13:05 ET Dow -154.48 at 10309.92, Nasdaq -37.61 at 2138.44, S&P -19.130 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 0 1 100001 0 1 0 1 1 0 1 0 00 0 1 1 1 0 1 100001 0 1 1 100001 13:05 ET Dow -154.48 at 10309.92, Nasdaq -37.61 at 2138.44, S&P -19.1313:05 ET Dow -154.48 at 10309.92, Nasdaq -37.61 at 2138.44, S&P -19.13

.

.

Tuesday, November 27, 2012


LogicNP Software 
CryptoLicensing v2012 R2 For .Net, MFC and ActiveX Released
We are pleased to announce the release and immediate availability of v2012 R2 of CryptoLicensing for .Net, CryptoLicensing for MFC and CryptoLicensing for ActiveX. CryptoLicensing provides a robust, yet easy way to add licensing, copy-protection and activation capabilities to your software. CryptoLicensing uses the latest military strength, state-of-the-art cryptographic technology to ensure that your software and intellectual property is protected.

CryptoLicensing for .Net


CryptoLicensing for MFC


CryptoLicensing for ActiveX



What's New!! in v2012 R2

  • NEW: Mono specific client side validation module (LogicNP.CryptoLicensing.Mono.dll).
  • NEW: Overhauled Subscription Licenses scenario and workflow for much improved ease of use.
  • NEW: License project files can now be stored in XML format - this allows easy version control tracking as well as quick changes via a text editor.
  • NEW: Some UI changes to the CryptoLicensing Generator App, to improve ease of use and understandability.
  • NEW: Much improved support for various types of databases for use with license service and license management.
  • NEW: Improved error reporting when validating licenses or serials via the CryptoLicensing Generator App.
  • NEW: Improvement error reporting during license validation (errors accessible via CryptoLicense.GetStatusException).
  • NEW: The license service "Import" page now replaces any existing license codes in the License or DisabledLicense table, else adds a new record.
  • NEW: "Profile Name" field available in License Management.
  • NEW: "Raw User-Data " field available in LIcense Management.
  • NEW: "Date Added (To Database)" field available in LIcense Management.
  • NEW: DBWorker for PostGre SQL.
  • NEW: Support for Firebird DB.
  • NEW: ActivationContextDemo sample, which demonstrates usage of activation contexts.
  • NEW: CryptoLicense.UpdateLicense and corresponding license service methods.
  • NEW: CryptoLicense.GetRecordGUID method which allows developer to get a unique pseudo-GUID based on license code and specified key.
  • NEW: CryptoLicense.GetSerialFromProfile method and corresponding license service methods.
  • NEW: Support for date-time format for data fields of type "Date-Time".
  • NEW: Better exception handling and reporting in all e-commerce pages.
  • NEW: Silverlight specific Being/End methods for those methods which communicate with the license service.
  • NEW: Plugins can now be specified in the license project via relative paths.
  • CHANGE: CryptoLicense.IsEvaluationExpired now returns true only if the license is evaluation license and one of the evaluation limits has reached.
  • NEW: Placeholders in the "Save to File" template file setting are replaced too.
  • NEW: LicenseServiceSettings.TemplateFolder property to allow specifying optional license service template folder location.
  • IMPROVED: MySQL DBWorker now works with Usage Reporting.
  • IMPROVED: The network-deployed license service now supports serving of non-ASP.Net files (like clientaccesspolicy.xml).
  • IMPROVED: Errors that occur during loading of a license project via the CryptoLicensing Generator App are now shown in the UI.
  • FIX: Error occurred if an empty usage report was sent to the license service.
  • FIX: Deactivation not working if a table-prefix was specified when configuring the license service.
  • FIX: LicenseService.IsCurrentMachineActivated and LicenseService.GetNumberOfActivations now takes the activation context into account.
  • FIX: Usage Reporting console did not work correctly if a table-prefix was specified when configuring the license service.
  • FIX: If license service is not available for deactivation, then locally stored deactivation record is deleted immediately.
  • FIX: In Silverlight, custom license service methods which have no parameters were not called correctly.
  • FIX: "Perform Strong Name Validation" setting now works for all versions of the .Net run-time and regardless of which combination of .Net runtime(s) are installed on the system.
  • FIX: Activation contexts did not work in some circumstances.
  • FIX: In the Show Evaluation Dialog, the "Continue" button is enabled, even if the license is invalid.
  • FIX: Generator API - Attempting to load a license project stored in XML format via a stream did not work.
  • FIX: License service did not report the correct error back to the client-side validation module for some client-side API.
  • FIX: Evaluation Info dialog threw an exception in some cases when DateExpires is used.

