2013年10月7日星期一

[ownCloud] Cannot show SVG images in Internet Explorer

Solution: https://github.com/owncloud/core/blob/master/core/templates/layout.base.php#L1

Change "core/templates/layout.base.php"

<!DOCTYPE html>
<html class="ng-csp">
<head>
<title>
php p($theme->getTitle()); ?>
print_unescaped(image_path('', 'favicon.png')); ?>" />
print_unescaped(image_path('', 'favicon-touch.png')); ?>" />
foreach ($_['cssfiles'] as $cssfile): ?>
print_unescaped($cssfile); ?>" type="text/css" media="screen" />
endforeach; ?>
foreach ($_['jsfiles'] as $jsfile): ?>
endforeach; ?>
foreach ($_['headers'] as $header): ?>
print_unescaped('<'.$header['tag'].' ');
foreach ($header['attributes'] as $name => $value) {
print_unescaped("$name='$value' ");
};
print_unescaped('/>');
?>
endforeach; ?>

print_unescaped($_['content']); ?>


2013年9月9日星期一

How to Import and Export SSL Certificates in IIS 5/6

Transferring IIS 5/6 Certificate Files

Background
Want an easier way to export? Our management & troubleshooting tool works on all Windows-based servers.
Windows servers use .pfx files to contain the public key files (your SSL Certificate files, provided by DigiCert) and the associated private key file (generated by your server as part of the CSR).
Since both the public and private keys are needed for an SSL Certificate to function, you need a .pfx backup to transfer SSL server security certificates from one server to another.
This page explains how to back up your certificate on a working server, import the certificate to another server, and then enable the certificate for use on the new server. If you have not yet installed the certificate files that you received from DigiCert on the server that generated your CSR, please see our IIS 5/6 installation instructions page.
Exporting/Backing Up to a .pfx File
  1. On the Start menu click Run and then type mmc.
  2. Click File > Add/Remove Snap-in.
  3. Click Add > Certificates > Add.
  4. Select Computer Account and then click Next. Select Local Computer and then click Finish. Then close the add standalone snap-in window and the add/remove snap-in window.
  5. Click the + to expand the certificates (local computer) console tree and look for the personal directory/folder. Expand the certificates folder.
  6. Right-click on the certificate you want to backup and select ALL TASKS > Export.
  7. Choose Yes, export the private key and include all certificates in certificate path if possible. 
    Warning: Do not select the delete private key option.
  8. Leave the default settings and then enter your password if required.
  9. Choose to save the file and then click Finish. You should receive an "export successful" message. The .pfx file is now saved to the location you selected.
Importing from a .pfx File
  1. On the Start menu click Run and then type mmc.
  2. Click File > Add/Remove Snap-in.
  3. Click Add > Certificates > Add.
  4. Select Computer Account and then click Next. Select Local Computer and then click Finish. Then close the add standalone snap-in window and the add/remove snap-in window.
  5. Click the + to expand the certificates (local computer) console tree and look for the personal directory/folder. Expand the certificates folder.
  6. Right-click on the certificate you want to backup and select ALL TASKS > Import.
  7. Follow the certificate import wizard to import your primary certificate from the .pfx file. When prompted, choose to automatically place the certificates in the certificate stores based on the type of the certificate.
Enabling a New Certificate on a Server
  1. On the Start menu, click Administrative Tools > Internet Information Services (IIS) Manager.
  2. In the IIS manager, right-click the site that you want to use the certificate for and select Properties.
  3. Navigate to Directory Security > Server Certificate. This will start the server certificate wizard.
  4. If given the option, choose to Assign an existing certificate to the site and choose the certificate that you just imported.
    If you do not have that option, you should be asked what you want to do with the current certificate on the site. Choose the option to replace your current certificate.
  5. Browse to the .pfx file that you created earlier and then finish the certificate wizard. You may have to restart IIS or the server for it to recognize the new certificate.

ref: http://www.digicert.com/ssl-support/pfx-import-export-iis.htm

DigiCert SSL Cert Util SSL Import/Export Instructions

Exporting an SSL Certificate from one Microsoft Windows Server for Importing in Windows

If you wish to export an installed SSL certificate from a Micrsoft server type and it's corresponding private key as a .PFX file to use either as a backup or for importing to another server follow the instructions below. 
If you need your SSL Certificate in Apache .KEY format, please see the guide to Export an SSL Cert from a Windows Server to Apache with the DigiCert Util.
  1. Download and Run the DigiCert Certificate Management Tool on the Microsoft server.
  2. Select the certificate you want to export to a PFX file and click Export. 

    Select Certificate then click Export Button 
  3. To export this file to a Microsoft server type (e.g. IIS, Exchange, Office Communications Server, ISA, TMG) or other server/device that accepts a .PFX, .P12 file or PKCS#12 file leave all the options as their defaults and click Next. 

