Saturday, May 13, 2017

How to Fix ( Failed To Create A Phonebook Entry)

Failed To Create A Phonebook Entry |Fix This Error

If you are logged on to your PC or laptop using a Guest account. Try to logon using an account with Administrative rights and then try if you are getting the same error ”Failed to create a phonebook entry". If the answer is yes, then try the following…
For Windows XP Operating System:
First ensure show hidden Files & Folders is checked under folder options.
From My Computer select Tools followed by Folder Options then View. Under Advanced settings tick Show Hidden Files and Folders then select Apply, then OK.
Browse to C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Connections\Pbk
Right click on Rasphone file and click Properties.
If the Read Only box is checked, remove this, then select Apply then OK. Rename the folder called pbk to pbk.old close the window and re-test connection.
For Windows Vista And Windows 7 Operating Systems:
First make sure that show hidden Files & Folders is checked.
From Computer select Organise followed by Folder and Search Options then View. Under Advanced Settings tick Show Hidden Files and Folders then select Apply, then OK.
  • Browse to C:\Users\username (this will be your user name that you used to log into the system)\AppData\Roaming\Microsoft\Network\Connections\Pbk
  • Right click on the Rasphone file and click Properties.
  • If the Read Only and Hidden box is checked, remove this then select Apply then OK.
  • Rename the folder called pbk to pbk.old close the window and re-test connection.
If you are still getting the "Failed to create a phonebook entry" error please try the steps below:
Browse to Control Panel Administrative tools > Computer management > Services and Applications > Services
Locate the following services:
1. Telephony
2. Network Connections
3. Remote Access Connection Manager
4. Remote Access Auto Connection Manager
Right click and select Properties. On the General tab, next to Start Up type, select Automatic followed by OK.
Reboot the PC or Laptop and try connecting again.

Tuesday, February 02, 2016

SIZE OF TABLES IN SQL SERVER

SELECT 
    t.NAME AS TableName,
    s.Name AS SchemaName,
    p.rows AS RowCounts,
    SUM(a.total_pages) * 8 AS TotalSpaceKB, 
    SUM(a.used_pages) * 8 AS UsedSpaceKB, 
    (SUM(a.total_pages) - SUM(a.used_pages)) * 8 AS UnusedSpaceKB
FROM 
    sys.tables t
INNER JOIN      
    sys.indexes i ON t.OBJECT_ID = i.object_id
INNER JOIN 
    sys.partitions p ON i.object_id = p.OBJECT_ID AND i.index_id = p.index_id
INNER JOIN 
    sys.allocation_units a ON p.partition_id = a.container_id
LEFT OUTER JOIN 
    sys.schemas s ON t.schema_id = s.schema_id
WHERE 
    t.NAME NOT LIKE 'dt%' 
    AND t.is_ms_shipped = 0
    AND i.OBJECT_ID > 255 
GROUP BY 
    t.Name, s.Name, p.Rows
ORDER BY 
    t.Name

Monday, December 07, 2015

Elements for IS Auditing
An information system is not just a computer. Today's information systems are complex and have many components that piece together to make a business solution. Assurances about an information system can be obtained only if all the components are evaluated and secured. The proverbial weakest link is the total strength of the chain. The major elements of IS audit can be broadly classified:
  1. Physical and environmental review—This includes physical security, power supply, air conditioning, humidity control and other environmental factors.
  2. System administration review—This includes security review of the operating systems, database management systems, all system administration procedures and compliance.
  3. Application software review—The business application could be payroll, invoicing, a web-based customer order processing system or an enterprise resource planning system that actually runs the business. Review of such application software includes access control and authorizations, validations, error and exception handling, business process flows within the application software and complementary manual controls and procedures. Additionally, a review of the system development lifecycle should be completed.
  4. Network security review—Review of internal and external connections to the system, perimeter security, firewall review, router access control lists, port scanning and intrusion detection are some typical areas of coverage.
  5. Business continuity review—This includes existence and maintenance of fault tolerant and redundant hardware, backup procedures and storage, and documented and tested disaster recovery/business continuity plan.
  6. Data integrity review—The purpose of this is scrutiny of live data to verify adequacy of controls and impact of weaknesses, as noticed from any of the above reviews. Such substantive testing can be done using generalized audit software (e.g., computer assisted audit techniques).
All these elements need to be addressed to present to management a clear assessment of the system. For example, application software may be well designed and implemented with all the security features, but the default super-user password in the operating system used on the server may not have been changed, thereby allowing someone to access the data files directly. Such a situation negates whatever security is built into the application. Likewise, firewalls and technical system security may have been implemented very well, but the role definitions and access controls within the application software may have been so poorly designed and implemented that by using their user IDs, employees may get to see critical and sensitive information far beyond their roles.
It is important to understand that each audit may consist of these elements in varying measures; some audits may scrutinize only one of these elements or drop some of these elements. While the fact remains that it is necessary to do all of them, it is not mandatory to do all of them in one assignment. The skill sets required for each of these are different. The results of each audit need to be seen in relation to the other. This will enable the auditor and management to get the total view of the issues and problems. This overview is critical.

