Wednesday 28 March 2012

Batch Files



I still remember when the computers entered to our Department during the early 90s, the local computer technician used to install Windows operating system as and when required and used to charge an amount of Rs 250 per installation. He was dare enough to give a bill with description that “installation of Windows” The OS CD supplied along with computer was somewhere in the cupboard and we were not aware of the CD supplied was a licensed version. The guy always used the pirated CD!

One of the DOS program which was the main program used then was opening in the directory in which it was installed and not opening in any other directory we wanted. Then we had to beg him for the remedy. He was doing something to make that DOS software functioning in any directory.

It took me a few months to detect what exactly he was doing. He was creating one bat file or precisely saying, he was editing the Autoexec.bat file. But he never revealed the secret he was doing.

What is Bat or Batch file?

In DOS and Windows, batch file is the name given to a type of script file, a text file with filename extension .bat containing a series of commands to be executed by the command interpreter.

Batch files are used to ease the work required for certain regular tasks by allowing the user to set up a script to automate them. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line.

Variants
Brief information on the function and parameters of commands are usually displayed by typing the command at the command prompt followed by "/?" and pressing the Enter key. In some cases "-?", "?", or just the command name without parameters (if parameters are required) will also elicit information.

DOS
In MS-DOS, a batch file can be started from the command line by typing its name followed by any required parameters and pressing the "enter" key. When MS-DOS loads, the file AUTOEXEC.BAT is automatically executed, so any commands that need to be run to set up the MS-DOS environment for use could be placed in this file. Computer users would have the autoexec file set up the system date and time, initialize the MS-DOS environment, load any resident programs or device drivers, or initialize network connections and assignments.

In MS-DOS, the extension ".BAT" identified a file containing commands which could be executed by the command interpreter COMMAND.COM line by line as if it was a list of commands to be entered, with some extra batch-file-specific commands for basic programming functionality, including a GOTO command for changing flow of line execution.

Windows
Microsoft Windows was introduced in 1985 as a GUI Operating System alternative to text-based operating and was designed to run on MS-DOS. In order to start it the WIN command was used and could be added to the end of the AUTOEXEC.BAT file to allow automatic loading of Windows. In the earlier versions one could run a .bat type file from Windows in the MS-DOS Prompt.

Example
This example batch file displays "Hello World!", prompts and waits for the user to press a key, and terminates.

@ECHO off
ECHO Hello World!
PAUSE
To execute the file it must be saved with the extension .bat (or .cmd for Windows-NT type operating systems) in plain text format, typically created by using a text editor such as Notepad or a word processor in text mode.

Result
When executed (either from Windows Explorer or Command Prompt) this is displayed:

Hello World!
Press any key to continue . . .
Explanation
The interpreter executes each line in turn, starting with the first. The @ symbol at the start of the line turns off the prompt from displaying that command. The command ECHO off turns off the prompt permanently, or until it is turned on again. Then the next line is executed, the ECHO Hello World! command outputs Hello World!, as only off and on have special functions. Then the next line is executed, the PAUSE command displays Press any key to continue . . . and pauses the script's execution until a key is pressed, when the script terminates as there are no more commands. In Windows, if the script is run within a Command Prompt window, the window remains open at the prompt as in MS-DOS, otherwise the command prompt windows closes on termination (unless the batch file has a command to prevent this).


Create a BAT File
Create a new text document on your desktop. Double click the file – it should be blank inside. Now, go to file>save as, and in the “Save As” window, input a name for your BAT file and then add a “.bat” on the end (without the quotes). For example: Shiva.bat

If you know how to run commands in the command prompt, you’ll be a wiz at creating BAT files because it’s the same language. All you’re doing is telling the command prompt what you want to put in through a file, rather than typing it every time you run the command prompt. This saves you time and effort; but it also allows you to put in some logic (like simple loops, conditional statements, etc. that procedural programming is capable of conceptually).

There are SEVEN simple commands. These are NOT case sensitive.

TITLE - The Window name for the BAT file.

ECHO - The “print” statement for BAT files. Anything following the word ECHO will be displayed in the command prompt as text, on its own line.

ECHO OFF – BAT writers typically put this at the beginning of their files. It means that the program won’t show the command that you told it to run while it’s running – it’ll just run the command.

