Thursday, October 30, 2008

Retrieve Windows Live Messenger 2009 Standalone Individual Setup Installer (MSI) from Web Download

Microsoft has made Windows Live Messenger (WLM or previously known as MSN Messenger) as part of the product suite of Windows Live package, and no longer provide standalone individual setup installer for user to download and install just Windows Live Messenger itself. The story is the same for the latest public beta for Windows Live Wave 3, which includes Windows Live Messenger 2009.As usual, user download the unified Windows Live Installer which contains installation files for all software programs inside the Windows Live products, such as Windows Live Writer, Windows Live Mail, Windows Live Toolbar and etc. Most of the programs other than WLM is not needed, yet Microsoft forces user who wants to backup the installer or install WLM on not connected offline PC or distribute the program across corporate network to download the massive 100 MB plus integrated full installer, namely wlsetup-all.exe.
The worst part is that the wlsetup-all.exe, which has all the installation files, cannot be uncompressed, unpacked or extracted into separate .MSI installer for each individual software. While the web installer, wlsetup-web.exe does not have the .MSI packaged in as it will download the required .CAB off the Internet.
For those who insist on want to grab and retrieve a copy of individual stand-alone Windows Live Messenger 2009 setup installer, which can be used to install WLM anytime on any computer without waiting for downloading, use the following trick to get the “Messenger.msi” file.
Download Windows Live Installer from download.live.com.
Install or upgrade the Windows Live Messenger to latest version.
Open Windows Explorer, and set it to Show hidden files and folders and show protected operating system files (uncheck the tick for Hide protected operating system files) in the View tab of Folder Options.
In Windows Vista, run Windows Explorer as Administrator, and user may requires to take ownership and gain full control permissions for the folders below before able to access them.
Browse to \Program Files\Common Files\Windows Live\.cache\ folder.
There will be a lot of folders made up of 15 characters and numbers. Locate Messenger.msi file inside one of the folder. Messenger.msi is the individual separate standalone setup installer for Windows Live Messenger 2009, which can be backed up or copied to another location. Do note that the Messenger.msi and other Windows Installer Package retrieved this way is silent installer.
Tip: %ProgramFiles%\Common Files\Windows Live\.cache\cache.ini file contains the paths of all Windows Live software products downloaded or installed on the computer.
If you have any problem with Windows Live Messenger after installation using the standalone individual installer Messenger.msi, try to install the following 3 programs too, all of which in different sub-folders inside the .cache directory.
Contacts.msi (Contacts)dw20shared.msi (DW 2.0 Client)crt.msi (Microsoft Visual Studio Runtime)
Tip: Contacts.msi is a must to avoid or fix 8000FFFF error.
After grabbing the Windows Live Messenger standalone silent installer, optionally user can uninstall the Windows Live Suite (all programs) from Control Panel, and install Messenger.msi (and Contacts.msi too) again to get rid of all other Windows Live components except WLM9, saving time and bandwidth in future installation.
The trick also also work for all other Windows Live products such as Windows Live Sign-In Assistant (wllogin.msi), Windows Live Writer, Windows Live Mail ,Windows Live Toolbar, Windows Live Photo Gallery, Windows Live Family Safety, Segoe UI Font, Windows Live Call and Microsoft Office Outlook Connector.

Google G1 Phone: Security Flaw Exposed



Android, Google’s open source software is based on outdated open-source components which had know vulnerabilities and were fixed. Google admitted that they did not incorporate the security fixes into Android.For Google´s G1 phone to become infected, a malicious developer would need to know what the flaw is and then needs to place this malicious code on a website.


Unless you are searching for suspicious websites that may be affected, the chances are good that you are safe from infection.Google said it is developing a solution to the problem. “We are working with T-Mobile to include a fix for the browser exploit, which will soon be delivered over the air to all devices, and have addressed this in the Android open-source platform.This incident raises concerns about potential difficulties that the Android community might face in the future. Because Google has adopted an open model with Android, many vendors and operators in the future may offer a variety of phones. If vulnerabilities are found in the future, phone makers and operators will have to determine if their version of the software is affected and then coordinate the distribution of a fix to all users.

Windows 7 will be more fast and easy, vows Microsoft

Microsoft Corp. said on Tuesday that regular PC users will be able to test out a “beta” version of Windows early next year. Windows 7, the forthcoming operating system, will let users choose to see fewer alerts and warnings from their computers.Source:physorg

Rampant notifications and pop-up windows alerting people to potential security risks have irked many users of Windows Vista.“We had all the best intentions of helping to secure the PC platform even more, particularly for novice PC users who needed to be protected,” said Steven Sinofsky, a senior vice president in Microsoft’s Windows group.Sinofsky didn’t back down from the major changes in Vista responsible for the rise in alerts, but he did acknowledge that

