Linux based windows spyware scanner

Can anyone recommend a linux based windows spyware scanner?
I'm running a couple of windows boxes in vmware and would like to mount the disks up under linux and scan them for viruses and spyware. I'm using clamav for virus scanning but I'd like something to pick up spyware as well.

Hello,
The sources files (.FMB, .MMB, .PLL) are cross platform (same major version). You just need to compile them on the target runtime platform to get the executables.
Francois

Similar Messages

  • Transition from Windows-based network to Linux-based

    I am looking to make the switch from a Windows based network to a Linux based one. Currently the network includes a Windows 2003 server which acts as a domain controller and file server, a network shared printer (Canon 2300N) and 7 clients running Windows. Several other Windows-based clients connect remotely via RDP.
    I would like to setup a server to act as a domain controller, file server, and (if possible) terminal server. The clients should be authenticated via the server and have access to the files stored on it (via ssh?).
    Here are several points that I was wondering about:
    All the clients use Outlook, some of the clients run Quickbooks Pro and another program called Tentant File Pro. I was thinking about replacing Outlook with Thunderbird (I contact, calendar, and tasks) and I know that Wine can't run Quickbooks and Tenant File Pro so I may have to use VirtualBox/VMWare because these applications can't be replaced by native Linux versions.
    I need an adequate backup solution for the files on the server running as a daily backup.
    Should I use webmin to administer the server?
    What antivirus / firewall solution should I use for the server and the clients?
    How can I allow remote clients the login to the server to be able to run applications (Outlook, Browser, Tenant File Pro, etc.) remotely on the server?
    What is the best solution for this? And what would be the least painful way of making the transition for the users?
    I know this is a lot, but any feedback would be appreciated.
    Thanks.

    larynx wrote:What is the best solution for this? And what would be the least painful way of making the transition for the users?
    Probably not Arch if you just want to dump all these questions on the community rather than research it all individually yourself.
    Perhaps Turnkey Linux would be suitable to get you up and running:
    http://www.turnkeylinux.org/
    (NB: Arch is the COMPLETE opposite of Turnkey Linux)

  • Is there any difference in the prompts of UCCX 7 (Windows based) and UCCX 9 (Linux based) ?

    Are the prompts for UCCX 7 (windows based) and UCCX 9 (Linux Based) are different ?
    There are no default prompts available in the script editor folder of UCCX 9.
    I have downloaded some prompts from the internet with .wav format, but those prompts are not working.
    Can someone tell me if the prompts are different and if they are really different, where to get those prompts then ?
    I have also attached the prompts i have downloaded from the internet.

    Nope, there's no difference.  UCCX uses either G711 or G729 encoded files.  You have to encode them first before you upload them.  UCCX will not encode them like CUCM does for MOH files.  In fact, you can use CUCM's MOH file encoding to encode your files for use within UCCX.
    Also, you will not see the system prompts on your workstation where you installed the script editor.
    What is it that you are trying to do?
    Anthony Holloway
    Please use the star ratings to help drive great content to the top of searches.

  • Linux Based FMB on Windows or vise versa

    Hi all,
    If i design any fmb(using Oracle fusion middleware R1 forms) on Linux based machine/virtual machine, Can i open it with windows 7(using Oracle fusion middleware R1 forms).
    or do i need to perform any conversion for that?

    Hello,
    The sources files (.FMB, .MMB, .PLL) are cross platform (same major version). You just need to compile them on the target runtime platform to get the executables.
    Francois

  • Anti-spyware scanner

    Shortly after launching safari which included opening up sites from a previous session, a different window popped up identifying itself as an anti-spyware scanner referenced to gescansecurity.org. The window displayed, had an appearance almost identical to a standard "my computer" screen on a windows pc, but inside safari. It looked like the typical type of windows malware, with messages alerting of the many various viruses/Trojans ("downloader.win32.agent", etc.) detected on my computer, followed by a prompt to install "System Security Antivirus" and such by clicking "ok". With no option to close the window, and with no other active windows, I clicked cancel. I then get a message that windows security center recommends I install it, (can't close still so I click the only button, "ok." Cycle repeats ("cancel" then "ok") as I try to get through the seemingly endless cycle of message alerts popping up. I finally chose to quit safari. Researched issue on another computer. Relaunched safari on supposedly infected mac only to find it gone. What could have caused this problem, could I have inadvertently handled this issue incorrectly somewhere (as described above), and just in case, is there a quick and reliable way of making sure my mac really is/is not infected. I greatly appreciate anyone who can offer any help as I am completely new to experiencing this on the mac. Sorry if my description is too long, but hoping the details might better elaborate. Thanks again.

