Windows Repair Toolkit

One of the best tools that is currently freeware, Windows Repair Toolkit truly lives up to its name.   I discovered the Toolkit over at What’s On My PC and have been testing it over the past several weeks.   Deliberately trying to break my computer, infect it and use the Toolkit to ‘fix’ the self-inflicted problems on a test computer.

Always backup your computer and run the software at YOUR OWN RISK.

 “Features:
– Download and run “on-the-fly” the best free portable software when it comes to diagnose and solve several kinds of Windows problems. The tools are categorized by their function, and the program will automatically download the correct version for the Windows edition in which you’re working. When you finish, simply uninstall the tool, and all downloaded software it’s also removed. Or you can choose the portable version of Windows Repair Toolbox, and just run it from a pen drive.

– Ability to select several tools to run successively in unattended mode, in order to perform malware removal, system cleaning and repair, and disk defragmentation. A email letting you know that the automatic repair is complete, and containing the logs, can be sent to you.

– Displays relevant information about the computer to be repaired: CPU temperature, name and % of use; amount of RAM installed on the system and % of use; Disk model, capacity, rotation, SATA version, basic health check; amount of free space left in the system partition; Windows edition and install date; System boot time; boot environment.

– Allows you to add your own favorite tools to the program;

– Allows you change the program icon and title bar text;

– Allows you to perform quality assurance tests after the repair is complete;

– Allows you to save notes about the repair process”

– Provides 1-click access to some useful Windows tools.

This slideshow requires JavaScript.

Advertisements
Posted in computer troubleshooting, Computers, help desk, Information Technology, malware, Microsoft, Microsoft Windows, Microsoft Windows 10, Software, Technology, troubleshooting, Windows, Windows 10, Windows 7, Windows 8 | Leave a comment

Traveling the internet by Obfuscation

Did you know that DNS converts your friendly name that you type into your url into an IP address?  Did you know ultimately that you can travel the internet using the decimal equivalent?

In other words, you can ping the website that your are going to and use the IP address to navigate the internet to that website.  And it can be further broken down to the decimal equivalent to navigate to a website.

CSG Network has a convertor that converts the IP address to a decimal equivalent.

Converted

The Decimal number to a website ….

1 Decimal

Converts to IP address…


2 Converted to IP address

Website is presented to end user…

3 Website

More information on the step by step process 

From and old post

 Obfuscation – There’s more to the internet than you know

Obfuscation = bewilderment, confusion

So how is obfuscation used?   Obfuscation is primarily used today by spammers and hackers and even people who code legitimately.  You see, if you type a simple web address’s friendly name into an address line on a browser, that friendly name understood by humans runs out to your ISPs DNS server.   A DNS server is a server that can change your friendly name into an IP address.

In other words, if we went to WordPress.com the scenario above happens.  When you hit the enter key on your keyboard after entering it into your webbrowser, your request would go to your DNS server; change to an IP address based on records in the server and take you to WordPress.com.

If you ping wordpress, you’ll see one of the IP addresses is  76.74.254.126.  So basically your DNS server will use this number to navigate through the routers on the web and ultimately land on the wordpress servers and return their free blogging site’s homepage to you.

IT personnel use these numbers to program routers and any type of node on a network or on the world wide web.

People don’t realize that the internet is just a little more complex than this simple explanation.  The internet also can use hexadecimals, octal, dotless (or less dot) or other formats.  You have to remember that ultimately computers work off of binary and they can go to websites using these formats because it is how these marvelous electronic devices work.

So what if we wanted to go to WordPress?

Friendly name-

http://www.wordpress.com

IP address-

http://76.74.254.126

How about a little hexadecimal in your diet?

http://%77%6F%72%64%70%72%65%73%73%2E%63%6F%6D

DWord anyone?

http://1279983230

How about that hex address?

http://0x4c.0x4a.0xfe.0x7e

Octal work for ya?

http://0114.0112.0376.0176

So how do you convert to these type of addresses?  Here’s a great link with a web convertor that will do it for you.  I also can’t forget this great tutorial on exactly how it works.

It’s a good thing to understand how this works.  Never click on links that are obfuscated or shortened unless you find out what the links are and where they go.  Don’t be fooled by obfuscation….or should I say don’t be bewildered?


Posted in Technology | Leave a comment

IronWASP – Open Source Advanced Web Security Testing Platform

Do you monitor webservers or other servers that are online and want to test their security?