PAUSE - This outputs the “press any key to continue…” message that you’ve seen all too many times. It’s helpful because it pauses the BAT file execution until the user tells it to go again. If you don’t put this in your program, everything will speed by and end before you can see it. People typically put this in BAT files to give the user a chance to review the material on the screen before continuing.

CLS - Clears the DOS window.


IPCONFIG – Outputs a lot of network information into DOS window.

PING - Pings an IP, letting you know if your computer was able to contact it. This command also returns the latency (ping time) and by default pings three times.

Write Your BAT File
Right click your BAT file and click “edit” to bring up Notepad. The whole document should be blank – ready for some epic programmer input.

ECHO OFF
ECHO Network Information for SA

IPCONFIG /ALL
PAUSE
PING www.google.com
ECHO All done pinging Google.
PAUSE


Run Your BAT File
Save the file and double click it. Your output should be something like the screenshot below.


Advanced Windows batch example - conditional shutdown

@echo off
color 0A
title Conditional Shutdown
 
:start
echo What would you like to do?
echo.
echo 1. Shutdown in specified time
echo 2. Shutdown now
echo 3. Restart now
echo 4. Log off now
echo 5. Hibernate now
echo.
echo 0. Quit
echo.

set /p choice="Enter your choice: "
if %choice%==1 goto shutdown
if %choice%==2 shutdown -s -f
if %choice%==3 shutdown -r -f
if %choice%==4 shutdown -l -f
if %choice%==5 shutdown -h -f
if %choice%==0 exit
echo Invalid choice: %choice%
echo.
pause
cls
goto start

