Remote Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 22 September 2010

Recruitment Processing Software

Posted on 22:43 by Unknown
Inorder to streamline and maintain uniformity in PA recruitment, it decided to process the received applications through a software named AADHARANA Ver 1.0 developed by R.O, Kurnool. This software has the provision for Receipt, Processing, Finalizing of the applications received once the initial data entry is done properly. The software is available in the below mentioned website and can be downloaded using the user id and password given.

BROADBAND                                             WAN
ftp://59.90.18.81                                        ftp://10.102.101.204
username – roknl                                        username – roknl
password – roknl                                        password – roknl

Installation Procedure :  View
Read More
Posted in Softwares | No comments

Hirens BootCD 11.0 + Multilingual Keyboard Patch

Posted on 11:23 by Unknown

Download

Hiren's Boot CD 11.0  is a boot CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. It is a Bootable CD; thus, it can be useful even if the primary operating system cannot be booted. Hiren's Boot CD has an extensive list of software. Utilities with similar functionality on the CD are grouped together and seem redundant; however, they present choices through UI differences.

Hiren's Boot CD is a boot CD containing various diagnostic programs such as partitioning agents, system performance benchmarks, disk cloning and imaging tools, data recovery tools, MBR tools, BIOS tools, and many others for fixing various computer problems. It is a Bootable CD; thus, it can be useful even if the primary operating system cannot be booted. Hiren's Boot CD has an extensive list of software. Utilities with similar functionality on the CD are grouped together and seem redundant; however, they present choices through UI differences






Partition Tools

    * Partition Magic Pro 8.05 Best software to partition hard drive
    * Acronis Disk Director 10.0.2160 Popular disk management functions in a single suite
    * Paragon Partition Manager 7.0.1274 Universal tool for partitions
    * Partition Commander 9.01 The safe way to partition your hard drive,with undo feature
    * Ranish Partition Manager 2.44 a boot manager and hard disk partitioner.
    * The Partition Resizer 1.3.4 move and resize your partitions in one step and more.
    * Smart Fdisk 2.05 a simple harddisk partition manager
    * SPecial Fdisk 2000.03v SPFDISK a partition tool.
    * eXtended Fdisk 0.9.3 XFDISK allows easy partition creation and edition
    * GDisk 1.1.1 Complete replacement for the DOS FDISK utility and more.
    * Super Fdisk 1.0 Create, delete, format partitions drives without destroying data.
    * Partition Table Editor 8.0 Partition Table and Boot Record Editor
    * EASEUS Partition Master 4.0.1 Partition Resize/Move/Copy/Create/Delete/Format/Convert, Explore, etc.

Backup Tools

    * ImageCenter 5.6 (Drive Image 2002) Best software to clone hard drive
    * Norton Ghost 11.5 Similar to Drive Image (with usb/scsi support)
    * Acronis True Image 8.1.945 Create an exact disk image for complete system backup and disk cloning.
    * Partition Saving 3.71 A tool to backup/restore partitions. (SavePart.exe)
    * COPYR.DMA Build013 A Tool for making copies of hard disks with bad sectors
    * DriveImageXML 2.02 backup any drive/partition to an image file, even if the drive is currently in use
    * Drive SnapShot 1.39 creates an exact Disk Image of your system into a file while windows is running.
    * Ghost Image Explorer 11.5 to add/remove/extract files from Ghost image file
    * DriveImage Explorer 5.0 to add/remove/extract files from Drive image file
    * WhitSoft File Splitter 4.5a a Small File Split-Join Tool
    * InfraRecorder 0.50 An Open source CD/DVD burning software, also create/burn .iso images
    * FastCopy 1.99r4 The Fastest Copy/Delete Software on Windows
    * Smart Driver Backup 2.12 Easy backup of your Windows device drivers (also works from PE)
    * Double Driver 2.1 Driver Backup and Restore tool
    * DriverBackup! 1.0.3 Another handy tool to backup drivers

Recovery Tools

    * Active Partition Recovery 3.0 To Recover a Deleted partition.
    * Active Uneraser 3.0 To recover deleted files and folders on FAT and NTFS systems.
    * Ontrack Easy Recovery Pro 6.10 To Recover data that has been deleted/virus attack
    * Winternals Disk Commander 1.1 more than just a standard deleted-file recovery utility
    * TestDisk 6.11.3 Tool to check and undelete partition from Dos/Windows
    * Lost & Found 1.06 a good old data recovery software.
    * DiyDataRecovery Diskpatch 2.1.100 An excellent data recovery software.
    * Prosoft Media Tools 5.0 v1.1.2.64 Another excellent data recovery software with many other options.
    * PhotoRec 6.11.3 Tool to Recover File and pictures from Dos/Windows
    * Active Undelete 5.5 a tool to recover deleted files
    * Restoration 3.2.13 a tool to recover deleted files
    * GetDataBack for FAT 4.0 Data recovery software for FAT file systems
    * GetDataBack for NTFS 4.0 Data recovery software for NTFS file systems
    * Recuva 1.29.429 Restore deleted files from Hard Drive, Digital Camera Memory Card, usb mp3 player...
    * Partition Find and Mount 2.3.1 Partition Find and Mount software is designed to find lost or deleted partitions
    * Unstoppable Copier 4.2 Allows you to copy files from disks with problems such as bad sectors, scratches or that just give errors when reading data.

