February 19, 2009

How do I … install KDE applications on Windows?

  • Date: December 9th, 2008
  • Author: Jack Wallen

With the help of Wine you can install Windows applications on Linux. But what if there are Linux applications you want to run on Microsoft Windows? Say, for example, you want to use Dolphin for your file manager instead of Windows Explorer. Thanks to a group of KDE developers, it’s possible.

Now don’t get overworked thinking you’re going to have the entire KDE workspace. You’re not. What you can get, however, is a lot of the KDE-specific applications up and running on Windows (2000, XP, and Vista). And many of these applications are integrated within themselves (so when you click an image in Dolphin, Gwenview automatically opens to display the image).

What is nice about KDE on Windows is that the aim of the project, since inception, is to create these applications as native ports. So there is nothing like Cygwin acting as a middle-layer to help run the KDE applications. This helps tremendously in keeping memory and CPU usage down to a minimum.

At this point I should warn you, some of the applications do not work perfectly. Take for instance Konqueror. Konqueror works perfectly as a file manger, but as a Web browser it is somewhat slow and prone to bugs. But it does work in both functions. Another application, Amarok, is unstable to the point of not being usable yet. That is not a problem; you can simply deselect the unstable applications during installation.

With that said, let’s get on with the installation.

This blog post is also available in PDF format in a TechRepublic download and as a TechRepublic Photo Gallery.

Getting and installing

The installation of KDE on Windows isn’t difficult, but it is time consuming. Fortunately much of this time is not interactive (so you can step away from the machine and get some work done). The first thing you need to do is download the KDE installer. Once the installer has finished downloading, double-click the .exe file and the installation will begin.

The first step in the installation is to select the Installation directory (Figure A).

Figure A

The default installation path is probably the best choice.

The next step is to choose the Install Mode (Figure B). The purpose of this is to dictate to the installer application if the installation is for an end user or a developer. If you are not planning to do any developing for KDE on Windows, your best bet is to select the End User option.

Figure B

If you select Development Mode you will also have to select a Compiler mode.

It’s very important that you select the proper Compiler Mode (if you plan on doing a Developer installation). Once you make your selection and install, you cannot change the compiler type without uninstalling and reinstalling. You can, of course, do another install and just install KDE into a different path on your hard drive. This will allow you to run different types of compilers on different installs.

Since most of you will not be doing a developer installation, we are going to continue on with an End User installation.

The next step is to configure a local storage location (Figure C). This local storage directory will be where all downloaded files are retained for the installation process.

Figure C

There shouldn’t be any reason you would need to change this directory.

Now it’s time to configure Internet settings (Figure D). This is necessary because the installer has to download everything it needs, so it must know how to get to it.

Figure D

If you are behind a proxy server, the installer will fail if the proxy is not configured here.

Along with the Internet connections configuration, you have to select a download server (Figure E). Naturally you will want to select the closest in proximity to your machine.

Figure E

Of course, even if the server is near you, that doesn’t always mean you will have the best speeds.

The next step is to choose the release you want to install (Figure F). As of this writing there are only four choices: 4.1.0, 4.1.1, 4.1.2, and 4.1.3. Installing 4.1.3 will bring you closest to the latest features of KDE 4.

Figure F

You can always go back and install other releases by installing them in different folders.

The next step is the final configuration in the installation. You now have to select the packages you want to install. As you can see in Figure G, I have opted to not install the unstable packages as well as the various language packages.

Figure G

Unless you have a need for the various language packages, not installing them will save a good deal of time during the installation.

The next window (Figure H) serves only to inform you what additional packages will be installed, based on your package selection. These are all dependencies (libraries, etc).

Figure H

You cannot deselect any of these packages.

Finally the installer will begin to download all packages necessary for the installation. In my case there are 50 packages to install (Figure I).

Figure I

Go work on that Apache server because you’re going to have the time.

Once everything has been downloaded, the installer will automatically compile and build the applications. When all is complete you will be greeted with a window (Figure J) informing you the installation is complete.

