Search This Blog

Wednesday, July 20, 2011

we could not click on hyperlink within outlook

default program> click on internet expoler

Thursday, June 30, 2011

remote setup

winrm quickconfig  setsup remote use on another computer.

Monday, June 27, 2011

ie8 update

From Control Panel > Internet Options > Advance tab > Reset web settings.  Ran registry fix for launching .exe files.  End process on duplicate

Wednesday, June 22, 2011

Ping Commands

PING

Test a network connection - if successful, ping returns the ip address.
Syntax
      PING [options] destination_host

Options
    -w timeout     Timeout in milliseconds to wait for each reply.
    -i TTL         Time To Live.
    -v TOS         Type Of Service.
    -a             Resolve addresses to hostnames.
    -n count       Number of echo requests to send.
    -t             Ping the destination host until interrupted.
    -l size        Send buffer size.
    -f             Set Don't Fragment flag in packet.
    -r count       Record route for count hops.
    -s count       Timestamp for count hops.
    -j host_list   Loose source route along host_list.
    -k host_list   Strict source route along host_list.
destination_host  The name of the remote host
A response of "Request timed out" means there was no response to the ping attempt in the default time period of one second.
If the latency of the response is more than one second. Use the -w option on the ping command to increase the time-out. For example, to allow responses within five seconds, use ping -w 5000.
A successful PING does NOT always return an %errorlevel% == 0
Therefore to reliably detect a successful ping - pipe the output into FIND and look for the text "TTL" 

Note that "Reply" in the output of PING does not always indicate a positive response. You may receive a message from a router such as: Reply from 192.168.1.254: Destination Net Unreachable.
Four steps to test an IP connection with ping: 

1) Ping the loopback address to verify that TCP/IP is installed and configured correctly on the local computer.
PING 127.0.0.1

2) Ping the IP address of the local computer to verify that it was added to the network correctly.
PING IP_address_of_local_host 

3) Ping the IP address of the default gateway to verify that the default gateway is functioning and that you can communicate with a local host on the local network.
PING IP_address_of_default_gateway 
4) Ping the IP address of a remote host to verify that you can communicate through a router.
PING IP_address_of_remote_host

Examples
PING -n 1 -w 7500 Server_06

PING -w 7500 MyHost |find "TTL=" && ECHO MyHost found

PING -w 7500 MyHost |find "TTL=" || ECHO MyHost not found

PING -n 5 -w 7500 www.microsoft.com

PING -n 5 -w 7500 microsoft.com
Script to monitor your connection to a website (example.com) every 15 seconds:
@Echo off
Echo Logging ping responses, press CTRL-C to stop
:start
 Ping -n 1 example.com | find "TTL=" >>c:\pingtest.txt
 Echo .
 Ping -n 16 127.0.0.1>nul
goto start
The script above can be used to test an Internet connection, just replace example.com with your ISP's Default Gateway IP address. This represents the first physical device on the ISP's side of your connection. You can find the Default Gateway on your router status screen.
Note: some ISP’s or network admins may not appreciate you performing frequent or continual pings to their server, try not to overdo it!
PING is named after the sound that a sonar makes.
Ping times below 10 milliseconds often have low accuracy. A time of 10 milliseconds is roughly equal to a distance of 930 Miles, travelling a straight line route at the speed of light.
“And now I see with eye serene
The very pulse of the machine.” - William Wordsworth, (She Was a Phantom of Delight)


Related:

TRACERT - Trace route to a remote host
IPCONFIG - IP Configuration
PATHPING - Route Tracing tool (Windows 2000)
Q115388 - Resolving IP Address with Leading Zero
FreePing - Freeware Windows GUI Ping
Network-Tools - Ping from any web browser
Powershell equivalent: Test-Connection - Ping one or more computers
Equivalent bash command (Linux): ping - Test a network connection

Back to the Top
© Copyright SS64.com 1999-2011
Some rights reserved

How to find a computer name using the ping command

ping -a  (ip address)

Creating a new profile

1) Log into local Admin

Win 7- Under users profile  rename the users profile .old >then copy over files from old  profile

XP-explore >users profile> rename to .old and copy over files from the old profile.