    If Cancel starts some kind of 'loop' like you got, I would simply close Safari and re-open it.
    The full story:
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    Do not be tricked by 'scareware' that attempts computer users to download fake anti-virus software that may itself be malware. More on that here:
    http://news.bbc.co.uk/1/hi/technology/8313678.stm
    Beware of PDF files from unknown sources. A security firm announced that by its counting, malicious Reader documents made up 80% of all exploits at the end of 2009.:
    http://www.computerworld.com/s/article/9157438/RoguePDFs_account_for_80_of_all_exploits_saysresearcher
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download for Tiger and Leopard from:
    http://www.clamxav.com/
    The new version for Snow Leopard is available here:
    http://www.clamxav.com/index.php?page=v2beta
    (Note: ClamAV adds a new user group to your Mac. That makes it a little more difficult to remove than some apps. You’ll find an uninstaller link in ClamXav’s FAQ page online.)
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days free trial the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites like Twitter etc), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    If you think you may have acquired a Trojan, and you know its name, you can also locate it via the Terminal:
    http://theappleblog.com/2009/04/24/mac-botnet-how-to-ensure-you-are-not-part-of- the-problem/
    As to the recent 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially p'orn'ography sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications. Similar risks apply to using Facebook, Twitter, YouTube and similar sites which are prone to malicious hacking: http://news.bbc.co.uk/1/hi/technology/8420233.stm
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg
    Last but not least, there is the potential for having your entire email contact list stolen for use for spamming:
    http://www.nytimes.com/2009/06/20/technology/internet/20shortcuts.html?_r=1

  • Do I need a spyware scanner?

    the question is do I need a spyware scanner, I do have antivirus software installed but is this enough?

