background preloader

How to Migrate to a Solid-State Drive Without Reinstalling Windows

How to Migrate to a Solid-State Drive Without Reinstalling Windows

Deleting a Local User Profile - Not as easy as one Might Assume | sepago In many environments it is a common practice to delete user profiles prior to conducting tests in order to start with a clean slate. However, this may prove more difficult than anticipated. Most people think that a local user profile only consists of the directory %USERPROFILE% typically located below C:\Users on Vista and Server 2008 (and newer). But there is more. Windows keeps track of the local profile incarnations in the registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList. How Not to Delete a Profile Now, what happens if you simply delete the user profile directory below C:\Users without modifying the registry? The Right Way If you need to delete a profile, use one of these methods: What if I Already Deleted a Profile the "Wrong" Way? If Windows finds a ProfileList subkey matching your SID without an associated profile directory it backs up the ProfileList subkey. What About XP and Server 2003? References

Duplicate finder and hard disk visualizer for Windows Spyglass is probably the most beautiful Windows disk space analyzer you’ll ever see. – Lifehacker Powerful Scanning Engine; Elegant Interface; Simple Usage; Effective Duplicate Finder – addictivetips.com Spyglass is a nice software and provides features of two different programs in a single software. – ilovefreesoftware.com Powerful. We made Spyglass to be simple and beautiful on the outside, but powerful and reliable on the inside; we wanted a tool that we would love to open everyday and admire for its simplicity, beauty, practicality, and power. Duplicate Finder Spyglass is not just for visualizing your hard disk, but is also a tool to keep it clean and spacious. Browse using Windows Explorer Want to perform regular file and folder operations? For better performance and faster results, try scanning a big folder (like your user directory) rather than a whole hard disk. We’ve spent countless hours on making Spyglass.

Run Active Directory Management Tools as Another User by Daniel Petri - January 8, 2009 How can I run Active Directory management tools as another user (one with administrative privileges)? As a security best practice, it is recommended that you do not log on to your computer with administrative credentials. Running your computer as a member of the Administrators group makes the system vulnerable to Trojan horses attacks and other security risks. It is recommended that you use a regular, non-administrative user account to perform routine tasks, including running programs and visiting Internet sites. RUNAS allows you to accomplish administrative tasks without exposing your computer or data stored in Active Directory to unnecessary risk. However, using the RUNAS command can turn out as a real bugger when you need to perform regular administrative operations such as adding a new user, resetting someone's password, stopping or starting a system service and so on. In Windows 2000 we welcomed the new addition - the RUNAS command. Click Finish.

Best free file and folder sync software Here on dotTech we have already covered best free cloud storage services, services that can be used not only to backup and remotely access or share files but also for the purposes of syncing files and folders across multiple computers and devices. However, sometimes there is a need to sync files and folders locally on the same computer: from drive to drive, partition to partition, folder to folder, or even from network share to network share. And for that reason is why file and folder sync software exist, to provide users with the ability to sync files and folders locally as opposed to across computers and devices. This review is part of our Best Free Windows Software section. As already mentioned, this article focuses on the ability to sync files locally, from drive to drive, partition or partition, or folder to folder (including network shares). Now, after all of that bookkeeping, let’s get on with it. Table of Contents [FreeFileSync vs Synchredible vs SyncFolders vs Synkron] Pros Cons

Tutoriels | Kali-linux Voici les tutoriels vous permettant d’installer et d’utiliser Kali-linux. Mise en place de machine virtuelle : Utiliser un environnement virtuel, vous permet d’installer des machines virtuelles sur votre ordinateur (appelé la station hôte). Mise en place d’un environnement virtuel avec le programme VirtualBox sur votre ordinateur (permet une installation de kali-linux sans abimer le système d’exploitation de votre ordinateur)Mise en place d’un environnement virtuel avec un programme VMWARE sur votre ordinateur (permet une installation de kali-linux sans abimer le système d’exploitation de votre ordinateur en utilisant la machine virtuelle officielle pré-configurée) Culture informatique : White hat : Les hackers faisant parti des « white hats » (en Français « chapeau blanc ») sont des personnes inoffensives passionnées de sécurité informatique. Black hat : Pour accéder aux forums de black hats, je vous recommande d’utiliser TOR (pour améliorer votre anonymat) ou d’utiliser un VPN.

The myth of driver backups I'm an expert at learning things the hard way. For example, my two-year-old Acer PC had reached the point where it desperately needed a hard drive reformat/Windows reinstall. (For background, read "How to decide when it's time to reformat and reinstall Windows.") Having been through this process many times before, I backed up all my data, made a list of the programs I'd need to reinstall, located my Windows DVD, and, because I'm a smart cookie, made a backup of all my drivers. This last is really important, because once you wipe your hard drive and reinstall Windows, your system may have no audio, no Ethernet, no Wi-Fi, and possibly even no USB--all potentially major problems. Following my own advice from a couple years back, I used the free Semper Driver Backup utility to copy every installed driver to the same external drive that contained all my backed up data. Or so I thought. Except it didn't work. Contributing Editor Rick Broida writes about business and consumer technology.

Online IP CIDR / VLSM Supernet Calculator CIDR Calculator The CIDR Calculator enables CIDR network calculations using IP address, subnet mask, mask bits, maximum required IP addresses and maximum required subnets. Results of the CIDR calculation provide the wildcard mask, for use with ACL (Access Control Lists), CIDR network address (CIDR route), network address in CIDR notation and the CIDR address range for the resulting CIDR network. For classful subnets, use the IP Subnet Calculator. CIDR - Classless Inter Domain Routing - was adopted to help ease the load imposed on internet and large network backbone routers by the increasing size of routing tables. Large routing tables have several adverse effects: Routers require more memory in order to store and manipulate their routing tables which increases operation costs. A solution to these problems was found in CIDR. So what is IP Address Aggregation? Our router needs to route traffic for eight seperate networks through the same gateway (ip address 194.1.1.1):

Update Windows Drivers For Free With IObit Driver Booster Beta Drivers are important for every computer. Without them, hardware and software wouldn’t be able to communicate, leaving a system inoperable. Updates to drivers can dramatically improve the stability, speed and features of a computer without any changes to the hardware inside. Yet, for whatever reason, driver updates remain difficult to locate for most devices. Most users don’t update unless something has gone wrong. Driver Booster, from IObit, promises an easier solution by acting as an all-in-one command center. Quick Installation The download for IObit Driver Booster is less than 20 megabytes, which is an exceptionally small file size for a modern program. Installation is dead-simple. Software With A Purpose Driver Booster is designed with one goal in mind; update drivers. The list of devices shown by the software is very through and includes not only installed hardware but also peripherals like printers , monitors, mice and gamepads. Smooth Driver Updates Other Options Conclusion

Configuration d'une interface - routeur Cisco Configuration les interfaces des routeurs Cisco (vitesse, duplex, adresse IP), afficher la conf, activation et désactivation. Affichage des informations concernant les interfaces La commande suivante affiche la configuration courante d'une interface. R1#sho running-config interface fastEthernet 0/1 Building configuration... Current configuration : 98 bytes ! Et voici la commande pour afficher les valeurs des compteurs d'une interface: Plusieurs infos intéressantes: le port est up ou down, l'interface est de type fast ethernet, fonctionne en full duplex avec un débit de 100Mbit/s. Modification de la description, la vitesse et le duplex d'une interface Ajout d'une description R2(config)#int fastEthernet 0/1 R2(config-if)#description vers routeur R2 Paramétrage de la vitesse et du mode duplex d'un port. Paramètre disponible pour une interface fast ethernet 100Mbit/s R2(config-if)#speed ? R2(config-if)#duplex ? Pour fixer la vitesse à 10Mbit/s puis le mode duplex half:

Tutoriel Rogue AP, hotspots en danger: ettercap, dnsspoof et man in the middle sous backtrack Comprendre ce qu'est une Rogue AP et éviter les dangers liés aux hotspots wifi (man in the middle, ettercap, dnsspoof) A travers ce tutoriel, vous allez découvrir à quel point il est aisé de créer un faux point d'accès ressemblant à s'y méprendre à un hotspot wifi. Vous réaliserez ainsi qu'il est extremement dangereux de se connecter à des réseaux wifi mal protégés, qu'il s'agisse de hotspots ou de réseaux utilisant le WEP. 1/ Vidéo de démonstration Cette vidéo aborde le problème sur un ton humoristique, afin de détendre l'atmosphère. Convaincus? 2/ L'architecture réseau La victime était à la base connectée à un hotspot légitime. Notre victime se retrouve sur un réseau effectivement connecté à l'internet, dans ce cas la connexion est représentée par la livebox, mais il se peut que l'attaquant ne laisse aucun accès à l'internet pour se jouer de sa victime, comme c'est le cas sur la vidéo. 3/ L'attaque, ettercap et dnsspoof -Ettercap Fonctionnement: -Dnsspoof 192.168.1.35 www.google.fr L'attaque

Related: