Saturday, January 31, 2009

What is presentation layer responsible for in the OSI model

The presentation layer establishes the data format prior to passing it along to the network application’s interface. TCP/IP networks perform this task at the application layer.

Where is GPT stored

%SystemRoot%\SYSVOL\sysvol\domainname\Policies\GUID

What is GPT and GPC

GPT Is Group policy template
GPC Is group policy container.

Where are group policies stored

%SystemRoot%System32\GroupPolicy

The difference between local, global and universal groups

Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains.

The differences between Windows 95 and Windows NT

Lack of Unicode implementation for most of the functions of Win95. Different extended error codes. Different number window and menu handles. Windows 95 implements some window management features in 16 bits. Windows 95 uses 16-bit world coordinate system and the coordinates restricted to 32K. Deletion of drawing objects is different. Windows 95 does not implement print monitor DLLs of Windows NT. Differences in registry. Windows 95 does not support multiprocessor computers. NT implementation of scheduler is quite different. Different driver models. Win95 was built with back-compatibility in mind and ill-behaving 16-bit process may easily corrupt the system. Win95 starts from real DOS, while WinNT uses DOS emulation when one needs a DOS. Win95’s FAT is built over 16-bit win3.1 FAT (not FAT32!, actually, Win95’s FAT contains two FATs).

What is a deadlock

A deadlock, very simply, is a condition in which two or more threads wait for each other to release a shared resource before resuming their execution. Because all threads participating in a deadlock are suspended and cannot, therefore, release the resources they own, no thread can continue, and the entire application (or, worse, more than one application if the resources are shared between threads in multiple applications) appears to hang.

What are the advantages of using DLL’s

DLLs are run-time modular. DLL is loaded when the program needs it. Used as a code sharing between executables.

what is folder sharing? Explain hidden sharing and open sharanig How can i assign that?

Folder Sharing:--> The folder sharing means we can access
the files & Folders of other computer in our computer
without access the Desktop & Drives.


Hiden Sharing:--> The hiden sharing means we share the
drive with Sign $ & we can't see the drive in Network.

Open Sharing:--> The Open sharing means we can see the
drive in Network.

What are the accessibility features in Windows 2000

StickyKeys,
FilterKeys Narrator,
Magnifier,
On-Screen Keyboard.

What do you do if earlier application doesn’t run on Windows Server 2003

When an application that ran on an earlier legacy version of Windows cannot be loaded during the setup function or if it later malfunctions, you must run the compatibility mode function. This is accomplished by right-clicking the application or setup program and selecting Properties –> Compatibility –> selecting the previously supported operating system.

How do you get to Internet Firewall settings

Start –> Control Panel –> Network and Internet Connections –> Network Connections.

What is Active Directory?

Active Directory is a network-based object store and service that locates and manages resources, and makes these resources available to authorized users and groups. An underlying principle of the Active Directory is that everything is considered an object—people, servers, workstations, printers, documents, and devices. Each object has certain attributes and its own security access control list (ACL).

When should you create a forest

Organizations that operate on radically different bases may require separate trees with distinct namespaces. Unique trade or brand names often give rise to separate DNS identities. Organizations merge or are acquired and naming continuity is desired. Organizations form partnerships and joint ventures. While access to common resources is desired, a separately defined tree can enforce more direct administrative and security restrictions.

How can you authenticate between forests?

Four types of authentication are used across forests:
1. Kerberos and NTLM network logon for remote access to a server in another forest;
2. Kerberos and NTLM interactive logon for physical logon outside the user’s home forest;
3. Kerberos delegation to N-tier application in another forest; and
4. user principal name (UPN) credentials.

How can you authenticate between forests?

Four types of authentication are used across forests:

1.Kerberos and NTLM network logon for remote access to a server in another forest;

2. Kerberos and NTLM interactive logon for physical logon outside the user’s home forest; 3.Kerberos delegation to N-tier application in another forest; and

4.user principal name (UPN) credentials.

What snap-in administrative tools are available for Active Directory

Active Directory Domains and Trusts Manager, Active Directory Sites and Services Manager, Active Directory Users and Group Manager, Active Directory Replication (optional, available from the Resource Kit), Active Directory Schema Manager (optional, available

What types of classes exist in Windows Server 2003 Active Directory?

1.Structural class. The structural class is important to the system administrator in that it is the only type from which new Active Directory objects are created. Structural classes are developed from either the modification of an existing structural type or the use of one or more abstract classes.

2.Abstract class. Abstract classes are so named because they take the form of templates that actually create other templates (abstracts) and structural and auxiliary classes. Think of abstract classes as frameworks for the defining objects.

3.Auxiliary class. The auxiliary class is a list of attributes. Rather than apply numerous attributes when creating a structural class, it provides a streamlined alternative by applying a combination of attributes with a single include action.

4.88 class. The 88 class includes object classes defined prior to 1993, when the 1988 X.500 specification was adopted. This type does not use the structural, abstract, and auxiliary definitions, nor is it in common use for the development of objects in Windows Server 2003 environments.

