TECHNOLOGY INSPIRATION
Technology-People-Innovation

February 2014


Moving the "My Documents" folder to another drive or partition in Windows XP is easier than you think (Not applicable to Vista)
 

Most folks use the My Documents folder to keep all their personal data. Unfortunately, this folder is by default located on the C: drive, the same drive that contains the Windows operating system.

Storing these two things together on the same drive is not a great idea for several reasons. Here are just two:

First, your personal data is very likely to be growing in size while Windows is not. In this era of multi megapixel digital photos you are in real danger of filling up your C: drive. This progessively degrades Windows performance. Sooner or later you'll fill up the disk and have to make more space by deleting some of your personal files or get into the complex and problem- fraught exercise of increasing the size of your primary disk partition.

Second, it complicates backup. Your personal data is changing all the time while the Windows operating system changes much less frequently. That means your personal data needs to be backed up more frequently than Windows. With both on the same drive you'll end up making very large drive images and having to create them more frequently as well. Similar comments apply to disk defragmentation. Mixing your personal data with Windows increases the need for defragging and results in a slower defrag.

Nope, leaving your My Documents folder on the C: drive is like storing your washing powder with your vegetables. Quite possible, but not a great idea.

Now, many folks have only a single partition of their hard drive; that is, their only hard drive is their C: drive. These folks can't move their My Documents folder. They could of course re-partition their drive but that's a complex issue I'm not going to address here.

If you do have two or more partitions on your hard drive, or if you have more than one hard drive, it's quite easy to move your My Documents folder to another drive or partition.

You will, however, need enough free space on the second drive/partition to accommodate all your documents. To find out, go to My Computer and click on View/Details and make a note of the free space available on each partition or drive. Make sure you don't get confused by your CD drive. You can't move your My Documents folder there!

While still in My Computer, right-click on My Documents and select Properties. After a few seconds you should see the folder size shown. If two figures are shown with one in brackets, note the larger figure. That's the amount of disk space you will need.

Now make a decision which drive you'd like to move the My Documents folder to. Make sure there is enough disk space. Let's say you selected the D: drive.

Click on the Start button and then right-click on My Documents and select Properties. If there's no My Documents in your start menu then right click on the My Documents icon on your desktop instead.

When you've clicked on properties, select "Move" and then navigate to your D: drive. Select the drive letter and then click "Make New Folder." Enter "My Documents" as the folder name and hit Enter and then OK. Windows will then ask you whether you want to move your documents; click Yes.

Moving your documents make take some time. Once moved, though, you can access them normally from the "My Documents" icon on the desktop or elsewhere.

In the process you'll free up a lot of room on your C: drive. Defrag the drive so it can be utilized by Windows in the most effective manner.

For more information you can consult this Microsoft document: http://support.microsoft.com/?id=310147

The ideal time to relocate the My Document folder and other system folders is when you have just bought a new PC and have yet to load your data or applications. It's something to bear in mind when you get your next PC.

Ever try to delete, move, or rename a file only to get a Windows system warning with something like one of these messages?

  • "Cannot delete file: Access is denied"
  • "There has been a sharing violation"
  • "The source or destination file may be in use"
  • "The file is in use by another program or user".
  • "Make sure the disk is not full or write-protected and that the file is not currently in use"

One of the best ways to handle locked files or folders is to use the free Microsoft program Process Explorer. The program has been described in another article and here is how to use it to find out what program, DLL, or handle is using a file or folder. You will need to run as administrator.

How to find out what program is using a file

In Windows 7 or 8, the system message may tell you what program is using the file. If it doesn’t or if you are using Windows XP, there is a simple way to find the program:

  1. Open Process Explorer, running as administrator.
  2. On the toolbar, find the gunsight icon on the right (shown highlighted in the figure shown below).
  3. Drag the icon and drop it on the open file or folder that is locked.
  4. The executable that is using the file will be highlighted in the Process Explorer main display list.

How to find out which handle or DLL is using a file

  1. Open Process Explorer, running as administrator.
  2. Enter the keyboard shortcut Ctrl+F. Altenatively, click the “Find” menu and select “Find a Handle or DLL”.
  3. A search dialog box will open.
  4. Type in the name of the locked file or other file of interest. Partial names are usually sufficient.
  5. Click the button “Search”,
  6. A list will be generated. There may be a number of entries.
  7. An individual handle in the list can be killed by selecting it and pressing the delete key. However, care is necessary when deleting handles, as instabilities may occur. Often, just rebooting will free a locked file.

These days malicious software is becoming an epidemic. It seems like it’s everywhere. Also, sadly, there's been a change in the way malware acts. It used to be that it would slow down your computer, or display annoying popups, but now malware is becoming increasingly discreet. You could be infected right now and not even know it. Also, sadly, it often seems as if the only way to make sure you’re not infected is to scan your computer with numerous anti-malware programs. Doing this can be time consuming and, while scanning, may even slow your computer to a crawl. Even after that you still can’t be sure you're clean. This is because scanners cannot recognize all new malware.

 

Because of these difficulties I have come up with a better method. This uses multiple programs, not to remove files, but just to analyze the computer. Each of these programs is very effective and easy to use. They are all portable applications and will not cause any conflicts on your computer because they are only running when you're using them. However, they do require an active internet connection to function properly. Don't worry, this guide will also help you to fix your internet connection in the event that it is not working. After you have already gone through the below process once, and had all files whitelisted, this approach is much faster, much more certain, and much easier than any other approach I've seen. No active malware can escape this process. However, inactive pieces of malware may not be flagged by this approach but may be found by other scanners. Rest assured that these are not direct threats to the safety of your computer and thus do not constitute a failure of this article.

 

This article is meant for those who believe it's possible, but are not sure, that malware is running on their computer. If you strongly believe that malware is running on your computer I would advise that you immediately reboot the computer into Safe Mode and follow the advice in this sectionof my article about How to Clean An Infected Computer. The reason I say that is that some malware will immediately start doing things such as encrypting files. Thus, the longer your computer is running in normal mode the greater the damage will be. However, if you only have fleeting suspicious that something may be amiss on your computer I recommend that you follow the below advice to find out for sure.

