Create AD Domain

After the primary AD domain controller is configured, you must create AD domain users and groups on the AD domain controller. An administrator can centrally manage domain users and groups and allocate them to different users.

  • A user can log in to a client host in the AD domain as a domain user and is authenticated by the primary AD domain controller.
  • This section uses Windows Server 2008 R2 as an example to explain how to create AD domain users and groups on the AD domain controller.
  1. Log in to the Windows AD domain server. Choose Start > Administrative Tools > Active Directory Users and Computers.

The Active Directory Users and Computers page is displayed.

    1. In the Active Directory Users and Computers dialog box, right-click Users.
    2. Choose New > User.

    3. Enter the domain user information.

      The user information includes First nameLast nameInitials, and User logon nameUser logon name is used for AD domain login and authentication.

    4. Click Next after the user information is configured.

    5. Enter and confirm the user password. Deselect User must change password at next logon. Click Next.

    6. Click Finish after you confirm the user information. Return to the Active Directory Users and Computers dialog box. Create a user.
    1. In the Active Directory Users and Computers dialog box, right-click Users.
    2. Choose New > Group.

    3. Enter Group name.
    4. Set Group scope to Global.
    5. Set Group type to Security.
    6. Click OK.

      Return to the Active Directory Users and Computers dialog box. Create a group.

  1. Add a user to a group.
    1. In the Active Directory Users and Computers dialog box, right-click a user to add to a group.
    2. Select Add to a group.

    3. In the Enter the object name to select text box, enter the name of the group to which the user is added.
    4. Click OK. A message is displayed, indicating that the operation succeeded.
    5. Click OK.
[mai mult...]

Create an inbound ICMP rule with Firewall – Windows

This type of rule allows ICMP requests and responses to be received by devices on the network. To create an inbound ICMP rule:

  1. Open the Windows Firewall with Advanced Security console
  2. In the navigation pane, select Inbound Rules
  3. Select Action, and then select New rule
  4. On the Rule Type page of the New Inbound Rule Wizard, select Custom, and then select Next
  5. On the Program page, select All programs, and then select Next
  6. On the Protocol and Ports page, select ICMPv4 or ICMPv6 from the Protocol type list. If you use both IPv4 and IPv6 on your network, you must create a separate ICMP rule for each
  7. Select Customize
  8. In the Customize ICMP Settings dialog box, do one of the following:
    • To allow all ICMP network traffic, select All ICMP types, and then select OK
    • To select one of the predefined ICMP types, select Specific ICMP types, and then select each type in the list that you want to allow. Select OK
    • To select an ICMP type that does not appear in the list, select Specific ICMP types, select the Type number from the list, select the Code number from the list, select Add, and then select the newly created entry from the list. Select OK
  9. Select Next
  10. On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then select Next
  11. On the Action page, select Allow the connection, and then select Next
  12. On the Profile page, select the network location types to which this rule applies, and then select Next
  13. On the Name page, type a name and description for your rule, and then select Finish.
[mai mult...]

Create inbound & outbound port rule in Firewall – Windows

This type of rule allows any program that listens on a specified TCP or UDP port to receive network traffic sent to that port. To create an inbound port rule:

  1. Open the Windows Firewall with Advanced Security console
  2. In the navigation pane, select Inbound Rules
  3. Select Action, and then select New rule
  4. On the Rule Type page of the New Inbound Rule Wizard, select Custom, and then select Next

Although you can create rules by selecting Program or Port, those choices limit the number of pages presented by the wizard. If you select Custom, you see all of the pages, and have the most flexibility in creating your rules.

  • On the Program page, select All programs, and then select Next

This type of rule is often combined with a program or service rule. If you combine the rule types, you get a firewall rule that limits traffic to a specified port and allows the traffic only when the specified program is running. The specified program cannot receive network traffic on other ports, and other programs cannot receive network traffic on the specified port.

  1. On the Protocol and Ports page, select the protocol type that you want to allow. To restrict the rule to a specified port number, you must select either TCP or UDP. Because this is an incoming rule, you typically configure only the local port number If you select another protocol, then only packets whose protocol field in the IP header match this rule are permitted through the firewall.
    To select a protocol by its number, select Custom from the list, and then type the number in the Protocol number box.
    When you have configured the protocols and ports, select Next.
  2. On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then select Next
  3. On the Action page, select Allow the connection, and then select Next
  4. On the Profile page, select the network location types to which this rule applies, and then select Next

If this GPO is targeted at server computers running Windows Server 2008 that never move, consider modifying the rules to apply to all network location type profiles. This prevents an unexpected change in the applied rules if the network location type changes due to the installation of a new network card or the disconnection of an existing network card’s cable. A disconnected network card is automatically assigned to the Public network location type.