Figure J

Click Finish and you’re ready to rock the KDE way.

With the installation complete, there is no need to reboot. You are ready to take a peek at the KDE applications you now have installed on your Windows machine.

inexpensive cialis class=”entry” align=”justify”>A quick glance

One of the most welcome applications is the Dolphin file manager. I have never been a huge fan of Explorer, so having a Linux file manager is a welcome addition. To get to Dolphin you only need navigate to the KDE submenu in the Start menu. If you installed KDE 4.1.3 the menu entry will be titled “KDE 4.1.3 Release.” Within that submenu you will find a number of child menus (Figure K).

Figure K

You will notice as you navigate through the KDE menus that anything regarding the desktop is missing.

In the System submenu you will find the entry for Dolphin. Load Dolphin to see just how well the KDE applications have been ported to Windows. Figure L shows Dolphin in action.

Figure L

As you can see Dolphin contains many of the standard KDE features.

Like much of the KDE-ported applications, Dolphin works exactly as expected. The only feature I have yet to be able to take advantage of is connecting to a network connection. I have attempted to connect Dolphin through SSH (with the help of Putty) but have yet to have any luck. Outside of that small issue, Dolphin makes for an outstanding replacement for Explorer.

Final thoughts

There are many reasons why you would want to install KDE on Windows. And I am confident that eventually the developers will manage to port the entire desktop experience onto Windows. At this point, I can’t see any reason to run the standard Windows desktop.

Give KDE on Windows a try. Even if you find only one application that you use regularly, it will be worth the effort.

Permalink • Print • Comment

10 security tips for Microsoft Windows XP

  • Date: November 4th, 2008
  • Author: Chad Perrin

When installing and using MS Windows XP, there are some security practices you should keep in mind.


There are general security tips that apply to all operating systems, of course, but each operating system platform provides its own security challenges. The following tips are tailored to Microsoft Windows XP.