 

I also want to stress that in order to make sure that your computer is not infected you must follow each step. None is meant to be used independently. Each depends on the others to account for different infection scenarios. Also, if any step shows definite evidence of an infection you should move directly to the section which explains How To Clean Infections From Computer. There is no reason to continue your investigation if your computer is already found to be infected.

 

Index

1. What To Do If Computer Is Unbootable

2. Check for Rootkits

3. Use KillSwitch

    A) Use KillSwitch To Investigate Running Processes

    B) Analyze KillSwitch Results

    C) Submit Unknown Files Which Are Probably Safe To Comodo For Whitelisting

4. Use Comodo Autoruns

    A) Use Comodo Autoruns To Investigate Registry Entries

    B) Analyze Comodo Autoruns Results

    C) Submit Unknown Files Which Are Probably Safe To Comodo For Whitelisting

5. How To Clean Infections From Computer

 

1. What To Do If Computer Is Unbootable

 

Note that if your computer is able to boot into Windows you should skip directly to the next section. However, if your computer is not able to boot into Windows I would first advise that you follow the advice I give in this section of an article I wrote about How to Fix a Malware Infected Computer. It may be able to help make your computer bootable again. Then, once it's fixed, you can begin following the advice in the next section to see if your computer is infected.

 

Note that if the advice in that section of the other article is not able to fix your problems you should not follow part D in that article, but instead follow the advice given in this section of an article I wrote about How to Clean An Infected Computer. It's possible that the reason that your computer cannot boot is because of malware. Thus cleaning it may be the only way to get the computer running again.

 

2. Check for Rootkits

 

It's important to ensure that there are no active rootkits on your computer. To do this first scan your computer with Kaspersky TDSSKiller. It can be downloaded from this page. Note that if the executable version is not working correctly you should instead download the zip file containing the same scanner. At this same time download the zip file for Comodo Cleaning Essentials from this page.  Make sure to select the correct version for your operating system. If you're not sure if your computer is running a 32 or 64 bit operating system then please see this FAQ. Note that if neither will not download correctly, or your internet connection is not working, you should download them on another computer and transfer them to the infected one via a flash drive. Make sure there were no other files on the flash drive. Be careful with the flash drive as the malware may actually infect it when you plug it into the computer. Thus, don't plug it into any other computers after transferring these programs.

 

Kaspersky TDSSKiller will scan your computer for some of the most common types of rootkits. I've found it to have relatively few false positives and a very high detection rate. By the way, some scanners, including Comodo Cleaning Essentials, may detect this file as a dangerous file. It is not. This is a safe download link. If it is flagged as dangerous you can safely ignore the detection. As with every program in this article, I recommend that you do not quarantine any files using this program. A false positive on the wrong file could destroy your computer, even if you’re not infected.

 

To use this it open the file called TDSSKiller. Then select the option to “Start Scan”. This scan should take less than a minute. If it does find anything then it's likely that your computer is infected. However, if you believe the detected files are not dangerous you can investigate them to see if they are false positives. However, if it does appear that the files are dangerous I would suggest that you skip to the last section of this article in order to deal with this infection. However, if it does not find any rootkit activity then you should next check your computer with Comodo Cleaning Essentials.

 
Unzip the folder for CCE. Then double click on the file called CCE. This will open the main program for Comodo Cleaning Essentials. If it refuses to open then hold down the shift key and, while still holding it down, double click on the file called CCE. After CCE has successfully opened you can let go of the shift key. However, do not let go of it until the program has fully loaded. If you let go of it even during the UAC popup it may not be able to forcefully open correctly. Holding down shift should allow it to open, even on heavily infected computers. It does this by killing most of the unnecessary processes that could be interfering with its launch. If it still will not launch then download and run a program called RKill. This can be downloaded from this page. This program will terminate known malicious processes. Thus, after running it CCE should be able to open fine. Do not remove or disable anything with CCE as it can be very dangerous if used improperly. We are only using its analytical abilities. Please do not use it to try and clean up any infections or you could inadvertently harm your computer.
 

Now select the option to do a smart scan with CCE. It will immediately begin downloading the most recent virus database, which may take a long time to complete. Once it has completed downloading, the scan will begin immediately. This will scan your computer for all types of malware.  The scan should not take too long to complete. As before, I recommend that you do not quarantine any files using this program. One problem with this program is that I do find it to have a few false positives. Thus the best option, in order to be sure of the results from its scan, is to report any files detected as dangerous, which you believe may be safe, to Comodo for analysis.

 

Sadly there is no easy way to navigate to the files detected by the scan. You will have to manually navigate to the path indicated in the scan results in order to get to them. Note that if you do not want to investigate them right now you can select the option to ignore each detection. Then allow finish and restart your computer. Next time you open CCE you can go to "Tools" and choose "Browse logs". The detections you chose to ignore, along with their file paths, should be stored in the most recent log. To report the detected files as false positives you should go to this page. Then select false positive, upload the files in question, fill out the required information, and select submit. Comodo analysts will send you an email with the results of their analysis.

 

This program also scans for system changes which may have been caused by malware. These will also be shown with the results. If you did not make these changes yourself then this could possibly be evidence that there is malware on your computer. I would recommend letting CCE fix these items, but not anything else, and continuing with the rest of the article to see if there is any more evidence of infection. I would not consider unwanted system modifications to be definitive evidence of an infection.

 

After the scan is complete it will ask you to restart your computer. Allow it to restart. Do not open any unnecessary programs as this will make the next step simpler. Once again I will remind you to not quarantine any files with this program. Once it restarts it will pop up with the final results. If it did not find anything, and neither did any of the above methods, then you can continue on to the next step. However, if it did find infections, and Comodo analysts also found them to be malicious, then I would advise that you skip to the last section in order to clean the infections.

