Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide
Microsoft Corporation
Published: January 2008
Author: Brian Lich
Editor: Carolyn Eller
Abstract
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Replace these every slider sentences with your featured post descriptions.Go to Blogger edit html and find these sentences.Now replace these with your own descriptions.
Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide
Microsoft Corporation
Published: January 2008
Author: Brian Lich
Editor: Carolyn Eller
Abstract
A virus is a program that gets on your hard drive and deletes programs. One will also lock up files. Some will delete your passwords. Every virus does something different. Some viruses have weird names such as groovier, Jack the Ripper and tequila. The way the viruses are made is through programming computer programs such as COBOL, basic, c, and, Java. You should be careful when you download something from the Internet because it may have a virus. Opening E-mail can also transfer viruses. You should have an antivirus program on your computer. One example of a network antivirus program is LANDesk. Two of the more popular personal programs are McAfee and Norton. One bad virus is Sunday-1 On Sundays; the virus displays the following message:
"Today is Sunday! Why do you work so hard?
All work and no play make you a dull boy!
Come on! Let's go out and have some fun!"
The virus increases infected files by 1636 bytes.
Another example of a virus is Friday The 13th On Friday the 13th, Jerusalem loads into memory for 30 minutes, after which it deletes any file the user attempts to execute. On other days, Jerusalem slows down the computer system 30 minutes after each infection. It also wipes out an area of the screen, usually called the "black window," or "black box." A bug in the virus can cause .EXE files to be infected repeatedly until they become too large to execute.
So take care of your computer and always have a virus protection program. Always be careful when you open a floppy disk because it might have a virus. When you download anything from the internet always scan
It’s an essential task for any computer user, but it’s also pretty intimidating for most. Here’s a simple guide to backing up the data on your computer There are many reasons why you should back up your computer—possibilities of hard disk corruption or crash due to malicious programs or technical faults, accidents such as fires or thefts, and so on. However, for most users, a ‘backup’ is either inessential or too technical. It needn’t be either of these; here are guidelines you could follow to make backing up a routine task.
Mumbai: With India adding almost 8 million cell phone subscribers per month - and SMS being the largest-used service - hackers find wishing a great tool to target gullible users.
Rakshita Kolaskar (name changed) was pleasantly surprised to receive a SMS recently, announcing her as the winner of a $3 million (around Rs 12.5 corer) prize from the Shell International Mobile Draw.
The message prompted her to mail her claim and asked her to call an international number. However, when her excitement died, she tried hard to recall if she ever used any Shell product or service, as the SMS stated.
She soon realized that she had never done so. So why was this SMS sent, especially, when a Shell official confirmed that it had not issued any such award?
Welcome to the world of Wishing or voice phishing, wherein hackers are using a combination of voice over internet protocol (VoIP), SMSs and the internet to fool and redirect users into dialing a phone number and collect critical information for financial gain. In Kolaskar's case, both mobile spam and wishing were used.
Phishing-related losses have been estimated at $2.8 billion with a single victim losing $1,244 in 2006, compared with $257 in 2005, according to Gartner.
According to some recent reports, phishing attacks on banks have increased since the beginning of the year.
Globally, the first wishing attack was registered in 2006, but there have been reports that these are increasing. Earlier this year, the FBI's internet Crime Centre said it received multiple reports on different variations of wishing. These attacks against US financial institutes and individual users continue to rise.
Many feel that India is a compelling market for this kind of an attack. With almost 8 million subscribers added per month —and SMS the largest-used service —experts feel this could be the best way to target Indian users.
Rohas Nagpal, president, Asian School of Cyber law, feels that the above is a social engineering attack could be later used for a fraudulent activity or it could also be the first step towards wishing.
Security experts are of the opinion that more than the technology solutions, it is the ease of database availability from the telecom operators that is responsible for this in India. "If you go to Nehru place in New Delhi, you can get a mobile number database for a few thousands of rupees," says a security specialist.
Many feel that laws should be strengthened. Kartik Shahani, regional director, India, McAfee, says: "Everyone knows that databases are sold by network operators. One can also specify the type of database based on a user's ARPU spend. Besides, the rules and regulations on providing database access to other users are very weak in India."
