SHAREPOINT

SHAREPOINT
Spotlight on share server 2010

Saturday, June 1, 2013

WEB DESIGNING

TOC
1. HTML
2. DHTML
3. SCRIPTING
4. CSS
5. TEXT/CSS
6. UNIFIED COMMUNICATION MODULE
7. HOSTING A WEB- SITE
8. LAUNCHING A WEB SITE
9. FLASH ENABLED WEB-SITES
10. SOFTWARE SUITE LIKE DREAM WEAVER (OPTIONAL).
11. XML
12 ASP/ASP.NET/C#/.NET
13 PHP
14 SECURITY

INSTALLATION / CONFIG AND MAINT. WILL BE ALSO PROVIDED TO U.
REGARDS
GURBINDER SHARMA
AIIT
MANSA










Wednesday, March 20, 2013

HUMAN RIGHTS


Petition Background (Preamble):


We are requesting Newtown Selectwoman and Connecticut lawmakers take the necessary steps to ensure that the complete autopsy/toxicology results of alleged Sandy Hook shooter, Adam Lanza, be released to the public and specifically toxicology tests that would determine whether Lanza was yet another school shooter under the influence of, or in withdrawal from, psychiatric drugs, documented to cause violent behavior—based on the following facts.

Because there is overwhelming evidence to support a link between psychiatric drugs, school shootings and similar acts of senseless violence, it is imperative that the people of Newtown, Connecticut be provided all the information relating to the alleged shooter, Adam Lanza.

• At least fourteen school shootings were committed by individuals taking or withdrawing from psychiatric drugs resulting in 162 wounded and 72 killed.

• Between 2004 and 2011, there were nearly 13,000 reports to the FDA's MedWatch system of psychiatric drugs causing violent side effects, including homicide, mania and aggressive behavior.

• 22 international drug regulatory warnings have been issued on psychiatric drugs causing violent behavior, including mania, psychosis and homicidal ideation.

• The alleged shooter, Adam Lanza, was an adult at the time of his alleged criminal acts and his death, eliminating any privacy concerns on releasing his toxicology results due to "minor" status.

• Releasing the autopsy/toxicology results has no bearing on any on-going criminal investigation. For example, within weeks of the 1999 Columbine massacre, the coroner revealed to the public that shooter, Eric Harris, had the antidepressant Luvox in his system. This information was released to the public despite the on-going criminal investigation into the Columbine massacre.

• Any failure to release the autopsy/toxicology results only serves to protect the pharmaceutical industry, not the general public.

• Release of the autopsy/toxicology results is a completely separate issue from the criminal investigation.

Petition: For the above reasons, we are calling on Newtown Selectwoman and Connecticut lawmakers to demand the release of the toxicology testing to determine what prescribed drugs Adam Lanza may have been on or in withdrawal from.

The people of Newtown, Connecticut have a right to know this information and there is no reason that the Coroner or lawmakers should not make this information a matter of public record.

pls follow the link below for more info.
Regards
Gurbinder Sharma
Release">http://www.gopetition.com/petitions/release-adam-lanza-toxicology-reports.html">Release Adam Lanza Toxicology Reports Petition | GoPetition

Monday, March 11, 2013

ANOTHER FAKE MAIL

VACANCY
WORKERS ARE URGENTLY NEEDED IN FIVE STAR HOTEL IN LONDON, ACCOMMODATION AND FLIGHT TICKET TO LONDON WILL BE PROVIDED, VACANCY FOR CLEANERS,GARDENERS, STEWARDS, WAITERS, DRIVERS, BAR ATTENDANTS, PLUMBERS,P.R. MANAGERS, I.T. PROFESSIONALS, STORE KEEPERS, COMPUTER OPERATORS, SOFTWARE ENGINEERS, NETWORK, ENGINEERS, FOOD AND BEVERAGE EXPERT,BACK OFFICE AND FRONT OFFICE, EXECUTIVES, OFFICE ASSISTANTS,MEDICAL AND HEALTH OFFICERS, BEAUTICIANS, NUTRITIONISTS,ROOM ATTENDANTS, LANGUAGE TRANSLATORS, WATCHMEN, RECEPTIONISTS, CLERKS, TOUR GUARDS, ENGINEERS, COOKS, ACCOUNTANTS, TECHNICIANS, WEB DESIGNERS, PROGRAMMERS. MUST HAVE A VALID INTERNATIONAL PASSPORT, ETC. IF YOU ARE INTERESTED,URGENTLY SEND YOUR RESUME TO(employment-uk@hotmail.com). FOR FURTHER INQUIRIES CONTACT.
SIR. MATTHEW W. SCHUYLER
FOR: HILTON HOTEL HEADQUARTER, UK
E-mail: (
employment-uk@hotmail.com)
Tel: +448719159285

