab and click in the circle next to “Show Hidden Files and Folders” then click OK.
3. In My Computer click on the C Drive > Documents and Settings > USERNAME (do this for as many names as you have on the computer) > Local Settings > Temp.
a. Now go to the Edit Menu and click “Select All.”
b. Once all the files are selected hit the “Delete” key.
4. Open the Start Menu, mouse over All Programs> Accessories> System Tools> and select Disc Cleanup
a. Select C Driver and click OK
b. Check any boxes listed here
c. Click OK and Yes
5. Download, install, and run CCleaner:
-http://www.ccleaner.com/


STEP 5: MALWARE REMOVAL TOOLS

1. Trojans, Worms, Key Loggers, Viruses, and Spyware are all very difficult to remove with just a single program. That is why it is recommend to run several programs to aid in the removal process. I recommend running each of the following programs listed below in order. Not all the programs are freeware and require purchase, you don’t have to run that program but I recommend looking into it if the results come back with your computer still being infected. Still, after all the freeware programs have run through your computer should be clean of any infection.

NOTE: It is recommend to run these programs in Safe Mode for the best results!

2. Freeware – Rogue Remover: This is a handy little program that can help remove some of the well known programs that plague computers. It's good at removing false antivirus programs that might be popping up while you are on the computer.
-http://www.malwarebytes.org/rogueremover.php

3. Freeware - Malwarebytes' Antispyware - This program has gained a lot of popularity for the text document it creates to outline what has been removed. On overall removal it is about par for antispyware, but it does a good job getting some of the Vundo files out at the beginning. A good program for the first sweep.
-http://www.malwarebytes.org/mbam.php

4. Freeware – Spyware Doctor: In my personal experience and on sites like PC World, PC Magazine, AV-Testing, Spyware Doctor is the #1 at removing malware. If there is one tool you use then make sure it is this one.
http://www.download.com/Spyware-Doctor-Starter-Edition/3000-8022_4-10754824.html

5. Freeware – AVG Anti-Spyware: I’m not a huge fan of the AVG Antivirus but I’ve found that their Anti-Spyware does have a good kick to it. It can find a lot of the obscure malware programs some of the others might miss.
http://free.grisoft.com/

6. Freeware – SUPERAntiSpyware: This program has the capability to detecting a lot of annoying pieces of malware, not quite as top notch as the paid versions but good enough.
-http://www.superantispyware.com/

7. Freeware – Spybot: This one gets a lot of advertising bots and other malicious programs.
-http://www.safer-networking.org/en/index.html

8. Trialware – Counterspy: With a surprisingly powerful engine I find that Counterspy will power through the system and pick up the mess a lot of the previous programs might have missed.
-http://www.sunbelt-software.com/Home-Home-Office/Anti-Spyware/

9. Trialware – Spy Sweeper w/AV: I always save one of the best for last. Although Spy Sweeper may not have the best removal engine, it has been proven time and time again as the best active protection Spyware program. Also their Spy Sweeper with Antivirus is powered by Sophos which makes it quite a powerful program. It’s a $30 or more depending on the version you want but this is well worthwhile. This is one that you want to have for active protection.
-http://www.webroot.com/registration/trialRegistration.php?lang=en

10. Trialware – Registry Mechanic – You can purchase the full version for $30 but I find it does a pretty good job of cleaning up in the end even with just the trial.
-http://www.pctools.com/registry-mechanic/?ref=afl_onenetwork

STEP 5: ADDITIONAL MALWARE REMOVAL TOOLS
Note: These Programs should not be necessary after running the previous programs, but they are good enough to do a nice cleanup if necessary.
11. With a few stubborn files I find that the following programs will sometimes have a slight edge.
Smitfraud Removal:
- http://siri.urz.free.fr/Fix/SmitfraudFix_En.php
Vundofix:
-http://vundofix.atribune.org/

12. Freeware – Ad-Aware 2007: Just because, does a great job finding cookies and small time malware.
-http://www.lavasoftusa.com/software/adaware

13. Freeware – Spyware Terminator: Although you might have almost cleaned out the complete infection it doesn’t hurt to run this guy to double check your work.
-http://www.spywareterminator.com/