Testing Tools

    * System Speed Test 4.78 it tests CPU, harddrive, ect.
    * PC-Check 6.05 Easy to use hardware tests
    * Ontrack Data Advisor 5.0 Powerful diagnostic tool for assessing the condition of your computer
    * The Troubleshooter 7.02 all kind of hardware testing tool
    * PC Doctor 2004 a benchmarking and information tool
    * CPU/Video/Disk Performance Test 5.7 a tool to test cpu, video, and disk
    * Test Hard Disk Drive 1.0 a tool to test Hard Disk Drive
    * Disk Speed1.0 Hard Disk Drive Speed Testing Tool
    * S&M Stress Test 1.9.1 cpu/hdd/memory benchmarking and information tool, including temperatures/fan speeds/voltages
    * IsMyLcdOK (Monitor Test) 1.02 Allows you to test CRT/LCD/TFT screens for dead pixels and diffective screens

RAM (Memory) Testing Tools

    * GoldMemory 5.07 RAM Test utility
    * Memtest86+ 2.11 PC Memory Test
    * MemTest 1.0 a Memory Testing Tool
    * Video Memory Stress Test 1.7.116 a tool to thoroughly test your video RAM for errors and faults

Hard Disk Tools
Hard Disk Diagnostic Utilities


    * Seagate Seatools Graphical v2.13b
    * SeaTools for Dos 1.10
    * Western Digital Data Lifeguard Tools 11.2
    * Western Digital Diagnostics (DLGDIAG) 5.04f
    * Maxtor PowerMax 4.23
    * Maxtor amset utility 4.0
    * Maxtor(or any Hdd) Low Level Formatter 1.1
    * Fujitsu HDD Diagnostic Tool 7.00
    * Fujitsu IDE Low Level Format 1.0
    * Samsung HDD Utility(HUTIL) 2.10
    * Samsung Disk Diagnose (SHDIAG) 1.28
    * Samsung The Drive Diagnostic Utility (ESTOOL) 3.00g
    * IBM/Hitachi Drive Fitness Test 4.15
    * IBM/Hitachi Feature Tool 2.13
    * Gateway GwScan 5.12
    * ExcelStor\\s ESTest 4.50
    * MHDD 4.6
    * WDClear 1.30
    * Toshiba Hard Disk Diagnostic 2.00b
    * HDD Regenerator 1.71 to recover a bad hard drive
    * HDAT2 4.53 main function is testing and repair (regenerates) bad sectors for detected devices
    * Ontrack Disk Manager 9.57 Disk Test/Format/Maintenance tool.
    * Norton Disk Doctor 2002 a tool to repair a damaged disk, or to diagnose your hard drive.
    * Norton Disk Editor 2002 a powerful disk editing, manual data recovery tool.
    * Hard Disk Sentinel 0.04 Hard Disk health, performance and temperature monitoring tool.
    * Active Kill Disk 4.1 Securely overwrites and destroys all data on physical drive.
    * SmartUDM 2.00 Hard Disk Drive S.M.A.R.T. Viewer.
    * Victoria 3.33e and 3.52rus a freeware program for low-level HDD diagnostics
    * HDD Erase 4.0 Secure erase using a special feature built into most newer hard drives
    * HDD Scan 3.2 HDDScan is a Low-level HDD diagnostic tool, it scans surface find bad sectors etc.
    * HDTune 2.55 Hard disk benchmarking and information tool.
    * Data Shredder 1.0 A tool to Erase disk and files (also wipe free space) securely

System Information Tools


    * PCI and AGP info Tool (2908) The PCI System information & Exploration tool.
    * System Analyser 5.3w View extensive information about your hardware
    * Navratil Software System Information 0.60.32 High-end professional system information tool
    * Astra 5.43 Advanced System info Tool and Reporting Assistant
    * HWiNFO 5.3.0 a powerful system information utility
    * PC-Config 9.33 Complete hardware detection of your computer
    * SysChk 2.46 Find out exactly what is under the hood of your PC
    * CPU Identification utility 1.17 Detailed information on CPU (CHKCPU.EXE)
    * CTIA CPU Information 2.7 another CPU information tool
    * Drive Temperature 1.0 Hard Disk Drive temperature meter
    * PC Wizard 2009.1.90 Powerful system information/benchmark utility designed especially for detection of hardware.
    * SIW 2009-07-28 Gathers detailed information about your system properties and settings.
    * CPU-Z 1.52 It gathers information on some of the main devices of your system
    * PCI 32 Sniffer 1.4 (2908) device information tool (similar to unknown devices)
    * Unknown Devices 1.2 (2908) helps you find what those unknown devices in Device Manager really are
    * USBDeview 1.42 View/Uninstall all installed/connected USB devices on your system

