Additional Account Info Tab in AD Users And Computers Console

Posted on August 13, 2014 · Posted in Active Directory
Additional Account Info tab on ADUC windows 2012 r2 x64

Many administrators are familiar with Additional Account Info tab since there have been AD domains based on Windows Server 2003. It is to be reminded that the Additional Account Info tab to appear in the User Properties of Active Directory Users and Computers (ADUC) console, you had to download Windows.. read more

Integrate Windows Updates into Windows 8 Image

Posted on August 8, 2014 · Posted in Windows 8
dism: integrate updates into win8 image (add-package)

Today we’ll show how to integrate Windows updates into the offline image of Windows 8 / Server 2012 using DISM. We need: offline image of Windows 8 and Windows updates in .msu format (can be download from Microsoft website). It’s important to make sure that the your Windows OS image.. read more

How to Increase KMS Server Current Count

Posted on July 11, 2014 · Posted in Windows 7
get kms activation current count

On our site we have already talked about the installation, configuration and activation of Microsoft products (such MS Office 2013, Windows 8.1 / 2012 R2) using Key Management Service (KMS). Today we look at the concept of KMS activations counter and how to increase it value.

Why Windows 8 Wakes Up from Hibernation on Its Own

Posted on July 7, 2014 · Posted in Windows 8
PowerTroubleshooter logs

Most of Windows 8 users prefer not turn off their computers for a night, but rather turn it into sleep or hibernation mode, and this is absolutely right and reasonable. But in some cases a computer can come out of hibernation (wake up) on its own. If a computer is.. read more

How to Disable UAC for Specific Applications

Posted on July 4, 2014 · Posted in Windows 7
how to disable uac for regedit

A User Account Control (UAC) that has appeared in Windows Vista is a great security solution for Windows OSs allowing to protect a PC from a number of threats, like viruses, trojans, worms, rootkits, etc. When the UAC is enabled, a system asks for a confirmation of any action performed.. read more

Data Recovery on a Damaged Hard Disk Encrypted with Bitlocker

Posted on June 27, 2014 · Posted in Windows 8
repair data from damaged bitlocker disk

Today we’ll describe how to recover data from a damaged hard drive encrypted using Bitlocker. The issue can arise due to the damage of the file system on the encrypted disk (for instance, the damage of the disk area where Bitlocker stores its important information due to an unexpected system.. read more

Troubleshooting: Identify Source of Active Directory Account Lockouts

Posted on June 25, 2014 · Posted in Active Directory
Active Directory Account Lockout Policies

An account security policy in most businesses requires mandatory Active Directory user account lockout if the password has been entered incorrectly n times. Usually an account is locked for several minutes (5-30), when a user can’t log in the system. In some time defined by the security policies, the account.. read more

How to Reduce the Application StartUp Delay in Windows 8

Posted on June 22, 2014 · Posted in Windows 8
Windows 8: Reduce Application StartUp Delay

Almost all users who have recently migrated to Windows 8 note a slower launch of the applications in the startup compared to the previous Windows versions. Indeed, the startup apps launch some seconds after the Start screen appeared. It feels like the system holds on for a while before launching.. read more

Java Settings Management with Group Policies

Posted on June 20, 2014 · Posted in Active Directory
java security level: very high

Today we’ll deal with the configuration peculiarities of Java SE centralized security settings on corporate computers using Windows group policies (GPO). These policies should prevent downloading and running untrusted Java applets and ActiveX objects on corporate computers.

How to Get Plain Text Passwords of Windows Users

Posted on June 18, 2014 · Posted in Windows Server 2008 R2
mimikatz get plaintext username and passwords logged windows user

In this article, written as a part of a series devoted to Windows systems security (in the last article we discussed the security issues of passwords stored in the GPP), we will learn quite a simple method to get unencrypted passwords of all the users working in a Windows system.