SysAdmin Headlines

Loading...

Thursday, March 12, 2015

Installing Windows Server 2012 R2 in VirtualBox

I received a call from a client that had an old server running a mission-critical database application on Windows Server 2003 that has to be replaced. Microsoft has announced end of support for Windows Server 2003 and all updates. Windows Server 2003 is at it's end-of-life. We discussed upgrading to Windows Server 2012 R2, and running the database application in a VM until we can migrate it to Windows Server 2012 R2. New hardware was purchased for this and I set about to kick Windows Server 2012 R2 around in a VM on VirtualBox. Here is a bit of what I found.

First, I download the ISO file from Microsoft and created a new VM in Oracle VirtualBox.  I added the ISO image as a second controller and let it boot from there. I selected Windows 2012 as the intended OS and left the defaults alone. It allocated 2 Gb of RAM, 2 CPU's, and a dynamic 25 Gb Virtual Disk. Video RAM was left at 128 Mb. VT-x/ AMD-V was enabled by default as well.

Windows Server 2012 R2 provides new features and capabilities: server virtualization, software-defined networking, server management and automation, web and application platform, access and information protection, virtual desktop infrastructure, and more. Windows 2012 R2 is released as several different editions for different needs. Windows Server 2012 R2 supports enterprise-grade storage, identity, networking, virtualization, and more. Windows Server 2012 R2 provides 5x more logical processor support, 4x more physical memory and 16x more memory support per virtual machine than Windows Server 2008. Microsoft includes IP Address Management (IPAM), Software Defined Networks (SDNs) o allow virtualization and network management teams to allocate network bandwidth as needed.






Windows 2012 R2 Server Essentials Edition is limited to 25 users, 50 devices, and a total of 2 VMs. Windows Server 2012 R2 Essentials Edition  (formerly Windows Small Business Server) is a server designed for small businesses. Windows Server 2012 Essentials is an ideal first server, and it can also be used as the primary server in a multi-server environment.









Microsoft adds System Center 2012 R2 with versions of Operations Manager, Virtual Machine Manager, and Configuration Manager to the standard edition of Server 2012 R2.

Microsoft has made it easy to join Windows 2012 R2 to Azure Clouds. Microsoft is supporting commonly used Linux distros as manageable guests within the Hyper-V virtualization and Azure cloud infrastructure. If organizations want a control panel, Microsoft attaches System Center Ops Manager, Virtual Machine Manager, and Configuration Manager that are deeply intertwined into the depths of Server 2012 R2 and Hyper-V. Hyper-V boots UEFI, rather than traditional BIOS. There is the capacity to move virtual machines from host to host using compression, and where hardware is available to support it, very fast transports -- 10GBE, Infiniband, and other connections. The high-speed connections are crucial to VM movements among hosts in hypervisor fabrics.






