You have seen the Southeast Asia SharePoint Conference for the past 2 years…..Now, we bring you MORE:
ENGAGE • Microsoft's latest products • SharePoint 2013 • The NEW Office • Lync 2013 • Office 365
LEARN • Hand-on labs for first hand experience • Explore integration, strategy, business solutions and technical best practices
CONNECT • Expert speakers • Microsoft Personnel • Colleagues
EXTEND • Southeast Asia's biggest solution exhibition of products and services • Get more ROI on your IT investments
FULL TWO-DAY EVENT
Half-Day ONLY Business Value Keynotes
Wednesday, 16-17 January 2013 09:00 - 17:00 (Malaysia, Singapore Time)
|MAX Atria @ Singapore EXPO
|1 Expo Drive, #02-01
We are proud to announce the @Home with Windows Azure competition here in Singapore! Join us in this effort to give back to a very deserving cause, and get a solid understanding of the Windows Azure platform in the process. You will deploy an application to Windows Azure that directly contributes to Stanford University’s Folding@home effort, a distributed computing project that carries out simulations of protein folding. By simply running a piece of software, you can help scientists learn more about diseases like Alzheimer’s, ALS, Huntington’s, Parkinson’s disease and many cancers through banding together to make one of the largest supercomputers in the world.
This distributed computing project was created by Stanford University researchers to help scientists unravel the mysteries of protein folding in hopes of helping cure diseases. Started by the US East Region DPE team, The @Home with Windows Azure project allows you to contribute to it by using your MSDN subscription or by using a free 3-Month Trial subscription to harness the power of Microsoft’s cloud computing platform.
Prizes & Dates
Your first prize will be the good feeling for contributing to a good cause! Also, globally, for every deployment of the @home with Windows Azure application Microsoft will donate $10 to Stanford University’s effort (up to $5,000 maximum). You also have the chance to win one of the following great prizes that will be randomly drawn between Singapore participants that enter before 11:59pm on 15 June 2012 and leave their solution deployed until at least 11:59am on 25 June 2012.
More Detail on below Link :
Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren't logged on as an administrator, you can only change settings that apply to your user account.
1. Remove spyware, and help protect your computer from viruses
The Microsoft Windows Malicious Software Removal Tool
Remove infections by specific, prevalent malicious software, including Blaster, Sasser, and Mydoom, and helps remove any infection found.
2. Free up disk space
Use Disk Cleanup to:
• Remove temporary Internet files.
• Delete downloaded program files, such as Microsoft ActiveX controls and Java applets.
• Empty the Recycle Bin.
• Remove Windows temporary files, such as error reports.
• Delete optional Windows components that you don't use.
• Delete installed programs that you no longer use.
• Remove unused restores points and shadow copies from System Restore.
Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.
3. Speed up access to data
Run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals (weekly is optimal), there are other times you should run it, too, such as when:
• You add a large number of files.
• Your free disk space totals 15 percent or less.
• You install new programs or a new version of the Windows operating system.
4. Detect and repair disk errors
In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult or even impossible. The Error Checking utility scans the hard drive for bad sectors and scans for file system errors to see whether certain files or folders are misplaced.
If you use your computer daily, you should run this utility once a week to help prevent data loss.
Tip: Need to restart the system, to unmounts disk.
If you're using Windows 7 or Windows Vista, you can use ReadyBoost to speed up your system. A new concept in adding memory to a system, it allows you to use non-volatile flash memory—like a USB flash drive or a memory card—to improve performance without having to add additional memory.
The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains the individual troubleshooting tools and help files. It does not contain non-troubleshooting tools like the BSOD Screen Saver or NotMyFault. The Sysinternals Suite is a bundle of several Sysinternals Utilies like AccessChk, Autologon, Ctrl2Cap, DiskView, Disk Usage (DU), LogonSessions, PageDefrag, ProcessExplorer, PsLogList, PsPasswd, RegMon, RootkitRevealer, TCPView, VMMap, ZoomIt.
What's new in Sysinternals Suite 2011.12.05
- Autoruns v11.2: This update fixes a bug in the jump-to-folder function when executed on disabled items and correctly locates print monitor DLLs when they are stored in print monitor-specific system director.
- Disk Usage (DU) v1.4: This update to Du, a command line utility for analyzing the disk space consumed by directories, adds a CSV output option, accounts for the file system cluster size in its on-disk size calculations, and includes alternate data streams.
