Why have Apple removed Telnet and FTP, yes they are old, yes they are insecure. For remote management you should be using SSH and for file transfers you should be using SFTP or FTPS. However what if I want to telnet to a mail server on port 25 and test email flow? What if I need to connect to a Cisco switch that does not have a K9 operating system, and only supports Telnet?
-bash: telnet: command not found
-bash: ftp: command not found
Well I can install Secure CRT, (or use the Excellent Royal TSX.) But, I’m stuck in my ways and want it back where it belongs, i.e. in my Terminal Window!
ThinApp is an “Odd” VMware product, insofar as it’s got nothing to do with virtual machines or virtual technology. It’s a product that turns applications into “Stand alone” thin applications, that can be sent to a user and ran without the need for that user to have administrative access, or the need to install anything.
ThinApp was a product called Thinstall that VMware purchased and “re-badged”, you get a free copy with VMware View 5 (Premier Edition). And it ships with a copy of VMware workstation. (Not because it needs a copy, but VMware recommends you use a clean virtual machine to create your ThinApps on).
If you’ve ever used sysdiff in the past or Novell Zenworks for Desktops, you will be familiar with the process, take a ‘scan’ of a clean machine, then install application(s), then carry out another ‘scan’. The software then works out the ‘difference’ and uses that information to build a software package.
In the example below I’m going to create a stand alone version of Google Chrome, that is pre configured, and has Java already installed, and finally deploy that as a single executable file.
Solution
1. It’s recommended that you create your ThinApp on the oldest operating system that it might be deployed on, so here I’m creating a virtual machine in VMware workstation that’s running Windows XP.
2. When built remove any hardware that will not be needed, like the floppy drive, and the USB Controller (Edit > Settings).
3. Installing ThinApp is pretty straightforward, simply run the executable and follow the on screen prompts the only thing to note is; when you enter your licence key, be aware the name you enter will display on the “splash screen” as your ThinApp loads (as shown).
4. Once your reference machine is setup, take a snapshot of it, so you can roll back to this point to create further ThinApps on this clean machine (VM > Snapshot > Take Snapshot).
5. Run the ThinApp Setup Capture > Next > Prescan > This will take a few minutes > When finished simply minimise the window you are finished with it for now. Note: Don’t worry if the application you are installing requires a reboot, ThinApp is clever enough to cope with that.
6. Now install and configure the application you require, in this case Google Chrome. I’m also installing Java, and setting the default homepage to the Google search page.
7. When the application is installed to your liking, maximise (or open the capture if you’ve rebooted) and select ‘Postscan’ > OK.
Note: Before running Postscan make sure you delete any installer files downloaded, any icons from the desktop you do not want deployed in the ThinApp, and empty the recycle bin (you don’t want all that stuff captured, when creating your ThinApp).
8. Make sure only the executable you require is ticked as an entry point > Next > At the Horizon App Manage Page > Next.
9. In a domain environment you can restrict ThinApp access to particular users or groups > Next.
10. Set the isolation mode as required, for most cases it will be ‘Full’ > Next.
11. Select the option to store the sandbox in the user profile > Next > Select whether you want to provide statistics to VMware > Next.
12. You will see this screen ONLY of you are capturing a browser. This is used if you have a particular website that will only run in IE6, or Firefox etc. So that only when URL’s enters listed here are accessed (either directly or from a hyper link) the ThinApp browser will open them, all other URL’s will be opened by the default browser. It’s a cool feature but not one I’m using > Next.
13. Give your ThinApp a name > Next.
14. I’m choosing the option to embed everything into my executable, selecting this may cause a warning about icons, but I ignored and deployed with no problems > Save.
Note: You can use this page to create an MSI file to deploy via group policy if you wish.
15. After ThinApp generates the files it needs > Build.
16. Finish
17. Heres my ThinApp executable file.
18. To test I’ve copied it to a Windows 7 machine.
19. While it’s loading this is what you will see.
20. And here is my ThinApp version of Google Chrome running and pre configured.
Related Articles, References, Credits, or External Links
The last time I wrote about deploying applications with ThinApp, it was geared towards getting standalone applications onto client PC’s for non admins to run, or putting them in a network share. But if you have a portable application the advantage is you can run it from portable media (Like a USB drive).
Like before I’ll convert Google Chrome to a ThinApp, but the difference is I will set the applications ‘sandbox’ to live in the same location (on the USB). Then I’ll try it out on a different machine.
Solution
1. It’s recommended that you create your ThinApp on the oldest operating system that it might be deployed on, so here I’m creating a virtual machine in VMware workstation that’s running Windows XP.
2. When built remove any hardware that will not be needed, like the floppy drive, and the USB Controller (Edit > Settings).
3. Installing ThinApp is pretty straightforward, simply run the executable and follow the on screen prompts the only thing to note is; when you enter your licence key, be aware that the name you enter will display on the “splash screen” as your ThinApp loads.
4. Once your reference machine is setup, take a snapshot of it, so you can roll back to this point to create further ThinApps on this clean machine (VM > Snapshot > Take Snapshot).
5. Run the ThinApp Setup Capture > Next.
6. Prescan > This will take a few minutes > When finished simply minimise the window you are finished with it for now. Note: Don’t worry if the application you are installing requires a reboot, ThinApp is clever enough to cope with that.
7. Now install and configure the application you require, in this case Google Chrome. I’m also installing Java, and setting the default homepage to the Google search page.
