Tag: Windows

McAfee Agent cannot be removed while it is in managed mode

Problem: The following message displays when select Remove for the McAfee Agent through Add \ Remove Programs or Programs and Features on client computers:

McAfee Agent cannot be removed while it is in managed mode”



Solution:

The computer must be removed from Managed Mode

  1. Steps:
    1-
    Open Command Prompt
    2- Go to the folder” C:\Program Files (x86)\McAfee\Common Framework” on X64 systems,” C:\Program Files\McAfee\Common Framework” on X86 systems
    3- Type “frminst.exe /forceuninstall” and press enter.
    command without quotes


 source: McAfee

Microsoft Names Satya Nadella Its New CEO

Microsoft Names Satya Nadella Its New CEO:

Microsoft Corp.  Announced that its Board of Directors has appointed Satya Nadella as Chief Executive Officer and a member of the Board of Directors effective immediately.  Before being named CEO in February 2014, Nadella held leadership roles in both enterprise and consumer businesses across the company.

Satya Nadella

Joining Microsoft in 1992, he quickly became known as a leader who could span a breadth of technologies and businesses to transform some of Microsoft’s biggest product offerings.

Most recently, Nadella was executive vice president of Microsoft’s Cloud and Enterprise group. In this role he led the transformation to the cloud infrastructure and services business, which outperformed the market and took share from the competition. Previously, Nadella led R&D for the Online Services Division and was vice president of the Microsoft Business Division. Before joining Microsoft, Nadella was a member of the technology staff at Sun Microsystems.

Satya

Originally from Hyderabad, India, Nadella lives in Bellevue, Wash. He earned a bachelor’s degree in electrical engineering from Mangalore University, a master’s degree in computer science from the University of Wisconsin – Milwaukee and a master’s degree in business administration from the University of Chicago. He is married and has three children.

“During this time of transformation, there is no better person to lead Microsoft than Satya Nadella,” said Bill Gates, Microsoft’s Founder and Member of the Board of Directors. “Satya is a proven leader with hard-core engineering skills, business vision and the ability to bring people together. His vision for how technology will be used and experienced around the world is exactly what Microsoft needs as the company enters its next chapter of expanded product innovation and growth.”

Since joining the company in 1992, Nadella has spearheaded major strategies and technical shifts across the company’s portfolio of products and services, most notably the company’s move to the cloud and the development of one of the largest cloud infrastructures in the world supporting Bing, Xbox, Office and other services. During his tenure overseeing Microsoft’s Server and Tools Business, the division outperformed the market and took share from competitors.

all

Microsoft is one of those rare companies to have truly revolutionized the world through technology, and I couldn’t be more honoured to have been chosen to lead the company,” Nadella said. “The opportunity ahead for Microsoft is vast, but to seize it, we must focus clearly, move faster and continue to transform. A big part of my job is to accelerate our ability to bring innovative products to our customers more quickly.”

“Having worked with him for more than 20 years, I know that Satya is the right leader at the right time for Microsoft,” said Steve Ballmer, who announced on Aug. 23, 2013 that he would retire once a successor was named. “I’ve had the distinct privilege of working with the most talented employees and senior leadership team in the industry, and I know their passion and hunger for greatness will only grow stronger under Satya’s leadership.”

Microsoft also announced that Bill Gates, previously Chairman of the Board of Directors, will assume a new role on the Board as Founder and Technology Advisor, and will devote more time to the company, supporting Nadella in shaping technology and product direction. John Thompson, lead independent director for the Board of Directors, will assume the role of Chairman of the Board of Directors and remain an independent director on the Board.