- Process Explorer v15.1: This update of Process Explorer, a Task Manager replacement, adds support for new Windows 8 features by giving the processes hosting immersive applications a distinct highlight color, shows immersive application package names in process tooltips and as a new process view column, lists AppContainer and capability SIDs in the process security properties, and updates the GPU support to be compatible with Windows 8. Other enhancements include GPU memory counters with more descriptive labels, display of the logon session ID on the security properties, and reporting of suspended processes as suspended in the CPU usage column.
- Strings v2.42: This Strings release fixes a bug that would result in a crash when the –n or -b options are specified without a file name.
Important: Internet Explorer 9 blocks non-secure content by default and is set to prompt you when this is happening. Changing this setting may make your computer vulnerable to viral, fraudulent or malicious attacks. Microsoft does not recommend that you attempt to change this setting. Modify this setting at your own risk.
To Disable/Enable/Prompt the “Only secure content is displayed” message:
- Start Internet Explorer.
- On the Tool menu, click Internet Options.
- Click the Security tab, and then click Custom level.
- In the Settings box, scroll down to the Miscellaneous section, and under Display mixed content choose from the following options:
Disable, will not display non-secure items.
Enable, will always display non-secure items without asking
Prompt, will prompt you when a webpage is using non-secure content
: Internet Explorer 9 blocks non-secure content to keep your information safe and is set to Prompt
by default. When this setting is set to Enable
, Internet Explorer does not prompt you with the "Only secure content is displayed" message even if the webpage is using non-secure elements.
Here is this year’s list:
7. abc1 23
BY John Savill
A. Windows 7 64-bit has become a lot more prevalent, with many organizations standardizing on 64-bit over 32-bit. However, you need to consider some key factors and ultimately remember that although you may want to standardize on 64-bit, some machines might still need the 32-bit version.
If you have a solid enterprise software deployment system like System Center Configuration Manager, having two images (a 32-bit and a 64-bit) shouldn't add too much complexity to the environment.
Before you can deploy 64-bit, you need to make sure the hardware supports 64-bit, which means a 64-bit–capable processor. However, most machines that are not Atom based and made within the last few years should be 64-bit processors.
To help find out if your organization’s machines are 64-bit capable, you can use the Microsoft Assessment and Planning Toolkit to gather inventory on your machines and produce readiness reports.
Assuming your machines are capable, why would you want to run 64-bit Windows? There are numerous benefits mostly around hardware capabilities:
· Ability to use more than 4GB of memory. 32-bit OSs can address only up to 4GB of memory and that includes memory used by devices like graphics cards. So even if you have only 4GB of memory installed in your machine, with a 32-bit OS you can likely see only about 3.5GB of that RAM, as the other 500MB of address space is used by other hardware.
A 64-bit OS removes this 4GB limit, supporting much more memory: up to 192GB on Windows 7 Pro and above (for a complete list of all Windows releases, see the MSDN site).
When the OS can access more than 4GB of memory it also means applications can access the additional memory if they are 64-bit applications. A good example is the 64-bit version of Office 2010, which enables very large Excel and Project files to be opened. If your machine has more than 3GB of RAM you should probably be running 64-bit Windows.
· Support for Unified Extensible Firmware Interface (UEFI. UEFI replaces the legacy 16-bit BIOS found in most machines (which was typically slow and limited to 1MB of memory, limiting its capabilities).
UEFI adds access to all memory. It supports 32-bit and 64-bit OSs, giving much faster startup and more capabilities and is found in most newer machines. UEFI also supports drives larger than 2.2TB (which when combined with GUID Partition Table (GPT) instead of Master Boot Record (MBR), which gives access to very large drives).
Only 64-bit OSs support UEFI. It allows faster initial boot and resume from hibernate in addition to supporting multicast Preboot Execution Environment (PXE) boot. More information can be found at the MSDN site.
· Additional OS integrity features. These include Hardware Data Execution Prevention (DEP) and Kernel Patch Protection, which are available only in the 64-bit version of Windows. Signed drivers must also be used for any kernel-mode driver.
So why wouldn't you run 64-bit Windows? Assuming the hardware supports 64-bit Windows, it sounds like a no-brainer—and if you look at new retail machines, most do ship with the 64-bit version of Windows.
However, for organizations, there are additional considerations that, though they may not stop 64-bit roll out, should definitely be considered.
Applications are typically a big concern for organizations considering 64-bit Windows. The good news is 32-bit applications should run great on 64-bit Windows.
