We aims to provide in house support to our colleagues and the Engineers for any sort of technical help.You can raise your technical queriesor browse for any solutions for the probelms through our groups.We provide driver support,OS support and utility support too to make your life a better one.

Our Mission

Transform HCL Infosystems LTD into services and solution centric organization

Tuesday, March 30, 2010

How can I create a disk partition on a disk that is greater than 2TB in size?

  • The fdisk command only supports the legacy MBR partition table format (also known as msdos partition table)
    • MBR partition table do not support disks greater than 2.1TB, and therefore fdisk is also unable to create partition tables on these devices.
    • Note that some older versions of fdisk may permit a larger size to be created but the resulting partition table will be invalid.
  • The parted command can create disk labels using MBR (msdos), GUID Partition Table (GPT), SUN disk labels and many more types.
    • The GPT disk label overcomes many of the limitations of the DOS MBR including restrictions on the size of the disk, the size of any one partition and the overall number of partitions.
    • Note that booting from a GPT labelled volume requires firmware support and this is not commonly available on non-EFI platforms (including x86 and x86_64 architectures).

    Procedure:
  • Use the parted tool to access the partition table of the device:
    # parted /dev/sdj
    Using /dev/sdj
    Welcome to GNU Parted! Type 'help' to view a list of commands.
    (parted)
    
    
  • Once at the parted prompt, create a GPT label on the disk:
    (parted) mklabel
    Warning: The existing disk label on /dev/sdj will be destroyed and all data on this disk will be lost. Do you want to continue?
    Yes/No? Yes                                                                 
    New disk label type?  [gpt]? gpt                                          
    (parted)
    Note: This will remove any existing partition table and partitions on the device.
  • Use the print command to show the size of the disk as reported by parted.  We need this later:
    (parted) print                                                            
    
    Model: Linux device-mapper (dm)
    Disk /dev/sdj: 5662310.4MB
    Sector size (logical/physical): 512B/512B
    Partition Table: gpt
    
    Number  Start  End  Size  File system  Name  Flags
    
    
  • Create a primary partition on the device.  In this example, the partition will encompass the entire disk (using size from the step above):
    (parted) mkpart primary 0 5662310.4MB
    
    
  • Unlike fdisk, you do not have to write out the partition table changes with parted.  Display your new partition and quit.
    (parted) print
    
    Model: Linux device-mapper (dm)
    Disk /dev/mapper/VolGroup00-gpttest: 5662310.4MB
    Sector size (logical/physical): 512B/512B
    Partition Table: gpt
    
    Number  Start   End          Size         File system  Name     Flags
     1      17.4kB  5662310.4MB  5662310.4MB               primary       
    
    (parted) quit                                                             
    Information: Don't forget to update /etc/fstab, if necessary.
    
    
  • You can now create a filesystem on the device /dev/sdj1

How to spoof a MAC address?

MAC address filtering for wireless networking isn’t real “security”. Anyone who pays any attention to current trends in wireless security at all should know that MAC filtering is less effective than WEP — and that WEP can be cracked almost instantly these days with commonly available tools.

This doesn’t mean MAC filtering is useless. Its resource consumption is almost unmeasurable, and even if it doesn’t keep out any reasonably knowledgeable security crackers willing to spend a few moments gaining access, it does keep out a lot of automated opportunistic attacks that are aiming solely for the absolute lowest-hanging fruit on the security tree. Since that lowest-hanging fruit consists of the majority of wireless access points, MAC filtering can be of value as a way of turning away the majority of opportunistic attackers.

Don’t rely on MAC filtering alone, however. Please, just don’t. It’s a bad idea. People seem to think “Oh, well, sure a determined attacker can get past it, but not anyone else.” It doesn’t take much determination at all to spoof a MAC address. In fact, I’ll tell you how:

1.“Listen” in on network traffic. Pick out the MAC address. This can be done with a plethora of freely available security tools, including Nmap.

2.Change your MAC address.
You can spoof a MAC address when using Nmap with nothing more than a –spoof-mac command line option for Nmap itself to hide the true source of Nmap probes. If you give it a MAC address argument of “0″, it will even generate a random MAC address for you.

