Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 23_917106 bindex.qxp 12/21/06 12:09 AM Page 365 Index Answers that work process database, 199 • Numerics • AntiHookExec 16-bit architectures, 105 benefits of using with other tools, 263–264 32-bit architectures, 105 installing, 263 64-bit architectures overview, 262 GMER working with, 289 user-friendliness of, 245 understanding, 105 using, BC8 using Autoruns with, 265–268 using Process Explorer with, 268–269 • A • using HijackThis with, 264–265 anti-malware Real Time Monitoring, instant Abrams, Lawrence (Bleeping Computer messaging with, 68 Web site owner), 349 anti-malware utilities. See also specific access utilities backdoors giving, 12–13 on DART CD, 358–359 limiting/controlling physical, 140 recommended, BC2–BC7 need to limit, 139–140 anti-spyware software, 97. See also account logon events, auditing, 124–125 specific software account management, auditing, 125 anti-trojan software, 98–99. See also AccuHash 2.0, verifying system file specific software integrity with, 243 antivirus software, 98 Acronis True Image Any Password on DART CD, 359 on DART CD, 362 using, BC14 using, BC19–BC20 Active@ Kill Disk, using, BC22–BC23 AOL Instant Messaging (AIM) network, ActiveX worm infecting, 69 blocking, 73–76 API HookCheck (SIG^2), 164 controls in Internet Explorer 7, 78 API hooking, overview, 159 danger of accepting, 65 AppInit_DLLs injection, functioning of, Ad-Aware SE Personal, using, BC2–BC3 165–166 administrative access Application log (Windows), function of, 206 to disable System Restore, 325 COPYRIGHTEDapplication MATERIAL programming interface (API) rootkits needing, 153 kernel-mode rootkits using, 156 ADS (alternate data stream), 344 user-mode rootkits using, 155 Advanced Password Generator application-based firewalls, 91. See also on DART CD, 362 software firewalls using, BC18–BC19 applications. See software Agnitum Outpost Firewall Apropos rootkits, 239, 340–341 on DART CD, 358 archiving, event logs automatically, using, BC3–BC4 208–210 AIM (AOL Instant Messaging) network, attachments, guidelines for safe, 66–68 worm infecting, 69 23_917106 bindex.qxp 12/21/06 12:09 AM Page 366 366 Rootkits For Dummies auditing BadRKDemo rootkit, DarkSpy removing, categories of securities events available 280–282 for, 124–126 bandwidth, measuring use of, 223–224 overview, 119–120 BartPE (Bart Preinstallation Environment), resources for, 120 236–237 turning on event logging, 121–122 baseline turning on security, 122–124 using, 146–147 auditing policies value of, 146 configuring and enabling, 28 BIOS instant messaging with, 68 changing boot order in, 329–331 Aumha Web site, 348 rootkits residing in, 324 AutoComplete (Internet Explorer), BitDefender antivirus software, 238 disabling, 77 blackhat hacker, 337 automatic updates, setting up, 105–106 BlackLight (F-Secure) AutoPlay (Windows), disabling on external running with Rootkit Revealer, 246 drives/devices, 59 scanning for rootkits with, 251–253, 340 AutoRun (Windows) user-friendliness of, 245 disabling, 58–59 black-market groups, using malware, 18 working without, 60 Bleeping Computer Startup Programs Autoruns (Sysinternals) Database, 199 on DART CD, 360 Bleeping Computer Web site, 348–349 detecting persistent rootkits with, 246–247 boot order, changing in BIOS, 329–331 editing startup list with, 49–50 bootable CDs using, BC8–BC9 Linux, 316 using AntiHookExec with, 265–268 Microsoft, 235–236 AVG Anti-Spyware Free, using, BC4 non-Microsoft Windows, 236–238 bootsector viruses, scanning for, 60 browsers • B • configuring securely, 29 backdoor keyloggers, 289–290. See also using alternate, 28 keyloggers bundling, installing spyware through, backdoors 14–15 allowing access through ports, 183 business plans, creating physical security, overview, 12–13 143–144 rootkits opening, 23 Butler, Jamie (Rootkits: Subverting