How do you delete a lingering object?

Windows Server 2003 provides a command called Repadmin that provides the ability to delete lingering objects in the Active Directory.

What is Global Catalog

The Global Catalog authenticates network user logons and fields inquiries about objects across a forest or tree. Every domain has at least one GC that is hosted on a domain controller. In Windows 2000, there was typically one GC on every site in order to prevent user logon failures across the network.

How is user account security established in Windows Server 2003

When an account is created, it is given a unique access number known as a security identifier (SID). Every group to which the user belongs has an associated SID. The user and related group SIDs together form the user account’s security token, which determines access levels to objects throughout the system and network. SIDs from the security token are mapped to the access control list (ACL) of any object the user attempts to access.

What do you do with secure sign-ons in an organization with many roaming users

Credential Management feature of Windows Server 2003 provides a consistent single sign-on experience for users. This can be useful for roaming users who move between computer systems. The Credential Management feature provides a secure store of user credentials that includes passwords and X.509 certificates.

Where are the documents and settings for the roaming profile stored

All the documents and environmental settings for the roaming user are stored locally on the system, and, when the user logs off, all changes to the locally stored profile are copied to the shared server folder. Therefore, the first time a roaming user logs on to a new system the logon process may take some time, depending on how large his profile folder is

What languages can you use for log-on scripts?

1.JavaScipt,
2.VBScript,
3.DOS batch files (.com, .bat, or even .exe)

Causes of memory problems

Depression :
is the most common cause of memory problems. With depression, many of the mental processes are slowed, and memory is particularly affected. Unfortunately, worry about memory loss can worsen the depression, producing a vicious circle.

Stress :
is another common cause of memory problems. Almost any worry or stressful life event can affect our ability to store and recall memories. When the problem is resolved, or time has healed the pain, memory becomes as efficient as it was before.

Chkdsk at the command prompt

1.Click Start, and then Run.
2.In Open, type cmd, and then press ENTER.
3.Use one of the following procedures:

To run Chkdsk in read-only mode, at the command prompt, type chkdsk, and then press ENTER.
To repair errors without scanning the volume for bad sectors, at the command prompt, type chkdskvolume:/f,and then press ENTER.

Note
If one or more of the files on the hard disk are open, you will receive the following message:
Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the next time the system restarts? (Y/N)Type Y, and then press ENTER to schedule the disk check, and then restart your computer to start the disk check.
To repair errors, locate bad sectors, and recover readable information, at the command prompt, type chkdsk volume:/r, and then press ENTER. Note If one or more of the files on the hard disk are open, you will receive the following message:
Chkdsk cannot run because the volume is in use by another process. Would you like to schedule this volume to be checked the next time the system restarts? (Y/N)Type Y, and then press ENTER to schedule the disk check, and then restart your computer to start the disk check.

How to perform disk error checking in Windows XP

Chkdsk (Chkdsk.exe) is a command-line tool that checks volumes for problems. The tool then tries to repair any that it finds. For example, Chkdsk can repair problems related to bad sectors, lost clusters, cross-linked files, and directory errors. To use Chkdsk, you must log on as an administrator or as a member of the Administrators group.

You can also run Chkdsk from My Computer or from Windows Explorer.

Manual steps to run Chkdsk

Notes :
1.Chkdsk requires exclusive access to a volume when it runs. Therefore, if one or more of the
files are open on the disk that you want to check, Chkdsk displays a prompt asking if you want
schedule the disk check for the next time that you restart your computer.
2.Chkdsk might take a long time to run, depending on the number of files and folders, the size of
the volume, disk performance, and available system resources, such as processor and
memory.
3.Chkdsk might not accurately report information in read-only mode.

What are classless routing protocols

More commonly referred to as classless routing behaviour in reference to protocols. examples are ripv2, eigrp, ospf, isis etc. classless routing protocols submit subnet information in the data they send to other routers. therefore, variable subnet masks can be applied other than the default classful subnet mask. i.e, if the first two bits in the first octet are 0 then it is a class A address, and the first octet only, /8 or 255.0.0.0, is the network portion. hence why the private routing address 10.0.0.0 extends all the way to 10.255.255.255. with classless routing behaviour this can be any subnet mask.

Understanding Routing Protocols

The IP protocol is the most common of the routed protocols. AppleTalk and Novell IPX still exist in some networks but are no longer as common as they were a few years ago. How does a routed protocol behave? Let’s examine an IP packet in our fictitious Sprockets corporate network.
In this example, an Intel PC controlling robot, on the manufacturing floor segment of the Sprockets’ network, will make a database query to an IBM mainframe host, on the data center network segment. The manufacturing segment media is fast Ethernet and the IBM host segment is on token ring. A layer 3 IP datagram will have traverse different layer 2 encapsulations and layer 1 media.