MBR (Master Boot Record) Tools

    * MBRWork 1.07b a utility to perform some common and uncommon MBR functions
    * MBR Tool 2.2.100 backup, verify, restore, edit, refresh, remove, display, re-write...
    * DiskMan4 all in one tool for cmos, bios, bootrecord and more
    * BootFix Utility Run this utility if you get \\Invalid system disk\\
    * MBR SAVE / RESTORE 2.1 BootSave and BootRest tools to save / restore MBR
    * Boot Partition 2.60 add Partition in the Windows NT/2000/XP Multi-boot loader
    * Partition Table Doctor 3.5 a tool to repair/modify mbr, bootsector, partition table
    * Smart Boot Manager 3.7.1 a multi boot manager
    * Bootmagic 8.0 This tool is for multi boot operating systems
    * MBRWizard 2.0b Directly update and modify the MBR (Master Boot Record)

BIOS / CMOS Tools

    * CMOS 0.93 CMOS Save / Restore Tool
    * BIOS Cracker 4.8 BIOS password remover (cmospwd)
    * BIOS Cracker 1.4 BIOS password remover (cmospwc)
    * BIOS Utility 1.35.0 BIOS Informations, password, beep codes and more.
    * !BIOS 3.20 a powerfull utility for bios and cmos
    * DISKMAN4 a powerful all in one utility
    * UniFlash 1.40 bios flash utility
    * Kill CMOS a tiny utility to wipe cmos
    * Award DMI Configuration Utility 2.43 DMI Configuration utility for modifying/viewing the MIDF contents.

MultiMedia Tools

    * Picture Viewer 1.94
    * Picture viewer for dos, supports more then 40 filetypes.
    * QuickView Pro 2.58 movie viewer for dos, supports many format including divx.
    * MpxPlay 1.56 a small Music Player for dos

Password Tools

    * Active Password Changer 3.0.420 To Reset User Password on windows NT/2000/XP/2003/Vista (FAT/NTFS)
    * Offline NT/2K/XP Password Changer utility to reset windows nt/2000/xp administrator/user password.
    * Registry Reanimator 1.02 Check and Restore structure of the Damaged Registry files of NT/2K/XP
    * NTPWD utility to reset windows nt/2000/xp administrator/user password.
    * Registry Viewer 4.2 Registry Viewer/Editor for Win9x/Me/NT/2K/XP
    * ATAPWD 1.2 Hard Disk Password Utility
    * TrueCrypt 6.2a On-the-fly disk encryption tool, can create a virtual encrypted disk within a file and mount it as a real disk, can also encrypt an entire HDD/Partition/USB Drive
    * Content Advisor Password Remover 1.01 It Removes Content Advisor Password from Internet Explorer
    * Password Renew 1.1 Utility to (re)set windows passwords
    * WindowsGate 1.1 Enables/Disables Windows logon password validation
    * WinKeyFinder 1.73 Allows you to View and Change Windows XP/2003 Product Keys, backup and restore activation related files, backup Microsoft Office 97, 2000 SP2, XP/2003 keys etc.
    * XP Key Reader 2.7 Can decode the XP-key on Local or Remote systems
    * ProduKey 1.36 Recovers lost the product key of your Windows/Office
    * Wireless Key View 1.27 Recovers all wireless network keys (WEP/WPA) stored in your computer by WZC
    * MessenPass 1.26 A password recovery tool that reveals the passwords of several instant messangers
    * Mail PassView 1.51 Recovers mail passwords of Outlook Express, MS Outlook, IncrediMail, Eudora, etc.
    * Asterisk Logger 1.04 Reveal passwords hidden behind asterisk characters

NTFS (FileSystems) Tools

    * NTFS Dos Pro 5.0 To access ntfs partitions from Dos
    * NTFS 4 Dos 1.9 To access ntfs partitions from Dos
    * Paragon Mount Everything 3.0 To access NTFS, Ext2FS, Ext3FS partitions from dos
    * NTFS Dos 3.02 To access ntfs partitions from Dos
    * EditBINI 1.01 to Edit boot.ini on NTFS Partition

Browsers / File Managers

    * Volkov Commander 4.99 Dos File Manager with LongFileName/ntfs support (Similar to Norton Commander)
    * Dos Command Center 5.1 Classic dos-based file manager.
    * File Wizard 1.35 a file manager - colored files, drag and drop copy, move, delete etc.
    * File Maven 3.5 an advanced Dos file manager with high speed PC-to-PC file transfers via serial or parallel cable
    * FastLynx 2.0 Dos file manager with Pc to Pc file transfer capability
    * LapLink 5.0 the smart way to transfer files and directories between PCs.
    * Dos Navigator 6.4.0 Dos File Manager, Norton Commander clone but has much more features.
    * Mini Windows 98 Can run from Ram Drive, with ntfs support, Added 7-Zip, Disk Defragmenter, Notepad / RichText Editor, Image Viewer, .avi .mpg .divx .xvid Movie Player, etc...
    * Mini Windows Xp Portable Windows Xp that runs from CD/USB/Ram Drive, with Network and SATA support
    * 7-Zip 4.65 File Manager/Archiver Supports 7z, ZIP, GZIP, BZIP2, TAR, RAR, CAB, ISO, ARJ, LZH, CHM, MSI, WIM, Z, CPIO, RPM, DEB and NSIS formats
    * Opera Web Browser 8.53 One of the fastest, smallest and smartest full-featured web browser