  1. On the Name page, type a name and description for your rule, and then select Finish

Create an outbound port rule

By default, Windows Firewall allows all outbound network traffic, unless it matches a rule that prohibits the traffic. This type of rule blocks any outbound network traffic that matches the specified TCP or UDP port numbers. To create an outbound port rule:

  1. Open the Windows Firewall with Advanced Security console
  2. In the navigation pane, select Outbound Rules
  3. Select Action, and then select New rule
  4. On the Rule Type page of the New Outbound Rule wizard, select Custom, and then select Next

Although you can create rules by selecting Program or Port, those choices limit the number of pages presented by the wizard. If you select Custom, you see all of the pages, and have the most flexibility in creating your rules.

  1. On the Program page, select All programs, and then select Next
  2. On the Protocol and Ports page, select the protocol type that you want to block. To restrict the rule to a specified port number, you must select either TCP or UDP. Because this rule is an outbound rule, you typically configure only the remote port number If you select another protocol, then only packets whose protocol field in the IP header matches this rule are blocked by Windows Defender Firewall. Network traffic for protocols is allowed as long as other rules that match don’t block it. To select a protocol by its number, select Custom from the list, and then type the number in the Protocol number box. When you’ve configured the protocols and ports, select Next
  3. On the Scope page, you can specify that the rule applies only to network traffic to or from the IP addresses entered on this page. Configure as appropriate for your design, and then select Next
  4. On the Action page, select Block the connection, and then select Next
  5. On the Profile page, select the network location types to which this rule applies, and then select Next
  6. On the Name page, type a name and description for your rule, and then select Finish.
[mai mult...]

Vmware Networking – create an virtual switch

Creating a Distributed Virtual Switch

1. In vCenter, select “Home” and then “Networking.” Click the datacenter on which the host or hosts reside.

2. Select from the toolbar the icon to launch the Create vNetwork Distributed Switch wizard. Name the vNetwork. Click “Next.”

3. Select each host to associate with the DvSwitch, and then select which network adapters to use with each ESX/ESXi host. Choose multiple network adapters to create uplink groups and provide load balancing and fault tolerance to a host. Make sure to select the correct network adapters during the creation process, as reassigning the adapters is not a simple process. Click “Next.”

4. Click “Finish” to create the DvSwitch in vCenter.

  • Configuring DvSwitches and Port Groups

DvSwitches and vSwitches share most of the same options, but distributed switches offer a little bit more control over the operation of the vNetwork. To access the settings, right-click the virtual switch and then select “Edit Settings” from the context menu.

On the General tab are options to change the name of the switch and the number of dvUplinks connected to the vNetwork. On the Advanced tab are options to increase or decrease the maximum transmission unit (MTU), which limits packet size, and enable Cisco Discovery Protocol. In later versions of vSphere, you can also set up features like NetFlow, which analyzes network communications transmitted between virtual machines and physical networks; or port mirroring, which copies packets from one port to another for monitoring purposes.

[mai mult...]

Factory Reset options for the Xbox One S/X

Microsoft gives Xbox One owners two options when it comes to resetting their consoles:

  • Partial Factory Reset – This option will revert all options to their default ones.
  • Full Factory Reset – This option will delete all data.

To perform a partial factory reset on Xbox One S/X, follow these steps:

  1. Power on the Xbox console.
  2. Press the Xbox button on the controller.
  3. Under the gear icon, select Settings.
  4. Select System > Console Info.
  5. Select Reset Console.
  6. Select Reset and keep my games & apps.

To perform a full factory reset on Xbox One S/X, follow these steps:

  1. Power on the Xbox Console .
  2. Press the Xbox button on the controller.
  3. Under the gear icon, select Settings.
  4. Select System > Console Info.
  5. Select Reset Console.
  6. Select Reset and remove everything.

If the Xbox One console does not boot up, owners can factory reset it via the startup troubleshooter by following these steps:

  1. Ensure the Xbox One console is fully powered off.
  2. Remove all power and network cables for at least 30 seconds.
  3. Plug the power cable back into the console.
  4. Hold the Eject and Bind buttons on the console simultaneously.
  5. While holding the Eject and Bind buttons, press the Xbox button on the console.
  6. Release the Xbox button but continue pressing the buttons from before for at least 15 seconds after hearing two beeps.
  7. The Xbox Startup Troubleshooter should pop up on the screen.
  8. Select Reset this Xbox and follow the instructions provided.
[mai mult...]

