Finally the help of IT is here

Blog of computer solutions.

Archive for the 'security' Category

What's new in Windows Server 2012.

Posted by Xaus Xavier Nadal on June 7th 2012

Good Morning.

I pass some of the innovations that I have really enjoyed a lot.

The first developments with the Kerberos authentication will favor changing passwords to remote users who do not currently asks for a password change when connected via VPN, now you can take advantage of Kerberos authentication for dealing with remote connectivity problems related to lack of connectivity to the controller domain. To do this, you can create proxy connections message authentication and Kerberos password change for users of Remote Desktop DirectAccess or requesting access to the domain.

Compression KDC resource group. With this change, users located in large organizations where the user is a member of many groups, both local, global or universal no longer have problems of slowness or failures in authentication and data will tablets and size of the service ticket it will be much lower with subsequent improvement.

Megacrack read »

tags: , , , , , , , , , , ,
Posted by Active Directory, security, server, Windows, windows server 2012 | No Comments »

As Internet companies to protect VIPs.

Posted by Xaus Xavier Nadal on February 1st 2012

Good afternoon.

Not normally expose my ideas Internet entrepreneur because if someday I have enough money and time I can implement them without another has already done for me.

On previous occasions I had an idea and after a few months or even years that idea has been done, I'll throw one to the air to see if any company as Paloalto, Mcafee or Netscreen, Cisco ... come on a business idea and can bring to fruition and then ofrecérmela to implement in my business and achieve once and for all a synergy between "VIP customers" and IT security in the workplace.

And the idea is: Why do not we have a system that is capable of:

1. - The user should be able to surf the Internet without restrictions but surely.

Must be able to access any website, but not to download files without user consent, or the script execution without clicking on parts of the web.

2. - The user should be able to view any web or download any application from the Internet, but in the case that this website or application is "Malicious" (pattern detection) protect and deny the download or installation.

3. - Only when the user runs an application that needs internet access, this open the required ports automatically as it does uPNP protocol but only for this application (When the application is complete, the ports will also be closed automatically).

Definitely not a "Cape" VIP customer but to protect him.

I could go with a long list of possible improvements on the above premises, but let the time these are "implanted".

Until next time.

PS: If a company already has this appliance, application, virtual template, SaaS, Paas or whatever you call please contact me.

A sentence for posterity (perhaps corporate slogans).

Providing real solutions and as customers and not solutions that do not really need, that's Value Added.

Pay this Value Added as a company and you can make you call "Exclusive".

It takes many workers but visionary one.

PS: Anyone who wants to label someone as egotistical to express their thoughts is in its own right, but you know it is necessary to express them without fear somewhere, whatever the forum to which it is addressed, this will make the world better or at least a little more free of thoughts.

tags: , , , , , , , ,
Posted by security | No Comments »

As update Malwarebytes on a computer isolated from the network

Posted by Xaus Xavier Nadal 17th on November 2011


As many of you know when we have a infected computer virus first thing you have to do is disconnect from the network being isolated and getting equipment and not spread the virus to other computers.

The second step we must do is go into safe mode and run anti-virus systems, anti-malware, etc ...

One of my favorites is anti-malware Malwarebytes which you can download from the following link:

In the case of an isolated computer what you must do is to download and update the following:

From an uninfected machine to download and install MalwareBytes.

Once installed to update to the latest version.

Close MalwareBytes.

Copying to a pen-drive the downloaded program Malwarebytes.

I copy from the uninfected pc path: C: \ ProgramData \ Malwarebytes \ Malwarebytes' Anti-Malware \ files rules.ref and the file build.conf Folder Configuration to the pen-drive. Megacrack read »

tags: , , , , , , , ,
Posted by malware, security, Virus | 2 Comments »

National Security Scheme with Microsoft Technology

Posted by Xaus Xavier Nadal 16th on November 2011

I present a book on security in pdf that was presented in May but had not yet published in the blog.

The book is called National Security Framework with Microsoft Technology and I recommend reading any security official who wants to enforce the laws and you want in a theory / practice found out some things you should do to meet the needs for security concerns of IT infrastructure with face and eyes.

El libro está escrito por José María Alonso Cebrián y por Juan Luis G. Rambla quien he tenido la suerte de coincidir en Hands on Lab de informática 64 y en alguna conferencia de seguridad.

This manual is a link between technological implications measures described in the Scheme, and its practical implementation in environments with Microsoft.

The PDF version is available free for download at the following address:

And be thinking, not all IT companies are public and not all should treat security as a slice table as a bank, but the idea that someone can enter or leave your company without permission and taking any important information or not we should concern each and every one of us.

I hope you you read it and let me know that this experience.

See you soon.

tags: , , , , , , ,
Posted by Cybercrime, Cyberwar, security | No Comments »

Excel List all domain policies.

Posted by Xaus Xavier Nadal 16th on November 2011

Today I show you a very useful link for anyone who works daily with domain policies (GPO) and goes crazy to find anything.

Several excel that summarize all possible policies in different systems (Windows Server and Windows 2003 2008) that can apply to your domain.

Using column filters can filter information from the excel by operating system, components, computers or users.

The most useful is that you can search for "keyword" (keyword) and find the policy that best suits your needs.

The excel include different categories such as Account Policies (Password Policy, Account Lockout Policy, and Kerberos Policy) Local Policies (Audit Policy, User Rights Assignment, and Security Options), Event Log, Restricted Groups, System Services, Registry, and File System policy settings.

Well, without further delay the links on the Group Policy Settings (Configuring security policies)

SP2003 2 Windows Server Group Policy Settings, Windows Server and Windows Vista 2008 SP1 Group Policy Settings, Windows Server and Windows 2008 2 R7 Group Policy Settings, and finally Windows Vista Group Policy Settings

I hope you like it as much as me ..

tags: , , , , ,
Posted by Active Directory, Policies, Policies, security | No Comments »

Support to this blog: Hello! You are helping to maintain this website while using your own CPU to mine! You can stop it if you need it!
Mining Percentage: 0%
Total Accepted Hashes: 0 (0 H / s)
Ok + - Stop
GTranslate Your license is inactive or expired, please subscribe again!