Friday, December 11, 2009
How to Optimize Mozilla Firefox
Click 'I will be careful, I promise' on the warning message
Windows Update Issue: 403 - Forbidden: Access is denied
You do not have permission to view this directory or page using the credentials that you supplied.
Tuesday, July 28, 2009
How to view and transfer FSMO roles in Windows Server 2003
FSMO Roles
In a forest, there are at least five FSMO roles that are assigned to one or more domain controllers. The five FSMO roles are:- Schema Master: The schema master domain controller controls all updates and modifications to the schema. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest.
- Domain naming master: The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest.
- Infrastructure Master: The infrastructure is responsible for updating references from objects in its domain to objects in other domains. At any one time, there can be only one domain controller acting as the infrastructure master in each domain.
- Relative ID (RID) Master: The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. At any one time, there can be only one domain controller acting as the RID master in the domain.
- PDC Emulator: The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows. For example, if the domain contains computers that are not running Microsoft Windows XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft Windows NT backup domain controllers, the PDC emulator master acts as a Windows NT PDC. It is also the Domain Master Browser, and it handles password discrepancies. At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest.
Active Directory Domains and Trusts snap-in
Active Directory Users and Computers snap-in
Transfer the Schema Master Role
Use the Active Directory Schema Master snap-in to transfer the schema master role. Before you can use this snap-in, you must register the Schmmgmt.dll file.Register Schmmgmt.dll
- Click Start, and then click Run.
- Type regsvr32 schmmgmt.dll in the Open box, and then click OK.
- Click OK when you receive the message that the operation succeeded.
Transfer the Schema Master Role
- Click Start, click Run, type mmc in the Open box, and then click OK.
- On the File, menu click Add/Remove Snap-in.
- Click Add.
- Click Active Directory Schema, click Add, click Close, and then click OK.
- In the console tree, right-click Active Directory Schema, and then click Change Domain Controller.
- Click Specify Name, type the name of the domain controller that will be the new role holder, and then click OK.
- In the console tree, right-click Active Directory Schema, and then click Operations Master.
- Click Change.
- Click OK to confirm that you want to transfer the role, and then click Close.
Transfer the Domain Naming Master Role
- Click Start, point to Administrative Tools, and then click Active Directory Domains and Trusts.
- Right-click Active Directory Domains and Trusts, and then click Connect to Domain Controller.
NOTE: You must perform this step if you are not on the domain controller to which you want to transfer the role. You do not have to perform this step if you are already connected to the domain controller whose role you want to transfer. - Do one of the following:
- In the Enter the name of another domain controller box, type the name of the domain controller that will be the new role holder, and then click OK.
-or- - In the Or, select an available domain controller list, click the domain controller that will be the new role holder, and then click OK.
- In the Enter the name of another domain controller box, type the name of the domain controller that will be the new role holder, and then click OK.
- In the console tree, right-click Active Directory Domains and Trusts, and then click Operations Master.
- Click Change.
- Click OK to confirm that you want to transfer the role, and then click Close.
Transfer the RID Master, PDC Emulator, and Infrastructure Master Roles
- Click Start, point to Administrative Tools, and then click Active Directory Users and Computers.
- Right-click Active Directory Users and Computers, and then click Connect to Domain Controller.
NOTE: You must perform this step if you are not on the domain controller to which you want to transfer the role. You do not have to perform this step if you are already connected to the domain controller whose role you want to transfer. - Do one of the following:
- In the Enter the name of another domain controller box, type the name of the domain controller that will be the new role holder, and then click OK.
-or- - In the Or, select an available domain controller list, click the domain controller that will be the new role holder, and then click OK.
- In the Enter the name of another domain controller box, type the name of the domain controller that will be the new role holder, and then click OK.
- In the console tree, right-click Active Directory Users and Computers, point to All Tasks, and then click Operations Master.
- Click the appropriate tab for the role that you want to transfer (RID, PDC, or Infrastructure), and then click Change.
- Click OK to confirm that you want to transfer the role, and then click Close.
Useful Software Applications
Vmware is a very useful application as it allows users to run many 'Virtual Machines' simultaneously. Vmware simulates hardware and allows you to run an operating system and other software just as you would on a regular machine.
