RE: [info-tech] Imaging Software

2007-07-03 Thread Rex Peterson
 to
the original 1GB size. 


Conclusion


For a home user or an administrator with just a few systems, the
GParted-Clonezilla live CD is an excellent tool for managing disks. It can
save you several hours when preparing new disks or migrating partitions from
one disk to another. It's also a fantastic way to move a partition that's
not around free space into a bigger partition without much fuss.

But bear in mind that both GParted and Clonezilla are dangerous utilities.
To get comfortable with them, consider trying them out on a virtual machine
with virtual disks and virtual partitions and no critical data. Unless you
want to simply duplicate partitions or disks, you'll need to play with the
advanced parameters. Because the Clonezilla project makes virtually no
documentation available, I also suggest you make a cheat sheet for yourself
as you go along using the app, listing the advanced parameters to choose for
particular operations. This is useful if you regularly need to repeat a
particular type of partitioning task, such as cloning partitions and moving
them to bigger ones on another disk

 

 

Thanks!
Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8 
[EMAIL PROTECTED]
1235 5th Ave South 
Fort. Dodge, Ia. 50501
1-515-574-5559 
1-800-669-2325 Ext.5559

 

This email and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you are not the named addressee you should not disseminate, distribute or
copy this e-mail. Your are asked to notify the sender immediately by e-mail
if you have received this e-mail by mistake and delete this e-mail from your
system. Please note that any views or opinions presented in this email are
solely those of the author and do not necessarily represent those of Prairie
Lakes Area Education Agency. Prairie Lakes Area Education Agency accepts no
liability for any damage caused by any virus transmitted by this email.

 

  _  

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Frerichs, Chad
Sent: Tuesday, July 03, 2007 1:37 PM
To: info-tech@aea8.k12.ia.us
Subject: RE: [info-tech] Imaging Software

 

I was looking at using some free stuff as well. No use paying for something
that can be done for free, right? There are a couple I was considering on
the Ultimate Boot CD. I want to be able to do multiple machines at once.
Like a whole lab or so. There is one on the Ultimate Boot CD called UDPcast
which is supposed to be faster, and then there is g4u (Ghost for Unix) which
uses ftp and I have used before but when you do too many machines it really
slows down. Thanks for the suggestions and keep them coming if there are
more.

 

Thanks, 

 

Chad Frerichs

Network Administrator

Okoboji Community Schools

Milford, IA 51351

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Pearson, Jeremy
Sent: Tuesday, July 03, 2007 1:27 PM
To: info-tech@aea8.k12.ia.us
Subject: RE: [info-tech] Imaging Software

 

Fort Dodge does all of our imaging with RIS.  Gotta like free stuff.

 

We have looked to upgrading to the BDD 2007 from Microsoft, but haven't made
it that far yet.  It is still free.

 

 

 

 

___
 
Jeremy Pearson
Network Administrator / Computer Technician
Fort Dodge Community School District
104 South 17th Street
Fort Dodge, Iowa 50501
 
 
https://www.fort-dodge.k12.ia.us/exchweb/bin/redir.asp?URL=http://www.fort-
dodge.k12.ia.us/ http://www.fort-dodge.k12.ia.us
 
(515)574-5676 voice
(515)574-5324 fax

 

  _  

From: [EMAIL PROTECTED] on behalf of Keith Stoeber
Sent: Tue 7/3/2007 1:07 PM
To: info-tech@aea8.k12.ia.us
Subject: Re: [info-tech] Imaging Software

I use Ghost.

Keith

Keith Stoeber
4440 U.S. Hwy 71
Sioux Rapids, Iowa 50585
Phone:  712-283-2571
Fax:  712-283-2285
[EMAIL PROTECTED]




-- Original Message --
From: Lance Lennon [EMAIL PROTECTED]
Reply-To: info-tech@aea8.k12.ia.us
Date:  Tue, 3 Jul 2007 11:36:00 -0500

Ghost for the PC
-- 
The most likely way for the world to be destroyed, most experts 
agree, is by accident. That's where we come in; we're computer 
professionals. We cause accidents.
 ~Nathaniel Borenstein
--
Lance L. Lennon
District Technology Director
Eagle Grove Community School District
515-448-5143





  
---
[This E-mail scanned for viruses by the sioux-central.k12.ia.us server.]

