RE: [info-tech] Imaging Software
to the original 1GB size. Conclusion For a home user or an administrator with just a few systems, the GParted-Clonezilla live CD is an excellent tool for managing disks. It can save you several hours when preparing new disks or migrating partitions from one disk to another. It's also a fantastic way to move a partition that's not around free space into a bigger partition without much fuss. But bear in mind that both GParted and Clonezilla are dangerous utilities. To get comfortable with them, consider trying them out on a virtual machine with virtual disks and virtual partitions and no critical data. Unless you want to simply duplicate partitions or disks, you'll need to play with the advanced parameters. Because the Clonezilla project makes virtually no documentation available, I also suggest you make a cheat sheet for yourself as you go along using the app, listing the advanced parameters to choose for particular operations. This is useful if you regularly need to repeat a particular type of partitioning task, such as cloning partitions and moving them to bigger ones on another disk Thanks! Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1235 5th Ave South Fort. Dodge, Ia. 50501 1-515-574-5559 1-800-669-2325 Ext.5559 This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Your are asked to notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. Please note that any views or opinions presented in this email are solely those of the author and do not necessarily represent those of Prairie Lakes Area Education Agency. Prairie Lakes Area Education Agency accepts no liability for any damage caused by any virus transmitted by this email. _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Frerichs, Chad Sent: Tuesday, July 03, 2007 1:37 PM To: info-tech@aea8.k12.ia.us Subject: RE: [info-tech] Imaging Software I was looking at using some free stuff as well. No use paying for something that can be done for free, right? There are a couple I was considering on the Ultimate Boot CD. I want to be able to do multiple machines at once. Like a whole lab or so. There is one on the Ultimate Boot CD called UDPcast which is supposed to be faster, and then there is g4u (Ghost for Unix) which uses ftp and I have used before but when you do too many machines it really slows down. Thanks for the suggestions and keep them coming if there are more. Thanks, Chad Frerichs Network Administrator Okoboji Community Schools Milford, IA 51351 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pearson, Jeremy Sent: Tuesday, July 03, 2007 1:27 PM To: info-tech@aea8.k12.ia.us Subject: RE: [info-tech] Imaging Software Fort Dodge does all of our imaging with RIS. Gotta like free stuff. We have looked to upgrading to the BDD 2007 from Microsoft, but haven't made it that far yet. It is still free. ___ Jeremy Pearson Network Administrator / Computer Technician Fort Dodge Community School District 104 South 17th Street Fort Dodge, Iowa 50501 https://www.fort-dodge.k12.ia.us/exchweb/bin/redir.asp?URL=http://www.fort- dodge.k12.ia.us/ http://www.fort-dodge.k12.ia.us (515)574-5676 voice (515)574-5324 fax _ From: [EMAIL PROTECTED] on behalf of Keith Stoeber Sent: Tue 7/3/2007 1:07 PM To: info-tech@aea8.k12.ia.us Subject: Re: [info-tech] Imaging Software I use Ghost. Keith Keith Stoeber 4440 U.S. Hwy 71 Sioux Rapids, Iowa 50585 Phone: 712-283-2571 Fax: 712-283-2285 [EMAIL PROTECTED] -- Original Message -- From: Lance Lennon [EMAIL PROTECTED] Reply-To: info-tech@aea8.k12.ia.us Date: Tue, 3 Jul 2007 11:36:00 -0500 Ghost for the PC -- The most likely way for the world to be destroyed, most experts agree, is by accident. That's where we come in; we're computer professionals. We cause accidents. ~Nathaniel Borenstein -- Lance L. Lennon District Technology Director Eagle Grove Community School District 515-448-5143 --- [This E-mail scanned for viruses by the sioux-central.k12.ia.us server.] --- [This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us] - Archived messages from this list can be found at: http://www.mail-archive.com/info-tech@aea8.k12.ia.us/ -
RE: [info-tech] Script
Hey Tony I hope this is what you are looking for .. Here is the link where I found it http://www.microsoft.com/technet/scriptcenter/scripts/default.mspx?mfr=true strComputer = . Set objWMIService = GetObject(winmgmts: _ {impersonationLevel=impersonate}!\\ strComputer \root\cimv2) Set colScheduledJobs = objWMIService.ExecQuery _ (Select * from Win32_ScheduledJob) For Each objJob in colScheduledJobs Wscript.Echo Caption: objJob.Caption Wscript.Echo Command: objJob.Command Wscript.Echo Days of Month: objJob.DaysOfMonth Wscript.Echo Days of Week: objJob.DaysOfWeek Wscript.Echo Description: objJob.Description Wscript.Echo Elapsed Time: objJob.ElapsedTime Wscript.Echo Install Date: objJob.InstallDate Wscript.Echo Interact with Desktop: objJob.InteractWithDesktop Wscript.Echo Job ID: objJob.JobID Wscript.Echo Job Status: objJob.JobStatus Wscript.Echo Name: objJob.Name Wscript.Echo Notify: objJob.Notify Wscript.Echo Owner: objJob.Owner Wscript.Echo Priority: objJob.Priority Wscript.Echo Run Repeatedly: objJob.RunRepeatedly Wscript.Echo Start Time: objJob.StartTime Wscript.Echo Status: objJob.Status Wscript.Echo Time Submitted: objJob.TimeSubmitted Wscript.Echo Until Time: objJob.UntilTime Next Thanks! Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1235 5th Ave South Fort. Dodge, Ia. 50501 1-515-574-5559 1-800-669-2325 Ext.5559 _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Richardson,Tony Sent: Monday, December 18, 2006 9:30 AM To: info-tech@aea8.k12.ia.us Subject: [info-tech] Script Hello all, Does anybody have a VBScript that would detect if a scheduled task already exists on a Windows PC? I tried the internet but must not be asking the right search questions. Thanks, Tony Richardson Technology Coordinator Humboldt Community School District [EMAIL PROTECTED]
RE: [info-tech] USB Drives
Hi Tony The DOD was having problems with locking down their Laptops and USB drives access. The DOD solution was to super glue the USB ports shut. Thanks! Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1235 5th Ave South Fort. Dodge, Ia. 50501 1-515-574-5559 1-800-669-2325 Ext.5559 _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of George Tuttle Sent: Friday, December 08, 2006 10:27 AM To: info-tech@aea8.k12.ia.us Subject: RE: [info-tech] USB Drives Tony, What are you using the usb drives for. That makes a lot of difference when coming up with a solution. George _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Richardson,Tony Sent: Friday, December 08, 2006 10:04 AM To: info-tech@aea8.k12.ia.us Subject: [info-tech] USB Drives I'm going to throw this out there in hopes that somebody has a solution. I would like to know how other Tech Coordinators are dealing with USB drives on locked down systems. There are so many different USB thumb drives out there and some will not work on a locked down system because students are not allowed to load software. Any body got a solution??? Thanks, Tony Richardson Technology Coordinator Humboldt Community School District [EMAIL PROTECTED]
[info-tech] Net neutrality
CNET News.comhttp://www.news.com/ House rejects Net neutrality rules By Declan McCullagh http://news.com.com/House+rejects+Net+neutrality+rules/2100-1028_3-6081882.h tml Story last modified Thu Jun 08 20:23:45 PDT 2006 The U.S. House of Representatives definitively rejected the concept of Net neutrality on Thursday, dealing a bitter blow to Internet companies like Amazon.com, eBay and Google that had engaged in a last-minute lobbying campaign to support it. By a 269-152 vote that fell largely along party lines, the House Republican leadership mustered enough votes to reject a Democrat-backed amendment that would have enshrined stiff Net neutrality regulations into federal law and prevented broadband providers from treating some Internet sites differently from others. Of the 421 House members who participated in the vote that took place around 6:30 p.m. PT, the vast majority of Net neutrality supporters were Democrats. Republicans represented most of the opposition. At issue is a lengthy measure called the Communications Opportunity, Promotion, and Enhancement (COPE) Act, which a House committee approved in April. Its Republican backers, along with broadband providers such as Verizon and ATT, say it has sufficient Net neutrality protections for consumers, and more extensive rules would discourage investment in wiring American homes with higher-speed connections. The concept of network neutrality, which generally means that all Internet sites must be treated equally, has drawn a list of high-profile backers, from actress Alyssa Milano to Vint Cerf, one of the technical pioneers of the Internet. It's also led to a political rift between big Internet companies such as Google and Yahoo that back it--and telecom companies that oppose what they view as onerous new federal regulations. As the final House vote drew closer, lobbyists and CEOs from both sides began stepping up the pressure. eBay CEO Meg Whitman e-mailed more than a million members, urging them to support the concept, and Google CEO Eric Schmidt on Wednesday called on his company's users to follow suit. Defenders of the COPE Act, largely Republicans, dismissed worries about Net neutrality as fear mongering. I want a vibrant Internet just like they do, said Rep. Lamar Smith, a Texas Republican. Our disagreement is about how to achieve that. They say let the government dictate it...I urge my colleagues to reject government regulation of the Internet. The debate over Net neutrality had become more complicated after earlier versions of the COPE Act appeared to alter antitrust laws--in a way that would have deprived the House Judiciary Committee of some of its influence. In other