Showing posts with label Tech Info. Show all posts
Showing posts with label Tech Info. Show all posts

Sunday, January 2, 2011

Embeddable Document Viewer from Google Docs

 
Google Docs allows you to share files available on Google Docs by embedding it into a document viewer. This feature is also available for documents which are not uploaded to Google Docs, but hosted elsewhere. All you need to do is to make sure the document is available online. This embeddable document viewer works with PDF and PowerPoint files only.







You need to add only few lines of code to have the document viewer on your website.

<iframe src="http://docs.google.com/gview?url=http://www.horuscentre.org/library/Thelema/Magic_Without_Tears.pdf&embedded=true" style="width: 600px; height: 500px;" frameborder="0"></iframe>

Do not forget to replace the text in bold using the URL of the file you want to embed. As mentioned before, this will work only with PDF and PPT files.
 
 

Updated: 18-5-2023

 

Command Prompt


ANSI.SYS - Defines functions that change display graphics, control cursor movement, and reassign keys.
APPEND - Causes MS-DOS to look in other directories when editing a file or running a command.
ARP - Displays, adds, and removes arp information from network devices.
ASSIGN - Assign a drive letter to an alternate letter.
ASSOC - View the file associations.
AT - Schedule a time to execute commands or programs.
ATMADM - Lists connections and addresses seen by Windows ATM call manager.
ATTRIB - Display and change file attributes.
BATCH - Recovery console command that executes a series of commands in a file.
BOOTCFG - Recovery console command that allows a user to view, modify, and rebuild the boot.ini
BREAK - Enable / disable CTRL + C feature.
CACLS - View and modify file ACL's.
CALL - Calls a batch file from another batch file.
CD - Changes directories.
CHCP - Supplement the International keyboard and character set information.
CHDIR - Changes directories.
CHKDSK - Check the hard disk drive running FAT for errors.
CHKNTFS - Check the hard disk drive running NTFS for errors.
CHOICE - Specify a listing of multiple options within a batch file.
CLS - Clears the screen.
CMD - Opens the command interpreter.
COLOR - Easily change the foreground and background color of the MS-DOS window.
COMP - Compares files.
COMPACT - Compresses and uncompress files.
CONTROL - Open control panel icons from the MS-DOS prompt.
CONVERT - Convert FAT to NTFS.
COPY - Copy one or more files to an alternate location.
CTTY - Change the computers input/output devices.
DATE - View or change the systems date.
DEBUG - Debug utility to create assembly programs to modify hardware settings.
DEFRAG - Re-arrange the hard disk drive to help with loading programs.
DEL - Deletes one or more files.
DELETE - Recovery console command that deletes a file.
DELTREE - Deletes one or more files and/or directories.
DIR - List the contents of one or more directory.
DISABLE - Recovery console command that disables Windows system services or drivers.
DISKCOMP - Compare a disk with another disk.
DISKCOPY - Copy the contents of one disk and place them on another disk.
DOSKEY - Command to view and execute commands that have been run in the past.
DOSSHELL - A GUI to help with early MS-DOS users.
DRIVPARM - Enables overwrite of original device drivers.
ECHO - Displays messages and enables and disables echo.
EDIT - View and edit files.
EDLIN - View and edit files.
EMM386 - Load extended Memory Manager.
ENABLE - Recovery console command to enable a disable service or driver.
ENDLOCAL - Stops the localization of the environment changes enabled by the setlocal command.
ERASE - Erase files from computer.
EXIT - Exit from the command interpreter.
EXPAND - Expand a M*cros*ft Windows file back to it's original format.
EXTRACT - Extract files from the M*cros*ft Windows cabinets.
FASTHELP - Displays a listing of MS-DOS commands and information about them.
FC - Compare files.
FDISK - Utility used to create partitions on the hard disk drive.
FIND - Search for text within a file.
FINDSTR - Searches for a string of text within a file.
FIXBOOT - Writes a new boot sector.
FIXMBR - Writes a new boot record to a disk drive.
FOR - Boolean used in batch files.
FORMAT - Command to erase and prepare a disk drive.
FTP - Command to connect and operate on a FTP server.