STEP 6: HIJACKTHIS

1. Many times malware can hide itself in the computer to avoid detection, or change the file name it uses. HijackThis examines certain key areas of the Registry and Hard Drive and lists their contents. These are areas which are used by both legitimate programmers and hijackers. Some items are perfectly fine. You should not remove them. Never remove everything. Doing that could leave you with missing items needed to run legitimate programs and add-ins.
-http://www.download.com/3000-8022_4-10781312.html
2. If you are unsure how to use this program then follow this guide.
-http://www.whatthetech.com/hijackthis_v2/
3. After running a scan make sure to post the log on the following website so the experts can analyze it for you.
-http://www.geekstogo.com/forum/register.html


STEP 7: SCAN COMPUTER FOR INFECTIONS

1. Once more I recommend going to the online scanner just to be sure that you were able to remove all the malware infections:
-http://housecall.trendmicro.com/
-http://www.pandasecurity.com/homeusers/solutions/activescan/


STEP 8: TURN ON SYSTEM RESTORE

1. Turn on Windows System Restore Points:
a. Right Click on My Computer
b. Click Properties
c. Click System Restore Tab
d. Uncheck the box next to: Turn off System Restore on all Hard drives
2. Click Apply and OK


STEP 9: WINDOWS UPDATES

1. It might seem simple butting running the Windows Updates on the system will help it against vulnerabilities of future malware problems.
-http://windowsupdate.microsoft.com


STEP 10: SETUP PROTECTION

1. Now that the system has been cleaned you want to protect it from happening again. I would recommend the following anti-virus and anti-spyware programs to help protect the machine.
2. Anti-Virus
a. Avast: In overall scans I found that this comes in at the top for virus and spyware protection amongst the free anti-virus programs.
http://www.avast.com/
b. Avira: In the same scans I found that Avira comes in a very close second to Avast for virus and spyware protection.
http://www.avira.com/en/pages/index.php
3. Anti-Spyware
a. Spyware Blaster: This is a powerful utility that helps to block potential spyware problems from browsers and websites.
http://www.javacoolsoftware.com/spywareblaster.html
b. PC Tools Threatfire: This program is a behavioral detector that is capable of blocking a vast majority of malicious programs. Best part is, it’s free! This is a must have on your freshly cleaned system.
http://www.threatfire.com/
c. Spy Sweeper w/AV: As I said before this one is the best that I’ve come across. You will have to pay for it yearly for the protection but the price is not to high to deter from the purchase.
-http://www.webroot.com/En_US/index.html?rc=5082
4. Firewall
a. Comodo Firewall: With amazing ratings this free firewall has stormed to the top of the list.
http://www.personalfirewall.comodo.com/


STEP 11: SYSTEM RECOVERY

1. In a worst case scenario if the following steps do not clean your system, even after purchasing the software, you would want to do the system recovery on the computer. Just make sure you backup your important files before formatting. This will format the hard drive and erase any problems the computer was happening before restoring it to a factory default state that it came from the manufacturer.


REVIEW SOURCES:

Spyware Doctor: http://www.pcmag.com/article2/0,1759,2106191,00.asp
AVG Antispyware: http://www.pcworld.com/article/id,136193/article.html
Super Antispyware: http://www.pcmag.com/article2/0,1759,2127210,00.asp
Spybot: http://www.pcmag.com/article2/0,1759,1830047,00.asp
Counterspy: http://www.pcmag.com/article2/0,1759,2100539,00.asp
Spy Sweeper w/AV: http://www.pcmag.com/article2/0,1759,2152041,00.asp
Ad-Aware 2007: http://www.pcmag.com/article2/0,1759,2155541,00.asp
Spyware Terminator: http://www.pcmag.com/article2/0,1759,2167808,00.asp
Avast: http://www.pcmag.com/article2/0,2704,1864592,00.asp
Avira: http://www.pcmag.com/article2/0,1759,1864580,00.asp
PC Tools Threatfire: http://www.pcmag.com/article2/0,1759,2191333,00.asp
Comodo Firewall: http://www.pcmag.com/article2/0,1759,2236657,00.asp


See Also:
http://ultcomprepair.blogspot.com/2008/07/generic-virus-related-issues.html

Thanks to TechGuru for this information

Tuesday, December 30, 2008

The Mysterious Black Screen of Death - Is It Vista?

It goes like this: Your Vista system boots up to a black screen with a mouse cursor. That's it, no rest of the user interface, no nothing to do. This is showing up in sporadic reports since about early November. They call it the blacK Screen Of Death, or KSOD (because BSOD was already taken).