For more general MAC address spoofing, your MAC address is trivially reset with tools available in default installs of most operating systems. Here are some examples:

Linux: ifconfig eth0 hw ether 03:a0:04:d3:00:11
FreeBSD: ifconfig bge0 link 03:a0:04:d3:00:11
MS Windows: On Microsoft Windows systems, the MAC address is stored in a registry key. The location of that key varies from one MS Windows version to the next, but find that and you can just edit it yourself. There are, of course, numerous free utilities you can download to make this change for you as well (such as Macshift for MS Windows XP).

All of these techniques can of course be automated by self-propagating malware, and the creation of the malware can even be automated to some extent by existing malware creation “kits”. If that doesn’t convince you that MAC filtering does not provide real security, I don’t know what will.

HCL LAPTOP ME 43 Review from CHIP MAGAZINE

 Click the image to enlarge

Thursday, March 25, 2010

Windows XP mode in Windows 7 Frequently Asked Questions from Windows 7 center


There’s been a lot of buzz and confusion about the Windows XP Mode that was recently introduced as a utility that can be used with Windows 7. The purpose of this page is to provide everything you need to know about XPM in one central location without you having to search multiple pages for information about XPM. You can get all the basic info you need on one page. If I’ve missed anything, please let me know in the comments.

What is Windows XP Mode (XPM)?

Windows XP Mode (XPM) allows you to run your Windows XP apps in a virtual environment alongside your Windows 7 apps in the same desktop. It was designed by Microsoft to ease the transition from XP to Windows 7, particularly for small businesses that are reliant on their legacy apps.

Why do you want it?

It will allow you to run apps that are only compatible with XP in Windows 7. It’s also different from previous virtualization technologies by Microsoft, in which you can now run a virtual app in the same desktop as your host OS without having to deal with two separate desktops. Still confused? We have screenshots and video to demonstrate.

Where can I download it?

Microsoft is offering XPMode beta as a download for everyone. You can download it here.

Will all SKUs or editions of Windows 7 be able to run XPM?

Windows XP Mode will only be available to anyone running Windows 7 Professional or above.

Where can I get XPM?

Windows XP Mode is currently available on Technet/MSDN for subscribers. All other users will have to wait until May 5th. Microsoft plans to release XPM on the same date they publicly release Windows 7 Release Candidate. It is an optional download, so it will be bundled with the operating system. You will have to separately download it.

Can I run Windows XP Mode?

There are several hardware requirements you need to meet in order to run XPM.
  • Hardware Virtualization: Your processor (CPU) must have hardware virtualization technology in order for you to be able to run XPM.
  • If you’re using an AMD processor, the Athlon 64, Athlon 64 X2 (Family F or G on socket AM2), Turion 64 X2, Opteron 2nd gen and 3rd gen, Phenom, and all newer processors. If you’re using an Intel CPU, use the processor spec finder here and look for Intel® Virtualization Technology  under Supported Features.
  • 2GB RAM: Microsoft has recommended a minimum of 2GB RAM for anyone who wants to use XPM.
If you are still unsure if you can run Windows XP Mode, please visit this article for more information.

What’s included in the XP Mode package?

Several files are included in the package:
  • Windows KB958559 update file that must be installed first. It installs Microsoft Virtual PC.
  • Virtual Windows XP Package: This package automatically installs creates a virtual machine with a version of Windows XP installed on the virtual hard disk. This is easier than doing it manually since a setup wizard is provided for you.
Windows XP Mode (XPM)   Everything you need to know

Can I install my own image of Windows XP instead?

Yes.

What about Vista and Windows 7 images?

Works too.

Is Microsoft really giving away a free copy of Windows XP SP3?

Yes, since it is part of the Windows XP Mode package.

Will I be able to run 3d applications or games with this?

Like with all virtualization solutions, Windows XP Mode was not designed for graphics intensive, media intensive, or hardware intensive applications.

How is the performance of XPM compared to VMWare?

As inspected by Mike from our forums, Virtual PC is not a multi-core application. In comparison to VMWare, it runs much slower if you have a multi-core CPU.

When will Windows XP Mode ship?

