Category Archives: Network Administration

Error opening attachments / Cleaning out the Temporary Outlook Files folder

I did write this article but it is the best article to write about this common problem.

————————————————————————————————————————–
When opening an attachment directly from within Outlook you could get an error message saying that it can’t create the file and to that, you need to check the permissions on the folder you want to save it in. In most cases, the permissions on the folder aren’t the issue but the fact that the folder is “full”. When you open an attachment directly from within Outlook it will first save a copy to a subfolder of the Temporary Internet Files folder.

Cleaning out the folder will solve the issue.


Outlook Secure Temp folder

Unfortunately, this is easier said than done. The subfolder name Outlook creates (on the installation of Outlook) in the Temporary Internet Files folder is quite random.
In Outlook 2003 and previous, the name starts with OLK and is followed by up to 4 random numbers or letters. In Outlook 2007, 2010 and 2013, this folder is called Content. Outlook and then has a subfolder which is named with 8 random numbers and letters.
In addition, by default, you cannot simply browse to the folder to clean it out. Getting to the Temporary Outlook Folder can still be accomplished in 2 easy steps though.
Step 1: Locate the folder
The folder location is stored in the registry in the following key;
Outlook 97 HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Outlook\Security
Outlook 98 HKEY_CURRENT_USER\Software\Microsoft\Office\8.5\Outlook\Security
Outlook 2000 HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Security
Outlook 2002/XP HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Security
Outlook 2003 HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\Security
Outlook 2007 HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Outlook\Security
Outlook 2010 HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Security
Outlook 2013 HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Security
Step 2: Get to the folder
  1. Open the OutlookSecureTempFolder registry key from the location provided in Step 1.
  2. Copy the path from the key.
  3. Open Explorer
  4. Paste the address in the Address Bar and press Enter

Use OutlookTools or OutlookTempCleaner

Still not easy enough or just don’t want to go in the Registry to find the folder location? I’ve created two free tools which can do the trick as well.
OutlookTools offers besides locating, opening and cleaning up the SecureTempFolder also quite a lot of additional features to troubleshoot and tweak Outlook.
OutlookTempCleaner focuses only on dealing with the SecureTempFolder and can also be used in (corporate) login and logoff scripts to clean up the folder without any end-user interaction.
OutlookTempCleaner
OutlookTempCleaner can detect and empty Outlook’s Secure Temp folder automatically for you.

Windows OS Memory

Here are some notes I made on Memory for windows OS and NOS operating systems. 
Memory maximums for current Microsoft® Windows OS’s include:
 
32-bit OS

Windows 8 (32 bit)
  • Windows 8 Enterprise: 4 GB
  • Windows 8 Professional: 4 GB
  • Windows 8 Home: 4 GB
 
Windows 7 (32 bit)
  • Ultimate: 4 GB
  • Enterprise: 4 GB
  • Business: 4 GB
  • Home Premium: 4 GB
  • Home Basic: 4 GB
  • Starter: 2 GB
 
Windows Vista (32 bit)
  • Ultimate: 4 GB
  • Enterprise: 4 GB
  • Business: 4 GB
  • Home Premium: 4 GB
  • Home Basic: 4 GB
  • Starter: 1 GB
 
Windows XP (32 bit)
  • Professional: 4 GB
  • Home: 4 GB
  • Starter Edition: 512 MB
 
Windows Server 2003 (32 bit)
  • Datacenter SP2: 128 GB
  • Enterprise SP2: 64 GB
  • Standard SP1: 4 GB*
  • Datacenter R2: 128 GB
  • Enterprise R2: 64 GB
  • Standard R2: 4 GB*
  • Web Edition: 4 GB*
  • Small Business Edition: 4 GB*
Windows Server 2008 (32 bit)
  • Datacenter: 64 GB
  • Enterprise: 64 GB
  • Standard: 4 GB
  • Web Server: 4 GB

 