What is causing it? That's unclear for now. But there is a fix, courtesy of Mark from the SBSC & MSP Buzz Blog. He says the problem is related to the RPC service running under the LocalSystem account as opposed to the NT Authority\NetworkService account, and I quote:


  • On the affected machine, boot using the Vista Media and Select "Next" and then in the bottom left you will see "Repair your Computer"; select Next and then Select Command Prompt.

  • At the command prompt, launch regedit.exe and load the SYSTEM hive, follow the below steps.

    • a. Select HKEY_LOCAL_MACHINE

    • b. On the File menu, select Load Hive.

    • c. Browse to %WINDIR%\System32\Config Folder and select "SYSTEM"

    • d. Select Open.

    • e. In the Load Hive dialog box, type in "MySYSTEM" box for the registry hive that you want to edit.

  • After the hive is loaded, modify the following key value per the instructions below: You will need to know what ControlSet the machine is currently running on, this can be determined by going to HKEY_LOCAL_MACHINE\MySYSTEM\Select and find the "Current" value in the Right hand side. (Example: Current value is 1 then the ControlSet will be ControlSet001)

    Key: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet00X\Services\RpcSs (X is the Number from the Current Key from above)

    Value Name: ObjectName

    Old Value: LocalSystem

    New Value: NT AUTHORITY\NetworkService

  • Unload the SYSTEM hive by selecting the key "MySYSTEM" and then select "File->Unload Hive" menu item.

  • Exit regedit.exe

  • Reboot the system normally

Susan Bradley of the ever-entertaining SBS Diva Blog has some interesting perspective to add to this: we don't know what's causing this, so it may not actually be Vista, or at least not something simple about it. Something is changing the ObjectName key value, but we don't know what. Remote vulnerability? Malware? Stray neutrinos?

Windows doesn't normally log things to this level of detail so post-mortems on KSOD'd systems are not informative. But—and this is your mission, should you choose to accept it—you can turn on Auditing on the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RpcSs key to see what did it, should you get the KSOD bug. Susan shows you how to do it here.

Next stop for me: Regedit.

Saturday, December 20, 2008

Simple telephone reminders

Wakerupper is the web's easiest telephone reminder tool.
Schedule reminder calls on the web. It couldn't be simpler.


Use Wakerupper to...

Tick Set a wake-up call at a specific time
Tick Remind yourself of important events
Tick Remember to take medication on time
Tick Escape from a boring date or meeting
Tick Remind child or spouse to do chores
Tick Set reminders for tasks and follow-ups

...and much more!

Wakerupper is a telephone reminder service that aims to make telephone alerts as simple as possible. Just enter the number of the phone you would like to be called, the time you want the call to be placed, and an optional 140-character reminder message. That's it - you will receive a call from Wakerupper at the time you have specified and your message will be delivered.

Wednesday, November 26, 2008

DNS record explanations

DNS records, (or Resource Records) are stored in the zone file for a domain name and are used for translating domain names to IP addresses. They also contain other data, including Domain Name System, (DNS) server, Mail server and Alias information.

Modifications to your DNS Record may take approximately 12 - 24 hours to be acknowledged by the DNS for your account.

Record Explanations:

A Record
The A Record, (Address Record or IP Address), for a domain name is used to specify the physical address on the Internet that a user must connect to in order to use the information associated with that domain name, such as web site files or other types of data. For instance, if a web site for the domain name exampledomainname.com exists at the address 123.123.123.123, the IP Address for that domain name will be set to 123.123.123.123 in the zone file on that domain name's authoritative DNS.

AAAA Record
The AAAA Record, (Address Record or IP Address), is very similar to an A record in that it is used to associate a domain name with the IP address of the corresponding service (i.e. a website such as www.register.com ). However, these records are used to specify an IPv6 (Internet Protocol version 6) address record rather than an IPv4 (Internet Protocol version 4) address record as the A Record does. AAAA records are 128 bits in length and are typically represented in hexadecimal notation as such: 2001:06b0:1:00ea:0202:a5ff:fecd:13a6.

CNAME Record
A CNAME (Canonical Name or Domain Alias) section of a zone file, is an extension to a domain name that allows the creation of derivatives of the domain name which can be pointed to the same (or any other) domain name on the Internet. An example of a Domain Alias is www.register.com points to Register.com, where "www" functions as the Domain Alias and accesses the same web site as Register.com.