  • What's New in 802.1X Authenticated Wired Access
    This topic provides information about the new features for 802.1X Authenticated Wired Access in Windows Server 2012 R2 and Windows 8.1.
  • What's New in 802.1X Authenticated Wireless Access
    This topic provides information about the new features for 802.1X Authenticated Wireless Access in Windows Server 2012 R2 and Windows 8.1, including Miracast Wireless Display and faster Wi-Fi with 802.11ac.
  • What's New in Active Directory in Windows Server
    You can leverage new features in Active Directory to enable employees and partners to access protected corporate data from their personal devices and at the same time manage risk and govern the use of corporate resources.
  • What's New in Active Directory Domain Services (AD DS)
    Active Directory Domain Services (AD DS) in Windows Server 2012 includes new features that make it simpler and faster to deploy domain controllers (both on-premises and in the cloud), more flexible and easier to both audit and authorize access to files with Dynamic Access Control, and easier to perform administrative tasks at scale, either locally or remotely, through consistent graphical and scripted management experiences.
  • What's New in Active Directory Rights Management Services (AD RMS)
    Active Directory Rights Management Services (AD RMS) is the server role that provides you with management and development tools that work with industry security technologies—including encryption, certificates, and authentication—to help organizations create reliable information protection solutions.
  • What's New in BitLocker
    BitLocker now provides support for device encryption on x86-based and x64-based computers with a Trusted Platform Module that supports connected standby. This topic describes the new functionality. BitLocker encrypts the hard drives on your computer to provide enhanced protection against data theft or exposure on computers and removable drives that are lost or stolen.
  • What's New in BranchCache
    BranchCache in Windows Server 2012 and Windows 8 provides substantial performance, manageability, scalability, and availability improvements.
  • What's New in Certificate Services in Windows Server
    Active Directory Certificate Services in Windows Server 2012 R2 supports a policy module for the Network Device Enrollment Service, TPM key attestation, and new Windows PowerShell cmdlets for backup and restore. AD CS in Windows Server 2012 provides multiple new features and capabilities over previous versions, including new deployment, manageability, and capabilities added to AD CS in Windows Server 2012.
  • What's New in Data Deduplication in Windows Server
    Data Deduplication can now be installed on a scale-out file share and used to optimize live virtual hard disks (VHDs) for Virtual Desktop Infrastructure (VDI) workloads. This topic describes this and other new functionality.
  • What's New in DFS Replication and DFS Namespaces in Windows Server
    This topic describes the features that were added to DFS Replication (DFSR or DFS-R) in Windows Server 2012 R2. DFS Namespaces and DFS Replication in Windows Server 2012 provide new management functionality as well as interoperability with DirectAccess and Data Deduplication.
  • What's New in DHCP
    Dynamic Host Configuration Protocol (DHCP) in Windows Server 2012 R2 provides new features and capabilities over previous versions. This document describes new deployment, manageability, and capabilities added to the DHCP Server role in Windows Server 2012 R2. Dynamic Host Configuration Protocol (DHCP) is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP-based network, such as a private intranet.
  • What's New in DNS Server
    This topic provides information about new and changed functionality in the DNS Server service in Windows Server 2012 R2. Domain Name System (DNS) services are used in TCP/IP networks for naming computers and network services. DNS naming locates computers and services through user-friendly names.
  • What's New in DNS Client
    This topic provides information about new and changed functionality in the DNS Client service in Windows 8.1 and Windows 8.
  • What's New in Failover Clustering in Windows Server
    This topic describes the Failover Clustering functionality that is new or changed in Windows Server 2012 R2. Failover clusters provide high availability and scalability to many server workloads. These include file share storage for server applications such as Hyper-V and Microsoft SQL Server, and server applications that run on physical servers or virtual machines.
  • New and Changed Functionality in File and Storage Services
    File and Storage Services provides a number of new management, scalability, and functionality improvements in Windows Server 2012 R2 and Windows Server 2012.
  • What's New in File Server Resource Manager in Windows Server
    This topic summarizes the File Server Resource Manager functionality in Windows Server 2012 R2 that is new or changed since Windows Server 2012. File Server Resource Manager provides a set of features that allow you to manage and classify data that is stored on file servers.
  • What's New in Group Policy in Windows Server
    This topic describes the new and changed functionality of the Group Policy feature in Windows Server 2012 R2 and Windows Server 2012. Group Policy is an infrastructure that enables you to specify managed configurations for users and computers through Group Policy settings and Group Policy Preferences.
  • What’s New in Hyper-V for Windows Server 2012 R2
    This topic describes the new and changed functionality of the Hyper-V role in Windows Server 2012 R2. The Hyper-V role enables you to create and manage a virtualized computing environment by using virtualization technology that is built in to Windows Server 2012. Hyper-V virtualizes hardware to provide an environment in which you can run multiple operating systems at the same time on one physical computer, by running each operating system in its own virtual machine.
  • What's New in Hyper-V Network Virtualization
    This topic describes the new or changed features and functionality in Hyper-V Network Virtualization in Windows Server 2012 R2.