:shutdown
cls
set /p sec="Minutes until shutdown: "
set /a min=60*%sec%
shutdown -s -f -t %min%
echo Shutdown initiated at %time%
echo.
set /p cancel="Type cancel to stop shutdown "
if %cancel%==cancel shutdown -a
if %cancel%==cancel cls
if %cancel%==cancel echo Shutdown is cancelled.
if %cancel%==cancel echo.
if %cancel%==cancel pause
if %cancel%==cancel exit
An A-Z Index of the Windows CMD command line
   ADDUSERS Add or list users to/from a CSV file
   ADmodcmd Active Directory Bulk Modify
   ARP      Address Resolution Protocol
   ASSOC    Change file extension associations•
   ASSOCIAT One step file association
   ATTRIB   Change file attributes
b
   BCDBOOT  Create or repair a system partition
   BOOTCFG  Edit Windows boot settings
   BROWSTAT Get domain, browser and PDC info
c
   CACLS    Change file permissions
   CALL     Call one batch program from another•
   CD       Change Directory - move to a specific Folder•
   CHANGE   Change Terminal Server Session properties
   CHKDSK   Check Disk - check and repair disk problems
   CHKNTFS  Check the NTFS file system
   CHOICE   Accept keyboard input to a batch file
   CIPHER   Encrypt or Decrypt files/folders
   CleanMgr Automated cleanup of Temp files, recycle bin
   CLEARMEM Clear memory leaks
   CLIP     Copy STDIN to the Windows clipboard.
   CLS      Clear the screen•
   CLUSTER  Windows Clustering
   CMD      Start a new CMD shell
   CMDKEY   Manage stored usernames/passwords
   COLOR    Change colors of the CMD window•
   COMP     Compare the contents of two files or sets of files
   COMPACT  Compress files or folders on an NTFS partition
   COMPRESS Compress individual files on an NTFS partition
   CON2PRT  Connect or disconnect a Printer
   CONVERT  Convert a FAT drive to NTFS.
   COPY     Copy one or more files to another location•
   CSCcmd   Client-side caching (Offline Files)
   CSVDE    Import or Export Active Directory data
d
   DATE     Display or set the date•
   DEFRAG   Defragment hard drive
   DEL      Delete one or more files•
   DELPROF  Delete user profiles
   DELTREE  Delete a folder and all subfolders
   DevCon   Device Manager Command Line Utility
   DIR      Display a list of files and folders•
   DIRUSE   Display disk usage
   DISKPART Disk Administration
   DNSSTAT  DNS Statistics
   DOSKEY   Edit command line, recall commands, and create macros
   DSACLs   Active Directory ACLs
   DSAdd    Add items to active directory (user group computer)
   DSGet    View items in active directory (user group computer)
   DSQuery  Search for items in active directory (user group computer)
   DSMod    Modify items in active directory (user group computer)
   DSMove   Move an Active directory Object
   DSRM     Remove items from Active Directory
e
   ECHO     Display message on screen•
   ENDLOCAL End localisation of environment changes in a batch file•
   ERASE    Delete one or more files•
   EVENTCREATE Add a message to the Windows event log
   EXIT     Quit the current script/routine and set an errorlevel•
   EXPAND   Uncompress files
   EXTRACT  Uncompress CAB files
f
   FC       Compare two files
   FIND     Search for a text string in a file
   FINDSTR  Search for strings in files
   FOR /F   Loop command: against a set of files•
   FOR /F   Loop command: against the results of another command•
   FOR      Loop command: all options Files, Directory, List•
   FORFILES Batch process multiple files
   FORMAT   Format a disk
   FREEDISK Check free disk space (in bytes)
   FSUTIL   File and Volume utilities
   FTP      File Transfer Protocol
   FTYPE    Display or modify file types used in file extension associations•
g
   GLOBAL   Display membership of global groups
   GOTO     Direct a batch program to jump to a labelled line•
   GPRESULT Display Resultant Set of Policy information
   GPUPDATE Update Group Policy settings
h
   HELP     Online Help
i
   iCACLS   Change file and folder permissions
   IF       Conditionally perform a command•
   IFMEMBER Is the current user a member of a Workgroup
   IPCONFIG Configure IP
k
   KILL     Remove a program from memory
l
   LABEL    Edit a disk label
   LOCAL    Display membership of local groups
   LOGEVENT Write text to the event viewer
   LOGMAN   Manage Performance Monitor
   LOGOFF   Log a user off
   LOGTIME  Log the date and time in a file
m
   MAPISEND Send email from the command line
   MBSAcli  Baseline Security Analyzer.
   MEM      Display memory usage
   MD       Create new folders•
   MKLINK   Create a symbolic link (linkd)
   MODE     Configure a system device
   MORE     Display output, one screen at a time
   MOUNTVOL Manage a volume mount point
   MOVE     Move files from one folder to another•
   MOVEUSER Move a user from one domain to another
   MSG      Send a message
   MSIEXEC  Microsoft Windows Installer
   MSINFO32 System Information
   MSTSC    Terminal Server Connection (Remote Desktop Protocol)
   MV       Copy in-use files
n
   NET      Manage network resources
   NETDOM   Domain Manager
   NETSH    Configure Network Interfaces, Windows Firewall & Remote access
   NETSVC   Command-line Service Controller
   NBTSTAT  Display networking statistics (NetBIOS over TCP/IP)
   NETSTAT  Display networking statistics (TCP/IP)
   NOW      Display the current Date and Time
   NSLOOKUP Name server lookup
   NTBACKUP Backup folders to tape
   NTRIGHTS Edit user account rights
o
   OPENFILES Query or display open files
p
   PATH     Display or set a search path for executable files•
   PATHPING Trace route plus network latency and packet loss
   PAUSE    Suspend processing of a batch file and display a message•
   PERMS    Show permissions for a user
   PERFMON  Performance Monitor
   PING     Test a network connection
   POPD     Restore the previous value of the current directory saved by PUSHD•
   PORTQRY  Display the status of ports and services
   POWERCFG Configure power settings
   PRINT    Print a text file
   PRINTBRM Print queue Backup/Recovery
   PRNCNFG  Display, configure or rename a printer
   PRNMNGR  Add, delete, list printers set the default printer
   PROMPT   Change the command prompt•
   PsExec     Execute process remotely
   PsFile     Show files opened remotely
   PsGetSid   Display the SID of a computer or a user
   PsInfo     List information about a system
   PsKill     Kill processes by name or process ID
   PsList     List detailed information about processes
   PsLoggedOn Who's logged on (locally or via resource sharing)
   PsLogList  Event log records
   PsPasswd   Change account password
   PsService  View and control services
   PsShutdown Shutdown or reboot a computer
   PsSuspend  Suspend processes
   PUSHD    Save and then change the current directory•
q
   QGREP    Search file(s) for lines that match a given pattern.
r
   RASDIAL  Manage RAS connections
   RASPHONE Manage RAS connections
   RECOVER  Recover a damaged file from a defective disk.
   REG      Registry: Read, Set, Export, Delete keys and values
   REGEDIT  Import or export registry settings
   REGSVR32 Register or unregister a DLL
   REGINI   Change Registry Permissions
   REM      Record comments (remarks) in a batch file•
   REN      Rename a file or files•
   REPLACE  Replace or update one file with another
   RD       Delete folder(s)•
   RMTSHARE Share a folder or a printer
   ROBOCOPY Robust File and Folder Copy
   ROUTE    Manipulate network routing tables
   RUN      Start | RUN commands
   RUNAS    Execute a program under a different user account
   RUNDLL32 Run a DLL command (add/remove print connections)
s
   SC       Service Control
   SCHTASKS Schedule a command to run at a specific time
   SCLIST   Display Services
   SET      Display, set, or remove environment variables•
   SETLOCAL Control the visibility of environment variables•
   SETX     Set environment variables permanently
   SFC      System File Checker
   SHARE    List or edit a file share or print share
   SHIFT    Shift the position of replaceable parameters in a batch file•
   SHORTCUT Create a windows shortcut (.LNK file)
   SHOWGRPS List the Workgroups a user has joined
   SHOWMBRS List the Users who are members of a Workgroup
   SHUTDOWN Shutdown the computer
   SLEEP    Wait for x seconds
   SLMGR    Software Licensing Management (Vista/2008)
   SOON     Schedule a command to run in the near future
   SORT     Sort input
   START    Start a program or command in a separate window•
   SU       Switch User
   SUBINACL Edit file and folder Permissions, Ownership and Domain
   SUBST    Associate a path with a drive letter
   SYSTEMINFO List system configuration
t
   TASKLIST List running applications and services
   TASKKILL Remove a running process from memory
   TIME     Display or set the system time•
   TIMEOUT  Delay processing of a batch file
   TITLE    Set the window title for a CMD.EXE session•
   TLIST    Task list with full path
   TOUCH    Change file timestamps  
   TRACERT  Trace route to a remote host
   TREE     Graphical display of folder structure
   TSSHUTDN Remotely shut down or reboot a terminal server
   TYPE     Display the contents of a text file•
   TypePerf Write performance data to a log file
u
   USRSTAT  List domain usernames and last login
v
   VER      Display version information•
   VERIFY   Verify that files have been saved•
   VOL      Display a disk label•
w
   WAITFOR  Wait for or send a signal
   WHERE    Locate and display files in a directory tree
   WHOAMI   Output the current UserName and domain
   WINDIFF  Compare the contents of two files or sets of files
   WINMSDP  Windows system report
   WINRM    Windows Remote Management
   WINRS    Windows Remote Shell
   WMIC     WMI Commands
   WUAUCLT  Windows Update
x
   XCACLS   Change file and folder permissions
   XCOPY    Copy files and folders
   ::       Comment / Remark•
Commands marked • are Internal commands only available within the CMD shell.
All other commands (not marked with •) are external commands which may be used under the CMD shell, PowerShell, or directly from START-RUN.