He also believes that if the attack is taking place from the net, then there are solutions that can help users detect the authentic site. But in case of wishing, it becomes difficult.
Howard Schmidt, president and CEO, R&H Security Consulting and a former special advisor for cyberspace security for the White House, had told Business Standard that with the mobile usage increasing, the next wave of security threats will target handhelds.
He said: "Five years from now, the mobile will be used like we use PC and laptops today. So, the attacks will be using the data on the handheld. The problem is that while solutions are available people are not using it."
Niraj Kaushik, country manager, India and Saarc, Trend Micro, cautions that though wishing is still at a nascent stage, very few operators are providing any security solutions that can control spam on mobile handsets.
The Nigerian scam
Phishing is a common phenomenon on the internet. It is a form of internet fraud that aims to steal valuable information such as credit card details, social security numbers, user IDs and passwords for financial gains.
Several top banks in India have reportedly been hit by phishing. A popular email scam is the Nigerian scam.
The email, in this case, is sent by a prominent official from an African country asking the recipient to help him/her in depositing money into a local bank and also offers to share the bounty.
Source: Business standard
Some ways to protect your identity and your data on a public terminal Public computers, like those found in cyber cafés, hold two types of risks. First, you don’t know what programs are installed on the computer; so there’s a very real danger from malicious programs like key loggers or spyware that can capture your keystrokes to figure out passwords and other confidential information or monitor your browsing behavior. Second, over-the-shoulder peeping can enable others to find out your passwords. Moreover, you have to be extremely careful about protecting your privacy on such terminals, since you don’t know who will use the computer after you.
Here are some tips to keep yourself safe while using a computer in a cyber café (or an airport or hotel).
Always log out: While checking mail, instant messaging or using any other service that requires a username and password, remember to click ‘log out’ or ‘sign out’ when you’re done. Simply closing the browser window is not enough, because if somebody uses the same service after you, there are chances of them accessing your account. Also, don’t save your login information through options that allow automatic login. Disable such options before you logon.
Stay with the computer: While you’re browsing, you should not leave the computer unattended for any period of time. If you have to go out, log out and close all browser windows. You can start afresh when you return.
Clear history and temporary files: Internet Explorer saves pages that you’ve visited in the History folder and in Temporary Internet Files. Your passwords may also be stored in the browser if that option has been enabled on the computer that you’ve used. Therefore, before you begin browsing, do the following. Go to Tools > Internet Options in IE. Click the Content tab and then click AutoComplete. If the checkboxes for passwords are selected, deselect them. Click OK twice. After you’ve finished browsing, you should clear the History and Temporary Internet Files folders. For this, go to Tools > Internet Options again. Click the General tab and go to Temporary Internet Files. Click Delete Files and then click Delete Cookies. Then, under History, click Clear History. Wait for the process to finish before leaving the computer.
Avoid online financial transactions: You should ideally avoid online banking, shopping, or other transactions that require you to enter sensitive information like credit card or bank account details. If it is urgent and you have to do it, take the precaution of changing all your passwords as soon as you can. You should change the passwords using a more trusted computer, like at home, at a friend’s place or in office.
Be alert: Stay alert and aware of your surroundings while using a public computer. Snooping over the shoulder is an easy way of getting at your passwords; staying alerts will help you avoid this.
- JMD Computer
Bluetooth is a short range wireless digital communication technology. It was developed as a low cost, low power way of removing many of the data wires between devices. This concept is called a PAN or Personal Area Network.
The Scoop
Bluetooth can remove the wires from your printer allowing your computers or PDA to print directly to it wirelessly. It can remove the wires from your mouse, your joystick, your digital camera and can replace the cradle you drop your PDA into to synchronize your calendar. On an even more personal level, it can remove the wires between your cell phone and a hands-free headset.
Then there is the mobile Internet aspect. Why not push IP over this digital communication channel? Using a digital cell phone with Bluetooth and a Bluetooth PDA, you can wirelessly surf the internet or get your email. Sony even makes a camcorder that will surf the web over a Bluetooth cell phone using Bluetooth.
