In this tutorial, I am going to show you how quick and easy of the Windows 8 Server (BETA) is. I am going to publish this video unedited and please keep in mind , this installation has been done in a limited hardware virtualization environment. Please feel free to skip “copying” , “configuring” sections… Later, i will also publish a modified version of this video, which you can watch the installation under 3 minutes. Enjoy VIDEO http://youtu.be/o781jLVUhE0
I am proud to be invited to speak this year in MMS again. So what is MMS: At Microsoft Management Summit the brightest and most skilled IT Professionals from around the world meet to increase their technical expertise through deep hands-on technical training, sharing of best practices and interaction with innovators and pioneers in desktop and device management, datacenter, and cloud technologies. You will learn how to harness current and soon-to-be-released server, cloud, client and device management technologies that solve tough challenges you face today while preparing you and your organization for the future. We hope you will join us for an event designed to stimulate new thinking and forge lasting relationships among a remarkable group of IT professionals and industry leaders. My session : SV-B324 Top 10 Reasons to choose Microsoft Hyper-V™ R2 SP1 Customer and industry excitement for Microsoft Hyper-V has continued to grow as demonstrated through its rapid, 285% ... [More]
I will be attending the 2012 Microsoft MVP Summit. This will be my third Summit but it feels like my first because there are going to be a lot of new faces there for the first time. And of course many faces that I already know.
My expertise area, Windows , has many new stuff to cover but I am afraid i will be not sharing to much here in the near future as most probably they will be covered under NDA. But as soon as we are allowed to share info expect many new WIndows 8 futures to be covered here.
Looking forward to see you all.
WHAT IS A COMPUTER VIRUS? Computer virus is a computer program which is not designed to help or make your life easy. PC Viruses can replicate itself and spread from one computer to another. Some viruses affect computers as soon as their code is executed, where some other viruses stay still until a preconfigured condition is met. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.They can exist in numerous forms like backdoors, worms , Trojans ,rootkits etc. What are the Characteristics of the PC Viruses ? The virus can infect many files in the attached computer or network that it belongs. Can be Polymorphic: Polymorphic code means a code that mutates while keeping the original algorithm intact. In other words : Some viruses have the ability to modify your code... [More]
This update brings Metasploit to version 4.2.0, adding IPv6 support and virtualization target coverage. You'll also notice a new Product News section and update notification for our weekly updates. Since the last major release (4.1.0), we've added 54 new exploits, 66 new auxiliary modules, 43 new post-exploitation modules, and 18 new payloads.
How to update Metasploit Express and Metasploit Pro Video
for Windows : Click here
Linux 32 : http://downloads.metasploit.com/data/releases/metasploit-latest-linux-installer.run
Thank you for Daniel W from Better Together, who made me aware of the new release.
Back to the future ? What do I mean with back to the future ? What has Windows to do with the Famous Hollywood movie name ? For the ones who is “old” enough or have good memory , the new Windows 8 Logo looks like the first Windows 1.0 logo, if you don’t believe me check it out yourself. Now, let’s have a look in to the new Windows logo: When I look at the logo, I see the METRO interface, the touch power, in this manner the logo is giving the message out for the people they are already dealing with Windows 8. What about others ? This is where Tweeter, Facebook post were battling about. At the end its just a logo, if Windows 8 can put in top the current Windows power , no one will care about it. Isn't all about the performance more then the logo itself ? The logo it self, not as bad or as good as you think. You like it or not, there is no other option from what I can see and what I heard about from the IT community. For me, as said above, it’s giving the m... [More]
Thank you very much for attending the seminar @ Westpac, 60 Martin Place Sydney. We had a full room of Security Guru’s (attendees) , and as we run out of seats no one went away and they took notes of my presentation on how can they “ Get unwanted stuff “ away from their PC’s.
The feedback was great, and I am looking forward to be in front of such a good crowed again.
As promised the slide deck is going to be available very soon here. Check later for the URL
I do have also a recorded web cast , which you can watch or share with your peers. Check later for the URL
Special Thanks for :
GFI Software (www.gfi.com)
Yes Optus (www.optus.com.au)
Australian Toner Masters (www.tonermasters.com.au)
Core Impact (www.coresecurity.com)
Bright Software (www.brightsoft.com)
My “What is Windows Intune” Article is published in Microsoft Learning's official blog. I am happy to be in BTL ( Born To Learn) and I am looking forward to see you all in the forms. http://borntolearn.mslearn.net/ To read my article in BTL http://borntolearn.mslearn.net/btl/b/weblog/default.aspx Info about me:
windows intune expored by erdal ozkaya [More]
AISA Sydney Branch Meeting: Information security and the human element, or is that ailment?
Starts: Tuesday 21 February 2012, 8:00AM
Finishes: Tuesday 21 February 2012, 10:00AM
Date: Tuesday 21 February 2012
Time: 8:00am for prompt 8:15am start of presentation, 10:00am expected close.
Venue: Westpac, 60 Martin Place, Plaza Level (Ground Floor) Meeting Centre
Topic: My PC is Hacked, now what ? (Beta)
Let's face it, Windows machines can get hacked, and in some environments it happens a lot. Fortunately, Microsoft has built numerous tools into Windows so administrators and power users can analyse machines to determine whether they've been compromised. But many of us are not even aware of that! In this session I'll demonstrate the tools built into Windows for such analysis, as well as more free tools from Microsoft to help you out get of chaos! If you have ever had a virus in your PC than attending this session is a must for you.
Speaker: Erdal Ozkaya from Fastlane APAC