 

Also, if your internet connection was not working please check again to see if it is now working. If not then you should go to this section of my guide about How to Fix a Malware Infected Computer and follow the advice given to fix your internet connection. A working internet connection is required for the remaining steps of this guide.

 

3. Use KillSwitch

 

A) Use KillSwitch To Investigate Running Processes

If the above steps did not find any malware activity then you should again open Comodo Cleaning Essentials (CCE). However, this time you should go to "Tools" and select the option to "Open KillSwitch". KillSwitch which will immediately begin analyzing all of your running processes. This analysis should only take a minute or so. Without waiting for the analysis to complete you can go to “View” and select “Hide Safe Processes”. This will hide all processes that are verified to be safe by Comodo. The reason I asked you not to open any other programs in the above step is because malware will nearly always run on system startup, while many legitimate programs will not. Thus there will be fewer processes to examine.

 

Once the analysis is complete all that are left are those programs which are either believed to be dangerous or are not in Comodo's whitelist. The latter type is denoted as FLS.Unknown. Be aware that unknown does not mean dangerous. It only means that the file has not yet been whitelisted by Comodo.

 

B) Analyze KillSwitch Results

If KillSwitch now shows that “There are no items to show”, then your computer passed this part of the tests. You can move on to part 3. However, if there are files remaining in the list then you should investigate them. In order to do this you first need to navigate to the files. To do this right click on the process in question and select “Jump to Folder”. This will open up the folder where the associated file is located and select the file as well.

 

For files which are flagged as dangerous or suspicious, but which you believe may actually be safe, I would recommend that you report them as a false positive on this page. Just select false positive and fill out the required information. Comodo analysts will get back to you by email with the results of their analysis. In this way you can easily find out for sure if the files really are dangerous or not.

 

However, for those files which you think may be dangerous, but are only flagged as FLS.Unknown, you can check them yourself by following the methods discussed in my article about How to Tell if a File is Malicious. Also, if this verdict does in fact indicate that the files are likely safe, you can then submit them for addition to the Comodo Whitelist by following the advice given in part C.

 
C) Submit Unknown Files Which Are Probably Safe To Comodo For Whitelisting

For those files which are flagged as FLS.Unknown, but which you believe are probably safe, the most efficient way to analyze them is to submit them to Comodo for whitelisting. Instructions for how to submit programs, or individual files that belong to programs, can be found in this topic of the Comodo forum. Make sure you read through the first post entirely and follow all recommendations. This will ensure that your request is completed as quickly as possible. However, do note that in order to submit programs, or files, you do need to have an account on the Comodo forums. If you don't already have one then it's very easy to get one. There is an option to register on the top of any page on the Comodo forums. Also, if you cannot locate the folder indicated in the KillSwitch results that may be because some folders are hidden by default by Windows. To tell Windows to show you those folders please follow the advice on this page.

 

These submissions will be analyzed by Comodo staff and, if appropriate, added to the whitelist. However, do note that it may take the analysts days, or even a few weeks, to complete their analysis. This all depends on how many submissions they are also trying to analyze. If you feel that you cannot wait for their analysis then you also have the option of analyzing them manually by following the advice I give in How to Tell if a File is Malicious.

 

That said, the greatest advantage to the whitelisting approach is that you won't have to do any analysis of your own and the next time you check your computer the files will already be whitelisted and nothing will need to be done. In fact, you submit all the safe programs on your computer for whitelisting then, once they're whitelisted, the next time you scan with KillSwitch there should not be any more unknown processes for you to examine. Thus, it becomes an incredibly easy task to ensure that your computer is still clean of infections. In fact, my computer always shows a completely blank screen after selecting the option to “Hide Safe Processes”. This allows me to ensure that my system has passed this test in less than one minute. Please note that depending on your computer, and your internet connection speed, this time may vary. Once you're done with this part you can close KillSwitch.

 

4. Use Comodo Autoruns

 

A) Use Comodo Autoruns To Investigate Registry Entries

Now, through CCE, which should still be open, again go to the "Tools" menu. This time select the option to "Open Autorun Analyzer". This program will analyze the registry and show you the files associated with each item. Almost all malware will write to the registry. Thus, by scanning for all files associated with registry entries, this program can identify malware and unknown files, even if they aren't running. It may even be useful in identifying rootkits, although that is not its primary purpose. The downside to using this program is that it will potentially give you more files to check than the above methods. However, if you really want to be sure that your computer is clean then this step is also necessary. As before, do not delete/disable anything with this program as it can be very dangerous if used improperly. We are only using its analytical abilities. Please do not use it to try and clean up any infections or you could inadvertently harm your computer.

 

After Comodo Autoruns opens it will immediately begin compiling the list. This process could take a couple of minutes to complete. Without waiting for the list to finish being compiled you can go to “View” and select “Hide Safe Entries". Note that this option will now be pre-checked every subsequent time you run the program. Once the list is compiled Comodo Autoruns will automatically begin analyzing each entry. Wait until all entries have been analyzed. If this is the first time you have run this program, you should now close it and then open it again. I find that this often allows Comodo time to analyze some of the unknown files so that this time there will be less to check.

 

If Autoruns now shows that “There are no items to show” your computer passed this part of the tests. If it also passed all of the above steps then there is definitely no active malware on your computer.

 

If your computer passed all of the above steps, but you are experiencing problems with your computer, it's possible that the problem that you're experiencing is due to hardware or software issues. I would recommend that you first try searching online for symptoms similar to what your computer is suffering from to see if they match something other than malware. Also, an article I have written about How to Fix a Malware Infected Computer may be of use to you. It was written mainly to fix probelms due to malware, but the advice given should be able to fix many other types of software problems as well.