PLS DO NOT REPLY TO THESE KIND OF EMPLOYMENT MAILS.THIS IS JUST A FAKE MAIL NOTHING MORE THAN THAT.
 
REGARDS
GURBINDER SHARMA
CYBER CRIME CELL INT
9876023524

Sunday, March 3, 2013

WEB ATTACKS AND INDIA

HI ALL
PLS TAKE THIS SERIOUS . I FOUND MANY SUCH ATTEMPTS MADE BY EXTERNALS BUT ON THE OTHER HAND, WE SAY THE PERSON MAY BE AN INSIDER.MOST OF THE HACKING INVESTIGATION CASES, WE FOUND 90% ARE TEEN-ANGERS, THEY SIMPLY DID IT FOR ENJOYMENT.
7%S ARE INTENTIONALLY DO THIS DUE TO BECAME FAMOUS AND SOME ARE WORKING FOR TERRORIST GROUPS .
3 PERCENTERS: FALL UNDER NEVER CAUGHT CATEGORY.
BUT I BELIEVE , WE LOOSE OUR FOCUS AT END TIME.
TIPS:
SYS ADMINS: PLS ENABLE THE LOG IMAGE MIRROR.SIMPLE BUT EFFECTIVE.

NEVER REPLY THE PERSON  YOU DONT KNOW, PRECISELY FOR GIRLS.
USE YOUR GADGETS SENSIBLY(SMART PHONES,PDA'S AND NOTE BOOK USERS..

INFORM AND REGISTER AN FIR: IF THE LOSS IS BIG , ONLY THEN THINK ABOUT A COMPLAINT.
ENSURE TO APPROACHED THE LOCAL POLICE IF YOU ARE SURE THAT ITS A SERIOUS
THREAT.
DIGITAL FORENSICS IS VERY EXPENSIVE AND TIME CONSUMING.KEEP IT IN MIND BEFORE YOU GO AHEAD.
BE AGGRESSIVE: TRY TO CHECK YOUR LOGS , MIGHT PROVE BENEFICIAL LATER ON.
tracert -PATH: CLI COMMAND.
KEEP TRACK OF YOUR CO-WORKERS.
USE OF HARDWARE FIREWALL IS MUCH BETTER THAN UR INBUILT SOFTWARE FIREWALL.
AVOID FACEBOOK TO FREQUENTLY USE PEERS.

KIND REGARDS
GURBINDER SHARMA
CYBER CRIME CELL INTERNATIONAL FRAUD WATCHERS.
09876023524

   

Monday, December 24, 2012

HOW TO HOST AWEB SITE


WEB HOSTING:

1.       WEB SERVER: IIS7.0 SERVICES(INTERNET INFORMATION SERVICES)IIS7.0 SERVICES ARE USED FOR A WEB SERVER.IIS SERVICE MAINLY USED TO LAUNCH WEB SITESON THE INTERNET AND AS WELL AS ON

2.       INTRANET IIS6.0/IIS7.0 USE TO RUN SERVICES LIKE FTP SERVICE.IIS CAN BE INSTALLED IN WINDOWS 2000/2003/2008 SERVER COMPUTERS.WIN SRVER 2008 WEB EDITION IS SPECIALLY DESIGNED TO RUN IIS7.0 IIS IS ALSO AVAILABLE IN CLIENT OS.BUT THE SERVICES IN CLIENT OS IS LIMITED AND CAN SUPPORT ONLY 10 USERS AT ATIME.WEB SITE IS COLLECTION OF DOCUMENTS.THE PROTOCOL HTTP IS USED TO ACCESS WEB SITES BY THE CLIENTS FROM THE WEB SERVER.HTTP USE THE DEFAULT PORT NO 80.APACHE CAN ALSO BE USED TO CONFIGURE A WEB SERVER.