FTYPE - Displays or modifies file types used in file extension associations.
GOTO - Moves a batch file to a specific label or location.
GRAFTABL - Show extended characters in graphics mode.
HELP - Display a listing of commands and brief explanation.
IF - Allows for batch files to perform conditional processing.
IFSHLP.SYS - 32-bit file manager.
IPCONFIG - Network command to view network adapter settings and assigned values.
KEYB - Change layout of keyboard.
LABEL - Change the label of a disk drive.
LH - Load a device driver in to high memory.
LISTSVC - Recovery console command that displays the services and drivers.
LOADFIX - Load a program above the first 64k.
LOADHIGH - Load a device driver in to high memory.
LOCK - Lock the hard disk drive.
LOGON - Recovery console command to list installations and enable administrator login.
MAP - Displays the device name of a drive.
MD - Command to create a new directory.
MEM - Display memory on system.
MKDIR - Command to create a new directory.
MODE - Modify the port or display settings.
MORE - Display one page at a time.
MOVE - Move one or more files from one directory to another directory.
MSAV - Early M*cros*ft Virus scanner.
MSD - Diagnostics utility.
MSCDEX - Utility used to load and provide access to the CD-ROM.
NBTSTAT - Displays protocol statistics and current TCP/IP connections using NBT
NET - Update, fix, or view the network or network settings
NETSH - Configure dynamic and static network information from MS-DOS.
NETSTAT - Display the TCP/IP network protocol statistics and information.
NLSFUNC - Load country specific information.
NSLOOKUP - Look up an IP address of a domain or host on a network.
PATH - View and modify the computers path location.
PATHPING - View and locate locations of network latency.
PAUSE - Command used in batch files to stop the processing of a command.
PING - Test / send information to another network computer or network device.
POPD - Changes to the directory or network path stored by the pushd command.
POWER - Conserve power with computer portables.
PRINT - Prints data to a printer port.
PROMPT - View and change the MS-DOS prompt.
PUSHD - Stores a directory or network path in memory so it can be returned to at any time.
QBASIC - Open the QBasic.
RD - Removes an empty directory.
REN - Renames a file or directory.
RENAME - Renames a file or directory.
RMDIR - Removes an empty directory.
ROUTE - View and configure windows network route tables.
RUNAS - Enables a user to execute a program on another computer.
SCANDISK - Run the scandisk utility.
SCANREG - Scan registry and recover registry from errors.
SET - Change one variable or string to another.
SETLOCAL - Enables local environments to be changed without affecting anything else.
SETVER - Change MS-DOS version to trick older MS-DOS programs.
SHARE - Installs support for file sharing and locking capabilities.
SHIFT - Changes the position of replaceable parameters in a batch program.
SHUTDOWN - Shutdown the computer from the MS-DOS prompt.
SMARTDRV - Create a disk cache in conventional memory or extended memory.
SORT - Sorts the input and displays the output to the screen.
START - Start a separate window in Windows from the MS-DOS prompt.
SUBST - Substitute a folder on your computer for another drive letter.
SWITCHES - Remove add functions from MS-DOS.
SYS - Transfer system files to disk drive.
TELNET - Telnet to another computer / device from the prompt.
TIME - View or modify the system time.
TITLE - Change the title of their MS-DOS window.
TRACERT - Visually view a network packets route across a network.
TREE - View a visual tree of the hard disk drive.
TYPE - Display the contents of a file.
UNDELETE - Undelete a file that has been deleted.
UNFORMAT - Unformat a hard disk drive.
UNLOCK - Unlock a disk drive.
VER - Display the version information.
VERIFY - Enables or disables the feature to determine if files have been written properly.
VOL - Displays the volume information about the designated drive.
XCOPY - Copy multiple files, directories, and/or drives from one location to another.
TRUENAME - When placed before a file, will display the whole directory in which it exists.
TASKKILL - It allows you to kill those unneeded or locked up applications.
To open a Microsoft DOS command prompt shell window, first click the Start menu at the lower-left of your computer's desktop and select "Run...".