IronWASP is an open-source system that test web application vulnerabilities.  IronWASP is free and GUI based and allows even novice users to use this powerful scanning engine.   Once the scans take place, it can produce HTML or RTF reports.

The scan engine comes bundled with modules such as CSRF PoF Generator, HAWAS, OWASP, SSL Security Checker, WiHawk (checks Wi-Fi router vulnerabilities), XMLChor, IronSAP and more.

IronWASP runs on Windows, Linux and Apple (Mac).

IronWASP also offers a learning center (Youtube videos).  Sample below of WiHawk.  Go over and check out the learning center.

WiHawk – Wi-Fi Router Vulnerability Scanner.

Sample Scan showing some vulnerabilities –

1 Open      2 Wizaard 3 Scan Process      4 more vulnerabilities

4 vulnerabilities

Posted in Technology | Leave a comment

Microsoft Attack Surface Analyzer -test your system’s security

Microsoft’s Attack Surface Analyzer will take a quick snapshot of your computer’s state before and after the installation of software.   IT Professionals can asses their organization’s applications.  Other IT personnel can use this to look at the risk of software installed.  Be sure to read Microsoft’s overview of this software.

Start

Scanning (baseline)

Scanning

Once this scan is ran, a new scan can be ran to compare the newly installed product changes to your computer.

Start New after Scan

Report Generation

The Report

Report

Report Details

Posted in Technology | Leave a comment

Why Do You Subnet?

Why? The Golden Question

All over the internet you will find information on ‘How to Subnet’.   Suddenly you are thrown into a world of bits and binary and given charts of ‘How to Subnet’.   But why do you subnet?

Subnets are created to separate areas of your network for security and/or to hold down broadcasts.  Computers constantly ‘talk’ to each other.   If you have a network of 10 computers, the talking (opening files or programs) or broadcasting packets that are sent out during networking is not much traffic at all.   However if you have 10,000 computers talking and passing data, you will have thousands of computers passing data and your network will slow down from all of the information.   If you still don’t understand, invite 10 friends over for a get together.  It’ll get noisy but you can still hear every conversation.    Now, go to a rock concert with 10,000 screaming fans.   Get the picture.

Subnetting allows you to divide areas of your network out to prevent this.   So here comes the golden question.  How can you get them to ‘talk’ when you need to?   With the installation of a Layer 3 Switch or a router, these subnets can talk.

And for all of the folks who know a ton of details on the subject, this is just an example for people who are searching why to subnet.

Other Ways to Divide Your Network

Are there other ways to divide your network?  You can use VLANs.  Devices such as switches allow virtual lans to be set up.    By purchasing managed switches, you can separate different areas of your network thus separating areas for security and holding down traffic.

So now I know why – but how and don’t give me binary and all the fuzzy stuff!

The best explaination I have found is at this link.   A simple chart with examples!

Here’s my example –

Subnetting allows your network to become more efficient and allows you to separate your network by subnets.

Let’s say your network is on a 192.168.1.x numbering scheme.

How do you know what your network is?  Open a command prompt and type ipconfig.   See the gateway?  That is your starting number for your network.   The network allows 254 computers to be in the broadcast domain.

So if you do an ipconfig and see this-

192.168.1.125      – your ip address
255.255.255.0    – your current subnet
192.168.1.1           – your gateway (This is your router or firewall – the point leading to the internet)

Now let’s say you have 20 devices in your network.   How can you effectively hold down broadcast and prevent your router from building tables for each device?  How can you make it more effective and hold down traffic?   Actually without understanding binary, you can do this.   Remember this is basics and should help you understand.

You see under the current network, you can have 254 devices in your network.  Printers, routers, computers, tablets, netbooks, notebooks, etc.    The last set of numbers called an octet only goes from 1-254.   But lets narrow this down.

You can use a CIDR calculator online to determine how to tweak your network.   A good site is Subnet Calculator.   Go there and enter your router’s number in the ip field.   Now go down and enter a number close to the number of devices you have on your network.  In this example, enter 30.

Did you see where the subnet changed to 255.255.255.224?    (Did you notice that 224 + 30 is 254?)

Ok, now open your adapter settings by clicking the network icon at the bottom right corner and selecting Open Network and Sharing Center.

Now click on the adapter settings.

Right click and select properties on your adapter that is active.

