Windows Support Tools

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 23 September 2008

Motorola Good Mobile Pricing Structure Overview

Posted on 22:22 by Unknown

In order to legally use Good Mobile Messaging, you must purchase three components:

* Server license – each enterprise customer requires at least one Good Messaging Server. Available from AT&T, Bell Mobility, Telstra in Australia, Motorola authorized reseller partners (VARs), or directly from Motorola Good Technology Group.
* Secure Transport Service (STS) – STS fees must be paid for each Good Messaging enabled handheld. STS fees are included in Good Data Plans purchased through Good carrier resellers (currently AT&T, Verizon, Telstra in Australia, Bell Mobility in Canada, and Telefónica O2 in the UK). For all other carriers, users require a Direct Secure Transport Service (STS) plan which is purchased directly from Good or a Motorola authorized reseller partner.
* Client access license (CAL) – one CAL is required for each Good Messaging enabled handheld. Available from AT&T, Bell Mobility, Telstra in Australia, Motorola authorized reseller partners (VARs), or directly from Good.

Please see below for more information on each pricing component plus optional technical support plans.
Server License

* Required to legally run Good Mobile Messaging in your enterprise
* One-time license fee that entitles an enterprise to run the current major release (i.e. version) of Good Mobile Messaging server software

Secure Transport Service (STS)

* Recurring service fee required to secure and optimize one connection between a wireless handheld, wireless network, the Good Network Operations Center (NOC), and the Good Server
* The STS fee includes Good NOC service which ensures secure message delivery between different wireless networks and wireless handhelds and is continuously optimized so handhelds perform reliably and efficiently even as carriers change their network settings
* Users who receive cellular service from a Good reseller carrier (currently AT&T, Verizon, Telstra, Bell Mobility, and Telefónica O2 UK Limited) must purchase an authorized Good Data Plan which includes Good STS fees
* Users who receive cellular service from a NON-Good reseller carrier must purchase a Direct STS plan directly from Good

Client Access License (CAL)

* Required to legally run Good Mobile Messaging on one (1) handheld or smartphone
* One-time license fee that entitles one (1) handheld to run the current major release (i.e. version) of Good Mobile Messaging handheld software
* Volume discounts are available

Technical Support Plans (Optional)

* Several optional technical support plans are available directly from Good
* Technical support plans provide enterprise-class named contact support directly from Good
* Customers on paid technical support plans also receive free Good Server and Client software upgrades for major releases
* Additional Good Server license fees are also waived for customers on paid technical support plans
Read More
Posted in | No comments

Users Paused After Applying Microsoft(MS) Exchange 2003 Message Store Hot-fix

Posted on 02:47 by Unknown
Store hotfix 6.5.7233.54 corrects a "security hole" that allows a delegate user to send e-mail messages from the other user’s mailbox as the mailbox owner even though the delegate does not have “Send As” rights. The GoodLink Server will continuously pause all users when attempting to send inbound messages from the mobile device on MAPI_E_NO_ACCESS -2147024891 until this new “Send As” right is set for the GoodAdmin account.

Failed to submit mail message for user johndoe. (HRESULT:-2147024891) Pausing user johndoe. (Security error - Cannot access the users mailbox.) .....
Read More
Posted in | No comments

Friday, 19 September 2008

Motorola's Good Mobile Messaging software and service helps make enterprise mobile email and application access more personalised and productive, whil

Posted on 02:00 by Unknown
Motorola Inc., announced the launch of its award-winning Good Mobile Messaging software in India. The latest software version, Good 5, is tailored to meeting the advancing needs of the enterprise mobility market and delivers an unparalleled user experience aimed at making the mobile workforce more productive while strengthening security and IT control. Good, which has over 12,000 enterprise customers with users in over 90 countries on over 200 carrier networks, will be available across India through the highly recognised Motorola Partner Select channel programme. Starting early April 2008, enterprises will be able to easily purchase Good 5 from a global network of highly specialised resellers and receive in-country sales and technical support.

Good 5 was designed for ease-of-use and enables extensive personalisation with features like RSS news feeds, customised e-mail alerts and filters, complete calendaring including free/busy checking and an automated conference room finder as well as a host of other features which increase the productivity of the mobile workforce. For IT administrators, the new release expands Good's handheld security and management capabilities to include over-the-air control of handheld features like cameras, Bluetooth ports, and storage cards as well as application and device lockdown, advanced password management, and advanced encryption management. Further, Good 5 enables access to behind-the-firewall intranets and web-based applications from handhelds and smartphones. Good 5 supports both Lotus Domino and Microsoft Exchange messaging servers and can be deployed over GSM, CDMA and WiFi networks on a host of devices from Motorola and other manufacturers.

“We are now poised to present the latest scalable technology offering the widest choice of deployment options for the enterprise customer spanning the shop floor to the corner office,” said Anirudh Gupta, Country Manager for Motorola Good Technology Group. “From e-mail access to transaction-based data applications, Motorola Good Technology Group’s products are easily deployable and partners bring in intrinsic value with their industry expertise in various verticals. Good’s products free mobile workers from their desktop and offer anywhere, anytime enterprise grade communication tools, thereby significantly impacting organisational productivity,” he added.