  1. Disable dangerous features. Microsoft Windows systems come with a number of features enabled by default that do little or nothing for convenience, but introduce significant security risks. Among these are Autorun, the Guest account, and even Automatic Updates — because letting someone in Redmond, WA decide when changes should be made to your system, when he has no idea what software you’re running and you haven’t tested the updates yet, is a bad idea. Microsoft Windows provides many features that are activated by default and either poorly conceived from a security perspective or, at best, unnecessary for the vast majority of users. Each of these features introduces its own risks, and any that you do not need should be deactivated.
  2. Disable unneeded services. In addition to local operating system features, you should disable unneeded services. Almost exactly one year ago, my article 10 services to turn off in MS Windows XP provided a brief checklist of services to turn off — or to ensure you know why you’re leaving them on, at least. The list is not comprehensive, of course, but it is a good start.
  3. Employ good email security practices. Make use of some basic email security tips to ensure you do not invite the bad guys to read your email, flood you with spam, and take advantage of you through phishing techniques.
  4. Install and maintain malware protection software. Regardless of the reason for it, the fact remains that malware is a significant threat to Microsoft Windows systems, and running one without malware protection is irresponsible. Research your options for antivirus and antispyware how to get cialis without prescription protection carefully, and choose well. Don’t let your malware protection software’s signature databases get out of date because the software only protects against the threats it can recognize, and don’t rely on your choice of antivirus software from six years ago because there’s no such thing as a trusted brand.
  5. Update more than just MS Windows. In the world of Microsoft Windows, the majority of the software most people run on their computers often comes from third-party vendors without any connection to Microsoft’s own software distribution channels. This means that when you install something like Adobe Photoshop or Mozilla Firefox you have to track security updates for these applications separately from the operating system. Just getting your Microsoft updates every month doesn’t always cover it — sometimes some third party application needs to be updated, too. You need to keep track of what’s installed and whether or not it has received any updates if you want to maintain security for your system, because security goes beyond the core operating system.
  6. Research and test your updates. It’s important to keep your system updated so that security vulnerabilities that receive patches from Microsoft and other software vendors will not remain open to exploit. It’s also important, however, to ensure that you research and test your software updates before applying them to a production system. All too often, users and sysadmins discover that untested updates are a cure worse than the disease, as they break functionality, open additional vulnerabilities in the system, and even occasionally undo the benefits of previously applied updates. Others may have tested the updates, or have simply applied them and run into problems, so researching others’ experiences can help you plan for such issues as they arise; testing them yourself by installing them on a test system before doing so on your production system is a next necessary step to ensure that your system in particular will not develop problems as the result of a bad update.
  7. Investigate alternatives to your default application choices. Should you be using a Web browser other than Internet Explorer, such as Google Chrome, Mozilla Firefox, or Opera? Is the multiprotocol IM client Pidgin with the OTR encryption plugin a better option for your instant messaging needs — including security — than the native clients for AIM, MSN, Y!M, ICQ, and gTalk? The only way to be sure is to determine your own needs and make an informed decision. Don’t settle for default applications without knowing the consequences of that choice.
  8. Use a quality desktop firewall. Desktop firewalls are in many respects applications like any other, but they deserve special mention for MS Windows security. Furthermore, even Windows servers are in effect desktop systems, so don’t let the fact that a given computer is a “server” deter you from installing a good “desktop” firewall application on the system if you can spare the CPU cycles and RAM. On an actual end user desktop system, desktop firewall software is even more important. Relying on the defaults you get when you buy the computer is a good way to get your system compromised without even knowing it. The Windows Firewall provided with MS Windows after Service Pack 2 is certainly better than nothing, but one can almost always do better. Look into alternatives to the Windows Firewall, and select the option that best suits your needs.
  9. Research your options before assuming MS Windows XP is what you need. The same principles that apply to applications may also apply to operating systems. Different OSes can provide different security and functionality benefits. Are you really certain that MS Windows XP is the operating system you need? Have you investigated other alternatives? What about MS Windows 2000 or Vista? Have you checked into the possibility of MacOS X, FreeBSD, or Ubuntu Linux for a workstation? What about OpenBSD, OpenSolaris, or OpenVMS for a server?
  10. Protect yourself the same way you would with any other operating system. In last year’s article, 10 security tips for all general-purpose OSes, I laid out a list of security tips that apply for good security practice in the use of any general purpose operating system — including MS Windows.

Installing MS Windows XP is only the first step to using it. If you stop there, you’re likely to run afoul of the various security threats roaming the wilds of the Internet. Make sure you take care to configure your system to best protect you against the dangers that lurk around every corner.

Permalink • Print • Comment

How do I … tweak Windows Explorer to open in a directory of my choosing?

  • Date: December 3rd, 2008
  • Author: Mark Kaelin

In information technology and operating system terms, Microsoft Windows XP has been around a very long time. Over the years, TechRepublic has literally written thousands of tips, tweaks, tricks, and hacks in our article, download, and blog pages. One of my favorites is a quick and easy tweak that will change the behavior of Windows Explorer.

The directory/folder metaphor employed by Windows XP to organize files on a hard drive fits well with my natural tendency of hierarchical organization. My thinking pattern follows the general > less general > specific > most specific framework. So there are times when I want to see a particular folder hierarchy laid out before me in Windows Explorer.

This blog post is also available in PDF format in a TechRepublic download.

Tweak the displayed folder

The default display for Windows XP Explorer is to show the My Documents folder with all of its subfolders expanded and ready to be selected (Figure A).

Figure A

The default Windows XP Explorer view

There is nothing wrong with this view, but I don’t always generic cialis prices want to open Windows Explorer in the My Documents folder. I have access to, and the need to use, several different network folders during the course of a day. With a small tweak of the Windows Explorer Properties settings you can change which folder gets displayed and how that display is revealed.

To get to the Windows Explorer Properties dialog box, right-click the Windows Explorer shortcut. You can copy the shortcut in the Start Menu to your Desktop to make it easier to work with. I like to have several Windows Explorer shortcuts in my toolbar for easy access — each going to a different place.