---
[This E-mail scanned for viruses by Declude Virus on the server
aea8.k12.ia.us]

-
Archived messages from this list can be found at:
http://www.mail-archive.com/info-tech@aea8.k12.ia.us/
-



RE: [info-tech] Script

2006-12-18 Thread Rex Peterson
Hey Tony 

 I hope this is what you are looking for .. Here is the link where I found
it

http://www.microsoft.com/technet/scriptcenter/scripts/default.mspx?mfr=true

 

 

 

strComputer = .

Set objWMIService = GetObject(winmgmts: _

 {impersonationLevel=impersonate}!\\  strComputer  \root\cimv2)

 

Set colScheduledJobs = objWMIService.ExecQuery _

(Select * from Win32_ScheduledJob)

 

For Each objJob in colScheduledJobs

Wscript.Echo Caption:   objJob.Caption

Wscript.Echo Command:   objJob.Command

Wscript.Echo Days of Month:   objJob.DaysOfMonth

Wscript.Echo Days of Week:   objJob.DaysOfWeek

Wscript.Echo Description:   objJob.Description

Wscript.Echo Elapsed Time:   objJob.ElapsedTime

Wscript.Echo Install Date:   objJob.InstallDate

Wscript.Echo Interact with Desktop:   objJob.InteractWithDesktop

Wscript.Echo Job ID:   objJob.JobID

Wscript.Echo Job Status:   objJob.JobStatus

Wscript.Echo Name:   objJob.Name

Wscript.Echo Notify:   objJob.Notify

Wscript.Echo Owner:   objJob.Owner

Wscript.Echo Priority:   objJob.Priority

Wscript.Echo Run Repeatedly:   objJob.RunRepeatedly

Wscript.Echo Start Time:   objJob.StartTime

Wscript.Echo Status:   objJob.Status

Wscript.Echo Time Submitted:   objJob.TimeSubmitted

Wscript.Echo Until Time:   objJob.UntilTime

Next

 

Thanks!
Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8 
[EMAIL PROTECTED]
1235 5th Ave South 
Fort. Dodge, Ia. 50501
1-515-574-5559 
1-800-669-2325 Ext.5559

  _  

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Richardson,Tony
Sent: Monday, December 18, 2006 9:30 AM
To: info-tech@aea8.k12.ia.us
Subject: [info-tech] Script

 

Hello all,

 

Does anybody have a VBScript that would detect if a scheduled task already
exists on a Windows PC? I tried the internet but must not be asking the
right search questions.

 

Thanks,

Tony Richardson

Technology Coordinator

Humboldt Community School District

[EMAIL PROTECTED]

 



RE: [info-tech] USB Drives

2006-12-08 Thread Rex Peterson
Hi Tony

 The DOD was having problems with locking down their Laptops and USB drives
access. The DOD solution was to super glue the USB ports shut.

 

Thanks!
Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8 
[EMAIL PROTECTED]
1235 5th Ave South 
Fort. Dodge, Ia. 50501
1-515-574-5559 
1-800-669-2325 Ext.5559

  _  

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of George Tuttle
Sent: Friday, December 08, 2006 10:27 AM
To: info-tech@aea8.k12.ia.us
Subject: RE: [info-tech] USB Drives

 

Tony,

 

What are you using the usb drives for. That makes a lot of
difference when coming up with a solution.

George

 

  _  

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Richardson,Tony
Sent: Friday, December 08, 2006 10:04 AM
To: info-tech@aea8.k12.ia.us
Subject: [info-tech] USB Drives

 

I'm going to throw this out there in hopes that somebody has a solution.

 

I would like to know how other Tech Coordinators are dealing with USB drives
on locked down systems.  There are so many different USB thumb drives out
there and some will not work on a locked down system because students are
not allowed to load software. Any body got a solution???

 

Thanks,

Tony Richardson

Technology Coordinator

Humboldt Community School District

[EMAIL PROTECTED]

 



[info-tech] Net neutrality

2006-06-09 Thread Rex Peterson
CNET News.comhttp://www.news.com/
House rejects Net neutrality rules

By Declan McCullagh
http://news.com.com/House+rejects+Net+neutrality+rules/2100-1028_3-6081882.h
tml

Story last modified Thu Jun 08 20:23:45 PDT 2006


The U.S. House of Representatives definitively rejected the concept of Net
neutrality on Thursday, dealing a bitter blow to Internet companies like
Amazon.com, eBay and Google that had engaged in a last-minute lobbying
campaign to support it.

By a 269-152 vote that fell largely along party lines, the House Republican
leadership mustered enough votes to reject a Democrat-backed amendment that
would have enshrined stiff Net neutrality regulations into federal law and
prevented broadband providers from treating some Internet sites differently
from others.

Of the 421 House members who participated in the vote that took place around
6:30 p.m. PT, the vast majority of Net neutrality supporters were Democrats.
Republicans represented most of the opposition.

At issue is a lengthy measure called the Communications Opportunity,
Promotion, and Enhancement (COPE) Act, which a House committee approved in
April. Its Republican backers, along with broadband providers such as
Verizon and ATT, say it has sufficient Net neutrality protections for
consumers, and more extensive rules would discourage investment in wiring
American homes with higher-speed connections.

The concept of network neutrality, which generally means that all Internet
sites must be treated equally, has drawn a list of high-profile backers,
from actress Alyssa Milano to Vint Cerf, one of the technical pioneers of
the Internet. It's also led to a political rift between big Internet
companies such as Google and Yahoo that back it--and telecom companies that
oppose what they view as onerous new federal regulations.

As the final House vote drew closer, lobbyists and CEOs from both sides
began stepping up the pressure. eBay CEO Meg Whitman e-mailed more than a
million members, urging them to support the concept, and Google CEO Eric
Schmidt on Wednesday called on his company's users to follow suit.

Defenders of the COPE Act, largely Republicans, dismissed worries about Net
neutrality as fear mongering.

I want a vibrant Internet just like they do, said Rep. Lamar Smith, a
Texas Republican. Our disagreement is about how to achieve that. They say
let the government dictate it...I urge my colleagues to reject government
regulation of the Internet.

The debate over Net neutrality had become more complicated after earlier
versions of the COPE Act appeared to alter antitrust laws--in a way that
would have deprived the House Judiciary Committee of some of its influence.
In other news:

But in a last-minute compromise designed to placate key Republicans, the
House leadership permitted an amendment (click for PDF) from Smith that
would preserve the House Judiciary Committee's influence--without adding
extensive Net neutrality mandates. That amendment to COPE was approved.

While the debate over Net neutrality started over whether broadband
providers could block certain Web sites, it has moved on to whether they
should be permitted to create a fast lane that could be reserved for video
or other specialized content.

Prohibiting that is not a road we want to go down, but that's what the
Markey amendment would do, said Rep. Marsha Blackburn, a Tennessee
Republican. The next thing is going to be having a secretary of Internet
Access (in the federal government).


Thanks!
Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8 
[EMAIL PROTECTED]
1407 Tower Drive 
Fort. Dodge, Ia. 50501
1-515-574-5559 
1-800-669-2325 Ext.5559

---
[This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us]

-
Archived messages from this list can be found at:
http://www.mail-archive.com/info-tech@aea8.k12.ia.us/
-


[info-tech] Windows XP-on-Mac contest declares winner

2006-03-16 Thread Rex Peterson

CNET News.comhttp://www.news.com/
Windows XP-on-Mac contest declares winner

By Ina Fried
http://news.com.com/Windows+XP-on-Mac+contest+declares+winner/2100-1046_3-60
50431.html

Story last modified Thu Mar 16 10:26:37 PST 2006

A Macintosh enthusiast has apparently managed to load Windows XP on an Intel
Mac, nabbing a nearly $14,000 prize.