 

B) Analyze Comodo Autoruns Results

However, if there are still entries left over you should begin analyzing them. However, note that there is currently a minor bug with Comodo Autoruns. This sometimes causes the program to flag files which are actually known safe as FLS.Unknown. Thus, I would advise that if you see many files flagged as unknown, which you believe should be flagged as safe, that you close Comodo Autoruns and then open it again to see if the files are still unknown.

 

Also, note that you can make sure the virus database is fully up to date by always running a Smart Scan with CCE just before checking with Comodo Autoruns. This makes this problem much more rare. However, if you have previuosly run a Smart Scan and let the computer restart, and nothing was found, you do not need to have it restart just to make sure the virus database is fully updated. Just let the scan finish, and then, instead of letting it restart the computer, first close the results window without selecting any actions. Then right click on the CCE icon in the taskbar and choose exit. This will close the process and not allow it to restart your computer. You can then safely re-open CCE and use it to open Comodo Autoruns.

 

To get to the files which these entries are associated with, right click on an entry and select “Jump to Folder”. This will open up the folder where the associated file is located and select the file as well. Also, with this program you will find that often a single file has numerous entries, which means that often there’s not nearly as much analysis to be done as there would seem to be.

 

Just as was done for KillSwitch, for files which are flagged as dangerous or suspicious, but which you believe may actually be safe, I would recommend that you report them as a false positive on this page. Just select false positive and fill out the required information. Comodo analysts will get back to you by email with the results of their analysis. In this way you can easily find out for sure if the files really are dangerous or not. Also, if you cannot locate the folder indicated in the results that may be because some folders are hidden by default by Windows. To tell Windows to show you those folders please follow the advice on this page.

 

However, for those files which you think may be dangerous, but are only flagged as FLS.Unknown, you can also check them yourself by following the methods discussed in my article about How to Tell if a File is Malicious. Also, if this verdict does in fact indicate that the files are likely safe, you can then submit them for addition to the Comodo Whitelist by following the advice given in part C.

 

C) Submit Unknown Files Which Are Probably Safe To Comodo For Whitelisting

For those files which are flagged as FLS.Unknown, but which you believe are probably safe, the most efficient way to analyze them is to submit them to Comodo for whitelisting. Instructions for how to submit programs, or individual files that belong to programs, can be found in this topic of the Comodo forum. Make sure you read through the first post entirely and follow all recommendations. This will ensure that your request is completed as quickly as possible. However, do note that in order to submit programs, or files, you need to have an account on the Comodo forums. If you don't already have one then it's very easy to get one. There is an option to register on the top of any page on the Comodo forums. Also, if you cannot locate the folder indicated in the Autoruns results that may be because some folders are hidden by default by Windows. To tell Windows to show you those folders please follow the advice on this page.

 

These submissions will be analyzed by Comodo staff and, if appropriate, added to the whitelist. However, do note that it may take the analysts days, or even a few weeks, to complete their analysis. This all depends on how many submissions they are also trying to analyze. In addition, if you feel that you cannot wait for the analysis of Comodo staff then you also have the option of analyzing them manually by following the advice I give in How to Tell if a File is Malicious.

 

That said, the greatest advantage to the whitelisting approach is that you won't have to do any analysis of your own and the next time you check your computer the files will already be whitelisted and nothing will need to be done. In fact, you submit all the safe programs on your computer for whitelisting then, once they're whitelisted, the next time you scan with Comodo Autoruns there should not be any more unknown processes for you to examine. Thus, it becomes an incredibly easy task to ensure that your computer is still clean of infections. In fact, my computer always shows a completely blank screen after selecting the option to “Hide Safe Entries”. This allows me to ensure that my system has passed this test in just a few minutes. Please note that depending on your computer, and your internet connection speed, this time may vary.

 

5. How To Clean Infections From Computer

 

If any of these methods does show that your computer is infected you should check out my article about How to Clean An Infected Computer. The advice in this article will allow you to remove almost any infection and get your computer back to working order.

 

 

 

 

If you have any problems, or are confused by my directions, please leave a comment below and I will try to help. Trust me, if you are having a problem then so are many others. I need to know this so that I can improve the article and make it usable for everyone. Also, and this is especially important, if you find a situation in which none of these methods shows evidence of an infection, but the system is definitely infected, please let me know. I have seen no evidence of this happening, but if I do receive proof of a bypass then I will need to rethink my strategy

Here are some tips that can help you in making the most out of wireless connectivity on Windows 8 platform.
Connecting to a wireless network in Windows 8 is far less painful than it was in Windows 7. However, a few things that should be easy and obvious are in fact a bit tricky. 

You may be having problems connecting to a wireless network in Windows 8, or find that you're regularly entering PEAP credentials each time you want to get online. You might find that your device connects to the wrong wireless network, or simply want to use it as a wireless hotspot. 

While none of these things are clear from day to day use of Windows 8, they are, however, easily done - once you know how. 

Connecting to a wireless network in Windows 8 

We'll start with the basics - how do you connect to a wireless network in Windows 8?

By default, most new Windows 8 computers will be set to connect to wireless networks automatically as the operating system boots. As such, you should see an alert informing you that a network has been found; an open network will be connected to, with Windows asking you how you wish to treat the connection (as a trusted, "home" network or as a less secure option, "work"). Secure networks will require authentication, of course. 

What if Wi-Fi isn't already enabled in Windows 8? 

Begin by swiping in from the right to open the Charms bar and select Settings. Here you should see an icon labelled Unavailable, with a red circle and cross accompanying a typical wireless network symbol. Tap this, and switch Wi-Fi to On in order to prompt the computer to check the nearby network connections. When you're ready to go online, tap a network name and then Connect, adding any further information (such as WEP, WPA or PEAP authentication) when prompted.

If you would rather do things the old-fashioned way, open the desktop view and browse to Control Panel > Network and Internet > Network and Sharing Center > Setup a new connection or network > Manually connect to a wireless network. 