The Windows on Windows 64-bit (WoW64) subsystem provides a Windows 32 bit environment that enables the execution of 32-bit code, so the fact the applications are mostly 32-bit shouldn’t pose a problem.
Still, testing should be performed. In Figure 1 below, we see a list of processes on my machine—any process with *32 next to it is actually a 32-bit program, and you can see there are many (even Internet Explorer, which we'll talk about later).
Note that 16-bit applications are a different matter, and 16-bit applications, while compatible with a 32-bit OS (thanks to a process known as thunking, which allows 16-bit code to run on a 32-bit OS) aren’t compatible with a 64-bit OS and won’t run.
If your organization has 16-bit applications or applications that use a 16-bit installer, you should find an updated version of the application or setup program that is 32-bit or 64-bit.
f there is no updated version of the application, then look at typical application compatibility solutions, such as running the application on a remote 32-bit Terminal Service/Citrix XenApp type environment or running locally in a 32-bit Windows XP virtual machine (VM) using technologies like MED-V or XP Mode.
There are a few exceptions to 32-bit code running on 64-bit OSs. Any low-level OS interfacing application such as antivirus software or a firewall or anything that installs a driver must be 64-bit.
You can’t install 32-bit drivers on a 64-bit OS, so you need to ensure you have, for example, 64-bit malware and VPN applications, and you need 64-bit drivers for all your hardware (which for any modern piece of hardware should not be a big issue).
Some applications are now providing 64-bit versions—but just because you choose to run a 64-bit OS, should you always run the 64-bit version of the application?
It would seem the answer would obviously be yes, but that's not always the case. Office 2010 is a great example, with both 32-bit and 64-bit versions available. Although the 64-bit version of Office 2010 gives the ability to access very large Microsoft Excel and Project files, it also adds some compatibility challenges as most add-ins for Office are currently 32-bit and you can’t load a 32-bit add-in to the 64-bit version of Office.
There may also be challenges calling Windows APIs from Visual Basic for Applications (VBA) within 64-bit Office. Over time, most add-ins will be available as 64-bit, but until then most organizations choose to deploy the 32-bit version of Office 2010 with 64-bit versions deployed by exception when the Excel/Project large file support is needed. You could make the 64-bit versions available using application virtualization technologies like App-V (which has full 64-bit support).
A similar situation exists for Internet Explorer (IE). You’ll notice if you run IE on a 64-bit OS, it actually runs the 32-bit version of IE as the default, as 64-bit Windows ships with both a 32-bit and 64-bit version of IE.
The reason is that most add-ins and ActiveX components for IE are 32-bit, so the same problem we faced for Office exists with IE. The easy solution is to run the 32-bit version of IE by default. If you need the 64-bit version of IE (for a really big web page), then you can manually launch the 64-bit version of IE that’s found on the Start menu as Internet Explorer (64-bit). However, realize that most add-ins won't work.
Finally, make sure you consider the differences between 32-bit and 64-bit Windows when you look at management, including your scripts and processes. With 64-bit Windows, you have additional file system locations for the storage of 32-bit applications and libraries, so when you look for programs you would need to ensure your scripts and processes know the right location to look or the target may not be found.
For example, on 32-bit Windows I would look at C:\Program Files for applications, but on 64-bit Windows I need to look at C:\Program Files (x86) for 32-bit applications.
The same applies to the registry: On 32-bit Windows I may look at HKEY_LOCAL_MACHINE\SOFTWARE, but on 64-bit Windows I need to look at HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node for 32-bit application information.
Remember you don't have to go all 64-bit. You may be able to deploy 64-bit for most machines but keep some 32-bit deployments for application or hardware requirements.
However, the majority of the environment can still take advantage of the 64-bit Windows benefits.
Update Rollup for ActiveX Kill Bits
Published: August 09, 2011
Microsoft is releasing a new set of ActiveX kill bits with this advisory.
This update sets the kill bits for the following third-party software:
CheckPoint SSL VPN On-Demand applications. Checkpoint has issued an advisory and an update that addresses vulnerabilities. Please see the advisory from CheckPoint for more information. This kill bit is being set at the request of the owner of the ActiveX control. Customers who require support should contact CheckPoint. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.
ActBar. IBM has issued an advisory and an update that addresses vulnerabilities. Please see the advisory from IBM for more information. This kill bit is being set at the request of the owner of the ActiveX control. Customers who require support should contact IBM. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.