For some days, there has been discussion that the person who goes by the
handle narf had managed the technically challenging feat. Photos were
posted on Flickr, and much debate ensued. However, narf's method had to
prove replicable before the contest was officially ended.

On Thursday, though, the contest ended, and a winner was declared.

Contest has been won--updates to follow shortly, reads a short message on
the contest's Web site.

The contest, which has been running since just after Apple Computer
announced the first Intel-based Macs, collected donations from individuals
and companies to raise the prize money.

Although both Macs and Windows PCs now use Intel chips, the task of loading
Windows on the Intel Macs has proved more complicated, in part because both
use different means of booting up. There had been hope that the next version
of Windows would make things easier, but an Apple executive last week said
booting Vista on Macs may not prove that easy, either.

The win comes just ahead of an end-of-month deadline that would have seen
the money go instead to the Electronic Frontier Foundation.

The effort was launched by Colin Nederkoorn, who put up $100 of his own
money, hoping his new Intel Mac would be able to replace his Windows PC.
According to the rules, his Web site now has the rights to publish the
solution. The solution appears to be available for download, though traffic
to the site was heavy Wednesday.

An Apple representative was not immediately available for comment.


Copyright C1995-2006 CNET Networks, Inc. All rights reserved.

Thanks!
Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8 
[EMAIL PROTECTED]
1407 Tower Drive 
Fort. Dodge, Ia. 50501
1-515-574-5559 
1-800-669-2325 Ext.5559







---
[This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us]

-
Archived messages from this list can be found at:
http://www.mail-archive.com/info-tech@aea8.k12.ia.us/
-


[info-tech] Mac hacking competition winner mocks Apple security

2006-03-07 Thread Rex Peterson












This story was printed from ZDNet UK, located at http://news.zdnet.co.uk/




Story
URL: http://news.zdnet.co.uk/software/mac/0,39020393,39256036,00.htm






Mac
hacking competition winner mocks Apple security
Munir Kotadia
ZDNet Australia
March 07, 2006, 10:00 GMT 



Gaining root access to a Mac is easy
pickings, according to an individual who won an OS X hacking challenge
last month by gaining root control of a machine using an unpublished security
vulnerability.

On 22 February, the Sweden-based Mac enthusiast set up
his Mac Mini as a server and invited hackers to break through the computer's
security and gain root control, which would allow the attacker to take charge
of the computer and delete files and folders or install applications.

Participants were given local client access to the
target computer and invited to try their luck.

Within hours of going live, the rm-my-mac
competition was over. The challenger posted this message on his Web site:
This sucks. Six hours later, this poor little Mac was owned, and this
page got defaced.

The hacker who won the challenge, who asked ZDNet UK sister site ZDNet Australia to identify him only as
Gwerdna, said he gained root control of the Mac in less than 30 minutes.

It probably took about 20 or 30 minutes to get
root on the box. Initially, I tried looking around the box for certain
misconfigurations and other obvious things, but then I decided to use some
unpublished exploits  of which there are a lot for Mac OS X,
Gwerdna told ZDNet Australia.

According to Gwerdna, the hacked Mac could have been
better protected, but it would not have stopped him because he exploited a vulnerability
that has not yet been made public or patched by Apple.

The rm-my-mac challenge was set up similar to
how you would have a Mac acting as a server  with various remote
services running and local access to users... There are various Mac OS X-hardening
guides out there that could have been used to harden the machine, however, it
wouldn't have stopped the vulnerability I used to gain access. There are only
limited things you can do with unknown and unpublished vulnerabilities. One is
to use additional hardening patches  good examples for Linux are the PaX
patch and the Grsecurity patches. They provide numerous hardening options on
the system and implement nonexecutable memory, which prevent memory-based
corruption exploits, Gwerdna said.