    To export the certificate to an Apache server or other software platform or device that requires that the private key and certificate files are kept separate, click the key file (Apache compatible format) option, then choose the location to save this file and click Finish. 

    Select Certificate then click Export Button 
  4. Create a new password that will need to be entered to import the certificate onto other servers and click next. 

    Select Certificate then click Export Button 
  5. Choose the location and filename where you want the PFX file saved and click Finish.
    Select Certificate then click Export Button

ref: http://www.digicert.com/util/pfx-certificate-management-utility-import-export-instructions.htm

Export a Server Certificate (IIS 6.0)

Web server certificates contain information about the server that allows the client to positively identify the server over a network before sharing sensitive information, in a process called authentication. Secure Sockets Layer (SSL) uses these certificates for authentication, and uses encryption for message integrity and confidentiality. SSL is a public key–based security protocol that is used by Internet services and clients to authenticate each other and to establish message integrity and confidentiality.
If you use SSL to protect confidential information exchanged between the Web server and the client, you must migrate or export the certificates and the associated private keys from the source server to the target server.

Requirements

Credentials: Membership in the Administrators group on the local computer.
Tools: Iis.msc.

Recommendation

As a security best practice, log on to your computer using an account that is not in the Administrators group, and then use the Run as command to run IIS Manager as an administrator. At the command prompt, type runas /user:administrative_accountname mmc %systemroot%\system32\inetsrv\iis.msc.

Procedures

To export a server certificate

1.
In the Run dialog box, type mmc, and then click OK. The Microsoft Management Console (MMC) appears.
2.
If you do not have Certificate Manager installed in MMC, you need to install it.
For more information on how to add the Certificate snap-in to an MMC console, see the procedure "To add the Certificates Snap-in to MMC" in Install a Server Certificate this appendix.
3.
In the console tree, click the logical store where the certificate you want to export exists. Usually this is in the Certificates folder in the Personal directory underCertificates (Local Computer) on the Console Root.
4.
Right-click the certificate you want to export, click All Tasks, and click Export to start the Certificate Export Wizard.
5.
Click Next.
6.
On Export Private Key, click Yes to export the private key.
  Important
You must export the private key along with your certificate for it to be valid on your target server. Otherwise, you will have to request a new certificate for the target server.
7.
In the Export File Format dialog box, click the format you want for the certificate. If the certificate has already been formatted, that format is selected as the default. Click Next.
Do not select Delete the private key if export is successful, because this will disable the SSL site that corresponds to that private key.
8.
Continue to follow steps in the wizard, and enter a password for the certificate backup file when prompted. Using a strong password is highly recommended because it ensures that the private key is well protected.
9.
Type the name of the file you want to export, or click Browse to search for the file. Click Next.
10.
Click Finish to complete the Certificate Export Wizard.

2013年6月27日星期四

Super Utilities for Visio

http://www.sandrila.co.uk/visio-utilities/

I nice to for Visio, such as copy and combine files.

How to enable Ping in Windows Server

GUI – Graphical User Interface
1. Open Control Panel, then select System and Security by clicking on that header
-
-
2. Select Windows Firewall
-
-
3. Advanced Settings
-
-
4. In ‘Windows Firewall with Advanced security’ click on ‘Inbound rules’
-
-
5. Scroll down to ‘File and Printer sharing (Echo request – ICMPv4-In)
-
-
6. Rightclick on the rule and select ‘Enable rule’
-
-
Make sure that it turns green
Done, close down the ‘Windows Firewall with Advanced Security’ windows and then the Control panel.
Verify functionality by pinging the servers own IP address from a command or PowerShell prompt.
Done!
Back to top

-
-
PowerShell
(This will enable the existing rule exactly as the instruction above does)
Import-Module NetSecuritySet-NetFirewallRule -DisplayName “File and Printer Sharing (Echo Request – ICMPv4-In)” -enabled True
 
EnablePing
(ABove enables the existing rule, below will create a new rule that allows ICMPv4/Ping and enable it)
Import-Module NetSecurityNew-NetFirewallRule -Name Allow_Ping -DisplayName “Allow Ping”  -Description “Packet Internet Groper ICMPv4″ -Protocol ICMPv4 -IcmpType 8 -Enabled True -Profile Any -Action Allow
 
EnablePing2
(For IPv6 Ping you obviously enable the v6 Inbound Rule…)

2013年6月25日星期二

Installing Remote Desktop Services

Open the Server Manager and right-click on roles, select Add Roles from the context menu
Click next on the Before You Being page to bring up a list of Roles that can be installed, select Remote Desktop Services and click next
On the Introduction To Remote Desktop Services page click next, this will bring you to the Role Services page, select the Remote Desktop Session Host as well as the Remote Desktop Licensing Service and then click next.
When you get to the application compatibility page it tells you that you should install the Session Host Role before you install your applications, just click next as we have not yet installed our applications. You are then asked if you want to require NLA, this will only allow Windows clients to connect to the Remote Desktop Session Host Server, in addition they must be running a Remote Desktop Client that support Network Level Authentication. I will go ahead and require NLA and then click next

