You may be using Robocopy when copying files, Robocopy is an older Microsoft command line utility (even though a GUI has later been created) that can copy files in a particular robust way (Robocopy actually stands for Robust copy), the trick is that you can specify a lot of parameters eg. copy NTFS rights, mirror a directory structure and much much more.
However I just stumbled over an interesting freeware utility, this utility seem to offer many of the same options plus a bunch of new once..
Among the the interesting plus features is one I have often sighed “move one at the time”, say you need to move a LARGE directory structure on a server to a new location on the same drive and as a twist you need to inharit NEW ntfs rights (the ntfs rights from the top folder in the new structure) – you could not just use the build in drag and drop move in windows as you would also move the NTFS rights (as its the same drive) (yes of cause you could afterwards change the NTFS rights but that takes a lot of time)… but now you can set Fastcopy to just move one file at the time. Sure there were other other ways of doing this, but this however is quite neat..
Other interesting features is speed limiting, less intensive processor usage, verify, filtering and many many more.
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-08-21 11:01:132009-08-22 20:24:08Fastcopy a possible alternative to Robocopy
Do your PC’s or network contain important confidential data, and are you afraid of data theft by employees?
In that case take a look at this article, it describes how to disable USB mass storage devices (USB pens, disks) on machines complete with GPO/ADM templates and all.
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-08-17 13:43:132009-08-17 13:43:13Protect your data – block USB mass storage
If you are a sysadmin you have likely experienced that some odd user keep getting his/her Windows Domain Account locked out, there can be numerous reasons for this but while debugging the exact reason the user keep getting locked out and keep calling you every hour or so to be unlocked.
Well I came up with a workaround, you download a simple freeware utility called unlock.exe, and then schedule a batch job to run every 15-30 min that simply unlocks the account. Now this is not the solution, as you really need to find the cause, but as debugging things like these can take some time and perhaps you have other pressing matters as well – then this is a fair workaround.
The batch file would look something like this;
unlock.exe . username
The unlock command also allow for listing locked accounts, and now I am thinking, maybe I could even set up some surveillance with this, creating a list of locked accounts every morning… but that’s another story 🙂
Got a Netbook? WinXP seem to slow? Well maybe Moblin could be the answer, Moblin is a small (fast) linux distribution for atom based netbooks.. It looks interesting, maybe I’ll see if it can be fooled into installing on my old IBM X31 (Centrino not Atom).. I never really tried any of these linux distributions, maybe this would be more than enough for browsing the net (which is mainly what I do on my IBM X31)..
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-06-16 19:58:292009-06-16 18:35:40Moblin for Netbooks
If you are debugging why a particular user always is being locked out with his/her domain account, then you may want to give this tool a spin. It’s a freebie from Microsoft called “Account Lockout Status“, and what it will do is to let you see some useful info on the users bad password count etc. on all Domain Controllers in the domain. Useful stuff even if it’s a golden oldie by now 🙂
You can also get a ‘package deal’ called “Account Lockout and Management Tools” from Microsoft that includes some additional utilities, among others an advanced Eventlog filter (can gather from several servers and filter in different ways) and can also be tweaked to display some additional info from AD on each userobject.
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-06-10 11:55:442009-06-10 12:03:24Account Lockout Status – an oldie but still useful
The Services MMC Snap-In has two views namely Standard and Extended. The Extended view provides information about the selected service in the left side of the details pane. Also, it includes links for starting, stopping, or pausing the selected service. If you have a small monitor and need more screen real estate, you can configure the Services MMC to open in Standard view by default.
Open Services MMC Snap-In in Author mode
You can use MMC in author mode to create new consoles or modify existing consoles. Follow these steps to set Services MMC start in Standard View by default.
1. Click Start, Run and type %windir%\system32
2. Backup the file Services.msc and store in a safe location
3. Right-click the file Services.msc, and choose Author
The Services MMC Snap-In opens in Author mode, in which you can customize the window size, pane width, view mode (Standard or Extended) etc.
4. Customize the Snap-In accordingly.
5. From the File menu, click Save to save your settings.
6. Exit the Services MMC, which is currently in Author mode.
Now open Services MMC (services.msc) normally and see if the settings are applied.
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-06-09 15:23:362009-06-09 21:20:45Configure Services MMC Snap-in to Open in Standard View by Default
Want to seriously harden your Windows installation? You may find some inspiration here; http://nvd.nist.gov/fdcc/index.cfm this is an ongoing IT hardening project driven by the US NIST with help from the NSA and USAF among others.
Maybe not that useful to the regular user, but might be inspirational to corporate users.
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-06-09 10:39:382009-06-09 10:39:38Windows hardening taken to the extreme
You maybe aware of utilities like ERD (from Microsoft former Winternals, sadly only available to certain Microsoft License holders) that will allow you to change the password for a Windows account, thus effectivelyallowing you access to the data on the pc/server?
There can be legitimate reasons for this (forgotten passwords etc), but some users may have a more sinister motive… to gain unauthorized access.. for the latter group utilities like ERO has a drawback, it leave traces behind, when the original user try to logon he can’t as you changed the password.. Now there are ways around this, some other utilities allow you to dump the password database before you change it, then afterwards (once you scored all the data) you can reinject the original password and only a close examination would reveal your traces.
But now there is a new player on the marked, Kon-Boot,this small boot cd will do something very clever indeed, it will allow you to boot into Windows as normally via a CD – and then once asked for the password you can just enter anything – Kon-Boot will simply bypass the password check.. Clever indeed.
A few problems/concerns though;
Is this Kon-Bootsafe (or does it leave something nasty behind like eg a Rootkit), some experienced guys took it upon themselves to check just this and their preliminary findings is that it appear safe enough (no aparant traces left behind).
EFS and diskencryption will defeat this, you will not be able to read EFS (Microsoft Encrypted file system) files and diskencryption in general would serve as a protection against booting via a Kon-Boot bypass boot cd/dvd (this may however not apply to all encryption schemes / software brands).
Allegedly this bypass is only possible for local machine accounts and not for domain accounts (however if you use a local admin account, then once you are a local admin you will have full access to the entire disk (except EFS) and all data on it, thus this may not be a big deal).
I will have to experiment a bit with this in the near future, it sounds disturbing. Update; I just tested this on a VM, and it works just as advertised on an XP installation, interesting indeed…
Update 2; I checked this on a domain account, if the user has his profile/password cached (have been logged on previously) you CAN logon locally and access the users data – BUT ofcause no access to network ressources and you will see a warning that your credentials has expired (or something to that effect). I also tried a locked/disabled account, and here I was unable to logon.
I just stumbled across a blog post from Claus Valca refering to VistaPE, as I could judge this is more or less a replacement for BartPE which has been dead in the water since 2006.
VistaPE should allow you to create a bootable CD/DVD with the Vista kernal (much as BartPE did with the XP kernal), this is useful as a recovery tool/image tool/repair tool/virus cleanup tool etc. I have previously created antivirus cleanup cd’s using BartPE, but maybe VistaPE could offer better compatibility with the later hardware models.
I will add this to my “I have to look into this list” (which sadly has become quite long)..
https://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.png00Mikehttps://readmydamnblog.com/wp-content/uploads/2015/02/toplogo4.pngMike2009-06-09 09:06:142009-06-09 09:07:47VistaPE a replacement for BartPE?