Nadella addressed customers and partners for the first time as CEO during a Customer and Partner Webcast event.

https://az169342.vo.msecnd.net/events/2014/1402/PublicEvent/media/Customer_Partner_Webcast_1000k.mp4

How peoples’ lives are changed through Microsoft technology with a Super Bowl ad. This one-minute ad celebrates what technology can do, and is narrated by Steve Gleason, former NFL player and post-Katrina hero of the New Orleans Saints, now living with ALS. Steve narrates the spot in the same way he communicates daily — using his Surface Pro to speak, via eye tracking technology

Source: Microsoft

McAfee ePO SQL credentials lost

McAfee ePO SQL credentials lost:

While I was searching for the solution what if I lost McAfee ePO admin password and there were no additional accounts configured, some of the blogs on the internet mentioned that go to https://ServerName:8443/core/config and reset the ‘Admin’ password. This is not the correct solution to reset the ‘Admin’ password.

https://ServerName:8443/core/config is useful to reset the SQL credentials for connecting McAfee ePO 4.x and 5.x to the database. 

Step- by-step procedure to reset the SQL credentials:

Open a web browser and go to https://localhost:8443/core/config-auth
(Where 8443 is the port for the console communication) (see
Image-1)

Image- 1
Image- 1

Log on with ePO credentials. ( See Image-2)

Image- 2
Image- 2

Type ‘sa’ in the User name field. Click on the change password.

For a minute minimize this window and go startà All Programs à MS SQL Server 2008R2 àclick on SQL Server Management Studio, below is shown window will appear ( see Image-3)

Authentication, select ‘Windows Authentication’, click Connect

Image-3
Image-3

Expand SecurityLogins and double-click the ‘sa’ account (or) right click on ‘sa’ click on ‘Properties (see Image-4)

Image-4
Image-4

Type and confirm a password in the General tab under Login name section. 

Click on ‘OK’

Open McAfee ePO web console window (see Image-2)

Type ‘sa’ in the User name field. Click on the change password.

Type the password for ‘sa’ account into the User password and Confirm password fields.

Click Test Connection.

Click Apply, if the test is successful.

Below is shown window will open (see Image-5), restart the McAfee ePO server.

Image- 5
Image- 5

That’s it.

 Happy computing!!

 IMPORTANT: Please follow the same sequence above mentioned. After changing the SQL password if you try to open the ePO web console https://ServerName:8443/core/config it won’t open at all. Even though if you lost the SQL password, still you can open the McAfee web console https://ServerName:8443/core/config, then follow the steps in same sequence.

Source: McAfee

Secret Partition on a Pen Drive

Secret Partition on a Pen Drive:

There is no simple way to partition USB pen drives, as they show up as a removable drive on the PC. In order to do so, you need to trick the operating system into recognizing the USB pen drive as a fixed hard drive. To do this, you need to create your own set of drivers. Doing so, you can create multiple partitions and store your private data on it. Only the first partition will be visible and the other partitions will not show up on any PC other than your own. In this way, you can secretly store your personal data away from your friends and family, and also you can avoid viruses affecting this data when plugged in on another computer. To do this, all you need is a simple universal USB pen drive driver, which can be downloaded from 

http://www.mediafire.com/?oqlgdvcymzz

Download the archive, uncompress it to a folder on your Desktop and get started. Don’t forget to backup the contents of your pen drive as it will be formatted.

flash drive

Step 1: Plug your pen drive into your PC’s USB port. Next, right-click on ‘My Computer’ and click on ‘Manage’ in the context menu. Click on ‘Device Manager’ on the left pane. This will show all your hardware devices connected to your PC. Now on the right pane, scroll down to ‘Disk Drives’ and you should see your pen drive connected here. Right-click on the pen drive and select ‘Properties’.

Image-1

Image-2

Step 2: In the properties window that just opened up, click on the ‘Details’ tab. From the scroll down menu under ‘Property’, choose ‘Device Instance Path’. You should see a string of characters highlighted in the ‘Value’ window below, which should read something like ‘USBSTOR\DISK&VEN_&PROD……Right‑click on this value and select ‘Copy’. Now close all the windows without saving changes.