Microsoft needed to work earlier and more closely with outside companies to avoid a similar mess in Windows 7.“Despite the difficult change we introduced, we did move forward the ecosystem, making it more secure for end users,” he said. With Vista, Microsoft made some significant design changes to the way windows and icons look, and also to where certain features and functions are stashed in the system.Windows 7 keeps some of those changes, but tosses out others. In an interview, Julie Larson-Green, a Windows vice president, offered one small example: Microsoft took the “add printer” feature out of the quick-access Start menu, but after users complained, the company is putting it back in Windows 7. Larson-Green, who led the redesign of Office for the 2007 edition, said that some of the changes made in Vista’s design made sense to designers but weren’t fully tested on actual PC users.With Windows 7, Microsoft is also making subtle but useful changes to the task bar along the bottom of the screen. The designers have taken out some redundant buttons that launch applications. And when users roll over the icon of a program in the task bar, it’s easier to see how many documents or windows are open, and switch between them.Microsoft also showed off a quick way of organizing recently used files, Web sites or often-used program features it’s calling “jumplists.” The company also introduced a concept called “libraries,” which automatically finds similar files from a single PC, its external hard drive and even other PCs on a home network, then displays them together in a single folder. For example, that could be handy for organizing a family’s digital photos, Microsoft said.The company also appears to be betting on a rise in touch-screen PCs. Windows 7 builds in more support for gestures so that even programs that aren’t designed specifically for touch-screen computers can be used to some degree by poking or swiping fingers across the screen.Under the hood, Microsoft said it improved the speed of the system and cut the amount of memory it needs to run. Sinofsky held up a netbook - a low-cost, low-power laptop that would have a hard time running Vista - and said it’s working with Windows 7.

Microsoft gave copies of a “pre-beta” version of Windows 7 to programmers attending a conference in Los Angeles, and announced the early 2009 target for the general-use beta.The Redmond, Wash.-based software maker promised deadlines it couldn’t keep when it was developing Vista, and the company is trying hard to avoid a similar debacle this time. Sinofsky said there is no date yet for the next milestone, a “release to manufacturing” version of Windows 7, and reiterated that the system is set to go on sale in early 2010.

ref: http://www.gadgetted.com/?p=2095#more-2095



Check out the video that gives a better idea of what it might be like to manipulate icons and images on a desktop display in Windows 7. Microsoft’s goal is to enable “most applications,” out of the box with simple multi-touch on day one of the Windows 7 launch. Individual apps can then be optimized to improve performance and offer a greater degree of touch and multi-touch control.
Source: http://www.gadgetted.com/msn/

Tuesday, October 28, 2008

Are these your problems with Windows?