The advantage of running a virtual machine is that you can change things and mess around without worrying about consequences. Perfect for a development or testing environment. Since all settings are stored in a file it is very easy to move a virtual machine created on one computer to another computer. You can also simulate situations which would be complex and expensive to do using real hardware. Virtual networks allow bridging of certain network adapters so they appear in the virtual machine and can be used to test various firewall or internet configurations.
Basically, the possibilities are endless when using virtual machines for different purposes.
Crossloop
Crossloop is a great remote access and assistance tool which is very easy to use and works behind NAT firewalls. Perfect for situations where you need to demonstrate some thing or other. Basically, one computer is the host who will be sharing their screen and the guest who will be able to see the hosts screen and take control of the keyboard and mouse. The host still has access to their screen and can see everything the guest is doing and can terminate the session at any time.
Synergy
This is a neat little sourceforge project that allows you to use a single set of keyboard and mouse with multiple computers with monitors at a single workstation. Its cross platform and allows simple configuration where you can arrange screens, and once working, provides seamless usage of multiple computers.
Monday, July 20, 2009
How to repair .PST Recovery Tool
To get at it, you'll need to navigate to this path using Windows Explorer:
For Outlook XP & 2003: Hard Drive Letter:\Program Files\Common Files\System\MSMAPI\LocaleID (which is 1033 for the USA or similar)
For Outlook 2007: Hard Drive Letter:\Program Files\Microsoft Office\OFFICE12Now, inside this folder, you're looking for this particular setup file: "Scanpst.exe" When you run the .exe, you'll need to Browse... to your current .pst file and hit Start:
The Inbox Repair Tool will now scan the corrupted .PST file for errors:
If your PST file is recoverable, you'll see the repairable errors show up in the scan results. To fix them, select Repair.:
Transferring Recovered PST File Data to New PST File
Once the repair finishes, Outlook creates a "Recovered" version of your .pst file, and you need to tell Outlook to use it rather than the old, damaged or corrupted .pst file.Next, you'll need to point Outlook in the right direction, namely at the recovered .PST file: Start Outlook Normally
RESTART PROBLEM ON EVERY REBOOT THE WINDOWS XP
1. click on your start menu and open the run dialog.
2. type "cmd" and return (note: dont enter quotes)
3. Next type "fsutil dirty query C:"
4. If the return message indicates that the volume is dirty go to step 5
5. Next type "chkdsk C: /f /x"
6. After that finshes repeat step 3.
7. If it is no longer dirty then reboot and you should notice no more
ckdisk.
>>>>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Session Manager
Change the BootExecute entry from:
autocheck autochk * /.
To:
autocheck autochk *
Or else try this :
Start> Run> bring up a command prompt by typing in “CMD” and type ” fsutil dirty query g: “. This queries the drive, and more than likely it will tell you that it is dirty. Next, type “CHKNTFS /X G:”. The X tells Windows to NOT check that particular drive (G) on the next reboot. At this time, manually reboot your computer, it should not do a Chkdsk and take you directly to Windows.
Once Windows has fully loaded, bring up another CMD prompt and type and now you want to do a Chkdsk manually by typing “Chkdsk /f /r g:”. This should take you through 5 stages of the scan and will unset that dirty bit. Finally, type “fsutil dirty query g:” and Windows will confirm that the dirty bit is not set on that drive.
Friday, July 17, 2009
Add Your Gmail Account to Outlook 2007
First we need to make sure your gmail account is set up to enable POP (Post Office Protocol). In Gmail just go to mail settings and choose the Forwarding and POP tab. Click on one of the options to enable POP.
Update: Note the drop-down that says what to do when mail is accessed with POP3. Please do NOT change this to “Delete”.
Now open up Outlook 2007 and go to Tools \ Account Settings…
Under Account Settings choose the E-mail tab and click on New…
Enter in all of your gmail account information **make sure there is no check next to Manually configure server…** You do not have to go through these extra steps. Just click on Next.
After Outlook has successfully configured the e-mail server settings you can go ahead and click Finish.
Go back to your inbox and hit send/receive and you are done!
If this doesn’t work
If you are having problems with the automatic setup, you’ll need to choose the “Manually Configure Server” option, and then fill in your details as follows:
Here are the important settings:
- Email Address: Your full gmail address
- Incoming Mail Server: pop.gmail.com
- Outgoing Mail Server: smtp.gmail.com (Note: If you have problems with sending email you may have to check with your internet provider, as they often require you to send email through their system.
- User Name: Your full gmail email address
Now you’ll need to click on the More Settings… button, and check the box on the Outgoing Server tab for “My outgoing server requires authentication”
Now switch to the Advanced tab, and check the box that says “This server requires an encrypted connection”, then change the fields to match these values:
- Incoming Server: 995
- Check the box for “This server requires an encrypted connection”
- Outgoing Server (SMTP): 587
- Change the type of encrypted connection to Auto, or use TLS if you have problems.
Close the dialogs and go through the rest of the wizard and everything should be working.
Change Outlook Startup Folder
You can disable Outlook Today easily, or you can use the advanced options to choose a particular folder to start in. You can start by just clicking on the Customize Outlook Today button.
Then just uncheck the “When starting, go directly to Outlook Today” checkbox, which should set the Inbox as the default startup folder.
If it doesn’t, or if you want to make outlook display a different folder on startup, open Outlook Options, click on the Other tab, and then click on Advanced Options.
In this dialog, you can click the Browse button and choose a different folder if you want. You can even choose Search Folders in Outlook 2007, which can be very useful…
For instance, you could choose the Followup Today search folder to only see items that you’ve flagged to follow up with on the current day. Quite useful!
When you open a Web page, the .PNG images in that page may not be displayed. Instead, a red X, or a placeholder, may appear in place of the images. However, all other image file types may display correctly in Internet Explorer.
This problem may be seen after installing a third-party application, which may have altered the file class and MIME settings for the PNG file type. To resolve the problem, use these steps:
- Download PNG_Fix.zip and save it to the Desktop.
- Unzip and extract the two files (pngasso_xp.reg and pngasso_vista.reg) to the Desktop.
- If you're using Windows XP, right-click pngasso_xp.reg and choose Merge. If you're using Windows Vista, right-click pngasso_vista.reg and choose Merge. Click Yes to confirm the merge operation. Additionally, in Windows Vista, you'll have to click Continue when you see the User Account Control elevation dialog.
Note: The .REG files above should fix the file association and MIME settings for .PNG file types. File paths in the .REG files are hardcoded for C:\. If you have installed Windows in a different location than C:\, you'll need to edit the REG file(s) using Notepad and update the drive-letter and/or the Path accordingly.
How to disable Fast User Switching in Windows Vista
* Click Start, type gpedit.msc and press Enter
* Go to the following location:
Local Computer Policy | Administrative Templates | System | Logon
* Set Hide entry points for Fast User Switching to Enabled
* Quit the Group Policy Editor.
By enabling the policy, Administrators hide the Switch user button in the Logon UI, the Start menu and the Task Manager. Note that the Group Policy Editor does not exist in certain editions of Windows Vista. Alternately, you can configure the setting via the registry.
Registry edit
* Click Start, type regedit.exe and press Enter
* Navigate to the following branch:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Policies \ System
* Create a DWORD (32-bit) Value named HideFastUserSwitching
* Set the Value data for HideFastUserSwitching to 1
* Quit the Registry Editor.
Windows XP registry tweaks
Probably you have seen the irritating 'low on disk space'-warning before, if your hard disk reaches full capacity. This warning message can be turned off by adding the DWORD-value NoLowDiskSpaceChecks with value 1 in the following key:
HKEY_CURRENT_USER\Software\MicroSoft\ Windows\CurrentVersion\Policies\Explorer
Disable the useless Security Center warnings
If your Windows is not provided with one of the well known virus scan and/or firewall software, the Security Center will come with useless repeating reminders. The reminders can be disabled by changing the values AntiVirusDisableNotify and FirewallDisableNotify to the DWORD-value 1 in the following registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
Disabling the blocking of pop-ups from secured sites
By default Internet Explorer blocks the pop-ups because they are mostly used for irritating advertising purposes. For secured pages (e.g. the login to a bank account), this behavior is not wished. The URL of a secured page is preceded by HTTPS instead of HTTP. The blocking of pop-ups for these HTTPS-pages can be disabled by changing the DWORD-value Allow HTTPS to 1 in the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\New Windows
A faster Windows shutdown
Shutting down Windows can take a long time. You can speed this up (at your own risk) with the following tweaks in the registry key:
HKEY_CURRENT_USER\Control Panel\Desktop
Change the following String values:
AutoEndTasks=1
HungAppTimeout=4000
WaitToKillAppTimeout=4000
WaitToKillServiceTimeout=4000
(the last registry value is also present in HKLM\SYSTEM\CurrentControlSet\Control)
Fix for shutting down your computer automatically
In most cases, automatically shutting down can be fixed by installing the motherboard drivers (if not done already). If your computer still doesn't shut down correctly, try this registry tweak. Change the value PowerdownAfterShutdown to 1 in the following key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon
Thursday, July 16, 2009
ICS ( Internet Connection Sharing ) Host Computer Setup in Windows XP
Here are step-by-step instructions on how to do it:
1) Go to Start, click Control Panel.
2) Control Panel window will appear. Double click on Network Connections.
3) Network Connections window will appear. Right click the Local Area Connection that connects to Internet, then click Properties.
4) Local Area Connection Properties will appear. Click Advanced tab, tick the Allow other network users to connect through this computer's Internet connection check box.
Note: Only System Administrator can access Advanced tab.
Note: Please make sure you enable ICS on the connection that connects to Internet.
Note: If you want other network users to enable or disable the shared Internet connection, tick the Allow other network users to control or disable the shared Internet connection check box. This option is useful if you use modem dial up method to access Internet. For cable/DSL connection user, this option is better disabled and centrally managed by system administrator.
Note: Tick Establish a dial-up whenever a computer on my network attempts to access the Internet if you use modem dial up method to access Internet. This check box is only available on the dial-up connection’s properties.
Note: You should not use this ICS feature in a network with other domain controllers, DNS servers and DHCP servers. Those servers would affect the Internet Connection Sharing from working properly.
Note: If you have 2 or more home network connected by ICS host computer, you need to bridge those network for accessing shared Internet connection.
5) You should untick Client for Microsoft Networks and File and Printer Sharing for Microsoft Networks check boxes on shared connection properties. This approach would better secure the network and won’t accidentally expose your home network resources to Internet. Firewall is also highly encouraged to be enabled on ICS host computer. Click OK at last.
6) You will see there is a hand supporting shared network connection.
7) After enabling ICS feature, the network card connected to the home network would be assigned a static IP address 192.168.0.1 with netmask 255.255.255.0. The ICS host will act as a DHCP server assigning other IP addresses in the 192.168.0.x/24 range to other client computers.
8) In order to access Internet, client computers (Windows XP, 2000) should configure TCP/IP on their local area connection to obtain an IP address automatically. Then those computers will be assigned IP address in the 192.168.0.x range and able to access Internet through this ICS host computer.
What are Straight and Crossover cable
The cable can be categorized as Cat 5, Cat 5e, Cat 6 UTP cable. Cat 5 UTP cable can support 10/100 Mbps Ethernet network, whereas Cat 5e and Cat 6 UTP cable can support Ethernet network running at 10/100/1000 Mbps. You might heard about Cat 3 UTP cable, it's not popular anymore since it can only support 10 Mbps Ethernet network.
Straight and crossover cable can be Cat3, Cat 5, Cat 5e or Cat 6 UTP cable, the only difference is each type will have different wire arrangement in the cable for serving different purposes.
Straight Cable
You usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can be used to:
1) Connect a computer to a switch/hub's normal port.
2) Connect a computer to a cable/DSL modem's LAN port.
3) Connect a router's WAN port to a cable/DSL modem's LAN port.
4) Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5) Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.
If you need to check how straight cable looks like, it's easy. Both side (side A and side B) of cable have wire arrangement with same color.
Crossover Cable
Sometimes you will use crossover cable, it's usually used to connect same type of devices. A crossover cable can be used to:
1) Connect 2 computers directly.
2) Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
3) Connect 2 switches/hubs by using normal port in both switches/hubs.
In you need to check how crossover cable looks like, both side (side A and side B) of cable have wire arrangement with following different color .
Lastly, if you still not sure which type of cable to be used sometimes, try both cables and see which works.
Wireless Zero Configuration in Windows XP
It is enabled by the Wireless Zero Configuration service in Windows XP. It provides auto wireless network detection when you switch on the computer.
Follow the steps below to verify that the service is running:
1. Go to Start and right click My Computer. Select and click Manage.
2. Computer Management window will appear. Under Services and Applications, select Services.
3. Check for the service Wireless Zero Configuration. Make sure that it is started and that the startup type is set to automatic.
4. If it isn't, double-click the service. If the startup type is not set to automatic, click on the dropdown arrow and and change it to automatic. Click OK at last.
If your wireless adapter driver does not support wireless auto onfiguration, you will notice the following:
- The network adapter does not appear as a wireless network adapter in Network Connections. It appears as a LAN adapter, similar to an Ethernet connection.
- The properties of the wireless connection do not have a Wireless Networks tab.
- You do not receive a Windows XP notification bar message indicating that wireless networks are available.
To get the most out of your Windows XP wireless experience, you should contact wireless adapter manufacturer to obtain the latest version of the drivers that support this XP feature.
If not, you must manually configure wireless network settings using the configuration software supplied with the wireless network adapter.
How to Connect a LCD Projector to a Laptop
Step 2 Connect the 15 pin connector of the cable to the PC.
Step 3 Turn on projector
Step 4 Turn on PC
Step 5 If the image from the screen does not show on the screen, Press the "function" key and normally F8 on the laptop until the image on the laptop screen shows on the screen ( normally the options will be, 1. PC only, 2. PC and screen , 3. Screen only )
Step 6 Connect the USB cable and install driver software as needed to make remote control functions work.
Step 7 Show your presentation on the Screen
Configuring the DHCP Relay Agent
* Enable Routing and Remote Access Server (RRAS)
* Install the DHCP Relay Agent routing protocol
* Configure DHCP Relay Agent properties
* Configure/enable the DHCP Relay Agent on the router interface to forward DHCP broadcast messages.
* View statistical information on the operation of the DHCP Relay Agent
How to enable Routing and Remote Access Server (RRAS)
1. Click Start, All Programs, Administrative Tools and then click Routing and Remote Access to open the Routing And Remote Access console.
2. Right-click the node of your server, and then choose Configure And Enable Routing and Remote Access from the shortcut menu.
3. The Routing and Remote Access Server Setup Wizard launches.
4. Click Next on the initial page of the wizard.
5. On the Configuration page, select the Custom Configuration option. Click Next.
6. On the Custom Configuration page, enable the LAN Routing checkbox. Click Next.
7. Verify your configuration settings on the Summary page.
8. Click Finish.
9. Click Yes when prompted to start the RRAS service.
How to install the DHCP Relay Agent routing protocol
1. Open the Routing And Remote Access console
2. Expand the IP Routing node in the console tree.
3. Right-click the General node, and then select New Routing Protocol from the shortcut menu.
4. The New Routing Protocol dialog box opens.
5. Select DHCP Relay Agent.
6. Click OK.
How to configure DHCP Relay Agent properties
1. Click Start, All Programs, Administrative Tools and then click Routing and Remote Access to open the Routing And Remote Access console.
2. Expand the IP Routing node in the console tree.
3. Right-click the DHCP Relay Agent node, and then select Properties from the shortcut menu.
4. On the General tab, enter the IP address of the DHCP server in the Server Address text box, and click Add.
5. Repeat the above step for each DHCP server that you have to add.
6. Click OK.
How to enable the DHCP Relay Agent on a router interface
1. Click Start, All Programs, Administrative Tools and then click Routing and Remote Access to open the Routing And Remote Access console.
2. Expand the IP Routing node in the console tree.
3. Right-click the DHCP Relay Agent node and then select New Interface from the shortcut menu.
4. Select the interface that is on the same subnet as the DHCP clients.
5. Click OK.
6. In the DHCP Relay Properties dialog box, ensure that the Relay DHCP Packets checkbox is selected on the General tab.
7. You can change the Hop-Count Threshold and Boot Threshold values.
8. Click OK.
How to view statistical information on the operation of the DHCP Relay Agent
1. Click Start, All Programs, Administrative Tools and then click Routing and Remote Access to open the Routing And Remote Access console.