“Good Mobile Messaging 5 is a powerful tool that helps us offer an integrated mobility solution to our enterprise customers”, said Dr. Srikanth Sundararajan, COO, Persistent Systems Ltd., a re-seller partner. “The intuitive and familiar interface, combined with rich security and manageability features, is easily embraced by enterprises. More importantly, the Good 5 can be enabled on a variety of popular hand held phones today as opposed to costly alternative device solutions”.

To make it easier for enterprises to deploy a one-stop mobility solution, Motorola’s Partner Select Program now offers a family of mobile computing solutions comprising Good on a choice of devices and smartphones including the Motorola enterprise digital assistants such as the MC35, MC50 and MC70, and the Motorola Q smartphone family. Good is also supported on a variety of Palm, HTC and Samsung smartphones. Partner Select partners can package bundled solutions with device activations and vertical applications for their customers. System integration partners add value with their expert
Read More
Posted in | No comments

Thursday, 18 September 2008

FREE PC Tools Privacy Guardian Genuine License Code for EVERYONE!

Posted on 02:26 by Unknown


Here we go again, another commercial privacy software called Privacy Guardian from PC Tools that normally cost $29.95 is now given away for free! From last time they are very generous in giving away free licensed security software and they still continue giving! Maybe the owner of PC Tools is going to get millions of dollars for selling the company to Symantec and they don’t see a problem in giving away free licenses…

Just follow the few simple steps below to get your free Privacy Guardian 4.1 genuine license code.

1. Go to this page http://www.pctools.com/privacy-guardian/offer/

2. Enter your first name, last name, email, country and click the Submit button. Make sure that you’re entering a working email address because the license key code will be sent there.

3. Once you see the message “Your FREE Privacy Guardian license has been generated and emailed to the email address you provided”, check the email address that you’ve entered at step 2. Open the email from do-not-reply@pctools.com with the subject “PC Tools Privacy Guardian License Information”‏”. Note down the license name and license code.

4. Download and install the latest PC Tools Privacy Guardian 4.1

5. After installation, run the software and click the Register button. Enter the license name and license key.

Actually the free license promotion for Spyware Doctor 6 + Privacy Guardian 4.1 from Westpac is still valid. No harm having another promotional link.
Read More
Posted in | No comments

Microsoft Assessment and Planning Toolkit Solution Accelerator

Posted on 02:26 by Unknown

Overview

The Microsoft® Assessment and Planning Toolkit (MAP) makes it easy for you to assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs.

MAP is a powerful inventory, assessment, and reporting tool that can securely run in small or large IT environments without requiring the installation of agent software on any computers or devices. The data and analysis provided by this Solution Accelerator can significantly simplify the planning process for migrating to Windows Vista®, Microsoft Office 2007, Windows Server® 2008, Windows Server 2008 Hyper-V, Virtual Server 2005 R2, SQL Server 2008 and Microsoft Application Virtualization (formerly SoftGrid).

MAP expands upon the assessment features included in the Windows Vista Hardware Assessment Solution Accelerator. These features include Windows Vista assessment, Microsoft Office 2007 assessment, and non-Windows device inventory, using the Simple Network Management Protocol (SNMP). Reports for these assessment scenarios are localized in French, German, Japanese, Korean, Brazilian Portuguese, and Spanish.

Feature Overview

The Microsoft Assessment and Planning Toolkit (MAP) performs three key functions; hardware inventory, compatibility analysis, and readiness reporting.

Secure and Agentless Inventory

The Microsoft Assessment and Planning Toolkit (MAP) provides secure, agent-less and network-wide inventory that scales from small business to large enterprises. It collects and organizes system resources and device information from a single networked computer. Assessment tools often require users to first deploy software agents on all computers to be inventoried, but this tool does not. MAP uses technologies already available in your IT environment to perform inventory and assessments. These technologies include Windows Management Instrumentation (WMI), the Remote Registry Service, SNMP, Active Directory Domain Services, and the Computer Browser service. Assessments can be completed on the following Windows platforms:

* Windows Vista
* Windows XP® Professional
* Windows Server 2003™ or Windows Server 2003 R2
* Windows 2000 Professional or Windows 2000 Server
* Windows Server 2008

Comprehensive Data Analysis

The Microsoft Assessment and Planning Toolkit (MAP) performs a detailed analysis of hardware and device compatibility for migration to Windows Server 2008, Microsoft Office 2007, Microsoft Application Virtualization, and Windows Vista. The hardware assessment looks at the installed hardware and determines if migration is recommended. If it is not recommended then the reports tell you why it is not.

In addition, MAP has expanded its capabilities into assessment areas of Hyper-V server virtualization, desktop security, and SQL Server 2008 migration.

Device assessment looks at the devices installed on a computer and reports availability of drivers for those devices. Device assessment is provided for both Windows Server 2008 and Windows Vista migration scenarios.

For customers interested in server consolidation and virtualization through technologies such as Hyper-V or Virtual Server 2005 R2, this tool helps to gather performance metrics and generate server consolidation recommendations that identify the candidates for server virtualization and how the physical servers might be placed in a virtualized environment.