Networking
here are the facts. Bluetooth has a range of about 30 feet. It also has a maximum throughput of 1.5Mbps. Bluetooth might be good to put in a Web pad to surf the internet, but it's too slow to move good size files between your computers. A typical MP3 file is 3Mb. That would take about 20 seconds or so to move between two Bluetooth devices. In contrast, 802.11b could have moved 5-7 of those files in that time.
I believe you are going to buy a dual core processor. The main competition exists between Intel Core2 Duo and AMD Athlon X2. Intel Dual Core (not Core2 Duo) is crap and you should not go for it. Until recently, Intel was unable to compete with AMD. But with the advent of Core2 Duo Processors Intel is giving good fight to the increasing market of AMD.
You can buy processors starting from Rs.3000/- to Rs.20000/-. Now it all comes up to the investment you are going to make. If you can afford to buy best motherboard and the best processor, you would be spending a huge sum of money on something that you won’t really need at this point of time.
So find out what motherboards are available in the market (company +model name) and processor options you have. I would personally suggest you to think of Intel ... when you plan a budget, forget Intel and buy AMD. You will generally get a better deal buying a higher AMD processor in the price of Intel.
However saying that go for Intel Core 2 Duo E6850 (3.0GHz) or above if you can afford it. BUT do remember you should search for a good motherboard too. Also you need a RAM running at higher FSB. Just adding huge quantity of RAM won’t give you best performance.For LG (t2mkn)
*6861# factory reset
*8375#
#668#
*#3646633#
*0#
*3241#
*3240#
*0008# language
*0009# language
*0000# language
*7674#
*76863#
*77463#
*72337#
*79763#
*7245786# check read FFS
*762442# GVCMMI Magic
###765*02#
###765*05#
###765*08#
###765*07#
###765*78#
1945#*5101# sim lock menu
2945#*5100#
for Ericson
*#06# IMEI
<**< lock menu
>*<<*<* service menu
*#0000# fast English menu
**04*0000*0000*0000# menu without SIM
GA628
*#103# YES date and time
for Siemens
*#06# IMEI
*#0606# sim lock status
*#0003*(secret code 8 digits)# - SP unlock
*#0000# then Green button - Reset language to automatic selection
S40
*#337# - reset (without simcard)
*#06# - Soft version (with simcard) long right switch
for Philips
*#06# IMEI
*#2254*# Status register: C,BS,RR,MMI,CREAT
*#2255*# activate and deactivate the "DEBUG CALL" -Mode;
when activated, make a call to busy line on the phone will display
some hex codes on the display
*#2558*# the time in days, hours and minutes you are connected to the net
*#2562*# not clear; the phone reconnect to the net
*#2565*# not clear; warm start ?
*#3333*# (NO) blocking -list (15 items)
*#2377*# "BEER" : not clear the phone waits a random time and reconnect to net,
sometimes make reset
*#3377*# Init , Flags , SIM LOCK
*#3353*# reset the (NO) BLOCKING list
*#7378*# Name, Length, SIM phase
*#7489*# Security Code
*#7693*# you can activate and deactivate the Sleep Menu
(when deactivated the battery will go down!)
*#7787*# not clear: Spurious Interrupt
*#7948*# Switch Off: not clear: it is a timer or something
*#8463*# some information about the SLEEP MODE:
Wake, Sleep Req., Sleep
GENIE (TCD838)
*#2337*# and it will be activate the beep signal
when the phone reconnected to the net.
FIZZ
*#8377*# software version
*#1234# or *#7489# Security code
*#5644*# software version (enlarge)
*#8377*# simlock status
OZEO
*#5187*# L1TR
*#3877*# hanging mobile for a while
*#7826*# master reset
*#7626*# ?