news: But in a last-minute compromise designed to placate key Republicans, the House leadership permitted an amendment (click for PDF) from Smith that would preserve the House Judiciary Committee's influence--without adding extensive Net neutrality mandates. That amendment to COPE was approved. While the debate over Net neutrality started over whether broadband providers could block certain Web sites, it has moved on to whether they should be permitted to create a fast lane that could be reserved for video or other specialized content. Prohibiting that is not a road we want to go down, but that's what the Markey amendment would do, said Rep. Marsha Blackburn, a Tennessee Republican. The next thing is going to be having a secretary of Internet Access (in the federal government). Thanks! Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1407 Tower Drive Fort. Dodge, Ia. 50501 1-515-574-5559 1-800-669-2325 Ext.5559 --- [This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us] - Archived messages from this list can be found at: http://www.mail-archive.com/info-tech@aea8.k12.ia.us/ -
[info-tech] Windows XP-on-Mac contest declares winner
CNET News.comhttp://www.news.com/ Windows XP-on-Mac contest declares winner By Ina Fried http://news.com.com/Windows+XP-on-Mac+contest+declares+winner/2100-1046_3-60 50431.html Story last modified Thu Mar 16 10:26:37 PST 2006 A Macintosh enthusiast has apparently managed to load Windows XP on an Intel Mac, nabbing a nearly $14,000 prize. For some days, there has been discussion that the person who goes by the handle narf had managed the technically challenging feat. Photos were posted on Flickr, and much debate ensued. However, narf's method had to prove replicable before the contest was officially ended. On Thursday, though, the contest ended, and a winner was declared. Contest has been won--updates to follow shortly, reads a short message on the contest's Web site. The contest, which has been running since just after Apple Computer announced the first Intel-based Macs, collected donations from individuals and companies to raise the prize money. Although both Macs and Windows PCs now use Intel chips, the task of loading Windows on the Intel Macs has proved more complicated, in part because both use different means of booting up. There had been hope that the next version of Windows would make things easier, but an Apple executive last week said booting Vista on Macs may not prove that easy, either. The win comes just ahead of an end-of-month deadline that would have seen the money go instead to the Electronic Frontier Foundation. The effort was launched by Colin Nederkoorn, who put up $100 of his own money, hoping his new Intel Mac would be able to replace his Windows PC. According to the rules, his Web site now has the rights to publish the solution. The solution appears to be available for download, though traffic to the site was heavy Wednesday. An Apple representative was not immediately available for comment. Copyright C1995-2006 CNET Networks, Inc. All rights reserved. Thanks! Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1407 Tower Drive Fort. Dodge, Ia. 50501 1-515-574-5559 1-800-669-2325 Ext.5559 --- [This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us] - Archived messages from this list can be found at: http://www.mail-archive.com/info-tech@aea8.k12.ia.us/ -
[info-tech] Mac hacking competition winner mocks Apple security
This story was printed from ZDNet UK, located at http://news.zdnet.co.uk/ Story URL: http://news.zdnet.co.uk/software/mac/0,39020393,39256036,00.htm Mac hacking competition winner mocks Apple security Munir Kotadia ZDNet Australia March 07, 2006, 10:00 GMT Gaining root access to a Mac is easy pickings, according to an individual who won an OS X hacking challenge last month by gaining root control of a machine using an unpublished security vulnerability. On 22 February, the Sweden-based Mac enthusiast set up his Mac Mini as a server and invited hackers to break through the computer's security and gain root control, which would allow the attacker to take charge of the computer and delete files and folders or install applications. Participants were given local client access to the target computer and invited to try their luck. Within hours of going live, the rm-my-mac competition was over. The challenger posted this message on his Web site: This sucks. Six hours later, this poor little Mac was owned, and this page got defaced. The hacker who won the challenge, who asked ZDNet UK sister site ZDNet Australia to identify him only as Gwerdna, said he gained root control of the Mac in less than 30 minutes. It probably took about 20 or 30 minutes to get root on the box. Initially, I tried looking around the box for certain misconfigurations and other obvious things, but then I decided to use some unpublished exploits of which there are a lot for Mac OS X, Gwerdna told ZDNet Australia. According