MX Record
The MX Record, (Mail Exchange Record), is the section of a domain name's zone file whose entries specify the mail server(s) on the Internet responsible for email distribution for a specific domain name. Any mail sent to an email address at a domain name must be routed on the Internet through the mail servers specified in the MX Record for that domain name, in order to reach the recipient.

TXT Record
TXT records are used to describe an entry in a zone file. The description can be anything that fits into 255 characters or less. TXT records are often used to support Sender Policy Framework, (SPF), an authentication system for email.

SRV Record
SRV (service) records allow flexibility and stability to services making use of them. Like a "general use" MX record, the SRV records relate to a particular service of the domain, like FTP or SIP, rather than a specific machine the way A or C-name records do.

Several programs are starting to make use of SRV records for such purposes as FTP, telnet and security applications, and they are commonly used for newer applications such as voice over IP.

A cluster of computers can be specified for a given service, with differing priority and "weighting" assigned, so a system or server administrator can specify both the order in which the machines are queried and the proportion of requests each server would handle. This allows a slower machine to take a smaller amount of the traffic, creating a greater efficiency of the service, and in other words, balancing the traffic load.

PTR Record
The PTR Record (Pointer or Reverse Record) can be thought of as the opposite of an A Record. This is what allows a reverse DNS lookup, (where an IP Address is used to map, or determine what your host/domain name is).

Not every IP address has a corresponding PTR record, however they are sometimes required for diagnostic or security purposes. PTR records are added to reverse zones.

Sunday, November 9, 2008

Windows 2003 Server 2 NIC/Network Cards Multi-homed connection

Make sure you either have or can install Routing & Remote Access (should be in Administrative Tools)
If you need to install it, just do so with basic NAT/Firewall checked (one of the options required to install RRAS - Routing and Remote Access Service), but we're not going to use NAT.

Remove your gateways from your adapters (by going to your NIC->TCP/IP Properties->Advanced->Gateways->Remove (hopefully you can get my drift))

In the RRAS snap-in, right click on Static Routes and add a new route.
(I'm going to assume that your LAN connections are named "Network Card 1" and "Network Card 2" respectively for ease of typing)
Set this up:
Interface: Network Card 1
Destination: 0.0.0.0
Network mask: 255.255.255.255
Gateway: 192.168.0.1
Metric: 1

Click ok, and right-click "Static routes" and add another new route:
Set this up:
Interface: Network Card 2
Destination: 0.0.0.0
Network mask: 255.255.255.255
Gateway: 192.168.0.2
Metric: 1

Click "OK" and then right-click on "static routes" and click "show ip table"
make a note/screenshot of it as it is now

Go back to your network adapter
properties, go to the "Network Card 1" properties
Go to TCP/IP Properties->Advanced->Gateways->"Add"
Gateway: 192.168.0.1
Automatic Metric: UNCHECKED
Metric: 20
Close out of that

go to the "Network Card 2" properties
Go to TCP/IP Properties->Advanced->Gateways->"Add"
Gateway: 192.168.0.2
Automatic Metric: UNCHECKED
Metric: 20

Now get a new list of the routes in your IP routing table by going into the RRAS snap-in, right click on "static routes" and click "show ip routing table"
You should have at the top, something like this (the first 4 lines are the critical ones, if these aren't right, re-try the order in which you setup the static routes & add the gateways)

Destination Network Mask Gateway Interface Metric Protocol
0.0.0.0 255.255.255.255 192.168.0.1 Network Card 1 1 Static (non...)
0.0.0.0 255.255.255.255 192.168.0.2 Network Card 2 1 Static (non...)
0.0.0.0 0.0.0.0 192.168.0.1 Network Card 1 20 Network Mgmt
0.0.0.0 0.0.0.0 192.168.0.2 Network Card 2 20 Network Mgmt

Be sure to make your destination NAT on your routers MATCH from router to IP resepectively, or the whole thing won't work, ie:
router: 192.168.0.1 needs to forward traffic to 192.168.0.5
router: 192.168.0.2 needs to forward traffic to 192.168.0.4

Essentially what you're doing is bonding a gateway to a NIC. This may work for you, it has definately worked for me when I needed to setup a web server that would respond on 2 different public IP's.

Wednesday, November 5, 2008

Recover from a Corrupted Registry in Windows XP

When Will This Recovery Work?
You'll want to use the steps on this page to recover from a corrupted registry when you have already tried other options such as System Restore and you receive a message similar to one of the following when you try to boot your computer with Windows XP.

  • Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

  • Windows XP could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SOFTWARE

  • Stop: c0000218 {Registry File Failure} The registry cannot load the hive (file): \SystemRoot\System32\Config\SOFTWARE or its log or alternate

  • System error: Lsass.exe
  • When trying to update a password the return status indicates that the value provided as the current password is not correct.
Be careful using this procedure in other circumstances or with an OEM version of Windows XP since OEM installations create passwords and user accounts that did not exist previously and may cause you not to be able to log into the Recovery Console to restore files.

Booting into the Recovery Console

You'll need to use the Windows XP Recovery Console to fix a corrupted registry, this will either require you to boot from a Windows XP Installation CD or boot directly to the Recovery Console if its installed. Follow these steps to boot into the Recovery Console from a Windows XP Installation CD.

1)
Place your Windows XP in the CD-ROM Drive
2) Restart your computer and make sure your BIOS is set to boot from CD
3) When you see the following command press the space bar.

"press any key to boot from cd..."

4) Wait until you see the "Welcome to Setup" screen, and press R to start the Recovery Console
5) Choose which Windows installation you wish to load (this is usually #1 unless you have a multi-boot system)
6) Type the administrator password and Press Enter
7) You should now be at the C:\Windows> prompt

Copy Repair Files Using the Recovery Console

This procedure assumes Windows is installed on Drive C, if you have installed Windows on another drive, please substitute the appropriate drive letter in the procedure below.

At the Recovery Console command prompt, type the following lines, pressing ENTER after you type each line:

md tmp
copy c:\windows\system32\config\system c:\windows\tmp\system.bak
copy c:\windows\system32\config\software c:\windows\tmp\software.bak
copy c:\windows\system32\config\sam c:\windows\tmp\sam.bak
copy c:\windows\system32\config\security c:\windows\tmp\security.bak
copy c:\windows\system32\config\default c:\windows\tmp\default.bak

delete c:\windows\system32\config\system
delete c:\windows\system32\config\software
delete c:\windows\system32\config\sam
delete c:\windows\system32\config\security
delete c:\windows\system32\config\default

copy c:\windows\repair\system c:\windows\system32\config\system
copy c:\windows\repair\software c:\windows\system32\config\software
copy c:\windows\repair\sam c:\windows\system32\config\sam
copy c:\windows\repair\security c:\windows\system32\config\security
copy c:\windows\repair\default c:\windows\system32\config\default

Type exit to quit Recovery Console. Your computer will restart, press F8 as it starts and choose Safe Mode.


Restart in Safe Mode and Find a Recent Snapshot Backup

Restart your computer in Safe Mode by pressing F8 during the initial bootup and choosing Safe Mode. Once in Safe Mode, you need to make sure the files and folders are visible so you can access them. Follow these instructions to accomplish this.

1. Open My Computer
2. Click on the Tools menu, then click Folder Options.
3. Click the View tab.
4. Under Hidden files and folders, click to select Show hidden files and folders, and then click to clear the Hide protected operating system files (Recommended) check box.
5. Click Yes when the dialog box that confirms that you want to display these files appears.

In My Computer, Double-click the drive where you installed Windows XP (usually Drive C) to display a list of the folders. then double-click on the "System Volume Information" folder. This folder contains the system restore points stored on your computer. The folders will look similar to

_restore{EE42BEB8-700A-495F-8004-53D26C2E12C5}

You might receive an access denied error message similar to the following when trying to access the System Volume Information folder.

C:\System Volume Information is not accessible. Access is denied.

This is generally caused because the user you are logged in under does not have permissions set on the folder. To fix this, follow the instructions in the Microsoft Knowledge Base article 309531 to gain access and continue. Each version of Windows XP is different on how to change these permissions.

Once you have access to the snapshots, use the instructions below to copy one of the latest snapshots to the Windows\TMP directory so you have access to it.

