- for the
- . This firmware and driver package contains drivers for all of the components in the Surface Pro device, as well as updates to the system firmware that have been released via
- . These drivers and firmware are not compatible with Surface
- Use these drivers and firmware to prepare your custom images for enterprise deployment, or to repair problems with custom installations of
- on your Surface Pro device.
Viewed 357 times by 64 viewers
Besides that this site Bink.nu is running on Windows Azure for over 9 months now, I have been testing Windows Azure IaaS since the preview launched last June:
- Install a VM in minutes
- Choose OSes from a Gallery, even Linux
- Upload your own prepped VHD
- Create a load balanced solution
- Connect to your on premise network
- Connect to on premise DNS
- VM mobility
Now with the general availability even more features and options are live:
- New VM Image Templates (including SQL Server, BizTalk Server, and SharePoint images)
- New VM Sizes (including Larger Memory Machines)
- New VM Prices ( reduced prices 21%-33% for IaaS and PaaS VMs)
Viewed 2392 times by 286 viewers
Microsoft has completed the investigation into a public report of this vulnerability. Microsoft has issued MS13-008 to address this issue as described in Security Advisory 2794220. For more information about this issue, including download links for an available security update, please review MS13-008. The vulnerability addressed is the Internet Explorer Use After Free Vulnerability – CVE-2012-4792.
Not affected IE9 and IE10
Viewed 31873 times by 2115 viewers
Categories: Uncategorized Tags:
I am excited to announce that Microsoft will once again be hosting our annual management conference, Microsoft Management Summit 2013, in Las Vegas April 8-12, 2013 at the beautiful Mandalay Bay Resort and Casino.
We are planning a great week of technical training, content and networking that you can only get at MMS. If you want to be the first to know when registration opens, please like us on Facebook or send e-mail email@example.com.
Following on the heels of the releases of Windows Server 2012 and System Center 2012, I am really excited for the chance for everyone to learn more about our latest capabilities and share what’s ahead at our annual gathering. And remember, we had a very early sell-out last year so be on the look-out for registration information and be sure to secure your spot.
Viewed 65799 times by 3890 viewers
Categories: Uncategorized Tags:
Microsoft released Security Update MS12-063to address limited attacks against a small number of computers through a vulnerability in Internet Explorer versions 9 and earlier. The majority of customers have automatic updates enabled and will not need to take any action because protections will be downloaded and installed automatically. For those manually updating, we encourage you to apply this update as quickly as possible.
In addition to addressing the issue described in Security Advisory 2757760, MS12-063 also resolves four privately disclosed vulnerabilities that are currently not being exploited.
Viewed 50589 times by 3341 viewers
26 things I bet you did not know!!!
- Men can read smaller print than women can; women can hear better.
- Coca-Cola was originally green.
- It is impossible to lick your elbow.
- The State with the Highest percentage of people who walk to work: Alaska
- The percentage of Africa that is wilderness: 28%
- The percentage of North America that is wilderness: 38%
- The cost of raising a medium-size dog to the age of eleven: $ 16,400
- The average number Of people airborne over the U. S. In any given hour: 61,000
- Intelligent people Have more zinc and copper in their hair..
- The first novel ever Written on a typewriter, Tom Sawyer.
- The San Francisco Cable cars are the only mobile National Monuments.
- Each king in a deck Of playing cards represents a great king from history: Spades – King David Hearts – Charlemagne Clubs -Alexander, the Great Diamonds – Julius Caesar
- 111,111,111 x 111,111,111 = 12,345,678,987, 654,321
- If a statue in the park of a person on a horse Has both front legs in the air, the person died in battle. If the horse has one front leg in the air, The person died because of wounds received in battle. If the horse has all four legs on the ground, the person died of natural causes
- Only two people Signed the Declaration of Independence on July 4, John Hancock and Charles Thomson. Most of the rest signed on August 2, but the last signature wasn’t added until 5 years later.
- Q. Half of all Americans live within 50 miles of what? A. Their birthplace
- Q. Most boat owners name their boats. What is the most popular boat name requested? A. Obsession
- Q.. If you were to spell out numbers, How far would you have to go until you Would find the letter ‘A’? A. One thousand
- Q. What do bulletproof vests, fire escapes, Windshield wipers and laser printers have in common? A. All were invented By women.
- Q. What is the only Food that doesn’t spoil? A. Honey
- Q. Which day are there more collect calls Than any other day of the year? A. Father’s Day
- In Shakespeare’s time, Mattresses were secured on bed frames by ropes. When you pulled on the ropes, the mattress tightened, Making the bed firmer to sleep on. Hence the Phrase…’Goodnight , sleep tight’
- It was the accepted Practice in Babylon 4,000 years ago that for a month after the wedding, the bride’s father would supply His son-in-law with all the mead he could drink. Mead is a honey beer and because their calendar was lunar based, this period was called the honey month, Which we know today as the honeymoon.