In-Depth Readiness Reporting

The Microsoft Assessment and Planning Toolkit (MAP) generates reports containing both summary and detailed assessment results for each migration scenario. The results are provided in both Microsoft Excel and Microsoft Word documents. Reports are generated for the following scenarios:

· Identification of currently installed Windows Client operating systems, their hardware, and recommendations for migration to Windows Vista. This tool also reports if desktops have anti-virus and anti-malware programs installed or if the Windows Firewall is turned on.

* Identification of currently installed Windows Server operating systems, their hardware, and recommendations for migration to Windows Server 2008 (including a report detailing currently installed server roles and SQL servers).
* Identification of currently installed Microsoft Office software and recommendations for migration to Microsoft Office 2007.
* Detailed assessment and reporting of server utilization gathered using the Performance Metrics Wizard.
* Recommendations for server consolidation and virtual machine placement using Hyper-V or Virtual Server 2005 R2.
* Assessment of client machines, servers, and the technology environment for the implementation of Microsoft Application Virtualization (formerly SoftGrid).
* Reporting of SNMP-enabled devices found in the environment during inventory.

Note The Microsoft Assessment and Planning Toolkit (MAP) will generate localized reports for Windows Vista migration, Office 2007 migration, and non-Windows devices if the Display zLanguage, configured on the computer generating the reports is set to German, French, Japanese, Korean, Spanish, and Portuguese.
Read More
Posted in | No comments

Getting Started with Microsoft Application Virtualization

Posted on 02:26 by Unknown

At a Glance:

* App-V architecture
* Managing virtual apps
* Using the App-V sequencer
* Integrating App-V with Configuration Manager


Contents
The App-V Architecture
How App-V Full Infrastructure Works
Updating Virtual Applications
Sequencing
Version 4.5
Microsoft Application Virtualization (or App-V) is near and dear to my heart. App-V was formerly known as SoftGrid, and I came to Microsoft with the acquisition of the company that created SoftGrid, called Softricity. I am very excited to have the opportunity of writing this article for TechNet Magazine now, as a lot has changed since the acquisition.
The best way to approach App-V is first to talk about the challenges IT professionals face in terms of enterprise management. Today's business desktop is awash in applications. Before an application is installed, it must go through lengthy regression testing to ensure that it can coexist with the other applications installed on the system without impacting their ability to run properly. The application must then go through a series of deployment processes before it reaches production. And because an application is essentially only available where it is installed, your users are tied to specific computers. This further complicates complex yet critical projects, such as OS and application migrations, security refreshes, and disaster recovery planning.
App-V changes all that. Rather than being a complex series of time-consuming steps that take up resources, desktop administration becomes a simpler, more automated process with App-V. You can more easily deploy, patch, update, and terminate applications with better results.
With App-V, a user can sit down at any desktop and access his applications. The applications are delivered on demand but run as if they were actually installed locally. Thus, there is no need to install the application components or alter the host device.
This use of virtualization could drastically change how IT professionals manage desktops. Not altering the host device and running virtualized applications instead introduces numerous advantages, including:

* Fewer application conflicts
* Faster and easier application updates
* The ability to run multiple versions of the same app side by side
* Flexible applications that follow users online and offline
* Reduced application-to-application regression testing


The App-V Architecture
So now let's look at what is really happening behind the scenes of the App-V platform. The platform consists of a few main components: a sequencer, a database, clients, a management server, a streaming server, and a management console.

At the core of the App-V system is the App-V client. There are two types of clients that can be used—the Terminal Server Client and the Desktop Client. In either case, the client must be installed on every desktop and terminal server on which you plan to deploy virtual applications. The client takes up relatively little disk space. It installs a driver and has a visible user runtime component that shows up as a tray indicator.
The client gathers a list of virtual applications from the App-V Management Server and displays the available virtual apps. It handles launching those applications (when initiated by the user) and managing the client-side cache. The client also is responsible for managing creation of the virtual runtime environment and ensuring that each environment runs in its own virtual bubble. This virtual environment includes several components, including a Virtual Registry, Virtual File System, and Virtual Services Manager.
There are three infrastructure deployment options available in App-V 4.5: full infrastructure, lightweight infrastructure, and standalone mode. When you deploy a full infrastructure, the back end includes the App-V Management Server and the App-V Streaming Server (this is a new component I will discuss in a moment). The App-V Management Server hosts and delivers the centralized virtual applications, as well as updates the virtual applications when patches or updates are applied.
This management server relies on SQL Server to host the App-V database, which contains configuration and settings for virtual applications. You should use Active Directory groups as the central management tool for provisioning and controlling permissions to virtual applications.
To manage the settings and configuration, the App-V platform provides a Microsoft .NET Framework Web service that can be loaded on the same server as long as IIS is installed. This Web service acts as a liaison between the App-V Management Console—a Microsoft Management Console (MMC) Snap-in—and the App-V database. Administrators can use the console to publish and manage virtual applications, assign Active Directory groups, and control server settings, as well as run reports on usage of virtualized applications.......
Read More
Posted in | No comments

What is oovoo

Posted on 02:26 by Unknown

ooVoo is the next evolution in online communication — a remarkably easy way to have a face-to-face video chat with friends, family or colleagues, no matter where they are in the world.

ooVoo Video Chat is remarkably easy to use: easy to download, easy to install, and best of all:
it's FREE!