Changing the priority of Wi-Fi networks natively 

As you may have noticed, there are various things from Windows 7 that didn't make it through to Windows 8. One of these was a wireless network manager, enabling you to prioritise a particular wireless network to connect to if several were listed. In Windows 8 this isn't possible within the user interface (neither the mouse driven traditional desktop view, nor the "Modern" touch menu), so the default action is to skip tapping the Connect automatically, making the whole connection process a lot more manual. 

Fortunately, there is a way around this that doesn't rely on third party tools (although some are available).

Begin by switching to the Start screen and typing command to search for the Command Prompt tool (simpler to use than you might think); in Windows 8, this will be listed twice, Command Prompt and Command Prompt as Administrator. Choose the second option, agreeing with the user access warning. In Windows 8.1, the search results will simply list Command Prompt once - you'll need to right-click and select Run as administrator to continue. 

At the prompt, enter: netsh wlan show profiles 

The resulting list will show all wireless networks detected to date by your Windows 8 machine, those you've connected to and some you have not. You'll probably also notice that your preferred network isn't at the top of the list. 

Using the interface and profile names, you can resolve this.netsh wlan set profileorder name="[WIRELESS_NETWORK_NAME]" interface="Wi-Fi" priority=1For instance, if I wanted "citadel" to be my preferred connection, I would enter: netsh wlan set profile order name="citadel" interface="Wi-Fi" priority=1Note the use of the "priority" condition, which can be used throughout the list to specify a preferred second, third and fourth connection; as many as are required. 

To confirm your change has worked, use the netsh wlan show profiles command again. You should now see that your preferred network is listed first. 

Use third party tools to set preferred wireless networks 

If the steps above seem too much like the dark arts to you, then you might prefer the Wi-Fi Profile Manager 8 donationware app, available free online from The Windows Club. If you're not sure what donationware is, our guide to researching free software should explain.

Wi-Fi Profile Manager 8 offers tools that allow you to: 

View the preferred network profiles, change list order, export to XML, import from XML and remove profiles.

This useful app is an executable and can be quickly run (as opposed to installed), enabling you to set a primary wireless profile by right-clicking and selecting Make Default. Other profiles can be repositioned in the list using the Move Up and Move Down options in the same menu, and older profiles discarded with Remove. 

Remember PEAP authentication in Windows 8 

Protected Extensible Authentication Protocol is a modern wireless networking protocol that offers improved security over WEP and WPA. It is supported in Windows 8, but unlike the more widely used WEP and WPA, connecting to a wireless network using PEAP requires you to enter your username and password and the intended domain each time you connect. 

This is, of course, inconvenient. Fortunately, Windows 8 can be configured to save your PEAP Wi-Fi connection details. 

Open the Charms menu to begin, select the PEAP network connection and right-click to display the context menu; choose View connection properties to continue, displaying Wireless Network Properties. From here, open Security > Advanced Settings. 

On the 802.1x tab, put a check in the box to activate Specify authentication mode and ensure that the User authentication option is selected, followed by Replace/Save credentials. Following this, enter the network credentials, click OK and then reconnect - you won't need to update these details again! 

Turn Windows 8 into a wireless hotspot 

What about sharing your Windows 8 computer's Internet connection? Can you turn a Windows 8 device into a wireless hotspot? 

Well, as a matter of fact, yes you can. Using Connectify - available from www.connectify.me/download in free and premium ($25/year, $40/lifetime) versions - you can set up your Windows 8 computer as a wireless hotspot, sharing Ethernet, Wi-Fi or even connections from a 3G/4G dongle!

Once installed (you'll need to reboot your PC afterwards), all you need to do is create a name for the hotspot, specify the connection you're sharing and generate a password, before clicking Start Hotspot. Anyone nearby will then be able to use your computer as a wireless hotspot to gain access to the Internet. You can also use Connectify to create ad hoc local networks for file sharing between computers! 

Note that there are other tools; however, Connectify is the best option we've found for this so far. 

Maximise Windows 8's wireless networking capabilities 

Some of you reading this might be thinking "why doesn't Microsoft include all of these tools and features as standard within the desktop or modern user interface?" After all, mobile devices can be turned into wireless hotspots with native software, so why not PCs? 

The answer, of course, lies somewhere between "don't know" and "Microsoft provide a platform for developers to fill in the gaps." However, the fact that Windows 7 includes the ability to easily prioritise a particular wireless network over others, while the same feature in Windows 8 can only be accessed via the command line, is one that can leave you perplexed.

Here are some handy tips to share MS Office documents on your Windows Phone with SkyDrive.
One of the main benefits of Microsoft Office Mobile on Windows Phone is the presence of SkyDrive, and the various sharing options available. In fact, you can be remarkably productive with the slimmed down versions of Word, Excel, PowerPoint and OneNote! 

We previously looked at Microsoft Office Mobile and Office 365, and the different ways in which Word, Excel, PowerPoint and OneNote can be used on a Windows Phone device. 

However, we overlooked the real strength of the integration - SkyDrive. Thanks to improvements in SkyDrive and Microsoft's browser-based version of Office, you can start a project on your phone, pick it up in the browser on a hot desk PC and finish it off on your desktop computer. 

All of this is without sending a single email! 

Opening and creating documents in Office Mobile 

Office tasks on Windows Phone start in the Office Hub, available from the apps list. It can also be added as a shortcut on your Start screen.muo-wp8-office-skydrivePlaces is the first screen you will see, where documents stored on your phone, any open email attachments and access to SkyDrive and Office 365 (if you have a subscription) are available. 

SkyDrive is the important element here, as this will give you access to any existing documents saved to your Microsoft cloud storage service.(Be aware that although PowerPoint documents can be viewed and edited on Windows Phone, they cannot be created.) 

Write and sync a report, article or spreadsheet with Microsoft Office Mobile 

The best thing about all of this is that it takes place in the background - once an article is created or edited, syncing occurs behind the scenes. For anyone who used Microsoft Office Mobile with the old Windows Mobile platform, this is clearly a massive improvement! 