Assuming most of the desktops in your current enterprise are installed with Windows XP (SP2/SP3) or Windows 2000, here is a list of problems you (administrator) might be facing with them.
Problems:
1. The users on most of the desktops use administrative accounts to work on their PCs. This is usually done so as to enable to users to do all the common tasks on their PCs themselves, but this may pose problems like:
a. Users can install software themselves. Once installed, software can compromise the overall health and control of the PC, as well as introduce security and data compliance issues. With every new piece of unknown software installed, desktop performance, security, and supportability is gradually compromised.
b. No asset inventory control or license management. This can leave you in a position where you don’t know what has been installed and whether or not you have a license for the software.
c. Important data files are often changed or deleted. With administrator accounts, users have full access to the system and can often delete files that are required for system stability and reliability or even booting into the operating system, running applications or performing other day-to-day tasks
d. End users are able to change core system configurations. Users with admin rights can install drivers, change firewall settings, deactivate services, or deactivate anti-malware software, and add additional user accounts.
e. Users are not restricted from attaching devices to their PCs. With unauthorized storage devices connected (such as USB drives and MP3 players), users can easily lose or steal important data, load malware onto PCs, or misuse company assets with personal devices.
f. Systems cannot be centrally managed. In many cases software is not centrally distributed or tracked. If that is the case, computers will require manual setup and configuration.
2. Many applications are written to require admin privileges. This is often because software developers tend to develop as local administrators. Many applications are designed to assume that administrative privileges are present.
3. Applications can save their data (installation files, registry keys, and runtime data) to random locations. Applications written this way are difficult to support, because each application functions in a different way. If something breaks, it is difficult to troubleshoot the problem. For example- applications may store unknown file formats in “Program Files’ folder during installation.
So what is the ideal way in which the Windows systems must be managed and how can that state be achieved?
Read my next blog on what should be done to tackle these problems proactively, and the third one in the series on how can it be done.
Posted: Wednesday, October 22, 2008 3:21 PM by TechNetIndia 1 Comments
Filed under: , , ,
Launching Windows Essential Server Solutions
Microsoft is launching it’s new series of small and midsize server solutions on 12th of November. The two products which are part of this launch are Small Business Server 2008 and Essential Business Server 2008. For more details check this out link. http://www.thedreamserver.com/
Technorati Tags: ,
Posted: Tuesday, October 21, 2008 1:49 PM by TechNetIndia 1 Comments
Filed under:
Virtual TechDays – September 2008 – Managing Virtual Infrastructure
Hi, this is Ravi Sankar (http://ravisankar.spaces.live.com/blog ) again from the TechNet India team. This is the second blog post I am writing in response to the questions we received as part of virtual tech days (http://www.connectwithlife.co.in/vtd ). This time I am answering the questions from the session “Managing Virtual Infrastructure”
Q1: Is virtualization suitable for big corporations only? Or is it useful to small and medium enterprises also?
A1: Very good question. Virtualization technologies are useful to organizations of all sizes. Let me explain this with the help of an example.
Hyper-V is the server virtualization technology from Microsoft. By using Hyper-V in a data centre, a large organization can consolidate their server infrastructure into fewer number of servers. This will result in savings in terms of rack space, cooling, power, management cost etc.
The above advantages are applicable to a small and medium sized business organization (SMB) as well. Since SMBs face additional constraints in terms of quality infrastructure and skilled IT man power virtualization can offer them a more optimized IT solution by requiring less infrastructure and better server management technologies (backup, high availability, provisioning etc.).
Q2: How does System Centre Virtual Machine Manager (SCVMM) handle applications which are not cluster aware to provide high availability (HA)?
A2: SCVMM does not handle applications directly but through virtual machines. Hyper-V is cluster aware and can be configured to provide HA for all the virtual machines running on it. The applications running in these virtual machines may or may not be cluster aware. SCVMM can manage the failover of such virtual machines from one server to another server running Hyper-V.
Q3: What is template creation in System Center Virtual Machine manager (SCVMM)?
A3: Templates are virtual machines created and stored in SCVMM library with specific virtual hardware, OS and application configurations. Templates are created for frequently used virtual machine configurations so that it is easier to provision new VMs. It also allows automation of VMs through scripting.
As one of you said it is a one time activity
Q4: Is diagram view of virtual and physical machines created automatically in System Center Operations Manager (SCOM)?
A4: Yes, once SCOM is configured to monitor a Virtual Server or Hyper-V based computer it can generate a diagram of physical machines and associated virtual machines automatically
Q5: Is Hyper-V a Type-1 virtualization product?
A5: Yes, Hyper-V is a hypervisor based Type-1 virtualization product. Hyper-V is available either as part of Windows Server 2008 x64 editions or as a standalone product (http://www.microsoft.com/servers/hyper-v-server ) for bare metal implementation
Q6: How many Hyper-V based servers are required to virtualize my xxx number of servers?
Or How can I size my Hyper-V deployment?
Or How much memory is required to virtualize xxx number or servers?
A6: As an answer to all these questions I request you to visit the following URLs and read things related to virtualization.
http://www.microsoft.com/whdc/system/sysperf/Perf_tun_srv.mspx
www.microsoft.com/map
http://blogs.microsoft.co.il/blogs/lior/archive/2008/08/15/hyper-v-server-sizing-and-performance-tuning.aspx
Q7: How powerful is Hyper-v?
A7: This is a very subjective question and it can be best answered with the help of some real customer case studies given the following link http://www.microsoft.com/virtualization/case-studies.mspx
Q8: Is it possible to manage VMWare infrastructure from SCVMM?
A8: Yes, SCVMM allows the integration of VMWare into its console. Details can be found here. http://blogs.technet.com/chengw/archive/2008/04/29/managing-vmware.aspx
http://blogs.technet.com/virtualworld/archive/2008/06/02/managing-vmware-with-scvmm.aspx
Q9: Can Hyper-V run on 32 bit hardware or 32 bit OS?
A9: Hyper-V runs only on 64 bit hardware and requires 64 bit edition of Windows Server 2008 in the parent partition. However some of the remote management tools for Hyper-V runs on 32 bit OS. Also Hyper-V supports 32 bit virtual machines.
Q10: What kind of drivers used by virtual machines in Hyper-V?
A10: Hyper-V supports two different types of devices viz. emulated and synthetic. Emulated device drivers are used for backward compatibility with older operating systems whereas synthetic drivers are supported only in newer operating systems like WS2008 but provides better performance. To know more about emulated and synthetic devices please refer to the following links.
http://blogs.msdn.com/virtual_pc_guy/archive/2008/02/25/hyper-v-terminology.aspx
http://blogs.msdn.com/tvoellm/archive/2008/01/02/hyper-v-integration-components-and-enlightenments.aspx
http://searchservervirtualization.techtarget.com/tip/0,289483,sid94_gci1312278,00.html
Q11: How do I provide high availability for virtual machines running in Hyper-V?
A11: There are many articles available on Microsoft’s website on providing high availability to a Hyper-v environment. Here is one of them http://technet.microsoft.com/en-us/magazine/cc837977.aspx
Q12: What makes the rapid provisioning of virtual machines possible in a Hyper-v environment?
A12: Libraries, templates, PowerShell based scripting and self service portal features in System Center Virtual Machine Manager 2008 make the rapid provisioning of virtual machine possible in a Hyper-V based virtual environment.
Q13: What are the minimum system requirements to run Hyper-V?
A13: The answer depends on whether you are running a bare metal Hyper-V server, server core based Hyper-V and Hyper-V with full installation of Windows Server 2008. Here is the system requirements for running Hyper-v server
http://www.microsoft.com/servers/hyper-v-server/system-requirements.mspx
Q14: Where can I get a free copy of Hyper-V?
A14: Hyper-V is available to you when you purchase a copy of “Windows Server 2008 x64 edition with Hyper-V”. To download an evaluation copy of Windows Server 2008 please visit the following link
http://www.microsoft.com/windowsserver2008/en/us/trial-software.aspx
A full version of Hyper-V server can be downloaded free of cost from the following link
http://www.microsoft.com/servers/hyper-v-server/how-to-get.mspx
Technorati Tags: ,,
Posted: Monday, October 20, 2008 6:20 PM by TechNetIndia 0 Comments
Filed under:
Q&A: Performance Tuning Redefined with SQL Server 2008
I am sure you folks are enjoying all the Q&A posted by my fellow Evangelists on this blog. The intentions are very much there to give you complete information even after our webcasts have got over. If you didnt get to read the Part I Q&A I wrote around the DMVs session, dont forget to read them too. Let me next give you the links to PPT and Session for your offline viewing if you missed them. Next, moving to the unanswered Q&A from the session. Here we go:
Question Asked: can we run data collector on sql server which is having sql server 2005 ?
The management data warehouse can only be installed on a server running SQL Server 2008.
Question Asked: different collection modes available for data collector
The Data Collector Architecture (http://msdn.microsoft.com/en-us/library/bb677355.aspx) explains the real backend work. Incidentally, this is an completely async process and uses a combination of SSIS, SQL Agent and SQL Relational engine magic. You can also manually collect and upload the data into SQL Server from the Management Studio.
Quesiton Asked: Could you plz tell something more about WMI event?
If you personally ask me, this is a super cool event one seems to miss-out from the SQL Server 2005 days itself. Anyways, check the complete documentation of WMI Events and SQL Server at: http://msdn.microsoft.com/en-us/library/ms180606.aspx. Infact, if you crank up your SQL Server Configuration Manager, it operates completely around the WMI Eventing Infrastructure. It is really powerfull and under-utilized.
Quesiton Asked: What is the Impact on Memory Usage and Performance of system of Data collection?
This my friend is a dicey question because the data collected is completely under your control. And everytime a collect and upload happens the runtime fires enough info into the database. Now when this happens is completely configurable and the purging is also configurable. Hence the stress on the IO and Memory is something in your hand. Moreover we use the SQL Server Agent infrastructure and it can also be configured to run at our specified interval rather than automatically every 10 sec or so.
Question Asked: Can we use data collector to pull the data from the the data provider or website that allows to fetch the data using webservices?
Though the question is vaugue I think if you get a chance to read through the Architecture (http://msdn.microsoft.com/en-us/library/bb677355.aspx) in detail things will get clear. There is nothing like a webservice or sorts available.
Question Asked: can we have single data collector to collect information from multiple instance ?
If you have multiple SQL Server instances you could configure the data collection processes on each of your instances to use a central MDW repository. In fact, It is recommended you do this to minimize the impact of the data collection process.
Question Asked: Can the Monitoring data be Stored outside the server being monitored
Your question seems to be similar to the one asked in the previous question. You can raise the collection as T-SQL Collector, SQL Trace, Perf Counter Collector and Query Activity Collector. You can read on each at: http://msdn.microsoft.com/en-us/library/bb677328.aspx.
Question Asked: Does it upload the data to the warehouse db on its own or we have to do it manually?
As described before, you have all the flexibility here. You can manually do it or schedule it at regular intervals via the SQL Server Agent process.
Question Asked: how much frequently is the data fed to dataware house from cache ?
Same as the previous question. You can completely customize it.
Question Asked: we can use this data collector for maintain performance related data for application or database or Visual studio application
Though this is a nice thought, currently we are restricted for collecting perf data using the DMVs inside of a SQL Server instance only.
Question Asked: Say If I run this tool, every 1 hour, for 30 days, how much of data space will it take?
There is no straight forward answer to this question. It depends on how much data you will be collecting. I have seen with an interval of 10 sec for the past ~25 days the current size is close to 400MB for me. But I this happens on my laptop which starts and shuts down often.
Question Asked: WIll Data collector effect MSDB ?
This is a good question. We do use msdb for DW activities. The data collector uses msdb for storing configuration information, run-time information, auditing, and collection history information. This database must be present on the instance of SQL Server that runs the data collector. Using msdb provides the following benefits: a) All the data needed to configure and run the data collector is in one location. b) Data collection configuration can be deployed across several servers without having to use the file system. c) The data collector can use existing SQL Server security mechanisms to protect the data. In addition, database roles can provide granular security, and there is no need to implement cross-database chaining. and finally d) Since msdb is a relational database, it is possible to ensure the referential integrity of the configuration and run-time data.
Hope these clarified some of your questions from the session and hope to meet you all again in the next VTD scheduled on Nov 25th and 26th. And guess what we will have 8 fabulous sessions around SQL Server. Dont miss the action and dont forget to register.
Posted: Sunday, October 19, 2008 10:12 PM by TechNetIndia 0 Comments
Filed under: ,
Virtual Tech Days Sep 08 – Managing Windows Vista using Windows Powershell