Microsoft says they are aiming for the General Availability date of Windows 7, which is to ship on the same day as Windows 7 is released.

What’s the difference between MED-V and XPM?

Med-V is geared towards large scale organizations that use management infrastructure.  XPM was designed for Small Businesses. MED-V is also supported with Windows Vista. More information about MED-V can be found here.

So what was this same desktop thing you were talking about?

Windows 7 XP Mode

Sunday, March 21, 2010

What’s New in Group Policy for Windows 7 and Windows Server 2008 R2


At a Glance:
  • Updated RSAT filters
  • Automated GPO handling with Windows PowerShell
  • Tabless interface for ADM and ADMX
  • Built-in Starter GPOs and new policy settings

I get e-mail almost every day from people asking me, "What's coming for Group Policy in the new version of Windows?" In this question, I can feel an eagerness to know what the new features and changes will mean for IT professionals.
I know that change can sometimes be stressful, but I can say confidently that the news is all good: Some powerful, neat Group Policy changes are included in Windows 7 and Windows Server 2008 R2, but nothing too radical or different. IT professionals will benefit from some updates, some new features and some user interface tweaks, for example, but without the headaches associated with steep learning curves.
The Group Policy changes can be divided into two broad categories. First are the items the Group Policy team delivers: core functionality, including the Group Policy engine and new and updated features in the Group Policy editing system (Group Policy Management Console, or GPMC, and Group Policy Management Editor, or GPME). Second are items that other teams provide to manage their components using Group Policy: updated policy settings and feature controls inside GPME that we all use to manage the new and updated functions on our target machines. In this article, I cover both kinds of changes.

Updated Group Policy Core Features
For Windows 7 and Windows Server 2008 R2, the Group Policy team has come through with a smorgasbord of features and updates. Here's the nonscientific breakdown of what is delivered in the most recent update of Windows: one big fix, one big update, one big new feature, one big user interface change and one big in-the-box addition.
The Big Fix: Updated Filters
The updated filters in the updated GPMC (available for Windows 7 and Windows Server 2008 R2) are welcome changes. The fixes squash a bug that's been around since Windows Vista shipped. In Figure 1, you can see one of my favorite features that's been available since the updated GPMC, contained within the Remote Server Administration Toolkit (RSAT): the Filter Options dialog box.

Figure 1 Filter Options dialog box. (Click the image for a larger view)
RSAT's job is simple: to let you use a Vista (or later) machine to control various aspects of your network from the machine you use and to provide the tools you need to do so, including the updated GPMC. This updated GPMC has some neat features; one of them is the ability to use filters to define the criteria you want to use to find just the Administrative Templates Group Policy settings you want. The problem was that when Vista and its corresponding RSAT came out, the filters didn't work, a bug that plagued many administrators.
Let me explain the bug in a little more detail. Figure 1 shows the Enable Requirements Filters section of the Filters dialog box. The goal of this section is simple: to help you figure out which Administrative Templates policy settings are valid for specific operating systems.
One mode within Enable Requirements Filters is "Include settings that match all of the selected platforms." The other is "Include settings that match any of the selected platforms. At first glance, the two modes seem very similar. But the difference between "all" and "any" is substantial. Here is what each mode is supposed to do once you select it and specify some criteria:
  • "Include settings that match all of the selected platforms" should show policy settings that are valid only on the types of machines specified. So if you select Windows XP Service Pack (SP) 2 and Vista, the result should be policy settings that work only on Windows XP SP2 and Vista.
  • "Include settings that match any of the selected platforms" should show settings that apply to any of the selected operating systems. So if you select both Windows XP SP2 and Vista, all settings that apply to Windows XP SP2 and all settings that apply to Vista should be displayed.
These filters are both as useful as they sound. The only problem is that with the Vista and Windows Server 2008 version of RSAT, neither of them worked properly. If you selected "Include settings that match all of the selected platforms," the result was often a mere fraction of valid settings that were actually applicable to target machines. And if you selected "Include settings that match any of the selected platforms," no results were ever displayed.
According to my friends in the Group Policy team, this fix should be part of the final downloadable version of RSAT for Windows 7 and the in-the-box RSAT for Windows Server 2008 R2.
The Big Update: Deploying Windows PowerShell Scripts to Target Machines
Unless you're living under a rock, you know that Windows PowerShell is gaining popularity with system administrators. But one issue has blocked some administrators from adopting PowerShell. There hasn't been a simple way for them to leverage their newfound PowerShell muscle over an area in which they need the most control: user and computer scripts.
The RSAT in Windows 7 and Windows Server 2008 R2 allows administrators to specify PowerShell scripts as either logon or logoff scripts (for the user) and startup or shutdown scripts (for the computer). Figure 2 shows the Startup Properties dialog box in the GPME, in which the administrator can specify the order in which PowerShell scripts run and also which type of scripts should run first: PowerShell scripts or the non-PowerShell scripts (which are not shown but are located within the Scripts tab in the Startup Properties dialog box).