How to fix a noisy computer Fan

The computer fans in your desktop PC or laptop are there to keep things cool and running smoothly. However, if you can barely hear yourself think over the cacophony of fan noise emanating from your computer, it’s probably time to diagnose the problem.

An internal fan will work harder as hardware temperatures rise, but there’s probably something more going on if your PC constantly sounds like a wind tunnel. It could be a major issue, a minor inconvenience, or something in between. Here are a few things to try.

Check What Software Is Running

Your first order of business should be to check what software is currently running, the resources it’s using, and whether that fan noise is warranted. In Windows, press Ctrl + Shift + Esc to bring up the Task Manager. In macOS, press Ctrl + Space and search for Activity Monitor. This will show you what programs are currently open and using system resources.

An idle computer should not be using more than 20% of its CPU capacity. If you aren’t doing anything intensive, yet your CPU is busting out 100% of its power, look to see what program is eating up those cycles. Maybe you have something running in the background you forgot about, or you could be infected with malware that is using your PC’s resources without your knowledge.

[mai mult...]

How to avoid Bottleneck on your PC

A good piece of advice when building a PC is to have a balanced part list, else bottlenecks may occur.
A bottleneck happens when a faster component is limited by another. This refers to CPU, GPU, RAM.
There is a point where, keeping one part the same, having a faster another part is not helpful at all.

Many people build a PC for gaming. A too fast CPU with a too slow GPU (or the reverse) is usually bad.
Instead of thinking about a single performance metric (like FPS), we can use one metric for each part.
We can define a CPU FPS and a GPU FPS, the actual FPS being always the lower value, never the upper.

CPU FPS = FPS when the CPU is the bottleneck – No matter how fast the GPU is, this is the maximum.
GPU FPS = FPS when the GPU is the bottleneck – No matter how fast the CPU is, this is the maximum.
This may be an oversimplification, but the statements above are true within a small margin of error.

CPU FPS increases with the single core performance and with the core count up to a limit (now 6 – 8).
GPU FPS increases when the GPU is better and when the graphical settings (+resolution) are lowered.

In order to avoid bottlenecks when gaming, here are some rules for deciding between CPU and GPU:

  1. The more demanding the game is, the more a faster GPU is needed and the less a faster CPU.
    Actually both are needed, but if the GPU is weak, the game is going to be almost unplayable.
    AAA games are more demanding than e-sports, newer games are more demanding as well.
  2. The higher the graphical settings are, the more a faster GPU is needed and the less a faster CPU.
    Resolution is included in graphical settings and it has values like: 1080p, 1440p and 4K.
    1080p = 1920 x 1080, 1440p = 2560 x 1440, 4K = 3840 x 2160, others are virtually unused.

(!) Some games (like simulation ones) are not graphically focused, they need a strong CPU.

Keep in mind that 1440p is much closer to 1080p than to 4K. The rule: 4K gaming is GPU bottlenecked.
How many pixels? 1080p = 2 073 600 pixels, 1440p = 3 686 400 pixels, 4K (2160p) = 8 294 400 pixels.

Sometimes a bottleneck occurs between the CPU and the RAM, particularly when the RAM is slow.
First of all, 3200 MHz CL 16 is the sweet spot and it should run at this speed on many new systems.
If gaming using an integrated GPU, don’t get slower RAM because RAM is a huge bottleneck here.

The final rule: Always search for benchmarks. Try to find many sources to be sure of the performance.

[mai mult...]

Ce este Smishing-ul si cum sa va protejati de aceste atacuri

Smishing-ul este combinatia dintre „SMS text messages” si „phishing” ceea ce inseamna ca este un atac de tip phishing care se efectueaza prin intermediul mesajelor text pe care le primiti pe dispozitivele dvs. mobile. Mesajele au in general un continut atragator, incercand sa va convinga sa dati click pe un anumit link.

Dand click pe linkul respectiv veti fi directionat catre un website real, unde vi se va solicita sa introduceti informatii sensibile cum ar fi ID-ul de utilizator, parola sau detalii bancare. Daca dati curs solicitarilor de acest tip veti deveni o victima a criminalilor cibernetici care va vor folosi datele pentru a comite fraude legate de identitate, vor sustrage bani din contul dvs. bancar sau pentru a efectua  alte activitati rau intentionate.

O inselatorie de tip phishing (phishing scam) este o forma de atac cibernetic care va vizeaza pe dvs. sau afacerea dvs., trimitandu-va linkuri sau mesaje rau intentionate prin email, mesaje text SMS sau apeluri telefonice. Daca veti da click pe link sau furnizati informatii confidentiale prin orice cale, veti deveni o victima a acestor atacuri.