Hi, I am Ranjana Jain (http://ranjanajain.spaces.live.com) . I was one of the presenters at the recently held Virtual Tech Days from Microsoft. I presented two sessions – a. Managing Windows Vista using Windows Powershell and b. A look at the performance changes in Windows Vista SP1. A number of questions were asked during these virtual livemeeting sessions, which may not have been answered by me primarily due to lack of time. However I feel it was important to address the queries of the attendees, so like Ravi, I too decided to do that in this blog. So here I have consolidated most of the queries asked during the sessions and have tried to provide all the info that you can benefit from.
Many more questions were also asked that may not have been articulated in the exact same words, but I am sure most of the information that was required has been provided as answers to these queries.
Q1. Can Desktop Settings of users be modified using Powershell?
Answer: Yes, Windows Powershell is a complete administrative shell using which administrators can do anything on the computer they have rights to. This includes, modifying desktop settings, starting/stopping services, changing policy settings, editing registry and even managing event logs etc. Here is a link where you can find scripts that have already been created to Manage Windows Desktop Settings: http://www.microsoft.com/technet/scriptcenter/scripts/msh/default.mspx?mfr=true .
Q2. Can we create batchfiles/scripts using Windows Powershell to automate the tasks?
Answer: Yes, infact creating scripts in Windows Powershell is much easier than creating scripts in Visual Basic, or other programming languages. All that you need to create a script for Windows Powershell is to write all the Powershell commands in a notepad as you would want to run in sequence on the Powershell, and just save the file with a “.ps1” extension i.e. . Now you just need to provide the complete path of this .ps1 script file at the Powershell prompts and execute it! -J Yippee!!
Q3. Can I activate Windows Vista using Windows Powershell?
Answer: Absolutey, infact a Powershell script already exists in our scripts database to activate Windows Vista: http://www.microsoft.com/technet/scriptcenter/scripts/msh/desktop/activate/default.mspx?mfr=true . These include scripts using which you can not only know the activation status but also use scripts to activate Windows both offline and online. -J
Q3. How do we run the Powershell batch files/scripts on remote computers?
Answer: This was demonstrated as a part of the scripts I executed during the session. As I mentioned, that in most of the commands that used GetWmiObect , I could replace the “.” value for the /computername parameter with the UNC path of the computer on which you want to execute the command.For example: - Get-WmiObject -Class Win32_BIOS -ComputerName.The above command displays the BIOS information on the local computer. Replacing the “.” value in the above command with the UNC path of the destination computer will display BIOS info for the destination computer.
Q4. Can we edit registry using Powershell commands?
Answer: Absolutely, infact Regedit is not required to edit registry using Windows Powershell. Windows Powershell exposes Windows Registry as a data store ( like C: and D: drives) in the form of psdrives. Therefore you can access the HKEY LOCAL MACHINE registry hive as HKLM:\ and then use usual commands to edit registry. For more information and actual commands to edit specific registry information please view the session recording at: http://www.connectwithlife.co.in/vtd/ For Example: $value = (get-itemproperty "HKLM:\software\microsoft\internet explorer").version
Q5. Is Windows Powershell a new version of Linux shell, as you can run all Linux shell commands in Powershell?
Answer: Windows Powershell was basically developed to bridge gaps that were there wrt administration using Windows Command Line (cmd shell). We had a large number of commands to manage Windows Server 2003. Many more commands were added with Windows Server 2003 R2. But the cmd shell could still not provide the intuitiveness of Bash , the object based simplicity of Perl etc. So there was a desperate need to have an intuitive and simple command shell that could be more useful especially to administrators. Do watch/listen to this video (an interview with Jeffery Snover , Windows Powershell developer) : http://www.microsoft.com/uk/technet/spotlight/sessionh.aspx?videoid=209
Q6. How can I use Powershell to administer most activities on Windows Vista Computer?Ans: Powershell can be used to administer Windows Vista Computers in all ways that you can do it using the GUI. Many of such administrative activities were demonstrated in the VTD session and you can even download a Powershell Owner’s manual whre you can access most of the information on how you can use it even better to administer Windows Vista: http://www.microsoft.com/technet/scriptcenter/topics/winpsh/manual/default.mspx
Q7: Are the Powershell commands same for Windows XP and Windows Vista?
Answer: Although there are many commands that might look same for both the platforms, but yet there are many differences, mostly for administering features that were not present in Windows XP.
Q8: Can existing VB scripts be used on Windows Powershell?
Answer: Before using VB scripts on Windows Powershell, you need to convert them to Powershell scripts. This is a simple task that can be done using existing tools:
http://www.microsoft.com/technet/scriptcenter/topics/winpsh/convert/default.mspx

