Tech

Friday, April 19, 2013

Tips: How to allow a standard user to override KMS and enter MAK keys

In this article, let’s discuss about letting a standard user to override KMS and enter the MAK keys. If you’re an administrator, you can create a registry key that lets a standard user to apply a MAK key and activate an Office 2010 application. Therefore, a standard user can switch a KMS client to MAK activation and manually activate the computer. Moreover, if necessary, you can replace an existing MAK with a new MAK key.
As by default all volume license editions of Office 2010 disable this behaviour, you can enable the same by simply adding the following line to the Config.xml file:



You can also set the following registry key for enabling/disabling a standard user activation.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform]

Enable Standard User Activation: "UserOperations"=dword:00000001
Disable Standard User Activation: "UserOperations"=dword:00000000 (Office 2010 volume license products default setting)
Try performing the above steps to let the standard users override KMS and enter MAK keys.

 

B  y

Software: How to test applications as a normal user - Standard UserAnalyzer SUA

Every one of us use most of the applications. Either we develop the applications or deploy them. Whatever it is, it is much important to test the developed application as a standard user especially if an organization has a locked-down environment or the new generation operating system with UAC. Most of the times, this helps us in understanding the application behavior better. One of the software is Standard User Analyzer tool. It is able to help us in this purpose as this tool is a part of the Application Compatibility Toolkit.



Now, let’s discuss the procedure.
Step # 1. Install the Application Compatibility Toolkit and start the Standard User Analyzer. It is not required to run this as administrator. It’s required to just launch it. The application will be like mentioned below.


This tool works similar to SysInternals Tools Filemon/Regmon. The application is capable of monitoring all the files, registries, INI files modified, the name-spaces which the app calls and the credential Privilages Process calls when the application is launched. This will provide us a detailed analysis on how this application acts as a standard user. Moreover, you can also have an option to run the same application as an administrator user and compare these 2 reports. You can do this by checking the “Elevate” option in the Launch Options.
Step # 2. It is required to browse the executable file from the Target application tab. You can check this example. It is StockViewer.exe. Click on the button launch. Moreover, you can also specify any command line arguments/ parameters for this executable.


Usually, this tool needs a pre-requisite “Application Verifier”. If you’ve not installed this application, you can get the dialog box as shown below. Download and install this app. This Application Verifier is specifically designed to detect and help debug memory corruptions and critical security vulnerabilities. This is achieved by monitoring a native application’s interaction with the Windows Operating System, profiling its use of objects, the registry, the file system, and Win32 APIs (including heaps, handles, locks, etc), and indicating issues when and where they are discovered. Besides, the Application Verifier even includes checks to predict how well an application may perform under various account privileges.



If the Application Verifier is successfully installed, this will start monitoring your application usage. During this, you can get the warning image as shown below.


Step # 3. Now, you can start your application which you want to monitor, you can perform all the operations which an end-user would do. During this demo, you can see this application to ask for the administrative rights while launching and also it gives some “Access denied” error message. If you close this app, the Standard User Analyzer will gather all the required information which the application has accessed.


Moreover, these logs and reports will explain you on the application behavior. It will even help the developers to fix the application easily. Other than the application compatibility, this tool is able to provide you an option which identifies the mitigations and provides you the options to fix them.



If you click on Apply Mitigation, you will get the below dialog with the list of shims which would mitigate the issues identified.



B y

Google: New Sad Tab Page of Chrome

If you’re a regular user of Chrome, you might have noticed the built-in sad tab page that states "aw, snap!" message with "he's dead, Jim!". Now, this message has been replaced with "Something caused this page to be killed , either because the operating system ran out of memory, or for some other reason. To continue, press Reload or go to another page." To see the page, just type about:kill in the address bar after opening a new tab in the Chrome browser.



"He's dead, Jim!" is a catchphrase used by Leonard H. McCoy, a character from Star Trek. "The line has entered popular culture as a general metaphor, with uses as diverse as descriptions of an unresponsive electronic circuit, an example of how to add an audio file to function as an alert sound in a computer system, and an illustrative quote regarding how to know if one's opponent has been destroyed in an action hero game." If you look at the images provided in  this article, you can find the difference out.



B  y

Tips: How to use the Exchange Control Panel easily

In order to provide the services for the Exchange Organization, we use the Web application “Exchange Control Panel” on a Client Access Server. If you install a Client Access Server, the Exchange Control Panel will be automatically installed. If you want to manage Exchange from anywhere, you have to enter the URL path for the application in your browser’s Address field. Then, you can access the Exchange Control Panel. The default Exchange Control Panel URL is https://yourserver.yourdomain.com/ecp.

The Client Access server to which you connect processes your remote actions via the ECP application running on the default Web site. “%ExchangeInstallPath%\ClientAccess\Ecp”(without quotes) is the physical directory for this application. This command runs in the context of an application pool named MSExchangeECPAppPool. You can view the web.config file that implies the settings for the ECP application in the %ExchangeInstallPath%\ClientAccess\Ecp directory on your server.



A self-signed Security Certificate will be automatically created when you install an Exchange Server as this default certificate is not issued by a trusted authority. Moreover, you can view a related error message when you use HTTPS to access services hosted by your Client Access servers.
By

How to disable or enable the Google Reader's Social Features

If you’re planning to disable the Google Reader’s Social features, this article will be more useful for you. However, you can use the following steps to disable the Google Reader’s social feature and read the subscriptions. Now, follow the steps to switch to the social Google Reader Interface.
•    Go to the Google Reader.
•    Then, type this JavaScript code in the Address Bar of your browser.
javascript:antisocial('true')
•    Now, Google Reader will reload and you’ll see a simplified interface that removes the section "People you follow". At the same time, you can’t see the shared items from your friends.



This is the way to disable the Google Reader’s social feature.
Okay, you’ve disabled the feature and you want it back again. What can you do? It is also simple.
Just type the following JavaScript in the address bar.
javascript:antisocial('false')
That’s it. Using the code, you can get back to the previous stage.

By

Modular Recycle Bin In Traditional Concept By Dave Strydom !

We have seen few models
of Recycle Bin in our blog, but this is a traditional and simple shape Modular Recycling bin. It offers a modern and necessary function for its users. The recycled materials will be segregated in three different departments inside the bin. The compartments of the bin are made with plastic, glasses and tin. They act like a water bladder to change the size in accordance with the materials.







Moreover, it has come out with larger wheels, expandable handles, step to open lid, interior rinse function, expandable interior space and forth slot for recycling the cardboard. Therefore, almost your troubles of recycling materials will be solved by this Modular Recycling Bin. You have to thank designer Dave Strydom for giving you such a wonderful concept.



[ Source ]

New Style PC Case Lian-Li Sparks !

Lian-Li has recently announced
its new unique PC case that looks more stylish and smart. This exclusive electric blue Lian-Li PC-888s has come out with anodized aluminum. Normally it adopts a unique system for cooling within.





You can have this case by paying $500 for each. Unfortunately, this model has been launched, as a limited edition that is just 500 pieces available. [ Thank You ]