Other Tools

    * Ghost Walker 11.5 utility that changes the security ID (SID) for Windows NT, 2000 and XP
    * DosCDroast beta 2 Dos CD Burning Tools
    * Universal TCP/IP Network 6.4MSDOS Network Client to connect via TCP/IP to a Microsoft based network. The network can either be a peer-to-peer or a server based network, it contains 91 different network card drivers
    * HxD 1.7.7.0 Hex Editor provides tools to inspect and edit files, main memory, disks/disk images
    * Virtual Floppy Drive 2.1 enables you to create and mount a virtual floppy drive on your NT/2000/XP/Vista
    * Streams 1.56 Reveal/Delete NTFS alternate data streams
    * NewSID 4.10 utility that changes the security ID (SID) for Windows NT, 2000 and XP

Dos Tools

    * USB CD-Rom Driver 1 Standard usb_cd.sys driver for cd drive
    * Universal USB Driver 2 Panasonic v2.20 ASPI Manager for USB mass storage
    * ASUSTeK USB Driver 3 ASUS USB CD-ROM Device Driver Version 1.00
    * SCSI Support SCSI Drivers for Dos
    * SATA Support SATA Driver (gcdrom.sys) and JMicron JMB361 (xcdrom.sys) for Dos
    * 1394 Firewire Support 1394 Firewire Drivers for Dos
    * Interlnk support at COM1 To access another computer from COM port
    * Interlnk support at LPT1 To access another computer from LPT port

and too many great dos tools

    * very good collection of dos utilitiesextract.exe pkzip.exe pkunzip.exe unrar.exe rar.exe
    * ace.exe lha.exe gzip.exe uharcd.exe mouse.com
    * attrib.com deltree.exe xcopy.exe diskcopy.com imgExtrc.exe
    * undelete.com edit.com fdisk.exe fdisk2.exe fdisk3.exe
    * lf.exe delpart.exe wipe.com zap.com format.com
    * move.exe more.com find.exe hex.exe debug.exe
    * split.exe mem.exe mi.com sys.com smartdrv.exe
    * xmsdsk.exe killer.exe share.exe scandisk.exe scanreg.exe
    * guest.exe doskey.exe duse.exe biosdtct.exe setver.exe
    * intersvr.exe interlnk.exe loadlin.exe lfndos.exe doslfn.com

Cleaners

    * SpaceMonger 1.4 keeping track of the free space on your computer
    * WinDirStat 1.1.2.80 a disk usage statistics viewer and cleanup tool for Windows.
    * CCleaner 2.23.993 Crap Cleaner is a freeware system optimization and privacy tool

Optimizers

    * PageDfrg 2.32
    * System file Defragmenter For NT/2k/XP
    * NT Registry Optimizer 1.1j Registry Optimization for Windows NT/2000/2003/XP/Vista
    * DefragNT 1.9 This tool presents the user with many options for disk defragmenting
    * JkDefrag 3.36 Free disk defragment and optimize utility for Windows 2000/2003/XP/Vista

Network Tools

    * Angry IP Scanner 2.21 Scan IP addresses in any range as well as any their ports
    * CurrPorts 1.66 displays the list of all currently opened TCP and UDP ports on your computer
    * TCPView 2.54 Lists TCP and UDP endpoints, including the Local/Remote addresses of TCP connections
    * Winsock 2 Fix for 9x to fix corrupted Winsock2 information by poorly written Internet programs
    * XP TCP/IP Repair 1.0 Repair your Windows XP Winsock and TCP/IP registry errors

Process Tools

    * IB Process Manager 1.04 a little process manager for 9x/2k, shows dll info etc.
    * Process Explorer 11.33 shows you information about which handles and DLLs processes have opened or loaded
    * OpenedFilesView 1.40 View opened/locked files in your system, sharing violation issues
    * Pocket KillBox 2.0.0.978 can be used to get rid of files that stubbornly refuse to allow you to delete them
    * ProcessActivityView 1.10 Detailed process access information read/write/opened files etc
    * Unlocker 1.8.7 This tool can delete file/folder when you get this message - Cannot delete file: Access is denied, The file is in use by another program etc.