When you right-click and go to Properties and click the Shortcut tab, you should see a screen similar to Figure B.

Figure B

The Windows Explorer Properties dialog box

The key box is the Target box. To change the Windows Explorer shortcut to open a specific folder of your choosing, change the Target box to read:

c:\windows\EXPLORER.EXE /n, /e, X:\Folder of my choosing

For example, the blog posts I write or edit are saved on a network drive (U) in a folder I have dubbed “Working Folder.” The Target box for this shortcut looks like this and the corresponding screenshot is shown in Figure C.

c:\windows\EXPLORER.EXE /n, /e, u:\working folder

Figure C

A new target folder

Now, when I click this Windows Explorer shortcut, I get the screen shown in Figure D.

Figure D

My working folder

Additional tweak

The tweak above shows my Working Folder and all the subfolders under it. But with a small additional tweak, I can get a Windows Explorer view that shows the Working Folder subfolders collapsed (Figure E).

Figure E

Working Folder with subfolders collapsed

This is a cleaner more concise look. To get this behavior, add the /select command to the Target box like this:

c:\windows\EXPLORER.EXE /n, /e, /select, u:\working folder

Your choice

You can apply this tweak to as many folders as you want. You can give them different icons and place them on your desktop or on your toolbar. This small tweak gives you great flexibility in how you interact with Windows XP.

Someone asked

In the attached discussion thread, there was a request for an explanation of the Windows Explorer in-line commands. I found a reference on Microsoft’s Help and Support pages:

  • /n: Opens a new window in single-paned (My Computer) view for each item selected, even if the new window duplicates a window that is already open.
  • /e: Uses Windows Explorer view. Windows Explorer view is most similar to File Manager in Windows version 3.x. Note that the default view is Open view.
  • /root: Specifies the root level of the specified view. The default is to use the normal namespace root (the desktop). Whatever is specified is the root for the display.
  • /select: Specifies the folder to receive the initial focus. If /select is used, the parent folder is opened and the specified object is selected.
Permalink • Print • Comment

Secure your computer after a Windows install or reinstall

  • Date: November 24th, 2008
  • Author: Alan Norton

If you read my article 10 things you should do before, during, and after reinstalling Windows you will be aware that I mentioned five ways to get the important updates and the latest Windows service pack and five ways to install the same. While writing the article it became apparent to me that there was a security risk immediately following a reinstall of Windows.

Microsoft recommends that you connect to the Internet to get the important security updates and service pack. But the catch-22 is that your computer is more vulnerable until the security updates are installed. That left me wondering if there was a better way to secure my PC when it was at its most vulnerable — immediately following a clean install.

The best and easiest solution would be to simply download the security updates before a reinstall. This cumulative self-executable security update file simply does not exist on the Microsoft download site. I’ve seen Microsoft security update files available for download at various Web sites, but this is one of the few times that a third-party solution won’t work. You simply can’t trust replacing your core system files to anyone but Microsoft.

So I set out to find a proactive way to secure my computer immediately following an install or reinstall. I detail five ways (Table A) to better secure your computer until all the important security updates can be installed. They range from simple to complex and from less secure to more secure. This document refers specifically to Vista, but the concepts apply to all versions of Windows.

This blog post is also available in PDF format in a TechRepublic download.

Five ways

Table A – The Five Vista Install/Reinstall Security Options

Option

Microsoft Approved

Update Type

Advantages

Disadvantages

Option

One

 

(Stand-alone)

Y

Manual

SP1

Only choice for stand-alone computers not connected to a network. No security issues other than with the applications you run. Does not install the latest drivers and updates.

Option Two

 

Windows Firewall and Defender

(default)

Y

Windows Update

Automatic. Latest drivers and updates downloaded. Exposes computer to attacks without security updates and SP1 in place.

Option Three

 

Windows Firewall and Defender

(default)

Y

Windows Update

 

Manual

SP1

Limits time connected to Internet before installing SP1. Requires exposing computer to attacks without security updates in place.