Opening an existing document on your SkyDrive is easy - swipe to SkyDrive, then scroll to the document you want and tap it to open. You can then spellcheck, reformat and do anything you need! 

To create and sync any work you're doing in Microsoft Word Mobile, first ensure your phone is connected to the Internet via Wi-Fi or 3G/4G. Open the menu, tap Save or Save as..., enter a filename and select where you want to save the file to. In order to make a file available on SkyDrive you'll need to select this option. 

Note that if you're creating a new Word file, three templates - Agenda, Outline and Report - are available to help you save time. Similarly, Excel has three templates: Budget, Event schedule and Mileage tracker. 

Accessing your Office documents in SkyDrive 

A Windows Live account has come a long way since the days of Windows Messenger. Now that Hotmail, Windows Live and others have been unified under the Outlook banner, online email, calendar and contact management, cloud storage with SkyDrive and browser-based office apps are available in one package. 

Documents created on Windows Phone and saved to SkyDrive can be easily opened by signing into SkyDrive.com with the same Microsoft account you use on your phone and finding the file in your cloud storage account. This can then be launched in your browser via Edit Document > Edit in Word or Edit in Word Web App. Similar options are available for Excel.muo-wp8-office-edit-browserIf you have Office 2013 installed on your PC, the document can also be opened from SkyDrive using the integrated tool in Windows Explorer navigation pane. Do you have an Office 365 subscription? If the computer you're using doesn't have Office installed, you can open the document in a temporary version of Word, Excel or PowerPoint on a suitably-equipped PC running Windows 7 or later. 

Make Notes with OneNote 

We'll avoid spending too much time on OneNote - our recent guide Five Ways To Use Microsoft OneNote On Windows 8 covers this in far more detail - but be aware that SkyDrive is the real power behind OneNote on all devices.muo-wp8-onenote-todoAs long as you have a network connection, OneNote can sync to its browser based version as well as any post-Office 2010 releases (including OneNote MX on Windows 8).The potential of this setup is obvious, so if you are going to use any Microsoft Office Mobile app on Windows Phone or any other mobile platform, make sure it is OneNote. After all, I use it as a major part of my mobile working when there's no laptop around, and it's arguably a better mobile word processor than Word itself! 

SkyDrive makes mobile productivity on Windows Phone work! 

There are other sharing options for Microsoft Office Mobile documents on Windows Phone; Tap+Send (NFC) is one option, as is any email account you have set up. If you are a corporate user with access to SharePoint, meanwhile, this is also a choice. 

SkyDrive is really the sauce that makes using a Windows Phone for office productivity worth the effort. Gone is the wooden USB syncing of old, there is no necessity to email documents and basically - to borrow a phrase from Apple - it just works. 

In fact, despite its slow start and bad reputation, I would contend that SkyDrive is one of the few success stories of modern Microsoft. It certainly adds to Windows Phone.

Several charging covers are available for other Android phones and for many Nokia phones, like the Lumia 1020. 
As personal devices proliferate - smartphones, wearable fitness bands, Kindles, tablets, smartglasses - our charger collections are starting to look like the electrical outlet in the movie "A Christmas Story." 

Wireless charging to the rescue? Not quite. The concept has been caught in a slow-moving standards war. 

That's not to say wireless charging capabilities aren't starting to creep into devices. Google's Nexus 4 and Nexus 5 phones and Nexus 7 tablet support wireless charging, and Google even makes its own wireless charger with the Nexus name. The Motorola Droid Maxx supports wireless charging, while a few other Android phones sort of do: the LG G2 only offers it on the Verizon model, and Samsung Galaxy S4 owners can spend $90 on an official wireless charging back cover and pad. 

Several charging covers are available for other Android phones and for many Nokia phones, like the Lumia 1020. There's even a new, Indiegogo-funded wireless charging kit for iPhone, called the iQi. 

So, interest is growing, but why don't more devices have wireless charging capability built in? The primary reason is, like so many things in tech, conflicting standards. Until last week, there were three separate groups pushing wireless charging standards. And phone, tablet and wearable makers are hesitant to tie their devices to a specific charging tech. 

The Wireless Power Consortium backs the Qi (pronounced "chee") standard used in the iQi and in the accessories mentioned above, as well as the Nexus line. Qi is arguably the wireless charging leader, and support for the specification is built into some 400 devices from almost 200 different companies. 

If you've seen Powermat chargers in Starbucks and McDonald's, those support the Power Matters Alliance standard. A third specification comes from Alliance for Wireless Power (A4WP), which has Qualcomm as a founding member. Last week, though, the alliance and A4WP announced a merger, bringing the three major standards-bearers down to two. 

Confused yet? 

The two organizations employ similar, but not identical magnetic charging technologies: A4WP's newer resonance charging lets you charge multiple devices on a single charging pad without worrying too much about where they're placed. The alliance, on the other hand, uses inductive charging, which requires more precise placement for a device to charge properly. 

Qi chargers use the more restrictive inductive charging, but the consortium showed off resonance charging devices at International CES in Las Vegas in January, and the standard supports the more flexible charging technique. 

But other companies hope to sidestep the standards slog with their own innovations. The Israeli startup Humavox is pushing a new, wireless charging technology based not on magnetic induction, but on radio frequency. Its Eterna platform employs an extremely tiny receiver, originally designed for hearing aids, and a transmitter that can work in any kind of charging receptacle, from a pad to a bowl to a portable charging box. 

Humavox wants to license its technology, rather than build products. But it's been showing off prototype devices including one it calls a "Nest," which is basically a small white bowl into which you can casually toss a jumble of fitness bands and phones and charge them in about the same amount of time as a charging cable. 

The technology seems promising as a demonstration, primarily because the idea of tossing devices into a bowl for charging is endlessly appealing. But as with all platforms, success depends on adoption. Humavox says it's working with a few partners making semiconductors and health-related devices, but consumer brands are still slow to come around. 