Registry Tools

    * RegScanner 1.77 Tool to find/search in the Registry of Windows
    * Registry Editor PE 0.9c Easy editing of remote registry hives and user profiles
    * Registry Restore Wizard 1.0.4 Restores a corrupted system registry from Xp System Restore

Startup Tools

    * Autoruns 9.53 Displays All the entries from startup folder, Run, RunOnce, and other Registry keys, Explorer shell extensions,toolbars, browser helper objects, Winlogon notifications, auto-start services, Scheduled Tasks, Winsock, LSA Providers, Remove Drivers and much more which helps to remove nasty spyware/adware and viruses.
    * Silent Runners Revision 59 A free script that helps detect spyware, malware and adware in the startup process
    * Startup Control Panel 2.8 a tool to edit startup programs
    * Startup Monitor 1.02 it notifies you when any program registers itself to run at system startup
    * HijackThis 2.0.2 a general homepage hijackers detector and remover and more

Tweakers

    * Dial a Fix 0.60.0.24 Fix errors and problems with COM/ActiveX object errors and missing registry entries, Automatic Updates, SSL, HTTPS, and Cryptography service (signing/verification) issues, Reinstall internet explorer etc. comes with the policy scanner
    * Ultimate Windows Tweaker 2.0 A TweakUI Utility for tweaking and optimizing Windows Vista
    * TweakUI 2.10 This PowerToy gives you access to system settings that are not exposed in the Windows Xp
    * Xp-AntiSpy 3.97.4 beta it tweaks some Windows XP functions, and disables some unneeded Windows services quickly
    * Shell Extensions Manager (ShellExView) 1.40 An excellent tool to View and Manage all installed Context-menu/Shell extensions
    * EzPcFix 1.0.0.16 Helpful tool when trying to remove viruses, spyware, and malware
    * RemoveWGA 1.2 Windows Genuine Advantage Notifications Removal tool
    * RRT - Remove Restrictions Tool 3.0 To Re-enable Ctrl+Alt+Del, Folder Options and Registry tools etc.

Antivirus Tools

    * Kaspersky Virus Removal Tool 7.0.0.290 (2908) Free on-demand virus scanner from Kaspersky Lab to remove viruses.
    * Spybot - Search & Destroy 1.6.2 (2908) Application to scan for spyware, adware, hijackers and other malicious software.
    * Malwarebytes\\ Anti-Malware 1.40 (2908) anti-malware application that can thoroughly remove even the most advanced malware.
    * SpywareBlaster 4.2 (2908) Prevent the installation of spyware and other potentially unwanted software.
    * SmitFraudFix 2.423 This removes Some of the popular Desktop Hijack malware
    * ComboFix (2908) Designed to cleanup malware infections and restore settings modified by malware
    * CWShredder 2.19 Popular CoolWebSearch Trojan Remover tool
    * RootkitRevealer 1.7.1 Rootkit Revealer is an advanced patent-pending root kit detection utility.
    * SuperAntispyware 4.27 (2908) Remove Malware, Rootkits, Spyware, Adware, Worms, Parasites (a must have tool)

Changes:

+InfraRecorder 0.50
-ExpressBurn
+TestDisk for windows
+PhotoRec for windows
+Virtual Floppy Drive 2.1
+HxD 1.7.7.0
+FastCopy 1.99r4
+Angry IP Scanner 2.21
+TCPView 2.54
+OpenedFilesView 1.40
+ProcessActivityView 1.10
+RegScanner 1.77
+USBDeview 1.42
+Streams 1.56
+RemoveWGA 1.2
+RRT - Remove Restrictions Tool 3.0
Intel Matrix Storage Driver iastore.sys 8.9.0.1023 (Minixp)
PE Network Manager 0.45 (Minixp)
Security Tab (Minixp)
Pointsec Filter driver (Minixp)
Double Driver 2.1
GetDataBack 4.0
EASEUS Partition Master 4.0.1
TrueCrypt 6.2a
HDD Regenerator 1.71
Recuva 1.29.429
Unstoppable Copier 4.2
IsMyLcdOK (Monitor Test) 1.02
Samsung The Drive Diagnostic Utility (ESTOOL) 3.00g
IBM/Hitachi Drive Fitness Test 4.15
HDD Scan 3.2
System Analyser 5.3w
Astra 5.43
HWiNFO 5.3.0
CPU Identification utility 1.17
PC Wizard 2009.1.90
SIW 2009-07-28
CPU-Z 1.52
ProduKey 1.36
Wireless Key View 1.27
Content Advisor Password Remover 1.01
MessenPass 1.26
CCleaner 2.23.993
CurrPorts 1.66
Autoruns 9.53
Ultimate Windows Tweaker 2.0
Xp-AntiSpy 3.97.4 beta
ShellExView 1.40
Kaspersky Virus Removal Tool 7.0.0.290 (2908)
Malwarebytes’ Anti-Malware 1.40 (2908)
SpywareBlaster 4.2 (2908)
SmitFraudFix 2.423
PCI 32 Sniffer 1.4 (2908)
PCI and AGP info Tool (2908)
Unknown Devices 1.2 (2908)
ComboFix (2908)
Spybot - Search & Destroy 1.6.2 (2908)
SuperAntispyware 4.27 (2908)


Download



CHARACTERISTICS
Read More
Posted in Softwares, Useful Softwares, Utilities | No comments

Actice Directory FAQ with Answers

Posted on 10:58 by Unknown
1. What is Global Catalog Server?
Global Catalog server is the server which keeps the stores the details of each object created in the forest. Global Catalog is the master searchable index to all objects in forest

2. Can GC Server and Infrastructure place in single server? If not explain why?
No, As Infrastructure master does the same job as the GC. It does not work together.