Figure 2 Windows PowerShell Scripts tab in the Startup Properties dialog box. (Click the image for a larger view)
To use this feature, you need to create or edit your Group Policy Objects (GPOs) from a Windows 7 or Windows Server 2008 R2 machine with the corresponding RSAT tools (which contain an updated GPMC to support this new functionality). In addition, the target machine must be Windows 7 or Windows Server 2008 R2 for the PowerShell scripts to run. Older machines (even with PowerShell loaded) are not valid targets and do not run Power­Shell logon, logoff, startup or shutdown scripts. Some third-party solutions that can deploy PowerShell scripts to non-Windows 7 machines are available if you need this capability.
The Big Feature: Manipulating Registry Settings with PowerShell Cmdlets
Lots of system administrators like to automate their world. This a good thing. Indeed, you can think of leveraging Group Policy in your environment as the mass automation of your client machines (so you don't have to run around and push buttons). To take your administration to the next level, you might want to automate the handling of your GPOs themselves.
Some administrators have leveraged the existing Group Policy GPMC sample scripts to automate key Group Policy tasks.
Windows 7 and Windows Server 2008 R2 allow you to use PowerShell to perform many of these functions. What was possible in the GPMC sample scripts is now possible using PowerShell: creating, linking, renaming, backing up, copying and deleting GPOs as well as much more.
The ability to configure the contents of a GPO using a scriptable method, however, is totally new and now available only when you use PowerShell as your scripting method. Before you get too excited, I should mention that not all 39 areas of Group Policy are scriptable. Indeed, only two are: Registry Policy and Registry Preference. Even so, it's a terrific start.
In Figure 3, you can see how I'm using the built-in Power­Shell in Windows 7 to first install the Group Policy-specific cmdlets using the cmdlet import-module grouppolicy and then create a new GPO with the new-gpo cmdlet.

Figure 3 Creating a new GPO using Group Policy cmdlets built into Windows 7. (Click the image for a larger view)
The Group Policy team's blog has an array of items regarding Windows PowerShell integration. You can view all of them at one glance by checking out the the Group Policy Team Blog.
The Big User Interface Change: Updated ADM and ADMX User Interface
One of the most striking Group Policy changes is in the Administrative Templates section of the GPME.
A new "tabless" interface, shown in Figure 4, puts all the content you need for creating new or manipulating existing policy settings in a one-stop-shop page.

Figure 4 Windows Firewall: Allow ICMP Exceptions dialog box. (Click the image for a larger view)
Administrators can now configure a policy setting as Not Configured, Enabled or Disabled, make comments about a policy setting, see the Supported On information, view the Help (Explaintext), and manipulate any configurable settings within Options.
The goal of this change is to make the policy-setting experience more intuitive, integrate help and take away all the tabs so administrators don't have to click from place to place anymore.
The Big In-the-Box Addition: Built-in Starter GPOs
The ability to create and use Starter GPOs first became available in the Vista version of the GPMC. The idea behind a Starter GPO is that an administrator can create a starting point for other administrators to use when creating their GPOs. The fundamental architecture and functionality hasn't changed much in this new update, but one new distinction is notable.
Specifically, when you use a Windows 7 or Windows Server 2008 R2 machine to create the Starter GPO's container, the container is automatically populated with some built-in Starter GPOs. These Starter GPOs follow Microsoft best practices and map to the Windows Server 2008 Security Guide. For example, one of these built-in Starter GPOs is for an average Enterprise Client (EC) and another, with a more locked-down approach, is called Specialized Security Limited Functionality (SSLF).
Windows 7 and Windows Server 2008 R2 include Starter GPOs for both the user and computer sides. These Microsoft-created Starter GPOs are also available (in slightly older form) for Vista and Windows XP SP2.