Option

 Four

 

Windows Firewall and Defender

(default)

N

Manual

SP1

 

Windows Update

Installs SP1 without having to connect to the Internet. Does not install the latest drivers and updates up front. A poor option if you have Vista-incompatible hardware.

Option Five

 

Firewall Application

Blocking

Y

Windows Update

More secure. Latest drivers and updates downloaded. Possible way to better secure Windows until SP1 and all security updates can be installed. More difficult to implement.

Options three, four, and five offer a more secure way to retrieve SP1 and the important update files. Option five is potentially the most secure and is the most difficult to implement.

Option one

Stand-alone computer users must follow this option. Since the computer will not be connected to a network, there are no online threats to worry about. You will still need to consider the risks involved when running any applications. The service pack, if any, will have to be installed manually.

Option two

This is the standard default option for Windows. Most of you have always used this option to update your PC following an install or reinstall.

If you select this option, you will have to rely solely on Vista’s built-in Windows Firewall and Windows Defender. The security updates you will be downloading fix known security vulnerabilities with Internet Explorer, MS Mail, and Windows Media Player. Until the security updates are installed, you should consider not browsing the Web, reading your e-mails, listening to MP3s, or starting any other applications that connect to the Internet.

Option three

The comments in option two also apply to option three. This option requires you to connect to the Internet to get the latest security updates. Then do a manual install of the latest service pack. By installing SP1 manually you reduce the amount of time you have to be connected to the Internet.

Option four

The comments in option two also apply to option four. Option four is similar to option three but installs the security updates contained in SP1 before having to connect to the Internet. By installing SP1 manually, you also reduce the amount of time you have to be connected to the Internet.

I have tried Option four, and it seemed to work well for me without any major problems, even though it is not Microsoft approved. I was able to experience firsthand some of the problems that can be experienced by manually installing SP1 prior to a Windows Update scan. Be aware that if you choose this option it is possible that any problems may require you to reformat the target partition and reload Windows from scratch again. You can also try manually installing SP1 in safe mode if you experience any problems.

Option five

This option involves configuring a firewall to block all network traffic except traffic to the Windows Update server. Actually implementing this requires advanced knowledge of the Microsoft Management Console (MMC) and the Windows Firewall with Advanced Security MMC snap-in or another third-party firewall that supports application blocking. To be honest, I tried to set up a new inbound rule in Windows Firewall with Advanced Security and gave up after a few hours of fruitless effort.

A good third-party firewall is an alternative option that may provide better security while Windows Update is busy retrieving and installing important updates. In the hands of the right person, a third-party firewall like Comodo Internet Security (CIS) is more secure than Windows Firewall and Defender. And third-party firewalls can solve the transparency problem that Vista’s firewall has.

If you are looking for a firewall for simple everyday protection or for easily creating inbound and outbound network rules, Comodo Internet Security fits the bill and then some. And the full-blown version with anti-virus protection and Defense+ is totally free.

If you do use a third-party firewall like CIS, you will have to understand how to properly configure the firewall and what application alert prompts to allow and which to deny. This is not the level of knowledge you can expect from the average user. Even tech pros can find using such a firewall challenging. You can dial back the settings in Comodo Internet Security but at the cost of reduced security.

How highly is Comodo Internet Security rated? The CNET editors rate it five stars. You can download the 32- and 64-bit versions from the Comodo Web site.

Installing CIS and not running any apps that connect to the Internet should safely secure your computer until all the important security updates are in place. If you want to lock down your network traffic further, it can be done using network rules, but you need to understand some firewall basics first.

Basic firewall theory

There are two ways that personal software-based firewalls fundamentally work. They can start with a solid wall in place, and specific network or application rules can be added that poke holes in the wall. Or they can start as a bare foundation, and specific network or application rules can be put in place to build the wall.

The first technique is used by most of today’s firewalls — and you can see why. If you are using the second type of firewall and you don’t build your firewall rules properly, you can let in uninvited visitors.

