Troubleshooting Windows Update Issues with Vista

Monday, April 21st, 2008

If you are having problems getting certain updates installed on Vista, there are two places you can look to troubleshoot: %windir%\windowsupdate.log, a log file for Windows Update events %windir%\Logs\CBS\CBS.log, a log file that tracks events to the servicing stack These log files include the following fields: Time/Date Stamp, Message Severity, Message Source, Operation ...

Find all encrypted files

Monday, April 21st, 2008

You can use the EFSINFO tool to find all encrypted files on a volume. This tool is found in the Windows Server 2003 Support Tools on your product CD. To use this tool to find encrypted files, run the following from a command prompt: efsinfo /s:c: | find ": Encrypted" Why would ...

Disabling UAC for Only Administrators

Monday, April 21st, 2008

You can disable the—sometimes annoying—User Account Control (UAC) prompts for members of the Administrators group, while leaving them active for limited user accounts. This is great if you don’t want others accessing or changing system settings. Disabling the alerts, however, requires editing the Windows Registry: Hive: HKEY_LOCAL_MACHINE Key: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Name: ConsentPromptBehaviorAdmin Type: REG_DWORD Value: 0 ...

Deciphering the PHP-Nuke Captcha

Monday, April 21st, 2008

The Captcha used in the current version 8.1 of PHP Nuke can be deciphered with 100% accuracy. more information can be found here: http://www.rooksecurity.com/blog/?p=6 Exploit Code: http://www.rooksecurity.com/exploits/php_nuke_captcha.zip What is so interesting about this captcha is that it is incredibly wide spread. Variants of this captcha are being used by big names like Paypal. ...

The Snare Of Unauthorized Requests

Monday, April 21st, 2008

Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...