Dell DRAC Default Password and How To Change DRAC Password Using RACADM

The default username and password for Dell Remote Access Controllers (DRAC) are “root” and “calvin, ” respectively. As with everything else, for security reasons it is recommended to change either or both. There are always those cases where you either forget the password or don’t know it to begin with.  Like in the case of […]

How to grant the Send As permissions to a user account

To explicitly grant another account permission to send as a mailbox owner, open the Active Directory Users and Computers management console and follow these steps: On the View menu, make sure that the Advanced Features option is selected. If this option is not selected, the Security page will not be visible for User account objects. Open the […]

Windows 7 Command Line Utilities and Commands

The following is a (hopefully) comprehensive list of command line commands and utilities for Windows 7. Click the links for further details and examples of each command. arp The arp command is used to display or change entries in the ARP cache. assoc The assoc command is used to display or change the file type […]

What is FLV

FLV is a “Flash Live Video” file. It is a format that is designed for web playback, offering high rates of compression. Several products output in FLV format, including Sorenson Squeeze (The term “movie” often refers to common Flash source files (.FLA) and deployed files (.SWF) and is not synonymous with “video”).The Flash Player browser […]

Install Backtrack 3 in OSX Paralels

Create a new virtual machine NewSelect an operating system installation mode: Typical > NextOS Type: LinuxOS Version: Other Linux kernel 2.6 > NextSpecify a name for the virtual machine: BackTrack 3 > NextOptimize for better performance of: Virtual machine > NextMore Options > ISO image > Choose > bt3-final.iso > Open > Finish Machine will […]

Forensic Log Parsing with Microsoft’s LogParser

Investigating a web-based intrusion can be a daunting task, especially when you have no information other than knowing it was web-based. It is easy to waste precious time digging through megabytes, perhaps even gigabytes, of log files trying to locate suspicious activity. Often this search turns up little useful evidence. Consider this scenario: an e-commerce […]