Start a face-to-face conversation and include up to six people.
Twice the video clarity and four times the video window size of ooVoo Standard Resolution.
Create instant memories by recording your ooVoo video calls.
Tired of typing emails? Give your fingers a break and send a video message to one friend or a group.
Do you want to grow a virtual mustache or become a Superman – all while on a video call? Now you can.
Have a face-to-face ooVoo conversation with anyone (even those friends that don't have ooVoo yet) through a Web browser.
Calls from ooVoo to a landline or mobile phone in the USA* or Canada.
Text chat with up to six friends at a time!
With ooVoo it’s easy to share files with your friends!
Import contacts from the most popular email programs: Office Outlook, Gmail, MSN Hotmail, Yahoo mail, AOLmail and more.
Enable sidebar view to clearly view documents or other tasks on your screen.
Build your blog or MySpace page to life with an ooVoo link.
ooVoo is an exciting and fun new way to communicate and we want every one of your ooVoo experiences to be safe and secure.
Read More
Posted in | No comments

Vavuniya Raid; the truth vs. media controversies

Posted on 02:26 by Unknown

LTTE terrorists launched an attack on the Sri Lanka Security Forces complex at Vavuniya on Tuesday (Sept 9). Their mission was to destroy the air defence radar system located at the Air Force Base, Vavuniya. To achieve this mission the terrorists had planned for their first ever "Black Tiger" raid supported by artillery and aerial bombardment. There were many media reports on this raid by the terrorists. However, many of them, particularly those in the print media, gave misleading accounts of the encounter.

Security Forces claimed that the terror mission was successfully thwarted, ground attackers hunted down and an LTTE aircraft was shot down during their retaliation. The terrorists and their propaganda allies showed that the terror mission was accomplished; air defence radar was destroyed, and boasted about effectiveness of the band of suicide cadres - "Black Tigers" - and their rudimentary air wing, "Air Tigers". Some of the most subtlest and scurrilous campaigners of the terrorists who pretend to be "independent defence analysts" filed stories on the raid leaving the public lost between truth and half-truth. Their inflated reports of damage reports and skeptical tone of writing were aimed at making the public have doubts about the security forces' claims about the attack.

However, these aberrations revolve around three main issues: the degree of success of the terrorist mission, damage caused to troops, and damage caused to the terrorists. Defence.lk contacted the several senior officials of armed forces who actually ran the battle and sought their assessment of the terror raid. The following report is based on their analysis, made with special attention to the above-mentioned key issues.
The Encounter

Around 3 AM, on Tuesday, 9 September 2008, a group of LTTE cadres clad in Sri Lanka Army attire tried to infiltrate the southern perimeters of the Wanni Security Forces Headquarters Complex in Vavuniya. The complex comprises the Army Security Force Headquarters Wanni [SFHQ- (W)], Air Force Base Vavuniya and a Police Base.

For reasons best known to them, the terror group happened to move towards their target through a camp of Army Special Force troops located in the SFHQ (W). The Elite Special Forces soldiers quickly identified the terrorists and the resultant battle sparked out. The hunters became the hunted as the terrorists were surrounded and shot down one by one by the highly trained elite soldiers.

Shortly after the battle broke out on the ground, the terror attack was seen to be unprecedented. Volley after volley of 130mm artillery rounds started to fall in to the security forces complex and to the surrounding civilian villages. Meanwhile, Air Force personnel manning the air defence radar detected two aircraft heading towards Vavuniya area. They quickly alerted the air defence system and the supersonic interceptors were made ready to meet the coming aerial threat. Owing to the short flight time from Mullaittivu to Vavuniya the terror aircraft were on the Vavuniya sky before long. Four improvised bombs fell astray as usual and only one of them exploded, but caused no harm.

The Special Forces soldiers were able to shoot down all the terrorists before they reached the vulnerable area of the air defence radar in a short span of time . All the 11 bodies of the terrorists were collected outside the fence of the High Security Zone. Air Force interceptors were able to destroy one of the LTTE aircraft on its return path. Artillery bombardment prevailed for about 1 hour and later halted as troops commenced engaging possible terror gun positions with indirect fire. The defensive operation successfully ended following the clearing operation in the morning hours.
Damage caused

13 Army soldiers were killed and 18 others suffered injuries. Except one soldier who was killed during the initial contact, all other fatalities and casualties were caused due to terrorist artillery fire. One policeman was killed and 9 others received injuries, while 5 airmen also sustained wounds, all due to artillery bombardment. In addition, 2 civilians and a child of Tekka Watta village suffered injuries.

Some 6-8 cattle were also observed killed due to terrorist artillery fire. Few buildings of security forces complex and vehicles too received damages.
Damaged caused to terrorists

LTTE lost 11 members of its brain-washed suicide cadres or the so-called Black Tigers. Only two of the suicide bombers were found killed of suicide explosions. It was not known whether they exploded themselves or were accidentally blown off due to army fire. Few others had committed suicide swallowing cyanide pills after receiving injuries. The majority of terrorists were found killed in direct hits taken by the army elites. Among those killed there were 2 self-styled "Lieutenant Colonels", 2 "Majors" and 7 "Captains", as later claimed by the LTTE.

