background preloader

Administrator

Facebook Twitter

Login - My VMware. Paramètres de synchronisation iPhone. Télécharger VMWare Converter 3.0 Starter Edition gratuit Windows 2000, XP. Tutoriel flash d'un routeur Linksys WRT54GL avec le firmware DD-WRT. Online IP CIDR / VLSM Supernet Calculator. CIDR Calculator The CIDR Calculator enables CIDR network calculations using IP address, subnet mask, mask bits, maximum required IP addresses and maximum required subnets.

Online IP CIDR / VLSM Supernet Calculator

Results of the CIDR calculation provide the wildcard mask, for use with ACL (Access Control Lists), CIDR network address (CIDR route), network address in CIDR notation and the CIDR address range for the resulting CIDR network. For classful subnets, use the IP Subnet Calculator. For a smart-phone optimized CIDR / VLSM Calculator, visit IP Calc. For ACL (Access Control List) wildcard mask calculations, use the ACL Wildcard Mask Calculator. CIDR - Classless Inter Domain Routing - was adopted to help ease the load imposed on internet and large network backbone routers by the increasing size of routing tables. Large routing tables have several adverse effects: Routers require more memory in order to store and manipulate their routing tables which increases operation costs. A solution to these problems was found in CIDR. Tutoriel Rogue AP, hotspots en danger: ettercap, dnsspoof et man in the middle sous backtrack.

Comprendre ce qu'est une Rogue AP et éviter les dangers liés aux hotspots wifi (man in the middle, ettercap, dnsspoof) A travers ce tutoriel, vous allez découvrir à quel point il est aisé de créer un faux point d'accès ressemblant à s'y méprendre à un hotspot wifi. Vous réaliserez ainsi qu'il est extremement dangereux de se connecter à des réseaux wifi mal protégés, qu'il s'agisse de hotspots ou de réseaux utilisant le WEP. 1/ Vidéo de démonstration Cette vidéo aborde le problème sur un ton humoristique, afin de détendre l'atmosphère.

Router Database. How to Migrate to a Solid-State Drive Without Reinstalling Windows. Deleting a Local User Profile - Not as easy as one Might Assume. In many environments it is a common practice to delete user profiles prior to conducting tests in order to start with a clean slate.

Deleting a Local User Profile - Not as easy as one Might Assume

However, this may prove more difficult than anticipated. Most people think that a local user profile only consists of the directory %USERPROFILE% typically located below C:\Users on Vista and Server 2008 (and newer). But there is more. Windows keeps track of the local profile incarnations in the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList. Configuration d'une interface - routeur Cisco. Configuration les interfaces des routeurs Cisco (vitesse, duplex, adresse IP), afficher la conf, activation et désactivation.

Configuration d'une interface - routeur Cisco

Affichage des informations concernant les interfaces La commande suivante affiche la configuration courante d'une interface. Adding IOS Images in GNS3. Download RDCMan from Official Microsoft Download Center. Kali Linux. Tutoriels. Voici les tutoriels vous permettant d’installer et d’utiliser Kali-linux.

Tutoriels

Mise en place de machine virtuelle : Utiliser un environnement virtuel, vous permet d’installer des machines virtuelles sur votre ordinateur (appelé la station hôte). Ces machines virtuelles seront accessible par le réseau comme si vous aviez vraiment d’autres ordinateurs connectés sur votre réseau local. Vous pouvez donc vous entrainer a auditer voir pentester (« pirater ») des machines vous appartenant sans avoir à acheter du matériel supplémentaire. Mise en place d’un environnement virtuel avec le programme VirtualBox sur votre ordinateur (permet une installation de kali-linux sans abimer le système d’exploitation de votre ordinateur)Mise en place d’un environnement virtuel avec un programme VMWARE sur votre ordinateur (permet une installation de kali-linux sans abimer le système d’exploitation de votre ordinateur en utilisant la machine virtuelle officielle pré-configurée)

Run Active Directory Management Tools as Another User. By Daniel Petri - January 8, 2009 How can I run Active Directory management tools as another user (one with administrative privileges)? As a security best practice, it is recommended that you do not log on to your computer with administrative credentials. Running your computer as a member of the Administrators group makes the system vulnerable to Trojan horses attacks and other security risks. It is recommended that you use a regular, non-administrative user account to perform routine tasks, including running programs and visiting Internet sites. When it becomes necessary to perform administrative tasks on the local computer or in Active Directory, use RUNAS to start a program using administrative credentials.

Remove Virus and Threats. Learning Lotus Notes clients : Configuring the Lotus Notes Client with Gmail. Launch the Lotus Notes Client after installing it: Click Next a.

Learning Lotus Notes clients : Configuring the Lotus Notes Client with Gmail

Enter your name b. Uncheck "I want to connect to a Domino Server c. Fichier hosts windows. “The LastLogonTimeStamp Attribute” – “What it was designed for and how it works” - Ask the Directory Services Team. Warren here.

“The LastLogonTimeStamp Attribute” – “What it was designed for and how it works” - Ask the Directory Services Team

In Windows Server 2003 we introduced the lastLogontimeStamp attribute. Administrators can use the lastLogontimeStamp attribute to determine if a user or computer account has recently logged onto the domain. Using this information administrators can then review the accounts identified and determine if they are still needed and take appropriate action. Intended Use It is important to note that the intended purpose of the lastLogontimeStamp attribute to help identify inactive computer and user accounts.

If you are looking for more “real-time” logon tracking you will need to query the Security Event log on your DC’s for the desired logon events i.e. 528 –Windows XP\2003 and earlier or 4624 Windows Vista\2008 . IMO your best bet for near real-time data is to use an event log collection service to gather all domain controller security event logs to a centralized database. How it worked in Windows 2000 How it works in Windows Server 2003 and later Requirements 1. 1. Downloads. Classic EditionKeePass 1.31 Installer: This package contains everything you need to use KeePass.

Downloads

Simply download the EXE file above, run it and follow the steps of the installation program. You need local installation rights (use the Portable version below, if you don't have these rights). Portable: Notes853_fr.