Both the IBM mainframe and the manufacturing floor robot controller are configured to use the layer 3 IP routed protocol. The IP datagram, originating in the controller PC, assigns the destination address of 123.21.3.47, the IP address of the IBM mainframe. The IP datagram is encapsulated in a layer 2 Ethernet frame and placed onto the wire. The beauty of the IP protocol is that a datagram doesn’t know how to directly get to its destination. This is the work of a routing protocol.

Exterior routing protocols

Exterior Gateway Protocols (EGPs) route between separate autonomous systems. Examples include:
1.EGP (the original Exterior Gateway Protocol used to connect to the former
Internet backbone network; now obsolete)
2.BGP (Border Gateway Protocol: the current version, BGPv4, dates from around 1995)
3.CSPF (Constrained Shortest Path First)

Interior routing protocols

1.IGRP (Interior Gateway Routing Protocol)
2.EIGRP (Enhanced Interior Gateway Routing Protocol)
3.OSPF (Open Shortest Path First)
4.RIP (Routing Information Protocol)
5.IS-IS (Intermediate System to Intermediate System)

shiyaaan [IGRP] Note that IGRP, a Cisco proprietary routing protocol, is no longer supported. EIGRP accepts IGRP configuration commands, but the internals of IGRP and EIGRP are completely different.

Friday, January 30, 2009

what is Sysvol folder

The Sysvol folder on a Windows domain controller is used to replicate file-based data among domain controllers. Because junctions are used within the Sysvol folder structure, Windows NT file system (NTFS) version 5.0 is required on domain controllers throughout a Windows distributed file system (DFS) forest.This is a quote from microsoft themselves, basically the domain controller info stored in files like your group policy stuff is replicated through this folder structure

What is the use of proxy ARP?

When routers receive ARP requests from one network for hosts on the network, they will respond with a ARP reply packet with their MAC address. For example, let us say host A is in one network, host B is in another network and router C connects these two networks. When host A sends an ARP request to resolve the IP address of host B, the router C receives this packet. The router C sends an ARP reply with its MAC address. So host A will send all the packets destined for host B to the router C. Router C will then forward those packets to host B. Proxy ARP is also used if a host in a network is not able to understand subnet addressing. For example, if host A and host B are actually in two different subnets, but host A cannot understand subnet addressing. So host A assumes that host B is present in the same network. In this case a router, host C, can use proxy ARP to route packets between host A and host B.

What is proxy ARP?

Proxy ARP is the process in which one system responds to the ARP request for another system. For example, host A sends an ARP request to resolve the IP address of host B. Instead of Host B, Host C responds to this ARP request.

What happens when a host receives an ARP request packet?

The ARP request is received and processed by all the hosts in the network, since it is a broadcast packet.
The following steps are carried out when a ARP request packet is received by a host:
1.If the IP address to be resolved is for this host, then the ARP module sends an ARP reply packet with its Ethernet MAC address.
2.If the IP address to be resolved is for this host, then the ARP module updates its ARP cache with the source Ethernet MAC address to source IP address mapping present in the ARP request packet. If the entry is already present in the cache, it is overwritten. If it is not present, it is added.
3.If the IP address to be resolved is not for this host, then the ARP module discards the ARP request packet.

When is an ARP request packet generated?

The following steps results in the generation of an ARP request packet:
1.The IP module sends a packet, destined for another host in the network, to the ARP module.
2.The ARP module looks up the ARP table (cache) to resolve the IP address.
3.If the supplied IP address is present in the ARP cache, it is resolved into its Ethernet address.
4.If the ARP module is not able to find an entry for this IP address in the ARP cache, then it sends an ARP

request packet to the Ethernet driver, to resolve the IP address to the Ethernet address.
5.After the IP address is resolved by the ARP module, the packet is sent to the Ethernet driver for transmission.

What is an ARP cache?

ARP maintains the mapping between IP address and MAC address in a table in memory called ARP cache. The entries in this table are dynamically added and removed

What is the use of ARP?

A host in an Ethernet network can communicate with another host, only if it knows the Ethernet address (MAC address) of that host. The higher level protocols like IP use a different kind of addressing scheme (like IP address) from the lower level hardware addressing scheme like MAC address. ARP is used to get the Ethernet address of a host from its IP address. ARP is extensively used by all the hosts in an Ethernet network.

What is ARP?

Address Resolution Protocol (ARP) is a network protocol, which maps a network layer

What is an IP address?

Every machine on the Internet­ has a unique identifying number, called an IP Address

What Is PRI ?

Primary Rate Interface (PRI) :

ISDN PRI service is used primarily by large organizations with intensive communications needs. An ISDN PRI connection supports 23 64 kbps B-channels and one 64 kbps D-channel (or 23B+D) over a high speed DS1 (or T-1) circuit. The European PRI configuration is slightly different, supporting 30B+D.


BRI is the most common ISDN service for Internet access. A single BRI line can support up to three calls at the same time because it is comprised of three channels (2B+D). Two voice, fax or data "conversations," and one packet switched data "conversation" can take place at the same time. Multiple channels or even multiple BRI lines can be combined into a single faster connection depending on the ISDN equipment you have. Channels can be combined as needed for a specific application (a large multimedia file transfer, for example), then broken down and reassembled into individual channels for different applications (normal voice or data transmissions).