* Certain Microsoft server operating systems can support over 4GB of memory via Physical Address Extension (PAE). Please refer to the Microsoft knowledgebase article located here for more information.
64-bit OS

Windows 8 (64 bit)
  • Enterprise: 512 GB
  • Professional: 512 GB
  • Home: 128 GB
 
Windows 7 (64 bit)
  • Windows 7 Ultimate: 192 GB
  • Windows 7 Enterprise: 192 GB
  • Windows 7 Professional: 192 GB
  • Windows 7 Home Premium: 16 GB
  • Windows 7 Home Basic: 8 GB
  • Windows 7 Starter: N/A
 
Windows Vista (64 bit)
  • Ultimate: 128 GB
  • Enterprise: 128 GB
  • Business: 128 GB
  • Home Premium: 16 GB
  • Home Basic: 8 GB
 
Windows XP (64 bit)
  • Professional: 128 GB
  • Windows Server 2003 (64 bit)
  • Datacenter SP2: 2 TB
  • Enterprise SP2: 2 TB
  • Standard SP1: 32 GB
  • Datacenter R2: 1 TB
  • Enterprise R2: 1 TB
  • Standard R2: 32 GB
  • Small Business Edition: 128 GB
 
Windows Server 2008 (64 bit)
  • Datacenter: 2 TB
  • Enterprise: 2 TB
  • Standard: 32 GB
  • Web Server: 32 GB
 
Windows Server 2012 (64 bit)
  • Datacenter: 4 TB
  • Standard: 4 TB
  • Essentials: 64 GB
  • Foundation: 32 GB
  • Storage Server 2012 Workgroup: 32 GB
  • Storage Server 2012 Standard: 4 TB
  • Hyper-V Server 2012: 4 TB

Hackers leverage Plesk Panel to attack websites

Here is a great article.
————————————————————————————————————

Hackers leverage Plesk Panel to attack websites

Summary: Whether it’s being attacked by repeat-offender hackers or a zero-day vulnerability, Parallels’ Plesk Panel has become a hot target on the internet.

Popular web hosting management software, Plesk Panel, is under attack, being used as a point of entry to compromise websites.

The software, created by virtualization and automation firm Parallels, has been targeted in the past, using a vulnerability in Plesk that allowed hackers to remotely compromise the Plesk server. This vulnerability affected versions 7.x, 8.x, 9.x and 10.0 to 10.3.1 of Plesk. When it closed the hole, Parallels recommended that administrators reset the passwords of all users.
Although the fix was put in place in February this year, Plesk users believe that the hackers who compromised user sites at that time, appear to have returned. They have voiced theories on Parallels’ own forums, suggesting that hackers harvested data from Plesk while it was vulnerable and then took advantage of admins or users not resetting passwords, following the hack. This would explain why admins who updated Plesk and were meant to be secure, are seemingly being compromised by an old vulnerability.
But another theory is that there is a new zero-day vulnerability in Plesk 10.4.4 and earlier. Brian Krebs at Krebs on Security reported that underground hacking forums are selling a Plesk zero-day exploit for US$8000, with other forum members vouching for its legitimacy.
ZDNet Australia contacted Parallels over the claims of a zero-day exploit in the wild, but the firm had not responded at the time of writing.
Regardless, Plesk is definitely attracting attention from hackers. There is now a large surge in unsolicited port scans that are looking for Plesk installations, according to data from the SANS Internet Storm Centre and as noted by Sucuri Malware Lab’s Daniel Cid, during an interview with SC Magazine. Cid said that there are more than 50,000 websites compromised, as part of a hacking campaign.
Yesterday, there were reports of attacks using WordPress and other plug-ins to compromise sites, however, from Cid’s later discussions with Krebs, the common factor among all of the compromised sites appears to actually be Plesk, meaning users don’t have to be running content management systems like WordPress to become a victim.

http://gizmodo.com/5925114/kevin-mitnick-the-worlds-most-notorious-hacker-is-here-to-talk-about-what-got-him-started