Then if you are using Windows XP or Vista, type "cmd" (without the quotation marks) into the Run box and click "OK".

Otherwise, type "command" (without the quotation marks) into the Run box and click "OK".
 
 

Updated: 18-5-2023


Remove the Microsoft .NET Framework Assistant (ClickOnce) Firefox Extension



Warning to all Firefox users: the Microsoft .NET Framework 3.5 Service Pack 1 update, pushed through the Windows Update service to all recent editions of Windows, installs the Microsoft .NET Framework Assistant firefox extension without asking your permission. This update adds to Firefox one of the most dangerous vulnerabilities present in all versions of Internet Explorer: the ability for websites to easily and quietly install software on your PC. Since this design flaw is one of the reasons you may've originally choosen to abandon IE in favor of a safer browser like Firefox, you may wish to remove this extension immediately. Unfortunately, Microsoft, in their infinite wisdom, has taken steps to make the removal of this extension particularly difficult - open the Add-ons window in Firefox, and you'll notice the Uninstall button next to their extension is grayed out!

Here's the complete removal procedure.

Remove the Microsoft .NET Framework Assistant (ClickOnce) Firefox Extension


The Microsoft .NET Framework 3.5 Service Pack 1 update, pushed through the Windows Update service to all recent editions of Windows in February 2009, installs the Microsoft .NET Framework Assistant firefox extension without asking your permission.

This update adds to Firefox one of the most dangerous vulnerabilities present in all versions of Internet Explorer: the ability for websites to easily and quietly install software on your PC. Since this design flaw is one of the reasons you may've originally chosen to abandon IE in favor of a safer browser like Firefox, you may wish to remove this extension with all due haste.

Unfortunately, Microsoft in their infinite wisdom has taken steps to make the removal of this extension particularly difficult - open the Add-ons window in Firefox, and you'll notice the Uninstall button next to their extension is grayed out! Their reasoning, according to Microsoft blogger Brad Abrams, is that the extension needed "support at the machine level in order to enable the feature for all users on the machine," which, of course, is precisely the reason this add-on is bad news for all Firefox users.

Here's the bafflingly-convoluted procedure required to remove this garbage from Firefox:
  1. Open Registry Editor (type regedit in the Start menu Search box in Vista/Windows 7, or in XP's Run window).
  2. Expand the branches to the following key:
    • On 32-bit systems: HKEY_LOCAL_MACHINE \ SOFTWARE \ Mozilla \ Firefox \ Extensions
    • On x64 systems: HKEY_LOCAL_MACHINE \ SOFTWARE \ Wow6432Node \ Mozilla \ Firefox \ Extensions
  3. Delete the value named {20a82645-c095-46ed-80e3-08825760534b} from the right pane.
  4. Close the Registry Editor when you're done.
  5. Open a new Firefox window, and in the address bar, type about:config and press Enter.
  6. Type microsoftdotnet in the Filter field to quickly find the general.useragent.extra.microsoftdotnet setting.
  7. Right-click general.useragent.extra.microsoftdotnet and select Reset.
  8. Restart Firefox.
  9. Open Windows Explorer, and navigate to %SYSTEMDRIVE%\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation.
  10. Delete the DotNetAssistantExtension folder entirely.
  11. Open the Add-ons window in Firefox to confirm that the Microsoft .NET Framework Assistant extension has been removed.
It will be a great day when PC users no longer have to waste this much time to protect themselves from those who write the software they use. (And if you're thinking, "Why not just use a Mac," may I remind you of the MobileMe junk recently installed on so many Windows machines without their owners' permission!).
 
 

Updated: 18-5-2023

 

How to Hide Files in JPEG Pictures


If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else.

I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file!

You can actually hide any type of file inside of an image file, including txt, exe, mp3, avi, or whatever else. Not only that, you can actually store many files inside of single JPG file, not just one! This can come in very handy if you need to hide files and don’t want to bother with encryption and all that other technical stuff.

Hide File in Picture

In order to accomplish this task, you will need to have either WinZip or WinRAR installed on your computer. You can download either of these two off the Internet and use them without having to pay anything. Here are the steps for creating your hidden stash:
  • Create a folder on your hard drive, i.e. C:\Test and put in all of the files that you want to hide into that folder. Also, place the image that you will be using to hide the files in.
hide file in jpg
  • Now select all of the files that you want to hide, right-click on them, and choose the option to add them to a compressed ZIP or RAR file. Only select the files you want to hide, not the picture. Name it whatever you want, i,e. “Hidden.rar”.
add to archive
  • Now you should have a folder that looks something like this with files, a JPG image, and a compressed archive:
hidden rar
  • Now here’s the fun part! Click on Start, and then click on Run. Type in “CMD” without the quotes and press Enter. You should now see the command prompt window open. Type in “CD \” to get to the root directory. Then type CD and the directory name that you created, i.e. “CD Test“.
cd test
  • Now type in the following line: “copy /b DSC06578.JPG + Hidden.rar DSC06578.jpg” and press Enter. Do not use the quotes. You should get a response like below:
hide files in jpg
Just make sure that you check the file extension on the compressed file, whether it is .ZIP or .RAR as you have to type out the entire file name with extension in the command. I have heard that some people say that they have had problems doing this with a .ZIP extension, so if that doesn’t work, make sure to compress to a .RAR file.

And that’s it! The picture file will have been updated with the compressed archive inside! You can actually check the file size of the picture and see that it has increased by the same amount as the size of the archive.

You can access your hidden file in two ways. Firstly, simply change the extension to .RAR and open the file using WinRAR. Secondly, you can just right-click on the JPG image and choose Open With and then scroll down to WinRAR. Either way, you’ll see your hidden files show up that you can then extract out.

winrar

That’s it! That is all it takes to hide files inside JPG picture files! It’s a great way simply because not many people know it’s possible and no one even thinks about a picture as having to the ability to “hide” files. Enjoy!
 
