Monday, 24 April 2017

Belarc Advisor- DOWNLOAD A FREE COPY OF BELARC ADVISOR


Deepak Sharma, +919717366282
Download Link:- https://www.belarc.com/products_belarc_advisor
The Belarc Advisor builds a detailed profile of your installed software and hardware, 
network inventory, any missing Microsoft hotfixes, anti-virus status, security benchmarks, and displays the results in your Web browser.
All of your PC profile information is kept private on your PC and is not sent to any web server.
  • Operating Systems: Runs on Windows 10, 2016, 8.1, 2012 R2, 8, 2012, 7, 2008 R2, Vista, 2008, 2003 SP2, XP SP3. Both 32-bit and 64-bit Windows are supported. Our commercial products also run on all other versions of Windows and on the Macintosh OS X, Linux, and Solaris operating systems.
  • Browsers: Runs on Internet Explorer, Firefox, Safari, Opera, and many others.
  • File size: 3486 KB.
  • Version: 8.5c
  • License: The license associated with this product allows for free personal use only. Use on multiple PCs in a corporate, educational, military or government installation is prohibited. See the license agreement for details.
  • Wish to run the Belarc Advisor on your corporate network, see FAQs below.
Belarc provides commercial products that are used for software license management, hardware upgrade planning, cyber security status, information assurance audits, IT asset management, configuration management, and more.
Download Tips:
  • Click Here to Download Belarc Advisor
  • Click the Run button in the File Download pop-up.
  • The Belarc Advisor will automatically install, build a profile of your hardware and software, and display this in your Web browser.






Frequently Asked Questions

Q: Will the Belarc Advisor send my PC profile information up to a web server? 
No. The Belarc Advisor creates a local Web page, keeping your PC profile on your PC and does not send it to a web server, including Belarc’s server.
Belarc is able to personalize a web page to show you details of your computer without a web server by using technologies included in the Belarc Advisor.
Please let us know if you have any questions or how you feel about this issue by sending mail to info@belarc.com
Q: Must any previously installed Belarc Advisor be removed before installing a newer version?
No. The installer will automatically remove any previous Belarc Advisor version.
Q: When checking for new security definitions the Advisor gets an error. What can I do?
This is usually caused by a software firewall installed on your computer. Check the settings of your firewall for options that block or permit applications to connect to the Internet. If your firewall needs to allow specific programs access to the Internet, allowing the BelarcAdvisor.exe program should work. You’ll find BelarcAdvisor.exe in the C:\Program Files\Belarc\Advisor directory on your computer.
Q: The Advisor has installed and finished a discovery of my PC’s hardware and software, but I do not see any results.
This usually happens when the Windows file association, for the HTML file extension, is misconfigured on your computer. Most often, this is caused by trying out a new browser and then uninstalling it from your computer.
Here's how you can fix that.
On Windows 8.1, 8 or 7: Open Windows explorer to the c:\Program Files\Belarc\BelarcAdvisor\System\tmp directory, or for 64-bit windows c:\Program Files (x86)\Belarc\BelarcAdvisor\System\tmp. Then right click on the file named (COMPUTERNAME).html, where COMPUTERNAME is the name of your PC. In the pop-up menu click Open with and then click Choose default program… in the Open with menu. In the Open with dialog choose your preferred browser. When you next run the Belarc Advisor the results will show in your browser.
On Windows Vista: Open Windows explorer to the c:\Program Files\Belarc\BelarcAdvisor\System\tmp directory, or for 64-bit windows c:\Program Files (x86)\Belarc\BelarcAdvisor\System\tmp. Then right click on the file named (COMPUTERNAME).html, where COMPUTERNAME is the name of your PC. In the pop-up menu click Properties. In the Properties dialog click the Change button next to Opens with:, then choose your preferred browser and click OK. When you next run the Belarc Advisor the results will show in your browser.
On Windows XP: Open the Folder Options windows control panel, and on the File Types tab select the HTML Document file type. Then click the Change…button, choose your preferred web browser, and click OK. When you next run the Belarc Advisor the results will show in your browser.
If that doesn’t work for you, open this file:
c:\Program Files\Belarc\BelarcAdvisor\System\tmp\(COMPUTERNAME).html
(where COMPUTERNAME is the name of your PC) using the File|Open… menu command in your web browser.
Q: Can I purchase a license to run the Belarc Advisor on my corporate network, or my customer’s network?
We do not permit use of the Belarc Advisor for commercial purposes, however we suggest that you take a look at our products, which we do license for commercial use.