  • What's New in Hyper-V Virtual Switch in Windows Server 2012 R2
    This topic provides information about the new features in Hyper-V Virtual Switch in Windows Server 2012 R2.
  • What's New in IPAM
    IP Address Management (IPAM) is a feature that was first introduced in Windows Server 2012 that provides highly customizable administrative and monitoring capabilities for the IP address infrastructure on a corporate network. IPAM in Windows Server 2012 R2 includes many enhancements.
  • What's New in iSCSI Target Server in Windows Server
    This topic describes the new and changed functionality of iSCSI Target Server in Windows Server 2012 R2.
  • What's New in Kerberos Authentication
    The Microsoft Windows Server operating systems implement the Kerberos version 5 authentication protocol and extensions for public key and password-based authentication. The Kerberos authentication client is implemented as a security support provider (SSP) and can be accessed through the Security Support Provider Interface (SSPI).
  • What's New for Managed Service Accounts
    Standalone Managed Service Accounts, which were introduced in Windows Server 2008 R2 and Windows 7, are managed domain accounts that provide automatic password management and simplified SPN management, including delegation of management to other administrators.
  • What's New in Networking
    This topic describes the new and changed functionality of networking in Windows Server 2012 R2. Discover new networking technologies and new features for existing technologies in Windows Server 2012. Technologies covered include BranchCache, Data Center Bridging, NIC Teaming, and more.
  • What's New in Print and Document Services in Windows Server
    This topic describes the new and changed functionality of Print and Document Services in Windows Server 2012 R2.
  • What's New in Remote Access
    A number of new Remote Access server and client features are included in Windows Server 2012 R2 and Windows 8.1.
  • What's New in Remote Desktop Services in Windows Server
    This topic describes the Remote Desktop Services functionality that is new or changed in Windows Server 2012 R2 and Windows Server 2012. The Remote Desktop Services server role provides technologies that enable users to connect to virtual desktops, RemoteApp programs, and session-based desktops. With Remote Desktop Services, users can access remote connections from within a corporate network or from the Internet.
  • Security and Protection
    This topic describes the significant changes to security technologies in Windows Server 2012 R2 and Windows Server 2012 and how those changes impact Windows 8.1.
  • What’s new in Server Manager
    In this blog post, senior Server Manager program manager Wale Martins describes the innovations and value of the new Server Manager. Server Manager in Windows Server 2012 lets administrators manage multiple, remote servers that are running Windows Server 2012, Windows Server 2008 R2, Windows Server 2008, or Windows Server 2003.
  • What's New in Smart Cards
    Smart cards and their associated personal identification numbers (PINs) are an increasingly popular, reliable, and cost-effective form of two-factor authentication. With the right controls in place, a user must have the smart card and know the PIN to gain access to network resources.
  • What's New in SMB in Windows Server
    This topic introduces the new features and functionality for Server Message Block (SMB) in Windows Server 2012 R2.
  • What's New in Storage Spaces in Windows Server
    This topic describes the features that were added to Storage Spaces in Windows Server 2012 R2, including storage tiers, write-back cache, and dual parity.
  • What's New in TLS/SSL (Schannel SSP)
    Schannel is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. The Security Support Provider Interface (SSPI) is an API used by Windows systems to perform security-related functions including authentication.
  • What's New in Windows Deployment Services in Windows Server
    A Windows Deployment Services (WDS) server running Windows Server 2012 R2 can be managed using the Windows PowerShell cmdlets for WDS. Using Windows PowerShell cmdlets, you can add driver packages, add client images, enable and disable boot and install images, and do many other common WDS tasks. For a full reference, see Windows PowerShell Support for Windows Server. Windows Deployment Services is a server role that enables you to remotely deploy Windows operating systems. You can use it to set up new computers by using a network-based installation.
  • What’s New in Windows PowerShell
    Windows PowerShell includes several significant features that extend its use, improve its usability, and allow you to control and manage Windows-based environments more easily and comprehensively.
  • What's New in Windows Server 2012 R2 Essentials
    This topic describes what's new and changed in Windows Server 2012 R2 Essentials. 
  • Active Directory Certificate Services Overview
    This content provides an overview of Active Directory Certificate Services (AD CS) in Windows Server 2012. AD CS is the server role that allows you to build a public key infrastructure (PKI) and provide public key cryptography, digital certificates, and digital signature capabilities for your organization.
  • Active Directory Domain Services Overview
    By using the Active Directory Domain Services (AD DS) server role, you can create a scalable, secure, and manageable infrastructure for user and resource management, and provide support for directory-enabled applications such as Microsoft Exchange Server.
  • Active Directory Federation Services Overview
    This topic provides an overview of Active Directory Federation Services (AD FS) in Windows Server 2012.
  • Active Directory Lightweight Directory Services Overview
    Active Directory Lightweight Directory Services (AD LDS) is a Lightweight Directory Access Protocol (LDAP) directory service that provides flexible support for directory-enabled applications, without the dependencies and domain-related restrictions of AD DS.
  • Active Directory Rights Management Services Overview