What Is PRI ?

Primary Rate Interface (PRI) :
ISDN PRI service is used primarily by large organizations with intensive communications needs. An ISDN PRI connection supports 23 64 kbps B-channels and one 64 kbps D-channel (or 23B+D) over a high speed DS1 (or T-1) circuit. The European PRI configuration is slightly different, supporting 30B+D.

BRI is the most common ISDN service for Internet access. A single BRI line can support up to three calls at the same time because it is comprised of three channels (2B+D). Two voice, fax or data "conversations," and one packet switched data "conversation" can take place at the same time. Multiple channels or even multiple BRI lines can be combined into a single faster connection depending on the ISDN equipment you have. Channels can be combined as needed for a specific application (a large multimedia file transfer, for example), then broken down and reassembled into individual channels for different applications (normal voice or data transmissions).

What is BRI?

Basic Rate Interface (BRI):

BRI is the ISDN service most people use to connect to the Internet. An ISDN BRI connection supports two 64 kbps B-channels and one 16 kbps D-channel over a standard phone line. BRI is often called "2B+D" referring to its two B-channels and one D-channel. The D-channel on a BRI line can even support low-speed (9.6 kbps) X.25 data, however, this is not a very popular application in the United States.

What is ISDN?

ISDN [I*SD'N] n. 1. Integrated Services Digital Network. 2. A digital telephone service that provides fast, accurate data transmission over existing copper telephone wiring. 3. The way fast way to go online.

The Basics :


ISDN is based on a number of fundamental building blocks. First, there are two
types of ISDN "channels" or communication paths:
B-channel

The Bearer ("B") channel is a 64 kbps channel which can be used for voice, video, data, or multimedia calls. B-channels can be aggregated together for even higher bandwidth applications.
D-channel

The Delta ("D") channel can be either a 16 kbps or 64 kbps channel used primarily for communications (or "signaling") between switching equipment in the ISDN network and the ISDN equipment

What is MPLS VPN ?

MPLS stands for "Multi-Protocol Label Switching" packet-switching VPN technology. After MPLS VPN is used, incoming data packets are assigned a "label" by a "label edge router (LER)". Such labeled packets are forwarded along a "label switch path (LSP)". Along a LSP, each "label switch router (LSR)" forwards a packet based solely on the instructions of the label. At each hop, the LSR strips off the existing label and applies a new label which tells the next hop how to forward the packet. Finally, the LER at the destination system removes the label and delivers the packet to the destined address.
In a MPLS network, LSP is enforced at every hop along the data path such that a secure path is provided across an IP cloud. Specific IP tunnels can be created throughout MPLS network for individual customer, without the need for encryption or end-user applications. LSP paths are designed for their traffic characteristics, as such, they are very similar to ATM path engineering.
LSPs are not restricted to a particular Layer 2 technology but can be flexibly applied to multiple Layer 2 transports such as ATM, Frame Relay or Ethernet. In this way, MPLS enables LSPs to become end-to-end circuits.

What is MPLS-based IP VPN?

It is a IP VPN deploying MPLS technology to mark, classify, and monitor IP packets. At the ingress side of MPLS network, LER examines and determines whether the incoming packets should be labeled. LER classifies incoming IP traffic with MPLS label. The LER converts IP packets into MPLS packets. When the MPLS packets leave the LER, they are examined by LSR for the presence of labels. LSR will then swap labels according to label instructions. At the egress of the network, the LER removes the MPLS header, reconverts MPLS packet into IP packet and forward it to the destined IP network.

What is difference between IP Routing and MPLS VPN Routing ?

In IP routing as an IP packet travels from one router to the next, every router makes it’s own decision on where the packet should go .Each Router reads the IP packet header, and then runs a routing algorithm against the destination address to determine the next hop. Every router then chooses its own next hop for the packet based on the packets header and the routing algorithm. Routers will assign each packet into a set of “Forwarding Equivalence Classes (FECs)” They will then map each FEC to a next hop.

With MPLS every packet only has its IP layer header examined once, when it enters the MPLS network. After the initial FEC assignment a 32 bit fixed length label(called MPLS Label Header or Shim Header) is inserted into the packet that contains the assigned FEC then is sent to the next hop router with the label attached. The label is of local significance only. When MPLS routers, which are called label switch routers(LSRs), are provisioned they will set up a table of label to FEC mappings. Each FEC is assigned a next hop. A label distribution protocol(LDP) is used to exchange label information between label switch routers that have a direct connection to each other. The protocol usually rides on top of the routing protocol in use by the use of extensions that have been developed for MPLS. As the packet goes from hop to hop across the MPLS network the network layer header no longer has to be examined by every router. Instead, the label is used to determine the next hop and which new label to use.
The old label is replaced with the new label, and the packet is forwarded to its next hop. With MPLS forwarding, once a packet is assigned FEC subsequent routers do no further network layer header analysis; the labels drive all forwarding decisions

This method of packet forwarding has many advantages over IP layer forwarding. Since a packet is assigned to a FEC when it enters the network, the edge label switch router can use any information about the packet in determining which FEC to use, even if the information is not contained in the IP header. Packets with the same destination arriving on different ports of the router can be assigned to different FECs. Conventional forwarding, on the other hand, can only consider information that travels with the packet in the packet header. A packet that enters the network at a particular router can be labeled differently than the same packet entering the network at a different router, and as a result forwarding decisions that depend on the ingress router can be easily made. This cannot be done with traditional forwarding, since the identity of a packet's ingress router does not travel with the packet.

What is T1 Line ?

T-carrier is a generic designator for any of several digitally multiplexed telecommunications carrier systems. T1 seems to mean any data circuit that runs at the original 1.544 Mbit/s line rate. T1 carries 24 pulse-code modulated(PCM), time-division multiplexed(TDM) speech signals each encoded in 64 kbit/s streams, leaving 8 kbit/s of framing information which facilitates the synchronization and demultiplexing at the receiver.T1 is used in North America and Japan.

What is Codec?

Codec is a special library or a program that converts normal audio signal in to digitaly encoded one. Codecs vary in the sound quality, the bandwidth required, the computational requirements.

What is E1 line?

In telecommunications, where a single physical wire can be used to carry many simultaneous voice conversations, worldwide standards have been created and deployed. E-carrier system, which is revised and improved version of the earlier American T-carrier technology. Now it is widely used in almost all countries outside USA, Canada and Japan. The line data rate for E1 is 2.048 Mbit/s (full duplex) which is split into 32 time slots, each being allocated 8 bits in turn. It is a ideal for voice traffic because voice is sampled at the same 8khz rate so E1 line can carry 32 simultaneous voice conversions.

Thursday, January 29, 2009

How Do I Install Net Meeting

Wondering how to install Netmeeting on Windows XP? Well you don't have to install it! Why? It is already pre-installed with Windows XP, but (by design they say) it isn't linked to anywhere on your programs menu.

Here is how to load it:

1: Click START then RUN

2: Enter "conf" without the quotes

How Do I Install Net Meeting

Wondering how to install Netmeeting on Windows XP? Well you don't have to install it! Why? It is already pre-installed with Windows XP, but (by design they say) it isn't linked to anywhere on your programs menu.
Here is how to load it:
1: Click START then RUN
2: Enter "conf" without the quotes

Reduce Temporary Internet F ile Space

The temporary internet files clutter your hard drive with copies of each page visited. These can build up over time and take up disk space. Even more bothersome is that instead of getting new pages each time IE often takes the page out the temp internet files. This can be a problem if you are viewing a website that is updated all the time. If you are on a slow connection such as a 56K or lower then this can be good but if you are on a fast broadband connection, like me, then you can get away with decreasing the size of your temp internet files to just one meg without any performance decrease.

Launch Internet Explorer.Select the Tools from the menu bar.Then select Internet Options... from the drop down menu.Once the internet options has loaded click on the general tab.Under the temporary internet files section click the settings button.A settings window will load. Slide the slider all the way to the left so the size indicated in the text box on the right is one.Click OKClick Ok

How to Convert a FAT Partition to NTFS

To convert a FAT partition to NTFS, perform the following steps.
Click Start, click Programs, and then click Command Prompt.
In Windows XP, click Start, and then click Run.
At the command prompt, type CONVERT [driveletter]: /FS:NTFS.Convert.exe will attempt to convert the partition to NTFS.
NOTE:
Although the chance of corruption or data loss during the conversion from FAT to NTFS is minimal, it is best to perform a full backup of the data on the drive that it is to be converted prior to executing the convert command. It is also recommended to verify the integrity of the backup before proceeding, as well as to run RDISK and update the emergency repair disk (ERD).

Make your Folders Private

•Open My Computer
•Double-click the drive where Windows is installed (usually drive (C:), unless you have more
than one drive on your computer).
•If the contents of the drive are hidden, under System Tasks, click Show the contents of this
drive.
•Double-click the Documents and Settings folder.
•Double-click your user folder.
•Right-click any folder in your user profile, and then click Properties.
•On the Sharing tab, select the Make this folder private so that only I have access to it check
box.

Note :
•To open My Computer, click Start, and then click My Computer.

•This option is only available for folders included in your user profile. Folders in your user profile
include My Documents and its subfolders, Desktop, Start Menu, Cookies, and Favorites. If you
do not make these folders private, they are available to everyone who uses your computer. •When you make a folder private, all of its subfolders are private as well. For example, when you
make My Documents private, you also make My Music and My Pictures private. When you
share a folder, you also share all of its subfolders unless you make them private.
•You cannot make your folders private if your drive is not formatted as NTFS For information
about converting your drive to NTFS

The Advantages of NTFS

The NTFS file system, introduced with first version of Windows NT, is a completely different file system from FAT. It provides for greatly increased security, file–by–file compression, quotas, and even encryption. It is the default file system for new installations of Windows XP, and if you're doing an upgrade from a previous version of Windows, you'll be asked if you want to convert your existing file systems to NTFS. Don't worry. If you've already upgraded to Windows XP and didn't do the conversion then, it's not a problem. You can convert FAT16 or FAT32 volumes to NTFS at any point. Just remember that you can't easily go back to FAT or FAT32 (without reformatting the drive or partition), not that I think you'll want to.