    Norton Antivirus has a very long and illustrious reputation for mangling Mac OS X systems, sometimes to the point where a complete reinstall is necessary. Among other things, it installs kernel extensions which are known to cause kernel panics and system freezes; it contains known and documented bugs which can silently corrupt Adobe Photoshop and Adobe InDesign files, destroy a user's ability to authenticate as an administrator, and (on PPC systems) can cause Classic to stop functioning; and Symantec has on at least two occasions now released flawed .dat file updates which erroneously report certain critical Mac OS X files as "viruses." (Deleting these "viruses" causes damage to the system that in some cases renders it unbootable.)
    (This was a quote from another forum)
    No viruses that can attack OS X have so far been detected 'in the wild', i.e. in anything other than laboratory conditions.
    It is possible, however, to pass on a Windows virus to another Windows user, for example through an email attachment. To prevent this all you need is the free anti-virus utility ClamXav, which you can download from:
    http://www.clamxav.com/
    However, the appearance of Trojans and other malware that can possibly infect a Mac seems to be growing, but is a completely different issue to viruses.
    If you allow a Trojan to be installed, the user's DNS records can be modified, redirecting incoming internet traffic through the attacker's servers, where it can be hijacked and injected with malicious websites and pornographic advertisements. The trojan also installs a watchdog process that ensures the victim's (that's you!) DNS records stay modified on a minute-by-minute basis.
    You can read more about how, for example, the OSX/DNSChanger Trojan works here:
    http://www.f-secure.com/v-descs/trojanosxdnschanger.shtml
    SecureMac has introduced a free Trojan Detection Tool for Mac OS X. It's available here:
    http://macscan.securemac.com/
    The DNSChanger Removal Tool detects and removes spyware targeting Mac OS X and allows users to check to see if the trojan has been installed on their computer; if it has, the software helps to identify and remove the offending file. After a system reboot, the users' DNS records will be repaired.
    (Note that a 30 day trial version of MacScan can be downloaded free of charge from:
    http://macscan.securemac.com/buy/
    and this can perform a complete scan of your entire hard disk. After 30 days the cost is $29.99. The full version permits you to scan selected files and folders only, as well as the entire hard disk. It will detect (and delete if you ask it to) all 'tracker cookies' that switch you to web sites you did not want to go to.)
    A white paper has recently been published on the subject of Trojans by SubRosaSoft, available here:
    http://www.macforensicslab.com/ProductsAndServices/index.php?mainpage=document_general_info&cPath=11&productsid=174
    Also, beware of MacSweeper:
    MacSweeper is malware that misleads users by exaggerating reports about spyware, adware or viruses on their computer. It is the first known "rogue" application for the Mac OS X operating system. The software was discovered by F-Secure, a Finland based computer security software company on January 17, 2008
    http://en.wikipedia.org/wiki/MacSweeper
    On June 23, 2008 this news reached Mac users:
    http://www.theregister.co.uk/2008/06/23/mac_trojan/
    More information on Mac security can be found here:
    http://macscan.securemac.com/
    The MacScan application can be downloaded from here:
    http://macscan.securemac.com/buy/
    You can download a 30 day trail copy which enables you to do a full scan of your hard disk. After that it costs $29.95.
    More on Trojans on the Mac here:
    http://www.technewsworld.com/story/63574.html?welcome=1214487119
    This was published on July 25, 2008:
    Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.
    The code could be a boon to phishing gangs who redirect web users to fake bank sites and steal login details.
    In light of the news net firms are being urged to apply a fix for the loop-hole before attacks by hi-tech criminals become widespread.
    Net security groups say there is anecdotal evidence that small scale attacks are already happening.
    Further details here: http://news.bbc.co.uk/2/hi/technology/7525206.stm
    A further development was the Koobface malware that can be picked up from Facebook (already a notorious site for malware, like many other 'social networking' sites), as reported here on December 9, 2008:
    http://news.bbc.co.uk/newsbeat/hi/technology/newsid_7773000/7773340.stm
    You can keep up to date, particularly about malware present in some downloadable pirated software, at the Securemac site:
    http://www.securemac.com/
    There may be other ways of guarding against Trojans, viruses and general malware affecting the Mac, and alternatives will probably appear in the future. In the meantime the advice is: be careful where you go on the web and what you download!
    As to the current 'Conficker furore' affecting Intel-powered computers, MacWorld recently had this to say:
    http://www.macworld.co.uk/news/index.cfm?email&NewsID=25613
    Although any content that you download has the possibility of containing malicious software, practising a bit of care will generally keep you free from the consequences of anything like the DNSChanger trojan.
    1. Avoid going to suspect and untrusted Web sites, especially *********** sites.
    2. Check out what you are downloading. Mac OS X asks you for you administrator password to install applications for a reason! Only download media and applications from well-known and trusted Web sites. If you think you may have downloaded suspicious files, read the installer packages and make sure they are legit. If you cannot determine if the program you downloaded is infected, do a quick Internet search and see if any other users reported issues after installing a particular program.
    3. Use an antivirus program like ClamXav. If you are in the habit of downloading a lot of media and other files, it may be well worth your while to run those files through an AV application.
    4. Use Mac OS X's built-in Firewalls and other security features.
    5. Stop using LimeWire. LimeWire (and other peer-to-peer sharing applications) are hotbeds of potential software issues waiting to happen to your Mac. Everything from changing permissions to downloading trojans and other malicious software can be acquired from using these applications.
    6. Resist the temptation to download pirated software. After the release of iWork '09 earlier this year, a Trojan was discovered circulating in pirated copies of Apple's productivity suite of applications (as well as pirated copies of Adobe's Photoshop CS4). Security professionals now believe that the botnet (from iServices) has become active. Although the potential damage range is projected to be minimal, an estimated 20,000 copies of the Trojan have been downloaded. SecureMac offer a simple and free tool for the removal of the iBotNet Trojan available here:
    http://macscan.securemac.com/files/iServicesTrojanRemovalTool.dmg

  • Dual boot kali linux with windows 8

    i have ideapad y510p and i want to dual boot kali linux with windows 8 
    i want a full guide to do it please !!help!!!

    Hello,
    if you got problems with the kernel, you can try backbox-linux. The kernel there is newer. It is based on Ubuntu 12.04 LTS.
    Have a nice day
    thoschi
    LENOVO IDEAPAD Z710 59403383,i7-4700MQ,8 GB DDR3-RAM,1.920 x 1.080 Pixel,NVIDIA® GeForce® GT 740M,Hybrid (1 TB S-ATA + 8GB SSD)