the backing up Windows Kernel), 177 importance of maintaining, 29 preparing recovery discs for, 147–148 recommended software for, BC14–BC16 • C • Registry, 42–43 CastleCops Security Forum, determining software available for, 304 toolbar legitimacy with, 14 software on DART CD for, 359–360 CastleCops Security Professionals, storing after, 304 349–350 with Windows Backup Utility, 44–46 CastleCops Services Lists, 199 bad sectors CastleCops StartupList, 199 preparing, 327 CCleaner, using, BC17 rootkits hiding in, 326 23_917106 bindex.qxp 12/21/06 12:09 AM Page 367 Index 367 CDs. See also Dummies Anti-Rootkit Toolkit DART. See Dummies Anti-Rootkit Toolkit (DART) data burning ISO image to, 321–322, 357 controlling flow of with packets, 199–200 Linux boot, 316 tracking suspicious flow of, 191 making computers boot from, 321 Data Sentinel, verifying system file integrity Microsoft bootable, 235–236 with, 244 non-Microsoft bootable, 236–238 databases Cermak, Mike (Tech Support Guy), 353–354 creating security settings, 131–133 chat clients, monitoring instant messaging researching process, 198 accounts with, 68 dd, creating hard drive image with, checklist for improving security, 118–119 316–317 checksums, assessing file integrity with, 240 dd for Windows, copying RAM dump with, ChrisRLG (Malware Removal Web site 313–314 owner), 351 DDoS (Distributed Denial of Service) cleaners, recommended for Registry and network of zombies used in, 18 system, BC17–BC18 object of attacks, 23 cloaked rootkits, defined, 232 defragmenting, hard drive, 53–57 computer dialers, overview, 12 activity, comparing with bandwidth Diamond CS, Port Explorer, 190–191, usage, 224 202–205, 293–300 needing new, 115 direct kernel object manipulation (DKOM), computer privileges, understanding, 153. 171–173, 341, 342 See also user accounts Direct Revenue LLC, litigation against, 309 connections, disabling network before directory service access, auditing, 125 cleaning rootkits, 319–320 Diskeeper Pro (Executive Software), 57 Content Zones (Internet Explorer), Distributed Denial of Service (DDoS) adjusting, 74–76 network of zombies used in, 18 contests, avoiding online, 67 object of attacks, 23 Coyote, Tom (Tom Coyote Security Forum DLL injection owner), 354 AppInit_DLLs, 165–166 CPU cycles, monitoring, 228–229 detecting with IceSword, 290–291 cross-diff comparison, using different detecting with Process Explorer, 291–293 rootkits-detection tools, 234 functioning of, 164 overview, 159 DLLs (dynamic link libraries) • D • kernel and user, 161–163 DarkSpy overview, 160, 162 analyzing Registry with, 279–280 rootkits targeting, 160 comprehensiveness and user-friendliness user-mode rootkits using, 155 of, 245 domain, defined, 125 on DART CD, 361 domain controller, defined, 125 detecting/removing rootkits with, 277–278 double filename extensions, viewing, 12 evaluating process activity with, 227–228 downloading overview, 276–277 guidelines for safe, 65 Registry Analyzer, 278 using scanners before, BC2 removing difficult rootkits with, 280–282 drive-by downloads, installing spyware by, using for port-to-process mapping, 190 15–16 23_917106 bindex.qxp 12/21/06 12:09 AM Page 368 368 Rootkits For Dummies drivers, installing as rootkits, 166–168 inspecting with MonitorWare, 219–222 Dummies Anti-Rootkit Toolkit (DART) monitoring for rootkits clues, 180 anti-malware utilities and scanners with, overview, 207 358–359 types of, 206 backup and imaging software on, 359–360 Event Viewer (Windows) CD contents, 357–358 accessing, 206–207 installing CD with Microsoft Windows, evaluating inspection results in, 213–214 356–357 filtering event log data with, 214–216 password protectors and generators finding rootkits with, 126 on, 364 inspecting event logs with, 210–213 rootkit-detection-and-removal software upgrading to Event Log Explorer from, on, 361–362 217–219 system