The NTFS file system is generally not compatible with other operating systems installed on the same computer, nor is it available when you've booted a computer from a floppy disk. For this reason, many system administrators, myself included, used to recommend that users format at least a small partition at the beginning of their main hard disk as FAT. This partition provided a place to store emergency recovery tools or special drivers needed for reinstallation, and was a mechanism for digging yourself out of the hole you'd just dug into. But with the enhanced recovery abilities built into Windows XP (more on that in a future column), I don't think it's necessary or desirable to create that initial FAT partition.

When to Use FAT or FAT32

If you're running more than one operating system on a single computer , you will definitely need to format some of your volumes as FAT. Any programs or data that need to be accessed by more than one operating system on that computer should be stored on a FAT16 or possibly FAT32 volume. But keep in mind that you have no security for data on a FAT16 or FAT32 volume—any one with access to the computer can read, change, or even delete any file that is stored on a FAT16 or FAT32 partition. In many cases, this is even possible over a network. So do not store sensitive files on drives or partitions formatted with FAT file systems

FAT32

The FAT32 file system, originally introduced in Windows 95 Service Pack 2, is really just an extension of the original FAT16 file system that provides for a much larger number of clusters per partition. As such, it greatly improves the overall disk utilization when compared to a FAT16 file system. However, FAT32 shares all of the other limitations of FAT16, and adds an important additional limitation—many operating systems that can recognize FAT16 will not work with FAT32—most notably Windows NT, but also Linux and UNIX as well. Now this isn't a problem if you're running FAT32 on a Windows XP computer and sharing your drive out to other computers on your network—they don't need to know (and generally don't really care) what your underlying file system is.

FAT16

The FAT16 file system was introduced way back with MS–DOS in 1981, and it's showing its age. It was designed originally to handle files on a floppy drive, and has had minor modifications over the years so it can handle hard disks, and even file names longer than the original limitation of 8.3 characters, but it's still the lowest common denominator. The biggest advantage of FAT16 is that it is compatible across a wide variety of operating systems, including Windows 95/98/Me, OS/2, Linux, and some versions of UNIX. The biggest problem of FAT16 is that it has a fixed maximum number of clusters per partition, so as hard disks get bigger and bigger, the size of each cluster has to get larger. In a 2–GB partition, each cluster is 32 kilobytes, meaning that even the smallest file on the partition will take up 32 KB of space. FAT16 also doesn't support compression, encryption, or advanced security using access control lists.

How to Upgrade Windows 98 or Windows Millennium Edition Profiles to Windows XP Domain User Profiles

This guide describes how to upgrade a Microsoft Microsoft Windows 98-based, or Microsoft Windows Millennium Edition-based client that has user profiles to a Microsoft Windows XP-based client.

The following steps enable the Windows 98 and Windows Millennium Edition (Me) profiles to be retained throughout the process.

Your best method to retain the profiles is to join the domain during the upgrade installation process.
Otherwise, you must use a workaround method to transfer the profile information over to the Windows XP profile.

During the upgrade installation process, at the networking section, the administrator is offered the choice to join a domain or a workgroup.
If you join the domain at this juncture, you ensure that all the existing profiles are migrated successfully to the Windows XP-based installation.

If you did not join the computer to the domain during the upgrade process, you must use the following workaround method:

Join the upgraded computer to the target domain.

All applicable users must log on and log off (which generates a profile).

Copy the appropriate Application Data folder from the Windows 95, Windows 98, and Windows Me profiles to the newly created user profiles.


Restricting Logon Access

If you work in a multiuser computing environment, and you have full (administrator level) access to your computer, you might want to restrict unauthorized access to your "sensitive" files under Windows 95/98.
One way is to disable the Cancel button in the Logon dialog box.
Just run Regedit and go to:

HKEY_LOCAL_MACHINE/Network/Logon

Create the "Logon" subkey if it is not present on your machine: highlight the Network key -> right-click in the left hand Regedit pane -> select New -> Key -> name it "Logon" (no quotes) -> press Enter. Then add/modify a DWORD value and call it "MustBeValidated" (don't type the quotes). Double-click it, check the Decimal box and type 1 for value.
Now click the Start button -> Shut Down (Log off UserName) -> Log on as a different user, and you'll notice that the Logon Cancel button has been disabled.

How To Uninstall GrooveMonitor.exe

Groove Monitor is a service utility that tracks groove behavior and creates reports for error reporting to MS (what else does it report?). It loads on startup. It gets installed when you install Office 2007. However it doesn't get uninstalled when you uninstall Office 2007. Groove Monitor starts upon Windows startup (via registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Current Version\Run).

