Tuesday, April 23, 2013

How To: Transfer your PuTTY settings between computer

Putty stores its settings in the Windows registry. To save a backup of your Putty settings, you'll need to export this registry key to a file.

HKEY_CURRENT_USER\Software\SimonTatham

(Simon Tatham is the original developer responsible for PuTTy)

1. Click Start->Run and type "RegEdt32" in the "Open" dialog. Click "Ok"


2. One RegEdt32 starts, you'll be presented with an application which looks something like:


3. Press "Ctrl+F" to bring up the Find dialog. Enter the name of the key, "SimonTratham" in the "Find What" field, and make sure only "Keys" is checked in the "Look At" section of the dialog. Finally, click "Find Next"




4. The search may take a while, reminding us that the Windows Registry is a large and mysterious place where dragons be. Let's use these few seconds to reflect on the fact that you should never, ever, never change things in the registry unless you are absolutely, positively, totally, completely, 100% dead sure that you know exactly what you're doing. When the search completes we'll see the key name for which we're looking.



5. Click File->Export. Give your file an appropriate name like, "putty.reg" and click "Save"

6. We're done! Save the putty.reg file somewhere safe. The file doesn't contain any passwords or actual SSH key values so, it's relatively safe from prying eyes. Still, it does contain your configuration and that kind of data is a private matter.

Importing Your PuTTy Configuration

To import your saved PuTTy configuration on any other Windows computer simply copy your exported registry key, right click on the file and click "Merge"



Windows will ask you for confirmation that you want to import this set of registry values. We know this file is safe, because we created it but, you should never import registry information from an unknown source.


That's all you need to know about moving your PuTTy configuration from one machine to another. This can be really useful information when upgrading to a new PC or, if you're an office IT guy where your users all have a standard list of servers they need to connect via SSH, you can create a reference configuration on once machine and "share" it between every computer in the office.

End


Monday, April 22, 2013

Moving Public and Private Keys IN PGP Desktop.


 If it is only your key you need, you can right click on your key in PGP Desktop, select Export, making sure that you then make the selection to include the private key in the export, and then save the key to your desired location.  On the new machine, double click on the key to start the import of it.  You will then need to right click on the imported key in PGP Desktop, select Properties and set Trust to Implicit.

Friday, April 19, 2013

How to add an application into the Trusted Zone Kaspersky Administrative Kit

Kaspersky Administration Kit 8.0 allows an administrator to add software into the Trusted Zone remotely. This article explains remote administration of the Trusted Zone in Kaspersky Anti-Virus 6.0 for Windows Workstations MP4.
Trusted Zone is a list of objects composed by an administrator. It contains objects not monitored by Kaspersky Anti-Virus. It is a list of exceptions for the protection scheme.
The Trusted Zone is edited via the policy for a particular Kaspersky Lab application. Open properties of the policy for workstations tab Protection, and click the button Trusted Zone.

There are two tabs in the section Trusted Zone: Trusted applications and Exclusion rules.

Trusted applications are the applications which you believe to be secure and do not want them to be checked by Kaspersky Anti-Virus. When you choose an application, Kaspersky Anti-Virus memorizes internal attributes of the executable file, and uses them to identify the application as a trusted one during further checks.
Click Add to add a trusted application into the list. Specify full path and actions which will not be monitored by Kaspersky Anti-Virus.
  • Do not scan opened files – any files opened by the process of the trusted application will not be scanned.
  • Do not control application activity – the component Proactive Defense will not scan any activity (even suspicious) of the trusted application.
  • Do not control registry access – all attempts to access system registry by the trusted application will not be scanned.
  • Do not scan network traffic - network traffic initiated by the trusted application will not be scanned. This exclusion does not affect network traffic scan by the Anti-Hacker component which governs the analysis of the network activity of the given application. You can exclude from scan either all network traffic of an application or only encrypted traffic (using SSL). Click the link all to change its value to encrypted. You can also limit the exclusion to a particular host/port.
  • Allow interaction with application interface – remote access applications (e.g. Remote Administrator) will be able to manage Kaspersky Anti-Virus settings via the application interface.
An exclusion rule is a set of conditions for excluding an object from scan by Kaspersky Anti-Virus.

Click Add to create a new rule.
Object is an exclusion of a particular object, folder, file(s) or a mask from scan.

The block Rule description allows to configure values for selected exclusion types and choose the Kaspersky Anti-Virus components to use that rule.
What can be excluded from scan: a file of a certain format, a file mask, an area (e.g. a folder or a program), processes of applications, objects according to Virus Encyclopedia classification (status assigned to the object by Kaspersky Anti-Virus during a scan).

Threat type is a status assigned to the object by Kaspersky Anti-Virus during a scan. Status is assigned according to malware and potentially dangerous software classification listed in Kaspersky Lab Virus Encyclopedia.

Wednesday, April 10, 2013

Window 7 Password Reset & Recovery

Follow this link below to download ONTP&RE:

Window 7 Password Reset & Recovery 

Click download Offline NT Password & Registry Editor and burn to ISO as image below:


Regarding to reset password please see the video below

Turn on or off Cached Exchange Mode

         This feature requires you to use a Microsoft Exchange Server 2000, Exchange Server 2003, or Exchange Server 2007 account. Most home and personal accounts do not use Microsoft Exchange. For more information about Microsoft Exchange accounts and how to determine which version of Exchange your account connects to, see the links in the See Also section.

         Cached Exchange Mode provides you with a better experience when you use a Microsoft Exchange account. A copy of your mailbox is stored on your computer. This copy provides quick access to your data and is frequently updated with the mail server.