requirements for, 355–356 events system-analysis software on, 360–361 categories available for auditing, 124–126 troubleshooting, 363 filtering by type of, 214–216 dynamic link libraries. See DLLs evidence collecting, 304 collecting RAM dump to USB flash drive, • E • 312–316 Easter eggs, backdoors installed as, 13 guidelines for preserving, 310–312 EAT (Export Address Table), as avenue to hiring professional to analyze, 317–318 DLLs, 162 tracking perpetrators with, 307–308 eEye BootRoot, 343 executable files, hidden, 11–12 Elite toolbar, 339–340 Executive Software (Diskeeper Pro), 57 e-mail Export Address Table (EAT), as avenue to guidelines for safe, 66–68 DLLs, 162 rootkits facilitating spam, 23 external media, scanning for bootsector EnCase, forensic assistance from, 318 viruses, 60 Encrypting File System (EFS), safe surfing with, 64 End User License Agreements (EULAs), • F • 65, 339 false security alerts, encouraging purchase Eraser, using, BC21–BC22 of malware programs, 17 Eshelman, James A. (Aumha owner), 348 FanBot, 343–344 Ethereal, sniffing hackers with, 205 Farmer’s Boot CD (FBCD), 316 EULAlyzer, protecting from spyware, 15 file analysis services, availability of, 305 evaluating Web sites safety with, 81–82 FileAlyzer, verifying system files with, Event Log Explorer, advantages of, 217–219 240–243 event logging. See also auditing file-integrity checks, recommending, 145 overview, 119–120 Filemon (Sysinternals) turning on, 121–122 tracking forensic tool changes with, 312 event logs tracking outbound access with, 197 automatically archiving, 208–210 filename extensions, viewing, 12 changing default size, 207–208 files inspecting with Event Log Explorer, backing up with Windows Backup Utility, 217–219 44–46 inspecting with Event Viewer, 210–213 checking for legitimacy of, 257 23_917106 bindex.qxp 12/21/06 12:09 AM Page 369 Index 369 scanning before opening, 67–68 F-Secure,
Recommended publications
  • Rootkit- Rootkits.For.Dummies 2007.Pdf
    01_917106 ffirs.qxp 12/21/06 12:04 AM Page i Rootkits FOR DUMmIES‰ 01_917106 ffirs.qxp 12/21/06 12:04 AM Page ii 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iii Rootkits FOR DUMmIES‰ by Larry Stevenson and Nancy Altholz 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iv Rootkits For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Win Xp Pe Iso Download
    Win Xp Pe Iso Download 1 / 4 Win Xp Pe Iso Download 2 / 4 3 / 4 Download Files. Download PEbuilder 3.1.10 File: Download PEbuilder 3.1.10 File. BartPE Iso WINXP Emulated Version 155MB: .... To start working with WinPE, download and install both the Windows ... To learn how to create a bootable WinPE CD, DVD, ISO, or VHD, see .... A tutorial on installing BartPE onto a bootable USB drive. ... but instead of going straight into the BartPE OS, it loaded the BartPE ISO file into the ... Secondly, download Microsoft's Windows Server 2003 SP1 installation file (this can ... This utility has the ability to properly format a USB disk & install a Windows XP boot sector.. Jump to Boot WinPE/BartPE from an ISO file - Download firadisk.gz from the Beta ... For example, for the Avast BartPE ISO you can use a .... Download BartPE builder from http://www.nu2.nu/pebuilder/ ... When it's done building, image file "c:\pebuilder\pebuilder.iso" should be created properly.. Use Windows 7/XP ISO File or DVD to Create Bootable Install USB Drive ... it also allows you transfer Windows PE( Windows XP / Windows 7 / Vista / 2003 / 2008 ) to usb pen drive in a few clicks. ... Download it from softpedia.. Here we show you 5 Windows PE based boot discs to help technicians and ... disc is fully automated including the downloading of the Windows ISO image file.. 1.1 USB Drive; 1.2 BIOS/UEFI configuration; 1.3 ISO image ... If not, download BartPE; The original CD of Windows XP Professional, not a Windows XP Home ...