Meanwhile, LTTE lost one of its aircraft along with 2 pilots. A Chinese built F-7 interceptor destroyed the aircraft using an air-to-air missile. The aircraft is said to have fallen to the Mulliyaveli area in Mullaittivu.
The Mission accomplishment

Undoubtedly, LTTE had intended to launch an attack that needs meticulous planning and great effort on the part of the planners and the combatants. However, the outcome of the battle proves nothing other than the LTTE's incompetence in carrying out such an attack. Above all, the failure indicates the extent to which the security forces have destroyed the combat effectiveness of the terror outfit that was once considered untouchable.

The above assessment of the security forces may still appear as an exaggeration or as an attempt to cover own failures, to persons mislead by misleading reportage. Therefore, to get a deeper understanding on the issue, one may compare the latest attack with the previous attacks of the terrorists.

One should not forget that the LTTE was once capable of sending a fully loaded lorry bomb to the Central Bank building situated at the heart of the Colombo High Security Zone and killed over 90 civilians. The terrorists once attacked Bandaranaike International Airport (BIA) and destroyed several airbuses of Sri Lankan Air Lines and also several Air Force aircraft including supersonic fighter jets. Such attacks not only shocked the nation but also pushed it to the verge of collapse. It was the BIA raid that turned the political tables in favour of the terror outfit and led to the greatest betrayal in the country's history. Undoubtedly, those were the terror attacks that taught vital lessons to the other less sophisticated terror outfits of the world.

Compared to the above attacks it is not difficult to understand that not only the Vavuniya raid but also the Anuradhapura raid in 2007 were nothing but flops. None of the attacks could inflict the slightest damage to the combat effectiveness of the security forces. At the Vavuniya raid LTTE lost 11 of its maniacal suicide cadres, an aircraft with 2 pilots and spent some 70 odd 130mm artillery rounds just for a mere propaganda stunt. The only real loss the armed forces suffered was the loss of few great soldiers who had made their ultimate sacrifice for the motherland in a worthy battle.

On the other hand, the real value of the LTTE's mission in this raid is the revelation of the irrational and desperate thinking of the person who planned it. If the terrorists' aim was to destroy the air defence radar the only advantage they would gain is to enjoy few minutes of flight time. Ever since the radar has been placed in Vavuniya, the LTTE could not succeed in flying to the Island's South.

Also, if the LTTE's real priority at the time is to send its two light aircraft to the South, it is doubtful what the outfit would be able to gain from such a mission. It has been proven more than once that their aircraft could not do much harm than to hit the newspaper headlines. With the exception of a suicide mission, the air threat from the LTTE remains less effective in the present context.

Thus, it is not difficult to understand that the Vavuniya raid was conducted to give some psychological comfort to a disturbed mind than for any rational gain. It must have satisfied the ego of megalomaniac terror chief V. Prabhakaran, who always enjoy putting garlands on the photos of his dead followers. Pro-terror websites were quick to release the photos of the suicide bombers sitting with their ghastly leader before leaving the attack and later a much satisfied Prabhakaran lighting oil lamps in front of their coffins at his underground bunker. Despite pro-LTTE media stunts gave a momentous note into the LTTE mission, the terrorists only fell dead distance away, even before sighting its target.

If it has any other valid reason, it is to give some boost to the currently weakening terror fund raising mechanism operating outside the country. It has been widely known that the Tamil Diaspora who fund the LTTE's mayhem on the Sri Lankan Tamil community have been greatly disappointed with the signs of an end to this war. For them, continued war in Sri Lanka or in other words more Tamil children turned to child soldiers or killed as suicide bombers mean secured lives in Western countries.
Conclusion

There is no doubt those anti Sri Lankan defence analysts were anxiously waiting to ridicule the security forces if the terrorists were successful in their mission. Troops found an LTTE flag with a dead LTTE cadre indicating that their aim was to hoist the flag at the Air Force base after taking control of it, even for a brief period. There is no doubt that few other terrorists had been waiting outside the camp perimeter to take photographs of their achievement and release them to the Internet. Their failure was the reason behind the terror stooges in media being unable to exploit the incident as expected. Instead they have to make people disbelieve the security forces' claims in order to cover the LTTE's fiasco.

In one such report, a so-called defence analyst wanted pictorial evidence of the Air Force claim of having shot down the LTTE aircraft. It is unbecoming for such an "experienced defence analyst" to be ignorant of the fact that the heat seeking air to air missile of an F-7 jet will not be released unless it picks up a heat signature of the target it should home into. The pilot can only lock the target of his radar and make the weapon ready to fire. It is the automatic missile system that scans for the heat signature of the intended target and commands the missile path since its release from the aircraft. Also, after the release of the missile the pilot of the fighter aircraft has to ensure safety of his own aircraft. He is absolutely not expected to video the encounter to satisfy cynical defence reporters. The pilot has confirmed the witnessing the explosion at few hundred meters away from his own aircraft

It should be noted that if the LTTE aircraft had escaped the missile, the only way it could do so is by firing chaff, supported by a complex evasive movement. It would be rather unrealistic to expect the light aircraft of the terrorists to have a sophisticated missile defence system to counter an air-to-air missile threat. Therefore, all who question the integrity of the Air Force will have to wait ages until the terrorists develop some honesty to find the truth. Though the operational security priorities do not permit further elaboration, it can be stated that the Air Force is not capable of videoing all its attacks.