Upgrade Information

v2012 R2 is a free upgrade for customers with an active Support And Upgrade Subscription. To get your v2012 R2 license, goto http://www.ssware.com/upgrade.htm
v2012 R2 is a paid upgrade For 'License Only' customers and customers whose Support And Upgrade Subscription has expired. To upgrade to v2012 R2, goto http://www.ssware.com/upgrade.htm

Sunday, October 28, 2012

Amazing Japanese Tsunami Footage of Total Destruction

Watch "Fresh footage of huge tsunami waves smashing town in Japan" on YouTube

Wednesday, October 24, 2012

Android Digital Video Application - Adjust Frame Rate

Take a look at "Coach's Eye"

21 Command Prompt Tricks and Hacks Command Prompt Tricks, Hacks, and Secrets in Windows 7, 8, Vista, and XP - Awesome Post by PCSupport


SOURCE: http://pcsupport.about.com/od/commandlinereferece/tp/command-prompt-tricks-hacks.htm?p=1


10/24/12 21 Command Prompt Tricks and Hacks
pcsupport.about.com/od/commandlinereference/tp/command-prompt-tricks-hacks.htm?p=1 1/3
PC Support
By Tim Fisher, About.com Guide
21 Command Prompt Tricks and Hacks
Command Prompt Tricks, Hacks, and Secrets in Windows 7, 8, Vista, and XP
The Windows Command Prompt tool, and many of its commands , might seem boring or even relatively useless at first glance, but as anyone who
has ever used the Command Prompt very often can tell you, there's much to love!
Below are several Command Prompt tricks and other Command Prompt hacks that I guarantee will get you excited about many of the mundane
sounding Command Prompt commands like telnet, tree, or robocopy... okay, robocopy sounds pretty cool.
Some of these Command Prompt tricks and hacks are special features or uses of the Command Prompt itself, while others are just neat or relatively
unknown things you can do with certain commands. Enjoy!
1. Use Ctrl-C to Abort a Command
Just about any command can be stopped in its tracks with the abort command: Ctrl-C .
If you haven't actually executed a command, you can just backspace and erase what you've typed, but if you've already
executed it then you can do a Ctrl-C to stop it.
Warning: Ctrl-C isn't a magic wand and it can't undo things that aren't undoable, like a partially complete format command .
However, for things like the dir command that seem to go on forever or questions you're asked at the prompt that you don't
know the answer to, the abort command is an excellent Command Prompt trick to know.
2. View a Command's Results One Page (or Line) at a Time
Ever run a command, like the dir command, that produces so much information on the screen that it's almost useless? You're not
alone.
One way around this is to execute the command in a special way so whatever information is generated is shown to you one
page, or one line, at a time.
To do this, just type the command, the dir command for example, and then follow it with the pipe redirection operator and then
the more command.
For example, executing dir /s | more will generate the thousands of lines of results that you expect from the dir command, but
the more command will pause each page of results with -- More -- at the bottom of the page, indicating that the command is
not done running.
Just press the space bar to advance by page or press the Enter key to advance one line at a time.
See Command Prompt Trick #7 below for a different solution to this problem.
3. Run Command Prompt as an Administrator Automatically
Many commands require that you execute them from an elevated Command Prompt in Windows - in other words, execute
them from a Command Prompt that's run as an administrator.
You can always right-click on any Command Prompt shortcut and choose Run as administrator but creating a shortcut to do the
same thing can be a huge time saver if you're a frequent Command Prompt power user.
To complete this Command Prompt trick, just create a Command Prompt shortcut on the desktop, enter the shortcut's properties
and then select the Run as administrator box located in the Advanced button on the Shortcut tab.
4. Become a Command Prompt Power User with Function Keys
The fact that the function keys actually do something in the Command Prompt is maybe one of the best kept secrets about the
tool:
F1: Pastes the last executed command (character by character)
F2: Pastes the last executed command (up to the entered character)
F3: Pastes the last executed command
F4: Deletes current prompt text up to the entered character
F5: Pastes recently executed commands (does not cycle)
F6: Pastes ^Z to the prompt
F7: Displays a selectable list of previously executed commands
F8: Pastes recently executed commands (cycles)
F9: Asks for the number of the command from the F7 list to paste
Command Prompt Trick #17 is full of arrow key shortcuts, a few of which are similar to these function key tricks.
1 2
3
5
6
8
10
4
7
9
1110/24/12 21 Command Prompt Tricks and Hacks
pcsupport.about.com/od/commandlinereference/tp/command-prompt-tricks-hacks.htm?p=1 2/3
5. Hack the Prompt Text
Did you know that the prompt itself in the Command Prompt is completely customizable thanks to the prompt command? It is,
and when I say customizable, I mean really customizable.
Instead of C:\>, you can set the prompt to any text you want, have it include the time, the current drive, the Windows version
number , you name it.
One useful example is prompt $m$p$g which will show the full path of a mapped drive in the prompt, alongside the drive letter.
You can always execute prompt alone, without options, to return it to its sometimes boring default.
6. Get Help for Any Command
