NirSoft – freeware utilities: password recovery, system utilities, desktop utilities #free #e #books

No Comments

#data recovery software free download

#

NirSoft web site provides a unique collection of small and useful freeware utilities. all of them developed by Nir Sofer.
If you are looking for Windows password-recovery tools. click here.
If you are looking for network tools. click here.
To view your IP address and other information, click here.
To view all major IP address blocks assigned to your country, click here.
To read the Blog of NirSoft, click here.
To download a package of all NirSoft utilities (Updated every week), go to this Web page.

Search in NirSoft Web site:

Here’s some examples of what you can find in NirSoft Web site:

  • Password Recovery Utilities
    • WebBrowserPassView – View the passwords stored by your Web browser (Supports Internet Explorer, Firefox, Chrome, Safari, and Opera)
    • Mail PassView – Recover the passwords of popular email clients. Outlook Express, MS Outlook, Eudora, Mozilla Thunderbird. and more.
    • MessenPass – Recover the passwords of instant messenger programs. Yahoo Messenger, MSN Messenger, Trillian, and more.
    • Dialupass: Dialup Password Recovery – Recovers the passwords of dialup entries (VPN and Internet connections). Works also under Windows 2000/XP.
    • Network Password Recovery – Freeware utility that recovers the network passwords stored by Windows XP (Credentials file).
    • BulletsPassView – Reveal the passwords hidden behind asterisk (‘****’) or bullets characters in standard password text-boxes.
    • SniffPass – Password Sniffer – Listen to your network, and capture POP3, IMAP4, SMTP, FTP, and HTTP (basic authentication) passwords
    • PstPassword – Recover the password of Outlook PST file.
  • Network Monitoring Tools
    • WirelessNetView – View the details of all wireless network in your area (SSID, Signal Quality, MAC Address, and more. )
    • Wireless Network Watcher – Show who is connected to your wireless network.
    • BluetoothView – Monitor the Bluetooth activity around you.
    • SmartSniff: TCP/IP Sniffer – Capture TCP/IP packets on your network adapter and view the captured data as sequence of conversations between clients and servers.
    • CurrPorts: TCP/IP Connections Viewer – Freeware tool that displays the list of all currently opened TCP and UDP ports on your local computer.
    • AdapterWatch – displays useful information about your network adapters: IP addresses, Hardware address, WINS servers, DNS servers, MTU value, Number of bytes received or sent, The current transfer speed, and more.
    • DownTester – Test the download speed of your Internet connection.
  • Internet Related Utilities
    • IPNetInfo – Find all available information about an IP address: The owner of the IP address, the country/state name, IP addresses range, contact information (address, phone, fax, and email), and more.
    • MyLastSearch – View your latest searches with Google, Yahoo, and MSN.
    • VideoCacheView – Copy video files (.flv and others) from the Web browser cache and temporary folder.
    • WebVideoCap – Capture Flash video (.flv) and RTSP/MMS streams from Video Web sites.
    • SiteShoter – Take a screenshot of a Web site.
    • DNSDataView – View the DNS records of specified domains.
    • IECookiesView: Cookies Viewer/Manager for IE – View/Delete/Modify the cookies that Internet Explorer stores on your computer. Read More >>
    • IEHistoryView – View/Delete the URLs that you visited in the last few days.
    • HTMLAsText (HTML To Text Converter) – Freeware utility that converts HTML files to text files.
    • WhoisThisDomain – Get information about a registered domain.
    • DNSDataView – DNS lookup tool.
  • MS-Outlook Tools
    • NK2Edit – Edit, delete, add, merge. and repair records in the AutoComplete files (.NK2) of Outlook.
    • OutlookAttachView – View and extract attachments in your Outlook mailbox.
    • OutlookStatView – Get statistics about your Outlook mailbox.
    • OutlookAddressBookView – View / export the address book of MS-Outlook.
  • Command-Line Utilities
    • NirCmd: Freeware Command-Line Tool – Do some useful tasks from command-line: turn off your monitor, turn off the computer, open/close the door of your cd-rom drive, dial to VPN/Internet connection, change your display settings, and much more.
  • Desktop Utilities
    • SearchMyFiles – Alternative to ‘Search For Files And Folders’ module of Windows and also duplicate files search.
    • MyUninstaller – Alternative to the standard Add/Remove applet of Windows operating system.
    • Volumouse – Control the sound volume with your wheel mouse.
    • FileTypesMan – Alternative to ‘File Types’ manager of Windows.
  • Freeware System Tools
    • ProduKey – Recover Office/Windows CD-Key
    • ShellExView – Displays the details of shell extensions installed on your computer, and allows you to easily disable and enable each shell extension.
    • WhatInStartup – Add, delete, modify or disable programs that run at Windows startup.
    • USBDeview – View all installed/connected USB devices on your system.
    • DevManView – Alternative to device manager of Windows.
    • DriverView – List all device drivers currently loaded on your Windows.
    • RegScanner (Registry Scanner) – Scan and find values in the Registry.
    • OpenedFilesView – View opened/locked files in your system.
    • SysExporter – Grab the data stored in standard list-views, list boxes, and combo boxes from almost any application running on your system, and export it to text, HTML or XML file.
    • BlueScreenView – View crash information stored in the MiniDump files created on blue screen of Windows.