 

Updated: 18-5-2023

 

You've been Hacked: What to do First!

What should you do in the first five minutes after you discover your system has been hacked?

Sitting at your desk, you notice some odd activity in a log while you're looking into a user problem. The more you step through it, the more you are convinced that something is just not right. Your heart skips a beat when you realise that the system has been hacked.

At this point, you enter a stage of shock as you ask yourself, "How could this happen?" and "What do I do now?"

Although you'll find plenty of advice on how to keep your systems from being hacked, there are relatively few articles that will help you sort things out in the aftermath of an attack. So for the next three weeks, I'll present a series of articles that will explain what you should do in the first five minutes, in the first hour, and in the first week after you've discovered that an interloper has compromised your systems. This article will focus on the most immediate actions you must take to secure your system: evaluate, communicate, and disconnect.

Evaluate:

The first question that you must answer after an attack (or preferably before) is what your objectives are. In most cases, the objectives are simple: prevent further intrusion and resolve the problem. However, in some cases, you will want to be able to positively identify the intruder and, in others, you will be focused on figuring out which vulnerability the hacker exploited.

Identify the Intruder:

It may be necessary to positively identify the intruder so that you can refer the matter to the police for further investigation and possible prosecution. Of course, this is not the most expedient way to get the systems back online and prevent further infection. Identifying intruders can be difficult, particularly if they have covered their tracks well. Despite Hollywood's portrayal of hackers easily being traced, someone who is routing traffic through several systems is not only difficult to find, but might be -- in all practical terms -- impossible to track down.

Identify the Vulnerability:

Another approach that some organisations take is to try to identify the specific vulnerability exploited. The thinking is that you want to patch the specific hole that allowed this intruder to gain access. By and large, this approaches the problem from a suboptimal perspective. A far better strategy is to attempt to identify all vulnerabilities and prevent any intruder from gaining access to your systems, rather than focusing on the one vulnerability this particular hacker exploited.

Many of today's security assessment tools will allow you to quickly test and resolve all vulnerabilities.

Return systems to Operation:

If this is the first time you have been attacked, you may find it simpler to forgo trying to pinpoint the intruder or the specific vulnerability that was exploited. In general, it is unlikely that you will be able to easily generate the logs you might need to target the origin of the intrusion.

Patching the vulnerabilities and returning systems to operation as soon as possible is the most straightforward approach. It reduces your risk and allows you to fortify your defences without worrying about the intruder continuing to take advantage of your systems.

Plan ahead:

In many cases, organisations determine their course of action prior to an attack. But in an equal number of cases, organisations must make this their first order of business after an attack. In addition to determining your specific goals after an attack, you should consider executing a disaster recovery plan, if one exists for your organisation. Depending on the severity of the situation, it may make sense to treat the situation as if the data centre had been destroyed.

The one unique complication to activating a disaster recovery plan for an organisation is that it is typically centred on a known event with a known time. But with an intrusion into your network, you may not know exactly when the system was first compromised. This can complicate the recovery process because it may not be clear what set of backups should be restored for each system. Further complicating matters is the fact that some systems may have been compromised before others, so it may be necessary to repeat the restoration process several times while trying to determine when the first intrusion occurred and on which system.

Communicate:

Once you have decided on your approach, you need to communicate to upper management what is happening - or what you suspect is happening. This is perhaps the most difficult step and, because of that, it is one that is often skipped or delayed. But despite the potential for internal political problems, it is important to let business leadership understand what is happening so that everyone can plan for the steps required to resolve the problem. It will also give business leadership an opportunity to reaffirm the goal for problem resolution, whether that goal is to go after the intruder, target the vulnerability, or simply solve the problem as quickly as possible.

You should also communicate with your IT peers about the problem. You need everyone on the team to look for suspicious activity to ensure that the network is not further compromised. To that end, the more professionals involved who are aware of the problem, the more likely it is that nothing will slip through the cracks and be missed.

Conversely, you should not communicate with your users that you have detected an intrusion. An employee may have caused the breach, either by providing a password to a friend with the intention of allowing a breach or through something more innocent. It is a good idea to hold off on notifying employees until the HR department can communicate the company policy along with the message.

Finally, if you have a security infrastructure partner, communicate with it immediately that you have a potential situation. Even if you have only engaged the organisation in the past to perform a security audit, you should call it to indicate that you suspect that you have a problem. The intent here is not at this point to ask for help but rather to inform the partner so that it can be prepared to assist if necessary.