Now select Internet Protocol v4

Enter an ip address statically (manually put it in).  Put in your new subnet and your gateway.   You must also put in your DNS or a public DNS server.  You should keep a list of each devices number to avoid any problems.  All ip addresses must be different on each device.

The only valid numbers in this broadcast domain now is – 192.168.1.1, 192.168.1.2, 192.168.1.3 continuing until you get to 192.168.1.30 (remember you chose to have up to 30 devices on your network.)  If you enter any number above this, you will get an error.

Error screen showing an ip address above what you selected.

If you get the above error screen, you have entered an invalid number.

After you select a number between 192.168.1.1 and 192.168.1.30, click OK and exit all screens by clicking OK.

If you do an ipconfig now, you will see this-

When you change subnets as the above example shows, you have to remember that you may lose connectivity to devices such as routers or network printers.   You will need to set devices such as servers and these devices on the same subnet so that whoever is assigned this subnet can communicate with them.

This by no means is a thorough subnetting lesson.   It can become much more complex by introducing multiple routers into your network, DHCP servers or other devices.   This is a simple how-to that shows you how broadcast domains can be more efficient.

Now one more thing.  Want to know how to subnet?  You can use the magic number method.

Posted in Technology | Leave a comment

Patch for Server 2003 and XP for WannaCry

A download link from Microsoft for outdated operating Systems such as Windows XP, Server 2003 and Windows 8.

http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598

Posted in ransomware, Technology, Windows, Windows 7, Windows 8, Windows Security, Windows Server | Tagged , , , | Leave a comment

Microsoft Edge Not Working?

Is Edge closing out as soon as you open it?  Is it opening and crashes often?

Here’s how to re-install Edge.

  • Open folder options and go to View
  • Check show hidden files
  • Make sure Edge is closed
  • Navigate to c:\users\yourusername\appdata\local\packages
    • Delete the MicrosoftEdge folder
      • You may have to navigate and delete each folder or some files independently

1

  • Type the following at in PowerShell (Run as an Administrator)
  • Get-AppXPackage -AllUsers -Name Microsoft.MicrosoftEdge | Foreach {Add-AppxPackage -DisableDevelopmentMode -Register “$($_.InstallLocation)\AppXManifest.xml” -Verbose}

PS

 

Posted in Microsoft Windows, Microsoft Windows 10, Technology, Windows, Windows 10, Windows 10 Quick Tips | Tagged , , , , | Leave a comment

How to fix ‘Slow Right Click’ anywhere in Windows 10/8/8.1

Does the Right Click menu takes too long to open? Menus open too slowly? Here’s a simple fix to fix all this issues without any software. Fix Windows 10!

Source: How to fix ‘Slow Right Click’ anywhere in Windows 10/8/8.1

Thanks Aaron!

Posted in Technology | Leave a comment

Rockwell Directory Configuration Wizard Unknown Error 0x80005000

Have the above error?  Copy and paste this in a command prompt as administrator.   This will work a majority of the time.   This configuration error re-registers the dlls that may have issues during or after an upgrade.

cd\
cd\windows\system32
For /F %s in (‘dir /b *.dll’) do regsvr32 /s %s
cd\
cd\Program Files (x86)\Common Files\Rockwell
For /F %s in (‘dir /b *.dll’) do regsvr32 /s %s

pause

Note:  You may have to replace the ‘ symbol with the apostrophe.  Also this often corrects other programs that display this error.

allenbrad

 

Posted in Computer Software, Hardware, Industry, Information Technology, network, Networking, Technology | Tagged , , , , | Leave a comment

Speed up your network by disabling the HomeGroup

While we’ve discussed speeding up SQL connections by disabling LLMNR, there’s another way to speed up your network.

If you are not using the HomeGroup feature, a quick way to speed up your network is to disable the services for HomeGroup.  You can either disable both by using Services.msc or go to a command prompt as an administrator and type the following-

sc config HomeGroupProvider start= disabled
sc stop HomeGroupProvider
sc config HomeGroupListener start= disabled
sc stop HomeGroupListener
pause

Results 

29.6% Increase in Writing
14.6% Increase in Reading

Results with Updated Drivers

46.6% Increase in Writing
54.2% Increase in Reading

Food for thought:

  • Network speed IS DEPENDENT on hard drive speeds
  • Network card optimization (drivers/offloading/type)
  • Bus Speeds
  • Memory Speeds
  • Access Point/Router
  • Other

