Tuesday, August 3, 2010

Encrypt your backup within iTunes

By default, iTunes will perform a backup of your Apple device.  But this backup is not encrypted on your computer’s hard drive.  To enable this feature, launch iTunes and connect your device.  Under the Summary tab, enable the option “Encrypt iPod backup.”

itunes_encrypt_1

A dialog box should appear asking for a password.

itunes_encrypt_2

List of utilities for Hyper-V

  • Wim2VHD
    Creates a Windows Server 2008/Vista/Win7 VHD from media in 5 minutes.
  • VHDtool
    Command-line tool for VHD manipulation including instant creation of large fixed-size VHDs
  • Hyper-V PowerShell library
    PowerShell Library for Hyper-V, simplify Hyper-V scripting
  • CoreConfigurator
    Server Core/Hyper-V Server configuration interface
  • Hvremote
    Configures servers and clients for remote management of Hyper-V in both workgroup and domain environments
  • nvspbind
    Tool for modifying network bindings from the command line
  • nvspscrub
    Tool for removing Hyper-V Virtual Networking Configuration from the parent partition
  • BootfromUSB-HVS
    Simplify the creation of bootable Hyper-V Server USB drives
  • VM Migration Test Wizard
    Discovers which hosts need the "Enable Processor compat" option for Live Migration

Monday, August 2, 2010

Eventlog to Syslog Service for Windows

This program is written in C and provides a method of sending Windows Eventlog events to a syslog server. It works with the new Windows Events service found in Vista and Server 2008 and can be compiled for both 32 and 64-bit environments. The program is designed to run as a windows service.

http://code.google.com/p/eventlog-to-syslog/

SAGAN

SAGAN is a real time event log monitoring system that is able to detect incidents on hosts or network and can correlate information with the snort sensor present on your network. It gathers syslog events and then correlates them with other alerts such as snort logs.

http://sagan.softwink.com/

Sunday, August 1, 2010

Kace’s Secure Browser

Kace’s Secure Browser is a virtualized and contained Firefox v3.6 Browser with Adobe Reader and Flash plug-ins pre-installed.

http://www.kace.com/products/freetools/secure-browser/

SharePoint SUSHI

SharePoint SUSHI is a powerful, user-friendly utility enabling you to accomplish common administrative tasks. You can think of SUSHI as a Swiss army knife for SharePoint.

SUSHI = SharePoint Utility with a Smart, Helpful Interface

http://sushi.codeplex.com/

Exchange Deployment Assistant

The Exchange Server 2010 Deployment Assistant (ExDeploy) is a free web-based tool which can help you deploy Exchange Server 2010. With ExDeploy, you can create Exchange Server 2010 on-premises deployment instructions that are customized to your environment. The Deployment Assistant asks you a small set of questions, and based on your answers, it provides a checklist with instructions that are designed to get you up and running on Exchange 2010. You can also print the checklist or create a PDF file.

You can access ExDeploy at http://technet.microsoft.com/exdeploy2010.

Show command examples with IOS

Below are some examples of different Show commands within Cisco’s IOS.

show version

The command show version provides basic information about the device in question, such as hardware resources, software revision, and uptime.

show_version

show inventory

The command show inventory provides a compiled list of all hardware components present in the device in question, such as a description, part ID, hardware revision, and serial number.

show_inventory

show environment

The command show environment displays hardware diagnostic information such as power supply status, fan speed, and temperatures.

show tech-support

The command show tech-support is an alias for a number of other commands and it will create a large amount of information that can be submitted with a support request.

show processes

The command show processes displays running processes on the device in question. 

show_processes

A similar command of show processes cpu sorted can be used to determine the processes by the highest CPU utilization.