*#7462*# to SIM PHASE 2
*#7676*# ?
for Sony
*#7465625*12*12345678#, 7465625 means SIMLOCK and 12345678 is number
that you get from the unlock program
For SIM code: *#7465625*XX*(8-digit received SIMcode)#
XX can be:
12 for NCK lock
22 for Provider lock
32 for Network lock
42 for SIM code lock
52 for Subset lock
62 for Corporate lock
72 for IMSI personal
99 for IMSI range
For WAP code: *#9275625*11*(8-digit received WAP code)#
*#06# IMEI number
*#00xx# Changes language (xx is your country code)
*#0000000# Resets language to auto selection
*#8378 *#TEST Reset your phone
*#7465625# *#simlock# -> Displays SIM lock status
*#7353273# *#release# -> Display firmware version
*#39482633# *#EXITCODE# -> Shows phone latest failure causes
*#78737322867973738# *#superfactoryreset#
-> Reset personal data (remove SIM card first)
*#73287489263373738# *#securitycodereset#
-> Reset security code to 0000 (remove SIM card first)
*#8654# Test phones keystroke
*#77343# *#PREGE# -> Activates MONITOR MODE on J5/J6
*#7669666# *#SONYMON# -> Activates MONITOR MODE on J7/70/27
*#275781# *#ASKRT1# -> Still unknown
*09*(PIN code)# -> Turns PIN code on
#09*(PIN code)# -> Turns PIN code off
here is for the samsung as requested
*#06# Show IMEI
*#9999# Show Software Version
*#0837# Show Software Version (instructions)
*#0001# Show Serial Parameters
*#9125# Activates the smiley when charging
*#0523# LCD Contrast
*#9998*228# Battery status (capacity, voltage, temperature)
*#9998*246# Program status
*#9998*289# Change Alarm Buzzer Frequency
*#9998*324# Debug Screens
*#9998*364# Watchdog
*#9998*377# EEPROM Error Stack - Use side keys to select values
*#9998*427# Trace Watchdog
*#9998*523# Change LCD contrast
*#9998*544# Jig detect
*#9998*636# Memory status
*#9998*746# SIM File Size
*#9998*778# SIM Service Table
*#9998*785# RTK (Run Time Kernel) errors - if ok then phn is reset,
info is put in memory error
*#9998*786# Run, Last UP, Last DOWN
*#9998*837# Software Version
*#9998*842# Test Vibrator - Flash the screenlight during 10 sec
and vibration activated
*#9998*862# Vocoder Reg - Normal, Earphone or Carkit
*#9998*872# Diag
*#9998*947# Reset On Fatal Error
*#9998*999# Last/Chk
*#9998*9266# Yann debug screen (Debug Screens?)
*#9998*9999# Software version
*0001*s*f*t# Changes serial parameters (s=?, f=0.1, t=0.1)
*0002*?# unknown
*0003*?# unknown
FOR NEW SGH (R210, T100, A300...)
if code is in format *#9998*xxx#
try write in this *#0xxx#
SGH-600
SGH-2100
*2767*3855# Full EEPROM Reset (THIS CODE REMMOVES SP-LOCK!
but also changes IMEI to 447967-89-400044-0
*2767*2878# Custom EEPROM Reset
SGH E700
*2767*688# remove USER CODE and SIMLOCK
For MOTOROLA
*#06# IMEI
in permanent test mode
(* hold 2 sec)
***113*1*[OK] net monitor
T205/T19x (ACER)
*#300# OK List the Software and Hardware version
*#301# OK Full Keypads functional Test
*#303# OK Set Default Language to English
*#304# OK Set OFF engineering mode
#304*19980722# OK Set ON engineering mode
*#305# OK Location: 1 OK
*#307# OK Engineering Test Mode
*#311# OK Phone code changed to default code
*#400# OK ADC, Cal val*
*#402# OK Adjust Display Intensity / Contrast
*#403# OK List the Manufacturing Informations
19980722 OK Master Unlock code for Phone and Sim Lock
*#302# OK Acoustic test*
7.1 Greeting
7.2 Main VlmGain
7.3 Input Cal
7.4 Output Cal
7.5 Side In Gain
7.6 Vox Gain
7.7 Min Mic Engy
7.8 More
(a) In Vlm Gain
(b) Aux Vlm Gain
(c) Silence Prd
(d) Supp Prd
(e) In Volume
(f) Out Volume
(g) Icon
(h) Image
(i) Animation
*3370# EFR ON (enhanced full rate)
#3370# ERF OFF
*#72837726# OK Confirm ?, Data saver
1234 OK Phone code default
*#0000# OK Setting saved, restore set phone do default language
*#0048# OK Fast change polish langpack
*#0007# OK Fast change russian langpack
MOTOROLA 3xx
*#06# and quick 'menu-key' and 048263* (Push the key quickly!)
