Archive

Author Archive

IIS : Search Engine Optimization (SEO) Just Got Easy

February 2, 2010 Leave a comment
 
The free IIS SEO Toolkit gives you an easy way to improve discoverability and user experience for your Web sites. Using the robots exclusion, sitemaps and site analysis tools in the Toolkit, you can increase Web site traffic and revenue by optimizing your site for search engine discoverability and enhancing the quality of your site.
 

Increase Website Traffic and Revenue
Analyze your website and find ways to boost your number of hits. Use SEO recommendations to improve traffic and increase your revenue stream.

Influence and Update Search Engines
Control the access and display of your content in search results. Keep search engines current with the latest information from your website.

Improve Customer Experience
Discover and solve common problems in your website content and design to enhance your end user experience. Make it easy for your customers to find what they’re looking for.

Download it here : http://www.microsoft.com/web/gallery/install.aspx?appid=seotoolkit

 

Categories: Microsoft

Build a great Windows 7 application : You could win a fully loaded HP Touchsmart tx2z Notebook!

February 2, 2010 Leave a comment

 

Use Visual Studio 2008 and/or Visual Studio 2010 Beta 2 to build a great Windows 7 application, and then post an article on The Code Project. You could win a fully loaded HP Touchsmart tx2z Notebook!

Submit a great article explaining how you built an app for Windows 7 – complete with code – and if yours is the highest rated article by both The Code Project community and our judges, you could win a fully loaded HP Touchsmart tx2z Notebook!

Requirements

  • Write a great article using the regular Code Project submission guidelines  
  • Your article should include screen shots and code samples
  • Your article must use Visual Studio 2008 and/or Visual Studio 2010 Beta
  • The app should run as a Windows client, and should take advantage of Windows-specific technologies/features found in Windows 7 (such as jumplists, thumbnails, etc.)
  • You’ll need to tag your article with the key words "Windows 7”
  • Post your article on The Code Project to automatically be entered in the contest

What You Can Win

Codeproject.com members can vote on your article. The articles that are highest-rated by members will be rated by our judges to determine the final winner.  If your article wins, in addition to receiving one of our three great prizes, you’ll be highlighted in The Code Project’s weekly newsletter and on our contest page.

 
Good luck!!!
Categories: Microsoft

To upgrade DPM 2007 SP1 running Windows 2003 server to DPM 2010 Windows Server 2008

January 29, 2010 Leave a comment

Follow these steps:

image
      3. From the command prompt, type DpmSync -sync

Categories: Uncategorized

Internet Explorer Security Patch

January 27, 2010 Leave a comment
 
Microsoft relase the Critical Security Updates for Internet Explorer Vulnerabilities

This cumulative security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. This security update is rated Critical for all supported releases of Internet Explorer.

 
 

Affected Software

Operating System Component Maximum Security Impact Aggregate Severity Rating Bulletins Replaced by This Update
Internet Explorer 5.01 and Internet Explorer 6 Service Pack 1        

Microsoft Windows 2000 Service Pack 4

Internet Explorer 5.01 Service Pack 4

Remote Code Execution

Critical

MS09-072

Microsoft Windows 2000 Service Pack 4

Internet Explorer 6 Service Pack 1

Remote Code Execution

Critical

MS09-072

Internet Explorer 6        

Windows XP Service Pack 2 and Windows XP Service Pack 3

Internet Explorer 6

Remote Code Execution

Critical

MS09-072

Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 6

Remote Code Execution

Critical

MS09-072

Windows Server 2003 Service Pack 2

Internet Explorer 6

Remote Code Execution

Moderate

MS09-072

Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 6

Remote Code Execution

Moderate

MS09-072

Windows Server 2003 with SP2 for Itanium-based Systems

Internet Explorer 6

Remote Code Execution

Moderate

MS09-072

Internet Explorer 7        

Windows XP Service Pack 2 and Windows XP Service Pack 3

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2003 Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2003 with SP2 for Itanium-based Systems

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2

Internet Explorer 7

Remote Code Execution

Critical

MS09-072

Internet Explorer 8        

Windows XP Service Pack 2 and Windows XP Service Pack 3

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2003 Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2**

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2**

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows 7 for 32-bit Systems

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows 7 for x64-based Systems

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 R2 for x64-based Systems**

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

Windows Server 2008 R2 for Itanium-based Systems

Internet Explorer 8

Remote Code Execution

Critical

MS09-072

**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option. For more information on this installation option, see the MSDN articles, Server Core and Server Core for Windows Server 2008 R2. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; see Compare Server Core Installation Options.

Categories: Microsoft

Manage your VMware environment using SCVMM scripts

January 22, 2010 Leave a comment

Do you know that you can create scripts using cmdlets that are provided with SCVMM 2008 to manage your VMware environment ?

For example, you can use the Add-VirtualizationManager cmdlet to add a VirtualCenter Server.