    [Show full text]
  • (12) Unlted States Patent (10) Patent No.: US 8,086,835 B2 Argus Et A]
    US008086835B2 (12) Unlted States Patent (10) Patent No.: US 8,086,835 B2 Argus et a]. (45) Date of Patent: Dec. 27, 2011 (54) ROOTKIT DETECTION 2005/0081198 A1 * 4/2005 (3110 et a1. .................... .. 717/174 2005/0229250 A1 10/2005 Ring et a1. 75 Inventors: Christo her J. Ar us, Crown oint, IN Zoos/0162915 Al * 7/2008 Pris: et .al' """"""""""" " 713/2 ( ) (Us); clliase N- Doguglass portlivaynes 2008/0282350 A1 * 11/2008 Khllnanl et a1. .............. .. 726/24 IN (US); Dan J. Di Spaltro, Bend, OR FOREIGN PATENT DOCUMENTS (US); Michael D. Fuller, Seattle, WA Ep 656587 A1 7/1995 (Us) OTHER PUBLICATIONS (73) Assignee: International Business Machines Sean’s Blog, Making a bootable USB drive with BartPE or Corporation, Armonk, NY UBCD4Win, Mar‘ 31, 2006, pp‘ 1_3‘* _ _ _ _ _ PCuser, RootKitty BartPE plugin?, Dec. 4, 2006, p. 1.* ( * ) Not1ce: Subject to any d1scla1mer, the term of th1s patent is extended or adjusted under 35 * Cited by eXaminef U.S.C. 154(b) by 1111 days. Primary Examiner * Thomas Lee (21) Appl. No.: 11/757,729 Assistant Examiner * Michael J BroWn (74) Attorney, Agent, orFirm * Steven M. Greenberg, Esq.; (22) Filed: Jun- 41 2007 Carey, Rodriguez, Greenberg & O’Keefe (65) Prior Publication Data (57) ABSTRACT US 2008/0301426 A1 Dec. 4, 2008 Embodiments of the present invention address de?ciencies of the art in respect to rootkit detection and provide a method, (51) Int- Cl- system and computer program product for external rootkit G06F 9/24 (2006-01) detection and remediation. In one embodiment of the inven G06F 15/177 (2006-01) tion, an external rootkit detection tool can be provided.
    [Show full text]
  • Windows Internals, Sixth Edition, Part 2
    spine = 1.2” Part 2 About the Authors Mark Russinovich is a Technical Fellow in ® the Windows Azure™ group at Microsoft. Windows Internals He is coauthor of Windows Sysinternals SIXTH EDITION Administrator’s Reference, co-creator of the Sysinternals tools available from Microsoft Windows ® The definitive guide—fully updated for Windows 7 TechNet, and coauthor of the Windows Internals and Windows Server 2008 R2 book series. Delve inside Windows architecture and internals—and see how core David A. Solomon is coauthor of the Windows Internals book series and has taught components work behind the scenes. Led by a team of internationally his Windows internals class to thousands of renowned internals experts, this classic guide has been fully updated Windows developers and IT professionals worldwide, SIXTH for Windows 7 and Windows Server® 2008 R2—and now presents its including Microsoft staff. He is a regular speaker 6EDITION coverage in two volumes. at Microsoft conferences, including TechNet As always, you get critical, insider perspectives on how Windows and PDC. operates. And through hands-on experiments, you’ll experience its Alex Ionescu is a chief software architect and internal behavior firsthand—knowledge you can apply to improve consultant expert in low-level system software, application design, debugging, system performance, and support. kernel development, security training, and Internals reverse engineering. He teaches Windows internals courses with David Solomon, and is ® In Part 2, you will: active in the security research community.
    [Show full text]
  • Bartpe and KNOPPIX
    Portable Operating Systems for the Personal Computer: BartPE and KNOPPIX Eric P. Delozier, Electronic Services Librarian Penn State Harrisburg Library Middletown, PA Abstract • This poster demonstrates how two operating environments that boot and run from a CD-ROM drive are used as platforms for managing technology and delivering instruction. Built from Windows XP or 2003 installation media, BartPE provides a GUI-based environment that is useful for managing employee and public-access computers. KNOPPIX provides a convenient and portable delivery method for educating librarians and end-users on Linux and open source software. Although based on disparate platforms, both provide a vast array of applications that can support a library’s dual-mission of delivering effective information technology services and literacy programs. Distinctions BartPE KNOPPIX Licensing Mostly NonProprietary Proprietary (Open-source) Platform Windows XP or Linux 2003 CD Capacity Under 550 MB 700 MB or Requirements higher Cost Partially Free Free 1 Similarities BartPE KNOPPIX Networking Yes Yes Supported Devices Requires installation Recognizes most of some drivers for devices automatically maximum support. with little intervention. GUI Nu2Menu KDE, IceWM, Fluxbox, TWM VNC/RDP Support TightVNC (VNC), KRDesktop (Supports Remote Desktop VNC and RDP) Client (RDP) BartPE Requirements • Building (PE Builder): • Executing: – Windows XP (SP1 or – Valid Windows higher) or 2003 License Installation Media – 128 MB RAM – Recordable CD or – Compatible SVGA DVD Drive Graphics Adapter – ISO Burning Software – Intel-compatible CPU (Nero, Easy CD (i586 or later) Creator, etc.) – Bootable CD/DVD Drive BartPE Components • PE Builder – Builds BartPE from Windows Installation Media. • Drivers – Minimal included. Others can be easily installed.