Friday, 21 April 2017

Active Directory basics – Explaining AD to IT beginners

What's a directory service?
  • A directory service is a container that provides a hierarchical structure and allows to store objects for quick and easy access and manipulation. A directory service is like an electronic phone directory that lets you search for Name and retrieve the phone number, address, or other information without knowing where that person lives.
  • Before directory services, If you needed a file, you needed to know the name of the file, the name of the server on which it is stored and its folder path. Now this works well on small network, but as the network grows it becomes challenging.
  • Directory service is the means by which users and administrators can locate resources regardless of where those resources are located.
  • Also earlier typical user could have more than one user account or password, and as the network grows and the number of username and password also increases, like one for File Server, one for email server, etc.
Active Directory
  • Active Directory is Microsoft’s answer to directory services and it does a lot more than just locating resources.
  • Active Directory take care of this by using Kerberos Authentication and Single Sign-On (SSO). SSO means ability of Kerberos to provide a user with one set of credentials and grant them access across a range of resources and services with that same set of credentials. Kerberos authenticates the credentials and issues the user a ticket with which the user gains access to the resources and services that support Kerberos.
  • Active Directory also makes user management more easier as it acts as a single repository for all of this user and computer related information.
History of Directory Service
  • Earlier to today’s directory services is X.500 specification that emerged from the International Telecommunications Union (ITU), formerly the CCITT (Comité Consultatif International Téléphonique et Télégraphique).
  • X.500 sits at the Application layer in the OSI model. X.500 contain several component databases that work together as a single entity.
  • The primary database is the Directory Information Base (DIB), which stores information about the objects. Major limitation was its lack of integration with Internet Protocol (IP).
  • Protocol it used was Directory Access Protocol, or DAP. DAP offered more functionality than that is required for implementing directory services, so a scaled down version called Lightweight Directory Access Protocol (LDAP) was made. Later it was considered as a standard by Internet Engineering Task Force (IETF).
Advantage of LDAP
  • LDAP relies on the TCP/IP stack rather than the OSI stack
  • Integrate with IP and enable IP clients to use LDAP to query directory services.
  • LDAP can perform hyper-searches. Giving one directory the ability to defer to another to provide requested data.
  • LDAP’s API is C-based
  • Like X.500, LDAP uses an inverted-tree hierarchical structure
  • LDAP supports Kerberos authentication, Simple Authentication Security Layer (SASL), and Secure Sockets Layer (SSL)
  • Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols.
Back to Active Directory
  • AD is Microsoft’s answer to directory services and it does a lot more than just locating resources.
  • AD uses LDAP as its access protocol.
  • AD relies on DNS as its locator service, enabling clients to locate domain controllers through DNS queries.
  • Lets Understand Active Directory in more detail.
Naming Conventions 
  • AD contains information about objects in your enterprise.
  • These objects can be computers, users, printers etc.
  • AD is a container with nested containers holding other containers or objects.
  • And we name these container and objects so that its easy to query or search.
AD supports several Naming Conventions.
  • User Principal Names, or UPN
  • LDAP names also known as Distinguished Name
User Principal Names, or UPN
  • This one you’ll probably find most familiar, is as per RFC 822 specification.
  • This has the same format as your email address: Like ashwin@road2master.ms
  • They take the form user@domain
  • If you have a user named User01 under Active Directory domain Domain01.local, the UPN will be User01@Domain01.Local
  • We will discuss more about AD domain later. 
  • In AD you can create custom UPNs too, which means you can also add User01@Domain01.com or User01@xyz.com as UPN for above mentioned object.
  • More on these later.
LDAP names also known as Distinguished Name 
  • Typically it has this format 
cn=common name
ou=organizational unit
dc=domain
for eg. cn=Ashwin,ou=Trainer,dc=Road2Master,dc=ms
  • And query should look like this for the
LDAP://R2MAD01.road2master.ms/cn=Ashwin,ou=Trainer,dc=Road2Master,dc=ms
R2MAD01.road2master.ms is the FQDN of the Domain Controller.
Requirement of DNS
  • DNS Server must support
  • Service resource (SRV) records
  • Dynamic update protocol specified by RFC 2136
  • AD relies on DNS as its primary locator service, although its not the only mechanism for locating domain controllers (DCs).
  • Domain Controller is the server which has Active Directory Installed.
  • When a Domain Controller starts,
  • It registers both its DNS name and NetBIOS name. More on NetBIOS name later.
  • It add LDAP-specific SRV records in DNS to enable LDAP clients to locate DCs through LDAP queries.
  • It also add Kerberos authentication protocol-specific SRV records to enable clients to locate servers running the Kerberos Key Distribution Center (KDC) service.
  • Also each DC also adds an A record that enables clients that don’t support SRV records to locate the DC through a simple host record lookup. You can disable this if required.
Active Directory objects
  • Objects in AD can be either containers for other objects or they can be leaf objects, which do not serve as containers.
  • Objects in AD have attributes, and these attributes not only define the object but also store data. This defines the character of that Object.
  • Some attributes and optional and some are mandatory.
  • Optional : Phone Number
  • Mandatory: Username
  • When an Object is created AD assigns a GUID, which is a 128-bit number and no two objects in AD have the same GUID.
  • And If an object is moved from AD, it doesn’t delete its GUID.
  • Objects in AD are protected by Access Control Lists (ACLs).
  • More on Security later.
Active Directory Database
  • The ESE comprises of tables that define the structure of the directory.
  • The Database Layer has three partition that define the contents of AD with an optional 4th table or partition.
Schema Partition
  • This stores Active Directory Schema.
  • Active Directory Schema defines what are the types of objects that can be created in the directory
  • How are those objects relate to one another, and what are the mandatory and optional attributes of each object.
  • And how can one create such objects.
Configuration Partition
  • This contains configuration of AD.
Domain Partition 
  • This partition stores the objects.
Application Partition
  • This is an optional 4th partition that an administrator can create.
  • More on this later.
  • More about Active Database in the upcomming parts.
Active Directory Schema
  • Active Directory Schema defines what are the types of objects that can be created in the directory
  • How are those objects relate to one another, and what are the mandatory and optional attributes of each object.
  • And how can one create such objects.
  • Schema requires to updates whenever you need to create a new type of object or add anything that requires new attribute.
Domain, Tree and Forest