Categories: News Tags: Tags: , , , , , , ,

Hashcat – advanced password recovery #free #maps

No Comments

#recovery software free download

#

hashcat
advanced password recovery

Signing key on PGP keyservers: RSA, 2048-bit. Key ID: 2048R/8A16544F. Fingerprint: A708 3322 9D04 0B41 99CC 0052 3C17 DA8B 8A16 544F

Check out our GitHub Repository for the latest development version

GPU Driver requirements:

  • AMD users require AMD drivers 14.9 or later (recommended 15.12 exact)
  • Intel users require Intel OpenCL Runtime 14.2 or later (recommended 16.1 or later)
  • NVidia users require NVidia drivers 346.59 or later (recommended 367.27 or later)

Features

  • World’s fastest password cracker
  • World’s first and only in-kernel rule engine
  • Free
  • Open-Source (MIT License)
  • Multi-OS (Linux, Windows and OSX)
  • Multi-Platform (CPU, GPU, DSP, FPGA, etc. everything that comes with an OpenCL runtime)
  • Multi-Hash (Cracking multiple hashes at the same time)
  • Multi-Devices (Utilizing multiple devices in same system)
  • Multi-Device-Types (Utilizing mixed device types in same system)
  • Supports distributed cracking networks (using overlay)
  • Supports interactive pause / resume
  • Supports sessions
  • Supports restore
  • Supports reading password candidates from file and stdin
  • Supports hex-salt and hex-charset
  • Supports automatic performance tuning
  • Supports automatic keyspace ordering markov-chains
  • Built-in benchmarking system
  • Integrated thermal watchdog
  • 160+ Hash-types implemented with performance in mind
  • . and much more

Screenshot

Algorithms

  • MD4
  • MD5
  • Half MD5 (left, mid, right)
  • SHA1
  • SHA-256
  • SHA-384
  • SHA-512
  • SHA-3 (Keccak)
  • SipHash
  • RipeMD160
  • Whirlpool
  • GOST R 34.11-94
  • GOST R 34.11-2012 (Streebog) 256-bit
  • GOST R 34.11-2012 (Streebog) 512-bit
  • Double MD5
  • Double SHA1
  • md5($pass.$salt)
  • md5($salt.$pass)
  • md5(unicode($pass).$salt)
  • md5($salt.unicode($pass))
  • md5(sha1($pass))
  • md5($salt.md5($pass))
  • md5($salt.$pass.$salt)
  • md5(strtoupper(md5($pass)))
  • sha1($pass.$salt)
  • sha1($salt.$pass)
  • sha1(unicode($pass).$salt)
  • sha1($salt.unicode($pass))
  • sha1(md5($pass))
  • sha1($salt.$pass.$salt)
  • sha256($pass.$salt)
  • sha256($salt.$pass)
  • sha256(unicode($pass).$salt)
  • sha256($salt.unicode($pass))
  • sha512($pass.$salt)
  • sha512($salt.$pass)
  • sha512(unicode($pass).$salt)
  • sha512($salt.unicode($pass))
  • HMAC-MD5 (key = $pass)
  • HMAC-MD5 (key = $salt)
  • HMAC-SHA1 (key = $pass)
  • HMAC-SHA1 (key = $salt)
  • HMAC-SHA256 (key = $pass)
  • HMAC-SHA256 (key = $salt)
  • HMAC-SHA512 (key = $pass)
  • HMAC-SHA512 (key = $salt)
  • PBKDF2-HMAC-MD5
  • PBKDF2-HMAC-SHA1
  • PBKDF2-HMAC-SHA256
  • PBKDF2-HMAC-SHA512
  • MyBB
  • phpBB3
  • SMF
  • vBulletin
  • IPB
  • Woltlab Burning Board
  • osCommerce
  • xt:Commerce
  • PrestaShop
  • Mediawiki B type
  • WordPress
  • Drupal
  • Joomla
  • PHPS
  • Django (SHA-1)
  • Django (PBKDF2-SHA256)
  • EPiServer
  • ColdFusion 10+
  • Apache MD5-APR
  • MySQL
  • PostgreSQL
  • MSSQL
  • Oracle H: Type (Oracle 7+)
  • Oracle S: Type (Oracle 11+)
  • Oracle T: Type (Oracle 12+)
  • Sybase
  • hMailServer
  • DNSSEC (NSEC3)
  • IKE-PSK
  • IPMI2 RAKP
  • iSCSI CHAP
  • Cram MD5
  • MySQL Challenge-Response Authentication (SHA1)
  • PostgreSQL Challenge-Response Authentication (MD5)
  • SIP Digest Authentication (MD5)
  • WPA
  • WPA2
  • NetNTLMv1
  • NetNTLMv1 + ESS
  • NetNTLMv2
  • Kerberos 5 AS-REQ Pre-Auth etype 23
  • Kerberos 5 TGS-REP etype 23
  • Netscape LDAP SHA/SSHA
  • LM
  • NTLM
  • Domain Cached Credentials (DCC), MS Cache
  • Domain Cached Credentials 2 (DCC2), MS Cache 2
  • MS-AzureSync PBKDF2-HMAC-SHA256
  • descrypt
  • bsdicrypt
  • md5crypt
  • sha256crypt
  • sha512crypt
  • bcrypt
  • scrypt
  • OSX v10.4
  • OSX v10.5
  • OSX v10.6
  • OSX v10.7
  • OSX v10.8
  • OSX v10.9
  • OSX v10.10
  • AIX
  • AIX
  • AIX
  • AIX
  • Cisco-ASA
  • Cisco-PIX
  • Cisco-IOS
  • Cisco $8$
  • Cisco $9$
  • Juniper IVE
  • Juniper Netscreen/SSG (ScreenOS)
  • Android PIN
  • Windows 8+ phone PIN/Password
  • GRUB 2
  • CRC32
  • RACF
  • Radmin2
  • Redmine
  • OpenCart
  • Citrix Netscaler
  • SAP CODVN B (BCODE)
  • SAP CODVN F/G (PASSCODE)
  • SAP CODVN H (PWDSALTEDHASH) iSSHA-1
  • PeopleSoft
  • PeopleSoft PS_TOKEN
  • Skype
  • WinZip
  • 7-Zip
  • RAR3-hp
  • RAR5
  • AxCrypt
  • AxCrypt in memory SHA1
  • PDF 1.1 1.3 (Acrobat 2 4)
  • PDF 1.4 1.6 (Acrobat 5 8)
  • PDF 1.7 Level 3 (Acrobat 9)
  • PDF 1.7 Level 8 (Acrobat 10 11)
  • MS Office = 2003 MD5
  • MS Office = 2003 SHA1
  • MS Office 2007
  • MS Office 2010
  • MS Office 2013
  • Lotus Notes/Domino 5
  • Lotus Notes/Domino 6
  • Lotus Notes/Domino 8
  • Bitcoin/Litecoin wallet.dat
  • Blockchain, My Wallet
  • 1Password, agilekeychain
  • 1Password, cloudkeychain
  • Lastpass
  • Password Safe v2
  • Password Safe v3
  • Keepass 1 (AES/Twofish) and Keepass 2 (AES)
  • eCryptfs
  • Android FDE = 4.3
  • Android FDE (Samsung DEK)
  • TrueCrypt
  • VeraCrypt