Source: http://www.makeuseof.com

Beware of Batch file Virus:

If you find any bat files in Pen drive, CDs or receive any bat files through email,Please never open unless you are 100 sure that it does not contain malicious commands/scripts.To read what bat file contains,just right click on it and select edit.Then you can read the file.

A single line of script in Bat file may ruin your entire data and your system will collapse.They may delete the windows files, format data, steal information, consume CPU resources to affect performance, disable firewalls, open ports, modify or destroy registry and do many more losses.

In most of the cases,these bat files cannot be detected as Virus by the Anti Virus softwares. So these files may do harm for what they intended without Anti Virus notice.


For security reasons, I am not sharing such scripts here.

Most Dangerous:

If you can recognize that the bat file is containing malicious script, the hackers are still more intelligent. They create executable files from the batch files and make them invisible and place them in Pen drive with support of Autorun.inf file.

To disable copying Autorun .inf file, use Panda USB Vaccine which will not allow to copy any Autorun.inf file to your Pen drive.

Courtesy : www.srfix.blogspot.in

Tuesday 20 March 2012

How to Copy Content from Right Click Disabled Web


Use this method only for your Educational / informative purpose. Writing a blog post consumes lot of time. Do not use it to copy the content and to republish them in to your Blog / Website, Get prior permission from the respective authors, Also, give full credit link to their website, share the original content link to your social networks such as Facebook, twitter.