# Description:   Adds a VMware VirtualCenter Server to VMM.
# Connect to the VMM server.
Get-VMMServer -ComputerName "VMMServer1.Contoso.com"

# Define the variables.
$AddCredential = Get-Credential
$Cert= Get-Certificate -Computername "VirtMgrServer01.Contoso.com"

# Require user to accept the certificate before adding the VirtualCenter Server.
Write-Host "Following is the certificate information for this VirtualCenter Server:"
$Cert
$AcceptCert = Read-Host "Do you accept this certificate? If you accept, enter Y."
If ($AcceptCert -eq "Y")
{
     # Add the Virtual Center Server.
     Add-VirtualizationManager -ComputerName "VirtMgrServer01.Contoso.com" -Certificate $Cert –TCPPort 443 -Credential $AddCredential -SecureMode $TRUE
}
Else
{
     Write-Host "The script cannot continue unless the certificate is verified. Ending script."
}

After you add the VirtualCenter Server, you can manage the VMware ESX Server hosts.

 

 

Categories: Virtualization

Cmdlets and Parameters in VMM 2008 R2

January 22, 2010 Leave a comment

 

The following list summarizes the new and updated cmdlets and parameters in VMM 2008 R2.

Cmdlets

Disable-VMHost

This cmdlet places a VMM host into maintenance mode. For more information, see Maintenance Mode for Hosts.

Enable-VMHost

This new cmdlet removes a VMM host from maintenance mode and returns it to service. For more information, see Maintenance Mode for Hosts.

Parameters

AllowUnencryptedTransfers

You can use the AllowUnencryptedTransfers parameter to specify that network file transfers into or out of a library, or into, out of, or within a host group, do not require encryption. Allowing unencrypted file transfers can improve performance when neither the source computer nor the destination computer requires encryption. This parameter can be used with the Set-LibraryServer and Set-VMHostGroup cmdlets.

BlockLMIfHostBusy

You can use the BlockLMIfHostBusy parameter of the Move-VM cmdlet to stop Hyper-V live migration from attempting to restart a live migration that could not previously start because the source host or the destination host was already performing a live migration.

LimitCPUForMigration

The LimitCPUForMigration parameter limits the processor features for a virtual machine so that the virtual machine can be migrated to a different physical computer that has a different version of the same processor as the source computer. Migrating virtual machines between physical computers with processors from different manufacturers is not supported. This parameter can be used with the following cmdlets: New-HardwareProfile, Set-HardwareProfile, New-VM, Set-VM, and Set-Template.

MoveWithinCluster

When you place a host that is a member of a host cluster into maintenance mode using the Disable-VMHost cmdlet, and you use the MoveWithinCluster parameter, all the virtual machines that are currently deployed on the host will be migrated to another host in the same host cluster.

RemoveLibraryStoreSharePath

You can use the RemoveLibraryStoreSharePath parameter of the Set-VMMUserRole cmdlet to clear the path to the specified library share. This share is used by members of a self-service user role to store virtual machines or as a repository from which to deploy stored virtual machines or stored ISO images.

RetainDeletedObjects

When you use the RetainDeletedObjects parameter with the Get-VMMServer cmdlet, the objects in the cache that are marked for deletion will be preserved. This parameter is included for users who might develop a user interface.

RetainObjectCache

When you use the RetainObjectCache parameter with the Get-VMMServer cmdlet, the objects in the cache remain in memory and are not reclaimed by garbage collection. This parameter is included for users who might develop a user interface.

UseCluster

The UseCluster parameter lets you force the transfer of a virtual machine using Windows Server 2008 Cluster Migration, even when Hyper-V live migration is available, when you move a virtual machine using the Move-VM cmdlet. For more information, see Live Migration.

UseLocalVirtualHardDisks

The UseLocalVirtualHardDisks parameter specifies that the virtual hard disk file (.vhd) for a new virtual machine that is created by using the New-VM cmdlet is at a specified location on the destination host, and that no .vhd files will be copied from the library. For more information, see Rapid Provisioning of Virtual Machines.

VMNetworkOptimizationEnabled

The VMNetworkOptimizationEnabled parameter enables virtual machine network optimization detection. This feature improves network performance for virtual machines with network adapters that support virtual machine queue (VMQ) or TCP Chimney Offload. VMQ enables creation of a unique network queue for each network adapter. TCP Chimney Offload enables network traffic processing to be offloaded from the networking stack. This parameter can be used with the New-VirtualNetworkAdapter, Set-VirtualNetworkAdapter, New-P2V, and New-V2V cmdlets.

VMWarePortGroup

You can use the VMWarePortGroup parameter to specify a VMware port group.
Categories: Virtualization

About vulnerability in Internet Explorer

January 22, 2010 Leave a comment
 
As you may be aware, late last week we get noticed that a vulnerability in Internet Explorer has been associated with the recently publicised attacks against Google.
 
The facts to date:

. There have been a very limited number of targeted attacks against a small number of corporations.
. Attacks seen to date are only effective against Internet Explorer 6.
. Attacks are NOT widespread.
. Thus far we are NOT seeing attacks focused on consumers.