    This document provides an overview of Active Directory Rights Management Services (AD RMS) in Windows Server 2012. AD RMS is the server role that provides you with management and development tools that work with industry security technologies—including encryption, certificates, and authentication—to help organizations create reliable information protection solutions.
  • Application Server Overview
    Application Server provides an integrated environment for deploying and running custom, server-based business applications.
  • Desktop Experience Overview
    This topic includes information about Graphical Management Tools and Infrastructure, Server Graphical Shell, Desktop Experience, and Media Foundation.
  • Failover Clustering Overview
    This topic describes the Failover Clustering feature and provides links to additional guidance about creating, configuring, and managing failover clusters on up to 4,000 virtual machines or up to 64 physical nodes.
  • File and Storage Services Overview
    This topic discusses the File and Storage Services server role in Windows Server 2012, including what’s new, a list of role services, and where to find evaluation and deployment information.
  • Group Policy Overview
    This topic describes the Group Policy feature in Windows Server 2012 and Windows 8. Use this topic to find the documentation resources and other technical information you need to accomplish key Group Policy tasks, new or updated functionality in this version compared to previous versions of Group Policy, and ways to automate common Group Policy tasks using Windows PowerShell.
  • Hyper-V Overview
    This topic describes the Hyper-V role in Windows Server 2012—practical uses for the role, the most significant new or updated functionality in this version compared to previous versions of Hyper-V, hardware requirements, and a list of operating systems (known as guest operating systems) supported for use in a Hyper-V virtual machine.
  • Networking Overview
    This section contains detailed information about networking products and features for the IT professional to design, deploy, and maintain Windows Server 2012.
  • Network Load Balancing Overview
    By managing two or more servers as a single virtual cluster, Network Load Balancing (NLB) enhances the availability and scalability of Internet server applications such as those used on web, FTP, firewall, proxy, virtual private network (VPN), and other mission-critical servers. This topic describes the NLB feature and provides links to additional guidance about creating, configuring, and managing NLB clusters.
  • Network Policy and Access Services Overview
    This topic provides an overview of Network Policy and Access Services in Windows Server 2012, including the specific role services of Network Policy Server (NPS), Health Registration Authority (HRA), and Host Credential Authorization Protocol (HCAP). Use the Network Policy and Access Services server role to deploy and configure Network Access Protection (NAP), secure wired and wireless access points, and RADIUS servers and proxies.
  • Print and Document Services Overview
    This is an overview of Print and Document Services, including Print Server, Distributed Scan Server, and Fax Server in Windows Server 2012.
  • Remote Desktop Services Overview
    Remote Desktop Services accelerates and extends desktop and application deployments to any device, improving remote worker efficiency, while helping to keep critical intellectual property secure and simplify regulatory compliance. Remote Desktop Services enables both a virtual desktop infrastructure (VDI) and session-based desktops, allowing users to work anywhere.
  • Security and Protection
    The table on this page provides links to available information for the IT pro about security technologies and features for Windows Server 2012 and Windows 8.
  • Telemetry Overview
    Find out about Windows Feedback Forwarder—a service that enables you to automatically send feedback to Microsoft by deploying a Group Policy setting to one or more organizational units. Windows Feedback Forwarder is available on all editions of Windows Server 2012.
  • Volume Activation Overview
    This technical overview for the IT pro describes the volume activation technologies in Windows Server 2012 and how your organization can benefit from using these technologies to deploy and manage volume licenses for a medium to large number of computers.
  • Web Server (IIS) Overview
    This document introduces the Web Server (IIS) role of Windows Server 2012, describes new IIS 8 features, and links to additional Microsoft and community information about IIS.
  • Windows Deployment Services Overview
    Windows Deployment Services enables you to deploy Windows operating systems over the network, which means that you do not have to install each operating system directly from a CD or DVD.
  • Windows Server Backup Feature Overview
    This section provides an overview of the Windows Server Backup feature and lists the new features in Windows Server 2012.
  • Windows Server Essentials Experience Overview
    With the Windows Server Essentials Experience role, you can take advantage of Windows Server 2012 R2 Essentials features such as simplified management using the server dashboard, data protection, Remote Web Access, and integration with Microsoft online services—all without enforcement of the Windows Server 2012 R2 Essentials locks and limits.
  • Windows Server Update Services Overview
    Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates. By using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Update to computers in their network. In Windows Server 2012, this feature is integrated with the operating system as a server role. This topic provides an overview of this server role and more information about how to deploy and maintain WSUS.
  • Windows System Resource Manager Overview
    With Windows System Resource Manager for the Windows Server 2012 operating system, you can manage server processor and memory usage with standard or custom resource policies. Managing your resources can help ensure that all the services provided by a single server are available on an equal basis or that your resources will always be available to high-priority applications, services, or users.