  • Using Oracle driver in JDBC for Unix and Linux based servers

    Please, let me know how to mention the Oracle driver within the forName.class(" "); statement in the Jdbc-Servlet for Unix and Linux based servers.
    I'm using Windows-OS for Java programming. Should I have to use the same environment(Unix/Linux with Oracle) for compiling or just compiling, mentioning the driver in the java program would suffice?
    Please, Help me.
    Thank You.
    from,
    Silas eschole.
    email: [email protected]
    [email protected]

    I've used Oracle's thin driver like this:
    Class.forName ( "oracle.jdbc.driver.OracleDriver" );
    Connection DBConnection = DriverManager.getConnection("jdbc:oracle:thin:USER/PASSWD@database" );
    You need Oracles client classes ( e.g. classes111.zip ) at run time, not during compilation.
    Thin client connects directly to the Oracle DB, so the database description is like PORT:MACHINE:SID
    Connection is made through Oracle's listener even when your DB is in the same machine that your program is running. Port number is propably 1521 or 1526, depending on your listener.ora definitions and used Oracle SQL*Net version.

  • Trying to view a linux based dvr system on my mac

    Im trying to remote view a linux based dvr system on my mac, I can log into the system, and use the controls, however I cannot view the video on any of the cameras, in windows it requires an active x control installed anyone know what the mac equivalent is?
    Thanks

    ...it requires an active x control installed...
    Simple answer: no.  ActiveX plug-ins are usually Internet Explorer only.  Thus you would not be able to view this on OSX.  You could install Windows on your Mac using Boot Camp or a virtual machine, but that's still viewing using Windows.

  • Oracle DB sessions on Linux and Windows

    Actually I am confused the way session memory is allocated on 32 bit windows and linux OS.
    Windows is a thread based architecture where all user sessions are treated as threads of oracle.exe process. The addressable space is 4GB and oracle.exe can use up to 3GB in case you use /3GB switch in boot.ini file. It means that combined size of SGA ,PGA and other memory structures can not be more than 3GB. When a session gets connected with a database a PGA is allocated. It means that memory required by database sessions also comes from the 3GB limit. If your memory usage goes beyond 3GB you wont be able to connect new sessions with database or you would require to reduce the size of one of your SGA components.
    Linux is a process based architecture where each user session is treated as a separate process and has its own addressable space. Even on 32bit linux the addressable space is 4GB i.e. 2GB for process and 2GB for kernel. It means we need to accommodate our SGA and PGA in the 2GB limit (there are ways to increase the size of SGA but let assume we are doing nothing to raise the 2GB limit).
    As PGA is allocated for every session when it connects with database.
    My question is how PGA memory is allocated against a database session on linux.
    To further clarify my question I am stating the results of an experiment that I did on linux and windows.
    On windows I set the total size of SGA to 1730M and PGA aggregate target to 1024M. I was able to able to startup the database instance without any issue. Then I started connecting sessions with the database and even ran a query doing a heavy sort in one of the sessions but after connecting 10 sessions with DB I started getting ORA-12500 TNS Listener failed to start a dedicated server process error on windows.
    Then I did the same experiment on Red Hat Linux. SGA size was 1633MB and where as PGA aggregate target was only 10MB. I was unable to start instance when I set the SGA size more than 1633MB.
    With that setting I was able to connect more than 200 sessions with database inspite of running query doing heavy sort in 4 sessions without getting ORA-12500 error. I was even able to connect more than 400 sessions with database after setting PGA aggregate target to 1GB on Linux.
    Now my confusion is why linux was able to handle more DB sessions. I know it’s a process base model and each session is a separate process and has its own addressable space but as PGA is allocated against every session and PGA memory comes from 2GB limit then why PGA memory did not exhaust on linux. Is PGA allocated differently on linux as compared to windows?

    Perhaps the problem is easier to understand if you leave PGA_AGGREGATE_TARGET out of this issue completely.
    The out of memory problem you had, has nothing to do with PGA_AGGREGATE_TARGET setting directly. The difference in number of processes comes from architectural differences in how Oracle uses memory in windows vs unix.
    On windows the SGA + ALL PGAs must fit into one 4GB address space (in practice even smaller as youve noticed). This is because there's only one process, oracle.exe. One process = one address space.
    On Unix, you have many processes and every process can use portion of their own address space for PGA.
    So, on windows (32bit) you run out of address space for the single oracle.exe process. On unix you dont hit this limit just because the number of processes grows (but if some process wants to use a lot of PGA memory, then they eventually run out of address space (talking about 32bit again))
    On unix you probably ran into another limit - amount of total usable virtual memory (RAM+swap) available in your system
    Tanel Poder
    http://blog.tanelpoder.com