1) In the System Volume Information Folder, click on View, and then click Details to display the date of each snapshot folder.
2) Double-click on a folder that was not created at the current time but rather before the problem started.
3) Double-click on the Snapshot subfolder
4) Using your normal windows copy and paste techniques, highlight the following files and copy them into the C:\Windows\TMP folder
  • _REGISTRY_USER_.DEFAULT
  • _REGISTRY_MACHINE_SECURITY
  • _REGISTRY_MACHINE_SOFTWARE
  • _REGISTRY_MACHINE_SYSTEM
  • _REGISTRY_MACHINE_SAM
5) Rename the files that you just copied into the C:\Windows\TMP folder by right-clicking on each filename and choosing Rename, then typing the new name. Repeat this for each file in the list below.
  • Rename _REGISTRY_USER_.DEFAULT to DEFAULT
  • Rename _REGISTRY_MACHINE_SECURITY to SECURITY
  • Rename _REGISTRY_MACHINE_SOFTWARE to SOFTWARE
  • Rename _REGISTRY_MACHINE_SYSTEM to SYSTEM
  • Rename _REGISTRY_MACHINE_SAM to SAM
6) Once you have renamed the files, restart your computer again with the Recovery Console (refer to the instructions above to do this)


Replace the Repair Files with a Current Backup of the Registry

After rebooting the computer and starting the Recovery Console again, type the following commands at the prompt to replace the files with a current backup. You'll need to press Enter after each command.

del c:\windows\system32\config\sam
del c:\windows\system32\config\security
del c:\windows\system32\config\software
del c:\windows\system32\config\default
del c:\windows\system32\config\system

copy c:\windows\tmp\software c:\windows\system32\config\software
copy c:\windows\tmp\system c:\windows\system32\config\system
copy c:\windows\tmp\sam c:\windows\system32\config\sam
copy c:\windows\tmp\security c:\windows\system32\config\security
copy c:\windows\tmp\default c:\windows\system32\config\default

After the files have been replaced, type EXIT at the command prompt to restart Windows in normal mode.


Use System Restore to Return to a Good Backup Point

Because there is more to a System Restore than just the registry files, follow these steps to restore your computer to a good backup point.

1. Click Start, and then click All Programs.
2. Click Accessories, and then click System Tools.
3. Click System Restore, and then click Restore to a previous Restore Point and finish the restore.

Thursday, October 30, 2008

How to grant Send On Behalf Of permission


"Send on Behalf Of" allows one user to be able to send emails on behalf of another. The message will show the recipient who the message was sent on behalf of and who actually sent the message.

There are two ways of granting "Send on Behalf Of":

  • via Outlook
    allowing a user to grant others to send on their behalf
  • via Active Directory Users and Computers
    which can be performed by system managers only

Grant Send on Behalf of via Outlook

This procedure will allow you to grant other users the ability to send on your behalf:

  1. Start Outlook
  2. Tools → Options, select the "Delegates" tab
  3. Click on [Add ...]
  4. Add the user or users that you want to grant the send-on-behalf-of permission to, then click [OK]
  5. The next window will allow you to specify which permissions you are granting. To allow send-on-behalf-of, you need to grant permissions on the "Inbox" to either "Author" or "Editor", then click [OK]
  6. Click [OK] to close the "Options" dialog.

Note:

  • The above has been demonstrated to work when using Outlook 2003, but not with Outlook 2000 connected to a Exchange 2003 server (I have not had time to identify why).
  • See also "How to send a message on behalf of another"

Grant Send on Behalf of via Active Directory Users and Computers

This procedure will allow system managers to grant users the ability to send on the behalf of other users:

  1. Log onto the server running Exchange.
  2. Run Active Directory Users and Computers.
  3. Find the user's account that you want to be able to send on behalf of, and open up the account properties.
  4. Select the "Exchange General" tab.
  5. Click [Delivery Options...]
  6. Click [Add ...] and add the user (or users) that are to be granted permission to send on behalf of this account.
  7. Click [OK] to close the "Delivery Options" dialog.
  8. Click [OK] to close the account properties dialog..

See also "How to send a message on behalf of another".

How to Send a Message on Behalf of Another

To send an email on behalf of another (assuming you have been granted the necessary send-on-behalf-of privilege):

  1. Start Outlook.
  2. Go to your Inbox.
  3. Click [New] to start a new mail message.
  4. If the message does not show a "From" field then pull down the "View" menu and check "From Field".
  5. Click [From...] and select the account that you wish to send an email on behalf of.
  6. Compose the email as normal.

Note:

  • When you try to send the email you will get an error if you have not been granted the necessary send-on-behalf-of permission.
  • To the recipient the email will show both the true author and who it was sent on behalf of.