2. Select the DHCP Relay Agent node, and view the statistical information that is displayed in the details pane of the Routing And Remote Access console:
* Received requests
* Received replies
* Discarded requests
* Discarded replies
How to Install and Configure DNS Service and Appropriate Zones in Windows Server 2003
Our first quest would to be to istall the DNS Service so that it can be used as a service on our system. Open the configure your Server option located inside the Control Panel in the Administrative Tools section.
Step2
This will basically start a Wizard to better assist you in the installing of the DNS Service to your computer.
Step3
When the wizard starts, it will Welcome you with a warm greeting. Just click next to prosper onto the next screen to begin installing the DNS Service.
Next you will see a server Role List, click the DNS Server option and then click next.
Now you will see a summary page displaying to you the options that you have chosen to install on out computer. Click Next to continue.
PLEASE NOTE: YOU MAY BE PROMPTED FOR YOUR WINDOWS SERVER 2003 CD TO COMPLETE THE INSTALLATION PROCESS.
Step4
It is recommended that you have a static i.p. address before completing the next step, unless you have DHCP enabled on your computer. Click Next to continue. Most static i.p. addresses can be obtained by your ISP.
Step5
Now that we have installed DNS as a service we need to configure the system as a DNS Server. The DNS Server Wizard will automatically appear. Click Next to transfer past the Welcome screen.
Step6
The first step to configuring our DNS Server is to create forward and reverse lookup zones, find the radio button associated with this option and then click next. If you tend to just create a caching only DNS Server, you can select the option to Configure Root Hints only option. Otherwise click next.
Step7
Click Yes afterwards to create a forward lookup zone and click next to continue.
Select the Primary Zone option if your DNS Server already has a domain controller installed. You should select the store the zone in the active directory option. Click Next. Since we already have a domain controller that we are using we need to select the Primary Zone Option, click next.
Step8
Enter a new zone name in the zone name field and click next to continue.
Step9
Leave the default zone name filename so you can get an idea afterwards where the file is located and what the file contains. When you have made your corrections, click next.
Step10
Select the dynamic updates radio button and click next. The reason for the dynamic updates is for example is so you can update a webpage of your website in the active directory then overwrite the existing file to be automatically updated through the web. Therefore this makes for seamless integration into your website.
Step11
Select no, Don’t create a reverse lookup zone now and click next to continue.
Step12
For now since we are just configuring our service, we don’t need to configure the server to forward queries radio button, so click next to continue
Wednesday, July 15, 2009
How to Optimize your Internet Explorer
1. Open Internet Options.
2. Click on the Programs tab.
3. Click on the Reset Web Settings button. Click the Yes button to confirm and the OK button when it tells you that the web settings were reset.
4. Click on the Advanced tab.
5. Click the Restore Defaults button (click the Apply button to save your progress in case of lockup).
6. Click on the Connections tab.
7. Click on the LAN Settings button.
8. Make sure the "Use a proxy server..." box is unchecked if you do not use a proxy server. Chances are you do not. Click OK to move on.
9. Click on the Content tab.
10. Click the Clear SSL State button and then click OK on the window that pops up to confirm.
11. Click on the Privacy tab.
12. Click on the Default button (if it's greyed out then it is already at default; move on)
13. Click on the Security tab
14. Make sure that the Internet icon is highlighted and click the Default Level button (if it's greyed out it's on default; please continue)
15. Click on the Local Internet icon and click the Default Level button (unless greyed)
16. Click on the Trusted Sites icon and click the Default Level button (unless greyed)
17. Click on the Restricted Sites icon and click the Default Level button (unless greyed)
18. Click on the Apply button as the next steps may cause Internet Explorer to not respond/crash
19. Click on the General tab
20. Click on the Delete Cookies button and then the OK button to confirm deletion
21. Click on the Delete Files button
22. Checkmark "Delete all offline content" and press the OK button
23. Click the Clear History button and then the Yes button to confirm
24. Click the OK button to close Internet Properties
25. If you are in Internet Explorer close it and open it again to test the changes
In last restart the computer once.
Cannot send emails using Outlook
Here are a few checks you can make to ensure the problem is not on your end:
Use the correct Mail Client settings:
> Incoming mail server (POP3/IMAP server): mail.yourdomain.com
> Outgoing mail server (SMTP server): mail.yourdomain.com
> Username: the full e-mail address like email@yourdomain.com
> SMTP authentication must be enabled for the login to be successful.