Before

Before

After disabling services (above)

after

Updated Drivers

With Driver

Posted in Computer hardware, computer troubleshooting, Computers, help desk, Home Networking, Information Technology, Microsoft, Microsoft Windows, Microsoft Windows 10, network, Networking, Technology, Windows, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1, Wireless | Tagged , , | Leave a comment

Bookmark4Techs link updated

Need access to one of the largest listings of technical bookmarks? Go over and visit –

bookmarks4techs_blogger2

https://whatsonmypc.blog/bookmarks4techs/

Posted in Computer Security, computer troubleshooting, Computers, Hardware, Home Networking, Industry, Information Technology, Internet of Things, internet security;, IoT, Linux, Mac, Microsoft, Microsoft Office, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Technology, Windows 10, Windows 7, Windows 8, Windows 8.1, Windows Security | Leave a comment

Windows error code (0xc1900200) – Creators Edition

Recently I was updating our home laptops and experienced Windows error code 0xc1900200.  Apparently the System Reserve partition is not large enough or is ‘too full’ to install the update.   Over at What’s On My PC, Rick experienced the same thing I was experiencing and we both ironically had to install MiniTools Partition Wizard Free in order to install the update by resizing this partition.

Rick’s apparently worked flawlessly as did three of our four installs at home.  However with one Acer laptop that I had upgraded to a SSD drive, the 100mb System Reserve Partition was at the front of my drive in Disk Management and my computer crashed after resizing the partition.

Instead of panicking, I inserted a Windows 10 CD that I had made and did a Startup Recovery (Click Repair once it starts up).  Once I did this, I still had issues – My desktop permissions were not correct.  How did I ultimately fix it?   I set the permissions by navigating to C: drive, users, and found the desktop folder.   The easy fix?   Right click the desktop folder, click the security tab, Advanced and set the permissions.

Note:  Because of the nature of resizing partitions and updating, it is recommended that you backup all of your data and programs.

Posted in Microsoft Windows, Microsoft Windows 10, Technology, Windows 10, Windows 10 Quick Tips | Tagged , , , | 1 Comment

Cyber Summit – Memphis, TN June 2017

Cyber Logo

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions to address today’s challenges in cyber security.

The program will include presentations from the U.S. Department of Homeland Security, Tennessee Department of Safety and Homeland Security, FBI, and private sector cyber security partners. They will address business and industry intrusions, incident handling and response, identifying vulnerabilities, understanding threats, and designing strategies for security. It will be of particular interest for local and state governments, health care, education, transportation, financial institutions, utilities, business, and industry professionals.

This exciting, highly informative conference will be held at the Memphis Cook Convention Center in Memphis, Tennessee, on Tuesday, June 6th and Wednesday, 7th, 2017!  Regular Admission is FREE. Space is limited and available on a first come-first served basis.

Link

Posted in Apple, Business, Computer Security, Education, Hacking, help desk, Information Technology, internet security;, Microsoft, Microsoft Windows, Microsoft Windows 10, Mobile Computing, Networking, ransomware, Technology, Windows, Windows 10, Windows Security, Windows Server, Wireless | Tagged , , , , , , | Leave a comment

Speed up Disk Cleanup loading in Windows

Want to speed up disk cleanup so that it loads quicker?

  • Right Click your C: drive
  • Select properties
  • Hold down the Shift + the Ctrl key
  • Click on Disk Cleanup

Disk Cleanup

Posted in computer troubleshooting, Computers, Microsoft, Microsoft Windows, Microsoft Windows 10, Technology, Windows 10, Windows 10 Quick Tips, Windows 7, Windows 8, Windows 8.1 | Tagged , , , | Leave a comment

2017 Cyber Security Conference – Memphis, TN – June 2017

cyber

The Tennessee Department of Safety & Homeland Security, The Tennessee Fusion Center and Central Service Association are proud to once again bring together individuals from education, government and industry to share in the latest information, strategies, best practices and innovative solutions to address today’s challenges in cyber security.

The program will include presentations from the U.S. Department of Homeland Security, Tennessee Department of Safety and Homeland Security, FBI, and private sector cyber security partners. They will address business and industry intrusions, incident handling and response, identifying vulnerabilities, understanding threats, and designing strategies for security. It will be of particular interest for local and state governments, health care, education, transportation, financial institutions, utilities, business, and industry professionals.

This exciting, highly informative conference will be held at the Memphis Cook Convention Center in Memphis, Tennessee, on Tuesday, June 6th and Wednesday, 7th, 2017!  Regular Admission is FREE. Space is limited and available on a first come-first served basis.