INSTALLATION OF WEB SERVER: GO TO THE SERVER MANAGER ----> ROLES---->ADD ROLES------>NEXT--------->ADD DNS AND WEB SERVER IIS -->NEXT-->NEXT--->NEXT--->CLICK ON THE CHECKBOX APPLICATION DEVOLPMENT---->SELECT ASP.NET--->NEXT----->INSTALL.

YOU ARE READY FOR HOSTING A WEB SITE WITH FULL FLEDGED RIGHTS.

BEST REGARDS

GURBINDER SHARMA

Cyber crime cell & digital forensics

MCITP/MCTS/MCP

 

Saturday, December 8, 2012

NEW SECURITY BULLTEIN RELEASED

NEW BULLETIN SUMMARY
Bulletin IDMaximum Severity Rating Vulnerability Impact Restart RequirementAffected Software*
Bulletin 1 CriticalRemote Code ExecutionRestart requiredInternet Explorer on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
Bulletin 2CriticalRemote Code ExecutionRestart requiredWindows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
Bulletin 3 CriticalRemote Code ExecutionMay require restartMicrosoft Word 2003, Word 2007, Word 2010, Word Viewer, Office Compatibility Pack, SharePoint Server 2010, and Office Web Apps 2010.
Bulletin 4CriticalRemote Code ExecutionMay require restartMicrosoft Exchange Server 2007 and Exchange Server 2010.
Bulletin 5 CriticalRemote Code ExecutionRestart requiredWindows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Bulletin 6ImportantRemote Code ExecutionRestart requiredWindows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012.
Bulletin 7 ImportantSecurity Feature BypassRestart requiredWindows Server 2008 R2 and Windows Server 2012.
* The list of affected software in the summary table is an abstract. To see the full list of affected components please click and review the "Affected Software" section.
Regards
Microsoft Security Team
Gurbinder Sharma
Microsoft Certified IT Profssional
Although we do not anticipate any changes, the number of bulletins, products affected, restart information, and severities are subject to change until released.

Advance Notification Webpage: The full version of the Microsoft Security Bulletin Advance Notification for this month can be found at http://technet.microsoft.com/security/bulletin/ms12-dec.

Microsoft Windows Malicious Software Removal Tool: Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.

Monthly Security Bulletin Webcast: To address customer questions on these bulletins Microsoft will host a webcast next Wednesday, December 12, 2012, at 11:00 A.M. Pacific Time (U.S. and Canada). Registration for this event and other details can be found at http://technet.microsoft.com/security/bulletin/.
At this time, no additional information on these bulletins, such as details regarding the vulnerability or severity, will be made available until the bulletins are published on Tuesday.
REGARDING INFORMATION CONSISTENCY
We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft’s security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft's web-based security content, the information in Microsoft's web-based security content is authoritative.

If you have any questions regarding this alert please contact your Technical Account Manager.

Thank you,
Microsoft CSS Security Team

Thursday, November 29, 2012

Intrusion Detection Systems

Hi
Today, I want to share something about security . Everybody knows about Hackers & what they do.
So this is not our focus rather, we are talking about how to AVOID/DETECT and Trace the Bad Man.

IDS:
Is a Security sub-program programmed for intruders detection , so its may implemented freshly or could be a   part of an already existing system. So mainly work as a part of the security system.

PRESENTLY: Not widely known to much people and the cost of implementation/Configuration/Maintenance and an expert Admin.

Future: is bright become its rocking in near future .

Limitations:
1.   False alarming, due to some different behavior of the user , but to system its a unusual activity and trigger
 the alert. So ,  hope fully we should succeeded in making a PC which accurately caught the culprit by judging the exact behavior of the unauthorized user.

2.  DATA MINING:
Required lots of efforts to go deep inside to find the culprit i,e an enterprise database/centerilized repository.

suggestions are welcome from every one#

gurbinder.sharma@gmail.com

gurbindersharma@hotmail.com

Regards
Gurbinder