By using the first type of firewall you can create network rules to allow inbound/outbound network traffic. By default, a firewall of this type with no network rules will block all inbound and outbound traffic.

Using the second type of firewall you can create network rules to block inbound/outbound network traffic. By default, a firewall of this type with no network rules will allow all inbound and outbound traffic.

Comodo Internet Security implements the first type of firewall strategy. It can block or allow network traffic by:

  • Application layer
  • IP address
  • Port
  • Host Name
  • MAC Address

If you are new to firewalls and network rules, you will almost certainly be confused by in and out network connections and Source and destination computers. It is confusing. First, don’t think in or out. Think inbound connections generic cialis overnight delivery and outbound connections instead.

A good analogy is a telephone call. For an inbound connection call that you receive, the source is the phone making the call and the destination is your phone. For an outbound connection call that you make, the source is your phone and the destination is whomever you are calling.

In this analogy, the phone number is the IP address and the device receiving the call is the port. For example, you could have both a phone and a fax machine using the same phone number. OK, you probably don’t have more than one device, but you get the point. Remember this analogy when setting up your network rules.

Using Comodo Internet Security with Defense+, I developed a method to block applications and sent the script to Comodo for a sanity check. Comodo was kind enough to have their Senior Research Scientist look at my script. He sent me a method that is much better than my solution. It will block all Internet traffic to all applications except Windows Update, and you won’t even have to worry about any pop-up alerts. Here are the relatively simple steps that he sent me.

Make sure that your modem or the Internet cable is not connected to the Internet.

  1. Install CIS and restart the computer.
  2. Open the Comodo Internet Security status window.
  3. Click the Firewall icon at the top of the window.
  4. Click the Advanced button in the left pane.
  5. Click on the Network Security Policy link (Figure A).

Figure A

The CIS Network Security Policy Application Rules Window looks like this before you add any network rules.
  1. Click on the Windows Updater Applications entry and drag and drop it to the top so that it is the FIRST entry in the policy.
  2. Click the Add button.
  3. Click the Select drop-down button, then click Running Processes followed by System under Windows Operating System, and then click the Select button.
  4. Click the Use a Predefined Policy radio button, click the drop-down arrow, and choose Trusted Application. If there is already a rule entry for the system, it can be modified. Click the Apply button.
  5. Click the Add button again.
  6. Click the Select drop-down button and then click File Groups->All Applications.
  7. Click the Use a Predefined Policy radio button, click the drop-down arrow, and select Blocked Application if not already selected. Click the Apply button.
  8. Click the Apply button in the Network Security Window.

Be sure that the blocked All Applications rule created in steps 10-12 is the LAST entry. Double-check that the order of the rules in the Network Security Rules Window matches the order in Figure B.

Figure B

This is the CIS Network Security Policy Application Rules Window after we moved the Windows Updater Applications entry, added the trusted System, and blocked All Applications network rules.

Important! After all security updates and the latest service pack are downloaded and installed, the blocked All Applications rule created in the steps 10-12 must be deleted to allow the normal operation of the firewall. Highlight the network rule and use the Remove button to delete it. You can optionally also delete the trusted System rule created in steps 7-9.

You will need to disable Windows Firewall if you are installing a third-party firewall. Please read Installing and Configuring Comodo Internet Security with Defense+ for instructions on how to do this and for more information about how to install CIS.

Partition imaging

As it was so kindly pointed out to me more than once in the forum for the 10 things you should do before, during, and after reinstalling Windows article, an image of the Windows operating system can be made when you have it installed and configured the way you like. There is a legitimate and compelling reason to image your system after an install or reinstall. A system image can be created and used in the future to reinstall Windows with both the latest service pack and all security updates up to the image creation date already in place. And there is a way to do it with freeware — at least for owners of Maxtor or Seagate hard drives.

MaxBlast 5 is freeware application that is essentially Acronis True Image Home lite. The Seagate version is called DiscWizard and is also free to Seagate hard drive owners. You must have a Maxtor or Seagate hard drive installed in your system in order to run MaxBlast 5 or DiscWizard.