IS audit should cover the below mentioned sections
1.    Network, workstation, Internet, disaster recovery, and other IT security policies
2.    Gramm-Leach-Bliley Act Section 501 (b)
3.    Overall security procedures
4.    Segregation of IT duties 
5.    Internal quality and integrity controls
6.    Data communication security
7.    User identification authorization
8.    User level of accessibility
9.    Restricted transactions
10.  Activity and exception reports
11.  Backup procedures
12.  Other operational security controls
13.  Insurance coverage
14.  Network security, which includes the Internet
15.  Internal auditing procedures
16.  Contingency planning and disaster recovery
17.  Internet security procedures
18.  Vendor due diligence
19.  Feedline Advantage security
20.  Internet banking controls and procedures
21.  Telephone banking
22.  Internal procedures and controls around your core banking system, whether internal or external processing
 IS audit should include the following IT security tests:
1. External VISTA penetration-vulnerability study
2. Domain server security settings
3. Virtual machine/guest security settings
4. Workstation security setting
5. Network user access
6. Core application access
7. Network topology security analysis
8. Systems security features and controls
9. Sampling for unauthorized software
10. Outsourcing/cloud activities

Monday, July 29, 2013

CASE Statements in A SQL UPDATE Query

  • UPDATE
  • [account]
  • SET
  • balance =
  • (
  • CASE
  • WHEN
  • ((balance - 10.00) < 0)
  • THEN
  • 0
  • ELSE
  • (balance - 10.00)
  • END
  • )
  • WHERE condition

Thursday, July 11, 2013

DBA /BI Engineer Post

Country: Tanzania
City: Dar Es Salaam
Qualification
  • A Bachelor’s degree in Computer Engineering, Computer Science, Industrial Engineering/Operations  Mathematics, Management Information Systems.
  • Skills in Database operations, SQL queries, etc
  • Knowledge of best practices and principles for ETL, data modeling, dashboards, report design, analytics, and data mining
  • Strong work ethic
  • Ability to multi-task effectively and be comfortable working in a fast-paced, dynamic environment without close guidance or supervision
  • Strong leadership skills
  • Excellent verbal and written communication skills
  • High degree of attention to detAILS
dEADLINE 16/07/2013

Saturday, June 22, 2013

Find Last Day of Any Month (SQL Server)

a) Find the last day of the previous month, current month and next month.

  • Last Day of Previous Month
SELECT DATEADD(s,-1,DATEADD(mmDATEDIFF(m,0,GETDATE()),0))
  • Last Day of Current Month
SELECT DATEADD(s,-1,DATEADD(mmDATEDIFF(m,0,GETDATE())+1,0))

  • Last Day of Next Month
SELECT DATEADD(s,-1,DATEADD(mmDATEDIFF(m,0,GETDATE())+2,0))

b). Last day of any day specified.

  • Last Day of Any Month and Year
DECLARE @dtDate DATETIMESET @dtDate '8/18/2007'SELECT DATEADD(s,-1,DATEADD(mmDATEDIFF(m,0,@dtDate)+1,0))

Friday, September 07, 2012

Last_date

There is no function like last_date in sql server.

