Sunday, September 27, 2009


CubeWorks is a productivity tool that was created with the realization that completing a task often requires information from more than one source.

It displays a cube containing six applications at a time, one on each cube face. This allows a user to access multiple sources quickly, helps them visualize the information and makes navigation easier.

Getting things done becomes more efficient.


Applications that can be loaded on to the cube faces are:

  • a full function web browser.
  • a powerful, rich text editor and file browser.
  • a notebook for organizing notes along with a set of templates.
  • a search application that allows you to search content stored on the phone including contacts, call logs, calendar entries, bookmarks, text messages and application content.
  • a communications application that allows you to quickly visualize recent communication with your contacts and drill down into them.
  • the android calculator which contains scientific functions and a history tape.

Key Concepts

Feature List

Tuesday, September 22, 2009

General keyboard shortcuts

Remember these keys when ur mouse is not working this is very helpful.

General keyboard shortcuts

CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
CTRL+SHIFT+ESC (Open Task Manager)

Dialog box keyboard shortcuts

If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control.

CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft natural keyboard shortcuts

Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)

Accessibility keyboard shortcuts

Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)

Windows Explorer keyboard shortcuts

END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign () (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)

Shortcut keys for Character Map

After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:

RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)

Microsoft Management Console (MMC) main window keyboard shortcuts

CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)

MMC console window keyboard shortcuts

CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)

Remote desktop connection navigation

CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)

Microsoft Internet Explorer navigation

CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CTRL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)

Second hard drive says write-protected

I've got a new 2008 enterprise terminal server. I've installed all my apps to the 2nd hard drive. Now for no reason, I can't write to the drive and my apps can't either as they all crash as soon as they need to.

I get this exact error when simply trying to create a directory in the root of the drive:

"The disk is write-protected.

Remove the write-protection or use another disk."

I'm logging in as the local admin, domain admin makes no diff. I've also given full permissions to "everyone" with no luck. How the heck can I fix this bugger?

Now here is the Solution:-

do the following

on cmd prompt launch "diskpart.exe"

on the diskpart prompt, do the following


This will give you a list of all disks in your system
Note down the number of your problem disk, then do the folloiwng


Where x is the number of your problem disk, then do the following


This will list all the details of your problem disk
Check if the ReadOnly flag is set to Yes

If the ReadOnly flag is set to Yes, do the follwing


This should clear the flag on the disk, please retry your disk operations

If ths does not solve it, we have another flag on the volume, same command, but now on volume:


Network Ports Used by Key Microsoft Server Products

Usefull link:-

First MS link

Second prepared by me

List of DNS record types

Good to enhance knowledge.

List of DNS record types

Enable SQL Report Builder Anonymous Access

Enabling Anonymous Access to Report Builder Application Files

Report Builder uses ClickOnce technology to download and install application files on the client computer. When it starts on the client computer, the ClickOnce application launcher will make a request for additional application files on the report server computer. If the report server is configured for Basic authentication, the ClickOnce application launcher will fail the authentication check because it does not support Basic authentication.

To work around this issue, you can configure Anonymous access to the Report Builder program files. Doing so allows ClickOnce to bypass the authentication check when retrieving its files. Enable Anonymous access by doing the following:

  1. Verify that the report server is configured for Basic authentication.
  2. Create a bin folder under ReportBuilder and copy four assemblies to the folder.
  3. Add the IsReportBuilderAnonymousAccessEnabled element to the RSReportServer.config and set it to True. After you save the file, the report server creates a new endpoint to Report Builder. The endpoint is used internally to access program files and does not have a programmatic interface that you can use in code. Having a separate endpoint allows Report Builder to run in its own application domain within the Report Server service process boundary.
  4. Optionally, you can specify a least-privilege account to process requests under a security context that is different from the report server. This account becomes the anonymous account for accessing Report Builder files on a report server. The account sets the identity of the thread in the ASP.NET worker process. Requests that run in that thread are passed to the report server without an authentication check. This account is equivalent to the IUSR_ account in Internet Information Services (IIS), which is used to set the security context for ASP.NET worker processes when Anonymous access and impersonation are enabled. To specify the account, you add it to a Report Builder Web.config file.

The report server must be configured for Basic authentication if you want to enable Anonymous access to the Report Builder program files. If the report server is not configured for Basic authentication, you will get an error when you attempt to enable Anonymous access.

For more information about authentication issues and Report Builder, see How to: Configure Report Builder 1.0 and Report Builder 2.0 Access.