Tipuri de atacuri Smishing

Inselatoriile phishing prin SMS sunt efectuate in numeroase moduri. Iata cateva dintre cele mai comune metode de smishing pe care le folosesc criminalii cibernetici in zilele noastre:

  • Mesaje text de la institutii financiare, banci sau companii de asigurari care anunta ca exista o problema cu contul dvs. care trebuie rezolvata rapid
  • Mesaje text care va informeaza ca ati castigat un premiu important, un bilet de loterie sau oferte cu diverse reduceri
  • Mesaje text de la organizatii online care va solicita sa va verificati metodele de plata
  • Mesaje din partea diferitelor organizatii caritabile, pentru a face donatii
  • SMS de la autoritati pentru a afla detalii

Atacuri Smishing: Cum functioneaza?

Atacurile smishing nu sunt ceva complicat fiind chiar usor de intreprins. Atacatorii folosesc cateva instrumente deloc complicate si ii vizeaza pe detinatorii de device-uri mobile trimitand mesaje text. Uneori, escrocii primesc detalii despre victimele lor inainte de a lansa un atac (social engineering scam).

Iata o descriere detaliata al modului in care se desfasoara  atacurile de phishing prin SMS:

1. In primul rand, primiti un mesaj text de la infractorii cibernetici. Atacatorii folosesc numere de telefon falsificate pentru a se asigura ca SMS-urile creeaza impresia expedierii de la o entitate existenta – banca, etc.

De exemplu, daca escrocii au trimis un mesaj ca venind din partea unei banci atunci foarte probabil va vor pune intrebari legate de contul dvs. bancar. Daca fraudatorii detin mai multe detalii despre dvs., atunci ei vor cere informatii mai specifice despre dvs. pentru a va face sa credeti ca mesajul text provine de la un site web real sau o aplicatie pe care o utilizati.

2. Continutul mesajelor text este diferit de la caz la caz. Dar scopul tuturor mesajelor este de a crea un sentiment de urgenta pentru a va face sa luati masuri rapide.

3. Al treilea pas va determina soarta (!!). Daca ignorati mesajul text atunci acesta este sfarsitul acestei inselatorii. Dar, daca dati click pe link veti fi directionat catre un site cu aspect legitim, dar care in realitate este un site fals care imita originalul. La accesarea site-ului, fie vi se va cere sa furnizati informatii confidentiale, fie sa descarcati software pentru a finaliza procesul.

Atacatorii va vor cere sa furnizati informatii confidentiale precum ID-ul de utilizator, datele de conectare la serviciu, detaliile bancare, detaliile cardului bancar, etc. Site-ul web va va cere sa descarcati un program pe telefonul mobil care ofata instalat le va oferi atacatorilor acces la dispozitivul dvs. Acestia vor putea sa va  monitorizeze toate miscarile si va vor fura informatiile despre cont, bani etc.

[mai mult...]

How to send encrypted message in Outlook

Outlook client for Windows

  1. Create a New Email
  2. Select Options from the Ribbon
  3. Click Encrypt (or Permissions)
  4. Choose Encrypt-Only or another option from the dropdown menu

Sending with Outlook for Windows

Outlook on the Web (OWA)

  1. Create a new message
  2. Select Options from the Ribbon
  3. Select Encrypt, and then Encrypt or another option from the dropdown menu

Outlook client for Mac

  1. Create a new email
  2. Select the Encryption option from the message toolbar

Location of Encryption Button in Ribbon via Outlook Client for Mac

  1. If you don’t see the option of Encryption, select the three dots to add items to your toolbar

Location of three dots button to add more items to the message toolbar

  1. Drag the Encryption button to your toolbar and then hit Done.

Location of Encryption button to be added to Outlook's message toolbar

[mai mult...]

How to partial clean your HP Printer

1. Please shut down the product using the power button located under the control panel.

2. Once the product is fully shut down, turn it back on with the same button, but when doing this, you will need to tap on the black screen repeatedly before the start screen shows up.

If you have done step 2 correctly, you will see the screen below.

3. Please then navigate to Administrator and select OK.

4. Please then select Partial Clean tab and select OK.

5. Once the partial clean is done, you will need to navigate to the main menu and select Continue, then OK.

6. Once that’s done you will see the screen shown below and the initializing screen. This should clear the error and once that’s done, please let the support technician know that this has been done as you will still require a service technician on site to configure the machine to be able to use it properly.

[mai mult...]