    [Show full text]
  • NTFS from Wikipedia, the Free Encyclopedia Jump To: Navigation, Search NTFS Developer Microsoft Introduced July 1993 (Windows
    NTFS From Wikipedia, the free encyclopedia Jump to: navigation, search NTFS Developer Microsoft Introduced July 1993 (Windows NT 3.1) Partition identifier 0x07 (MBR) EBD0A0A2-B9E5-4433-87C0-68B6B72699C7 (GPT) Structures Directory contents B+ tree[1] File allocation Bitmap/Extents Bad blocks $badclus Limits Max file size 264 bytes (16 EiB) minus 1 KiB [2] Max number of files 4,294,967,295 (232-1)[2] Max filename length 255 UTF-16 code units[3] Max volume size 264 ? 1 clusters [2] Allowed characters in filenames In Posix namespace, any UTF-16 code unit (case sensitive) except U+0000 (NUL) and / (slash). In Win32 namespace, any UTF-16 code unit (case insensitive) except U+0000 (NUL) / (slash) \ (backslash) : (colon) * (asterisk) ? (Question mark) " (quote) < (less than) > (greater than) and | (pipe) [3] Features Dates recorded Creation, modification, POSIX change, access Date range 1 January 1601 ʹ 28 May 60056 (File times are 64-bit numbers counting 100- nanosecond intervals (ten million per second) since 1601, which is 58,000+ years) Date resolution 100ns Forks Yes (see Alternate data streams below) Attributes Read-only, hidden, system, archive, not content indexed, off-line, temporary File system permissions ACLs Transparent compression Per-file, LZ77 (Windows NT 3.51 onward) Transparent encryption Per-file, DESX (Windows 2000 onward), Triple DES (Windows XP onward), AES (Windows XP Service Pack 1, Windows Server 2003 onward) Single Instance Storage Yes Supported operating systems Windows NT family (Windows NT 3.1 to Windows NT 4.0, Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008) NTFS is the standard file system of Windows NT, including its later versions Windows 2000, Windows XP, Windows Server 2003, Windows Server 2008, and Windows Vista.[4] NTFS supersedes the FAT file system as the preferred file system for Microsoft͛s ͞Windows͟-branded operating systems.
    [Show full text]
  • BMA User & Reference Manual V7.5 Build 1730 EN
    BootManage® Administrator User & Reference Manual 1 Contents OPERATING SYSTEMS AND OPERATION MODES ................................................................................... 5 OVERVIEW ........................................................................................................................................................... 6 Operating system installation (with automatic hardware detection) .............................................................. 6 Imaging for installation ................................................................................................................................... 6 Diskless operation ........................................................................................................................................... 7 Performing one time activities on a Managed PC .......................................................................................... 7 Diskless Linux network boot ........................................................................................................................... 8 Remove an operating system ........................................................................................................................... 9 Hard Disk Partitioning.................................................................................................................................... 9 CLIENT INSTALLATION ................................................................................................................................ 11 Client
    [Show full text]
  • A Windows XP Diagnostic Guide Step 1
    home.comcast.net 20/11/2010 12:26 Diagnose XP Diagnose XP - Step 1 - Malware A Windows XP Removal Diagnostic Guide Malware Infection which includes Viruses, Worms, Trojans, Spyware, Adware and Rootkits can cause or mimic just about any system problem. These in- clude: Application Errors, Lock-ups (freezing), The following Free guide will help you Blue Screen Stop Errors (BSOD) and Random troubleshoot the most common causes of sys- Reboots. tem problems. Diagnosing System problems can be very complicated and time consuming. There Malware Removal Guide - Malware is short are no simple solutions. Windows XP systems should for «Malicious Software». It is a general never Lock-up (freeze), display Blue Screen Stop term that refers to any software or program Errors or Randomly Reboot. These are all warning code designed to infiltrate or damage a computer signs something is wrong or misconfigured with system without the owner’s informed consent. This your system. Unless you are a highly trained, expe- includes Viruses, Worms, Trojans, Spyware, Adware rienced PC Technician do not skip any of the fol- and Rootkits. This 3 step guide will show you how lowing steps. to remove these infections and protect yourself from future infections for free using free software. Notes - Overclocking can cause almost any system problem. It is strongly recommended to only run FACT: 89% of consumer PCs are infected with your system at the correct frequencies. Troubles- spyware hooting any problem on an Overclocked system is feedback a complete waste of time. Set the system back to its ^ TOP default frequencies before you begin troubleshoo- ting.