To configure Report Builder access on a report server configured for Basic authentication.

Verify the report server is configured for Basic authentication by checking the authentication settings in the RSReportServer.config file.

Create a BIN folder under the ReportBuilder folder. By default, this folder is located at \Program Files\Microsoft SQL Server\MSRS10.MSSQLSERVER\Reporting Services\ReportServer\ReportBuilder.

Copy the following assemblies from the ReportServer\Bin folder to the ReportBuilder\BIN folder:

  • Microsoft.ReportingServices.Diagnostics.dll
  • Microsoft.ReportingServices.Interfaces.dll
  • ReportingServicesAppDomainManager.dll
  • RSHttpRuntime.dll

Optionally, create a Web.config file to process Report Builder requests under an Anonymous account:

Authentication mode must be set to Windows if you include a Web.config file.

Identity impersonate can be True or False.
  • Set it to False if you do not want ASP.NET to read the security token. The request will run in the security context of the Report Server service.
  • Set it to True if you want ASP.NET to read the security token from the host layer. If you set it to True, you must also specify userName and password to designate an Anonymous account. The credentials you specify will determine the security context under which the request is issued.
Save the Web.config file to the ReportBuilder\bin folder.

Open RSReportServer.config file, in the Services section, find IsReportManagerEnabled and add the following setting below it:

Save RSReportServer.config and close the file.

Restart the report server.

Download link:-

Monday, September 21, 2009

Super Talent’s RAIDDrive SSDs Targeted for Enterprise Servers, Workstation and Gaming Segments

SSD (Solid State Device) is trending towards replacing magnetic based hard disk drive
but typically, its capacity and pricing is still not comparable with conventional hard disks. Good news now, Super Talent has unveiled one of the largest RAIDDrive SSDs in the world targeted for server and high end gaming segments.


There are three series of RAIDDrives being tailored for different requirements, namely RAIDDrive ES (Enterprise), RAIDDrive WS (Workstation) and RAIDDrive GS (Gamers). While the ES and WS version is based on SLC flash maximize up to 1TB only, the GS version is designed with MLC that can reach up to 2TB capacity, offering more performance needed for gaming segment. Besides, Super Talent’s SSD is featured with a PCI Express 2.0 X 8 interface
and can boost up to 4GBps bandwidth which is ten times and five times faster than SATA-II and SATA-III interfaces respectively. Being designed specifically and optimized for NAND flash memory, it can support a sequential read and write speeds up to 1.4GBps and 1.2GBps respectively.

However, pricing is still a huge gap and those who would like to get this extremely huge SSD may have to wait a bit longer since it will be retailed at $4999 for GS version at 1TB and may only be affordable by enterprise’s users.

Friday, September 18, 2009

119 Tips for Passing the Microsoft Windows

Nice Document:-

119 Tips for Passing the Microsoft Windows

Windows IIS server hardening checklist

Windows IIS server hardening checklist



Files and Directories




Auditing and Logging

Sites and Virtual Directories

Script Mappings

ISAPI Filters

IIS Metabase

Server Certificates



1. Do not connect an IIS Server to the Internet until it is fully hardened.

2. Place the server in a physically secure location.

3. Do not install the IIS server on a domain controller.

4. Do not install a printer.

5. Use two network interfaces in the server -- one for admin and one for the network.

6. Install service packs, patches and hot fixes.

7. Run IISLockdown run on the server.

8. Install and configure URLScan.

9. Secure remote administration of the server and configure for encryption, low session time-outs and account lockouts.

10. Disable unnecessary Windows services.

11. Ensure services are running with least-privileged accounts.

12. Disable FTP, SMTP and NNTP services if they are not required.

13. Disable Telnet service.

14. Disable ASP.NET state service if not used by your applications.

15. Disable webDAV if not used by the application, or secure it if it is required. (See How To: Create a secure webDAV Publishing Directory at

16. Do not install Data Access Components unless specifically needed.

17. Do not install the HTML version of the Internet Services Manager.

18. Do not install the MS Index Server unless required.

19. Do not install the MS FrontPage Server extensions unless required.

20. Harden TCP/IP stack.

21. Disable NetBIOS and SMB (closing ports 137, 138, 139 and 445).

22. Reconfigure Recycle Bin and Page file system data policies.

23. Secure CMOS settings.

24. Secure physical media (floppy drive, CD-ROM drive and so on).


1. Remove unused accounts from the server.

2. Disable Windows Guest account.

3. Rename Administrator account and set a strong password.

4. Disable IUSR_MACHINE account if it is not used by the application.

5. Create a custom least-privileged anonymous account if applications require anonymous access.

6. Do not give the anonymous account write access to Web content directories or allow it to execute command-line tools.

7. If you host multiple Web applications, configure a separate anonymous user account for each one.

8. Configure ASP.NET process account for least privilege. (This only applies if you are not using the default ASP.NET account, which is a least-privileged account.)

