Author Archives: Yakup Korkmaz

Minimum privileges / permissions required for virtual machine user related tasks and assigning them to roles in VMware vCenter 4

It can be very frustrating or even confusing when dealing with privileges / permissions and roles in VMware vCenter because of hierarchical inheritance of permissions. After some point, you forget about the security and give the users more permissions than … Continue reading

Posted in Virtualization | Tagged , , , , | Leave a comment

Social Engineering Toolkit – Can not get UPX encoding work (SET Error: “UPX was not detected. Try configuring the set_config again”)

In BackTrack5, when you try to use SET to create a fake website using its Java Applet Attack Method and Backdoored Executable encoding, it is probable that you get an error message as follows: “UPX was not detected. Try configuring … Continue reading

Posted in Penetration Testing | Tagged , , , , , , , | Leave a comment

Microsoft Exchange 2010 – Information Store service does not start (mostly after converting physical server to virtual using vmware converter)

If you are facing problems while starting Information Store service in Microsoft Exchange 2010 server and getting an error message in an alert window with error code of -2147221213, it is most probable that there is a missing key in registry related … Continue reading

Posted in Exchange | Tagged , , , | 4 Comments

How to kill or stop a process from command prompt in Windows 7

In order to kill a process in Windows 7, first you should get its process id. To get it from command prompt, type the following command; netstat -ao Instead of listing all processes, you can filter the process list by … Continue reading

Posted in Windows Security | Tagged , , , , , , | Leave a comment

Freeze or stall while connected to virtual machines with Windows 2008 R2 or Windows 7 through console on VMware vSphere 4 client

On VMware vSphere client, while you are connected to virtual machines with Windows 2008 R2 or Windows 7 operating system using console connection, guest operating system can freeze or stall for a long period of time so that it doesn’t … Continue reading

Posted in Virtualization | Tagged , , , , , , , , , | Leave a comment

ICMP Keşif (“Reconnaissance”) Saldırıları

ICMP Nedir? ICMP (Internet Control Message Protocol) protokolü, IP protokol takımının bir parçasıdır. Hedef ve özellikleri RFC 792’de belirtilmiştir. ICMP protokolünün temelde iki çeşit görevi bulunmaktadır. Bu görevler; Sürekli hata durumlarının bildirilmesi ve Ağ ile ilgili genel özellikleri saptamak üzere, … Continue reading

Posted in Network Security | Tagged , , , , , , , , , , , , , , , | Leave a comment

Robocopy – Copying files with file permissions (ACLs) and Importing file permissions / security information

If you have a file server in your corporate environment and want to move all files to another location with all security information / file permissions  (ACLs), you can use robocopy, a built-in tool which can be called simply from … Continue reading

Posted in Windows Security | Tagged , , , , , , , , , | 3 Comments

Bulut Bilişim Risk Değerlendirmesi (Cloud Computing Risk Assessment)

Bulut Bilişim’in Risk Değerlendirmesi Giriş Sunduğu geniş imkânların ve esnekliğinin yanında, Bulut Bilişim beraberinde belirli riskleri de barındırmaktadır. Bu bölümde, bu riskler üzerinde durulurken unutulmaması gereken bir nokta her riskin bir fırsat ile eşlenmiş olduğu, Bulut Bilişim tarafından sunulan fırsatların … Continue reading

Posted in Bulut Bilişim - Cloud Computing | Tagged , , , , , , | Leave a comment