Above al, you can find most of the scripts, tools, guides and resources on Powershell here:
http://www.microsoft.com/technet/scriptcenter/hubs/msh.mspx
To learn more about working with Windows Powershell, you can also view many webcasts on Windows Powershell at: http://www.microsoft.com/webcasts
Virtual Lab on Windows Powershell can also be found at: http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?culture=en-US&EventID=1032314395&EventCategory=3
Moreover, if you are a Windows Administrator who hates writing a script (like me -J) , please watch: http://www.microsoft.com/uk/technet/spotlight/sessionh.aspx?videoid=214&PUID=000149505AA18347
Happy Powershell Learning -J !!!
Posted: Friday, October 10, 2008 3:40 PM by TechNetIndia 0 Comments
Filed under: , , , ,
Virtual Tech Days – September 2008 – Virtualization Security
Hi I am Ravi Sankar (http://ravisankar.spaces.live.com/blog) from the TechNet India team. First of all let me thank everyone who attended the sessions under virtualization track. We have received hundreds of questions as part of the sessions and due to time constraints the speakers could answer only a few of them. So I am taking this opportunity to answer all of those questions.
A number of questions are either repeated or asked with same concepts in mind. I have consolidated those into fewer number of questions and answered here. In other words answers written here are not 1:1 replies of your questions but essentially covers everything you wanted to know.
Q1: Is there a virtual firewall or special security protocol in Hyper-V?
A1: The answer is NO. Virtual machines can be protected using the same firewall applications and security protocols used in physical machines. To know more about virtual networks please click here
Q2: Do I need to run antivirus software in all the virtual machines in a Hyper-V based server or is it sufficient to run one instance of antivirus software in the parent partition?
A2: Antivirus software should be installed in all virtual machines including the parent partition. Also depending on the applications installed, the requirement on antivirus software would vary from one virtual machine to another virtual machine. For example, the antivirus software required for a virtual machine running Exchange Server is different from a virtual machine running SQL Server.
Q3: I have a smart client application. Will this work in a virtual machine environment (as such) or does it require customization?
A3: I don’t see any reason for additional customisations. But I do not know the details of the application you have mentioned. So I suggest you to thoroughly test the application before using it in production
Q4: Can my offline virtual machines be patched to keep it update?
A4: Yes, you can do this. Offline Virtual Machine Servicing Tool can be used to achieve this goal. Click here to download the tool. An update version of this tools is expected soon.
Q5: Please explain the ring model of CPU as far as Hyper-V is concerned.
A5: Hypervisors work at ring –1, OS kernel works at ring 0 and user applications work at ring 3. Ring 1 & 2 are not used in Windows
Q6: What are the specific CPU features required for Hyper-V to run?
A6: For any computer to run Hyper-V it should have a CPU from Intel or AMD with hardware assisted virtualization capability. For Intel processors this technology is called Intel-VT and for AMD processors this technology is known as AMD-V. Additionally Data Execution Prevention (DEP) should be turned on for Hyper-V to run.
Q7: Will the physical environment security applications take care of the full virtual environment or do I have to consider any additional products?
A7: Security applications such as firewalls and anti malware products remain the same for virtual environments. But these security applications should be configured to secure both parent and child virtual machines
Q8: Is System Management Server/System Center Configuration Manager a supported application on Hyper-V?
A8: Yes, SMS/SCCM products can be installed in a Hyper-V based virtual machine. Hyper-V based virtual machines can also be configured as SMS/SCCM clients.
Q9: Is there a “bare metal” installation type available for Hyper-V? Is it possible to install Hyper-V without installing Windows Server 2008?
A9: Yes and this type of Hyper-V implementation is known as Microsoft Hyper-V server. For more details please follow this link http://www.microsoft.com/Hyper-VServer
Q10: How the Hyper-v architecture can mitigate security attacks?
A10: Let’s look at different potential attack vendors on the virtualized environment.