3. What is the size of log file which created before updating into ntds.dit and the total number of files?
Three Log files Names
Edb.log
Res1.log
Res2.log
Each initially 10 MB

4. What does SYSVOL contains?
SysVol Folder contains the public information of the domain & The information for replication
Ex: Group policy object & scripts can be found in this directory.

5. Which is service in your windows is responsible for replication of Domain controller to another domain controller.
KCC generates the replication topology.
Use SMTP / RPC to replicate changes.


6. How data will travel between sites in ADS replication?
As determined in the site connectors

7. What is the port number for SMTP, Kerberos, LDAP, and GC Server??
SMTP 25, Kerberos 88, GC 3268, LDAP 389

8. What Intrasite and Intersite Replication?
Intrasite is the replication within the same site & intersite the replication between sites

9. What is lost & found folder in ADS?
It's the folder where you can find the objects missed due to conflict.
Ex: you created a user in OU which is deleted in other DC & when replication happed ADS didn't find the OU then it will put that in Lost & Found Folder.

10. What is Garbage collection?
Garbage collection is the process of the online defragmentation of active directory. It happens every 12 Hours.

11. What System State data contains?
Contains Startup files,
Registry
Com + Registration Database
Memory Page file
System files
AD information
Cluster Service information
SYSVOL Folder

12. How do you restore a particular OU which got deleted by accident?
Go authoritative restore

13. What is IPSec Policy?
IPSec provides secure gateway-to-gateway connections across outsourced private wide area network (WAN) or Internet-based connections using L2TP/IPSec tunnels or pure IPSec tunnel mode.
IPSec Policy can be deployed via Group policy to the Windows Domain controllers 7 Servers.

14. What are different types of Group Policy?
I don't think there are types of group policies????

15. What is the order of applying Group Policy?
Local Policy.
Site Policy.
Domain Policy.
OU Policy.

16. What are the new features in Windows 2003 related to ADS, Replication, and Trust?
ADS: Can more than 5000 users in the groups


17. How to edit the Schema in ADS?
ADSI Edit

18. What is Domain Local, Global Group, Universal group?
Domain Local – Only Users with in Domain
Global groups are used to grant permissions to objects in any domain in the domain tree or forest. Members of global groups can include only accounts and groups from the domain in which they are defined.
Universal groups are used to grant permissions on a wide scale throughout a domain tree or forest. Members of global groups include accounts and groups from any domain in the domain tree or forest.

19. Diff between Global & Universal group?
Check the answer above.

20. What are the different types of Terminal Services?
User Mode & Application Mode

21. What does mean by root DNS servers?
Public DNS servers Hosted in the Internet which registers the DNS

22. What are the different records in DNS?
A – Address record
MX – Mail Server Record
NS – Name Server
CNAME – Canonical name / Alias
SOA – Start of authority

23. What is a SOA record?
Start of authority – authorized DNS in the domain

24. How does the down-level clients register it names with DNS server?
Enable the WINS integration with DNS.

25. What is RsOP?
RsOP is the resultant set of policy applied on the object (Group Policy)

26. What is default lease period for DHCP Server?
8 days Default

27. What is the process of DHCP clients for getting the ip address?
Discover – Order – Receive - Acknowledge

28. What is multicast?
Multicast scopes enable you to lease Class D IP addresses to clients for participation in multicast transmissions, such as streaming video and audio transmissions.

29. What is superscope?
Superscope enables you to group several standard DHCP scopes into a single administrative group without causing any service disruption to network clients.

30. What is the System Startup process?

Windows 2K boot process on Intel architecture.

1. Power-On Self Tests (POST) is run.

2. The boot device is found, the Master Boot Record (MBR) is loaded into memory, and its program is run.

3. The active partition is located, and the boot sector is loaded.

4. The Windows 2000 loader (NTLDR) is then loaded.

The boot sequence executes the following steps:

1. The Windows 2000 loader switches the processor to the 32-bit flat memory model.

2. The Windows 2000 loader starts a mini-file system.

3. The Windows 2000 loader reads the BOOT.INI file and displays the operating system selections (boot loader menu).

4. The Windows 2000 loader loads the operating system selected by the user. If Windows 2000 is selected, NTLDR runs NTDETECT.COM. For other operating systems, NTLDR loads BOOTSECT.DOS and gives it control.