AD Domain
  • Objects that are made on AD are grouped into domains.
  • The objects for a single domain are stored in a single database (which can be replicated).
AD Domain Tree
  • A tree is a collection of one or more domains
AD Forest
  • A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration.

Office 365 for business

Tab panel for expanded tab number1
Office 365. "Office 365" refers to subscription plans that include access to Office applications plus other productivity services that are enabled over the Internet (cloud services). Office 365 includes plans for use at home and for business. Learn about Office 365 for use at home. Office 365 plans for business include services such as Skype for Business web conferencing and Exchange Online hosted email for business, and additional online storage with OneDrive for Business.
Many Office 365 plans also include the desktop version of the latest Office applications, which users can install across multiple computers and devices. The fully installed applications include: Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Access. (Publisher and Access are available on PC only.) And you can install them across multiple devices, including PCs, Macs, Android tablets, Android phones, iPad, and iPhone. When you have an active Office 365 subscription that includes the desktop version of Office, you always have the most up-to-date version of the applications.
The Office 365 plans that are online-only are a great choice for certain business needs, and they are designed to work with the latest version of Office, Office 2013, and Office 2011 for Mac. Previous versions of Office, such as Office 2010 and Office 2007, may work with Office 365 with reduced functionality. Get more details about which Office versions are supported. NOTE: This compatibility with Office does not include the Exchange Online Kiosk or Office 365 Enterprise K1 plans.
All Office 365 plans are paid for on a subscription basis, monthly or annually.
Microsoft Office. "Microsoft Office” is the name we still use for our familiar productivity software. Office suites are available as a one-time purchase and include applications such as Word, Excel, and PowerPoint, which can be installed on only one PC or Mac. The applications are not automatically updated; to get the latest version, you can purchase the product again when the new version becomes available. The latest versions currently available for one-time purchase are Office 2016 for Windows and Office 2016 for Mac. These suites do not come with any of the cloud-based services included in Office 365.

Belarc Advisor- DOWNLOAD A FREE COPY OF BELARC ADVISOR

Deepak Sharma, +919717366282 Download Link:- https://www.belarc.com/products_belarc_advisor The  Belarc Advisor  builds a deta...