Even, some copy paste blogs disabled the right click function. They'll copy the content from other blog or websites, but they don't allow to copy from their own website or blog.


Some websites and blogs are prevent the user from using the mouse right click functions. In some other websites, the keyboard shortcuts such as Ctrl + C also disabled.
Did you feel it as frustrating one?  


We may not able to come online all the time to view and study the article or information shown in their website, so, we need a offline copy of the information.
Then, How to copy the content from the site?
Mostly, they are using JavaScript to prevent right click on the webpage.
So, disabling the loading of JavaScript in your browser enables you to copy the content from the website. If keyboard shortcuts are not disabled, then you can select the text using mouse, then press Ctrl + C, to copy, then you can paste it anywhere (Ctrl + V).

If keyboard shortcuts are also disabled, then disable the JavaScript loading in your browser, then you can copy anything.

1. Firefox
Tools => Options => Under Content Tab, Remove the tick on Enable JavaScript option.

Settings => Options => Under the Hood => Click Content Settings = > Select the Option "Do not allow any site to run JavaScript"


Tools => Internet Options => Security (Tab) => Click Custom level button, Under scripting select Active scripting Disable


Note :-
Change these settings temporarily, then revert back to the JavaScript enabled state. Because, most of the websites uses JavaScript including Gmail, otherwise the content will not be displayed properly.

Dear friends,
Use this method only for your Educational / informative purpose.  Writing a blog post consumes lot of time. Do not use it to copy the content and to republish them in to your Blog / Website, Get prior permission from the respective authors, Also, give full credit link to their website, share the original content link to your social networks such as Facebook, twitter.
Even, some copy paste blogs disabled the right click function. They'll copy the content from other blog or websites, but they don't allow to copy from their own website or blog.

Source : http://www.livetolearn.in/                    Courtesy : http://sapost.blogspot.in/

Thursday 15 March 2012

How to configure PB Printer to work through USB Cable ?

How to configure PB Printer  to work through USB Cable ? 

HOLD BOTH STATION1 and STATION2 BUTTONS IN THE PRINTER
Switch on the printer
Leave the Buttons
Insert the paper into the printer
Automatically Printer will take the paper inside and a message will be printed as follows

STATION 1-CONFIRM      STATION 2=SKIP    PRESS LOCAL TO CONTINUE
Press LOCAL and then STATION 1
The Default Configuration will be printed as follows

MENU          :                            CONFIG       Press STATION 1
DRAFT SPEED:               NORMAL      Press STATION 1
LQ TYPE:                        NLQ1           Press STATION 1
PAPER WIDTH:                FIRST LINE  Press STATION 1
BUZZER:                        Y                 Press STATION 1
INTERFACE                     By default SERIAL or COM1 will be there Press STATION2
Till USB is printed and then Press STATION 1
USB EMULATION            By default OLIVETTI will be there Press STATION2
                                         Till IBM is printed and then Press STATION 1
PLUG&PLAY:                             N                 Press STATION 1
PAP.EDGE DECTEC.:       N                 Press STATION 1
SPECIAL FORMS:            N                 Press STATION 1
PRINT MODE                   STANDARD  Press STATION 1
BIM MODE:                     MONO         Press STATION 1
PNS SELECTIONS:           N                 Press STATION 1
SAVE PARAMETERS        Y                 Press STATION 1
MENU          :                            CONFIG
Leave the paper in the printer and switch off the printer (Press power button in the PB printer)
SWITCH ON THE PRINTER       
Automatically the paper will be ejected
THE SAME METHOD MAY BE USED TO CONFIGURE SERIAL OR COM1 PORT


Thanks to :

P N Satish
Postmaster Grade – I
Byndoor Post Office,
Udupi Division, Karnataka - 576214


Saturday 10 March 2012

How Employers Disable USB Ports & How Employees Enable them again



Desktop computer equipped with a CD writer or a DVD burner is a rare sight is most companies. But a much larger security threat is posed by the open USB ports where mischievous office workers can just plugin the Flash Pen Drive, External Hard Disk or their iPod music player and transfer corporate data or even copy licensed software to their memory sticks in seconds.


Also, USB keys are not just a popular way to sneak data out from companies, unhappy employees may use USB ports for delivering trojans or spyware into the company networks.



Now some smart admins disable usb drive by changing the BIOS settings and then lock the BIOS using passwords. Some not so-smart admins fix tapes over the USB ports to prevent employees from inserting any USB device into their computer. 