To remove Groove Monitor from your machine you have to go to Control Panel and then select Add/Remove programs. Groove Monitor is one of the displayed applications. Uninstall it from there. That should do it for any normal windows program. Not surprisingly Microsoft himself often violates this basic principle (which surprisingly would give you more control over their crappy [pardon my French] software), and Groove Monitor will still load on startup.
You can however use msconfig to prevent it from coming up on Windows startup.

1. Go to Start menu and click Run
2. Type msconfig and press Enter.
3. Go to Startup tab and then uncheck any reference to "groove monitor"
4. Reboot
Note: Some malware may also camouflage themselves as GrooveMonitor.exe, particularly if they are located in c:\windows or c:\windows\system32 folder.
Groove Monitor is currently owned by Microsoft Corporation.

Disabling Autoplay / Autorun for CD's

Windows 95 Permanently Disabling Autoplay :
To prevent Windows 95 from automatically playing your audio CD's,
1. Start Explorer
2. Select 'View/Options/File Type'
3. Scroll through the list until you reach 'AudioCD'
4. Select that listing 5. Press the 'Edit' button
6. Select the action 'Play'
7. Press the 'Edit' button
8. Delete the command "/play" after CDPLAYER.EXE
9. Press 'Okay'
10. Press 'Close'

Or
Disabling Autoplay and Autorun of CD's
1. Right-click on 'My Computer'
2. Open 'Properties'
3. Choose the 'Device Manager'
4. Double-click on your CD-ROM
5. Select the 'Settings' tab
6. Uncheck 'Auto insert notification'
7. Click okay until closed, and restart Windows 95

Full ShortCut Key List (Windows 95 / 98 / 98SE / Me )

1.F1: Help
2.CTRL+ESC: Open Start menu
3.ALT+TAB: Switch between open programs
4.ALT+F4: Quit program
5.SHIFT+DELETE: Delete item permanently

Windows Program Key Combinations :
1. CTRL+C: Copy
2.CTRL+X: Cut
3.CTRL+V: Paste
4.CTRL+Z: Undo
5.CTRL+B: Bold
6.CTRL+U: Underline
7.CTRL+I: Italic Mouse Click/Keyboard Modifier Combinations for Shell Objects
8.SHIFT+right click: Displays a shortcut menu containing alternative commands
9.SHIFT+double click: Runs the alternate default command (the second item on
themenu)
10.ALT+double click: Displays properties
11.SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin

General Keyboard-Only Commands :
1.F1: Starts Windows Help
2.F10: Activates menu bar options
3.SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object
4.CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)
5.CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press
6.SHIFT+F10 for a context menu)
7.ALT+DOWN ARROW: Opens a drop-down list box
8.ALT+TAB: Switch to another running program (hold down the ALT key and then press the
9.TAB key to view the task-switching window)
10.SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the
automatic-run feature
11ALT+SPACE: Displays the main window's System menu (from the System menu, you can
restore, move, resize, minimize, maximize, or close the window)
12.ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's
System menu (from the MDI child window's System menu, you can restore, move, resize,
minimize, maximize, or close the child window)
13.CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI)
program ALT+underlined letter in menu: Opens the menu
14.ALT+F4: Closes the current window
15.CTRL+F4: Closes the current Multiple Document Interface (MDI) window
16.ALT+F6: Switch between multiple windows in the same program (for example, when the
Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and
the main Notepad window) Shell Objects and General Folder/Windows Explorer Shortcuts

For a selected object:
1.F2: Rename object
2.F3: Find all files
3.CTRL+X: Cut
4.CTRL+C: Copy
5.CTRL+V: Paste
6.SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle
Bin
7.ALT+ENTER: Open the properties for the selected object

Microsoft Natural Keyboard Keys :
Windows Logo: Start menu Windows
Logo+R: Run dialog box
Windows Logo+M: Minimize all
SHIFT+Windows Logo+M: Undo minimize all
Windows Logo+F1: Help
Windows Logo+E: Windows Explorer
Windows Logo+F: Find files or folders
Windows Logo+D: Minimizes all open windows and displays the desktop
CTRL+Windows Logo+F: Find computer
CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
Windows Logo+TAB: Cycle through taskbar buttons Windows Logo+Break: System Properties dialog box Application key: Displays a shortcut menu for the selected item

Microsoft Natural Keyboard with Intelli Type Software Installed :
Windows Logo+L: Log off Windows
Windows Logo+P: Starts Print Manager
Windows Logo+C: Opens Control Panel Windows Logo+V: Starts Clipboard
Windows Logo+K: Opens Keyboard Properties dialog box
Windows Logo+I: Opens Mouse Properties dialog box
Windows Logo+A: Starts Accessibility Options (if installed)
Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
Windows Logo+S: Toggles CAPS LOCK on and off

Dialog Box Keyboard Commands TAB: Move to the next control in the dialog box :
SHIFT+TAB: Move to the previous control in the dialog box
SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option. ENTER: Equivalent to clicking the selected button (the button with the outline)
ESC: Equivalent to clicking the Cancel button
ALT+underlined letter in dialog box item: Move to the corresponding item

Disable Dr. Watson

Watson is a debugging tool in windows , which sometimes becomes quite irritating when ever it pops up suddenly .