- In English pubs, ale Is ordered by pints and quarts… So in old England , when Customers got unruly, the bartender would yell at them ‘Mind your pints and quarts, and settle down.’ . . . It’s where we get The phrase ‘mind your P’s and Q’s’
- Many years ago in England , pub frequenters had a whistle baked Into the rim, or handle, of their ceramiccups. When they needed a refill, they used the whistle to get some service. ‘Wet your whistle’ is the phrase inspired by this practice.
- At least 75% of people who read this will try to lick their elbow!
Viewed 17148 times by 1865 viewers
On this blog, we’ve discussed the ways that scammers can attack your PC, through malicious software, rogue security alerts, phishing attacks and more. But the bad guys have now devised a new vector: the phone. I first learned about this when I heard my parents had received a call that they had been identified as having rogue software on their PC. The caller, who said he was from Microsoft, needed to remote access their PC to resolve the issue. Turns out scammers like these were simply taking the time to prey on potential victims by calling them and masquerading as a representative from a trusted institution to trick them into giving up valuable and personal information. Sometimes, as in my parents’ case and others, they even advise installing a remote access code so scammers will have full access to the PC.
We’ve discovered this telephone scam is aimed at English-speaking countries, including North America and the United Kingdom. The callers pretend to be from Microsoft and try to sell the victim something, direct them to a specific website, asked for remote access, to install software, a credit card number, or run a bogus security scan that showed an infection. The Trustworthy Computing Team conducted a survey of 7,000 people, and found that more than 1,000 people had received calls. Of those 1,000 people, 22 percent of people fell for the scam (234 people total), and 184 of those lost money – on average, more than $800.
You can check out some tips for avoiding phone scams here, but we want to remind you will never receive a legitimate call from Microsoft or our partners to charge you for computer fixes. If someone does call you claiming to be from Microsoft:
- Never give control of your computer to a third party unless you can confirm that it is a legitimate representative of a computer support team with whom you are already a customer.
- Never provide your credit card or financial information to someone claiming to be from Microsoft tech support if you did not initiate the call to Microsoft first.
- Ask upfront if you are required to purchase software or pay a fee or subscription associated with the “service.” If there is, hang up.
- Take the caller’s information down and immediately report it to your local authorities. If you think you’ve been the victim of a scam, check out these tips that can help you protect your money and identity.
It’s a jungle out there! Please remember to question any unsolicited email or call. If the email came from somebody in your contact list but it feels suspicious, here is a great article on recognizing phishing emails. Lastly, always keep your PC protected with antivirus software like Microsoft Security Essentials, which is free or software from one of our partners.
Viewed 7123 times by 1461 viewers
I use the following for my client I prefer utorrent 2.2.1
For the sites I only use two. Two that I have been on for over 5 years probably more like 8-10.
Anyway 1) BITSOUP
2) Torrentleech is my other.
3) I also have a search site that I like to use to obtain hard to find items
January 2012: BTjunkie has voluntarily shut down its operations. BTjunkie was a solid torrent service for reasons of its massive database, its email updates of new additions, its Twitter updates and useful reporting and comment features. Many users will miss having this website. RIP, BTjunkie!
28. Torrent Cafe
Blues Brothers is a private site with a strong community and file-sharing ethic. As a private site, you can expect the leeching (selfish) users to be reduced. The BB community also strives to police itself by carefully watching each member’s upload ratio… if you abuse your ratio, you are blocked from downloading until you donate. This policy may seem a bit harsh, but members seem to really appreciate it.
25. Torrent Pond
Torrentpond.com has been recommended by several users. As a meta-searcher, Torrentpond will scour other sites for you, atempt to filter out old and fake torrents, and then offer you an easy-to-browse list. It also showcases recent torrents, which is a good feature for regular downloaders. The advertising is plentiful, and you will need to tune it out and go around some popups, but the thorough searches are often worth it.
24. Cinema Torrents
While the name is awkward to type, these folks offer a solid semi-private search site. The memberships might be closed soon, so visit them right away!
Meganova, which has been rebranded as “SeedPeer”, seems to be slow to load these days. Nevertheless, readers have commented that they like this site. New visitors should note the “keyword cloud” wall of text on the home page (this cloud gives you a quick sense of what are popular search phrases lately).