However, both these approaches can prove to be counter-productives as your staff can no longer use USB keyboards, wireless mouse, digital cameras, camcorders, scanners, printers or even USB microphones to their computers.



So a more reasonable option for sysadmins is to disable write access to USB port so that data files cannot be written to the mass storage device. The USB thumb drive will be read-only.



Open the Windows Registry and open the following key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Control\StorageDevicePolicies



Now add a new DWORD called WriteProtect and put the value as 0 to disable write privileges to the USB port. To reverse the step, either delete the WriteProtect REG_DWORD or toggle the value to 1 which will enable the port.



Remember that the above trick works only with Windows XP SP2.



If you like to go a step further and disable users from connecting USB storage devices to their computers, here's the trick:


Open registry and navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet \Services\UsbStor

Now in the right pane, double-click Start and type 4 in the Value data box (Hexadecimal) and quite the registry editor. To enable the USB storage devices, change the Start value back to 3.

No matter how good the protection tricks are, determined people always find workarounds. Here are some of the tricks that may render the above methods unusable:

» Employee may boot computer using a LiveCD like Knoppix or Ubuntu so the USB drives are again available to him for writing.

» They could open the computer chasis, take the battery out to reset the BIOS settings.

» Some may even invest in a PS2 to USB port converter.

» If he manages to get admin access for a temporary period (like installing software), he may undo the registry edits.

The cat-mouse game will never end. USB drives will remain a headache for the sysadmins for some time. However, Windows Vista will make life much simpler for IT administrators. There's a new Policy in Vista that allows USB keyboards or mouse to be used but not any USB devices. 


Source : http://labnol.blogspot.in/   

How to disable USB sticks and limit access to USB storage devices on Windows systems



USB storage - a possible security risk?

Decent IT administrators secure their networks behind firewalls. They install mail filters on their SMTP servers and deploy anti-virus software on all client workstations. But securing the network is not sufficient -- what happens if the users bring their own USB memory sticks and connect them to the computers at their office? A 1 Gb USB stick can sometimes hold an entire company's vital data. Within minutes or even seconds an employee has all the files they need in order to start up their own business and take all the customers with them. Alternatively, what happens if a careless user accidentally compromises the network with an infected USB stick?

What does Microsoft have to say about it?

If you, the administrator, want to establish a minimum level of security, it is absolutely necessary to control which users can connect USB memory sticks to a computer. Unfortunately, a default Windows XP or Windows 2000 installation comes with no limitations on who is able to install and use USB storage media. Microsoft knowledge base article 823732 contains instructions on how to disable USB storage access for a certain group of users; however, the article only distinguishes between whether or not a USB storage device has been installed on a particular computer. Furthermore, the instructions are limited to a stand-alone computer. According to the general rule of thumb "If it's tedious, there is a better way", I try to avoid techniques that force me to repeat certain tasks for each computer that I manage. That's what group policy objects (GPO) are for.

Suggestions?

Mark Heitbrink describes how to disable USB storage devices entirely on all or some computers in the network. He employs an ADM template in a group policy object that disables the USB storage driver (USBSTOR). The ADM template simply sets the registry valueHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor\Start to 4 (Disable). But his technique has a serious drawback. It only works if the USB storage driver is already installed. If it has not yet been installed, Windows' plug & play subsystem automatically resets the Start value to 3 (Manual) when it installs USBSTOR after a USB storage device is plugged in for the first time. In that case, USBSTOR remains enabled until the GPO is re-applied, usually at the next reboot. If the storage device is plugged in during that reboot, it will still be available because the USBSTOR driver is started before any GPOs are processed.

The Howto!

