5 Threats of Endpoint devices

Decades ago, discussions about securing the enterprise were limited to the almost benign topics of virus tainted email attachments and the benefits of power-on passwords. Today, the landscape has morphed into a virtual minefield of potential vulnerabilities, thanks in part to the endpoint devices that connect organizations to the Internet.

Endpoint devices include everything from computers and servers to routers and switches – each an attractive gateway for possible intruders.

Let’s examine the top endpoint threats:

Read more

SharePoint Event

Check out this free SharePoint event in Minnesota. Twin Cities SharePoint Saturday IV on March 20, 2010 The 4th Biannual Twin Cities SharePoint Saturday! (Formerly known as the Twin Cities SharePoint Camp.)  Spend a day with other SharePoint Administrators, Developers and End Users and come away with tips, tricks and a richer understanding of how … Read more

Can’t find Scanpst.exe file!

I have run into the issue of not being able to find the Scanpst.exe file where it should be. I even had show hidden files olders and show system files turned on. I did a search and still could not find it. This file typically would be in one of two locations:

  • First: C:\Program Files\Microsoft Office\Office12\
  • Second: C:\Program Files\Common Files\System\MSMAPI\1033\

Read more

Install Google Chrome in Program Files

 

We recently had a client that required Google Chrome for a web based app. Google Chrome is easy to download and install. Pretty straight forward and easy enough right? Wrong. Google Chrome installs in

  • Win Vista/7 – C:\Users\%username%\AppData\Local\Google\Chrome\
  • Win Xp – C:\Documents and Settings\%username%\Local Settings\Application Data\Google\Chrome\

by default. You would think Google would install it to Program Files by default like other applications but it does not.

Read more

GPO disabling a Windows service

Recently I had a virtual machine that would not obtain an IP from DHCP. I noticed the DHCP client service was disabled in windows services. I would enable it, start it and it would start just fine. I would then reboot the VM. The DHCP client service would be disabled again. I had a feeling … Read more

Show hidden devices in Windows

Have you ever had devices that where stuck on your system and you needed to remove them. For example someone removed a physical network card from the system without uninstalling it first from the OS. This can be a problem if that network card had a static IP assigned to it. Once you add a new network card using the same static IP that was assigned to the previous network card it will give you an error.

If this were to happen normally you would go to device manager and simply uninstall the device. Well what if they don’t display? That means they are hidden. It is a good thing there is a way to un-hide them so you can uninstall them.

I have created a batch file that contains this:

Read more

Analyze a Trend Micro HijackThis log

 

Trend Micro HijackThis is a free utility that generates an in depth report of registry and file settings from your computer. This tool can help you detect spyware and viruses. Do not use this tool alone. Use this tool along with other spyware and virus removal tools.

Download it here:Trend Micro Hijackthis tool 

So now you have generated a log file using Trend Micro HijackThis. Here is a website that you can upload the log file on to Analyze it.

Read more