21. The Pirate Bay
Back in April 18, 2009: the Stockholm district court sentenced the four Pirate Bay founders to a year in prison, and over $USD 3.5 million in fines. This is as punishment for violating their country’s copyright laws. (More on this shocking court ruling here). Since then, TPB has come back with a revised format hosted in a different country. TPB is a resilient fixture in the P2P world, and loyal users continue to support this excellent site.
ExtraTorrent is a crammed-looking site, and yes, it has popup advertising that can be annoying. BUT: this cluttered site also offers some really packed information that many users will appreciate: the torrents have movie plot summaries, photos of the actors, user comments on the stories, names of the users who verified the torrent, and visual crosslinks to similar movies. I personally like that ExtraTorrents features some really obscure gems in the left column… a very helpful feature for real movie and TV buffs looking to discover new shows.
This site is simple and clean, with almost no advertising. The results are fast, easy to scan, and plentiful. You have to love a simple and straightforward service that delivers convenient and quick results… like yourbittorent.com delivers for downloaders.
IPtorrents is an exclusive torrent site that accepts only people who are personally invited by existing members. Members who invite leechers (“cheaters”) are banned from the site, which promotes a careful loyalty amongst its members.
17. Torrent Tree
Gary and his team of P2P programmers bring us a new site in Ajax code language. Like any metasearch engine, Torrent Tree pulls its results from many other search engines. But Torrent Tree pulls *more* search results than any other current metasearch site. Definitely give these new players a try.
Formerly known as “Bi-Torrents”, BiteNova is a free Torrent site with a spartan look and fast searching format.
Fenopy has some compelling features. Fenopy is fully integrated with IMDB and Last.fm radio, so it has some friendly methods for browsing and discovering movies and music. A graphics gallery of large and motivating thumbnails adorns the home page, and the fake finder feature is also very useful for avoiding bad files. Definitely give Fenopy a try.
Special thanks to reader, Jonathan R., for this recommendation. The “verified” filtering feature of this site makes it a good choice for downloaders.
13. Linux Tracker
User mcangeli has recommended this linux-focused site. Linuxtracker.org offers more linux and OSS torrents than nearly all of its current competition. If you are a linux and open source software fan, give Linuxtracker.org a try.
ShareReactor is a search engine for both bit torrents and eDonkey 2000 (“ed2k”) file formats. While eDonkey is not nearly as popular today as it was in 2002, some people still use ed2k networking.
TorrentZap is not as large of a catalog as other torrent search engines. And, as with all sites, you need to endure advertising to keep it a no-cost service. But the interface is clean, bright, and easy to navigate. Try this site out, skip past the ‘external search results’ to find the real torrents at TorrentZap, and let us know what you think.
Torrentbit.nl is the same as Torrentbit.net. This site is another plain-looking interface that delivers very good selections and surprisingly useful service. Serious P2P users will like that you can search for torrent hashes and torrent trackers here. There is even an RTS (real time status) feature that lets you check for current seed count with a single click. Definitely try Torrentbit and let us know how you like this site.
PoT is a kind of launchpad search engine that offers choices where you want to search. Multiple users have recommended Plentyoftorrents this summer; let us know what you think of this site.
VCDQ.com is technically not a torrent site… rather, it is a verification site that employs a committee of serious users to confirm torrents. Ideal for movie fans who are seeking new releases, VCDQ.com will indeed tell you if legitimate torrent files have been found and verified for that particular movie. You just need to copy the torrent names and paste them into a torrent search engine like Isohunt.com to locate the seeds. Definitely give VCDQ.com a try; this is a great resource for avoiding fake torrent files and finding true files faster.
Now Torrents (allegedly) offers a special service: it filters out fake/dead torrents in real time. It also offers date-range searching, so you can search for specific years of content (e.g. Flight of the Conchords, 2008). This makes Nowtorrents very useful if you are seeking obscure older torrents, or if you are seeking very new torrents.
Bitsoup is a favorite with some P2P downloaders, but this summer 2010 has not been a warm time at the Bitsoup community. There are allegations of draconian forum moderation and heavy-handed administrators being abusive to members. If you try Bitsoup, let us know how they treat you there.
Linux users: rejoice! Here is a niche site for your niche tastes in software! Get legal Linux/Unix files, applications, virtual machines, and more.
GPirate claims to be the largest torrent search engine today. It does have an amateurish look and feel to its interface, but it does yield large result sets. Give GPirate a try, and let us know if you like the service.
Thunderbytes has gone to a membership-only private format. There are many pros and cons to private sites; oftentimes, they are the best way to get help and recommendations from others. You need an invitation to join TB, or you can become a sponsor with a small donation. Give these folks a try, as they come highly recommended as a P2P site.
btscene is a longtime player in the file sharing game. This website does have annoying popups and adult advertising, but it does offer a solid library of torrents. It does a good job of featuring very recent torrents (good for people who follow television shows), and presenting many browsing choices at a glance.