Now you have to choose a licensing method, most of you guys wont have Remote Desktop Client Access Licenses, so you can leave your option at Configure Later this will give you unlimited access to the Remote Desktop Server for 4 Months (120 Days). However, if you do have licenses here is some information help you make your choice:
Licensing Modes
The licenses you purchased can be used either as Per User or Per Device. It is purely up to you, however if you already have a RDS Licensing Server you will have to choose the same option you chose when importing the licenses originally.
  • RDS Per User CAL –  This means that every user that connects to the RDS Server must have a license. The user is assigned the license rather than the devices that he/she connects to the server from. This mode is a good choice if your users want to connect from a lot of different computers or devices (iPad, Home PC, Laptop, Phone etc)
  • RDS Per Device CAL – If your users share a common workstation this is the mode for you, the license is given to the device rather than the users, this way many people can connect from a single device. However, if they try to connect from a different device they will not be able to since their user account doesn’t have a license.
I will leave mine at configure later and click next
Now you should specify who can connect to the Remote Desktop Server, I will just add my user account (Windows Geek), then click next
You are now given the option of making the RDS Server look and act more like Windows 7, this is to avoid users getting confused when they see the classic theme. I will enable the all the settings, it requires more bandwidth though, so take your network traffic into account before going click-happy and selecting everything. Once you have made your choice click next
Since we are running Server 2008 R2, we don’t need to specify a Discovery Scope so just click next again
Finally you can click on install.
Once installation is complete, reboot your server, when you log in the configuration will complete. That’s all there is to installing a Remote Desktop Server.

Activation

If you need to install your licenses you can do it through the RD Licensing Manager. You will need to activate the Server first though. I wont go through this, as it is self-explanatory.
Once you have installed you Licenses you will need to specify a license server for the RDS Session Host to use, to do this, open the RDS Session Host Configuration MMC
When the console opens double-click on the Remote Desktop license servers link.
Now you can specify your licensing mode and then hit the add button to specify a licensing server.
As I said before, you can skip this activation section and use Remote Desktop Services for 120 Days before you need to purchase a CAL. Once you have done this you will need to install your applications. However you cant just install them in any fashion you want, there is actually a special method for installing applications on a Remote Desktop Server.

2013年6月13日星期四

Windows 7: Ctrl+Alt+Del and Start Menu - Add or Remove Switch User

This will show you how to add or remove the Switch User option in the Windows 7 CTRL+ALT+DELETEscreen, Lock Computer screen, and Start Menu arrow menu for all users on the computer.



Through the Local Group Policy Editor
1. Open the Local Group Policy Editor.

2. In the left pane, click on to expand Computer ConfigurationAdministrative TemplatesSystem, and Logon.
3. In the right pane, right click on Hide entry points for Fast User Switching and click on Edit
4. To Add Switch User to CTRL+ALT+DEL Screen
A) Select (dot) either Not Configured or Disabled.

B) Go to step 6.
5. To Remove Switch User from CTRL+ALT+DEL Screen
A) Select (dot) Enabled
6. Click on OK 
7. Close the Local Group Policy Editor window.

8. Restart the computer to fully apply.
ref: http://www.sevenforums.com/tutorials/63025-ctrl-alt-del-start-menu-add-remove-switch-user.html

Android Emulator

The Android SDK includes a mobile device emulator — a virtual mobile device that runs on your computer. The emulator lets you develop and test Android applications without using a physical device.

Ref: http://developer.android.com/tools/help/emulator.html

2013年5月3日星期五

Reset a user password Active Directory (AD) by using command

1. Open Command Prompt.



2. Type:

dsmod userUserDN-pwdNewPassword

3. If you want to require the user to change this password at the next logon process, Type:

dsmod userUserDN-mustchpwd {yes|no}


UserDN: Specifies the distinguished name of the user for which the password will be reset.

NewPassword: Specifies the password that will replace the current user password.


Examples:
To reset a user's password:


dsmod user "CN=John Doe,CN=Users,DC=microsoft,DC=com"
-pwd A1b2C3d4 -mustchpwd yes

To reset multiple user passwords to a common password

and force them to change their passwords the next time they logon:

dsmod user "CN=John Doe,CN=Users,DC=microsoft,DC=com"
"CN=Jane Doe,CN=Users,DC=microsoft,DC=com" -pwd A1b2C3d4 -mustchpwd yes

To disable multiple user accounts at the same time:

dsmod user "CN=John Doe,CN=Users,DC=microsoft,DC=com"
"CN=Jane Doe,CN=Users,DC=microsoft,DC=com" -disabled yes


ref: http://techtoy-blog.blogspot.hk/2010/06/reset-user-password-active-directory-ad.html