Add Office 2010 KMS Key to your KMS Server

Office 2010 will require either a MAK (Multiple Activation Key) or a KMS Key (the new volume lenience key, since Vista/Server 2008). You will only need one KMS server for your organization to serve out activations for both Windows Operating Systems and Office 2010.

1.

Download your Office Product and KMS Key from Microsoft Licensing

www.microsoft.com/licensing

2.

Download the Microsoft Office 2010 KMS Host License Pack

Download this .exe from Microsoft and install it on your current KMS server. It will ask you for your Office 2010 KMS key and then activate it against Microsoft’s Activiation Servers.

http://www.microsoft.com/downloads/details.aspx?
displaylang=en&FamilyID=97b7b710-6831-4ce5-9ff5-fdc21fe8d965

The Host Service Pack can only be installed on Server 2003, Server 2008 R2 or Volume Licence edition of Windows 7.

Once the key has activated you will receive a message indicating that the activation was successful.

3.

Let your clients with Office 2010 activate to the new KMS host key

You’re all set, your clients should now activate to your KMS server.

Conclusion

The KMS Host key for Office 2010 is somewhat different than that of the client OS’s, as it will only take 5 users running Office 2010 for the KMS to activate them, as compared to the 25 hosts required for client OS’s.
Also, if a client is off of the network and does not contact the KMS server after 180 days the user will receive a message when they open Office stating that the product is unlicensed, however, it will continue to work with no loss of functionality. Once the user connect to the network with the KMS host the error will go away and the re-activation process will be transparent to the end user.

How to Block/Disable Browser Choice Screen on Windows

Browser Choice Screen/Browser Ballot Screen

Microsoft Browser Choice Screen

How to Block/Disable Browser Ballot Screen on Windows 7

1. Open Run Command by pressing Win+r keyboard shortcut

2. Navigate to following Registry key:

HKEY_LOCAL_MACHINESoftwareBrowserChoice

3. Now create new registry with

Value name: Enable

Value type: DWORD

4. Now if you do not want to display the Browser Choice update then enter value of above key as “0″

and If you want to display the Browser Choice update (default) set value to “1″

See KB2019411

Windows 7 Tool Troubleshoots Sleep Mode Problems

Windows only: Ever wonder why your laptop’s battery seems to die too quickly? The Windows Help blog points out a hidden command-line switch that generates a report with loads of helpful troubleshooting information.

The report lists all of the devices that are causing problems with sleep mode, explains the different power saving modes your computer supports, and even gives you detailed information on your battery—invaluable information when your system takes forever to go in and out of sleep mode. Generating the report is easy enough—just open up a command prompt in administrator mode using the context menu -> Run as Administrator option, and then type in the following:

powercfg -ENERGY

The utility will take a while to generate the report, sometimes more than the 60 seconds it quotes you—but when it finishes you can open up the generated file in your favorite web browser. Once you’ve examined the report, you can figure out if you need to do some tweaking or update a driver.

Enable virtual Wi-Fi

Windows 7 includes a little-known new feature called Virtual Wi-Fi, which effectively turns your PC or laptop into a software-based router. Any other Wi-Fi-enabled devices within range – a desktop, laptop, an iPod perhaps – will “see” you as a new network and, once logged on, immediately be able to share your internet connection.

This will only work if your wireless adapter driver supports it, though, and not all do. Check with your adapter manufacturer and make sure you’ve installed the very latest drivers to give you the best chance.

Once you have driver support then the easiest approach is to get a network tool that can set up virtual Wi-Fi for you. Virtual Router (below) is free, easy to use and should have you sharing your internet connection very quickly.

Virtual router

If you don’t mind working with the command line, though, maybe setting up some batch files or scripts, then it’s not that difficult to set this up manually. See Turn your Windows 7 laptop into a wireless hotspot for more.

Make Private Browsing More Private

Privacy features such as InPrivate browsing in Internet Explorer 8 and similar features in Chrome and Firefox promise to protect your privacy by not keeping track of page history, temporary files and cookies. This may be enough to hide your tracks from a beginner computer user but there are still traces of what sites you visit within the local DNS cache. An advanced user can run the ipconfig /displaydns command to view the most recent sites visited.

For example, when you start InPrivate browsing in Internet Explorer and visit Bing.com.

The DNS Cache shows where you have been.

The best way to improve the privacy of your InPrivate browsing sessions is to also clear the local DNS cache after closing the browser. Open up an administrative level command prompt and type ipconfig /flushdns and hit Enter.

How to Use TZUtil to Set or Display Time Zone

  1. Click on Start -> All Programs -> Accessories, and click on Command Prompt, or simply type Cmd in Start Search and hit Enter.
  2. Use the following TZUtil syntax to construct the command:TZUTIL <? | /g | /s TimeZoneID[_dstoff] | /l>

    Parameters available is /? (displays usage information), /g (displays the current time zone ID), /s (sets the current time zone using the specified time zone ID, with the _dstoff suffix disables Daylight Saving Time adjustments for the time zone), and /l (lists all valid time zone IDs and display names).

    For example:

    TZUTIL /g
    TZUTIL /s “Pacific Standard Time”
    TZUTIL /s “Pacific Standard Time_dstoff”
    TZUTIL /s “GMT Standard Time”

    The last command will set the PC time zone to Greenwich Meridian Standard Time (GMT or UTC).

    Tip: To get a list of available time zone IDs, type TZUTIL /l. – would have been nice in XP!

10 Ways to Secure Windows 7

Use the Windows 7 Firewall

The firewall in Windows 7 is a spin off of Windows Vista and is easy and is very secure and powerful. With features to secure you and step by step instructions, Windows 7’s firewall is a very powerful firewall that allows a detailed configuration giving the end user true protection from malicious threats.