to Gwerdna, the hacked Mac could have been better protected, but it would not have stopped him because he exploited a vulnerability that has not yet been made public or patched by Apple. The rm-my-mac challenge was set up similar to how you would have a Mac acting as a server with various remote services running and local access to users... There are various Mac OS X-hardening guides out there that could have been used to harden the machine, however, it wouldn't have stopped the vulnerability I used to gain access. There are only limited things you can do with unknown and unpublished vulnerabilities. One is to use additional hardening patches good examples for Linux are the PaX patch and the Grsecurity patches. They provide numerous hardening options on the system and implement nonexecutable memory, which prevent memory-based corruption exploits, Gwerdna said. Gwerdna concluded that OS X contains easy pickings when it comes to vulnerabilities that could allow hackers to break into Apple's operating system. Mac OS X is easy pickings for bug finders. That said, it doesn't have the market share to really interest most serious bug finders, Gwerdna added. OS X has come under fire in recent weeks with the appearance of two pieces of malware and a number of serious security flaws, which have since been patched by the Mac maker. In January, security researcher Neil Archibald, who has already been credited with finding numerous vulnerabilities in OS X, told ZDNet Australia that he knows of numerous security vulnerabilities in Apple's operating system that could be exploited by attackers. The only thing which has kept Mac OS X relatively safe up until now is the fact that the market share is significantly lower than that of Microsoft Windows or the more common Unix platforms... If this situation was to change, in my opinion, things could be a lot worse on Mac OS X than they currently are on other operating systems, Archibald said at the time. An Apple Australia representative said on Monday that the company was unable to comment at this stage. Representatives at Apple's Cupertino, California, headquarters could not be reached for comment. Have a great day! Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1407 Tower Drive Fort. Dodge, Ia. 50501 1-515-574-5559 1-800-669-2325 Ext.5559
RE: [info-tech] XP question
Hi Jon I believe you would use C:\Documents and Settings\Default User folder which is hidden by default. Tools folder Options View Hidden files and folders select show hidden files and folders. Then copy the Map drive to the NetHood folder. Then each user will receive the map drive when they log on the first time since they will use the default user profile. But hey I could be wrong. Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1407 Tower Drive Fort Dodge, Iowa 50501 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of JON W HUESER Sent: Thursday, September 02, 2004 12:02 PM To: [EMAIL PROTECTED] Subject: [info-tech] XP question My brain must be dead because I can't figure this out. I need to be able to map a network drive on XP so that all kids get that drive (for our PAWS software). If I map it when I login, it only appears for me. How do I map a network drive in XP for all users to use? -- Thanks, Jon W. Hueser Comp/Tech. Coord. East Greene Comm. Schools 405 12th Str. South Box 377 Grand Junction, IA 50107 Phone: 515-738-2411 ext. 241 Fax: 515-738-5719 Website: www.east-greene.k12.ia.us -- The content of this email and any attachments are confidential and intended for the named recipient(s) only. If you have received this email in error please notify the sender immediately. Do not disclose the content of this message or make copies. --- [This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us] - Archived messages from this list can be found at: http://www.mail-archive.com/[EMAIL PROTECTED]/ - --- [This E-mail scanned for viruses by Declude Virus on the server aea8.k12.ia.us] - Archived messages from this list can be found at: http://www.mail-archive.com/[EMAIL PROTECTED]/ -
RE: [info-tech] Question about Outlook Express
Hey Brian Have you tried the Files and Settings Transfer Wizard yet? The utility can be found under accessories system tools. This will also transfer other settings you might like to have on the new computer I.E settings Network printers and so on. But do some reading on the Microsoft site before using it. Thanks Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1407 Tower Drive Fort Dodge, Iowa 50501 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brian Ney Sent: Wednesday, April 21, 2004 12:08 PM To: [EMAIL PROTECTED] Subject: [info-tech] Question about Outlook Express I'm using Outlook Express 6 and am changing computers. PC to PC, Win 98 to XP. How do I move the address book as well as the Inbox items that I want to keep in the Inbox? Brian Ney N. Kossuth
[info-tech] E-mail from Bill Gates
Techs and Geeks Please take the time too read this e-mail from Bill Gates. Thanks Rex Peterson Computer/Network Technician A+, N+, MCP Prairie Lakes AEA 8 [EMAIL PROTECTED] 1407 Tower Drive Fort Dodge, Iowa 50501 Microsoft Progress Report: Security by Bill Gates Malicious software code has been around for decades. But only in the last few years have the Internet, high-speed connections and millions of new computing devices converged to create a truly global computing network in which a virus or worm can circle the world in a matter of minutes. Meanwhile, criminal hackers have become more sophisticated, creating and distributing digital epidemics like Slammer, Blaster, Sobig and Mydoom that spread almost instantaneously, threatening the potential of technology to advance business productivity, commerce and communication. The kinds of threats are evolving too. Blaster, for example, hijacked individual computers, turning innocent users into unknowing and innocent worm propagators. These kinds of attacks - swarming attacks that are coordinated to cause multiplied, cascading effects - change the landscape of security threats. They put new demands on IT professionals and consumers to take preventative measures, and on the technology industry to continue to innovate and develop new solutions. While there are considerable challenges ahead, Microsoft and our industry are making significant progress on the security front. This email, which you're receiving as a subscriber to executive emails from Microsoft, offers insights into Microsoft's significant investments in four areas of security: Isolation and Resiliency Updating Quality Authentication and Access Control Additionally, we are committed to major investments in customer education and partnerships that will help make the computing environment safer and more secure. Given human nature, evolving threat models and the increasing interconnectedness of computers, the number of security exploits will never reach zero. But we can dramatically blunt the impact of cybercriminals, and are dedicating a major portion of our RD investments to security advances. Isolation and Resiliency Central to our security efforts is preventing malicious code from being able to exploit a vulnerability by isolating such code, providing more effective control over what computer processes can talk to or work with, and making systems more resilient so they are able to identify and stop suspicious or bad behavior in its tracks. Windows XP Service Pack 2: We are working on a number of isolation and resiliency advances that address four specific modes of attack in our flagship client operating system. These will be available in late spring/early summer. Network Protection: Windows Firewall will be turned on by default, and global firewall settings and central administration of firewall configuration will be enabled. This reduces the attack surface of PCs and networks. Safer Web Browsing: To reduce the impact of malicious code and Web sites that can damage computers or defraud users, Internet Explorer will automatically block unsolicited downloads from Web sites as well as block unwanted pop-ups unless a user clicks on a download link. IT administrators will also be able to manage this capability to enforce a consistent policy across their organizations. In addition, wireless setup will be improved for more secure browsing on wireless home networks. Safer Email and Instant Messaging: To reduce the risk of attacks, we are building better file attachment handling in Outlook Express and Windows Messenger instant messaging, and offering increased customer control over downloads of external content in Outlook Express that could enable a sender to identify your computer. Memory Protection: Malicious software designed to exploit buffer overruns can allow too much data to be copied into areas of the computer's memory. Although no single technique can completely eliminate this type of vulnerability, Microsoft is employing a number of security technologies to mitigate these attacks. First, core Windows components have been recompiled with the most recent version of our compiler technology to protect against stack and heap overruns. Microsoft is also working with microprocessor companies, including Intel and AMD, to help Windows support hardware-enforced data execute protection (also known as NX, or no execute). NX uses the CPU to mark all memory locations in an application as non-executable unless the location explicitly contains executable code. This way, when an attacking worm or virus inserts program code into a portion of memory marked for data only, it cannot be run. Windows Server 2003: In an environment in which every computer can be seen as living in a hostile world, our work on Windows Server 2003 has focused on how to help reduce, mitigate or contain threats. We plan to ship security advances in Windows Server 2003 Service Pack 1 in the second half of 2004