Believe it or not, the help command does not provide help for every Command Prompt command. However, any command can
be suffixed with the /? option, usually called the help switch , to display detailed information about the command's syntax and
often times even some examples.
I doubt that the help switch is the coolest Command Prompt trick you've ever heard of, but it's hard to disagree that it's one of
the more useful.
Unfortunately, neither the help command nor the help switch offer much in the way of explaining how to interpret the syntax.
See How To Read Command Syntax if you need help with that.
7. Save a Command's Output to a File
An incredibly useful Command Prompt trick is the use of redirection operators , specifically the > and >> operators.
These little characters let you redirect the output of a command to a file, giving you a saved version of whatever data the
command produced in the Command Prompt window.
Let's say you're about to post a computer problem to an online forum, like my computer support forum for example, and you
want to provide really accurate information about your computer. An easy way to do that would be to use the systeminfo
command with a redirection operator.
For example, you might execute systeminfo > c:\mycomputerinfo.txt to save the information provided by the systeminfo
command to a file. You could then attach the file to your forum post.
See How To Redirect Command Output to a File for more examples and a better explanation of how to use redirection
operators.
8. View Your Hard Drive's Entire Directory Structure
I think one of the neatest little commands is the tree command. With tree, you can create a kind of map of your computer's
directories.
Execute tree from any directory to see the folder structure under that directory.
Tip: With so much information, it's probably a good idea to export the results of the tree command to a file. For example, tree /a
> c:\treeresults.txt, just as explained in Command Prompt Trick #7.
9. Customize the Command Prompt Title Bar Text
Tired of that Command Prompt title bar text? No problem, just use the title command to change it to whatever you like.
For example, let's say your name is Maria Smith, and you want to express your ownership of the Command Prompt: execute title
Property of Maria Smith and the Command Prompt's title bar will change immediately.
The change won't stick, so the next time you open Command Prompt the title bar will be back to normal.
The title command is usually used to help give a custom appearance in script files and batch files... not that I'm saying titling it
with your name isn't a good idea!
10. Copy From the Command Prompt
As you may or may not know, copying from the Command Prompt is not as easy as copying from other programs, which is part of
the reason why saving a command's output to a file, Command Prompt Trick #7, is so handy.
But what if you do just want to copy a short section of text to the clipboard? It's not too hard but it's not very intuitive either.
Right-click anywhere in the Command Prompt window and choose Mark. Now, highlight with your left mouse button whatever
you'd like to copy. Once your selection is made, press Enter.
Now you can paste that information into whatever program you'd like.
This About.com page has been optimized for print. To view this page in its original form, please visit: http://pcsupport.about.com/od/commandlinereference/tp/command-prompt-trickshacks.htm
©2012 About.com, Inc., a part of The New York Times Company. All rights reserved.
13
15
16
17
19
20
21
12
14
18
22
23
2410/24/12 21 Command Prompt Tricks and Hacks
pcsupport.about.com/od/commandlinereference/tp/command-prompt-tricks-hacks.htm?p=1 3/3
Links in this article:
1. http://pcsupport.about.com/od/termsc/p/command-prompt.htm
2. http://pcsupport.about.com/od/termsc/g/commands.htm
3. http://pcsupport.about.com/od/commandlinereference/tp/command-prompt-commands-p1.htm
4. http://0.tqn.com/d/pcsupport/1/0/S/D/-/-/ctrl-c.jpg
5. http://pcsupport.about.com/od/termsc/g/ctrl-c.htm
6. http://pcsupport.about.com/od/commandlinereference/p/format-command.htm
7. http://0.tqn.com/d/pcsupport/1/0/Q/D/-/-/more-command.jpg
8. http://pcsupport.about.com/od/termsr/a/redirection-operator.htm
9. http://0.tqn.com/d/pcsupport/1/0/C/D/-/-/command-prompt-administrator-shortcut.jpg
10. http://pcsupport.about.com/od/commandlinereference/f/elevated-command-prompt.htm
11. http://0.tqn.com/d/pcsupport/1/0/T/D/-/-/f-7.jpg
12. http://0.tqn.com/d/pcsupport/1/0/9/D/-/-/prompt-text.jpg
13. http://pcsupport.about.com/od/termsv/g/version-number.htm
14. http://0.tqn.com/d/pcsupport/1/0/A/D/-/-/help-switch.jpg
15. http://pcsupport.about.com/od/commandlinereference/p/help-command.htm
16. http://pcsupport.about.com/od/termshm/g/help-switch.htm
17. http://pcsupport.about.com/od/commandlinereference/a/command-syntax.htm
18. http://0.tqn.com/d/pcsupport/1/0/E/D/-/-/dir-command-output.jpg
19. http://pcsupport.about.com/od/termsr/a/redirection-operator.htm
20. http://pcsupport.about.com/forum
21. http://pcsupport.about.com/od/commandlinereference/a/redirect-command-output-to-file.htm
22. http://0.tqn.com/d/pcsupport/1/0/H/D/-/-/tree-command.jpg
23. http://0.tqn.com/d/pcsupport/1/0/D/D/-/-/title-bar-text.jpg
24. http://0.tqn.com/d/pcsupport/1/0/I/D/-/-/mark-copy-command-prompt.jpg

Wednesday, October 10, 2012

Some GRE, GRE 2 & GMAT Math Questions

*Mariko can knit 5 rows of scarf in x minutes. If there are 100 rows in each foot of the scarf, how many hours in terms of 'x' and 'y', will it take Mariko to finish a scarf that is 'y' feet long?