These notes have been tested with Exchange Server 2003, with Outlook 2000 and Outlook 2003. It is believed they also apply to Exchange Server 2000.



Thursday, October 16, 2008

Prepare PC's for PDF Processing

1. Download and Install the PCL converter (http://www.acuityware.com/Files/pclconverter_cmd.zip) on each PC. Use the license key that was sent after a key request was emailed to frank@acuityware.com

2. Open and extract the pclconverter_cmd.ZIP to the C:\ root directory.

3. Run the installation program “pcl-converter.exe”

4. After installation, run it once and enter the license info.

5. Close the app, no need to run it again.

6. Create a directory in the C:\ drive called : c:\myfolder

7. Create a new printer called “AcuityWare PDF Printer”. (Be aware of the spelling and capitalization) Make it a generic text printer as the model and create a new local port as c:\myfolder\PRINT.PCL


8. Use the following screen shots to create the printer:






Register a DLL through the command line

To register a DLL through the command line:

1. Go to Start, Run, Type in CMD and press ENTER.

2. Type regsvr32.exe C:\the\complete\path\filename.dll


Silent Registration:


regsvr32.exe /s C:\the\complete\path\filename.dll


Unregister:

regsvr32.exe /u C:\the\complete\path\filename.dll


Silent Unregistration:


regsvr32.exe /u /s C:\the\complete\path\filename.dll


Screen shot from RegSvr32:

Friday, August 29, 2008

Dark Magic - An explanation for the rest of us!

Dark Magic

Computing, like science, used to be clear cut. It had rules, and so long as you followed the prescribed path the results would be predictable. And just as in science there was a gradual dawning that the picture wasn't quite complete, and that the more you looked the more you realised the enormity of what it was that was missing, so it is in computing.

Scientists now think that as much as 80% of all-the-stuff-that-there-is is actually missing. So to contain it and make it sound slightly less frightening to non-boffins they call it "dark matter" and "dark energy".

The computing equivalent is called Dark Magic. Here's how you can infer its existance.

You follow the installation instructions meticulously and it doesn't work. Repeat with the same result. You check the Internet to discover that 254 other people have had an identical problem and that if you want to know how to fix it you have to pay a $30 subscription fee. After subscribing you discover that they fixed it by using different software altogether.

So you phone the techies at the manufacturer and after having checked that you've plugged it in, they tell you it's a conflict with your media-player software.

You remove the media player software and that seems to work. Until you reboot the computer. Or, rather, you discover that the OS won't load because a library is missing named mplayer.lib

And your directors are looking over your shoulder, asking how many more people you need to get it fixed immediately because the business is loosing money. And you are starting to work up a sweat.

So you reinstall, exactly as you did in step one. And it all works. With no troubleshooting or tweaking...

(??????? Eh?) ...So what changed?

Nothing.

Just the Dark Magic that pervades all computer hardware and software silently shifted somewhere else like a swan on the lake that goes gliding by.

Tuesday, August 5, 2008

Restore the VME for D3

  1. Backup PIBS, USER-COLDSTART, USERS and MDS entries that will have to be restored. (Example: SYSFILES (S in TCL in PM). If you do a nightly backup then this step is not necessary since it is done during the backup.


  1. Make sure everyone is logged OFF the system. Start an AccuTerm session (or Go to the taskbar and click START > RUN > then type in TELNET, and press OK, under CONNECT chose local host and then press enter). At the logon prompt, log in as DM for the user name and then DM for the master dictionary, and then type in SHUTDOWN. It will ask you if you want to continue, enter “Y” for “yes”. The connection to the host will be lost after the VME shutdown.


NOTE: If the CMD icon is on the desktop then double click it and go to step 6


  1. Start an MSDOS Command Prompt (Start > RUN > and then type in CMD and press ENTER.).


  1. At the prompt, type in D:


  1. At the D:> prompt type in CD Program Files\D3\D3PROGRAMS (Typically it will be D: but it may be a different drive). Your DOS prompt should look like the line you types in above D:\Program Files\D3\D3PROGRAMS.


  1. Type in D3VME /RESTORE and then press ENTER.


  1. Enter Y and then to proceed.


  1. Choose option 1 and press ENTER, then press ENTER twice, and after the files are restored, enter and ENTER and and ENTER.