Dealing with corrupt profiles

Monday, June 20, 2011

Disk Part Command-line

DiskPart Command-line Utility Process
The DiskPart command-line utility process is as follows:

C:\Program Files\Windows AIK\Tools\PETools>diskpart
DISKPART> select disk 0
DISKPART> clean
DISKPART> create partition primary size=100
DISKPART> select partition 1
DISKPART> active
DISKPART> format fs=ntfs
DISKPART> assign letter=C
DISKPART> exit

Now you can copy the image from the network share to the destination hard drive.

Saturday, June 18, 2011

WET (Windows Easy Transfer Tool)

Migrating User Settings and Data by Using WET


WET is the recommended tool for scenarios in which you have only a few computers to migrate. You can decide what to transfer and then select the transfer method to use. You can use WET to transfer files and folders, e-mail settings, contacts and messages, application settings, user accounts and settings, Internet settings, and Favorites.
If your source computer is running Windows 7, you can find WET in the System Tools program group folder. If your computer is running Windows XP or Windows Vista, WET can be obtained from a Windows 7 product DVD or from any computer that is running Windows 7.
Windows Vista has an older version of WET, and while you can still use Windows Vista WET to migrate user state to Windows 7, you may want to use the latest functionality of Windows 7 WET. Obtain WET from Windows 7 product DVD or from any computer that is running Windows 7. Windows 7 WET includes a new file explorer that enables you to select exactly which files to copy to your new PC.
In case Windows finds a file or setting that it cannot work with, Windows 7 WET does not allow the transfer to hang. It will complete the transfer and give you a full report of anything that fails to migrate.
If the source computer is running Windows 7, you can skip the following procedure of storing the Windows 7 WET files to be used on the source computer.
Store Windows 7 WET Files on the Source Computer
To store Windows 7 WET files to be used on the source computer that does not have WET, start WET on the destination computer, and perform the following steps:
  1. Close all active programs.
  2. Click Start.
  3. Point to All Programs, Accessories, System Tools, and then Windows Easy Transfer.
  4. On the Windows Easy Transfer page, click Next.
  5. Select the method you want to use to transfer files and settings from your source computer.
  6. Click This is my new computer.
  7. Click I need to install it now.
  8. Select the destination media where you want to store the Windows Easy Transfer wizard files. You can store the wizard files to an external hard drive or network drive, or you can store them on a USB flash drive. A Browse for Folder window opens.
  9. Type the path and the folder name in which you want to store the Windows Easy Transfer wizard files, and then click Next.
You must now start your source computer to install WET.
Migrate Files and Settings from the Source Computer to the Destination Computer
You can select one of the three methods to transfer files and settings:
  • Use an Easy Transfer Cable.
  • Use a network connection.
  • Use removable media such as a USB flash drive or an external hard disk.
Transfer Files and Settings by Using a Network
  1. Launch Windows Easy Transfer on the computer from which you want to migrate settings and files by browsing to the removable media or network drive containing the wizard files and then double-clicking migestup.exe. The program may also start automatically when you insert the removable media. Note: If your computer already has WET, you can run it from the System Tools program group folder.
  2. Click Next.
  3. Click A network. Note: Both computers must support the transfer method you choose. For example, both computers must be connected to the same network.
  4. Click This is my old computer. WET creates a unique WET key, which is used to link the source and destination computer.
  5. Follow the steps to enter the WET key on your destination computer to allow the network connection.
  6. On your destination computer, after entering the WET key, click Next. A connection is established and WET checks for updates and compatibility.
  7. Click Transfer to transfer all files and settings. You can also determine which files must be migrated by selecting only the user profiles you want to transfer or by clicking Customize.
  8. Click Close after WET has completed the migration of files and settings to the destination computer.

Monday, June 6, 2011

How to Enable system Protection for Drive E- Restore points are automatically created

How to Enable system Protection for Drive E- Restore points are automatically created

-Select and Security
-system
-System protection
-Local Disk E:
-Configure

Allow remote Accesss

Command prompt>winrm quickconfig

Click Yes

How to create a Mirrior Image

How to create a Mirrior Image

Disk Managment>Action>all Task>new mirrored Volume>Next in the Wizard>Select Disk>add>mirrored volume has been selected.>next>format disk >mirrord voulmw should be displyaed.