Friday, March 6, 2015

Don't freak out over FREAK attacks.


Don't freak out over FREAK attacks. 

On Tuesday, March 3, 2015, researchers announced a new SSL/TLS vulnerability called a FREAK attack. It allows an attacker to intercept HTTPS connections between vulnerable clients and servers and force them to use weakened encryption, which the attacker can break to steal or manipulate sensitive data. Everyone thought FREAK was “only” a problem for Android, iOS and OS X users, but not current Windows OS. Microsoft on Thursday issued a security advisory acknowledging a vulnerability in all versions of Windows that could allow FREAK exploits. "The vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system. The vulnerability facilitates exploitation of the publicly disclosed FREAK technique." Windows systems previously were thought to be immune to FREAK attacks.   With this latest addition of Windows, the list of phones, tablets and other devices whose security is vulnerable to FREAK now includes almost all of them. These sites can help web site sysops test whether they’re vulnerable.

Don't freak out over FREAK attacks. Chrome for Windows and all versions of Firefox are safe. Browsers are vulnerable to the FREAK attack because of a bug that allows an attacker to force them to use weak encryption. More browsers are vulnerable to the FREAK attack than was initially thought when the attack was announced, including:
Internet Explorer
Chrome on Mac OS (Patch available now)
Chrome on Android
Safari on Mac OS (Patch expected next week)
Safari on iOS  (Patch expected next week)
Stock Android Browser
Blackberry Browser
Opera on Mac OS
Opera on Linux

You can test your browser here:
https://freakattack.com/clienttest.html

The designers of SSL created a negotiation mechanism that would identify the best cipher both parties could support, according to cryptographer Matthew Green.

Most modern clients, such as Web browsers, won't offer the export grade cipher suites, and it was believed that few servers offered those weak suites.

However, some modern TLS clients such as Apple's SecureTransport and OpenSSL have a bug that lets them accept RSA export-grade keys whether or not the client asks for them.