Disconnect:

If you are not planning on attempting to identify the intruder or the vulnerability, you should disconnect the system or the entire internal network from the Internet as soon as possible. This prevents the intruder from working against you as you try to clean up the mess and also prevents further infections or data loss while you work on the systems.

One of the downsides of disconnecting is that people who want to use the system internally and externally will be unable to do so until the problem is resolved. This can exert substantial internal pressure to take shortcuts to get the systems back up again. But the natural desire to reconnect systems before a thorough evaluation of their status has been conducted is ill advised and typically leads to repeated intrusions while the problems with each of the servers are identified and resolved one-by-one.

The decision to disconnect the entire organisation from the Internet or to disconnect just one system or a few systems is a difficult call, particularly in the first five minutes. You will not have had time to evaluate which, if any, other systems have been compromised, so it is possible that removing a single system from the Internet may not resolve the problem. On the other hand, you may want the organisation to continue to function with as little disruption as possible.

Ultimately, the decision comes down to one of risk tolerance. How much risk is the organisation willing to accept to avoid some downtime? In most organisations, the risk of potential intruders greatly outweighs the desire to maintain availability of all systems. In other words, most organisations agree that it is important to disconnect from the Internet immediately so that the systems can be checked for signs of intrusion without the possibility of intruders attempting to cover their tracks.

Conclusion:

The first few minutes after you discover an attack are likely to be stressful and confused, so it's important to have a plan of action in place before it happens. When you realise you've been attacked, make sure you identify your objectives in resolving the situation, communicate the situation promptly to business leadership and peers, and determine whether the problem requires you to disconnect one or more systems from the Internet. Deciding how to react to an attack is tricky, at best. The actions you take (or don't take) can have a huge impact on your organisation - and on your reputation. However, following a plan for controlling the situation can make things less chaotic and start you down the right path to get things back on track.
 
 

Updated: 18-5-2023

 

Saturday, January 1, 2011

Windows® XP File Association Fixes

 
 
The files listed here are all ZIP files, which contain a REG (Registry) file. Download the ZIP and open it. Extract the REG file to your hard disk and double click it. Answer yes to the import prompt. REG files can be viewed in Notepad. Each of the REG files contains the default settings for the file extension indicated. For the ZIP file fix, the download is a REG file, since ZIP's aren't working anyway!

NOTE: If your EXE file associations are corrupted, it can be difficult to open REGEDIT, or to even import REG files. To work around this, press CTRL-ALT-DEL and open Task Manager. Once there, click File, then hold down the CTRL key and click New Task (Run). This will open a Command Prompt window. Enter REGEDIT.EXE and press Enter.


Batch File Association Fix (Restore the default associations for BAT files)
CAB File Association Fix (Restore the default associations for CAB files)
CHM File Association Fix (Restore the default associations for CHM files
COM File Association Fix (Restore the default associations for COM files)
CPL File Association Fix (Restore the default associations for CPL files)
Directory Extension Fix (Restores defaults to HKCR\Directory)
Drive Association Fix (Restores default settings for hard drives)
EML File Association Fix (Restores defaults for EML files)
EXE File Association Fix (Restore default association for EXE files)
Folder Association Fix (Restore default associations for File Folders)
GIF File Association Fix (Restore default associations for GIF Files)
HLP File Association Fix (Restore default associations for HLP files)
HTA File Association Fix (Restore default associations for HTA Files
HTM/HTML Associations (Restore the default associations for htm/html files)
ICO File Association Fix (Restore the default association for ico files)
INF File Association Fix (Restore the default assocation for INF files)
Internet Explorer Desktop Icon Fix (Restore the default behavior for the Desktop IE icon)
JPE/JPG/JPEG Association Fix (Restore the default associations for jpe/jpg/jpeg files)
LNK (Shortcut) File Association Fix (Restores Default Shortcut Behavior)
MPG/MPEG File Association Fix (Restores default associations for MPG/MPEG files)
MSC File Association Fix (Restore default associations for MSC files)
MSI File Association Fix (Restore default associations for MSI files)
MSP File Association Fix (Restore default associations for MSP files)
REG File Association Fix (Restore default associations for REG files)
SCF File Association Fix (Restore default associations for SCF files)
SCR File Association Fix (Restore default associations for SCR files)
TXT File Association Fix (Restore default associations for TXT files)
TIF/TIFF File Association Fix (Restores default associations for TIF/TIFF files)
URL File Association Fix (Restores default associations for URL - Internet shortcuts)
VBS File Association Fix (Restores default associations for VBS files)
ZIP Folder Association Fix (Restores default associations for ZIP Folders - REG File)

 

Updated: 18-5-2023