Let’s say an application that encounters malware with some frequency (e.g. a web server) is running in one of the guest virtual machines above. It becomes compromised, but the malware would still need to compromise the guest kernel OS for the virtual machine (which is typically what happens when a physical machine is running an application with a vulnerability). From there the malware could potentially target a number of vectors for broader infection:
The right arrow signifies that the malware could try to target other virtual machines running on the same box
Alternatively, it could try to target the hypervisor to bring down the overall virtualization environment, or
Try to target the VSPs through the VSC-VSP communications path. (Again, the virtualization service clients, or VSCs, enable virtual machines to be installed on their own Hyper-V device and to talk more directly with the virtual service providers which broker access to physical I/O.)
Another option is to target the individual virtual machine worker processes where the majority of the code with Hyper-V resides
Let’s now look at how the Hyper-V architecture helps to mitigate these potential attack vectors
The hardware itself mitigates attacks on the OS kernel. The latest CPUs from Intel and AMD have the ability to run this in the most privileged part of the processor, otherwise known as “Ring 0”, and to block access to this from other components (e.g. guest virtual machines running in user mode) that should not have access.
The architecture itself creates isolation between other virtual machines, addressing the scenario of malware trying to attack other virtual machines from the infected virtual machine. If a guest wants to communicate with another guest, it must be done through the root partition. “Back-channeling” is not allowed – no two parts can communicate directly with each other, similar to how two machines connect on a physical network.
Regarding the other three attacks (on the Windows hypervisor, VSPs-VSCs, and on VM Worker processes):
The size of the hypervisor, VSCs/VSPs are small (i.e. lower likelihood of vulnerabilities)
When VSPs receive data from the VMBus, it is considered untrusted and requires validation
If a VM Worker process (where most of the Hyper-V code resides) is brought down, it only brings down the VM session
In short, the separation of components from each other by privilege level and architecture helps enable defence-in-depth against malware attacks.
All of the above components have been extensively tested through the Security Design Lifecycle – threat modelling, fuzz testing, and security code review.
Q11: What is Microsoft Forefront and what kind of protection does it offer?
A11: Microsoft Forefront represents a suite of security products offering protection at client, server and network edge levels. Fore more details please refer to the following link www.microsoft.com/forefront
Q12: How many virtual machines can be created in a given instance of Hyper-V?
A12: Please follow this link to see the maximum supported configurations under Hyper-V. http://blogs.msdn.com/nickmac/archive/2008/07/04/hyper-v-rtm-maximum-supported-configurations.aspx . But these are not fixed numbers. They would change with newer hardware configurations and corresponding changes made to Hyper-V.
Another link: http://support.microsoft.com/kb/956710
Q13: Please explain the difference between monolithic hypervisor and microkernelized hypervisor.
A14: The diagram below explains the difference. Hyper-V follows the more secure and stable microkernelized architecture unlike many of it’s competitors.