Sunday, September 23, 2012

Windows PowerShell (x86) Digital Certificate Self Signed



PS C:\Users\oldharry> get-help about_signing
TOPIC
    about_signing

SHORT DESCRIPTION
    Explains to how sign scripts so that they comply with the Windows
    PowerShell execution policies.

LONG DESCRIPTION
    The Restricted execution policy does not permit any scripts to run.
    The AllSigned and RemoteSigned execution policies prevent Windows
    PowerShell from running scripts that do not have a digital signature.

    This topic explains how to run selected scripts that are not signed,
    even while the execution policy is RemoteSigned, and how to sign
    scripts for your own use.

    For more information about Windows PowerShell execution policies,
    see about_Execution_Policy.


 TO PERMIT SIGNED SCRIPTS TO RUN
 -------------------------------
    When you start Windows PowerShell on a computer for the first time, the
    Restricted execution policy (the default) is likely to be in effect.

    The Restricted policy does not permit any scripts to run.

    To find the effective execution policy on your computer, type:

        get-executionpolicy

    To run unsigned scripts that you write on your local computer and signed
    scripts from other users, use the following command to change the execution
    policy on the computer to RemoteSigned:

        set-executionpolicy remotesigned

    For more information, see Set-ExecutionPolicy.


 RUNNING UNSIGNED SCRIPTS (REMOTESIGNED EXECUTION POLICY)
 --------------------------------------------------------
    If your Windows PowerShell execution policy is RemoteSigned, Windows
    PowerShell will not run unsigned scripts that are downloaded from the
    Internet, including unsigned scripts you receive through e-mail and instant
    messaging programs.

    If you try to run a downloaded script, Windows PowerShell displays the
    following error message:

        The file <file-name> cannot be loaded. The file
        <file-name> is not digitally signed. The script
        will not execute on the system. Please see "Get-Help
        about_signing" for more details.

    Before you run the script, review the code to be sure that you trust it.
    Scripts have the same effect as any executable program.

    To run an unsigned script:

        1. Save the script file on your computer.
        2. Click Start, click My Computer, and locate the saved script file.
        3. Right-click the script file, and then click Properties.
        4. Click Unblock.

    If a script that was downloaded from the Internet is digitally signed, but
    you have not yet chosen to trust its publisher, Windows PowerShell displays
    the following message:

        Do you want to run software from this untrusted publisher?
        The file <file-name> is published by CN=<publisher-name>. This
        publisher is not trusted on your system. Only run scripts
        from trusted publishers.

        [V] Never run  [D] Do not run  [R] Run once  [A] Always run
        [?] Help (default is "D"):

        If you trust the publisher, select "Run once" or "Always run."
        If you do not trust the publisher, select either "Never run" or
        "Do not run." If you select "Never run" or "Always run," Windows
        PowerShell will not prompt you again for this publisher.


 METHODS OF SIGNING SCRIPTS
 --------------------------
    You can sign the scripts that you write and the scripts that you obtain
    from other sources. Before you sign any script, examine each command
    to verify that it is safe to run.

    For best practices about code signing, see "Code-Signing
    Best Practices" at http://go.microsoft.com/fwlink/?LinkId=119096.

    For more information about how to sign a script file, see
    Set-AuthenticodeSignature.

    To add a digital signature to a script, you must sign it with a code
    signing certificate. Two types of certificates are suitable for signing
    a script file:

        -- Certificates that are created by a certification authority:

           For a fee, a public certificate authority verifies your
           identity and gives you a code signing certificate.  When
           you purchase your certificate from a reputable certification
           authority, you are able to share your script with users
           on other computers that are running Windows because those other
           computers trust the certification authority.

        -- Certificates that you create:

           You can create a self-signed certificate for which
           your computer is the authority that creates the certificate.
           This certificate is free of charge and enables you to write,
           sign, and run scripts on your computer. However, a script
           signed by a self-signed certificate will not run on other
           computers.

    Typically, you would use a self-signed certificate only to sign
    scripts that you write for your own use and to sign scripts that you get
    from other sources that you have verified to be safe. It is not
    appropriate for scripts that will be shared, even within an enterprise.

    If you create a self-signed certificate, be sure to enable strong
    private key protection on your certificate. This prevents malicious
    programs from signing scripts on your behalf. The instructions are
    included at the end of this topic.


 CREATE A SELF-SIGNED CERTIFICATE
 --------------------------------
    To create a self-signed certificate, use the Certificate Creation
    tool (MakeCert.exe). This  tool is included in the Microsoft .NET Framework
    SDK (versions 1.1 and later) and in the Microsoft Windows SDK.