Beyond the Core Features
Now let's talk about some of the areas of additional control you get when you're working with Windows 7 or Windows Server 2008 R2 as a client. And when I say "client" here, I mean "the computer receiving Group Policy directives" (even if it's a Windows Server 2008 R2 machine).
One great addition is about 300 new policy settings, of which 90 or so are meant just for Internet Explorer 8 (which is available for Vista and Windows XP machines). Other changes include new and updated settings management for BitLocker, BitLocker To Go, an updated taskbar, Remote Desktop Services (which used to be called Terminal Services), BranchCache, Windows Remote Management (WinRM) and heaps of other controls. I won't be able to explore all the new controls in this article, but I will give you an up close and personal look at some of my favorites.
Updated Group Policy Preferences for Power Options
One of the key reasons IT geeks fall in love with Group Policy is the amount of control it allows them to exert on desktops. When the main focus of Group Policy is settings delivery, however, these control-freak IT geeks can sometimes have difficulty explaining to managers why Group Policy has value in raw "dollars and sense." In one area of Group Policy, though, real cost savings can be promised (if utilized properly): power settings.
By properly configuring the power settings of desktops and laptops, IT administrators can usually save their companies thousands of dollars annually. Group Policy makes such configuring easy.
Figure 5 shows the power options available in the Windows 7 (and Windows Server 2008 R2) GPMC.

Figure 5 New Power Plan (Windows Vista and later) Properties dialog box. (Click the image for a larger view)
Look closely at the title of the dialog box in Figure 5. You'll notice that it says New Power Plan (Vista and later) Properties. That is to say, these settings are valid for both Vista and Windows 7. Here's the caveat: Windows 7 and Windows Server 2008 R2 client machines will know what to do with these directives right away; Vista will not. Vista will simply ignore the directives (even though the feature is clearly labeled as Windows Vista and later). That's because Vista needs a soon-to-be-released update to the client-side extensions of its underlying Group Policy Preferences. Once available and applied, Vista machines will embrace these newly available directives.
Updated Group Policy Preferences for Scheduled Tasks
Similar to the updated Power Plan settings just mentioned is additional task-scheduling functionality within the GPMC in Windows 7 and Windows Server 2008 R2. Figure 6 shows the new options for scheduling tasks: Scheduled Task (Windows Vista and later) and Immediate Task (Windows Vista and later).

Figure 6 New GPMC task-scheduling options in Windows 7. (Click the image for a larger view)
Like the Power Plan settings, Windows 7 computers are ready to use these settings. Vista machines will need to wait for an update that will allow them to utilize these settings.
Updated Software Restriction Policies: AppLocker
The under-the-hood name for AppLocker is Software Restriction Policies version 2, or SRPv2. In the Group Policy interface (and in the documentation), however, you'll see this new feature called simply AppLocker.
Briefly, the goal of AppLocker is to help modern IT organizations dictate which software should and shouldn't run on their Windows 7 (and later) machines. The original Software Restriction Policies (SRP) did a decent job, but AppLocker takes software restrictions to the next level. One key new AppLocker ability is to allow or restrict software based on the software's publisher. To take advantage of this new feature, the software you want to allow or restrict must be digitally signed (for more information on AppLocker, see Greg Shields' Geek of All Trades column, "AppLocker: IT's First Panacea?").
Then, using the Create Executable Rules Dialog Box, you set up rules for various publishers. For example, you can create a rule specifying that it's OK to run Adobe Reader as long as the version is 9.0 or higher. You can move up the vertical slider to specify that all versions, filenames, and/or products or publishers can be valid on target systems. Or you can be specific with the Use custom values check box.