Finally, it should be noted that the security forces success in crushing the terror attack is not a coincidence. They have proven that they have learnt their lessons well from past experiences and displayed the highest standards of professionalism. It is unrealistic to believe that a terrorist outfit that existed for almost 3 decades would easily give up their fight. They would invent more new terror tactics to survive as long as they can. Recent victories of the security forces show that the terrorists are on their last legs. The security forces are well aware of the fact that the terrorists would use all they have against the advancing soldiers. The real challenge is to crush all such attempts with increasing effectiveness.
Read More
Posted in | No comments

Battle Progress Map

Posted on 02:26 by Unknown
Read More
Posted in | No comments

Monday, 15 September 2008

MultiSet 6.1

Posted on 23:12 by Unknown


Want to create a WindowsXP installation disk that will automatically install the OS Windows without asking questions about username, product key, time and locale settings? At the same time your favorite applications are automatically installed, the necessary keys are entered into the registry, drivers are updated, new patches (service packs) from Microsoft are installed. It’s possible and you can do it easily with Almeza MultiSet!

Almeza MultiSet will automatically install all the applications you require, either onto your original computer or onto a new one. It’s an ideal solution for rebuilding your systems quickly!

Besides, Almeza MultiSet can create bootable CDs/DVDs. Such disks can be used as a rescue means after a system crash. To completely restore the system, you will only have to insert such a disk into the CD/DVD drive.
Read More
Posted in | No comments

Thursday, 11 September 2008

Nagios - Ubuntu Quickstart

Posted on 22:09 by Unknown

Nagios is an Open Source host, service and network monitoring program.


Introduction

This guide is intended to provide you with simple instructions on how to install Nagios from source (code) on Ubuntu and have it monitoring your local machine inside of 20 minutes. No advanced installation options are discussed here - just the basics that will work for 95% of users who want to get started.

These instructions were written based on an Ubuntu 6.10 (desktop) installation. They should work for an Ubuntu 7.10 install as well.

What You'll End Up With

If you follow these instructions, here's what you'll end up with:

* Nagios and the plugins will be installed underneath /usr/local/nagios
* Nagios will be configured to monitor a few aspects of your local system (CPU load, disk usage, etc.)
* The Nagios web interface will be accessible at http://localhost/nagios/

Required Packages

Make sure you've installed the following packages on your Ubuntu installation before continuing.

* Apache 2
* GCC compiler and development libraries
* GD development libraries

You can use apt-get to install these packages by running the following commands:

sudo apt-get install apache2
sudo apt-get install build-essential

With Ubuntu 6.10, install the gd2 library with this command:

sudo apt-get install libgd2-dev

With Ubuntu 7.10, the gd2 library name has changed, so you'll need to use the following:

sudo apt-get install libgd2-xpm-dev

1) Create Account Information

Become the root user.

sudo -s

Create a new nagios user account and give it a password.

/usr/sbin/useradd -m nagios
passwd nagios

On Ubuntu server edition (6.01 and possible newer versions), you will need to also add a nagios group (it's not created by default). You should be able to skip this step on desktop editions of Ubuntu.

/usr/sbin/groupadd nagios
/usr/sbin/usermod -G nagios nagios

Create a new nagcmd group for allowing external commands to be submitted through the web interface. Add both the nagios user and the apache user to the group.

/usr/sbin/groupadd nagcmd
/usr/sbin/usermod -G nagcmd nagios
/usr/sbin/usermod -G nagcmd www-data

2) Download Nagios and the Plugins

Create a directory for storing the downloads.

mkdir ~/downloads
cd ~/downloads

Download the source code tarballs of both Nagios and the Nagios plugins (visit http://www.nagios.org/download/ for links to the latest versions). At the time of writing, the latest versions of Nagios and the Nagios plugins were 3.0.3 and 1.4.11, respectively.

wget http://osdn.dl.sourceforge.net/sourceforge/nagios/nagios-3.0.2.tar.gz
wget http://osdn.dl.sourceforge.net/sourceforge/nagiosplug/nagios-plugins-1.4.11.tar.gz

3) Compile and Install Nagios

Extract the Nagios source code tarball.

cd ~/downloads
tar xzf nagios-3.0.2.tar.gz
cd nagios-3.0.2

Run the Nagios configure script, passing the name of the group you created earlier like so:

./configure --with-command-group=nagcmd

Compile the Nagios source code.

make all

Install binaries, init script, sample config files and set permissions on the external command directory.

make install
make install-init
make install-config
make install-commandmode

Don't start Nagios yet - there's still more that needs to be done...

4) Customize Configuration

Sample configuration files have now been installed in the /usr/local/nagios/etc directory. These sample files should work fine for getting started with Nagios. You'll need to make just one change before you proceed...

Edit the /usr/local/nagios/etc/objects/contacts.cfg config file with your favorite editor and change the email address associated with the nagiosadmin contact definition to the address you'd like to use for receiving alerts.

vi /usr/local/nagios/etc/objects/contacts.cfg

5) Configure the Web Interface

Install the Nagios web config file in the Apache conf.d directory.

make install-webconf

Create a nagiosadmin account for logging into the Nagios web interface. Remember the password you assign to this account - you'll need it later.

htpasswd -c /usr/local/nagios/etc/htpasswd.users nagiosadmin

Restart Apache to make the new settings take effect.