Attack-Modes

  • Straight *
  • Combination
  • Brute-force
  • Hybrid dict + mask
  • Hybrid mask + dict

Supported OpenCL runtimes


Categories: News Tags: Tags: , , , ,

The Best Way to Send and Receive End-to-End Encrypted Emails #deep #web #search #engine, #hacker

No Comments

#

How many of you know the fact that your daily e-mails are passaged through a deep espionage filter?

This was unknown until the whistleblower Edward Snowden broke all the surveillance secrets, which made privacy and security important for all Internet users than ever before.

I often get asked “How to send encrypted email?”, “How can I protect my emails from prying eyes?” and “Which is the best encrypted email service?”.

Although, there are a number of encryption tools that offers encrypted email service to ensure that no one can see what you are sending to someone else.

One such tool to send encrypted emails is PGP (Pretty Good Privacy ), an encryption tool designed to protect users emails from snooping.

However, setting up a PGP Environment for non-tech users is quite a difficult task, so more than 97% of the Internet users, including government officials, are still communicating via unencrypted email services i.e. Gmail, Yahoo. and other.

But here is good news for all those non-techies, but privacy-conscious Internet users, who wish to use encrypted e-mail communication without any hassle.

Solution ProtonMail .

ProtonMail. developed by CERN and MIT scientists, is a free, open source and end-to-end encrypted email service that offers the simplest and best way to maintain secure communications to keep user’s personal data secure.

ProtonMail Now Available for iOS and Android Users

ProtonMail has been invite-only since 2014, but now the email service has made itself available to everyone and launched new mobile apps.

If you opt for a free account, you’ll get all of the basic features including:

  • A smart-looking app to access your end-to-end encrypted emails easily
  • 500MB of storage capacity
  • Sending 150 Messages per day
  • Two-factor authentication to access your encrypted email inbox

To increase storage capacity, you can purchase ProtonMail’s paid accounts.

NOTE Always remember your password to decrypt the email inbox. Once forgot, you would no longer retrieve your encrypted emails.

Key Features:

Even if someone intercepts your communication, he/she can not read your conversations because all emails you send or receive with other ProtonMail users are automatically encrypted end-to-end by the service.

In addition, for communicating with non-ProtonMail email addresses i.e. Gmail users, all you need to do is:

  • Create a message
  • Just click the encryption button
  • Set a random password

Once done, your encrypted email recipient will get a link to the message with a prompt to enter his/her same password in order to read it.

Another friendly feature that ProtonMail offers is Self-destructing emails. All you need to do is set an expiration date for an encrypted email you send, and it will get self-deleted from the recipient s inbox once the date arrives.

Why ProtonMail won’t have to comply with American Laws?

In a previous article, I explained that ProtonMail is based in Switzerland, so it won’t have to comply with American courts demands to provide users data.

In worst case, if a Swiss court ordered ProtonMail to provide data, they will get only the heaps of encrypted data as the company doesn t store the encryption keys.

ProtonMail has gained an enormous amount of popularity during its developing stages.

ProtonMail encrypts the data on the browser before it communicates with the server, therefore only encrypted data is stored in the email service servers, making it significantly more secure for those looking for an extra layer of privacy.


How to Encrypt Files on Windows – Tutorial – Tom’s Guide #encrypt #password

No Comments

#

How to Encrypt Files on Windows

If you’re looking for a simple way to keep files and folders private on your Windows computer, you have several options right in front of you. Thanks to the Microsoft Office Suite, you can use a built-in encryption feature to password-protect Office files, such as Word documents or PowerPoint presentations.