and entering at field "OPTCODE" you must try several times.
If not working try with MOTO TEST CARD inserted.
Security code - 32*118*1*0*0
Model - 32*279*1*0*8
Flex ver - 32*383*1*0*0
Master Reset - 18*0
Master Clear - 18*1
Set band GSM 900 - 10*0*3
Set band DCS 1800 - 10*0*4
Set band PCS 1900 - 10*0*5
Set dual band GSM 900/1800 - 10*0*6
Read band - 10*1*0 => 3-GSM, 4-DCS, 5-PCS, 6-GSM/DCS
User code - 32*116*1*0*0 /coded:00310032003300340000 - 1234/
Read imei - 32*4*1*0*0 "OK" /coded:083a05092700247709 - 350907200427799/
47*4*1*0*9*081A32547698103254 => IMEI=123456789012345
it is possible to change IMEI
Please follow the instruction & you can recharge your SIM card absolutely free... Yes it is possible; see how technology can be used to make technicians fool.
I just got a mail from a friend of mine, whose friend is B.Tech. (ETC) from IIT Powai, teaching me how to reload my hand set every month for free. Engineered by a group of rebel programmers. I am going to share this to all of you.
Please follow the instructions as stated below before you start it:
Applicable for NTC Prepaid (NAMASTE), a Mero Mobile (SPICE) user only, sorry for UTL users and it is done illegally of course. But there are many things that are illegal in this world.
But then who cares. Don't worry nobody can trap you. No legal action can be taken on you for this. So go ahead without worrying.
You can only do this every 14th & 15th of the month as the network system is
under upgrade.
1. Dial “1414" using your h/phone and wait for 5 second.
2. After 5 second, you will hear some funny noise (like sound from TV when the station is finished).
3. Once the noise stops, immediately dial 9151 follow by your phone number.
4. A recorded message "please insert your pin number" will follow.
5. Punch in the pin number 011785 45227 00734" and wait for the operator finish repeating the above pin number.
6. After the pin number has been repeat, dial “0405-for NTC, 404-for SPICE".
7. You will hear a message "for air time top-up press 1723" you just have to follow the instruction.
8. After you follow the instruction, the noisy sound will re-appear for about 5 second.
9. Once the noise stop, dial "** 4455147 " follow by “146 "
10. After about 5 second, dial "** 1918 " after 3 second dial “4451 "
11. After you done that, punch in the serial number “
12. 01174452271145527" you will hear dial tone.
13. Once the dialing tone stops, dial “55524785933” you will hear “please key in your password".
14. The password is "2+253+7891*+ 546322 " wait for the message "your password accepted".
15. You will hear “please insert your emey number” now you have to be fast to dial your own h/phone number.
16. You will hear a dialing tone, when the call is answered; dial “1566” and you will hear "re-confirm emery number".
17. Once you hear that message, dial " 6011556 2245334 follow by your h/phone number".
18. After a while, you will hear a message "your pin number is accepted" you have to dial” 1007 ".
19. After you done that you will hear "your emery number is accepted".
20. Continue dial “4566” you will hear "your password is accepted".
21. Once the second message finish, immediately dial your own h/phone number.
22. Now you will receive a message saying...
*
"NOTHING IS FREE IN THIS WORLD, SO, GET BACK TO WORK AND DON'T WASTE
TIME!!"*
* Bye......... Bye......*
*don’t search 4 me to kill me... I'm busy hunting down the guy who sent me this...*
*he he.... * :-)
* Cheers!!! *