"The FREAK flaw allows for feasible decryption of SSL keys in hours using a man-in-the-middle proxy to trick a Web server to use weak encryption rather than the strongest available for the client browser. The attack "could be used to decrypt users' names and passwords as well as other sensitive data that users think is protected by SSL."  according to Philip Lieberman of Lieberman Software.


Mozilla.org has a configuration guide for TLS on web servers here:

Mozilla.org also has a SSL Configuration Generator here:

Thursday, February 19, 2015

GodMode in Windows

Here is a neat trick I found today for Windows 7 / 8. Create a folder anywhere and name it this:

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}

This folder will have all available options for configuring your Windoze. Kewl!

Wednesday, October 29, 2014

Access your Android device with a Browser. AirDroid!

Access your Android device with a Browser.

AirDroid!

Manage your Android from a web browser, all over the air.




Files and Media
Move photos, videos, ringtones and any other files on and off Android, all without a USB cable.

Find Phone
Locate and lock your Android when it’s lost. Cannot get it back? Simply wipe all data remotely.
Coming soon: Take a photo of the "thief" who tried but failed to unlock your device.
Manage Apps
Easier way to search for installed apps and to discover the new ones. Speedy installation and apk export.
Desktop SMS
Send and receive SMS via your current carrier from the comfort of your computer. Faster typing and navigation with the full keyboard and large screen
Camera and Screenshot
See through the lens of your Android camera, front and back. Or stream the screen of your Android in nearly real-time.

Thursday, October 23, 2014

Installing Windows 10 Technical Preview in VirtualBox

Installing Windows 10 Technical Preview in VirtualBox


I am going to install Windows 10 technical Preview as a Virtual Machine in VirtualBox.
The latest version is here:

VirtualBox 4.3.18 for Windows hosts  x86/amd64
VirtualBox 4.3.18 for OS X hosts  x86/amd64

Install VirtualBox and use the default settings if you have not done so. 

I started by downloading the Microsoft Secure Download Manager application (SDM_EN.MSI) 


Then I downloaded the ISO file (en_windows_10_technical_preview_x86_dvd_5552509). 


To set up Windows 10 in VirtualBox:

Start up VirtualBox and create a new VM using the pre-defined Windows 8 template. Select the Windows 8.1 as the version. (Choose Windows 8.1 (64bit) if you have a 64-bit ISO) Hit Next.

Set the Memory Size. The recommended figure should be fine.
I allocated 1 Gb of Ram for the x86 ISO (the 64-bit version requires 2 GB of RAM ).

I added the ISO as an virtual CD drive on the first IDE controller : 

VirtualBox creates a dynamic virtual hard drive of 25 Gigs. Accept VDI (VirtualBox Disk Image) as the hard drive file type. Choose "new virtual hard drive to be dynamically altered" or a fixed size. 

Click Create and VirtualBox will begin building the drive.

 In the Motherboard tab, make sure the box next to “Enable EFI (Special OSes only)” is checked, 
and the “Enable PAE/NX” box under the Processor tab.

Starting up I was greeted by the terms of service that told me that this was pre-release software and I should not use it in a production environment, and to back up my data. Duh! This is pre-release software and is expected to crash and to have bugsHere is some of the terms of service you agree to when you sign up for Windows Insider. To quote Microsoft:

“The Program Services include experimental and early pre-release software. This means that you may experience occasional crashes and in rare cases data loss. To recover, you may have to reinstall your applications, the operating system, or re-flash your device. Using the Program Services on some devices may impact your warranty (check with your device provider). By participating, you agree to frequently backup your data.”

Here we are asked to choose from an upgrade or custom installation. Go with custom.

And away we go:

Once the installer started up I was greeted by the settings screen. Instead of using the express settings, I decided to use the custom setting and take a peek at some of the new features in Windows 10.


We are asked if we want to allow automatic updates for our apps, use SmartScreen online services, and use Do Not Track whan useing Internet Explorer. Sure.