Image-3

Step 3: Now open the folder that you uncompressed after downloading the universal USB flash drive driver. In this folder, find and open the file named ‘cfadisk.inf’ in ‘Notepad’ or any test editor you prefer (Notepad++ is ideal. Download from notepad-plus-plus.org).

 Step 4: Now locate the words ‘device_instance_id_goes_here’, which is available at line 26. You need to replace these words with the string you just copied to the clipboard from the Device Manager. Save the file and close the editor.

 Step 5: Now go back to the ‘Device Manager’ page (repeat step 1). This time, click on the ‘Driver’ tab and click the button ‘Update driver’.

Image-4

Step 6: On the next window, choose ‘Browse my computer for driver software’ when the system asks how you want to search for the driver software. Then on the next window, choose ‘Let me pick from a list of drivers…. ‘.

Image-5

Image-6

 Step 7: On the next window, un check the box ‘Show compatible hardware’ and click on the ‘Have disk button’. Now click on ‘Browse’ and from the universal USB driver folder on your Desktop, select the ‘cfadisk.inf’ file and click on the ‘Open button’, followed by the ‘OK’ and then ‘Next’ buttons on the previous windows.

 Step 8: An update driver warning message should show up stating that you are trying to install a driver which is not compatible with your hardware. Ignore the message and click on ‘Yes’. Don’t worry; it is safe to do so. The system will start installing the driver and show up another warning that the driver is not a verified or authentic driver. Ignore this one too and click on ‘Install this driver software anyway’. Let the system update the driver and you will receive a message of a successful driver update.

Image-7

Note: you can use this modified driver for this pen drive only. To use another pen drive, you will need to perform the whole process again.

 Step 9: That’s all you needed to do. Once you are back to the ‘Computer Management’ window, click on ‘Disk Management’ from the left pane and start partitioning your pen drive as you would with a regular hard drive. You can create multiple partitions.

Image-8

Note: You can access all the partitions on the pen drive only from your PC (see Figure-9) Other PCs will only be able to see the first partition (see Figure-10). Make a copy of the driver on the first partition of the pen drive and you can install it on other PCs in case you need to access the other partitions. In this way, you can plug in the pen drive on a shared PC without allowing access to your data. Others won’t know that the other partition even exists another. To reset everything back to normal, simply delete the partitions and uninstall / delete the driver for the pen drive from the Device Manager.

Image-9
Image-9
Image-10
Image-10

source: tech2, chip

A handy, portable system information tools

A handy, portable system information tools:

Speccy:

Speccy is an advanced System Information tool for your PC. Need to find out what’s inside your computer? Speccy will give you all the information you need.

Speccy gives you detailed statistics on every piece of hardware in your computer, including CPU, Motherboard, RAM, Graphics Cards, Hard Disks, Optical Drives, and Audio support. Additionally Speccy adds the temperatures of your different components, so you can easily see if there’s a problem!

Speccy may seem like an application for system administrators and power users. It certainly is, but Speccy can also help normal users, in everyday computing life.

If you need to add more memory to your system, for example, you can check how many memory slots your computer has and what memory’s already installed. Then you can go out and buy the right type of memory to add on or replace what you’ve already got.

Note: Speccy requires Windows XP or later, and does not currently support Mac OS X or Linux.

To download the Speccy click on the URLhttp://www.piriform.com/speccy/download/standard

CPU-Z:

CPU-Z is a freeware utility that gathers information on some of the main devices of your system. CPU-Z does not need to be installed, just unzip the files in a directory and run the .exe. In order to remove the program, just delete the files. The program does not copy any file in any Windows directory, nor write to the registry.

CPU

  • Name and number.
  • Core stepping and process.
  • Package.
  • Core voltage.
  • Internal and external clocks, clock multiplier.
  • Supported instructions sets.
  • All cache levels (location, size, speed, technology)

Mainboard

  • Vendor, model and revision.
  • BIOS model and date.
  • Chipset (northbridge and southbridge) and sensor.
  • Graphic interface.