For more information about how to create a system image using MaxBlast 5, please read Partition Imaging with MaxBlast 5.

Editor’s Note: According to Stephen Lawton, Senior Director, Strategic Marketing, Acronis Inc., Acronis True Image supports hardware RAID in all of its products and software RAID is OS-dependent. It really depends on how the manufacturer implements software RAID in order to know if it’s supported. The best way to determine if your software RAID is support in Acronis True Image is to boot the system from an Acronis Rescue Disk. See the accompanying discussion thread for more details.

There are two partition images that you should consider creating after a Windows install or reinstall. The first image is an image created after Windows is loaded and you have made all the changes to personalize Windows the way you like it.

The second image should be created after you have downloaded and installed all the important updates and the service pack, if any. You should also consider running an anti-virus scan set to its high or thorough setting prior to imaging. You want to create an image that is Trojan and virus free.

The final word

I thought long and hard about whether I should submit this article for publication. I realize that the security issues discussed here aren’t near the top of most people’s list of concerns and for good reason. It is difficult if not impossible to assess the security risk after an install or reinstall. The Vista installer warns you about additional possible security risks if you do not connect to the Internet to get the latest updates. This is a relatively insignificant issue compared to any possible security risks immediately following a clean install or reinstall of Windows.

There are still a lot of unanswered questions. I doubt if anyone including Microsoft can tell you whether Windows Firewall and Defender is sufficient to protect your computer until all the important security updates are in place. I can tell you that your computer is more vulnerable until the service pack and all the important updates are downloaded and installed.

Neither can I tell you, patient reader, what security option you should choose. Whether to use Windows Firewall and Defender or to install a third-party Firewall like Comodo Internet Security and lock down the network traffic with network security rules, I leave it entirely up to you, depending on the option you feel most comfortable with.

Permalink • Print • Comment

Batch scripting of Windows host file changes

  • Date: November 12th, 2008
  • Author: Rick Vanover

DNS is the manageable way to resolve computer names to IP addresses, yet Windows admins usually use host files because they always work. But when you need to make a change to a bunch of host entries, where do you start?

—————————————————————————————————————-

It can be risky to use the Windows host file (which is located at C:\windows\system32\drivers\etc\hosts) for default installations if you need to make a change to a large number of systems with a local entry. Fortunately, there are a few ways to change these entries.

For example, look at a simple host file entry:

127.0.0.1                    localhost 192.168.1.10                 dhcp-122 192.168.1.14                 server94

Imagine that the DHCP-122 host is frequently generic cheap cialis used and many systems have a host entry with that IP address. As the system becomes more important, it is moved to another network and a static IP address. Assuming there is a resolution mechanism, the task is to replace the entry with a hashed out entry, as shown below:

#192.168.3.133              dhcp-122

Let’s also assume that we don’t want to remove the other entries in the file. This change comments out the entry and puts the new IP address in place. In the event that DNS or another mechanism cannot resolve the address, we can easily flip this entry for access.

To accomplish this task for a large number of systems, there are a few ways of going about it. One tool that I came across recently is Advanced Find and Replace, where a text file of paths can be loaded for a large find and replace task. The text file would contain entries like this:

Server393c$windowssystem32driversetchosts Workstation2c$windowssystem32driversetchosts

Advanced Find and Replace can then go through all of those paths and make the requested change if the text string exists in the file. This task can also be accomplished with a stream editing tool like Sed for Windows.

Another way to address easy short name resolution without the nightmarish management of host files is to migrate to Windows Server 2008’s DNS engine and use the GlobalNames zone — although the host files would need to be removed for the DNS results to work.

Whatever tool you use to modify the entry, make sure you do not add a file extension to the hosts file — the file will not function correctly with an extension. In general, you should stay away from using host files; however, certain situations warrant their use, and the manageability issues will soon follow.

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a healthy dose of Semiologic • Sky Gold skin by Denis de Bernardy