  1. Once completed, log in again to DM, and then DM for the master dictionary.


  1. Type in TERM DUMB and the emulation will work better.


  1. Type in COPY DOS:. NT_UPGRADE (O and press ENTER.

TO:(MD

(You have to type in the period after the colon. And the “o” is the letter “o” as in OVER not the number zero.)


  1. Then type NT_UPGRADE and then press ENTER. When it asks to continue and load the files answer twice. (When you press “c” the first time it will load some files, then it will stop and you need to press “c” a second time but it may not specifically ask you to press the “c”. You will not need to press ENTER.)


  1. Type DM then press ENTER. Type DM and press ENTER again.


  1. Type TO PM then press ENTER. Press control backslash immediately. At the double colon, type SYSFILES (R and press ENTER, Then type TO DM and press ENTER. Type CT MD USER-COLDSTART to make sure the coldstart loaded.

  1. Type in SHUTDOWN. It will ask you if you want to continue, enter “Y” for “yes”. Type EXIT in CMD and restart VME by using services. Wait a minute or 2 then log back onto Accuterm. Make sure D3 is set on automatic startup in services

Monday, July 28, 2008

Use your Motorola Q as a broadband modem MotorolaQ

MotorolaQ

Surf at broadband speeds as you tether your Q.

I found the following info where someone figured out how to use your Motorola Q as a broadband modem! Now before everyone jumps at me a little disclaimer, "If you should decide on using this workaround you are breaking your terms and conditions of your contract with Verizon Wireless and could be dropped". Ok now that’s out of the way here is how it is done.

The reason I won’t to figure this out was financially motivate. I would love tethering via USB without dishing out $35 for PDANet.

To setup the Q:

1. Dial ##342587

MotorolaQ

2. Enable Dial-Up Networking

MotorolaQ

3. Go to Start, Accessories, Modem Link

Pc_capture4

4. Make sure that "USB" is selected under "Connection"

5. Select "Activate"

6. Download the driver Here.

SNAG-20060107-1802-40

SNAG-20060107-1802-47

SNAG-20060107-1802-56

SNAG-20060107-1803-06

SNAG-20060107-1803-12

SNAG-20060107-1804-24

SNAG-20060107-1804-38

SNAG-20060107-1806-04

SNAG-20060107-1806-14

7. Plug in the Q.

8. When the New Hardware Dialogue appears, select "Install from a specific location" and point to the folder you have stored the driver.

9. Clicking "Next" a few times will complete the installation.

SNAG-20060107-1752-32

SNAG-20060107-1753-36

To prevent the phone from locking up, you have to do these steps in this order.

1. When you go into the "Modem Link" program, you will select Activate and then Done. The Q will return to the home screen.

2. Plug in your USB cable.

3. Tether.

4. When done, disconnect the DUN connection on the computer side and wait for it to be clearly gone.

5. Reopen the Modem Link program and select "Deactivate".

6. The hourglass thingy will appear. Once the status reads "Inactive" select done.

7. The Modem Link program will exit and now the Q will function in Activesync mode again as normal.

8. Enjoy

After you have installed the modem driver –

9. Open internet explorer and select tools/internet options.

10. Click the connections tab

11. Under Dial-up and VPN settings click "add"

12. Select Dial-up to private network click next

13. Select only the Motorola q USB modem, click next.

14. Verizon users enter #777 for the phone number(other carriers use your internet access code)click next.

15. Enter Q USB modem for the name and click finish.

16. Verizon users enter "vzw" in the password field; leave the user name and domain blank. Click OK.

17. Select Dial whenever a network connection is not present then click ok.

SNAG-20060107-1758-24

SNAG-20060107-1806-46

SNAG-20060107-1806-52

SNAG-20060107-1806-56

If your phone is activated as in steps 3-5 above, your internet connection should work!

If this is not working for you, try out PDANet for $35. You can download it at http://www.junefabrics.com/pdanet/index.php.

Here’s what it looks like running:

SNAG-20060107-1740-09

SNAG-20060107-1740-47

SNAG-20060107-1742-41

I was able to run XMRadio Online without a skip using only the PdaNet Modem. So the Verizon network is pretty fast. Nice… XMRadio tune while you code at the beach!

They have a 7-day trial with the Bluetooth support version. Great stuff, either way. I’ve used both and $35 is worth it to me to save the time switching back and forth between ActiveSync and DUN.