Memory

  • Frequency and timings.
  • Module(s) specification using SPD (Serial Presence Detect): vendor, serial number, timings table.

System

  • Windows and Direct X version.

To download the CPU-Z  click on the URL:  http://www.cpuid.com/softwares/cpu-z.html

source: piriform,cpuid

Tips for speeding up a slow PC

Tips for speeding up a slow PC:

Over the time, the speed of computers can decrease. This appears as the system taking more time to respond to a user’s actions like opening files, folders, surfing the Internet and other tasks. Here are a few steps which are helpful to make your machine (especially Windows machines) run faster.

Clean up the Desktop: 

Each time Windows starts; operating memory is used to open your profile. The total amount of memory used will be small. If however, there are several or dozens of files on the Desktop lot of operating memory is used by these files, essentially for no purpose or gain. With less memory available, the computer runs slower because it has to swap out information from operating memory to the hard drive. It does this process (called memory paging) to keep everything the user wants to do running at the same time.

The simple action of cleaning the Desktop will make your computer run faster.

Clean up the disk and registry:

One of the first things to check on a machine that’s running slowly is how much of the hard disk has been used. If there isn’t roughly 10% of the hard disk free, it’s time to clean the HDD. One of the tools I like is CCleaner. It quickly clears out all temp files for you. 

Remove Spyware/Malware:

One of the most common causes of the “my PC used to be fast, and now it isn’t!” complaint is actually the presence of malware. Malware can sneak onto a computer in a zillion different ways and quite often it sits in the background slowing your machine as it sends out spam emails, searches for other computers to infect, works on cracking cryptography, or performs any number of the other nefarious tasks that hackers like to use their botnet slaves for.

Try a different browser:

Different browsers perform differently, and most people spend a lot of time on their Web browser. Some browsers perform well on some but poorly on others, even when they are supposed to test the same thing. The problem with the benchmarks is that what they usually test is not real work performance! While JavaScript is an important part of the modern Web, few Web applications beat on the JavaScript engine hard enough to produce a noticeable impact on performance. If you want to have your Web browser feel more responsive and lively, consider a switch to Chrome.

Add a faster DNS lookup Server:

Most ISPs love to brag about how much bandwidth they are giving you. But they don’t mind letting the rest of their infrastructure slowly get overwhelmed or deteriorate. Among the biggest offenders are the DNS servers our ISPs use. If you want to know why things seem to take forever to start loading, slow DNS servers are often the cause. Consider adding a fast DNS server as your primary DNS server in your TCP/IP settings. Google’s Public DNS server is a great option.

Defragmentation:

Defragmentation is the process of physically organizing the contents of the mass storage device used to store files in to the smallest number of contiguous regions.

Visualization of fragmentation and then of defragmentation

Defragmentation places all parts of a file together in the same place on the drive. It organizes all directories and files according to how you use your computer. After this process is complete, your computer will most likely run faster.

Following precautions should be taken before doing defragmentation:

 Make sure your data is backed up to another medium like pen drive, DVD or external HDD.

 Close all the running programs including virus scanner.

 Assure your computer has a constant source of power.  If you have frequent power outages, you should not use a defragmentation program without a battery backup. Note: If your computer does shut off while defragmenting, it may crash the hard drive or corrupt the operating system, or both.

Steps for Defragmentation:    
  1. Open My Computer.
  2. Right-click the local disk volume that you want to defragment, and then click Properties.
  3. On the Tools tab, click Defragment Now.
  4. Click Defragment.

Improve Your Hardware:

If your computer is slow, it may be because your hardware isn’t getting the job done. How will you find that out? By using the Windows Experience Index, found in Windows Vista and Windows 7. This will show you where your computer is weak, and what you would need to beef up to turn your PC into a screamer.

