Monday, September 28, 2009

September User Group Meet @ Digiterati

The September meet of the Digiterati Microsoft  User Group Chennai on Microsoft Exchange Server 2010 was a Success with a good turnout. The participants have given a good feedback which shall as usual serve as motivation for us to do better. Most of them have stated that the meet was an eye opener as they where not aware of this product before.

They have put forward a request for more such sessions which I promised shall be held with the active support of Digiterati. I also reminded them that this was our third successful meet the previous ones focusing on Windows 7 & Windows Server 2008 R2.

A couple of pictures from the event:

While I was inclined to do “Unified Communications” as the topic for next month, the User community has indicated it’s preference for a session on Sharepoint Server, so the topic for for the next User Meet on October 25th shall be SharePoint Server.

Wednesday, September 23, 2009

Disable Ipv6 on a Vista/Windows 7/2008 Server/2008 Server R2 machine

Ipv6 is definitely one of the best things to happen on the  Internet, but there are a lot of companies and scenarios where you may need to disable Ipv6 as it is not needed on your network. For example on a small network there may be no need for Ipv6 but if you use Vista/Windows 7 with Server 2008 R1/R2 you will find that Ipv6 is on and configured by default. This can result in situations where the Server Operating System keeps telling you that you do not have a static interface on all your Network Interface Cards because of  Ipv6, especially when you want to add roles like Active Directory, Domain Name Service. Windows does allow us to disable Ipv6 to get around this issue.

What you need to disable Ipv6 is to take the following steps:

  1. Log in using an Administrative Account.
  2. Click on start if you have a basic interface else click on the Windows button at the bottom left of your screen and type “regedit” in the SartSearch box without the quotes.
  3. If the User Account Control dialog box pops up click on Continue
  4. This will launch the registry editor
  5. In the Registry Editor, Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\
  6. If the DisabledComponents entry is unavailable, you must create it. To do this, follow these steps:
    1. In the Edit menu, point to New, and then click DWORD (32-bit) Value.
    2. Type DisabledComponents, and then press ENTER.
    3. Double-click DisabledComponents.
    4. Double-click DisabledComponents to modify the DisabledComponents entry.
  7. Else just double click DisabledComponents to modify the entry.
  8. Depending on what combination you require you can set the following Hexadecimal Values.
Value Effect
0×1 Disables all tunnel interfaces
0×2 Disable 6to4
[ipv6 to ipv4 conversion]
0×4 Disable ISATAP [Intra-Site Automatic Tunnel Addressing Protocol]
0×8 Disable Teredo [a tunnelling  protocol]
0xA Disable Teredo and 6to4
0×10 Disable all LAN and PPP interfaces
0×11 Disable all LAN, PPP, and tunnel interfaces
0×20 Prefer IPv4 over IPv6
0xFF Disable IPv6 over all interfaces and prefer IPv4 to IPv6

Friday, September 18, 2009

Virtual Machines

3. Virtual Machines [VM]: A virtual machine is a way of using one set of hardware to run multiple operating systems. This enables us to use the hardware more efficiently. VM’s allow a company to save money that is spent of new hardware more effectively. Let us imagine a couple of places where this might be useful.

a. A company provides tech support for multiple operating systems where the support personal need to work on all Operating Systems at the same time without shutting down/restarting the OS as the time taken to do so is not productive.

b. A company is developing software and needs to test the product on multiple Operating Systems

c. A person like me who likes to check out multiple operating systems and how they differ at home with just one machine

In all these situations, it is far cheaper to use virtual machines that work by creating virtual containers that can run operating systems inside them. Note all these containers are actually using the same hardware.