EBI R Web Toolkit. Honeywell has issued an advisory that addresses vulnerabilities. Please see the advisory from Honeywell for more information. This kill bit is being set at the request of the owner of the ActiveX control. Customers who require support should contact Honeywell. The class identifiers (CLSIDs) for this ActiveX control are as listed in the Third-Party Kill Bits section of this advisory.
Consider the following scenario: You have an Intel CPU that supports the Advance...
Consider the following scenario:
· You have an Intel CPU that supports the Advanced Vector Extensions (AVX) feature on a computer that is running Windows Server 2008 R2.
Note: Intel introduces support for the AVX feature in the Sandy Bridge processor family.
· You install the Hyper-V server role on the computer.
· You try to start a virtual machine after you create the virtual machine on the computer.
In this scenario, you cannot start the virtual machine. Additionally, you receive an error message that resembles one of the following error messages:
An error occurred while attempting to start the selected virtual machine(s).
<virtual machine name> could not initialize
<virtual machine name> could not initialize. (Virtual machine ID <virtual machine GUID>)
Also, an Event 3040 is logged in the Hyper-V-Worker node under Applications and Services Logs that contains an error message that resembles the following:
<virtual machine name> Failed to set/change partition property
Hotfix Link: http://support.microsoft.com/hotfix/KBHotfix.aspx?kbnum=2517374&kbln=en-us
By Greg Shultz
April 20, 2011, 11:15 AM PDT
Takeaway: In this edition of the Windows Desktop Report, Greg Shultz shows you how to create and use a Password Reset Disk in Windows 7 using a USB Flash Drive rather than a CD or floppy disk.
Do you have an old 128MB or a 256MB USB Flash Drive in the back of your desk drawer gathering dust? If so, you can put that dusty old drive in your desk drawer to use again as a Password Reset Disk for Microsoft Windows 7.
(Keep in mind that the same procedure can be used in Windows Vista.)
The USB Flash Disk
Before I show you how to create a Password Reset Disk, let’s take a moment to talk about the USB Flash Drive. Now the reason that I’m spotlighting your old small capacity USB Flash Drive is that it is really too small to be of much use in today’s world due to that fact that portable storage needs are now in the GB range. However, since the Password Reset file only weighs in at 2KB it is the perfect use for an old USB Flash Drive.
To get prepared, insert your USB Flash Drive and wait for it to be initialized and assigned a drive letter. If there is any data on it, you may want to remove it. Now to make sure that the disk is in the best shape that it can be, you should format it. Right click on the drive letter in Computer and select the Format command. When you see the Format dialog box, as shown in Figure A, just click the Start button.
You should format the USB Flash Drive before you use it as a Password Reset Disk.
Creating a Password Reset Disk
Creating a Password Reset Disk is a pretty straight forward procedure. Once, the drive is ready to use, click the Start button and type User Accounts in the Start Search box. Then, press [Enter] or click User Accounts in the results panel. Either way, you’ll see the User Accounts windows and will need to locate and click Create A Password Reset Disk in the Tasks panel, as shown in Figure B.
When the User Accounts appears, click Create A Password Reset Disk in the Tasks panel.
When you see the Forgotten Password Wizard’s Welcome screen, take a look at the information and click Next. When you see the next screen, you’ll be prompted to choose your USB Flash Drive’s drive letter, as shown in Figure C. To continue, just click Next.
Choose the drive letter assigned to your USB Flash Drive.
On the next screen, you’ll be prompted to type your password, as shown in Figure D. Then, click Next.
When prompted, you’ll type in your password.
As soon as you do so, you’ll see a progress bar that will move rapidly along to 100 percent. You’ll then click Next and will see the last screen in the Forgotten Password Wizard. To complete the operation, click Finish.
You should then click the Safely Remove Hardware and Eject Media icon, choose your USB Flash Drive’s drive letter, and then when prompted to do so, remove the drive. You should then label the drive and put it away in a safe place.
Now, you may be tempted to label the drive “Password Reset.” However, since anyone who happens upon this drive can use it to bypass your password and break into your computer, I suggest a more subtle label - something that that will help you recognize the drive but that isn’t so obvious.
Using a Password Reset Disk
If you ever forget and type in an incorrect password, the login screen will change and an error message will appear like the one shown in Figure E. To continue, you will have to click OK.
At this point, the only thing you can do is click OK.