It is important to note that all software has vulnerabilities and switching browsers in an attempt to protect against this one, highly publicised, but currently limited attack can inadvertently create a false sense of security. Moreover, IE8 has built-in security features, such as the SmartScreen filter, that other browsers do not have.
These features protect against real threats to consumers, such as socially engineered malware and phishing attacks.


We strongly recommend those using Internet Explorer 6 or Internet Explorer 7 upgrade to Internet Explorer 8 as soon as possible to benefit from the improved security protections it offers.

IE8 can be downloaded here.

Recomendation :  those using Windows XP SP2 upgrade to Windows XP SP3.

Categories: Microsoft

Updated System Center Roadmap til 2011

December 29, 2009 Leave a comment
Microsoft published updated roadmaps for System Center family.

It seems that Virtual Machine Manager (SCVMM) will not receive any major update before 2011

Categories: Virtualization

Windows 2008 : view list of software updates before installing Hyper-V

December 28, 2009 Leave a comment
 

After you have installed Windows Server 2008, you must apply the Hyper-V update packages for Windows Server 2008 (KB950050).

You should also apply any other required updates before you install the Hyper-V role.

To view the list of software updates and check if any are missing, at the command prompt, type:

wmic qfe list

If you do not see “kbid=950050”, download the Hyper-V updates and then type the following command at a command prompt:

wusa.exe Windows6.0-KB950050-x64.msu /quiet

There are three update packages. After you install the updates, you must restart the server. The Update for Windows Server 2008 x64 Edition (KB 950050) and Language Pack for Hyper-V (KB951636) must be installed on the parent partition of the Server Core installation.

The Update for Windows Server 2008 (KB952627) is for remote management of the Server Core installation if you are managing the server from a computer running Windows Vista Service Pack 1 (SP1), and must be installed on the computer running Windows Vista SP1.

Remember : Before you enable the Hyper-V role, ensure that you have enabled the required hardware-assisted virtualization and hardware-enforced Data Execution Prevention (DEP) BIOS settings. Checks for these settings are performed before you enable the Hyper-V role on a full installation, but not on a Server Core installation.

Categories: Virtualization

MAC address pool duplication in Hyper-V

December 28, 2009 Leave a comment
 
Hyper-V has an algorithm to deal with duplicate MAC addresses on a single host, but not across multiple hosts.
 
So, if you not take care it is possible to accidentally deploy hosts with duplicate MAC address pools.
 
How to modify the default pool and how to detect it, if you are experiencing a duplicate MAC address situation with virtual machines, and how to use SCVMM 2008 to manage your Hyper-V hosts that can prevent duplicate MAC addresses ?
 
Hyper-V allows a virtual machine to be created with a static or dynamic MAC address. A static MAC address is one that the Hyper-V administrator assigns to the virtual machine. A dynamic address is one that Hyper-V assigns from its MAC address pool. When Hyper-V is installed, a MAC address pool is created and stored in the registry at HKLMSoftwareMicrosoftWindows NTCurrentVersionVirtualization. It is stored as a range of 256 values defined by two key values: MinimumMacAddress and MaximumMacAddress.

Since the MAC address pool is created when the Hyper-V role is installed, attempting to install the role and image the physical machine will cause each Hyper-V server deployed using the image to have the same MAC address pool. Even if you sysprep the machine before you image it, the registry values are not reset.

There are a some steps to avoid this situation:

  • Do not install the Hyper-V role before you sysprep the machine, but have it install as part of the post mini-setup process.
  • Before you sysprep the machine, delete the following two key values under HKLMSoftwareMicrosoftWindows NTCurrentVersionVirtualization
    • MinimumMacAddress
    • MaximumMacAddress

Using the first option will force unique values for the MAC address pool when you install the Hyper-V. The second option will force the keys to be recreated when the VMMS service starts during boot.

Using SCVMM 2008 to deal with MAC issue

System Center Virtual Machine Manager 2008 uses a different approach when managing virtual machines and MAC addresses by using static MAC addresses from a defined pool. This pool is used across all hosts that it manages regardless of host type (Virtual Server 2005 R2 SP1, Hyper-V, or VMware). By default the pool is in the range of 00-1D-D8-B7-1C-00 to 00-1D-D8-F4-1F-FF for 3,998,719 available MAC addresses. You can define your own range if you like, but you must follow these rules:

  1. The first three octets must be the same for the Minimum and Maximum addresses.

  2. You cannot use octets that are already in use by Microsoft or VMware.

Steps to modify the default range in the SCVMM 2008:

  1. Go to the SCVMM Administration console.
  2. Click on the Administration View button.
  3. Click Networking.
  4. Click Global Static MAC address Range.
  5. In the actions pane, click Modify.
  6. Change the range values.
  7. Click OK.

Now all virtual machines deployed using the System Center Virtual Machine Manager 2008 administration console or using SCVMM PowerShell cmdlets will get a static MAC address from the global pool.

Be carefull : do not 

deploy a virtual machine using the Hyper-V Manager MMC on a host managed by SCVMM, the virtual machine will not use the SCVMM static MAC address pool, but will use the locally defined dynamic MAC address pool on the Hyper-V host and then you can have the MAC duplication issue.

 

 

Categories: Virtualization