Saturday, April 14, 2012

How to upload excel file to MYsql server

Save your spreadsheet as a CSV (comma separated value) file.
>|
>| After I save the spreadsheet as a CSV file how do I import the data
>| into a MySQL table?[/color]

Look under the Load Data instruction. I use the following:
LOAD DATA LOCAL INFILE 'e:\\sydnet2\\_info\\curdocs.csv' INTO TABLE
pnp_docs_current FIELDS TERMINATED BY ',' ENCLOSED BY '"' LINES
TERMINATED BY '\n';

Friday, March 09, 2012

How to remove MYSQL from Windows 7


How To:
  1. Run Command Prompt as Administrator and execute the following command to stop and remove MySQL service.
  2. Net stop MySQL Sc delete MySQL
  3. Go to Control Panel >> Programs >> Programs and Features, select MySQL Server 5.x and click Uninstall. (If you can uninstall MySQL from Control Panel)
  4. Open Windows Explorer and go to Organize > Folder and search options, Select the “View” tab and under “Hidden files and Folders” choose “Show hidden files and folders”. Now explore the following locations and delete following folders.
  5. C:\Program Files\MySQL C:\Program Files (x86)\MySQL C:\ProgramData\MySQL And if exists, delete it too C:\Users\[User-Name]\AppData\Roaming\MySQL
  6. Restart your PC and reinstall MySQL. That’s all!
Applies To:
  • Windows Server 2008 R2
  • Windows Server 2008
  • Windows 7
  • Windows Vista

Monday, January 23, 2012

Enabling ARCHIVELOG Mode

The following steps will guide you to enable archivelog Mode.

1. Check the current archivelog mode.
 
SELECT LOG_MODE FROM V$DATABASE

2. SHUTDOWN AND RESTART YOUR DATABASE TO MOUNT STATE.
 
SHUTDOWN IMMEDIATE


STARTUP MOUNT

3. ENABLE ARCHIVE MODE

ALTER DATABASE ARCHIVELOG.

4. OPEN YOUR DATABASE.

ALTER DATABASE OPEN

Wednesday, January 18, 2012

Introduction to Linux Security


There is a saying in the security world that the only truly safe computer system is one that is disconnected from the network, switched off and buried six feet under ground. The sentiment may be somewhat true but it is hardly a practical solution to the problems we face today in protecting servers and desktops from outside intrusion.
There are more computer systems connected to the internet either directly or via local area networks than at any time in the history of technology and the numbers are growing at a rapid rate. It seems that not a month goes by without another story in the news about the internal network of a major corporation being compromised by an intruder. 
The simple fact is that there really is no such thing as a truly secure system as long is it is connected to a network. If the large corporations with expensive firewalls and talented IT staff can’t always stop criminals from breaking in what chance do the rest of us have?
Fortunately all is not lost and we do not have to pull the network cables out of the back of our computer systems. With careful planning and system configuration it is quite possible to create a secure environment that will cause the hacker to move on to the next, easier target without rendering the entire system useless. 

Introduction to Computer Security


What is computer security?

Security is risk management. - unknown
"A computer is secure if you can depend on it and it's software to behave as you expect" - Practical UNIX and Internet Security
Security is: availability, consistency, access control, data confidentiality, authentication. - http://www.sun.com/security/overview.html
"The principal objective of computer security is to protect and assure the confidentiality, integrity, and availability of automated information systems and the data they contain." - http://csrc.nist.gov/publications/secpubs/cslaw.txt
There are numerous definitions for "computer security", and most of them are correct. Essentially computer security means enforcement of usage policies, this must be done since people and software have flaws that can result in accidents, but also because someone may want to steal your information, use your resources inappropriately or simply deny you the use of your resources.

Security Policy

A security policy is an expression of your organizations security goals. Security goals will vary greatly by organization, for example a software vendor is typically more concerned about the confidentiality and integrity of their source code anything else, while a pornographic website is probably more concerned about processing credit cards online. There is an immense amount of security technology available, from software and hardware to specific techniques and implementations. You cannot properly implement the technology without a solid idea of what your goals are. Do home users connecting to the office need to use VPN software? If your security policy states that all file and print transfers must either be encrypted or sent across a "trusted" network then the answer is probably yes. What authentication methods are acceptable for services that can be reached from the Internet? Do you require strong passwords, tokens, biometric authentication, or some combination? The data you collect from remote sites, is it more important that this data is collected, or is it more important that this data remain secret? Data that is remote weather telemetry is probably not as sensitive as credit card numbers.
Some security policies will need to be exceptionally broad and general, for example the security policy for JANET, the academic backbone network for England states:

Monitoring and Enforcement
19. It follows from the policy of cascaded responsibility backed up by written site agreements, that there must be some method for UKERNA to enforce the possible disconnection envisaged by the AUP, and to provide full access and assistance to law enforcement agencies where necessary.
20. The JANET-CERT has therefore been given the responsibility (in conjunction with UKERNA) to
  • Monitor use of the network, as far as is possible while respecting privacy, either in response to information about a specific threat, or generally because of a perceived situation
  • Require a primary site, through its nominated contact, to rectify any omission in its duty of responsibility
  • Where a site is unable or unwilling to co-operate, report the issue to UKERNA and initiate the procedure for achieving an emergency disconnection
  • Obtain evidence and pass on information as necessary in order to assist an investigation by a law enforcement agency
  • Provide support and co-ordination for investigations into breaches of security
On the other hand a security policiy can be fine grained:
All internal email must be encrypted with PGP or GnuPG using a key of at least 1024 bits that is signed by an authorized signing entity.
Generally speaking the more detailed and technology oriented a security policy is the harder it will be to follow and keep up to date. The actuall technical details of implementing a security policy should be seperated from it. Keeping a seperate set of best practices or an actually "implementation of security policy" document is a better idea then rolling it all into the security policy.

Acceptable Use Policy

Another component of computer security is an AUP (Acceptable Use Policy). This is a document that sates what a user of your resources may or may not do with them. Typically it is part of a contract and is signed at the time when the services are purchased. Many acceptable use policies generally forbid actions that are illegal, potentially annoying to other people (and hence likely to cause problems for the provider inthe form of complaints) or are controversial (such as pornography). Other standard clauses include "this notice may change at any time without warning" and "we can terminate your service (or fire you) at any time without warning if you violate this policy. Generally speaking the majority of AUP's are reasonable and will not be a problem for normal users. These are a good compliment to a security policy as they set out in concret terms what a user is or is not allowed to do, and as they are often part of a contract it allows a provider to enforce their security policy when a user attempts to violate it or has violated it.

Privacy Policy

Privacy policies are interesting in that they are supposed to prevent an organization 9typically a company) from violating some aspects of a user's security (specifically the confidentiality of their information). Unfortunately the majority of privacy policies contain clauses like "this policy may change at any time without warning" or are simply discarded when a company decides to profit off of a user's information (such as name, address, credit card details, purchase history, etc.).

Security is a process

You only need to make one mistake or leave one flaw available for an attacker to get in. This of course means that most sites will eventually be broken into. Witness the effects of Code Red, an Nimda, both of which were hugely succesful exploiting well known and long solved vulnerabilities in the Microsoft IIS server. Regularily apply patches (after testing them). Regularly scan your network for open ports. Regularly scan your servers with intrusion testing software such as Nessus. Audit file permissions and make sure there are no unexpected setuid or setgid binaries.

Defense in depth

All technical security measures will eventually fail or be vulnerable to an attacker. This is why you must have multiple layers of protection. Firewalls are not enough, you may accidently forget a rule or leave yourself exposed while reinitializing a ruleset, use tcp_wrappers to restrict access to services as well where possible. Restrict which users can access these services, especially if only a few users need access. Encrypt traffic where possible so that attackers cannot easily snoop usernames and passwords or hijack sessions. Since security measures will fail you also need a strong audit and logging process so that you can later find out what went wrong and how bad it is.

Technical problems

These are just a handful of thousands of specific technical problems facing security administrators.

Network Connectivity

One of the biggest security challenges is the increase in network connectivity. If you have a machine that is not connected to any other machines an attacker will generally need to gain physical access. This of course greatly narrows down the number of attackers. However with everything connected to the Internet there are over 100 million people that can potentially get into your machine.

Insecure defaults

This is one of the problems that has caused no end of security problems since day one. Vendors typically ship their operating systems with insecure defaults (i.e. finger, telnet, ftp, etc.) meaning that administrators must expend a lot of effort to close security problems before they can even start to pro-actively secure their systems and networks.

Legitimate access vs. a break in

Because you must grant legitimate users access to resources there is always the potential for attackers to gain access. Attacker can guess authentication credentials (i.e. weak passwords), steal them (password sniffing), exploit flaws in the server itself and so on.

Minimizing access and privilege

When possible restrict access. If you do not need to run fingerd turn it off and remove it. An attacker cannot exploit fingerd if it isn't present. Keep users off of servers if possible, if they need shell accounts for some reason setup a separate system and partition it off from the rest of your network. Lock down workstations where possible, set BIOS passwords, secure the boot sequence, do not give them administrative access.