Illustration: Tom’s Guide

Some Windows operating systems also come with Encrypting File System (EFS), which lets you encrypt any kind of file, as well as whole folders and subfolders. Note, however, that EFS is only available for Windows 10 Pro, Windows 7 Professional, Windows 7 Ultimate, Windows 7 Enterprise, Windows 8 Pro or Windows 8 Enterprise. Users with a Home edition of Windows will need to use either Office Suite encryption or a third-party solution, such as TrueCrypt or 7-Zip.

To set up your Windows encryption, you’ll want to follow these step-by-step instructions.

How to Encrypt Files Using Microsoft Office

This process encrypts individual files compatible with Microsoft Office applications such as Word, PowerPoint or Excel. Once you encrypt a file this way, you’ll need to reopen it in Microsoft Office; you won’t be able to open it in Google Docs. Adobe Reader or LibreOffice. These steps work for all up-to-date versions of Office, across Windows 7 and Windows 10.

1. Open a Microsoft Office program and click Open Other Documents.

3. Select a file you want to encrypt and click Open.

4. Click the File tab at the top of the page.

5. Click “Protect Document” on the left side.

3. Select Encrypt with Password from the pop-up menu.

4. Enter a password for the file. You’ll be prompted to re-enter the same password. then click OK. After you exit this file, you’ll have to enter the same password to reopen it. Be sure to store this password in a separate, safe place.

How to Delete Temporary Files

You’re not quite done yet, though. One of the flaws with Microsoft Office’s encryption is that unencrypted versions of recently opened files might still be stored in your computer’s temporary memory. You’ll want to go clear that out after you’ve encrypted a file.

1. Click the Start button.

2. Type “Disk Cleanup” into the text field and select Disk Cleanup.

3. Wait for the loading bar to complete. it’s calculating how many files it will be able to delete.

4. After the window “Disk Cleanup for OS (C:) appears, check the box next to “Temporary files” (you may need to scroll down) and click OK.

5. A new pop-up window will appear asking you to confirm the deletion. Click Delete Files.

6. You’ll see a new pop-up window (pictured below) with a loading bar running as your files are deleted. Once it’s finished, the window will disappear and the temporary files are gone.

How to Encrypt Files on Windows using Encrypting File System (EFS)

EFS works by letting you apply encryption to already-existing files or folders in your file system. You can still edit or modify these files or folders following the encryption process. With EFS you won’t notice any change in the way you access your files; all you have to do is log in to your Windows account at startup and the files will be accessible. However, this means that you need to pick a strong, difficult-to-guess password for your Windows user account. Note: Step 7 is time-sensitive, so make sure to click the “Back up your file encryption key” prompt after confirming attribute changes in step 6. Missing that prompt means you’ll need to start over again.

1. Right-click on the file or folder you wish to encrypt.

2. Click Properties selection at the bottom of the menu.

3. Click Advanced under the General tab. This will bring up a second pop-up window entitled Advanced Attributes.

4. Check “Encrypt contents to secure data.”

6. Choose how extensive you want the encryption to be, click OK. You can choose to encrypt just that folder, or to encrypt all of the folder’s subfolders and files. We recommend the latter. Whichever you choose, click that option and then press OK.

7. Make sure to click the “Back up your file encryption key” pop-up message before it disappears. If you miss the pop-up message, you’ll need to restart your machine and try again.

The computer creates an encryption key using an encryption certificate provided by Microsoft. Now your file or folder is encrypted, you won’t need a password to access it other than the password you use to sign into your Windows profile when you turn the computer on.

How to Back Up Your Encryption Key

You should back up that encryption key to a separate device, because if that key is ever lost or damaged, you won’t be able to access your encrypted files. The easiest method is with an external USB drive, so plug one into your PC before starting.

1. Cl ick the option “Back up now (recommended).”

4. Check the box next to Password, enter your password twice and click Next.

6. Navigate to a directory, such as a USB drive, name your encryption key and click save.

9. Click OK, now eject your USB drive (or wherever you stored the file) and keep it somewhere safe where you’ll remember it.

How good are Windows’ encryption services?

Windows’ built-in encryption isn’t a perfect solution. If you encrypt a single file, the computer stores an unencrypted version of that file in its temporary memory, so a savvy snoop can still access it.

It’s fairly easy for an attacker to break Windows encryption using a brute-force attack, which is when an attacker uses a program that methodically guesses every possible combination of letters and numbers, starting with common passwords.

If you’re very serious about security and privacy, you might not trust a Microsoft solution. The FBI and NSA can require U.S. companies to hand over data or encryption keys. For those reasons, we suggest using a free third-party service, such as TrueCrypt or WinZip.

See Also. Best Encrypted Messaging Apps


Categories: News Tags: Tags: ,

Reset the Password to Uninstall Symantec Endpoint Protection • #uninstall #symantec #endpoint #protection #password

No Comments

Home » Software » Reset the Password to Uninstall Symantec Endpoint Protection

Reset the Password to Uninstall Symantec Endpoint Protection

An old friend contacted me today and asked me to help him to remove a virus infection on his desktop. I checked his computer and there is an enterprise version of antivirus called Symantec Endpoint Protection (SEP) installed but there were no Symantec Endpoint Protection Manager which acts as a server to manage the SEP clients on the network. It is possible that the Symantec Endpoint Protection is installed as an unmanaged client but the virus definition hasn t been updated for a very long time and I couldn t manually update the signature from the LiveUpdate program. I may as well uninstall the Symantec Endpoint Protection since it couldn t update the virus definition to detect the latest virus and replace it with a free antivirus such as Avira, Avast, AVG or Microsoft Security Essentials.