  • IP Pool doesn't apply the DNS configuration to Linux based vm

    Hi,
    Under scvmm 2012r2, I created a IP Pool in my virtual switch as follow :
    IP subnet : 192.168.1.0/24 (192.168.1.100 to 192.168.1.200)
    Gateway : 192.168.1.1
    DNS : 192.168.1.2, 192.168.1.3
    Then I created some templates using the IP Pool. From these templates, when I created a Windows vm, all is OK. When i created a Linux based vm like RHEL6, only the IP address and gateway were applied. The DNS setting was missing in the new created
    vm.
    Thanks for your help !
    zt

    Hello,
    Here is the output of resolv.conf :
    # Generated by NetworkManager
    # No nameservers found; try putting DNS servers into your
    # ifcfg files in /etc/sysconfig/network-scripts like so:
    # DNS1=xxx.xxx.xxx.xxx
    # DNS2=xxx.xxx.xxx.xxx
    # DOMAIN=lab.foo.com bar.foo.com
    Output of the log :
    2014-04-09T08:25:31,619Z Trace      [scx.vmmguestagent.osspecializationreader:427:1589:140519122646816] DNS Search Suffix read as: test.com
    2014-04-09T08:26:34,209Z Trace      [scx.vmmguestagent.osspecializationreader:427:1623:139799840220960] DNS Search Suffix read as: test.com
    2014-04-09T08:26:38,234Z Info       [scx.vmmguestagent.osconfigurator.networkconfigurator:235:1623:139799840220960] Shell Command:/opt/microsoft/scvmmguestagent/bin/cfgnetadapter  macaddress=00:1D:D8:B7:1C:20 ipv4addresstype=static
    ipv4address=192.168.1.133/24 ipv6addresstype=dhcp gateways=192.168.1.1, nameservers=192.168.1.2,192.168.1.3, dnssearchsuffix=test.com,
    Thanks
    zt

  • My question to the Adobe developers: Why you dont offer Shockwave Player for Linux based OS?

    You know well that people who using Linux can play their games bearing Shockwave with Firefox for Windows via Wine program. So, for Haven's sake why this torment?

    Um, if you're using Wine, what good would a Linux based Shockwave player be? Why don't you install the Windows version?
    Don't know anything about it, but I thought that was why people used Wine...

  • Linux or windows?   godaddy

    I'm looking at the godaddy hosting plans, and it asks Linux or Windows-based, not giving a choice for Mac OS. I presume that it still works with Mac. Which one should I select? I intend to make pages with iWeb on a mac, and then host them outside of .mac.

    Linux. Windows is just potential for trouble.
    You can find some tips here:
    http://homepage.mac.com/thgewecke/iwebserver.html

  • Using MS FileSharingTestSuite for TESTING a LINUX Based SMB/CIFS implementation.

    Hi,
    I was trying to setup the MS File Sharing test suite for testing the below implementation.
    Could please let me know if this use-case is supported. If not could please point me to
    resources [Microsoft] which could help achieve this purpose effectively.
    I want to test CIFS File server implementation running on Linux [SUSE Linux - Open Enterprise Server]
    The client accessing the file services from above
    CIFS server implementation is vastly
    Windows clients.
    Though would like to know ways of testing if the client is a Linux based desktop or a Mac based client as well in future.
    For the above setup details I would like to know if and how we could create a "Driver
    Computer" setup mainly. So we could use the File Sharing test suite to test against this Linux based CIFS server implementation.
    And also the details on setting up the  'System Under Test (SUT)' , if any changes required[from what is documented in the "FileSharing_ServerUserGuide]" to
    achieve the above.
    Could kindly point me in the right direction to help achieve the above testing purpose.
    Please let me know in case any details are required to help resolve the query.
    Thanks for your time and help.
    Regards,
    Kavitha A