How to create a striped volume:

How to create a striped volume:

Diskpart>list disk> create volume stripe[size=size][disk=disknumber(),seconddisknumber,""

example


  1. Diskpart
  2. list disk
  3. create volume stripe size=9000 disk=1,2,

Saturday, June 4, 2011

how to speed up your comoputer

How to get Virtual Memory to run:

r click> my computer>properties>mange hardware>disk drives>VMware Virtual IDE>Policies>enable caching box

settingsup ready boost:

input flash drive>click on drive letter>speed up my system> Use this device>

properties>advavced system settings>(settings)performance>advanced>change>automatically manage pageing file size and drivers>check box>click custom sizes>

type from 2048 to 2048 click ok.

Friday, June 3, 2011

problem step recorder

Start>psr.exe

How a PC Boots

How win 7 pc boot:

-read files into memory
-intitalize system services
-identify start devices
-authentcate user creditals
-Construct and dispaly the desktop
-lauch startup applications

how to join an available home group.

Click availbe to join>join now>select media libray that you want to join in >add home gorup password.(within the home group window) Join now>

How to create a shared network: Home Group: only on windows 7-

How to open a shared network: Home Group: only on windows 7-

 Open up network and sharing center> Public network> (choose type of netowrk you want to setup)ex home netowrk.> Specify what you want share, docs, photos, music, videos> create password.

How to change home group settings:

Choose home group and sharing options> (you can change sharing options, customze, or even change the password)



Tuesday, May 31, 2011

sync both BB and email accounts


messages icon> black app>  scroll to options>genral ,inbox ,email reconsicalltion.
Delete on answer>

Saturday, May 28, 2011

How to enable system protection:

How to enable system protection:
1.start>control panel>
2.system security
3.system protection
4.Local disk (); click configure

How to create network backup-

How to create network backup-

1.cpntprl panel>system Security>backup
2.Deselct admin libraries
3.deselect include system image drive c:
4.select next.

How to create a system repair disk:

How to create a system repair disk:
1. contorl panel
2.backup and retore
3.create a system reapir disk
4.Create disc

Monday, May 23, 2011

App locker

AppLocker policies are located in the Computer Configuration\Windows Settings\ Security Settings\Application Control Policies node of a standard Windows 7 or Windows Server 2008 R2 GPO.

The Application Compatibility Toolkit (windows7)

The Application Compatibility Toolkit

Add a note hereThe Application Compatibility Toolkit (ACT) is a collection of tools that allows you to resolve application compatibility issues. You can use the ACT to determine whether existing applications are compatible with Windows 7 before deploying the new operating system.
Add a note hereThe ACT contains the following components:
  • Add a note hereApplication Compatibility Manager
  • Add a note hereCompatibility Administrator
  • Add a note hereInternet Explorer Compatibility Test Tool
  • Add a note hereSetup Analysis Tool
  • Add a note hereStandard User Analyzer
Add a note hereYou learn more about each of these tools in the rest of this lesson.
Note 
Add a note hereMORE INFO: ACT
Add a note hereYou can obtain the ACT by going to http://download.microsoft.com and searching for the toolkit by name.

To change a dynamic disk back to a basic disk using the Diskpart utility

To change a dynamic disk back to a basic disk using the Diskpart utility, perform the following procedure:
  1. Add a note hereBack up all volumes on the disk you want to convert.
  2. Add a note hereOpen an elevated command prompt and enter diskpart.
  3. Add a note hereAt the DISKPART> prompt, enter list disk. Note the number of the disk you want to convert.
  4. Add a note hereAt the DISKPART> prompt, enter select disk <disknumber>
  5. Add a note hereAt the DISKPART> prompt, enter detail disk <disknumber>
  6. Add a note hereFor each volume on the disk, at the DISKPART> prompt, enter select volume= <volumenumber> and then enter delete volume.
  7. Add a note hereAt the DISKPART> prompt, enter select disk <disknumber>
  8. Add a note hereAt the DISKPART> prompt, enter convert basic.