Go to Start –> Control Panel — > System and Security –> under System click on Check the Windows Experience Index

Use ReadyBoost:

You can speed up the computer with a flash drive. Through the magic of a Windows technology called ReadyBoost, your PC can see a real speed increase. It’s a little-known Windows secret that can help you zip on down the Information Superhighway, or make whatever you’re doing faster.

Note:  ReadyBoost is available in Windows Vista, and Windows 7 Operating Systems.

source: about.com, Wikipedia, Techrepublic,

The complete list of Windows 7 Logo key shortcuts:

The complete list of Windows 7 Logo key shortcuts:

One of the more powerful, and probably least used, sets of keyboard shortcuts relies on the Windows Logo key, which is common on most keyboards packaged with a Windows-based personal computer. The following list includes all the shortcuts that use the Windows Logo key and explains what each one does. Take a good look because one or two of these shortcuts may make your computing life just a little more efficient.

The shortcuts:

Note: Click graphic to enlarge (Please click twice on image)

source: Microsoft,TechRepublic

Pwnium: rewards for exploits

Google’s Giving $60,000 to Whoever Can Exploit Chrome :

Google has offered prizes, totalling $1 million, to those who successfully hack the Google Chrome browser at the Pwn2Own hacker contest taking place today i.e. 7March 2012. Chrome is the only browser in the contest’s six year history to not be exploited like at all. 

Therefore Google will hand out prizes of $60,000, $40,000, and $20,000 for contestants able to remotely commandeer a fully-patched browser running on Windows 7. Finding a “Full Chrome Exploit,” obtaining user account persistence using only bugs in the browser itself will net the $60k prize. Using webkits, flash, or a driver-based exploit can only earn the lesser amounts.

Prizes will be awarded on a first-come-first-serve basis, until the entire $1 million has been claimed. While we’re proud of Chrome’s leading track record in past competitions, the fact is that not receiving exploits means that it’s harder to learn and improve,” said Chris Evans and Justin Schuh, members of the Google Chrome security team. 

To maximize our chances of receiving exploits this year, we’ve upped the ante. We will directly sponsor up to $1 million worth of rewards.”  Pwn2Own isn’t the only time researchers can be paid for digging up security flaws in Chrome. Like other companies including Mozilla and Facebook, Google offers “bug bounties” to researchers, and its flaw-buying program has given out more than $300,000 in payments over the last two years.

source:thehackernews,blog.chromium

Windows XP default wallpaper

Ever wonder where the Windows XP default wallpaper came from?

One of the most famous wallpaper images is undoubtedly the default Windows XP image, showing a blissfully relaxing vista of green rolling hills and a bluer than blue sky. The wallpaper, probably one of the most viewed images of all time, is aptly named ‘Bliss.’ Do a Google image search for just the word ‘bliss,’ and the first result is the Windows wallpaper.

Bliss as seen in a clean Windows XP desktop

Have you ever stopped to wonder where the image was taken, or who took it? In fact, the image is so crisp you might have assumed it wasn’t real at all.

‘Bliss’ is the name of a Windows bitmap image included with Microsoft Windows XP, produced from a photograph of a landscape in Sonoma County, California, southeast of Sonoma Valley near the site of the old Clover Stornetta Inc. Dairy.

The man behind the camera is American photographer Charles O’Rear (born 1941)

The photo was taken in 1996, years before Windows XP launched, and before the area was converted into a vineyard. In fact, a photo taken 10 years later from exactly the same spot where Bliss was shot, shows a disappointingly, dreary view:

The same location November 2006

So how much did O’Rear get for taking what is considered one of the most famous photos of all time? A non-disclosure agreement prevents him from revealing the actual figure, but according to Napa Valley Register, O’Rear stated that it was:

“extraordinary” and second only to that paid to another living, working photographer for the photo of then-President Bill Clinton hugging Monica Lewinsky.

Taken with a medium format camera, the most surprising fact about the image is that O’Rear claims that it wasn’t digitally manipulated.

Source: wikipediathenextweb