    Hi,
    Thanks for your time.
    I am actually talking about using file sharing test suite provided My microsoft for testing a Linux Based CIFS/SMB implementation.
    I have got my query answered via Mail from Microsoft dochelp team. hence marking this as resolved.
    Posting the response /resolution from DOcHelp team on this thread for benefit of anyone looking for similar information/understanding:
    If you are testing in a Workgroup scenario you need a Driver Computer and the System Under Test (SUT) computer.
    In a domain-joined scenario, you need a DC somewhere in your environment to join the machines.
    The guide document that comes with the test suite package provides guidance on what needs to be configured in each scenario.
    The Driver Computer is the Windows machine where the synthetic test suite runs and simulates a client by emitting the protocol packets. The client sends packets to the file server
    (the SUT) to test the server implementation of the protocol.
    The SUT implements the server side of the protocol and the SUT can be running on any operating system.
    For your convenience, you can setup a Windows SUT just for the purpose of understanding the test configuration on the driver client.
    The document has instructions for Windows SUT and guidelines for non-Windows SUT as well. In your case, it’s a non-Windows SUT. You need to configure your server where your file
    server implementation is running and setup the Driver computer to test your SUT.
    I understand that your ultimate goal is to setup your own SUT on the SUSE Linux server.
    Many customers have setup SUTs on CentOS, Ubuntu, etc. The flavor of the operating system is not relevant as such. The client simulator talks the SUT by following the protocol
    packets.
    Please go through the document step-by-step and I am sure it will come together.
    Let’s me know whether you have any further questions.
    I am not looking at CIFS share access from a Linux system. Otherwise would have posted in relevant Linux forums If looking for the same information. Thanks again for taking time to help though.

  • [SOLVED]Arch Linux, and Windows 8.1 Dual Boot issue

    Hi guys. I recently bought a new laptop, and decided to run Arch Linux and Windows 8.1. I installed Windows 8.1 first as recommended by the beginners guide, and then installed Arch Linux. I made sure UEFI was enabled in my BIOS, and made sure everything was on a GPT partition. The install itself went fine. My laptop loads grub, and Arch Linux shows up and boots, but there is no option to boot into Windows 8.1. The only way I can boot into Windows 8.1 is by accessing my motherboard, and choosing to launch the windows boot manager instead of the grub launcher. How can I get Windows 8.1 to show up in grub? Thanks in advance guys.
    Last edited by Painguy (2014-08-20 20:19:37)

    Painguy wrote:
    -----------Edit------------------
    Yeah just ran this after installing os prober
    grub-mkconfig -o /boot/grub/grub.cfg
    and it works now. Sorry for the crazy posts guys. Thanks for the suggestions and help.
    Yeah I'm sure I'm doing something wrong lol. I did not install OS-Prober. I think that's where the issue is. I'm missing the menu entry in grub.cfg right? Do I just run os prober or do I have to manually edit grub.cfg.
    If that's not the case then here is what I did up until now. What I did was start with a blank SSD drive. I used cgdisk to make the disk use a GPT partitioning scheme. I installed windows 8.1 and checked in windows to make sure it boots into UEFI-GPT mode and it does.  I then installed arch linux using the beginners guide. I made sure to use cgdisk to create any extra partitions, and installed GRUB to the efi partition that windows had created ( I did not format this partition ). I then finished the installation and rebooted, and Grub only shows arch linux. I don't think I'm dealing with anything MBR related. I made sure I used the GPT partitioning scheme....i think lol.
    All you need to do is run os-prober then run grub-mkconfig. It should pick up Windows at that point.

Maybe you are looking for

  • How to retrieve column names in a query in a case sensitive way

    Given a query, I want to extract all the column names/aliases in the query in a case-sensitive way. When I use dbms_sql.describe_columns() or java.sql.ResultSetMetaData classes getColumnName() or getColumnLabel() it returns the columns name ONLY in U

  • One TPV for multiple Countries

    Hi Experts, Could you pls share experirnce/knowledge around having one TPV for multiple countries together. The scenario is like below: 1. There are mutiple Countries in Central America which are small islands for whom we need to roll out the Travel

  • Can i turn off 4g and go back to 3g?

    i upgraded and shouldn't have. battery life *****. i want to go back to 3g. can i downgrade back to 3g or turn off the 4g for 3g somehow? i don't see how to? or could i uninstall ios5 for the previous version? i have a 4s.

  • Custom domain name pointing issues

    Hi I've set my custom domain name for my webpages and it is working fine - www.domain.com points to my iweb site. But how can i make sure that domain.com (without the www.) also points to my iweb site? I know I could change settings on my domain regi

  • After system restore i reinstalled firefox, how to get back bookmarks etc with old firefox data?

    After system restore the only thing i have is old firefox data on desktop if all bookmarks, passwords are recovered it will be great help. P.S i reinstall firefox from drive other than c ,that was in downloaded form. Thanks