5. NTDETECT.COM scans the hardware installed in the computer, and reports the list to NTLDR for inclusion in the Registry under the HKEY_LOCAL_MACHINE_HARDWARE hive.

6. NTLDR then loads the NTOSKRNL.EXE, and gives it the hardware information collected by NTDETECT.COM. Windows NT enters the Windows load phases.




31. What is WINS hybrid & mixed mode?
Systems that are configured to use WINS are normally configured as a hybrid (H-node) client, meaning they attempt to resolve NetBIOS names via a WINS server and then try a broadcast (B-node) if WINS is unsuccessful. Most systems can be configured to resolve NetBIOS names in one of four modes:

Broadcast (B-node)—Clients use a broadcast only to resolve names. An enhanced B-node setting has the client use an LMHOST file as well. The hex value for this setting is 0x1.
Peer-to-Peer (P-node)—Clients use WINS only to resolve names. The hex value for this setting is 0x2.
Mixed (M-node)—Clients first use a broadcast in an attempt to resolve NetBIOS names. If this fails, they attempt the resolution via the WINS server. The hex value for this setting is 0x4.
Hybrid (H-node)—Clients first use the WINS service in an attempt to resolve NetBIOS names. If this fails, they attempt the resolution via broadcast. The hex value for this setting is 0x8.

32. What is Disk Quota?
Disk Quota is the specifying the limits of usage on the disks.

==========================================================

1) What is different Editions of Windows 2003 server?
i)Standard Edition
ii)Web Edition
iii)Enterprise Edition
iv)Datacenter Edition
2) What is active directory?

Active Directory is the directory service included in the Windows Server 2003 family. Active Directory includes the directory, which stores information about network resources, as well as all the services that make the information available and useful. Active Directory is also the directory service included in Windows 2000.

3)What is the active directory database name and where it is located?

Name : NTDS.Dit located in c:\windows\ntds\

4)What is the expansion of .Dit ? Scalable size of NTDS in 2k3?
Dit – Directory Information Tree. It is scalable up to 70 TB.

5) What is schema in AD?

The Active Directory schema defines objects that can be stored in Active Directory. The schema is a list of definitions that determines the kinds of objects and the types of information about those objects that can be stored in Active Directory. Because the schema definitions themselves are stored as objects, they can be administered in the same manner as the rest of the objects in Active Directory. Normally called schema object or metadata.

6) Structure of AD in 2kX?
1)Physical structure
Sites ,Domain Controllers
2)Logical structures
Forest, Tree, Domain, OU, object

7) What are the domain functional levels in 2k3?

1)Mixed mode
2)Native mode
3)Interim mode

8) What is Global catalog and GC server?

The global catalog is the central repository of information about objects in a tree or forest. By default, a global catalog is created automatically on the initial domain controller in the first domain in the forest. A domain controller that holds a copy of the global catalog is called a global catalog server.

9) What are the functions of GC?

A) It enables a user to log on to a network by providing universal group membership information to a domain controller when a logon process is initiated.
B) It enables finding directory information regardless of which domain in the forest actually contains the data.

10) What is the active directory database engine name?
ESE (Extensible Storage Engine)


11) What are the partitions available in AD?
i) Schema partition
ii) Configuration Partition
iii) Domain Partition
iv)Application Partition


12) What are the two types of replications?
Inter-site (Site to site) and Intra-site (With in site) replications.

13) What is KCC? What is the function of the KCC?
The KCC is a built-in process that runs on all domain controllers. The KCC configures connection objects between domain controllers. Within a site, each KCC generates its own connections. For replication between sites, a single KCC per site generates all connections between sites.

14) What is the two trust protocols 2k3 using?
Kerberos V5 and NTLM


15) What are the trust relations available in 2k3?
Tree-Root , Parent- Child , Shortcut, Realm, Forest trust , External trust

16)What is the hierarchy of applying Gpo in 2k3?
It is applied from parent level to child level in AD.
i) Local GPO
ii) GPOs linked to sites
iii) GPOs linked to domains
iv) GPOs linked to OUs


17) What are the protocols used on replication?
RPC over IP (Used for synchronies transfer) , SMTP over IP (Asynchronies transfer)

18) What is the default time delay on replication?
Intra site – 15 min ( KCC automatically create the topology for Replication)
Inter-site – 1 hrs.
Security related changes replicated immediately across sites.

19) What Different tables available in NTDS database?
i) Schema table
Ii) Link Table
iii) Data table
iv)Configuration Table

19) Where is the FRS logs stored in and what is the database engine name?
c:\windows\ntfrs\jet\log, The engine used is jet database engine. Ntfrs.jdb.


20) What is tombstone object in AD? What is its life time?
Any objects deleted from Active directory will not removed from Database immediately. That object is called tombstone object. The default life time for that object is 60 days. For win 2k3 SP1 180 days

21) FSMO Roles

In a forest, there are at least five FSMO roles that are assigned to one or more domain controllers. The five FSMO roles are

Schema Master:

The schema master domain controller controls all updates and modifications to the schema. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest.