Do we want to use the online solutions database from Microsoft and help them make this a better OS? Sure, why not.

We are asked to adjust what data we want to share with Microsoft.

Here we are asked to sign into our Microsoft account or create a new one. I chose to create a new Microsoft account to test with.


Down at the bottom I saw "sign in without a Microsoft account". That brings up to setting up a workstation account.



Then it all went dark. And a desktop came up.


The Start menu is Back! 

Here is the Windows Features that are available: IIS Web Server, AD Lightweight Directory Services, MSMQ, CMAK, SNMP, and lots more..

Basic "About this Computer" screen with desktop icons turned on.

Here is the App Store. Lots of games.

Selecting "Top Free Apps" get the basic apps. No Chrome?

Let's install the FaceBook app just for fun..

And now it wants my Microsoft login so it can sync my content. I don't think so. Anything I tried to install from the App Store required me to have a Microsoft account. Hard Fail, Microsoft.

But Chrome installed right from www.google.com

Task Manager is still there. Whew.

There are a few warnings before you do anything to your main computer:

Back up your data first! Do a backup of any important data if you do an upgrade from Windows 7 or 8.

If you have a recovery partition on your system, it will no longer be able to use it to restore your computer to the previous version of Windows.

If you do decide to install on a stand alone PC you have handy, here are the bare metal OS specs from Microsoft:

System requirements
Basically, if your PC can run Windows 8.1, you’re good to go. If you're not sure, don't worry—Windows will check your system to make sure it can install the preview.

Processor: 1 gigahertz (GHz) or faster 

RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)

Free hard disk space: 16 GB

Graphics card: Microsoft DirectX 9 graphics device with WDDM driver

A Microsoft account and Internet access.

Important notes
Some PC processors and hardware configurations aren’t supported by Technical Preview. 
(x86 or 64 bit Only)

To access the Windows Store and to download and run apps, you need an Internet connection, a screen resolution of at least 1024 x 768, and a Microsoft account.

After you install the preview, you won't be able to play DVDs using Windows Media Player.

If you have Windows 8 Pro with Media Center and you install the preview, Windows Media Center will be removed.

The preview won’t work on Windows RT 8.1 and Windows N editions.

The preview is not available for Windows Phone.

A small number of older, 64-bit CPUs might be blocked from installing the preview.

If you're running Windows 7 without SP1, you can only upgrade to the preview by downloading an ISO file. If you install Windows 7 SP1, you can upgrade to the preview by using Windows Update or by downloading an ISO file.





Tuesday, August 26, 2014

KALI Linux 1.09 released!

The Kali Linux developers have released version 1.09 to the public. Kali Linux is a Linux distribution specifically intended for the network security and forensics professional, but makes a damn good all around OS for those who are concerned with computer security in general. Kali Linux describes itself  as a "penetration testing platform" and "the most advanced and versatile penetration testing distribution ever created."


Kali Linux contains a includes a vast collection of tools from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.

They provide several ISO files for download, in 32, 64 bit and ARM, as well as several VMWare images.

They also host the training and pen testing consultants Offensive Security. They offer:



Training  and certifications in Network Security and Penetration Testing Training:
Experience the industry’s most realistic penetration testing training and certifications. Taught by the core developers of Kali Linux, our information security traiining will immerse you into the deep-end of real world penetration testing.

Penetration Testing services:
We know penetration testing. Between Offensive Security TrainingKali Linux and the Exploit-Database, you can trust that we have the expertise, knowledge and experience to provide you with high end penetration testing services

http://www.offensive-security.com/

Kali Linux contains a vast array of tools and utilities from different niches of the security and forensics fields.

EXPLOITATION TOOLS

FORENSICS TOOLS
HARDWARE HACKING

INFORMATION GATHERING
MAINTAINING ACCESS
PASSWORD ATTACKS
REPORTING TOOLS
REVERSE ENGINEERING
SNIFFING & SPOOFING

VULNERABILITY ANALYSIS
WEB APPLICATIONS