It's hard to say whether Humavox's entry will make things even more confusing or give manufacturers a good option. At least one other company, Ossia, is working on a wireless charging technology that uses radio frequencies, and there may be more in the works. 

So for now - and please pardon the pun - wireless charging is still as tangled as the cords next to my bedside table.

According to PC World, users can also upload files to Dropbox via 'upload here' option on the app's pull-down menu.
WASHINGTON: Cloud storage services like Dropbox, Google Drive and SkyDrive allow users the freedom to easily share files between their Android smartphone and Windows PC, all without the need for a USB cable. 

Dropbox in Android doesn't automatically sync all of the files in its appointed folder as it does in Windows but users can download files from its app to the mobile phone or tablet's local storage. 

According to PC World, users can also upload files to Dropbox via 'upload here' option on the app's pull-down menu. 

The cloud storage service can also be used to automatically send photos from Android phone to PC by enabling the Camera Upload option. 

Users can also transfer local music collection without a cable, using the local Wi-Fi network, the report added.

Here comes a software that can identify malicious apps, especially available on Google Play Store, by checking their behaviour against patterns of known attacks.
Here comes a software that can identify malicious apps, especially available on Google Play Store, by checking their behaviour against patterns of known attacks.

Named 'Chabada,' for every app, it analyzes the description of the app's functionality detailed in the app store.

"Apps whose functionality is described in the app store should behave accordingly. If that is not the case, they are suspect," said Andreas Zeller, professor of software engineering at Saarland University in Germany who invented this software.

Using program analysis, Chabada detects which data and services are accessed by the Apps.

"Like travel apps normally access the current location and a server to load a map. So a travel app secretly sending text messages is suspicious," explained Zeller.

The researchers applied this approach on 22,521 apps from the Google Play Store.

With a purpose-built script, they downloaded 150 most popular apps in 30 categories from Google Play Store.

'Chabada' then analyzed them. Finally, computer scientists investigated the 160 most significant outliers to verify Chabada's selection.

The result: It detected 56 percent of the existing spy apps without knowing their behaviour patterns beforehand.

Downloaded onto a smart phone, the malware installed other programs which secretly sent text messages to expensive premium services.

"In the future, 'Chabada' could serve as a kind of gatekeeper, ensuring that malicious apps will never make it into an app store," explained Zeller.

Google has also already invited Zeller and his colleagues to have Chabada analyze the whole Google App Store.


New Server and Control Panel Names

At R we're continually evolving and growing to provide you with nothing less than an extraordinary experience. As part of our effort, we've made many improvements to our products and how you interact with them. We need a way to let you know where you are and what you're working with, so here are the new names for our Cloud Control Panels and Cloud Servers:

  • The New Cloud Control Panel is named New Cloud Control Panel, or simply, the Cloud Control Panel.
  • The existing Cloud Control Panel is now called Classic Cloud Control Panel.
  • Our new Cloud Servers are called next generation Cloud Servers Powered by OpenStack, or justnext generation Cloud Servers.
  • Existing Cloud Servers are now called first generation Cloud Servers. In the New Cloud Control Panel, a blue asterisk follows the name of each of your first generation Cloud Servers. 

You'll see these new names throughout this article and as soon as you log into the New Cloud Control Panel.

Quick Access to Rackspace Products

You can work with the any of the supportelike products by clicking the product name located at the top of the New Cloud Control Panel. The product names run along the top of the page and look like this:

One click and you'll be in the product workspace where you can begin managing your cloud resources. By popular demand, you'll notice that DNS now has its own dedicated workspace where you can manage DNS settings for all of our products. 

Organizing and Finding Your Cloud Resources

Several exciting new features help you organize, find, and efficiently manage your resources no matter the size or shape of your cloud inventory.

Tags

Tags let you add customized labels to any of the assets that make up your cloud infrastructure. They're completely flexible, so there's no limit to how many tags you create or how you assign them. For example, you could distinguish your servers by their functional role, a certain website association, a specific technology, or even by geographical location.

If you hover your mouse over a first generation Cloud Server, you'll also see the first generation Cloud Server tooltip.

Filters

Our new filters help you find all assets that share these common properties: Tag, Status, Image, RAM, Region, and Type. When you create and tag assets, the filters are automatically populated. When you click a check box next to a filter, the list of assets shows only the matching assets.

Here's an example of what the filters might look like for Cloud Servers:

You'll notice that tags are also included in the list of filters. This gives you a powerful yet simple way to find only the specific assets you want to work with. For example, you could filter your list of servers to show all 2 GB Cloud Servers that you've tagged as production. Using the Status filter, you can drill down even further and find the servers that are currently Running, Offline, or have a different status. 

Search

With a convenient and fast new search field in the upper right corner of each asset listing (servers, files, and load balancers) you have yet another method for locating any asset, merely by entering part of the asset name, tag, or IP address in the search field. 

Using tags, filters, and search, your cloud inventory can grow to any size and you'll still be able to promptly locate and manage any asset.

Performing Administrative Actions

We've added a variety of new ways to perform administrative tasks. It doesn't matter if you're currently looking at a list of assets or a detailed view of a single asset. There's no need to switch screens or leave your current location to perform a task; every task you might want to perform is right where you need it.

The Actions Cog, Actions Menu, and the Edit Pencil

  • When viewing resouces in a list, click the actions cog to the left of the asset name and you'll find a drop-down menu with all available actions for that asset. The actions cog is always part of every list, whether it's a list of servers, files, or load balancers. The following screenshot shows the Actions cog drop-down menu for a first generation Cloud Server named 1TestVyatta:

  • If you're looking at the details of a specific asset, you'll find the Actions drop-down menu in the upper right corner of the page. Again, all the actions you can perform on the asset are easily accessible. 