9. Enforce strong account and password policies for the server.

10. Restrict remote logons. (The "Access this computer from the network" user-right is removed from the Everyone group.)

11. Do not share accounts among administrators.

12. Disable Null sessions (anonymous logons).

13. Require approval for account delegation.

14. Do not allow users and administrators to share accounts.

15. Do not create more than two accounts in the Administrators group.

16. Require administrators to log on locally or secure the remote administration solution.

Files and Directories

1. Use multiple disks or partition volumes and do not install the Web server home directory on the same volume as the operating system folders.

2. Contain files and directories on NTFS volumes.

3. Put Web site content on a non-system NTFS volume.

4. Create a new site and disable the default site.

5. Put log files on a non-system NTFS volume but not on the same volume where the Web site content resides.

6. Restrict the Everyone group (no access to \WINNT\system32 or Web directories).

7. Ensure Web site root directory has deny write ACE for anonymous Internet accounts.

8. Ensure content directories have deny write ACE for anonymous Internet accounts.

9. Remove remote IIS administration application (\WINNT\System32%#92;Inetsrv\IISAdmin).

10. Remove resource kit tools, utilities and SDKs.

11. Remove sample applications (\WINNT\Help\IISHelp, \Inetpub\IISSamples).

12. Remove IP address in header for Content-Location.


1. Remove all unnecessary shares (including default administration shares).

2. Restrict access to required shares (the Everyone group does not have access).

3. Remove Administrative shares (C$ and Admin$) if they are not required (Microsoft Management Server (SMS) and Microsoft Operations Manager (MOM) require these shares).


1. Restrict Internet-facing interfaces to port 80 (and 443 if SSL is used).

2. Run IISLockdown run on the server.


1. Restrict remote registry access.

2. Secure SAM (HKLM\System\CurrentControlSet\Control\LSA\NoLMHash). This applies only to standalone servers.

Auditing and Logging

1. Audit failed logon attempts.

2. Relocate and secure IIS log files.

3. Configure log files with an appropriate file size depending on the application security requirement.

4. Regularly archive and analyze log files.

5. Audit access to the Metabase.bin file.

6. Configure IIS for W3C Extended log file format auditing.

7. Read How to use SQL Server to analyze Web logs at

Sites and Virtual Directories

1. Put Web sites on a non-system partition.

2. Disable "Parent paths" setting.

3. Remove potentially dangerous virtual directories including IISSamples, IISAdmin, IISHelp and Scripts.

4. Remove or secure MSADC virtual directory (RDS).

5. Do not grant included directories Read Web permission.

6. Restrict Write and Execute Web permissions for anonymous accounts in virtual directories.

7. Ensure there is script source access only on folders that support content authoring.

8. Ensure there is write access only on folders that support content authoring and these folders are configured for authentication (and SSL encryption, if required).

9. Remove FrontPage Server Extensions (FPSE) if not used. If FPSE are used, update and restrict access to them.

10. Remove the IIS Internet Printing virtual directory.

Script Mappings

1. Map extensions not used by the application to 404.dll (.idq, .htw, .ida, .shtml, .shtm, .stm, idc, .htr, .printer).

2. Map unnecessary ASP.NET file type extensions to "HttpForbiddenHandler" in Machine.config.

ISAPI Filters

1. Remove from the server unnecessary or unused ISAPI filters.

IIS Metabase

2. Restrict access to the metabase by using NTFS permissions (%systemroot%\system32\inetsrv\metabase.bin).

3. Restrict IIS banner information (Disable IP address in content location).

Server Certificates

1. Ensure certificate date ranges are valid.

2. Only use certificates for their intended purpose (For example, the server certificate is not used for e-mail).

3. Ensure the certificate's public key is valid, all the way to a trusted root authority.

4. Confirm that the certificate has not been revoked.


1. Map protected resources to HttpForbiddenHandler.

2. Remove unused HttpModules.

3. Disable tracing.

4. Turn off debug compiles.