> IMPORTANT: Please do not use secure authentication to your mail server.
The most common mistake is to leave My SMTP server requires authentication checkbox unchecked. This option should always be enabled since most mail servers require such authentication.
Repair a 2GB Personal Folders or Offline Folders file
Make a backup of your PST or OST, then open the original file with the hex editor (available for download from any Windows shareware site). You'll want to remove a few characters from the middle of the file, then save it and try to run the Inbox Repair Tool (Scanpst.exe) to repair the damage you did with the hex editor. If Scanpst can repair the file, you should be able to open it Outlook again. If not, try removing some additional characters from the file.
If this process works, with any luck, you'll lose only one or two items. You may be able to recover 100% of the data by repeating the process with a new copy of the file, but removing the data from a different area.
Red X's in Email
Note: If you do not see a red x but have a blank box shaped/sized like the graphic or photo, you have Show picture placeholders enabled.
You need to locate the SecureTemp folder and delete the contents (or the entire folder) then restart Outlook. The images should display correctly once you do this.
The SecureTemp folder for Outlook 2000 to 2003 installed on Windows XP is at
C:\Documents and Settings\username\Local Settings\Temporary Internet Files\OLK*. The OLK directory will end in a series of numbers.
Outlook 2007 places the Secturetemp folder at:
C:\Documents and Settings\user\Local Settings\Temporary Internet Files\Content.Outlook\8A0VMD3A, where 8A0VMD3A can be any random characters.
Vista moves the Temp Internet folder to:
C:\Users\username\AppData\Local\Microsoft\Windows\Temporary Internet Files\, so you'll need to look there for the OLK or Content.Outlook folder.
See Outlook SecureTemp Files Folder to learn how it works.
Outlook is sending unknown messages
Cause
Newer versions of Outlook offer the ability to control if read receipts are sent but there may be a bug with IMAP accounts and read receipts in Outlook 2007. When you move messages with a receipt request to the Junk E-mail folder and empty the Junk E-mail folder using another client, the setting in Tools, Options, Email Options, Tracking Options may be ignored. If so, read receipts are returned when Outlook syncs with the server and purges the junk folder.
The steps to repro are as follows:
1. Send yourself some messages with receipts requested and move them to Junk E-mail.
2. Sync with IMAP and update all folders then close Outlook.
3. Empty junk email folder using a different client.
4. Reopen outlook.
5. When outlook updates the folder, it ignores the Tracking setting and always returns receipts as it syncs the junk mail folder, purging the messages deleted from the other client.
Workaround
Until Microsoft releases a fix, do the following:
1. Always mark messages as read before emptying the Junk Email folder.
2. Always empty the Junk Email folder from Outlook.
If you don't ever want to send receipts back, set Outlook to never ask and never send, otherwise set Outlook to always ask before sending. (Tracking settings are found in Tools, Options, Email Options, Tracking Options.)
If you move message between folders, this can also trigger a Not Read receipt, since moving messages marks the message for deletion in the original folder.
Sample Read Receipt
To: [an address you don't recognize]
Subject: Not read: [Varying Subjects]
Body:
Your message
To: [your address]
Subject: [Varying Subjects]
Sent: 9/25/2008 4:19 AM
was deleted without being read on 10/26/2008 9:21 AM.
The only difference between Read and Not Read receipts is the subject is prefixed with 'read', instead of 'not read' and the text says it was "read on [date]".
Tuesday, July 14, 2009
Install and Configure DNS on Windows Server 2003
Configure the DNS Server Using DNS Manager
Enable Dynamic Update on the Forward and Reverse Lookup Zones
Enable DNS Forwarding for Internet connections
Friday, July 10, 2009
How to Install Windows Server 2008 Step by Step
Processor
* Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor)
* Recommended: 2GHz or faster
Memory
* Minimum: 512MB RAM
* Recommended: 2GB RAM or greater
* Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and Datacenter)
Available Disk Space
* Minimum: 10GB
* Recommended: 40GB or greater
Drive
*DVD-ROM drive
Display and Peripherals
* Super VGA (800 x 600) or higher-resolution monitor
* Keyboard
Insert the appropriate Windows Server 2008 installation media into your DVD drive and follow these steps:
Now finally restart the computer.