This can be implemented in different ways,

a. You install an operating system [mine is Microsoft Vista] on your computer; you then install a VMM or Virtual Machine Monitor like Virtual PC/Virtual Server/VMware Player, etc. This enables you to create/run virtual machines by allocating RAM, Hard disk space etc to the virtual machine. You can now install an OS on this machine and start using it. The advantage of this approach is that you can do this on your existing computer provided you have a decent processor and lots of hard disk space and RAM. You can usually run three or four machines easily if you have 2 GB RAM. Another advantage of this approach is that we use the operating system that we load into the virtual machine “as is” or without changing it. This allows us to run almost any operating system including new versions directly. This is because each machine in the virtual container thinks that it is the only one running on the hardware and thus does not have any problems. The disadvantage of this method is that there is a host OS on which my VMM is installed and then there are the guest operating systems that run over that thus leading to higher processor usage and some amount of delay in responses.

b. The other way of running multiple operating systems on the same machine is to use a VMM but where the operating systems know that they are not, the only Operating Systems using the hardware and that it does not have complete control over the system. This is done by modifying the OS kernel and rewriting it to support virtualization. The advantage of this approach is that the OS works faster and makes better use of the VMM. The disadvantage of this approach is that you cannot use it on any OS but only on those that have been modified to work with the VMM. This results in higher development costs and a delay before an OS can be made available for use. E.g. Denali, etc

c. User Mode: This is a type of virtualization found mostly in Linux Operating Systems. In this method the entire OS runs as an application inside the host OS. Thus it runs at the level of the user and provides excellent security and safety to the host OS. There are some versions that can do the same in windows using a VM tool called Qemu. The type of virtualization used by Qemu is called OS level virtualization or hosted virtualization it is fast as it uses the host to process instructions just like any other application.

d. Hardware Assisted/based Virtualization: Till now we have seen different ways in which virtualization is implemented using software. Now we see a method were the hardware can by design run multiple operating systems at the same time. This means you can use only new hardware [Virtualization capable hardware was available for everyone only in 2007 when it was based on the X86 architecture]. The advantage of this approach is that the VMM runs directly on the Hardware eliminating the need for a host OS. This alone improves the machine speed drastically. Also since the Hardware supports and runs Virtualization it should be possible to isolate and upgrade hardware containers without shutting down all Operating Systems. Microsoft [MS Hypervisor]and VMware [ESX Server]

e. Hybrid Virtualization: Last but not least is hybrid virtualization where the VMM is installed on the host OS but has some layers that work below the OS directly with the hardware. This results in the advantages of being able to run any OS inside a VM while at the same time taking advantage of direct hardware interaction where possible. This is seen in VMM’s like Virtual PC, VMware Server, etc.

f. Desktop virtualization: Opps, I almost forgot this one. Desktop virtualization is like a thin client in the sense that it allows a user to login to another computer/server and use it as if the user was in front of the server/computer, the difference is that unlike a thin client that has only a keyboard/mouse and a monitor connected on a LAN, in desktop virtualization the desktop is accessible from anywhere including other computers, like in a remote desktop or terminal services session. This has now become even more advanced with the introduction of web 2.0 based online desktops that you can access from anywhere as long as you are connected to the net like myGoya

Encapsulation

Technorati Tags: ,

Click here for the beginning of this series 

2. Encapsulation: Encapsulation is from Encapsulate meaning to cover or wrap. This is the process of hiding the complexity of a resource by using a simple interface. This can be seen on our computers all the time as we use the operating system[OS] or an application without actually keying in commands and data in the form of 0’s and 1’s which is the only thing a computer actually works with due to the fact that 0 is the off state and 1 the on state. The operating system does this using a layer that sits between the actual hardware and the applications/other parts of the OS. This allows us to run a program written for windows on any machine running on the windows OS in spite of the motherboard, processor, and other hardware components being different; this is also called Hardware Abstraction. Since the interaction is confined to the user interface or the Applications Programming Interfaces [API] there is less complexity. Another example would be how the Java Runtime Environment [JRE] creates the same “container” inside multiple Operating Systems enabling a Java developer to write a program that can run on any OS platform.

Virtual Reality

Click here for the beginning of this series 

 

1. Virtual Reality [VR]: As stated above it can be used to create a world that is not real for say conducting major calculations that we could not otherwise achieve like modeling/creating a new drug molecule, or predicting the result of a nuclear explosion, showing a client how they will look after cosmetic surgery, or when they were a new garment/eye ware, show customers around a VR house that you could build for them, show anyone around a tourist spot right at their homes [e.g. IBM/Palace Museum in Beijing, China project on the Forbidden City] or a virtual world like in Secondlife.