    For more information about the syntax and the parameter descriptions of the
    MakeCert.exe tool, see "Certificate Creation Tool (MakeCert.exe)" in the
    MSDN (Microsoft Developer Network) library at
    http://go.microsoft.com/fwlink/?LinkId=119097.

    To use the MakeCert.exe tool to create a certificate, run the following
    commands in an SDK Command Prompt window.

    Note: The first command creates a local certification authority for
          your computer. The second command generates a personal
          certificate from the certification authority.

    Note: You can copy or type the commands exactly as they appear.
          No substitutions are necessary, although you can change the
          certificate name.

            makecert -n "CN=PowerShell Local Certificate Root" -a sha1 `
                -eku 1.3.6.1.5.5.7.3.3 -r -sv root.pvk root.cer `
                -ss Root -sr localMachine

            makecert -pe -n "CN=PowerShell User" -ss MY -a sha1 `
                -eku 1.3.6.1.5.5.7.3.3 -iv root.pvk -ic root.cer


    The MakeCert.exe tool will prompt you for a private key password. The
    password ensures that no one can use or access the certificate without
    your consent. Create and enter a password that you can remember. You will
    use this password later to retrieve the certificate.

    To verify that the certificate was generated correctly, use the
    following command to get the certificate in the certificate
    store on the computer. (You will not find a certificate file in the
    file system directory.)

    At the Windows PowerShell prompt, type:

            get-childitem cert:\CurrentUser\my -codesigning

    This command uses the Windows PowerShell Certificate provider to view
    information about the certificate.

    If the certificate was created, the output shows the thumbprint
    that identifies the certificate in a display that resembles the following:


        Directory: Microsoft.PowerShell.Security\Certificate::CurrentUser\My

        Thumbprint                                Subject
        ----------                                -------
        4D4917CB140714BA5B81B96E0B18AAF2C4564FDF  CN=PowerShell User ]


 SIGN A SCRIPT
 -------------

    After you create a self-signed certificate, you can sign scripts. If you
    use the AllSigned execution policy, signing a script permits you to run
    the script on your computer.

    The following sample script, Add-Signature.ps1, signs a script. However,
    if you are using the AllSigned execution policy, you must sign the
    Add-Signature.ps1 script before you run it.

    To use this script, copy the following text into a text file, and
    name it Add-Signature.ps1.

    Note: Be sure that the script file does not have a .txt file name
          extension. If your text editor appends ".txt", enclose the file name
          in quotation marks: "add-signature.ps1".


            ## add-signature.ps1
            ## Signs a file
            param([string] $file=$(throw "Please specify a filename."))
            $cert = @(Get-ChildItem cert:\CurrentUser\My -codesigning)[0]
            Set-AuthenticodeSignature $file $cert


    To sign the Add-Signature.ps1 script file, type the following commands at
    the Windows PowerShell command prompt:

        $cert = @(Get-ChildItem cert:\CurrentUser\My -codesigning)[0]

        Set-AuthenticodeSignature add-signature.ps1 $cert


    After the script is signed, you can run it on the local computer.
    However, the script will not run on computers on which the Windows
    PowerShell execution policy requires a digital signature from a
    trusted authority. If you try, Windows PowerShell displays the following
    error message:

        The file C:\remote_file.ps1 cannot be loaded. The signature of the
        certificate cannot be verified.
        At line:1 char:15
        + .\ remote_file.ps1 <<<<

    If Windows PowerShell displays this message when you run a
    script that you did not write, treat the file as you would treat any
    unsigned script. Review the code to determine whether you can trust the
    script.


 ENABLE STRONG PRIVATE KEY PROTECTION FOR YOUR CERTIFICATE
 ---------------------------------------------------------

    If you have a private certificate on your computer, malicious
    programs might be able to sign scripts on your behalf, which
    authorizes Windows PowerShell to run them.

    To prevent automated signing on your behalf, use Certificate
    Manager (Certmgr.exe) to export your signing certificate to
    a .pfx file. Certificate Manager is included in the Microsoft
    .NET Framework SDK, the Microsoft Windows SDK, and in Internet
    Explorer 5.0 and later versions.

    To export the certificate:

        1. Start Certificate Manager.

        2. Select the certificate issued by PowerShell Local Certificate Root.

        3. Click Export to start the Certificate Export Wizard.

        4. Select "Yes, export the private key", and then click Next.

        5. Select "Enable strong protection."

        6. Type a password, and then type it again to confirm.

        7. Type a file name that has the .pfx file name extension.

        8. Click Finish.


    To re-import the certificate:

        1. Start Certificate Manager.

        2. Click Import to start the Certificate Import Wizard.

        3. Open to the location of the .pfx file that you created during the
           export process.

        4. On the Password page, select "Enable strong private key protection",
           and then enter the password that you assigned during the export
           process.