Gwerdna concluded that OS X contains easy
pickings when it comes to vulnerabilities that could allow hackers to
break into Apple's operating system.

Mac OS X is easy pickings for bug finders. That
said, it doesn't have the market share to really interest most serious bug
finders, Gwerdna added.

OS X has come under fire in recent weeks with the
appearance of two pieces of malware and a number of serious security flaws,
which have since been patched by the Mac maker.

In January, security researcher Neil Archibald, who
has already been credited with finding numerous vulnerabilities in OS X, told
ZDNet Australia
that he knows of numerous security vulnerabilities in Apple's operating system
that could be exploited by attackers.

The only thing which has kept Mac OS X
relatively safe up until now is the fact that the market share is significantly
lower than that of Microsoft Windows or the more common Unix platforms... If
this situation was to change, in my opinion, things could be a lot worse on Mac
OS X than they currently are on other operating systems, Archibald said
at the time.

An Apple Australia representative said on Monday that
the company was unable to comment at this stage. Representatives at Apple's Cupertino, California,
headquarters could not be reached for comment.





Have a great day!




Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8 
[EMAIL PROTECTED]
1407 Tower Drive

Fort. Dodge, Ia. 50501
1-515-574-5559 
1-800-669-2325 Ext.5559












RE: [info-tech] XP question

2004-09-02 Thread Rex Peterson
Hi Jon
I believe you would use C:\Documents and Settings\Default User folder
which is hidden by default. Tools  folder Options  View  Hidden files and
folders select show hidden files and folders. Then copy the Map drive to the
NetHood folder. Then each user will receive the map drive when they log on
the first time since they will use the default user profile. But hey I could
be wrong.

Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8
[EMAIL PROTECTED]
1407 Tower Drive
Fort Dodge, Iowa 50501  


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of JON W HUESER
Sent: Thursday, September 02, 2004 12:02 PM
To: [EMAIL PROTECTED]
Subject: [info-tech] XP question

My brain must be dead because I can't figure this out.  I need to be able to
map a network drive on XP so that all kids get that drive (for our PAWS
software).  If I map it when I login, it only appears for me.   

How do I map a network drive in XP for all users to use? 


--
Thanks,
Jon W. Hueser
Comp/Tech. Coord.
East Greene Comm. Schools
405 12th Str. South
Box 377
Grand Junction, IA  50107
Phone:  515-738-2411 ext. 241
Fax:  515-738-5719
Website:  www.east-greene.k12.ia.us
--


The content of this email and any attachments are confidential and intended
for the named recipient(s) only. 

If you have received this email in error please notify the sender
immediately. 

Do not disclose the content of this message or make copies.
---
[This E-mail scanned for viruses by Declude Virus on the server
aea8.k12.ia.us]

-
Archived messages from this list can be found at:
http://www.mail-archive.com/[EMAIL PROTECTED]/
-

---
[This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us]

-
Archived messages from this list can be found at:
http://www.mail-archive.com/[EMAIL PROTECTED]/
-


RE: [info-tech] Question about Outlook Express

2004-04-21 Thread Rex Peterson









Hey Brian

Have you tried
the Files and Settings Transfer Wizard yet?

The utility can
be found under accessories  system tools.

This will also transfer
other settings you might like to have on the new computer 

I.E
settings  Network printers and so on. But do some reading on the Microsoft
site before using it.

Thanks



Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8
[EMAIL PROTECTED]
1407 Tower Drive
Fort Dodge, Iowa 50501



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Behalf Of Brian Ney
Sent: Wednesday, April 21, 2004
12:08 PM
To: [EMAIL PROTECTED]
Subject: [info-tech] Question
about Outlook Express





I'm using Outlook Express 6 and am
changing computers. PC to PC, Win 98 to XP. How do I move the
address book as well as the Inbox items that I want to keep in the Inbox?