8. When the application is installed to your liking, maximise (or open the capture if you’ve rebooted) and select ‘Postscan’ > OK.
Note: Before running Postscan make sure you delete any installer files downloaded, any icons from the desktop you do not want deployed in the ThinApp, and empty the recycle bin (you don’t want all that stuff captured, when creating your ThinApp).
9. Make sure only the executable you require is ticked as an entry point > Next.
10. At the Horizon App Manage Page > Next.
11. In a domain environment you can restrict ThinApp access to particular users or groups > Next.
12. Set the isolation mode as required, for most cases it will be ‘Full’ > Next.
13. As you are storing the App on USB I’d suggest (though you don’t have to) set the application to save its sandbox in the same directory.
14. Select whether you want to provide statistics to VMware > Next.
15. You will see this screen ONLY if you are capturing a browser. This is used if you have a particular website that will only run in IE6, or Firefox etc. So that only when URL’s entered, listed here, are accessed (either directly or from a hyper link) the ThinApp browser will open them, all other URL’s will be opened by the default browser. It’s a cool feature but not one I’m using > Next.
16. Give your ThinApp a name > Next.
17. I’m choosing the option to embed everything into my executable, selecting this may cause a warning about icons, but I ignored and deployed with no problems > Save.
18. After ThinApp generates the files it needs > Build.
As it’s one of the most popular repair tools, it’s not uncommon for the writers of these pieces of malicious code, to actively block the installation of Malwarebytes. So the publishers of Malwarebytes have come up with a solution called Chameleon.
Solution
1. Head over to the Malwarebytes download site > For Home > Other Tools.
2. Download Chameleon.
3. The files will come down in a zip file > Extract them > Locate the Chameleon.chm file and run it.
4. You can now attempt to install Malwarebytes by using the install options presented, start with the first and work your way down.
5. When running, a command window will open, and ask you to press any key > It will see if the software is installed, if not it will download and install it.
6. Then it will update the software with the latest definitions.
7. When complete the software will start and begin a scan.
Related Articles, References, Credits, or External Links
‘Outlook blocked access to the following potentially unsafe attachments‘
KB ID 0000058
Problem
Yes it is annoying, someone tries to send you a copy of an program, a database r you are the one doing the sending, and your Outlook client blocks it, but this is done for a good reason. Microsoft have classified 39 different file types as being “dangerous” to your system and have categorized them into two levels. Level 1 files are blocked completely, and level two files show up as an icon in your Email but when you try to open them outlook forces you to save them.
If your reading this the chances are you are having problems with Level 1 blocked files?
Level 1 Blocked Files
.ade Microsoft Access project extension .adp Microsoft Access project .bas Microsoft Visual Basic class module .bat Batch file .chm Compiled HTML Help file .cmd Microsoft Windows NT Command Script .com Microsoft MS-DOS program .cpl Control Panel extension .crt Security certificate .exe Program .hlp Help file .hta HTML program .inf Setup Information .ins Internet Naming Service .isp Internet Communication settings .js JScript file .jse Jscript Encoded Script file .lnk Shortcut .mda Microsoft Access add-in program .mdb Microsoft Access program .mde Microsoft Access MDE database .mdz Microsoft Access wizard program .msc Microsoft Common Console Document .msi Microsoft Windows Installer package .msp Windows Installer patch .mst Visual Test source files .pcd Photo CD image/Microsoft Visual Test compiled script .pif Shortcut to MS-DOS program .reg Registry entries .scr Screen savers .sct Windows Script Component .shs Shell Scrap Object .url Internet shortcut .vb VBScript file .vbe VBScript Encoded Script file .vbs VBScript file .wsc Windows Script Component .wsf Windows Script file .wsh Windows Script Host Settings file
OK so now you know WHY your files have been blocked, you need to decide what you are going to do about it.
Solution
The simplest option is to get the files “Re-sent” and change the file extension to something that wont be blocked (like .txt for example) OR put your files in something else like a 7-Zip or WinZIP file and send them.
If you want to disable the feature completely read on…..
Outlook Express (Blocks Attachments)
1. Start Outlook Express.
2. On the Tools > Options.
3. Click the Security tab, click to clear the Do not allow attachments to be saved or opened that could potentially be a virus check box under Virus Protection, and then click OK.
Outlook 2013, 2010, 2007, 2003, 2002, and 2000 (SP3) Blocking Attachments
1. Windows Key +R > Regedit {enter}
2. Navigate to;
[box]HKEY_CURRENT_USER > Software > Microsoft > Office > {version} > Outlook > Security[/box]
NOTE for each version of Outlook, the number in the registry path is different.
Outlook 2000 (SP3) 9.0
Outlook XP/2002 10.0
Outlook 2003 11.0
Outlook 2007 12.0
Outlook 2010 14.0
Outlook 2013 15.0
In NEWER Versions of Outlook you will need to manually create the Security key.
3. Right click in the right Pane and select New > String Value.
4. Call the new string Level1Remove.
5. Now you need to tell the registry what you want to allow through, and you need to do it for EACH file extension you want to let through, for this example I’m going to let through executable programs, and MS Access Databases. Double click the Level1Remove string you just created.
NOTE: You need to type every extension (preceded by the full stop) and separate each with a colon (no spaces).
7. When you are done, click OK and close the registry editor.
Related Articles, References, Credits, or External Links