Backup Your Data

Windows 7 allows you an easier to use backup option that allows you to walk through a step by step backup of your critical data. This option is often over looked by home users. The simple and easy to use backup allows the end user to backup their data in the event of a system crash. Microsoft Windows 7 allows for a system image to be created as well as files to be backed up.

Use Internet Explorer 8

A recent study showed Internet Explorer 8 beat out Firefox and other major browsers in protecting your computer. With SmartScreen Filter, this addition allows users to surf websites that are labeled in Microsoft’s database as legitimate or malicious. Go to the Safety menu for more information on how to enable this option. Cross-site scripting and other websites that are vulnerable are noted.

Enable BitLocker

This encryption can allow the entire volume of your computer to be secured. With BitLocker, you can encrypt the boot system and any removable media on your computer. With USB thumbdrives being portable, this is one of many ways you can encrypt your system. Third party software such as Truecrypt, blah and blah which are all Windows 7 compatiable, Windows 7 can be further encrypted to provide a strong barrier against data theft. Always save your encrypted information and passwords / phrases. Loss of these items can result in you losing your valuable information.

Updates and Patches

Microsoft years ago set aside security dates monthly to ensure computers had hotfixes / patches to ensure your computer is protected. Although these patches are for Windows, you should look at SUMo or Secunia to ensure your computer’s applications are also patched.

Antivirus / Antimalware

Ensuring your computer has protection against viruses and malware is essential. With the dozen or so applications that are free to use, these applications provide protection against the malicious injection of viruses or malware on your system. With zero day threats along with malicious activities found on thousands of websites, antivirus and antimalware protection allows further protection against these threats from infecting your computer.

Keep the UAC

Keeping the ‘what users call’ annoying UAC prompts helps you make the critical descisions in and when installing software. With smarter malware and viruses, the UAC helps you decide on what is legitimate and what may be a dangerous piece of software. Windows 7 allows you to adjust this protection agent. The UAC in Windows 7 is less annoying than Windows Vista. Microsoft has adjusted this feature to help the end user.

Sharing Information

When sharing out files or folders, make sure you only allow specified users to assess your data. With Windows 7 Folder and File sharing being easier than ever, you must specifiy individual users whom you wish to share the data. Never allow all users to veiw data and avoid appications such as P2P file sharing programs to share out information on your hard drive. Research has shown that using such software leaves users vulnerable to accidently placing files in the shared folder and users across the globe have access to the data in the shared folder.

Restricting User Access

Physical security plays an important role in computer security. Many homes and business allow the sharing of a common computer. Setup individual accounts to ensure users are logging in and creating their own sessions. Assign a user role to the computer user. Do not allow everyone to be an administrator of a common computer. This can result in many logistical nightmares from the addition of users you are unaware of, removal or addition of software and many other security nightmares. Always lock your computer when away from it for any period of time. You can do this by holding down the Windows key and hitting the ‘L’ key to lock it.

Using Email and the Internet Wisely

Many articles have been written warning users not to click fishy and unknown ads on the web, opening unknown email or going to websites that are malicious in nature. All of the information stated in these articles are true. Don’t open any email that you don’t know where it came from and don’t surf the web without surfing wisely. Restrict children from surfing the internet and control their surfing habits by using Windows 7’s Parental Controls with Web Filtering.

Conclusion

In conclusion, Windows 7 is secure out of the box. Using the above tips, the end user can further secure their system. By using antivirus, antimalware, UAC and other items, you can enhance the security of Windows 7 or any operating system.

Hypervisor not running

I’m running Windows Server 2008 R2 on my laptop and after I Hyper-V role the following error message showed, when trying to start a Hyper-V machine. Seems the Hyper-Visor entry was never made to the BCD store.

To add the hypervisor auto launch into the BCD store you’ll need to run the following command in administrator mode

bcdedit /set hypervisorlaunchtype auto

make sure virtualization feature is enabled in BIOS!

Autorun keys for new users and/or add registry keys to HKEY_CURRENT_USER

its rather simple, create an entry in the “HKEY_LOCAL_MACHINESOFTWAREMicrosoftActive SetupInstalled Components” key. the entrees in this key is the stuff you se in the upper left hand corner during first log on. (the Personalized Settings box). Most if not all entries in this key will be in the GUID format, but it does not have to be..

Open REGEDIT and follow the instructions below.

image Right click Installed Components and click New KEY, and name the key {Z-UserSetup}. NOTE: The different keys are executed in number and alphabetical order, so to make sure our key is executed last we name it Z-“something” and put it in { }. Everything not in curly braces wile be executed first.
image In the new key create two new String Values (REG_SZ) and name them
StubPath and
Version. StubPath has info on what we want to run, and could be any executable, script, run.dll e.t.c. Version will show in the Installed Components section in CURRENT_USER

(Default) will be the info showed in the Personalized settings box during logon. (can also be sat as @=”info”)

Now just reboot and log on with a different user, and notepad will be executed during logon.

If you want to set this with a script ,then here small one for disabling the Windows Media Player wizard.

Set oShell = CreateObject("WScript.Shell") 

RegPath="HKEY_LOCAL_MACHINESOFTWAREMicrosoftActive SetupInstalled Components{Z-UserSetup}"
oshell.RegWrite Regpath & "Stubpath", "reg.exe add HKCUSOFTWAREMicrosoftMediaPlayerPreferences _
/v AcceptedPrivacyStatement /t REG_DWORD /d 1 /f", "REG_SZ"
oshell.RegWrite Regpath & "Version", "1.00", "REG_SZ"
oshell.RegWrite Regpath & "@", "Accept MP Privacy Statement", "REG_SZ"

you can add as many as you want, just remeber the execution order.