I went to Control Panel and ran the Programs and Features shortcut icon. Found Symantec Endpoint Protection and I clicked on the Remove button. The progress bar ran for a while and a dialog box pop out saying Please enter the uninstall password .

I asked my friend and he don t know the password. The Norton Removal Tool only works on home products but not for enterprise products. It is not possible for me to install any other type of antivirus if i do not remove the Symantec Endpoint Protection client first. Even if I could, it is still not advisable to be running two different antivirus at the same time which can cause conflict and slow down of the system. After research, I found out how to remove the password so that I can uninstall Symantec Endpoint Protection. The first step that you should do is try a few possible password. Some of the most common password being used for Symantec Endpoint Protection are:

If none of the password above worked for you, continue reading and we ll show you step by step on how to clear the password by simply deleting a registry key. The registry key is protected from modification by Symantec Endpoint Protection. In order to delete the registry key, you will need to stop the Symantec Endpoint Protection service first.

1. Click the Start button, type cmd in the Search programs and files bar, hold Ctrl+Shift and press Enter. Click the Yes button on the User Account Control window.

2. Type start smc -stop in the command prompt and press Enter.

3. Download this registry file and run it (SmcInstData.reg) on your computer to remove the password. You can now proceed to uninstall Symantec Endpoint Protection. Alternatively, you can also manually delete the registry key by following the instructions below if you do not want to use the registry file that we ve created for your convenience.

3a. Again click the Start button, this time type regedit and press Enter.

3b. Navigate to the following path:

HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\Symantec Endpoint Protection\SMC

3c. Look for SmcInstData at the right pane, right click on it and select Delete. Click Yes to confirm the registry key deletion.

You can now uninstall Symantec Endpoint Protection without being prompted to enter a password. If for some reason you re unable to successfully stop the Symantec Endpoint Protection service from step 2, please follow the instructions below for an alternative method in stopping the service.

1. Download this registry file (SepMasterService.reg) to your computer.

2. Boot the computer into Safe Mode .

3. Run the SepMasterService.reg file that you ve downloaded from step 1 by double clicking on it.

4. Restart your computer and uninstall Symantec Endpoint Protection from Control Panel. You will not be prompted to enter a password.

Basically the SepMasterService.reg file changes the startup type of the SepMasterService service from Automatic to Manual. If you are familiar with modifying the Windows registry, you can manually do it yourself by changing the Start registry key value data from 2 to 3 at the path below:

Once you ve successfully removed Symantec Endpoint Protection, here are some of our recommendations to the best antivirus to keep your computer safe from malware.


Categories: News Tags: Tags: , , , ,

Can – t remove System Center 2012 Endpoint Protection client (it just keeps reinstalling) #uninstall

No Comments

Can t remove System Center 2012 Endpoint Protection client (it just keeps reinstalling)

Even after removing all traces of System Center 2012 from our AD network, when I uninstalled the client software from each user system, within a few hours (or post a reboot) the software would mysterious regenerate and come back. Simply uninstalling the client is not enough. Here s what you need to do.

Working on the assumption you are using Windows 7, go in to control panel and select Programs and Features. Uninstall:

System Center 2012 Endpoint Protection Client.
Windows Firewall Configuration Provider

Having done this, load up the command line (cmd ) with administrative priviledges (search for and right click to get this option). Then type in the following commands at the prompt:

cd c:\windows\ccmsetup
ccmsetup /uninstall

The cursor will just return without any confirmation of completion. I found it took up to 10 minutes for the uninstall to release a lock on the setup files (and presumably possibly this long to actually carry out the uninstall). So after 10 mins, close the command line window, and do a search for %windir%. In that very folder, you should find two folders CCM and ccmsetup. Highlight and delete them. You should be prompted for admin authorisation, and then (if the uninstall is truly complete) you should see them delete. Otherwise, try to repeat deletion after a few more mins. If you see a folder called ccmcache the uninstallation is definitely still running.

After this, reboot your PC, and you should finally be free of the System Center 2012 Endpoint Protection client (assuming you haven t set it up to reinstall by Group Policy or an Active System Center server).

11 thoughts on Can t remove System Center 2012 Endpoint Protection client (it just keeps reinstalling)

Are you crazy? You recommend to UNINSTALL SCCM CLIENT from user s workstations. EXCELENT..

Please don t run:
ccmsetup /uninstall

No I am not crazy. There are legitimate reasons for why you might need to remove this software (as is the case with any application). In this instance, I was trialling the System Center Endpoint Protection system, and decided it wasn t the best fit for us. It took a massive amount of effort to stop it regenerating and installing on client workstations despite conventional removal attempts, and even after removal of traces of it within AD. FYI I rolled out Avast in its place the moment I was truly successful in its removal (which was also in the middle of the night).

Having dealt with such a challenge, I did the decent thing and shared it on my blog. I can scarcely remember the project now. Please don t come to conclusions without considering the facts!

The reason it kept re-installing is because a SCEP enabled custom client settings is being deployed to a collection that has that system in it and you simply need to stop deploying that client setting to that collection.