Here is a method to disable it , if it bugs you :
Dr. Watson can be disabled using the registry editor:
1.Start the registry editor (Start >> Run >> type "regedit.exe" >> Hit enter )
2.Navigate to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \
Windows NT \ CurrentVersion \ AeDebug
3.Click on AeDebug and click Del


Alternativly just set HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ AeDebug \ AUTO to 0

To re-enable Dr. Watson type "drwtsn32 -i" in run window.

Restore Deleted Recycle Bin Icon from Desktop

Method #
1:1. Right-click an empty area of your desktop
2. Select Properties
3. Click the Desktop tab
4. Click the Customize button
5. Click Restore Default
6. Exit all windows and restart your computer
Method #
2:Note: Be sure to make a backup copy of your registry prior to making any changes.
Go to Start>> Run. Type in: regedit [Enter]
Navigate to: HKEY_LOCAL_MACHINE\
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace
Hold the mouse on NameSpace and right-click once. From the resulting menu, select Edit>>New>> Key
Copy and Paste the following Key code (including the brackets):
{645FF040-5081-101B-9F08-00AA002F954E}
Press Enter on your keyboard, exit the registry editor and restart your system.

Increase HardDisk Spead In Windows

If you like to increase/optimize your Hard Disk I/O - read/write speed without buying expensive software utilities to do that job or changing the HD, just follow next steps. With doing these steps you will increase Hard disk speed (depends of manufacture and specification, but its worth to try). The most speed improvement is visible with IDE drives; however there are reports that this tweak also does good for SCSI disks.
In any case, it won't harm your system, so try it yourself and let me know what you find!
Steps:
1. Run SYSEDIT.EXE from the start & then Run command.

2. Expand the system.ini file window.
3. Scroll down almost to the end of the file untill you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type
5. Irq14=4096 (note: This line IS CASE SENSITIVE)
6. Click on the File menu, then choose Save.
7. Close SYSEDIT and reboot your computer.
8. Restart windows!The speed improvement will be noticed just after the system reboots, any system info. software can be used to check the improvement.

How to remove recycle bin from your desktop

pen Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\ {645FF040-5081-101B-9F08-00AA002F954E } and delete it. This action should remove recycle bin from your desktop.

Why are there two different versions of Windows XP?

That's a question that seems to stir a bit of debate. Microsoft released Windows XP Home and Windows XP Professional, targeted as you might suspect from their Home and Professional designations, toward home users and business users. Both versions are based on the same kernel (operating system guts) that is a variation of the one found in Windows 2000. A lot of press has been generated to the effect that Home has a few more lines of code that disable some of the Professional features so it can be sold for less money. Whether that's true or not, I don't know, but the official line is that Home is targeted toward home users who concentrate on e-mail, music and photo editing, and internet browsing. Professional is designed to allow a secure network business environment

What is Windows XP?

Windows XP is the most recent desktop operating system from Microsoft. Prior to the introduction of Windows XP on October 25, 2001 there were basically two different versions of Windows; consumer and business. The business version was originally designated by the letters NT. In its most recent version, the name was changed to Windows 2000 although it's also known as NT 5.0. The consumer versions prior to XP are most often collectively referred to as Win9x, with Windows 95, 98, and Me being the most recent offerings. Windows NT versions were designed to be more robust than the consumer versions with a heavy emphasis on reliability and security. In contrast, the W9x versions were aimed to be more consumer friendly, concentrating less on security but emphasizing ease of use and tasks that were more likely to interest consumers such as multimedia and compatibility with a wide range of consumer oriented devices. While the user interfaces of both verities may have appeared similar they were very different under the hood. Windows XP is Microsoft's attempt to merge the security and reliability of NT with the ease of use that made Win9x so popular with consumers

Wednesday, January 28, 2009

How To Enable Remote Assistance In Remotly

.start Run (Type cmd)

2.Type Regedit

3.Go to File Menu /Connect To Network Registry

4.Type Remote Meachine Ip Or Hostname

5.Go To HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server

6.Double Click On fAllowToGetHelp

Set Value :

Disable 0
Enable 1

How To Enable Remote Desktop In Remotly

1.start Run (Type cmd)

2.Type Regedit

3.Go to File Menu /Connect To Network Registry

4.Type Remote Meachine Ip Or Hostname

5.Go To HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server

6.Double Click On fDenyTSConnections

Set Value :

Disable 1
Enable 0

Tuesday, January 27, 2009

Desktop icons

How to make the desktop icons smaller or lager?
This is very simple on you main desktop just right click the mouse button in a blank space, then scroll down and click properties. You are at the display settings menu on the top bar you will see a tab that reads appearance, click on this tab. Once you ...