TCAT Shelbyville will be partnering with TCAT Memphis with live hands on demonstrations.

Registration

Posted in Computer Security, Education, Hacking, higher ed, higher education, Information Technology, internet security;, Technology, Windows Security | Tagged , , , , | Leave a comment

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password – Educational Purpose

Educational Purpose-

Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

Source: Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password

https://www.youtube.com/watch?v=oPk5off3yUg

Posted in Technology | Leave a comment

Top Pen Testing ISOs 2017

What’s the top Pen Testing ISOs for 2017?  Here’s my ranking and download links.

  1. Kali Linux – https://www.kali.org/downloads/
  2. Backbox – http://www.backbox.org/downloads
  3. Cyborg Hawk – http://sourceforge.net/projects/cyborghawk1/files/latest/download
  4. Parrot Sec – http://www.parrotsec.org/download/
  5. Deft – http://www.deftlinux.net/download/
  6. Live Hacking OS – http://www.livehacking.com/live-hacking-cd/d
  7. Samurai – http://sourceforge.net/projects/samurai/files/
  8. Network Security Toolkit – http://sourceforge.net/projects/nst/
  9. PenToo – http://www.pentoo.ch/download/
  10. Knoppix (Security Testing Distribution) – http://s-t-d.org/download.html
  11. Weakerth4n – https://goo.gl/UJFfak
Posted in Computer Security, Computer Software, computer troubleshooting, Computers, Education, Free Software, Hacking, higher ed, higher education, Information Technology, Internet of Things, Linux, Mac, Networking, Software, Technology, Windows, Windows 10, Windows Security | Tagged , , , , , , , , , , , | Leave a comment

Jumbo Frames

TCAT Shelbyville - Technical Blog

In a gigabit network, you should enable jumbo frames and tweak the jumbo frame settings on your nic so that large files can transfer at greater speeds.  In a packet of data, the header will remain the same but the payload size will increase.  You should do this if you have gigabit switches and gigabit cards in place.  Normally network cards will allow for tweaks of the Jumbo frame by several MTUs.   With gigabit switches in place, the receiving switches may be 10/100 and the computer on the other end will not see a great benefit from this.  However if you have cards in computers that are connected to a switch (1000 mbps/1 Gbps)  and a NAS that supports Jumbo frames, the data transfer from these computers (normally a Server) will benefit from this tweak.

Ideally you would want your entire network on gigabit.   In today’s economy,  many if not most…

View original post 44 more words

Posted in Technology | Leave a comment

Don’t daisy chain switches

TCAT Shelbyville - Technical Blog

When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry.  Replace any hubs on your network as soon as you can.

With a hub, collisions can be >20% and utilization can stand at >50%.   By replacing a hub alone, you can reduce collisions to 5% on switches in rooms and <1% in the server room.  Switches help to isolate traffic, relieve congestion, separate collision domains (reduce collisions), segment and restart distance/repeater rules.

Daisy Chaining Switches -what not to do

Real world scenarios may require you to temporarily daisy chain switches.  If you do, test the network and run additional backbones or replace core switches to accommodate more nodes as soon as you can. (remember, replace any hubs in your network)

Daisy chaining

One of many solutions is to run independent lines…

View original post 102 more words

Posted in Technology | Leave a comment

Cannot access computer by NetBios name after replacing NIC card

TCAT Shelbyville - Technical Blog

If you have ever replaced a network card on a server or computer and you can no longer access the computer, you should flush any cache on the workstation that is accessing the server.

Insure no other users are logged in –

Open a Command Prompt as an Administrator (Type CMD in the search box)

ipconfig /flushdns

ipconfig /registerdns

nbtstat –s

nbtstat -r

nbtstat –c

nbtstat –R

nbtstat -RR

nbtstat –n

nbtstat -a xxx.xxx.xxx.xxx      (replace the x’s with the IP address of the computer you are accessing – the computer with the new NIC card)

Also insure the NetBIOS over TCP/IP radio button is selected. (See Below)

To enable NetBIOS over TCP/IP on Windows 7 or Server 2008 R2:

  1. Click Start, and then click Network. (click Start, type ncpa.cpl into the search box for Windows 7 or Vista, hit ENTER).
  2. Click on the Network and Sharing…

View original post 45 more words

Posted in Technology | Leave a comment