Learn More
As you can see, Windows 7 and Windows Server 2008 R2 bring a lot of enhancements to Group Policy. From the 300 new policy settings, to the two updated Group Policy Preferences, to the integration of Windows PowerShell—there's a lot to love. To learn more about Group Policy in Windows 7 and Windows Server 2008 R2, you can check out the Group Policy team blog, as well as my blog and training resources at GPanswers.com.


Source :Microsoft Tech magazine

Sunday, March 14, 2010

Copy your files faster and easier using Teracopy


TeraCopy is a compact program designed to copy and move files at the maximum possible speed, providing the user with a lot of features:

    * Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.
    * Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.
    * Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skip the file, not terminating the entire transfer.
    * Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.
    * Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.
    * Full Unicode support.
    *Windowsx64support. 

Download Link: http://www.mediafire.com/?23euuywmmzt

                                                                                                                                          

Practical Unix & Internet Security 3 rd Edition.

Introduction

In 1991 "Practical Unix Security" was released and became an instant hit in the Information Security community. Back then in the post Morris worm era, there was a need for an informative guide, describing the security techniques for the UNIX operating system. Five years after the initial release, the Internet started to evolve quickly, so the book received a revamp as "Practical Unix and Internet Security". As it can be seen from the title, the publication covered a broader range of topics and once again found its place on a number of bookshelves around the globe. Another six or seven years passed by and security of both the Unix based operating systems and Internet in general changed considerably. Both the authors and the publisher saw the need for a bigger update to the book, so O'Reilly presented us with "Practical Unix Security 3rd Edition".

To Disable and Remove Office Not Genuine Notifications


After installing Office Genuine Advantage (OGA) Notifications

(KB949810) from Windows Update
, OGA Validation will perform genuine test on installed Microsoft
Office XP, Office 2003, Office 2007 and Office 2010 software. If
Office product is validated as not genuine, “This copy of Microsoft
Office is not genuine” notification message will be displayed on
notification area (system tray), at splash screen during Office
program (i.e. Word, Excel, PowerPoint, Outlook) startup, and at
Office’s toolbar or ribbon with extra “Get Genuine Office” tab or
element.
KB949810 OGA Notifications update is designed so that end-user cannot
uninstall or removed the update using “Add and Remove Programs” or
“Program and Features” in the Control Panel, in a bid to encourage end-
users to buy genuine Microsoft products. But, if you’re a legit Office
users, and the OGA validation has returned false-positive result, use
the one of the following hacks to disable and remove Microsoft Office
not genuine notification messages displayed by OGA Notifications.
Note: Hack below simply remove and disable OGA Notifications so that
no notification message about Office not genuine is not displayed, and
works on most versions of OGA Notifications. It doesn’t crack or patch
OGA Validation component, OGACheckControl.dll, which does the
validation process to determine if the Office product is genuine or
not.
STEP 1:Disable OGAAddin.dll from Loading with Office Applications
   1. Run Registry Editor (RegEdit.exe).
   2. Press Ctrl-F to open search box, and search for OGAAddin.connect
registry key.
   3. In the right pane, right click on Load Behavior and select
Modify.
   4. Change the value data from 3 to 0.
   5. Repeat for each and every OGAAddin.connect found.
With this hack, Windows still treat OGA as installed, and will not
prompt user to install again.
STEP 2: Disable and Remove OGAAddin from within Office Applications
   1. Run one of the Office app such as Word, Excel, PowerPoint,
Outlook, Publisher and etc as administrator.
      Note: Open Windows Explorer, go to %SystemDrive%\Program Files
\Microsoft Office\Office12 (may be different depends on version of
Office installed and x64 OS uses Program Files (x86) folder), and
right click on Office app executable, e.g. winword.exe, excel.exe,
powerpnt.exe and etc to run as administrator.
   2. Go to Options (at the bottom of menu triggered by Office button)
-> Add-Ins.
   3. Select COM Add-ins under Manage drop menu list, and click Go.
4. Disable or remoev the OGAAdmin.
5.Repeat above steps for each and every Office applications installed.
STEP 3: Delete and Remove (Uninstall) Office Genuine Advantage
Notifications Components
Although Microsoft does not allow OGA Notifications to be uninstall,
but that does not mean that individual file components of OGA
Notifications cannot be deleted, removed or uninstalled manually.
To disable OGA Notifications and uninstall KB949810, close and exit
from all Office applications (including Outlook, Word, Excel,
PowerPoint, OneNote, Publisher, Visio and etc.), and search for the
following files in %SystemDrive%\Wndows\System32 folder and
%SystemDrive%\Windows\SysWow64 folder (for 64-bit OS x64 only).
OGAVerify.exe
OGAAddin.dll
Delete the above files. It’s also possible rename the files so that
system cannot find them.
STEP 4: Remove OGAAddin.connect Registry Key in System Registry
Pretty much similar to method 1 and 2, but it’s quicker and will
complete remove trace of OGAAddin.connect from registry. Unlike hack
1, Windows Update may prompt you to install again.
   1. Run Registry Editor (RegEdit.exe).
   2. Go to each and every of the following registry keys, and any
other which contains OGAAddin.connect registry value sub-key:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Word\Addins
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Excel\Addins
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Powerpoint\Addins
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\Outlook\Addins
   3. Delete the OGAAddin.connect registry value.
STEP 5: Properly Uninstall KB949810 OGA Notification via
OGANotifier.msi
Easy to uninstall. Just follow these steps:
   1. Go to C:\Windows\SoftwareDistribution\Download
\8998da55d52b36c0e98ba016ddd50de0\ folder.
      Note: The directory may be different, so if not found search for
OGANotifier.cab.
   2. Extract OGANotifier.cab with WinRAR (or using the Expand command
at command line) to get a file named OGANotifier.msi.
   3. Right click on OGANotifier.msi, and select Uninstall.
   4. Remember to block the update from been installed again in WU.