Q14: What kind of hardware is recommended for Hyper-V?
A14: http://technet.microsoft.com/en-us/library/cc816844.aspx
Technorati Tags: ,,
Posted: Thursday, October 09, 2008 5:03 PM by TechNetIndia 0 Comments
Filed under:
Q&A: Top 10 DMVs Admins must know in SQL Server
In the recent Virtual TechDays that got concluded we had a number of sessions and there were questions that couldnt be answered. You can download the PPT for the "Top 10 DMVs Admin must know in SQL Server" at: http://download.microsoft.com/download/6/1/A/61A76FEB-8035-47BC-9573-A438F7513E6A/DAY2/TRACK4/Top_10_DMVs.ppt
Question Asked: What is ITW in SQL 2000 and What are DMVs?
ITW is Index Tuning Wizard and was available in SQL 2000 days. We rewamped it as DTA (Database Tuning Wizard) in SQL Server 2005 which was far more powerful than the SQL 2000 ITW counterpart. Now to get into the second part, Dynamic Management Views (DMV) provide greater transparency and insight into the database and a powerful infrastructure for proactive monitoring of database health and performance to make managing data more flexible and secure.
Question Asked: do we need to run DMV on prod server or we can run on the restored DB also
We need to understand one fundamental thing here, DMV's are like pseudo views / tables that are exposing the in-memory structures of SQL Server. These are useful to diagnoze any potential problems that might occur in that system. Some of these views are transient and some are cummulative and some get fulshed from time-to-time. Typical examples in these categories would incude Locks data is transient and changes every micro-second while data like the Index usage (seeks, scans etc) are cummulative and data like the query cache can get flushed if there is memory pressure from any other side. Having said all this, these data are NOT like metadata (e.g. sys.tables) which can be restored on another DB and analyzed. There is a way in SQL Server 2008 using Data Collector that we can do this and check the architecture here: http://msdn.microsoft.com/en-us/library/bb677355.aspx
Question Asked: all these DMV are part of SQL 2005
DMV's were very much intrduced as concepts inside SQL Server 2005 itself. AFAIK, there were close to 80+ DMV's with SQL Server 2005 RTM build. We increased this set to ~136 with this new version of SQL Server 2008.
Question Asked: How to get a list of all DMVs available for us to query upon....?
Here is a simple query that will help you answer this part:SELECT * FROM sys.all_objects WHERE [name] LIKE '%dm_%' AND [type] IN ('V', 'TF', 'IF')ORDER BY [name]
With SQL 2008 we introduced a number of DMV's around auditing, Extended Events, CDC, Filestreams etc.
Question Asked: what will calculeted by awe_allocated_kb
This value shows the overall amount of memory that is allocated through the AWE mechanism on the 32-bit version of SQL Server. Or, this value shows the overall amount of memory that locked pages consume on the 64-bit version of the product. This value comes from the sys.dm_os_memory_clerks DMV and the documentation for the same is at: http://msdn.microsoft.com/en-us/library/ms175019.aspx.
Question Asked: What permission does a user need to access the DMV's
There are two types of dynamic management views and functions:Server-scoped dynamic management views and functions (e.g OS, IO, Threads, tasks etc). These require VIEW SERVER STATE permission on the server.Database-scoped dynamic management views and functions (e.g Index, Tables, partition, file etc). These require VIEW DATABASE STATE permission on the database.
Question Asked: Which DMV give me query plan or I will use old method to find query plan?
Here is a query that you can run to get the Total Elapsed time of queries and the number of times those queries were hit. It also give's you the query and the plan used for each of those.
select qs.execution_count , qs.total_elapsed_time, qs.last_elapsed_time , qs.min_elapsed_time, qs.max_elapsed_time , substring(st.text, (qs.statement_start_offset/2)+1 , ((case qs.statement_end_offset when -1 then datalength(st.text) else qs.statement_end_offset end - qs.statement_start_offset)/2) + 1) as statement_text , qp.query_planfrom sys.dm_exec_query_stats as qscross apply sys.dm_exec_sql_text(qs.sql_handle) as stcross apply sys.dm_exec_query_plan (qs.plan_handle) as qp
Question Asked: How are DMV's and DMF's changing the memory consumptions of SQL Server? consider the dm_exec_* which store the results of the current workload.
I think this has come a number of times from various people I have interacted. As described before, DMV's are in-memory structures and are anyway's used by SQL Server internally. It is with SQL Server 2005 that we started exposing them in an official manner rather than doing bit-manipulations with some DBCC commands. Hence there is nothing to be worried about the load or memory consumptions. It is not as alarming as you think.
Question Asked: does there is support for DMVs in SQL 2000?
DMV's were introduced with SQL Server 2005 onwards. Though these numbers are increasing from version to version these cannot be got with SQL 2000 version. If you are still using SQL Server 2000 version I would strongly recommend you to move to SQL Server 2008 version :).
Question Asked: it seems to be very hard to remember DMV names, is there any way to get list of DMV's and its usage?
Fair enough and I dont think you are the only person finding it difficult :). With SQL Server 2005 I gone to BOL a number of times, but with SQL 2008 the intellisense takes away half the problem. But if you want to learn more on DMV's and start using them then I would recommend you to book mark this page on MSDN: http://msdn.microsoft.com/en-us/library/ms188754.aspx
Due to time constraints we were not able to answer them during the session itself but I am sure these have got clarified now. Keep those questions coming and we will try our best to answer them during the session else dont forget to visit this blog post the event :). Hope this was of help, btw dont forget to login to the VTD site to register your views on Nov VTD Topics.
PS: These are the exact questions that were asked during the session. I have taken the relevant ones and compiled the same here for you. BTW, there are couple more blogs around other sessions that will get posted.
Vinod KumarTechnology Evangelistwww.ExtremeExperts.com
Posted: Wednesday, October 08, 2008 2:18 PM by TechNetIndia 2 Comments
Filed under: ,
VTD - Gets a start !!!
Well, officially from the TechNet team we will have the ITPro tracks starting from tomorrow and there is a dedicated track on Virtualization spanning two days and we have industry speakers from our various organizations talking on different virtualization techniques used by them. We will also have a track on SQL Server and Windows Vista Client (on 19th) that we will talk extensively.
If you have not yet joined our party, feel free to login tomm @ 10AM here.
Our SQL Evangelist blogs on his day 1 experience on the SQL Server topics on the dev track here. Pass you comments and feedbacks ... We will be more than happy to hear you !!!
Posted: Wednesday, September 17, 2008 8:21 PM by TechNetIndia 0 Comments
Filed under:
Virtual TechDays - Countdown begins !!!
First, let me take this opportunity to Welcome all to this blog from the TechNet India Team where we try to share our experiences, information on various events/activities we do in India. This is also a channel where we solicit feedbacks from you folks who use our product day-in-day-out. Thanks again for all the innovation you do using our tools and technologies.
This blog cannot come at a better time than now. We are about to start our "Virtual TechDays" in less than a week, actually Sep 17th, 18th and 19th. We are going to give you a tough time in choosing our sessions, as much as 48 sessions with 4 tracks in parallel this is going to be one mega online event you dont want to miss.
From the TechNet side, we have topics around "Virtualization" which is big and we are having close to 8 sessions around this theme. Many of these sessions are done by Industry speakers who have used these technologies - hence this is more of what our customers have experienced. We also have tracks around SQL Server, Windows Vista that you can attend during these three days. BTW, if you are a developer you have choices of sessions around Client development, Mobile, Web development etc. So lots in store for you.
For detailed information around the tracks and sessions, feel free to visit / register at: http://www.connectwithlife.co.in/vtd/
There are already links from our Evangelists around Virtualization and SQL Server on their blogs.
TechNet India
Ref: http://blogs.technet.com/technetindia/