You’ll then return to the login screen and will see a message appear below Password box, as shown in Figure F. At this point, you’ll insert your USB Flash Drive and wait for it to be initialized and assigned a drive letter. Then, to launch the Password Reset Wizard, you’ll click the Reset Password message.
To launch the Password Reset Wizard, you’ll click the Reset Password message.
When you see the Password Reset Wizard’s Welcome screen, take a look at the information and click Next. When you see the next screen, you’ll be prompted to choose your USB Flash Drive’s drive letter, as shown in Figure G. To continue, just click Next.
Choose the drive letter assigned to your USB Flash Drive.
Once you select the drive, the Password Reset Wizard will open the saved file, read your saved password, and perform a few operations in the background. The wizard will then prompt you to create a new password, confirm it, as well as create a new hint, as shown in Figure H.
You’ll need to create a new password, confirm it, and create a new hint.
Once you’ve filled in the text boxes, click Next. You’ll then see the success screen and will need to click Finish to complete the operation. You can then use the new password to log on to your Windows 7 system.
As soon as you use the Password Reset Wizard to change your password, the information in the password reset file on the USB Flash Drive will be outdated. Therefore, as soon as you log back into Window, you should run the Forgotten Password Wizard again and create a new password reset file.
What’s your take?
Have you used a password reset disk in Windows before? What was your experience? Now that you can use a USB Flash Drive, do you think that the procedure will be easier?
Singapore Windows IT Pro User Group
February 2011 Newsletter
Firstly a Happy Chinese New Year to all. How’s your Hong Bao collecting so far? Here wishing all of you Gong Xi Fa Cai, money “too” much!
We are already in the second month of 2011. Looking back at 2010, we ended it with a fun filled and successful CTU II. CTU II attracts 87 attendees breaking out into 4 tracks and 16 sessions which encapsulated various technologies such as Sharepoint, Windows Azure and many others. Not forgetting Kinect which give many attendees a chance to try out the fun loving experience at the same time have a great workout session on a Saturday afternoon.
In our November meet up, we have collected feedbacks on the topic which you guys wish to hear more. We do hear more voices asking for some round-table session to share their experiences. Yes we heard you. This will serves as our guideline as we move forward in 2011. To start thing off, we are have some “light” round-table this month addressing the most fundamental yet import part of our IT infrastructure.
In Microsoft at 2011 International Consumer Electronics Show Keynote session, Steve Ballmer conclude year 2010 for Microsoft and the achievement they have meet. At the same time he addresses in year 2011 what is Microsoft pushing out. This is a 1 hour keynote session that none of you should missed. Wait no more and start clicking here.
Just a little teaser for march meet up, do look out for our March newsletter as we are arrange for some interesting topic for March meet up. Also take note that we will be shifting back our meet up for March. More detail in March newsletter, so stay tune.
February Meet Up Agenda
Date: 23th February 2011 (Wednesday)
Time: 7.00pm to 9.30pm
Venue: 1 Marina Boulevard #21-00,MS Singapore – Auditorium
7.00pm: Session 1 – Round-table discussion on how to design an Active Directory Domain (ADDS 2008 R2) Part I
8.15pm: Toilet/Stretching Break
8.30pm: Session 2 – Round-table discussion on how to design an Active Directory Domain (ADDS 2008 R2) Part II
9.30pm: Home Sweet Home
Session 1 & 2 – Round-table discussion on how to design an Active Directory Domain (ADDS 2008 R2)
Active Directory Domain Services is identified as the fundamental piece of component that other Microsoft Products rely on. For our coming Feb SWUG session, we will do a round-table session where we can discuss on how to design an Active Directory Domain.
During the session, we welcome everyone to share their experience on setting up an Active Directory Domain too.What we wish to achieve is that we can learn from each other especially on the do and don’t while setting up an Active Directory Domain.
For registration, please email to firstname.lastname@example.org with the following:
- SWUG ID
- Email Address
Note: There won’t be an event confirmation. Just turn up, we don’t turn people away. However, please register if you’re coming.
- February Meet Up Agenda
- Tips on Automating and Managing the Breadth of Your IT Environment
- Deploying, Virtualizing and Managing Linux with Hyper-V
- 10 Hot Topics Every IT Admin Needs to Know
- Mysteries of Windows Memory Management Revealed
- Advanced Group Policy Management 4.0
- Windows Power Management Deep Dive: The Need for Green!
Your friendly Windows Group leaders
More Posts Next page »