STEP 6:USE OGA Remoavl Tool

Downlaod Link:http://www.mediafire.com/?wgmcmj4yktx

How To Completely Disable UAC on Windows 7

One of the best feature changes in Windows 7 is the greatly improved User Account Control system, with a slider to easily control how much the security feature annoys you.

Disable UAC With a RegistryEditor

Since the only way to completely disable UAC in all versions of Windows 7 is a registry hack, you'll need to head to the start menu search box and type in regedit.exe and browse down to the following key:
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem
Over on the right-hand side, you should see a setting for EnableLUA, which you'll want to customize as follows:
  • UAC Enabled: 1
  • UAC Disabled: 0
Disable UAC Regedit 
You'll need to reboot for the setting to take effect, whether enabling or disabling.

Calculate how Much Space Your Outlook Mail is Using

Open outlook go to Tools Mailbox Cleanup. 

1
 The Mailbox Cleanup dialog box open ,click  View Mailbox Size. You can also use this same dialog to easily find old email, or items that are larger than a certain size, so you can delete them and reclaim some space.
2
In the Folder Size dialog will show the amount of space being taken up on your local machine by each folder.
3

Fixing "The Event Log is Full" Error on Windows XP

Open  Event Viewer by typing in eventvwr into the Start Run and box, or you can select  it under Administrative tools section of Control Panel of your system.

You'll notice over on the right-hand side of the window that the current size of my Application and System Event Logs are 512 KB.

image
Now you can right-click on one of the Event Logs.and choose Properties from the menu.
image
In this dialog you can do a number of things… you could clear the log, increase the size, or just set the system to overwrite events as needed.
image
I chose to increase the maximum size of the event log, and then also to overwrite events as needed. 
image
In windows vista , you'll notice that the default settings in Vista are to overwrite as needed, and the maximum size is way bigger.
image

Wednesday, March 10, 2010

Remove Blocked Files And It’s Locking Processes From Windows

LockHunter is a free tool for Windows that is quite similar to Unlocker but with a twist. It integrates itself to the Windows Explorer right-click context menu, just right-click the locked file and select ‘what is locking this file?’ and it will show you the process that is locking the file.
LockHunter Killing the Process
To unlock the file, click Unlock It, to delete the file click Delete It. If you want to delete the process that is locking the file, go to Other and then select it from the list as shown in the screenshot above. To kill the process, select Close Locking Processes.
Note: Make sure the process that you are deleting is a malware and not a Windows file. Deleting an important Windows file can result your operating system to become corrupt.
It works with Windows 2000, XP, 2003, and Vista. It comes in two versions, one for 32-bit and other for 64-bit operating systems.