If we combine Mark Heitbrink's approach with the one outlined in knowledge base article 823732, we get a more reliable solution. Firstly, we need to prevent USBSTOR from being installed unless the currently logged on user is allowed to use USB storage. We do that by restricting access toUSBSTOR.INF and USBSTORE.PNF in a GPO such that PNP can't automatically install the driver. This is possible because when PNP installs a driver, the installation is performed using the priviledges of the currently logged on user. Secondly, we need to make sure that USBSTOR is not started when a USB storage device is plugged in. For that we use Mark's ADM template. The only minor drawback of my solution is that users with access to USB storage need to manually start USBSTOR before connecting USB storage devices.
1.   In Active Directory Users and Computers, open an existing GPO or create a new one and open it. Use the security settings of that GPO to specify which computers it affects.
2.   In that GPO, go to Computer Configuration – Windows Settings – Security Settings – File System and create a new entry (right-click File System and select Add File). Specify the location of USBSTOR.INF (usually SystemRoot%\Inf\USBSTOR.INF)
3.   Change the security settings of the new entry. The security settings that you specify here will be enforced on the USBSTOR.INF of every computer to which the GPO is applied. This process is not additive, which means that the previous security settings ofUSBSTOR.INF will be overwritten by the ones given in the GPO. It is therefore recommended to grant full control to SYSTEM and local administrators. But unlike in the default security settings of USBSTOR.INF, you should not grant any priviledges to Everybody. You do not need to explicitly deny access – just omit an entry for Everybody. Optionally, you can grant read access to a certain group. Members of this group will be able to use USB storage.
4.   Repeat the above two steps for USBSTOR.PNF.
5.   Download USBSTOR.ADM.
6.   Back in the GPO, right-click Administrative Templates under Computer Configuration and select Add/Remove Templates. Click Add and browse to the location of USBSTOR.ADM. Close the dialog.
7.   You should now have an additional entry called Services and Drivers in Administrative Templates. Click on it. If it is empty, select View from the menu and uncheck Show Policies Only. Click back on Services and Drivers in Administrative Templates. It should now show the USB Storage policy. Double click it, select Enabled and pick Disabled from the Startup Type drop down. Again, the policy must be enabled wheras Startup Type must be Disabled.
8.   Close the dialog as well as the GPO and boot/reboot one of your workstations. Make sure no USB strorage device is connected to that computer. Log on with administrative privileges and check the permissions of USBSTOR.INF and USBSTOR.PNF. Check the value of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor\Start. It should be 4. It is also ok if the UsbStor key doesn't exist at all.
9.   On the same workstation, log off and back on as a user that should not have access to USB storage. Connect a USB memory stick or a similar device. Nothing should happen. Remove the memory stick.
10.                Log on as a user that should have access to USB storage and execute net start usbstorin a command shell or at Start – Run before connecting the memory stick. The memory stick should initialized and mapped to a drive letter. If USBSTOR fails to start, it's probably because this is the first time a memory stick is plugged into the workstation in which case USBSTOR is not yet installed. Nevertheless, the memory stick should be initialized and mapped correctly but you need to reboot in order to reapply the administrative template such that USBSTOR is disabled again. Alternatively, you can disable it manually by downloading and double clicking USBSTOR.REG as well as executing net stop usbstor.
11.                Instruct the users with access to USB storage that they need to execute net start usbstor before they can connect a USB storage device.
Attachment
Size
530 bytes
258 bytes


Source : http://diaryproducts.net/
Courtesy :  http://sapost.blogspot.in/

Friday 9 March 2012

Turn off the Monitor using Keyboard



While using monitor off utility you can turn off the monitor by using keyboard when you step away from the computer. For example While you doing some secret things in your computer and you got a phone by this utility just by using/setting up the hot keys you can turn your monitor off. In this utility not only you can shut the monitor of but also you can lock the workstation and start screen savers.

This is a best program to protect your privacy and this is a best program to save the power bill. This program puts the monitor in stand by.



Courtesy : saparavur.blogspot.in

What is MAC Address


Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet. Logically, MAC addresses are used in the Media Access Control protocol sub-layer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a Network Interface Card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC.


Method 1
Click on Start>>Run>>CMD>>Ipconfig/all

A mac address contains 6 pairs of digits which is hexadecimal digits,The first three pairs of digits in the MAC address are called the OUI (Organizational Unique Identifier), which identifies the company that manufactured or sold the device. For example, a MAC address that begins with 00:1F:33 denotes a Netgear product. The last three pairs of digits are specific to the device and can be more or less considered a serial number of sorts. Together, the two parts of the MAC address form an ID that's unique to a particular device.

Method 2
This method applicable only if you connected to a network



Open Network connection

Select your Local Area Connection and right-click, select "Status".











In "Support" tab, click "Details".












Your MAC Address is the "Physical Address" listed in Network Connection Details.











Method-3

if u are using windows Xp start>>run>>getmac
Courtesy : satirur.blogspot.in  & sapost.blogspot.in