Thursday, October 16, 2008

Installed Reader and Rebooter on Nokia 9300 Communicator

hey guys,

i am not so feeling well today and had a off from office..

i was getting bored @ home so started playing with my small machine

I think I have not added a blog that I have started using, again, Nokia 9300 Communicator since last 15 days..

actually i had my communicator 1.5 years back, but it accidently fall down from my hand and than i not-so-good experiences with network and display problem...

anyways... i am enjoying my experience with 9300 and started playing with it.
so i started with having essential softwares on my "symbian" machine...

getting it started.. I downloaded free pdf reader from adobe here: http://www.brothersoft.com/adobe-reader-for-symbian-download-59718.html

Well, nokia has missed the some kinda of providing key combination so that it can be restarted with removing back panel and than battery... so thought of another way round... i searched on this and got some Rebooter for communicator.. here it is, if you want to reboot w/o removing battery...
http://www.dotsis.com/mobile_phone/attachment.php?attachmentid=10649&d=1146651749

Njoy....

Tuesday, October 14, 2008

MSDN Magazines & Dr. Dobb's Magazine's October issues are out.






MSDN Magazines & Dr. Dobb's Magazine's October issues are out.

Click on magazines......






Register Now for more of these enlightening stories, news articles, columns, and lots more on these two internationally acclaimed magazines.