Category Archives: Information Technology

Automatic Log on in Windows 7

I got this info from:

Epic guide that worked for me.


Click Start, click Run, type regedit, and then click OK. In Windows Vista/7, simply type regedit in Start Search and hit Enter.

Navigate to the following registry key:


Double-click the DefaultUserName entry, type the user name to log on with, and then click OK.

If DefaultUserName registry value name is not found, create a new String Value (REG_SZ) with value name as DefaultUserName.

Double-click the DefaultPassword entry, type the password for the user account under the value data box, and then click OK.

If there is no DefaultPassword value, create a new String Value (REG_SZ) with DefaultPassword as the value name.

Note that if no DefaultPassword string is specified, Windows automatically changes the value of the AutoAdminLogon registry key from 1 (true) to 0 (false) to turn off the AutoAdminLogon feature.

In Windows Vista/7, DefaultDomainName has to be specified as well, else Windows will prompt for invalid user name with the user name displayed as .\username. To do so, double click on DefaultDomainName, and specify the domain name of the user account. If it’s local user, specify local host name.

If the DefaultDomainName does not exist, create a new String Value (REG_SZ) registry key with value name as DefaultDomainName.

Double-click the AutoAdminLogon entry, type 1 in the Value Data box, and then click OK.

If there is no AutoAdminLogon entry, create a new String Value (REG_SZ) with AutoAdminLogon as the value name.

If it exists, delete the AutoLogonCount key.

Also if it exists, delete the AutoLogonChecked key.

Quit Registry Editor.

Click Start, click Restart, and then click OK.

Excessive Unknown Unicast Frames

Unknown Unicast frames are simply frames with a destanation MAC Address not listed in the switches table.

The first step is to determine what this traffic actually is (typically with a packet capture):

Is this malicious traffic?
Is this legitimate traffic?

Malicious Traffic:
Can we stop the traffic from happening altogether via patching or software updates?
If not our best bet is probably an ACL or firewall rule as close to the source as we can get.

Legitimate Traffic:
Solution varies greatly, depending on what the traffic is and why it’s unknown.

Is the destination unknown simply because the destination never transmits or broadcasts?
If so a static MAC Address entry might be warranted.

Is the destination unknown because that’s the way the protocol works such as Microsoft Network Load Balancing?
If so the best bet is to segregate that traffic via hardware or vlans.
If segregating the traffic isn’t an option, then one solution would be to block this traffic from exiting unwanted traffic via an ACL.

This is also assuming the layer 2 network is working as expected. There are other unlikely reasons the switch may not have an address in its table such as being flooded with Topology Change Notifications or even software/hardware. But again in terms of probability those are very low.