Convert a MBR to GPT

To use the Diskpart command-line utility to change a disk from MBR to GPT partition style, perform the following procedure:
  1. Add a note hereBack up the data on the basic MBR disk that you want to convert.
  2. Add a note hereOpen an elevated command prompt and enter diskpart.
  3. Add a note hereAt the DISKPART> prompt, enter list volume. Note all the volume numbers.
  4. Add a note hereFor each volume listed, at the DISKPART> prompt, enter select volume <volumenumber>
  5. Add a note hereFor each volume, at the DISKPART> prompt, enter delete volume.
  6. Add a note hereAt the DISKPART> prompt, enter list disk. Note the disk number of the disk that you want to convert.
  7. Add a note hereAt the DISKPART> prompt, enter select disk <disknumber>.
  8. Add a note hereAt the DISKPART> prompt, enter convert gpt.
Add a note hereYou can also use both Disk Manager and the Diskpart utility to

Thursday, May 19, 2011

Configuring Computer Policy to Allow Non-Administrators to Install Specific Device Setup Classes

EXERCISE 1: Configuring Computer Policy to Allow Non-Administrators to Install Specific Device Setup Classes
Image from book
Add a note hereThis exercise permits a non-administrative user to install any imaging device (such as a webcam) that has a signed driver on the Canberra computer. You first determine the GUID of the Imaging Devices setup class and then configure computer policy to permit non-administrators to install this class of device. The exercise requires that at least one device of that setup class is installed on your computer. If not, use another setup class. You need to know the procedure—the actual device setup class you choose is not important. To permit non-administrators to install a specific type of hardware device, perform the following procedure:
  1. Add a note hereLog on to the Canberra computer with the Kim_Akers account.
  2. Add a note hereIf the Don Hall non-administrator (ordinary user) account does not already exist, create it.
  3. Add a note hereOpen Device Manager.
  4. Add a note hereExpand Imaging Devices in the Device Manager tree. Select a device (such as a webcam).
  5. Add a note hereRight-click the device and choose Properties.
  6. Add a note hereOn the Details tab, in the Property list, click Device Class Guid, as shown in Figure 4-23.
    Add a note hereImage from book
    Add a note hereFigure 4-23: Determining a device class GUID
  7. Add a note hereThe GUID is displayed, as shown in Figure 4-24. Right-click the GUID and choose Copy. Paste the GUID into Microsoft Notepad so you do not lose it.
    Add a note hereImage from book
    Add a note hereFigure 4-24: Monitor device type GUID
  8. Add a note hereClick Start. Enter mmc gpedit.msc in the Start Search box and press Enter. This starts Local Group Policy Object Editor.
  9. Add a note hereIn Local Group Policy Object Editor, under Local Computer Policy, double-click Computer Configuration, double-click Administrative Templates, double-click System, and select Driver Installation.
  10. Add a note hereIn the details pane, double-click Allow Non-Administrators To Install Drivers For These Device Setup Classes, as shown in Figure 4-25.
    Add a note hereImage from book
    Add a note hereFigure 4-25: Accessing the Allow Non-Administrators To Install Drivers For These Device Setup Classes policy
  11. Add a note hereIn the Allow Non-Administrators To Install Drivers For These Device Setup Classes dialog box, shown in Figure 4-26, select Enabled.
    Add a note hereImage from book
    Add a note hereFigure 4-26: Enabling the Allow Non-Administrators To Install Drivers For These Device Setup Classes policy
  12. Add a note hereClick Show.
  13. Add a note hereIn the Show Contents dialog box, select the text box under Value to highlight it, double-click the text box, and paste the GUID you copied earlier (including the curly braces). The Show Contents box should be similar to Figure 4-27.
    Add a note hereImage from book
    Add a note hereFigure 4-27: Pasting the GUID into the Show Contents dialog box
  14. Add a note hereClick OK to close the Show Contents dialog box.
  15. Add a note hereClick OK to close the Allow Non-Administrators To Install Drivers For These Device Setup Classes dialog box. Local Group Policy Editor shows the policy is Enabled.
  16. Add a note hereIf you want, stage the driver for a reputable third-party imaging device. Then log on to the Canberra computer as Don Hall and install the device. Staging a driver is described in Exercise 2.