/etc/init.d/apache2 reload

6) Compile and Install the Nagios Plugins

Extract the Nagios plugins source code tarball.

cd ~/downloads
tar xzf nagios-plugins-1.4.11.tar.gz
cd nagios-plugins-1.4.11

Compile and install the plugins.

./configure --with-nagios-user=nagios --with-nagios-group=nagios
make
make install

7) Start Nagios

Configure Nagios to automatically start when the system boots.

ln -s /etc/init.d/nagios /etc/rcS.d/S99nagios

Verify the sample Nagios configuration files.

/usr/local/nagios/bin/nagios -v /usr/local/nagios/etc/nagios.cfg

If there are no errors, start Nagios.

/etc/init.d/nagios start

8) Login to the Web Interface

You should now be able to access the Nagios web interface at the URL below. You'll be prompted for the username (nagiosadmin) and password you specified earlier.

http://localhost/nagios/

Click on the "Service Detail" navbar link to see details of what's being monitored on your local machine. It will take a few minutes for Nagios to check all the services associated with your machine, as the checks are spread out over time.

9) Other Modifications

If you want to receive email notifications for Nagios alerts, you need to install the mailx (Postfix) package.

sudo apt-get install mailx

You'll have to edit the Nagios email notification commands found in /usr/local/nagios/etc/objects/commands.cfg and change any '/bin/mail' references to '/usr/bin/mail'. Once you do that you'll need to restart Nagios to make the configuration changes live.

sudo /etc/init.d/nagios restart

Configuring email notifications is outside the scope of this documentation. Refer to your system documentation, search the web, or look to the NagiosCommunity.org wiki for specific instructions on configuring your Ubuntu system to send email messages to external addresses.
Read More
Posted in | No comments

Linux version of XAMPP

Posted on 00:16 by Unknown

Step 1: Download
Simply click on one of the links below. It's a good idea to get the latest version. :)

A complete list of downloads (older versions) is available at SourceForge.


Step 2: Installation
After downloading simply type in the following commands:

1. Go to a Linux shell and login as the system administrator root:

su

2. Extract the downloaded archive file to /opt:

tar xvfz xampp-linux-1.6.7.tar.gz -C /opt

Warning: Please use only this command to install XAMPP. DON'T use any Microsoft Windows tools to extract the archive, it won't work.

Warning 2: already installed XAMPP versions get overwritten by this command.

That's all. XAMPP is now installed below the /opt/lampp directory.



Step 3: Start
To start XAMPP simply call this command:

/opt/lampp/lampp start

You should now see something like this on your screen:

Starting XAMPP 1.6.7...
LAMPP: Starting Apache...
LAMPP: Starting MySQL...
LAMPP started.

Ready. Apache and MySQL are running.


Step 4: Test
OK, that was easy but how can you check that everything really works? Just type in the following URL at your favourite web browser:

http://localhost

Now you should see the start page of XAMPP containing some links to check the status of the installed software and some small programming examples.



A matter of security (A MUST READ!)
As mentioned before, XAMPP is not meant for production use but only for developers in a development environment. The way XAMPP is configured is to be open as possible and allowing the developer anything he/she wants. For development environments this is great but in a production environment it could be fatal.

Here a list of missing security in XAMPP:

1. The MySQL administrator (root) has no password.
2. The MySQL daemon is accessible via network.
3. ProFTPD uses the password "lampp" for user "nobody".
4. PhpMyAdmin is accessible via network.
5. Examples are accessible via network.
6. MySQL and Apache running under the same user (nobody).

To fix most of the security weaknesses simply call the following command:

/opt/lampp/lampp security

It starts a small security check and makes your XAMPP installation more secure.
* PHP 4 or PHP 5?
Because such very new versions like PHP 5 always should be handled with care we decided to include both current versions of PHP into XAMPP since version 1.4.7: PHP 5.x and PHP 4.x. If you find out your PHP application doesn't work with PHP 5 you will be able to switch back easily to PHP 4.

By the following command you can switch "back" to PHP 4.x:

/opt/lampp/lampp php4

And with the following command you can switch back to PHP 5.x:

/opt/lampp/lampp php5

If you forgot which version of PHP is in use simply use phpinfo() or call this command:

/opt/lampp/lampp phpstatus

* Advanced start and stop parameters
Until version 0.9.4 /opt/lampp/lampp could only start and stop XAMPP. Since version 0.9.5 it learned a lot of new things to do.


START AND STOP PARAMETERS

start Starts XAMPP.
stop Stops XAMPP.
restart Stops and starts XAMPP.
startapache Starts only the Apache.
startssl Starts the Apache SSL support. This command activates the SSL support permanently, e.g. if you restarts XAMPP in the future SSL will stay activated.
startmysql Starts only the MySQL database.
startftp Starts the ProFTPD server. Via FTP you can upload files for your web server (user "nobody", password "lampp"). This command activates the ProFTPD permanently, e.g. if you restarts XAMPP in the future FTP will stay activated.
stopapache Stops the Apache.
stopssl Stops the Apache SSL support. This command deactivates the SSL support permanently, e.g. if you restarts XAMPP in the future SSL will stay deactivated.
stopmysql Stops the MySQL database.
stopftp Stops the ProFTPD server. This command deactivates the ProFTPD permanently, e.g. if you restarts XAMPP in the future FTP will stay deactivated.
security Starts a small security check programm.