        5. Select the Personal certificate store.

        6. Click Finish.



 PREVENT THE SIGNATURE FROM EXPIRING
 -----------------------------------
     The digital signature in a script is valid until the signing certificate
     expires or as long as a time stamp server can verify that the script was
     signed while the signing certificate was valid.

     Because most signing certificates are valid for one year only, using a
     time stamp server ensures that users can use your script for many years
     to come.


SEE ALSO
    about_Execution_Policies
    about_Profiles
    Get-ExecutionPolicy
    Set-ExecutionPolicy
    Set-AuthenticodeSignature
    "Introduction to Code Signing" (http://go.microsoft.com/fwlink/?LinkId=106296)

PS C:\Users\oldharry>


Monday, September 10, 2012

Associate Certification Path - 1Z0-803 Java SE 7 Programmer I


Source - http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=458&get_params=p_track_id:JSE7Prog


Introducing the Java Technology

  • Relating Java with other languages
  • Showing how to download, install, and configure the Java environment on a Windows system.
  • Describing the various Java technologies such as Java EE, JavaME, Embedded Java SE
  • Describing key features of the technology and the advantages of using Java
  • Using an Integrated Development Environment (IDE)

Thinking in Objects

  • Defining the problem domain
  • Identifying objects and recognizing the criteria for defining objects

Introducing the Java Language

  • Defining classes
  • Identifying the components of a class
  • Creating and using a test class
  • Compiling and executing a test program

Working with Primitive Variables

  • Declaring and initializing field variables
  • Describing primitive data types such as integral, floating point, textual, and logical
  • Declaring variables and assigning values
  • Using constants
  • Using arithmetic operators to modify values

Working with Objects

  • Declaring and initializing objects
  • Storing objects in memory
  • Using object references to manipulate data
  • Using JSE javadocs to look up the methods of a class
  • Working with String and StringBuilder objects

Using operators and decision constructs

  • Using relational and conditional operators
  • Testing equality between strings
  • Evaluating different conditions in a program and determining the algorithm
  • Creating if and if/else constructs
  • Nesting and chaining conditional statements
  • Using a switch statement

Creating and Using Arrays

  • Declaring, instantiating, and initializing a one-dimensional Array
  • Declaring, instantiating, and initializing a two-dimensional Array
  • Using a for loop to process an Array
  • Creating and initializing an ArrayList
  • Using the import statement to work with existing Java APIs
  • Accessing a value in an Array or and ArrayList
  • Using the args Array

Using Loop Constructs

  • Creating while loops and nested while loops
  • Developing a for loop
  • Using ArrayLists with for loops
  • Developing a do while loop
  • Understanding variable scope

Working with Methods and Method Overloading

  • Creating and Invoking a Method
  • Passing arguments and returning values
  • Creating static methods and variables
  • Using modifiers
  • Overloading a method

Using Encapsulation and Constructors

  • Creating constructors
  • Implementing encapsulation

Introducing Advanced Object Oriented Concepts

  • Using inheritance
  • Using types of polymorphism such as overloading, overriding, and dynamic binding
  • Working with superclasses and subclasses
  • Adding abstraction to your analysis and design
  • Understanding the purpose of Java interfaces
  • Creating and implementing a Java interface

Handling Errors

  • Understanding the different kinds of errors that can occur and how they are handled in Java
  • Understanding the different kinds of Exceptions in Java
  • Using Javadocs to research the Exceptions thrown by the methods of foundation classes
  • Writing code to handle Exceptions

The Big Picture

  • Creating packages and JAR files for deployment using java
  • Two and three tier architectures
  • Looking at some Java applications examples

Java Training - Oracle University offers courses that will introduce you to the Java programming language

http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_id=402&p_nl=JJAV&p_key=Java_Training



Java Training

Oracle University offers courses that will introduce you to the Java programming language and technology so you can code smarter and develop robust programs and applications more quickly using any platform – including Oracle’s application server and web infrastructure software. Validate your competency and dedication with a Java Certification – one of the most recognized credentials in the industry.

Certification Value Packages

Save up to 20% and get a free retake with an all-inclusive Java certification value package.

Gmail Search for Starred Email by Star's Color


Gmail Search for Starred Email by Star's Color
SOURCE: http://www.howtogeek.com/64957/7-search-tips-you-probably-dont-know-about/
Here are other search operators that you can use to find super-starred emails in Gmail:
has:yellow-star (or l:^ss_sy)
has:blue-star (or l:^ss_sb)
has:red-star (or l:^ss_sr)
has:orange-star (or l:^ss_so)
has:green-star (or l:^ss_sg)
has:purple-star (or l:^ss_sp)
has:red-bang (or l:^ss_cr)
has:yellow-bang (or l:^ss_cy)
has:blue-info (or l:^ss_cb)
has:orange-guillemet (or l:^ss_co)
has:green-check (or l:^ss_cg)
has:purple-question (or l:^ss_cp)

Monday, June 4, 2012

Windows Management Instrumentation (WMI) to enable systems management from the command line


wmic:root\cli>help
help - Alias not found.
wmic:root\cli>
"/?" for help, QUIT to Exit.
wmic:root\cli>/?

