Read-Only USB custom Policy for Windows XP using Domain GPO.

HI, back again to the blog. This time I have been doing research for the ‘GROUP POLICY EDITOR’ for server 2008 R2 and Server 2012. During my research I found that ‘GPMC’ is a quite vast tool and can control almost everything of the system on AD. Here I have created a custom group policy to block the USB drive.

Some of you may ask why I need to create USB drive although I do have already a policy on the server to block USB. But if you read this policy carefully you will find out that this policy is for only the OS which are higher version than Windows Vista (i.e. Windows Vista, Windows 7 and Windows 8). But if someone ask you for Windows XP than??? What will you do?? If someone ask you for make a read-only policy for USB on windows XP. What will you do again?? So Simply I have created a custom Policy that can be compatible with windows XP or any other Windows Platform OS. Copy this code, Paste on notepad and save it in the extension of ‘.adm’. Continue reading

[How to] Create shortcut using VBS script

After a long time I am again back to my blog….it has been almost 2 months I was on vacation. Now just returned to my normal life. Few days ago, I have an issue of creating a automatic shortcut on the desktop of the machine which was the member of the domain. I Struggle with a lot of scripts and moved on…. but finally with the help of technet and msdn I got the solution and trying to share my knowledge over here.

Continue reading

Virtualization Beyond the wall…

Few months ago I had blogged the virtual XP mode in the in Windows 7….Where you can use all your real hardware in the virtual mode of XP which was the great facility for us…if also our hardware was not capable to run in the Windows 7 we can easily go to the virtual mode and play the hardware…and I had given the example of my TV card which is compatible with the Windows XP but not with the Windows 7. But the only disadvantage of that virtual XP mode was that it is only accessible to the hardware or processor which support the Hardware-Assisted Virtualization (HAV) technology i.e. Virtualization. And lot of we have to check whether our processor supports the virtualization or not and also some of we may have got this error also. Continue reading

What new in Windows 8?

After the successful launch of Window 7, Microsoft is now working hard to plan the next iteration of the Windows Client and Server Platforms. But even thought the successor of Windows 7, commonly referred under the codename 8, was in planning, the Redmond company is not sharing any details on the release with the public and the silence is still continues when the first reports indicating that Microsoft has actually kicked off the development process for windows 8 began emerging.

Continue reading

[Fix] Vulnerability on 32-bit Windows 7

Some days ago I was going through some article fixing the error on windows 7….but suddenly I got an article about the 17- year old EoP (Elevation of Privilege) Vulnerability that is still surviving in our Operating system with a multiple iteration of  platform. It is the case of the BIOS calls in the virtual 8086 mode monitor code which was introduced in Windows NT 3.1, released in 1993 and that is surviving till this day in Windows 7. In this regard, Microsoft has confirmed information made Public detailing a vulnerability contained in every release of the Windows NT kernel and dating back 17 years.

Continue reading

Privacy Center Rogue Antivirus Copies Microsoft Privacy Portal

Authors of rogue antivirus software hesitate little when it comes down to copying the design and branding of official security solutions in an attempt to pass their fake antivirus code as genuine offerings. It is, of course, just one of the aspects of the social engineering techniques designed to trick end users into paying for inexistent protection. Fake antivirus generate an incessant volume of misleading alerts and false detection reports, forcing the user to buy illegitimate security software. Privacy Center is one of the rogue antivirus that copied a genuine Microsoft security product, namely the company’s privacy portal, in the attempt to create the illusion that it is a valid product.

Continue reading

Hiren’s bootcd 10.1….now available.

Hiren’s Boot CD is a boot CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. It is a Bootable CD; thus, it can be useful even if the primary operating system cannot be booted.

 

Continue reading

[How To]Unattended Installation file Guide.

Introduction

The goal of this document is to collect instructions for performing unattended / silent installations of many popular application installers. Such instructions are useful for automating these installations.

A quick word on terminology: Strictly speaking, an unattended installation is one which does not require user interaction, and a silent (or quiet) installation is one which does not display any indication of its progress. However, most people use these terms interchangeably.

Continue reading