Thanks, Ron. I can t verify that being the case (haven t run even a trial of SCCM in 4 years), but have approved your comment anyway in case it helps out someone else. Cheers for sharing!

Thinking about it, it s a super vague memory, but I think I did attempt what you ve outlined. I wonder whether there was something corrupted in our specific given setup that required a more extreme resolution. I remember trying to use every method I could possibly find and people suggested on Experts-Exchange.com at the time, and nothing worked. After 2 weeks, I had to find a way Hopefully what you ve suggested will work for others though. Cheers!

Thanks, mutterances. We also ended up changing anti-virus options in midstream like you and had issues with it reinstalling.

No worries glad to help. And thanks for the positive feedback it seems there is a lot of hate / trollers for me on this post! It s such a vague memory now dealing with this issue, and I just recall the SCCM client, only installed on a trial basis, being extremely problematic removing from our setup. Glad to have helped 🙂

Just because you re looking to remove the software doesn t mean you re looking to remove it permanently, I m a case example of temporarily wanting to remove it to debug something.

I m grateful this information is shared. Thank you

Thanks, Adam. No worries, glad to help! Cheers 🙂

To be clear to anyone reading this post, I did state:

Even after removing all traces of System Center 2012 from our AD network

at the beginning of my article. I thought this made it clear enough that I was completely binning all elements of System Centre in its utter completeness from our network, not just one part of it. I would not advocate you remove the SCCM client if you are using any other element of System Centre on your network that you want to retain.

I ve had some fairly curt / unpleasent comments regarding this post (most of which I haven t posted) so felt it best to reassert the above, and remind everyone that our context was a trial of System Centre for one specific purpose, that didn t work for us. After using every method I could possibly find to remove whatever had been implemented that we no longer needed, this was the only thing that worked. It was 4 years ago, and if there was a better way to have handled it (quite probably was), I could not find that information anywhere at the time, back in 2012. I barely remember the project now! Cheers all, hope that straightens the record for some of the haters, and some of the nice people too who think I could have done better 🙂

Leave a Reply Cancel reply

Post navigation


Categories: News Tags: Tags: , , , ,

KeePass Password Safe #free #games #for #girls

No Comments

#free download manager

#

What is KeePass?
Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account, your website’s FTP password, online passwords (like website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for each account. Because if you use only one password everywhere and someone gets this password you have a problem. A serious problem. The thief would have access to your e-mail account, website, etc. Unimaginable.

KeePass is a free open source password manager, which helps you to manage your passwords in a secure way. You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using the best and most secure encryption algorithms currently known (AES and Twofish). For more information, see the features page.

Is it really free?
Yes, KeePass is really free, and more than that: it is open source (OSI certified). You can have a look at its full source and check whether the encryption algorithms are implemented correctly.

As a cryptography and computer security expert, I have never understood the current fuss about the open source software movement. In the cryptography world, we consider open source necessary for good security; we have for decades. Public security is always more secure than proprietary security. It’s true for cryptographic algorithms, security protocols, and security source code. For us, open source isn’t just a business model; it’s smart engineering practice.

Bruce Schneier, Crypto-Gram 1999-09-15



Categories: News Tags: Tags: , ,

Hashcat – advanced password recovery #free #tarot #readings

No Comments

#recovery software free download

#

hashcat
advanced password recovery

Signing key on PGP keyservers: RSA, 2048-bit. Key ID: 2048R/8A16544F. Fingerprint: A708 3322 9D04 0B41 99CC 0052 3C17 DA8B 8A16 544F

Check out our GitHub Repository for the latest development version

GPU Driver requirements:

  • AMD users require AMD drivers 14.9 or later (recommended 15.12 exact)
  • Intel users require Intel OpenCL Runtime 14.2 or later (recommended 16.1 or later)
  • NVidia users require NVidia drivers 346.59 or later (recommended 367.27 or later)

Features

  • World’s fastest password cracker
  • World’s first and only in-kernel rule engine
  • Free
  • Open-Source (MIT License)
  • Multi-OS (Linux, Windows and OSX)
  • Multi-Platform (CPU, GPU, DSP, FPGA, etc. everything that comes with an OpenCL runtime)
  • Multi-Hash (Cracking multiple hashes at the same time)
  • Multi-Devices (Utilizing multiple devices in same system)
  • Multi-Device-Types (Utilizing mixed device types in same system)
  • Supports distributed cracking networks (using overlay)
  • Supports interactive pause / resume
  • Supports sessions
  • Supports restore
  • Supports reading password candidates from file and stdin
  • Supports hex-salt and hex-charset
  • Supports automatic performance tuning
  • Supports automatic keyspace ordering markov-chains
  • Built-in benchmarking system
  • Integrated thermal watchdog
  • 160+ Hash-types implemented with performance in mind
  • . and much more