    [Show full text]
  • IBM Barts PE Presenatation
    BarBartt’’ss PPEE JoJossee MeMeddeieiroross MCP+I,MCP+I, MMCSCSE,E, NT4NT4 MCTMCT Course Number Presentation_ID © 1999, Cisco Systems, Inc. 1 WWhhatat iiss BBart’art’ss PEPE?? •Bart's PE Builder is a free tool that helps you build a "BartPE" (Bart Preinstalled Environment) bootable Windows CD-Rom or DVD from the original Windows XP or Windows Server 2003 installation/setup CD, very suitable for PC maintenance tasks. • Bart’s PE gives you a complete Win32 environment with network support, a graphical user interface (800x600) and FAT/NTFS/CDFS filesystem support. Very handy for burn-in testing systems with no OS, rescuing files to a network share, virus scan and so on. •This will replace any Dos bootdisk in no time! Course Number Presentation_ID © 12990090, Cisco Systems, Inc. 2 WWhyhy DDidid II SSwitwitchch toto BBartsarts PPE?E? • DOS Boot Disks Use Lanmanger v2.1 • SMB / CIFS Authentication Issue using Microsoft Active Directory 2003 in Native Mode. • Dos and earlier version of Windows does not support NTLMv2 or SMB signing as well as earlier versions of SAMBA and MAC OS X. Presentation_ID © 1999, Cisco Systems, Inc. 3 BBart’art’ss PEPE UUsesess 3232 BBitit DDririversvers • BartBart''ss PPEE BBuilduilderer usesuses 3232 BBitit NNeetwtworkork CoControllerntroller andand SStoragtoragee CCoontrntroollerller driversdrivers • ThThisis allowallowss yyoouu ttoo accessaccess ddiskisk rraaidid arrayarrayss andand wwitithh NetwoNetworkrk conconttrorollerller ssupuppoportrt alloallowwss yyoouu ttoo imimagagee anan enenttireire serverserver overover etherneethernett ttoo aa NetwoNetworkrk shareshare oonn aa DDASAS,, NNASAS oror SSAANN ArrayArray • BartBart’s’s PPEE hhasas bbuiltuilt inin UUSSBB 2.02.0 susupppportort whwhichich allowallowss yyouou ttoo accessaccess anan exexternalternal UUSSBB 2.02.0 hardhard drive.
    [Show full text]
  • Installation Guide for Cisco Unified Contact Center Management Portal Release 7.1(1)
    Installation Guide for Cisco Unified Contact Center Management Portal Release 7.1(1) August 2006 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (64387) Fax: 408 526-4100 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cleaning Windows
    WWW.TWEAKGUIDES.COM [ Version 5.0 ] THE TWEAKGUIDES TWEAKING COMPANION TABLE OF CONTENTS ofContents Table Table of Contents........................................................................................................................................................... 2 Copyright & Credits ..................................................................................................................................................... 10 Introduction ................................................................................................................................................................... 11 Before Using this Book .............................................................................................................................................. 12 Basic Requirements ........................................................................................................................................................................................... 12 Different Versions of Windows ......................................................................................................................................................................... 12 Where are the Pictures? .................................................................................................................................................................................... 12 Why is the Book So Long? ...............................................................................................................................................................................
    [Show full text]