What is where?

/opt/lampp/bin/ The XAMPP commands home. /opt/lampp/bin/mysql calls for example the MySQL monitor.
/opt/lampp/htdocs/ The Apache DocumentRoot directory.
/opt/lampp/etc/httpd.conf The Apache configuration file.
/opt/lampp/etc/my.cnf The MySQL configuration file.
/opt/lampp/etc/php.ini The PHP configuration file.
/opt/lampp/etc/proftpd.conf The ProFTPD configuration file. (since 0.9.5)
/opt/lampp/phpmyadmin/config.inc.php The phpMyAdmin configuration file.



Stopping XAMPP
To stop XAMPP simply call this command:

/opt/lampp/lampp stop

You should now see:

Stopping LAMPP 1.6.7...
LAMPP: Stopping Apache...
LAMPP: Stopping MySQL...
LAMPP stopped.

And XAMPP for Linux is stopped.



Uninstall
To uninstall XAMPP just type in this command:

rm -rf /opt/lampp

The end.
Read More
Posted in | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • Receiving Error 'ORA-01041: internal error. hostdef extension doesn't exist.' on re-establishing a connection to Oracle.
    You can receive the error message 'Error ORA-01041: internal error. hostdef extension doesn't exist' when attempting to re-esta...
  • Google Sinks Cash into Undersea Cable
    Google has joined the Unity consortium, which will build a $300 million fiber optic cable linking the US and Japan. The 7.68 Tbps, 10,000 ki...
  • Troubleshooting the Microsoft Exchange Transport Service When It Fails to Start on an Exchange 2007 Hub Transport Server with Event ID 1032 or 1036
    Event ID: 1032 Socket Access Denied. Binding: 0.0.0.0:25. Event ID: 1036 Failed to open one or more bindings. The service will be stopped....
  • C Traps and Pitfalls (Addison Wesley, 1989, English)
    C Traps and Pitfalls teaches how the peculiarities of the C language make it easy for the intended behavior of a program and the actual beha...
  • SoftMaker Office 2008 Free Full Version Download With Genuine License Key
    SoftMaker Office 2008 is reliable office productivity software that is designed for beginners and professional users. SoftMaker Office Suite...
  • Amazon Takes the Humans Out of Fulfillment With New API
    keeps adding to its Web services. Today, it is opening up an API for its Fulfillment by Amazon service, which allows online merchants to out...
  • AP Microsoft backs Icahn's bid to oust Yahoo board
    SAN FRANCISCO - Microsoft Corp. threw its weight behind investor Carl Icahn's effort to dump Yahoo Inc.'s board, saying Monday that...
  • Suba Vesak Mangallayak Weewa !!!!
    Keep your heart free from hate your mind from worry, Live simply expect little, give much Fill your life with love forget self, think of ot...
  • How to Remove Dosearches.com homepage (Virus Removal Guide)
    Dosearches.com  is a browser hijacker, which is promoted via other free downloads, and once installed it will change your browser homepage t...
  • Alcohol 120% v5 Blu-ray Burner Free Download with Registration Unlock Code
    Alcohol 120% is a CD and DVD burning, copying, backup, recording, duplication, emulation and creation software for Windows. In addition to c...

Categories

  • ISA Firewall
  • ISA Server 2006
  • Quick Tips
  • Reports
  • Tips

Blog Archive

  • ►  2013 (7)
    • ►  October (6)
    • ►  February (1)
  • ►  2012 (10)
    • ►  September (3)
    • ►  August (3)
    • ►  July (3)
    • ►  June (1)
  • ►  2011 (16)
    • ►  August (2)
    • ►  July (4)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  March (4)
    • ►  January (1)
  • ►  2010 (12)
    • ►  December (3)
    • ►  October (4)
    • ►  March (1)
    • ►  January (4)
  • ►  2009 (67)
    • ►  August (2)
    • ►  July (18)
    • ►  June (23)
    • ►  April (3)
    • ►  March (6)
    • ►  February (7)
    • ►  January (8)
  • ▼  2008 (319)
    • ►  December (30)
    • ►  November (43)
    • ►  October (45)
    • ▼  September (12)
      • Motorola Good Mobile Pricing Structure Overview
      • Users Paused After Applying Microsoft(MS) Exchange...
      • Motorola's Good Mobile Messaging software and serv...
      • FREE PC Tools Privacy Guardian Genuine License Cod...
      • Microsoft Assessment and Planning Toolkit Solution...
      • Getting Started with Microsoft Application Virtual...
      • What is oovoo
      • Vavuniya Raid; the truth vs. media controversies
      • Battle Progress Map
      • MultiSet 6.1
      • Nagios - Ubuntu Quickstart
      • Linux version of XAMPP
    • ►  August (18)
    • ►  July (27)
    • ►  June (15)
    • ►  May (7)
    • ►  April (55)
    • ►  March (65)
    • ►  January (2)
  • ►  2007 (10)
    • ►  December (2)
    • ►  November (8)
Powered by Blogger.

About Me

Unknown
View my complete profile