Viewed 11170 times by 1942 viewers
Still based on th erlease candidate, but a great resource to start testing/playing with Windows Server 2012 in different scenarios.
It’s simple. No complex setup or installation is required to try Windows Server 2012 running in a full-featured virtual lab. You get a downloadable manual and a 90-minute block of time for each module. Before you start, read the minimum system requirements. Next, select a virtual lab from the list below. Then, you will see an application called “holSystems LaunchPad Online” which will launch the lab.
- Active Directory Deployment and Management Enhancements In this lab, you will learn how to deploy Active Directory Domain Controllers with Windows Server 2012. You will deploy domain controllers using the new Server Manager, as well as deploying remote domain controllers using Windows PowerShell. You will be able to explore the new Active Directory Management tool and use its PowerShell History Viewer.
- Configuring a Highly Available iSCSI Target In this lab, you will learn how Windows Server 2012 can provide storage remotely to any machine. You will build clusters using shared storage and build iSCSI high-availability instances–observing highly available application communication during cluster failover.
- Configuring Hyper-V over Highly Available SMB Storage In this lab, you will learn how to configure a file server cluster to support running Hyper-V virtual machines from SMB file shares. You will create the file share, configure delegation, and then create a new VM on SMB storage.
- Getting Started with Windows Server 2012 Hyper-V Replication Asynchronous, application-consistent virtual machine replication is now built in to Windows Server 2012. It permits replication of Hyper‑V virtual machines between two locations for business continuity and failure recovery. In this lab, you will learn how to configure and manage this technology.
- Implementing Storage Pools and Storage Spaces In this lab, you will work with the new storage spaces technology in Windows Server 2012. You will first create new storage pools and virtual disks, and then you will work with those virtual disks in both Server Manager and Control Panel.
- Introduction to DirectAccess in Windows Server 2012DirectAccess gives users the experience of being seamlessly connected to their corporate network anytime they have Internet access. In this lab, you will learn how to configure this now easy-to-install technology and provide greater mobility and ease of access for your users.
- Introduction to IIS 8 IIS 8 in Windows Server 2012 provides many new features to support greater scaling, density, and performance for your web applications. In this lab, you will learn how to configure many of these exciting new technologies, including centralized certificate support, dynamic IP domain restrictions, and throttling.
- Introduction to iSCSI Diskless Boot Deployment Windows Server 2012 can efficiently provide highly available iSCSI block storage for diskless network boot. In this lab, you will learn how to configure both the iSCSI target and diskless boot servers, enabling rapid deployment and network boot capability for commodity hardware.
- Introduction to Windows PowerShell Fundamentals Windows PowerShell is a command-line shell and scripting language that helps you achieve greater control and productivity. Using a new admin-focused scripting language, more than 230 standard command-line tools, and consistent syntax and utilities, Windows PowerShell enables you to more easily control system administration and accelerate automation.
- What’s New in Windows PowerShell 3.0 In this lab, you will explore some of the new features and functionality in Windows PowerShell 3.0 to enable you to more easily control system administration and accelerate automation.
- Managing Branch Offices In this lab, you will learn how the branch office scenario has been improved in Windows Server 2012 including new branch cache enhancements.
- Managing Network Infrastructure In this lab, you will explore new network management capabilities in Windows Server 2012. You will learn how to implement Network Teaming as well as how to implement DHCP failover. Finally, explore new Windows PowerShell cmdlets for network management.
- Managing Windows Server 2012 with Server Manager and Windows PowerShell 3.0 In this lab, you will learn how the Server Manager and Windows PowerShell framework in Windows Server 2012 delivers an enhanced, multi-server management experience. You will learn to perform tasks such as multi-server management. You will also explore new Windows PowerShell capabilities including new cmdlets and the Windows PowerShell gateway.
- Managing Your Network Infrastructure with IP Address Management Network management is core to running a business, yet the tools that IT professionals need can be too costly or not available from Microsoft. With Windows Server 2012, we change that with the introduction of IP Address Management (IPAM).
- Online Backup Service In this lab, you will use Windows Server Backup to back up your critical data to Windows Azure. This lab will teach you the entire set of workflows around backing up and recovering your data to Windows Azure.
- Using Dynamic Access Control to Automatically and Centrally Secure Data In this lab, you will explore Dynamic Access Control in Windows Server 2012. You will learn how to create Central Access Policies, explore the new Access Denied Remediation features, as well as learn how to use the audit capabilities built into Dynamic Access Control.
Viewed 8944 times by 1470 viewers