Screenshot

Algorithms

  • MD4
  • MD5
  • Half MD5 (left, mid, right)
  • SHA1
  • SHA-256
  • SHA-384
  • SHA-512
  • SHA-3 (Keccak)
  • SipHash
  • RipeMD160
  • Whirlpool
  • GOST R 34.11-94
  • GOST R 34.11-2012 (Streebog) 256-bit
  • GOST R 34.11-2012 (Streebog) 512-bit
  • Double MD5
  • Double SHA1
  • md5($pass.$salt)
  • md5($salt.$pass)
  • md5(unicode($pass).$salt)
  • md5($salt.unicode($pass))
  • md5(sha1($pass))
  • md5($salt.md5($pass))
  • md5($salt.$pass.$salt)
  • md5(strtoupper(md5($pass)))
  • sha1($pass.$salt)
  • sha1($salt.$pass)
  • sha1(unicode($pass).$salt)
  • sha1($salt.unicode($pass))
  • sha1(md5($pass))
  • sha1($salt.$pass.$salt)
  • sha256($pass.$salt)
  • sha256($salt.$pass)
  • sha256(unicode($pass).$salt)
  • sha256($salt.unicode($pass))
  • sha512($pass.$salt)
  • sha512($salt.$pass)
  • sha512(unicode($pass).$salt)
  • sha512($salt.unicode($pass))
  • HMAC-MD5 (key = $pass)
  • HMAC-MD5 (key = $salt)
  • HMAC-SHA1 (key = $pass)
  • HMAC-SHA1 (key = $salt)
  • HMAC-SHA256 (key = $pass)
  • HMAC-SHA256 (key = $salt)
  • HMAC-SHA512 (key = $pass)
  • HMAC-SHA512 (key = $salt)
  • PBKDF2-HMAC-MD5
  • PBKDF2-HMAC-SHA1
  • PBKDF2-HMAC-SHA256
  • PBKDF2-HMAC-SHA512
  • MyBB
  • phpBB3
  • SMF
  • vBulletin
  • IPB
  • Woltlab Burning Board
  • osCommerce
  • xt:Commerce
  • PrestaShop
  • Mediawiki B type
  • WordPress
  • Drupal
  • Joomla
  • PHPS
  • Django (SHA-1)
  • Django (PBKDF2-SHA256)
  • EPiServer
  • ColdFusion 10+
  • Apache MD5-APR
  • MySQL
  • PostgreSQL
  • MSSQL
  • Oracle H: Type (Oracle 7+)
  • Oracle S: Type (Oracle 11+)
  • Oracle T: Type (Oracle 12+)
  • Sybase
  • hMailServer
  • DNSSEC (NSEC3)
  • IKE-PSK
  • IPMI2 RAKP
  • iSCSI CHAP
  • Cram MD5
  • MySQL Challenge-Response Authentication (SHA1)
  • PostgreSQL Challenge-Response Authentication (MD5)
  • SIP Digest Authentication (MD5)
  • WPA
  • WPA2
  • NetNTLMv1
  • NetNTLMv1 + ESS
  • NetNTLMv2
  • Kerberos 5 AS-REQ Pre-Auth etype 23
  • Kerberos 5 TGS-REP etype 23
  • Netscape LDAP SHA/SSHA
  • LM
  • NTLM
  • Domain Cached Credentials (DCC), MS Cache
  • Domain Cached Credentials 2 (DCC2), MS Cache 2
  • MS-AzureSync PBKDF2-HMAC-SHA256
  • descrypt
  • bsdicrypt
  • md5crypt
  • sha256crypt
  • sha512crypt
  • bcrypt
  • scrypt
  • OSX v10.4
  • OSX v10.5
  • OSX v10.6
  • OSX v10.7
  • OSX v10.8
  • OSX v10.9
  • OSX v10.10
  • AIX
  • AIX
  • AIX
  • AIX
  • Cisco-ASA
  • Cisco-PIX
  • Cisco-IOS
  • Cisco $8$
  • Cisco $9$
  • Juniper IVE
  • Juniper Netscreen/SSG (ScreenOS)
  • Android PIN
  • Windows 8+ phone PIN/Password
  • GRUB 2
  • CRC32
  • RACF
  • Radmin2
  • Redmine
  • OpenCart
  • Citrix Netscaler
  • SAP CODVN B (BCODE)
  • SAP CODVN F/G (PASSCODE)
  • SAP CODVN H (PWDSALTEDHASH) iSSHA-1
  • PeopleSoft
  • PeopleSoft PS_TOKEN
  • Skype
  • WinZip
  • 7-Zip
  • RAR3-hp
  • RAR5
  • AxCrypt
  • AxCrypt in memory SHA1
  • PDF 1.1 1.3 (Acrobat 2 4)
  • PDF 1.4 1.6 (Acrobat 5 8)
  • PDF 1.7 Level 3 (Acrobat 9)
  • PDF 1.7 Level 8 (Acrobat 10 11)
  • MS Office = 2003 MD5
  • MS Office = 2003 SHA1
  • MS Office 2007
  • MS Office 2010
  • MS Office 2013
  • Lotus Notes/Domino 5
  • Lotus Notes/Domino 6
  • Lotus Notes/Domino 8
  • Bitcoin/Litecoin wallet.dat
  • Blockchain, My Wallet
  • 1Password, agilekeychain
  • 1Password, cloudkeychain
  • Lastpass
  • Password Safe v2
  • Password Safe v3
  • Keepass 1 (AES/Twofish) and Keepass 2 (AES)
  • eCryptfs
  • Android FDE = 4.3
  • Android FDE (Samsung DEK)
  • TrueCrypt
  • VeraCrypt

Attack-Modes

  • Straight *
  • Combination
  • Brute-force
  • Hybrid dict + mask
  • Hybrid mask + dict

Supported OpenCL runtimes


Categories: News Tags: Tags: , , , ,

NirSoft – freeware utilities: password recovery, system utilities, desktop utilities #free #family #feud

No Comments

#data recovery software free download

#

NirSoft web site provides a unique collection of small and useful freeware utilities. all of them developed by Nir Sofer.
If you are looking for Windows password-recovery tools. click here.
If you are looking for network tools. click here.
To view your IP address and other information, click here.
To view all major IP address blocks assigned to your country, click here.
To read the Blog of NirSoft, click here.
To download a package of all NirSoft utilities (Updated every week), go to this Web page.