Download Link:http://www.mediafire.com/?tg4fycyzjqz

Tuesday, March 9, 2010

Make Google Chrome as default Browser in Vista

Here is the solution for the problem:
  1. Close All your browsers
  2. Right click on the Google Chrome icon and Select “Run as administrator”
  3. Accept the warning about running as administrator
  4. Now go to Tools menu “Options” and click on “Make Google Chrome my default browser”
  5. You should see that “The default browser is currently Google Chrome.” in green Color
Google Chrome Options Menu  
Google Chrome Options Menu
Make Google Chrome as your default browser
Make Google Chrome as your default browser

Monday, March 8, 2010

View Config Files Without Comments

I've been using this grep invocation to trim comments out of config files. Comments are useful, but difficult to get only the active configuration entries which will be less than 20 or 25 lines from a very long file.

$ grep ^[^#] /etc/ntp.conf

The regex ^[^#] matches the first character of any line, as long as that character that is not a #. Because blank lines don't have a first character they're not matched either, resulting in a nice compact output of just the active configuration lines.

Your comments are always welcome.

Regards
Shiroy Pigarez

Setup Your Linux Server to Use a Serial Console

Do you have a linux server without a keyboard or monitor? Need to administer the server on-site but don't want to lug over a monitor and keyboard (or kvm)? Then setup the server to output the console to a serial port and use screen/minicom (Hyperterminal or putty in Windows) to console into the server over a serial cable.

To set this up, you need to edit /etc/inittab to tell it to start a terminal on the serial port for the console. If you want to see the kernel load and see all the services start then you also need to configure grub to use the serial port as well.

Edit /etc/inittab and add the line starting with "co" to the file (substitute the device name of your serial port for ttyS0 below):

co:2345:respawn:/sbin/agetty ttyS0 9600 vt100-nav # ADD THIS LINE
1:2345:respawn:/sbin/mingetty tty1
2:2345:respawn:/sbin/mingetty tty2
3:2345:respawn:/sbin/mingetty tty3
4:2345:respawn:/sbin/mingetty tty4
5:2345:respawn:/sbin/mingetty tty5
6:2345:respawn:/sbin/mingetty tty6

To watch the kernel load (and all the services) you must configure grub to enable the console option in the kernel on boot. Edit /boot/grub.conf and add the "serial" and "terminal" lines below, and modify the "kernel" line to include the console specification:

serial --unit=0 --speed=9600
terminal --timeout=5 serial console
title CentOS (2.6.9-55.0.2.EL)
root (hd1,0)
kernel /vmlinuz-2.6.9-55.0.2.EL ro root=/dev/VolGroup00/LogVol00 console=ttyS0,9600n8
initrd /initrd-2.6.9-55.0.2.EL.img

To connect to the server just hook a serial cable from your laptop to the server. Set the speed to 9600, no parity and 8bits. Boot up the server, you should see kernel output, services load, and finally a login prompt. After you disconnect you can easily re-connect and log in: just fire up your terminal emulator, connect your serial cable, hit enter a few times and you should get a prompt to log in.

Thursday, March 4, 2010

How to change the password in Symantec Client Security 3.x and Symantec AntiVirus Corporate Edition 10.x

Reset the Symantec System Center admin user password
You can use the Password Reset Utility to reset any user's password.
You must have Administrator access to the primary server of the server
group.
To reset the Symantec System Center admin user password
   1. On the computer running Symantec System Center, start Windows
Explorer.
   2. Go to \Program Files\Symantec\Symantec System Center\Tools.
   3. In the right pane, double-click the IFORGOT.exe file.
   4. In the Primary server field, type the name of the server group's
primary server.
   5. In the user field, type admin
   6. In the New Password and Confirm New Password fields, type the
new password.
   7. Click Reset Password.
      You may be prompted for a Windows user name and password if you
specify a remote server.