If you're deploying Adobe Acrobat or Adobe Reader through Group Policy, there is one tool you need to know about. Adobe's Customization Wizard allows you to create a transform (modifies the installation of software when it is deployed) that will configure many elements of the Acrobat and Reader products. This 4.5 MB download allows you to enter the serial number, … [Read more...]
ThreatExpert
The ThreatExpert site has a few components that might be of some interest to those curious about malicious computer threats. Their blog is very good at explaining new forms of threats like click-jacking, flash exploits, and cracking attempts. Along with all the articles on their blog, they also host a "dictionary" of malicious threats so that you can look up everything from … [Read more...]
User Profile Hive Cleanup Service – Fixing log off problems
If you're frequently seeing a lot of warnings in your Application event log with this error message: "Windows saved user [user name] registry while an application or service was still using the registry during log off. The memory used by the user's registry has not been freed. The registry will be unloaded when it is no longer in use. This is often caused by services running as … [Read more...]
Unlocker – Trace ‘in use’ files to the process
If upon trying to delete, move, or open a file you get an error message about it being in use, you can try to close programs and kill processes that you think are using the file. "Cannot delete file: It is being used by another person or program. Close any programs that might be using the file and try again." You can use Process Explorer to track down the process, but an even … [Read more...]
Managing your Digital Identity
Few people will think about their digital identity when they consider their public exposure. The purpose of this post is not to make you paranoid, but to make you aware of the information that is out there. As we saw recently with Alaskan Governor Sarah Palin's Yahoo e-mail account getting broken into, one must fully understand and manage their digital identity for security … [Read more...]