Search in NirSoft Web site:

Here’s some examples of what you can find in NirSoft Web site:

  • Password Recovery Utilities
    • WebBrowserPassView – View the passwords stored by your Web browser (Supports Internet Explorer, Firefox, Chrome, Safari, and Opera)
    • Mail PassView – Recover the passwords of popular email clients. Outlook Express, MS Outlook, Eudora, Mozilla Thunderbird. and more.
    • MessenPass – Recover the passwords of instant messenger programs. Yahoo Messenger, MSN Messenger, Trillian, and more.
    • Dialupass: Dialup Password Recovery – Recovers the passwords of dialup entries (VPN and Internet connections). Works also under Windows 2000/XP.
    • Network Password Recovery – Freeware utility that recovers the network passwords stored by Windows XP (Credentials file).
    • BulletsPassView – Reveal the passwords hidden behind asterisk (‘****’) or bullets characters in standard password text-boxes.
    • SniffPass – Password Sniffer – Listen to your network, and capture POP3, IMAP4, SMTP, FTP, and HTTP (basic authentication) passwords
    • PstPassword – Recover the password of Outlook PST file.
  • Network Monitoring Tools
    • WirelessNetView – View the details of all wireless network in your area (SSID, Signal Quality, MAC Address, and more. )
    • Wireless Network Watcher – Show who is connected to your wireless network.
    • BluetoothView – Monitor the Bluetooth activity around you.
    • SmartSniff: TCP/IP Sniffer – Capture TCP/IP packets on your network adapter and view the captured data as sequence of conversations between clients and servers.
    • CurrPorts: TCP/IP Connections Viewer – Freeware tool that displays the list of all currently opened TCP and UDP ports on your local computer.
    • AdapterWatch – displays useful information about your network adapters: IP addresses, Hardware address, WINS servers, DNS servers, MTU value, Number of bytes received or sent, The current transfer speed, and more.
    • DownTester – Test the download speed of your Internet connection.
  • Internet Related Utilities
    • IPNetInfo – Find all available information about an IP address: The owner of the IP address, the country/state name, IP addresses range, contact information (address, phone, fax, and email), and more.
    • MyLastSearch – View your latest searches with Google, Yahoo, and MSN.
    • VideoCacheView – Copy video files (.flv and others) from the Web browser cache and temporary folder.
    • WebVideoCap – Capture Flash video (.flv) and RTSP/MMS streams from Video Web sites.
    • SiteShoter – Take a screenshot of a Web site.
    • DNSDataView – View the DNS records of specified domains.
    • IECookiesView: Cookies Viewer/Manager for IE – View/Delete/Modify the cookies that Internet Explorer stores on your computer. Read More >>
    • IEHistoryView – View/Delete the URLs that you visited in the last few days.
    • HTMLAsText (HTML To Text Converter) – Freeware utility that converts HTML files to text files.
    • WhoisThisDomain – Get information about a registered domain.
    • DNSDataView – DNS lookup tool.
  • MS-Outlook Tools
    • NK2Edit – Edit, delete, add, merge. and repair records in the AutoComplete files (.NK2) of Outlook.
    • OutlookAttachView – View and extract attachments in your Outlook mailbox.
    • OutlookStatView – Get statistics about your Outlook mailbox.
    • OutlookAddressBookView – View / export the address book of MS-Outlook.
  • Command-Line Utilities
    • NirCmd: Freeware Command-Line Tool – Do some useful tasks from command-line: turn off your monitor, turn off the computer, open/close the door of your cd-rom drive, dial to VPN/Internet connection, change your display settings, and much more.
  • Desktop Utilities
    • SearchMyFiles – Alternative to ‘Search For Files And Folders’ module of Windows and also duplicate files search.
    • MyUninstaller – Alternative to the standard Add/Remove applet of Windows operating system.
    • Volumouse – Control the sound volume with your wheel mouse.
    • FileTypesMan – Alternative to ‘File Types’ manager of Windows.
  • Freeware System Tools
    • ProduKey – Recover Office/Windows CD-Key
    • ShellExView – Displays the details of shell extensions installed on your computer, and allows you to easily disable and enable each shell extension.
    • WhatInStartup – Add, delete, modify or disable programs that run at Windows startup.
    • USBDeview – View all installed/connected USB devices on your system.
    • DevManView – Alternative to device manager of Windows.
    • DriverView – List all device drivers currently loaded on your Windows.
    • RegScanner (Registry Scanner) – Scan and find values in the Registry.
    • OpenedFilesView – View opened/locked files in your system.
    • SysExporter – Grab the data stored in standard list-views, list boxes, and combo boxes from almost any application running on your system, and export it to text, HTML or XML file.
    • BlueScreenView – View crash information stored in the MiniDump files created on blue screen of Windows.


Categories: News Tags: Tags: , , , , , , ,