Here is the 2nd edition of the “Understanding Microsoft Virtualization Solutions”. Actually I somehow failed to notice issuing of the first edition, but now I am going to make up for it.
Here, in Russia, we have some local TechEd-like event, called “Platforma” (“The Platform” maybe). I am going to take part in the event not as mere visitor but as a lab instructor (it will be named “UAG and DirectAccess”, I believe) and an expert in Ask the Expert section and even maybe a speaker (this one not decided yet on). The first one is quite a challenge for me, because I am now to study the whole new for me product in less than a month sufficiently enough to answer at least basic questions. Yes, I know something about DirectAccess, … Continue reading Platforma 2011
This time the post will be not about the commands, but about some helpful tricks while dealing with them. Actually these features are the very basics of cmd, still many people don’t know about them. These ones are related to running several commands in one line with various conditions. “&”. For example you’d like to restart a service. What you can do in PowerShell is simply Get-Service w32time | Restart-Service In cmd you are to start two commands: or you can do as following: that will do the same, but faster. “&&”. Going a little bit further we can think … Continue reading Old good command line #5
The second topic I’d like to raise in connection with the vulnerability in VMWare products is almost Shakespearean one. What should do a person or an organization in case they found a vulnerability? Tell the vendor and publicly disclose at the same time? Only publicly disclose? Notify the vendor and wait for a patch? There is a bunch of strategies, as you can see. As usual everyone has its own point of view on the problem. Microsoft, for example, follow theirs Coordinated Vulnerability Disclosure Policy. That does mean that they want the time to create and test a fix before … Continue reading To disclose or not to disclose
Hello there! this is may be the last issue on CLI commands with more than one command inside (Here you can see #0, #1, #2, #3), because… There of course will be some more command descriptions and may be some more information about Windows CLI, though. Let’s go. recover. I hadn’t a chance to try it in real-life situation (fortunately 8) ,,), but the description tells us that the command will try read your corrupted file sector-by-sector. That is you will get the file all consisting of data from good sectors and bad sectors will lost all their info. May … Continue reading Old good command line #4
As I promised, I am going to describea couple of ideas I perceived while I was going through the vulnerability in VMWare products. Here is the first one. More than a year ago I wrote about the threats of downloading OS from p2p networks and one of my Russian readers told me that it is quite safe if you know the correct hash value for the ISO image. Unfortunately, my recent post about the vulnerability has just rendered such an opinion as not very correct. You see, when the file is downloaded from some p2p network, it is sometimes accompanied … Continue reading On the issue of downloading files from untrusted sites #2
Continue our series (Post #0, Post #1, Post #2) findstr. Another déjà vu? Almost. The command is really similar to “find” which was described in issue two of “Old good command line”, but it is much more powerful. It is even more powerful than grep. Really. It has several options for output (line number in file before line, file name only, character offset, etc.), input (file list from a file/console, search strings from file/console…) and search (search literally, any of the words or the whole string and even regular expressions). It really can do much good in case you need … Continue reading Old good command line #3