[global switches] <command>

The following global switches are available:
/NAMESPACE           Path for the namespace the alias operate against.
/ROLE                Path for the role containing the alias definitions.
/NODE                Servers the alias will operate against.
/IMPLEVEL            Client impersonation level.
/AUTHLEVEL           Client authentication level.
/LOCALE              Language id the client should use.
/PRIVILEGES          Enable or disable all privileges.
/TRACE               Outputs debugging information to stderr.
/RECORD              Logs all input commands and output.
/INTERACTIVE         Sets or resets the interactive mode.
/FAILFAST            Sets or resets the FailFast mode.
/USER                User to be used during the session.
/PASSWORD            Password to be used for session login.
/OUTPUT              Specifies the mode for output redirection.
/APPEND              Specifies the mode for output redirection.
/AGGREGATE           Sets or resets aggregate mode.
/AUTHORITY           Specifies the <authority type> for the connection.
/?[:<BRIEF|FULL>]    Usage information.

For more information on a specific global switch, type: switch-name /?


The following alias/es are available in the current role:
ALIAS                    - Access to the aliases available on the local system
BASEBOARD                - Base board (also known as a motherboard or system board) management.
BIOS                     - Basic input/output services (BIOS) management.
BOOTCONFIG               - Boot configuration management.
CDROM                    - CD-ROM management.
COMPUTERSYSTEM           - Computer system management.
CPU                      - CPU management.
CSPRODUCT                - Computer system product information from SMBIOS.
DATAFILE                 - DataFile Management.
DCOMAPP                  - DCOM Application management.
DESKTOP                  - User's Desktop management.
DESKTOPMONITOR           - Desktop Monitor management.
DEVICEMEMORYADDRESS      - Device memory addresses management.
DISKDRIVE                - Physical disk drive management.
DISKQUOTA                - Disk space usage for NTFS volumes.
DMACHANNEL               - Direct memory access (DMA) channel management.
ENVIRONMENT              - System environment settings management.
FSDIR                    - Filesystem directory entry management.
GROUP                    - Group account management.
IDECONTROLLER            - IDE Controller management.
IRQ                      - Interrupt request line (IRQ) management.
JOB                      - Provides  access to the jobs scheduled using the schedule service.
LOADORDER                - Management of system services that define execution dependencies.
LOGICALDISK              - Local storage device management.
LOGON                    - LOGON Sessions.
MEMCACHE                 - Cache memory management.
MEMORYCHIP               - Memory chip information.
MEMPHYSICAL              - Computer system's physical memory management.
NETCLIENT                - Network Client management.
NETLOGIN                 - Network login information (of a particular user) management.
NETPROTOCOL              - Protocols (and their network characteristics) management.
NETUSE                   - Active network connection management.
NIC                      - Network Interface Controller (NIC) management.
NICCONFIG                - Network adapter management.
NTDOMAIN                 - NT Domain management.
NTEVENT                  - Entries in the NT Event Log.
NTEVENTLOG               - NT eventlog file management.
ONBOARDDEVICE            - Management of common adapter devices built into the motherboard (system board).
OS                       - Installed Operating System/s management.
PAGEFILE                 - Virtual memory file swapping management.
PAGEFILESET              - Page file settings management.
PARTITION                - Management of partitioned areas of a physical disk.
PORT                     - I/O port management.
PORTCONNECTOR            - Physical connection ports management.
PRINTER                  - Printer device management.
PRINTERCONFIG            - Printer device configuration management.
PRINTJOB                 - Print job management.
PROCESS                  - Process management.
PRODUCT                  - Installation package task management.
QFE                      - Quick Fix Engineering.
QUOTASETTING             - Setting information for disk quotas on a volume.
RDACCOUNT                - Remote Desktop connection permission management.
RDNIC                    - Remote Desktop connection management on a specific network adapter.
RDPERMISSIONS            - Permissions to a specific Remote Desktop connection.
RDTOGGLE                 - Turning Remote Desktop listener on or off remotely.
RECOVEROS                - Information that will be gathered from memory when the operating system fails.
REGISTRY                 - Computer system registry management.
SCSICONTROLLER           - SCSI Controller management.
SERVER                   - Server information management.
SERVICE                  - Service application management.
SHADOWCOPY               - Shadow copy management.
SHADOWSTORAGE            - Shadow copy storage area management.
SHARE                    - Shared resource management.
SOFTWAREELEMENT          - Management of the  elements of a software product installed on a system.
SOFTWAREFEATURE          - Management of software product subsets of SoftwareElement.
SOUNDDEV                 - Sound Device management.
STARTUP                  - Management of commands that run automatically when users log onto the computer system.
SYSACCOUNT               - System account management.
SYSDRIVER                - Management of the system driver for a base service.
SYSTEMENCLOSURE          - Physical system enclosure management.
SYSTEMSLOT               - Management of physical connection points including ports,  slots and peripherals, and proprietary connections points.
TAPEDRIVE                - Tape drive management.
TEMPERATURE              - Data management of a temperature sensor (electronic thermometer).
TIMEZONE                 - Time zone data management.
UPS                      - Uninterruptible power supply (UPS) management.
USERACCOUNT              - User account management.
VOLTAGE                  - Voltage sensor (electronic voltmeter) data management.
VOLUME                   - Local storage volume management.
VOLUMEQUOTASETTING       - Associates the disk quota setting with a specific disk volume.
VOLUMEUSERQUOTA          - Per user storage volume quota management.
WMISET                   - WMI service operational parameters management.