Brian Ney





N. Kossuth










[info-tech] E-mail from Bill Gates

2004-04-01 Thread Rex Peterson
Techs and Geeks
Please take the time too read this e-mail from Bill Gates.
Thanks 
Rex Peterson
Computer/Network Technician A+, N+, MCP
Prairie Lakes AEA 8
[EMAIL PROTECTED]
1407 Tower Drive
Fort Dodge, Iowa 50501  


Microsoft Progress Report: Security
by Bill Gates

Malicious software code has been around for decades. But only in the last
few years have the Internet, high-speed connections and millions of new
computing devices converged to create a truly global computing network in
which a virus or worm can circle the world in a matter of minutes.

Meanwhile, criminal hackers have become more sophisticated, creating and
distributing digital epidemics like Slammer, Blaster, Sobig and Mydoom that
spread almost instantaneously, threatening the potential of technology to
advance business productivity, commerce and communication.

The kinds of threats are evolving too. Blaster, for example, hijacked
individual computers, turning innocent users into unknowing and innocent
worm propagators. These kinds of attacks - swarming attacks that are
coordinated to cause multiplied, cascading effects - change the landscape of
security threats. They put new demands on IT professionals and consumers to
take preventative measures, and on the technology industry to continue to
innovate and develop new solutions.

While there are considerable challenges ahead, Microsoft and our industry
are making significant progress on the security front. This email, which
you're receiving as a subscriber to executive emails from Microsoft, offers
insights into Microsoft's significant investments in four areas of security:


Isolation and Resiliency 
Updating 
Quality 
Authentication and Access Control 

Additionally, we are committed to major investments in customer education
and partnerships that will help make the computing environment safer and
more secure.

Given human nature, evolving threat models and the increasing
interconnectedness of computers, the number of security exploits will never
reach zero. But we can dramatically blunt the impact of cybercriminals, and
are dedicating a major portion of our RD investments to security advances.

Isolation and Resiliency

Central to our security efforts is preventing malicious code from being able
to exploit a vulnerability by isolating such code, providing more effective
control over what computer processes can talk to or work with, and making
systems more resilient so they are able to identify and stop suspicious or
bad behavior in its tracks.

Windows XP Service Pack 2: We are working on a number of isolation and
resiliency advances that address four specific modes of attack in our
flagship client operating system. These will be available in late
spring/early summer.

Network Protection: Windows Firewall will be turned on by default, and
global firewall settings and central administration of firewall
configuration will be enabled. This reduces the attack surface of PCs and
networks. 
Safer Web Browsing: To reduce the impact of malicious code and Web sites
that can damage computers or defraud users, Internet Explorer will
automatically block unsolicited downloads from Web sites as well as block
unwanted pop-ups unless a user clicks on a download link. IT administrators
will also be able to manage this capability to enforce a consistent policy
across their organizations. In addition, wireless setup will be improved for
more secure browsing on wireless home networks. 
Safer Email and Instant Messaging: To reduce the risk of attacks, we are
building better file attachment handling in Outlook Express and Windows
Messenger instant messaging, and offering increased customer control over
downloads of external content in Outlook Express that could enable a sender
to identify your computer. 
Memory Protection: Malicious software designed to exploit buffer overruns
can allow too much data to be copied into areas of the computer's memory.
Although no single technique can completely eliminate this type of
vulnerability, Microsoft is employing a number of security technologies to
mitigate these attacks. First, core Windows components have been recompiled
with the most recent version of our compiler technology to protect against
stack and heap overruns. Microsoft is also working with microprocessor
companies, including Intel and AMD, to help Windows support
hardware-enforced data execute protection (also known as NX, or no execute).
NX uses the CPU to mark all memory locations in an application as
non-executable unless the location explicitly contains executable code. This
way, when an attacking worm or virus inserts program code into a portion of
memory marked for data only, it cannot be run. 
Windows Server 2003: In an environment in which every computer can be seen
as living in a hostile world, our work on Windows Server 2003 has focused
on how to help reduce, mitigate or contain threats. We plan to ship security
advances in Windows Server 2003 Service Pack 1 in the second half of 2004