  • You'll also see that you can edit an existing setting for a resource by clicking the edit pencil that appears next to the asset description. For example, you could resize this server, change the image, or add a record by selecting the option that appears after the description for each setting:

Pop-overs

Whenever you perform an administrative action on an resource, you'll instantly see a pop-over that lets you modify the settings or perform an action without taking you to another screen. This makes modifying an asset much faster since you don't have to wait for the page to reload. Here's an example of the Reboot Server pop-over accessed from the server list for a first generation Cloud Server called 1TestVyatta:

Accessing the Classic Cloud Control Panel

You can reach the Classic Cloud Control Panel from the user account drop-down menu located in the upper right corner of the page. The user account menu is labeled with your Rackspace Cloud account user name. From this menu you can access billing information, API Keys, and usernames/contacts. It looks like this:

Additional Enhancements

Our goal is to make using the Rackspace Cloud as easy as possible by providing a full-featured Control Panel that lets you do your job, and never gets in your way. In the near future you'll see additional enhancements and new features in the New Cloud Control Panel, so check back frequently for more information.

As always, we'd love for you to send us your feedback!

This article will address how to prepare and install Active Directory Domain Services (AD) on Windows Server 2008 R2 Enterprise 64-bit (W2K8).

This article is not intended for adding a Domain Controller (DC) to an already existing Active Directory Forest Infrastructure.

Preparation for Active Directory

Installing Active Directory Domain Services on a Rackspace Cloud Server is a relatively easy process. There are a few requirements that must be present first to ensure a smooth installation however.

  1. Have your domain name selected and the Domain Administrator Password that you wish to use handy.
    Note: Though it is not a requirement, It is recommended you use a multiple name format for you domain name. Example would be, domainName.com or domainName.local rather than simply domainName. 
    W2K8 can properly install and configure DNS during the AD installation if it knows that DNS is to be local.
    This is accomplished by having the Private network adapter’s Preferred DNS server address point to the already assigned IP address of the same Private network adapter.
  2. Select View Network Connections within the Server Summary of Server Manager.

    2K8_64R2_ADDS.jpg

  3.  Right click on the Private adapter and select Properties. Or Double click the Private adapter and select Properties.

    2K8_64R2_ADDS(1).jpg

  4. Double click Internet Protocal Version 4, or select it and click Properties.

    2K8_64R2_ADDS(7).jpg

  5.  Copy your assigned IP address: displayed in the top box into the Preferred DNS server: box and click “OK”.

    2K8_64R2_ADDS(2).jpg

  6.  Click OK again for the private Properties and close the Network Connection window.
    Note: The last step for prepping W2K8 for AD is adding the proper Server Role. The “Active Directory Domain Services” Role will be added. This only installs the framework for W2K8 to become a DC and run AD. It does not promote the server to DC or install AD.
  7. To add the “Active Directory Domain Services” Role click on the Role Directory within Server Manager and select Add Roles in the Roles Summary.

    2K8_64R2_ADDS(3).jpg

  8. In the Properties area of the Local Servers page, click Remote Management, and then check theEnable remote management of this server from other computers box.
  9. Click Next in the Before You Begin section.

  10. Now simply check the Active Directory Domain Services box, click Next twice, then click Installand finally Close when complete.
    2K8_64R2_ADDS(4).jpg2K8_64R2_ADDS(5).jpg2K8_64R2_ADDS(6).jpg

 

Installation of Active Directory Domain Services (DCPROMO)

Now that the Server has been prepared the installation of AD we can proceed. You now have three different ways we can begin the installation.

  1. Within Server Manager, if you expand the Roles directory you will see the Active Directory Domain Services directory. Select that and you will find in the Summary “Run the Active Directory Domain Services Installation Wizard (dcpromo.exe)” Simply click that to begin the installation.
    2K8_64R2_ADDS(8).jpg
  2. The comandline equivilant to Active Directory Domain Services Installation Wizard is - Servermanagercmd.exe –I ADDS-Domain-Controller

  3. The last and probably the most recognized method is typing DCPROMO.exe at the command prompt. 
    2K8_64R2_ADDS(9).jpg
    Whichever way you choose, You should get to this point. Simply click Next. You do not check advanced mode.
    2K8_64R2_ADDS(10).jpg

  4. Click Next again.
    2K8_64R2_ADDS(11).jpg

  5. Select Create a new domain in a new forest and click Next.
    2K8_64R2_ADDS(12).jpg

  6. Enter the domain name you have chosen.
    2K8_64R2_ADDS(13).jpg

  7. After the installation verifies that the NetBIOS Name, choose the Forest function level. (The example below reflects selcting 2008 R2.) 
    2K8_64R2_ADDS(14).jpg

  8. Click Next.
    Note: It will examine and verify you DNS setting. DNS server should already be checked.

  9. Click Next
    2K8_64R2_ADDS(15).jpg
    Note: You will now be prompted with the following message. This is OK.

  10. Click Yes
    2K8_64R2_ADDS(16).jpg

  11. Click Next Again. 
    2K8_64R2_ADDS(17).jpg

  12. Enter your Domain Administrator Password that you chose. This is not your Admin Password that emailed to you during the creation of you Server, unless you want to use it. It is your decision. 2K8_64R2_ADDS(18).jpg

  13. Click Next
    2K8_64R2_ADDS(19).jpg

  14. The installation will now complete. You can check the Reboot on completion box, if you prefer.
    2K8_64R2_ADDS(20).jpg

  15. If you did not check the Reboot on completionbox, you will need to click Finish. Then restart your server.
    2K8_64R2_ADDS(21).jpg

  16. After a few minutes, reconnect to your server via the Console in your Control Panel or RDP.

  17. To log in, you will need to select Switch User, then Other User. Type in your full domain name you picked followed by a back slash and Administrator for user. Then enter the password that was emailed to you when you first built the server. If you had already changed your password for the local admin account to this server before your began the install for AD, use that password.

    2K8_64R2_ADDS(22).jpg

This completes the installation of your Active Directory Domain Controller.

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget