Showing posts with label 2012. Show all posts
Showing posts with label 2012. Show all posts

Wednesday, March 29, 2017

Comodo Internet Security Premium 2012 Final

Comodo Internet Security Premium 2012 Final







Programme for the protection against Internet threats Comodo Internet Security is a free, multi-level computer security that protects against viruses and other malicious programs, hackers and identity thieves.
Antivirus software Comodo Internet Security Edition combines powerful anti-virus Comodo Antivirus, enterprise-class firewall Comodo Firewall and automated sandbox unknown files Auto Sandbox Technology.

New to the Comodo Internet Security 2012
-- New. Simplified installation process.
-- New. Advanced security mode: Security + is now stronger than in 64-bit systems.
-- New. New options for popup notifications and virus alerts.
-- Improved. The programs interface.
-- Improved. Optimized consumption of system resources and increased productivity.
-- Fixed that. The firewall is not working properly on Bluetooth PAN adapter.
-- Fixed that. Fall antivirus on files located on damaged sectors.
-- Fixed that. Prevented by various attempts to circumvent the proactive defense + protection, used by the malware.

Main features of Comodo Internet Security Premium
-- Anti-virus, antispyware, anti-rootkit and anti-bot
-- Protect your computer from Internet attacks
-- Detects and removes all types of viruses
-- Prevents attempts to install malicious software
-- Auto Sandbox Technology
-- Easy to install, configure and use
-- Free for private and commercial users

The main components of Comodo Internet Security Premium
Antivirus Comodo:
· Detects, blocks and removes viruses, found on personal computers and networks
· Provides continuous protection by scanning in real-time access to the system
Automatically updates and daily virus database
· Equipped with a built-in proactive protection from viruses / trojans
· Product Free

Firewall Comodo:
· Repeatedly recognized as the winner of the contest independent software of this class
Automatically makes your computer invisible to hackers
· Analyzes and filters incoming and outgoing traffic of your computer
· Equipped with a built-in proactive protection from viruses / trojans
· Product Free

Protection +
Rule-based intrusion prevention system that protects mission-critical operating system files from malicious processes, internal attacks and blocks unknown malware before they can be installed on your computer. Protection + now includes avtomatizirovannuuyu sandbox for unknown applications. Sandbox provides for untested (but harmless) application flexibility, while, as unproven (but really malicious) applications can not access the system or infect your computer.

Information about the program:
Year: 2011
Official site: comodo.com
License: Free
Language: ML / Russian
Compatibility: Windows XP/Vista/7 x86/64
File Size: 81.90 Mb

System requirements:
Windows XP or newer operating system
128 MB of free RAM
210 MB free disk space

Link Download File :

Uploading
http://uploading.com/files/m1bmeeac/Comodo_Internet_Security_Premium_2012_Final.rar/

Bitshare
http://bitshare.com/files/4htojn7r/Comodo_Internet_Security_Premium_2012_Final.rar.html

Filesonic
http://www.filesonic.com/file/Vq59Xqf/Comodo_Internet_Security_Premium_2012_Final.rar

Fileserve
http://www.fileserve.com/file/4H4vw3D/Comodo_Internet_Security_Premium_2012_Final.rar

Migahost
http://www.migahost.com/34168c616rr3/Comodo_Internet_Security_Premium_2012_Final.rar.html

Available link for download

Read more »

Saturday, March 11, 2017

Railworks 3 Train Simulator 2012 Pc Game Free Download Full Version

Railworks 3 Train Simulator 2012 Pc Game Free Download Full Version


 Screen Shot!
 Railworks 3 Train Simulator 2012 Pc Game Free Download Full Version
System Requirements!
Cpu: 2.4 GHz
Ram: 2 Gb
Hard: 6 Gb
Video Card: 256 mb
Download In Torrent

Available link for download

Read more »

Thursday, February 16, 2017

Microsoft Security Alert Critical Product Vulnerability January 2012 Microsoft Security Bulletin Release

Microsoft Security Alert Critical Product Vulnerability January 2012 Microsoft Security Bulletin Release



http://image.email.microsoftemail.com/lib/ffcf14/m/1/spacer.gif
http://image.email.microsoftemail.com/lib/ffcf14/m/1/spacer.gif




What is the purpose of this alert?


This alert is to provide you with an overview of the new security 
bulletin(s) being released on January 10, 2012. Security bulletins are released 
monthly to resolve critical problem vulnerabilities. 
























































NEW SECURITY BULLETINS





Microsoft is releasing the following seven new security bulletins for newly discovered vulnerabilities:
Bulletin ID
Bulletin ID
Maximum Severity Rating
Vulnerability Impact
Restart Requirement
Affected Software
MS12-001
Vulnerability in Windows Kernel Could Allow Security Feature Bypass (2644615)
Important
Security Feature Bypass
Requires restart






 Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
MS12-002
Vulnerability in Windows Object Packager Could Allow Remote Code Execution (2603381)
Important
Remote Code Execution
May require restart
Microsoft Windows XP and Windows Server 2003.
MS12-003
Vulnerability in Windows Client/Server Run-time Subsystem Could Allow Elevation of Privilege (2646524)
Important
Elevation of Privilege
Requires restart
Microsoft Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.
MS12-004
Vulnerabilities in Windows Media Could Allow Remote Code Execution (2636391)
Critical
Remote Code Execution
Requires restart
Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
MS12-005
Vulnerability in Microsoft Windows Could Allow Remote Code Execution (2584146)
Important
Remote Code Execution
May requires restart
Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
MS12-006
Vulnerability in SSL/TLS Could Allow Information Disclosure (2643584)
Important
Information Disclosure
Requires restart
Microsoft Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
MS12-007
Vulnerability in AntiXSS Library Could Allow Information Disclosure (2607664)
Important
Information Disclosure
May requires restart
Microsoft Developer Tools and Software


  Note: The list of affected software in the summary table above is an abstract. To see the full list of affected
  components please visit the bulletin summary webpage at the link below and review the "Affected
  Software" section.





Summaries for new bulletin(s) may be found at http://technet.microsoft.com/security/bulletin/MS12-jan.
Update the month and also the URL inside the hyperlink and remove this note.

Microsoft Windows Malicious Software Removal Tool
Microsoft is releasing an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Server Update Services (WSUS), Windows Update (WU), and the Download Center. Information on the Microsoft Windows Malicious Software Removal Tool is available at http://support.microsoft.com/?kbid=890830.
High Priority Non-Security Updates
High priority non-security updates Microsoft releases to be available on Microsoft Update (MU), Windows Update (WU), or Windows Server Update Services (WSUS) will be detailed in the KB article found at http://support.microsoft.com/?id=894199.





PUBLIC BULLETIN WEBCAST






Microsoft will host a webcast to address customer questions on these bulletins:

Title: : Information about Microsoft January Security Bulletins (Level 200)
Date: Wednesday, January 11, 2012, 11:00 A.M. Pacific Time (GMT-08:00)
URL: https://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032499498
Available link for download

Read more »

Thursday, January 5, 2017

Configuring and Managing RAID 5 on Windows Server 2012

Configuring and Managing RAID 5 on Windows Server 2012


An Overview of RAID 5

RAID 5 consists of three or more volumes each located on a separate physical disk. As with RAID 0, RAID 5 also uses disk striping, whereby blocks of data are divided up into stripes with each stripe written to a different disk. RAID 5, however, differs quite considerably from RAID 0. Under RAID 5, not only are the data stripes written, but also parity information relating to the data. The key to RAID 5 fault tolerance is the fact that the parity information for a particular data stripe is always written to a different drive from the drive containing the corresponding data stripe. This means that if a disk fails, the corresponding parity information stored on another disk can be used for error detection and data correction (also referred to as regeneration).
Whilst RAID 5 has considerable advantages over RAID 0 there are one or two drawbacks that should be taken into consideration when considering this storage option. Firstly, there is the inevitable performance overhead inherent in calculating and storing parity information for each data stripe written to disk. Secondly, the loss of more than one disk in a RAID 5 array will leave insufficient parity data on the remaining disks to regenerate the original data. That said, RAID 5 does provide considerable advantages that generally outweigh the disadvantages.

Configuring RAID 5 Using Windows Server 2008 Disk Management

A Windows Server 2008 RAID 5 configuration may be set up using the Disk Management snap-in. This is accessed either from the Server Manager or Computer Management tools. To launch the Server Manager, open the Start menu and click on the Server Manager option, or click on the Server Manager icon in the task bar. Alternatively launch Computer Management from Start -> All Programs -> Administration Tools -> Computer Management or run compmgmt.csc at the command prompt or in a Run dialog. In all cases the Disk Management tool can be found under the Storage category.
As previously noted, RAID 5 implementation requires a minimum of 3 disk drives. For the purposes of this tutorial a system containing four disk drives is assumed. In this scenario, disk 0 is the system disk and disks 1 through 3 are available for use in the RAID 5 configuration. Before proceeding the disks will need to be initialized using either the MBR or GPT partition style. Assuming these prerequisites are met the first step is to right click on one of the 3 disks in the Disk Management graphical view. In the resulting popup menu select the New RAID-5 Volume... option to invoke the New RAID-5 Volume wizard. On the wizards welcome page click on the Next button to proceed to the Disk Selection screen. This screen contains a list of disk drives available for inclusion in the disk array together with a list of selected disks. Currently only the current disk is included in the Selected list. Two more disks must be added to the selected disks before the RAID 5 array can be built. Select disks from the Available list and click on the Add> button to add the disk to the selected list. Once sufficient disks (in this case disks 1, 2 and 3) are selected the Next button will activate to allow the remainder of the configuration to be completed. Note that disk 0 (the system disk) is not included in the RAID 5 array:
Selecting disks for a Windows Server 2008 RAID 5 configuration

With the disk selections completed, the Next button proceeds to the drive letter and mount point assignment screen. Once these settings are configured click Next to proceed to the Format Volume screen. Select the appropriate file system and compression options and click on Next to proceed to the Summary screen. Review the information displayed and click on Finish to initiate the RAID 5 creation process. During this process the Disk Management graphical view will list the disks as Formatting and then Resynching. The amount of time these phases will take depends on the size of the volumes in question. Once the process is complete the status will change to Healthy and the RAID 5 volume is ready for use.

Configuring RAID 5 from the Command Prompt using DiskPart

In addition to configuring RAID 5 from within Disk Management, the configuration may also be implemented from the command prompt using DiskPart. DiskPart may be launched either from a command prompt or a Run dialog simply by typing diskpart. Once invoked, DiskPart will display the DiskPart> command prompt and is ready to receive commands.
The first step in the configuration process is to identify the disks attached to the system using the list disk command:
DISKPART> list disk

Disk ### Status Size Free Dyn Gpt
-------- ---------- ------- ------- --- ---
Disk 0 Online 30 GB 15 GB *
Disk 1 Online 8 GB 8189 MB
Disk 2 Online 8 GB 8189 MB
Disk 3 Online 8 GB 8189 MB
For the purposes of this chapter disks 1, 2 and 3 will be used to create a RAID 5 configuration. Each of these disks needs to be converted to dynamic disks before the configuration can proceed. This is achieved by selecting each disk in turn and executing the convert dynamic command:
DISKPART> select disk 1

Disk 1 is now the selected disk.

DISKPART> convert dynamic

DiskPart successfully converted the selected disk to dynamic format.

DISKPART> select disk 2

Disk 2 is now the selected disk.

DISKPART> convert dynamic

DiskPart successfully converted the selected disk to dynamic format.

DISKPART> select disk 3

Disk 3 is now the selected disk.

DISKPART> convert dynamic

DiskPart successfully converted the selected disk to dynamic format.
Once the disks have been converted to dynamic disks the next step is to create the RAID 5 volume using the create volume raid command. This command also takes as a parameter the disk= directive followed by a list of disks to be used in the array. The size= directive may also be specified to declare the size of the volume. If this value is omitted the volume will be sized to match the smallest contiguous block of unallocated space on the designated disk drives:
DISKPART> create volume raid disk=1,2,3

DiskPart successfully created the volume.
Once the command has completed and displayed the DISKPART> prompt the system will have begun the resynching process. This can take a considerable amount of time depending on the size of the volume. During this process, the status of the volume will be listed as Rebuild when the list volume command is executed:
DISKPART> list volume

Volume ### Ltr Label Fs Type Size Status Info
---------- --- ----------- ----- ---------- ------- --------- --------
* Volume 0 RAW RAID-5 16 GB Rebuild
Volume 1 C NTFS Simple 15 GB Healthy System
Volume 2 D DVD-ROM 0 B No Media
Once the resynch is complete the volume status will change to Healthy at which point the volume may be formatted (the RAW type listed above indicates the volume has yet to be formatted). The volume may be formatted using the format command as follows:
DISKPART> format fs=ntfs label="RAID 5 Vol"

100 percent completed

DiskPart successfully formatted the volume.
Once the volume has been formatted the RAID 5 configuration is ready for use.

Fixing RAID 5 Problems

In order to function, all the disks in a RAID 5 configuration must be online and healthy. If the RAID 5 set displays Failed Redundancy and the volume is listed as Offline, Missing or Online (Errors) there is a problem which needs to be resolved.
If the status is Offline or Missing, check that the disk is connected and powered up. If the problem is resolved select Rescan Disks from the Actions menu. Once the rescan is complete right click on the problematic drive and select Reactivate. All being well the drive status will change to Regenerating as the data is rebuilt using the parity information on the other drives in the array. If, once regeneration is complete, the status does not return to Healthy, right click once again and select Regenerate Parity.
If a disk in a RAID 5 configuration is listed as Failed or Online (Errors) repeat the above steps. If this fails the disk may be unrecoverable and will need to be replaced. To achieve this, right click on the volume on the failed disk and select Remove Volume from the popup menu. Once the volume has been removed, right click on a suitable block of unallocated space on another dynamic disk which is not already part of the RAID 5 array, has sufficient space and has a matching partition style and select Repair Volume. This will rebuild the RAID 5 configuration using the space on new disk drive together with the remaining healthy disks from the original RAID 5 configuration.


Available link for download

Read more »

Thursday, December 29, 2016

Installing Reverse Proxy on Windows Server 2012 R2 Web Application Proxy

Installing Reverse Proxy on Windows Server 2012 R2 Web Application Proxy



Install Windows 2012 R2 with GUI

Install the certificate onto the server
I dont tick "Mark this key as exportable." Because this server will be internet facing.
Change the adfs dns record in DNS to point to the ADFS reverse proxy server
Update the Host file on the server to force adfs.company.co.za always to the primary adfs server.
Install the "Remote Access Roles"
Configure the Application Proxy
All done you should not be able to add additional applications to the reverse proxy.
Doing a quick test to see if ADFS is responding from a remote client using urlhttps://adfs.company.co.za/adfs/services/trust/mex
Ping adfs.company.co.za to make sure it is going to the Proxy
In Internet explorer open the url you should get xml back
Ill releasing blog articles on how to publish the following service in the future:

Available link for download

Read more »