For more information on a specific alias, type: alias /?

CLASS     - Escapes to full WMI schema.
PATH      - Escapes to full WMI object paths.
CONTEXT   - Displays the state of all the global switches.
QUIT/EXIT - Exits the program.

For more information on CLASS/PATH/CONTEXT, type: (CLASS | PATH | CONTEXT) /?

wmic:root\cli>

Thursday, April 26, 2012

Microsoft Instructions on Changing GUID Partitioned Table to an MBR Table

To change a GUID partition table disk into a master boot record disk using command line

  1. Back up or move all volumes on the basic GUID partition table (GPT) disk you want to convert into a master boot record (MBR) disk.
  2. Open an elevated command prompt and type diskpart. If the disk does not contain any partitions or volumes, skip to step 6.
  3. At the DISKPART prompt (right-click Command Prompt, and then click Run as Administrator), type list disk. Make note of the disk number you want to delete.
  4. At the DISKPART prompt, type select disk <disknumber>.
  5. At the DISKPART prompt, type clean.
    ImportantImportant
    Running the clean command will delete all partitions or volumes on the disk.

  6. At the DISKPART prompt, type convert mbr.

Friday, April 20, 2012

Solution: SSL Error Citrix Receiver - Error 61 - Ubuntu - You have not chosen to trust "/C=US/ST=/L=/0=Equifax/OU=Equifax Secure Certificate Authority/CN=", the issuer of the server's security certificate (SSL error 61).




Solution: SSL Error Citrix Receiver - Error 61 - You have not chosen to trust "/C=US/ST=/L=/0=Equifax/OU=Equifax Secure Certificate Authority/CN=", the issuer of the server's security certificate (SSL error 61).

====================================

Solution.

1. Visit the GeoTrust Certificate Authority Web Site.  Here is the URL of the exact page you need to visit: http://www.geotrust.com/resources/root-certificates/index.html

2. Near the top of the page, there are two links to verify Equifax's certificate. Right click the lower of the two links. Chose 'save' from the context sensitive menu that you'll see upon right clicking the lower of the two URLs associated with Equifax. You want the 'der' encoded x.509 certificate.

3. Rename the .cer to .crt.

4. As root copy the file from its saved download location to /opt/Citrix/ICAClient/keystore/cacerts/

** Step 4. In a console, bash shell, navigate to the folder that contains the saved/downloaded certificate: type sudo cp Equifax_* /opt/Citrix/ICAClient/keystore/cacerts/

5. You're done and now should be able to open your ".ica" files

Tuesday, April 3, 2012

Fedora SEC Spin

http://docs.fedoraproject.org/en-US/Fedora/16/html/Installation_Guide/ch-new-users.html#sn-which-download-bt

URL to Fedora LiveUSB (Live USB) Creator for Windows Systems

https://fedorahosted.org/liveusb-creator/

Monday, April 2, 2012

Acer Aspire One BIOS Recovery

http://macles.blogspot.com/2008/08/acer-aspire-one-bios-recovery.html
Acer Aspire One BIOS Recovery
The Acer Aspire One has a built-in BIOS recovery routine, which can boot into a minimal BIOS environment via a special boot block to re-flash the BIOS, even if the system does not pass POST and does otherwise not boot anymore. This procedure is also known as Crisis Disk.

First format an USB flash drive with FAT. It does not need to be bootable.

Download the latest BIOS, and extract all files. Put both FLASHIT.EXE and the BIOS file with FD suffix in the root directory of the flash drive. The files must not be in a folder. Rename the BIOS file to ZG5IA32.FD before proceeding. It only works with this exact filename.

Turn the AA1 off, and verify both battery and AC adapter are plugged in.

Press Fn and Esc simultaneously, keep them pressed and press the power button. Release Fn+Esc after a few seconds. The power button starts blinking at this point. Press it once. The AA1 will now access the files on the flash drive and initiate flashing the BIOS. After a while the power button stops blinking, and the AA1 reboots by itself. Wait patiently.

If it doesn't reboot, but keeps blinking, wait at least a few minutes before turning it off, and try again.