Virtualization

Technorati Tags: ,

The word virtualization is derived from the word virtual, which refers to anything that is not real. As you can see in the world of Information technology, we use this word in multiple ways to denote different things based on what they are used for. Thus, we have VIRTUAL REALITY, which stands for a computer generated immersive environment that is seen/experienced using a computer and its specialized equipment. I have mentioned virtual reality first as it is one of the most exciting uses of virtualization and because it helps to underline the difference between reality that we experience everyday and the virtual reality that is the exact opposite.

Now let us move on and see some other places where we use this process of virtualization.

Do I need to have/buy a 64-Bit Computer

There has been a lot of talk about 64-bit computers especially now that 64-bit hardware is readily available in the market today. There have however been some issues that have been preventing people from going in for the 64-bit platform these issues happen to be issues relating to compatibility issues related to drivers, applications, Operating System availability and support etc. If you are buying a new computer now the situation has changed drastically compared to just a few months ago as you have more support for 64-bit operating systems and especially in the case of Windows you do have 64-bit edition of Vista which can be used along with the wide range of hardware that come with signed 64-bit drivers, this takes care of the driver based incompatibility issues. Application compatibility is still an issue that is addressed by Microsoft using the built in WOW [windows on windows] this does help you to run 32 bit applications but is slower than running 32 bit applications on a 32 bit machine, but having said that with the increasing number of 64 bit applications available it does make sense to buy a 64 bit machine with a 64 bit Operating System and take advantage of the higher levels of security provided. 64 bit drivers are digitally signed and of a far higher quality compared to unsigned 32 bit drivers this means less blue screen of death issues. 64 bit hardware has support for DEP or Data Execution Prevention that is currently provided using software means in 32 bit windows versions.With support for higher data transfer rates, more than 4GB RAM and the availability of Microsoft Office 2010 in both 32bit & 64 bit versions, it does make more sense to move up to the 64 bit platform as early as possible as most of the initial issues have been sorted out and it can only get better from here.

Enable Task Manager

I was thinking about my students issue refer disabling  “Active Desktop” and remembered that when I saw a machine infected with a Virus which not only changed the desktop to “Active Desktop” but also disabled the “Task Manager”. The Task Manager is a windows tool that allows you to see all the tasks/programs that are running on your machine and disable/kill those that you have problems with. No wonder Malware tends to disable this tool that is built into Windows.

In case you are stuck with such a problem all you need to do is to run regedit and navigate to “HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System” and create a “REG_DWORD” called “DisableTaskMgr” and set the value to “0” this would enable the Task Manager” if you need to disable the Task Manager just set the value to “1”

Please note that if you are trying to use this at your office, it will not work in a domain environment, as domain policy will take precedence over local settings. If you are the Domain administrator just Enable or Disable Task Manager using the built in Group Policy Editor or gpedit.msc for individuals systems or do it in domain policy to set it up for the entire network.

Do note that you will find the settings under User Configuration –> Administrative Templates –> System –> Ctrl+Alt+Delete options –> Remove Task Manager and set the value as given above.

Disabling “Active Desktop”

One of my students scraped me on orkut today that he had a very slow system caused by “Active Desktop” being enabled. Well in case you do not know “Active Desktop” is a feature in windows that allows the user to set a webpage as a wallpaper, as the wallpaper is a webpage you can run all most all the scripts that you can run on a website. This makes it a preferred way to target your systems. [of course this method is old and is not very popular these days. ] but if you are stuck in a situation where you are unable to disable your "Active Desktop" you can run regedit and go to "[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]"
Create a new Value Named NoActiveDesktop set
Data Type to REG_DWORD (DWORD Value)" and enter a value of 1. You can now close regedit if necessary restart the computer, “Active Desktop” will be disabled. in case you need to activate it just navigate to the same place and change the value to “1”