Domain naming master

The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest.

Infrastructure Master:

The infrastructure is responsible for updating references from objects in its domain to objects in other domains. At any one time, there can be only one domain controller acting as the infrastructure master in each domain.

Relative ID (RID) Master:

The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. At any one time, there can be only one domain controller acting as the RID master in the domain.

PDC Emulator

The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows.

For example, if the domain contains computers that are not running Microsoft Windows XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft Windows NT backup domain controllers, the PDC emulator master acts as a Windows NT PDC.

It is also the Domain Master Browser, and it handles password discrepancies. At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest


============================================================


Quicker Q&A

What are the required components of Windows Server 2003 for installing Exchange 2003? - ASP.NET, SMTP, NNTP, W3SVC
What must be done to an AD forest before Exchange can be deployed? - Setup /forestprep
What Exchange process is responsible for communication with AD? - DSACCESS
What 3 types of domain controller does Exchange access? - Normal Domain Controller, Global Catalog, Configuration Domain Controller
What connector type would you use to connect to the Internet, and what are the two methods of sending mail over that connector? - SMTP Connector: Forward to smart host or use DNS to route to each address
How would you optimise Exchange 2003 memory usage on a Windows Server 2003 server with more than 1Gb of memory? - Add /3Gb switch to boot.ini
What would a rise in remote queue length generally indicate? - This means mail is not being sent to other servers. This can be explained by outages or performance issues with the network or remote servers.
What would a rise in the Local Delivery queue generally mean? - This indicates a performance issue or outage on the local server. Reasons could be slowness in consulting AD, slowness in handing messages off to local delivery or SMTP delivery. It could also be databases being dismounted or a lack of disk space.
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global Catalog? - SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog - 3268
Name the process names for the following: System Attendant? – MAD.EXE, Information Store – STORE.EXE, SMTP/POP/IMAP/OWA – INETINFO.EXE
What is the maximum amount of databases that can be hosted on Exchange 2003 Enterprise? - 20 databases. 4 SGs x 5 DBs.
What are the disadvantages of circular logging? - In the event of a corrupt database, data can only be restored to the last backup.
========================================================
1. What are the Default shares in Windows Server 2003?
By default, Windows automatically creates special hidden administrative shares that administrators, programs, and services can use to manage the computer environment or network. These special shared resources are not visible in Windows Explorer or in My Computer, but you can use the Shared Folders tool in Computer Management to view them. Depending on the configuration of your computer, you may see some or all the following special shared resources listed in the Shares folder in Shared Folders:
•
DriveLetter$: Root partitions and volumes are shared as the drive letter name appended with the $ character. For example, drive letters C and D are shared as C$ and D$.
•
ADMIN$: A resource that is used during remote administration of a computer.
•
IPC$: A resource that shares the named pipes that you must have for communication between programs. Note that this resource cannot be deleted.
•
NETLOGON: A resource that is used on domain controllers.
•
SYSVOL: A resources that is used on domain controllers.
•
PRINT$: A resource that is used during the remote administration of printers.
•
FAX$: A shared folder on a server that is used by fax clients during fax transmission.
Note NETLOGON and SYSVOL are not hidden shares but are instead special administrative shares. Generally, Microsoft recommends that you do not modify these special shared resources. However, if you want to remove the special shared resources and prevent them from being created automatically, you can do this by editing the registry.

1. Q) Can I changed password if my machince’s connectivity to DC who holds PDC emulator role has been fails?A) No You cant the password.
Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two harddisk failed what about dataA) It depends how u had configured ur RAID its only Raid5 or with with spare if its only raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.
Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the Admin Right in Pc.A) Create a batch file and place all the patches in the Netlogon, and deploy the batch file through GP to all the pcs so the same should take affect after restarting the pc.
Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how much space do i have for utilise.A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for parity).
Q) How Can i Resolve the Svr name through NslookupA) what exactly u want to do, nslookup command will let u know through which server u r getting routed, (eg- c:\nslookup then u will get ur domain name to which u r getting routed. and if u want to get the name of the pc/server with the ip address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx)
===========================================================
1. DHCP relay agent where to place it?
Ans: DHCP Relay agent u need to place in Software Router.

Question: How many Zones in Windows 2000 server and Windows 2003 Server ?
Ans: In Windows 2000 there are mainly 3 zones
Standard Primary — zone information is written in Txt fileStandard Secondary — copy of PrimaryActive Directory Integrated– Information stores in Active Directory
In Win2k3 one more zone is added that is Stub zone
–Stub is like secondary but it contains only copy of SOA records, copy of NS records, copy of A records for that zone. No copy of MX, SRV records etc.,With this Stub zone DNS traffic will be low
Question: What is Kerberos? Which version is currently used by Windows? How does Kerberos work?
Answer: Kerberos is the user authentication used in Win2000 and Win2003 Active Directory servers
Kerberos version in 5.0
Port is: 88
It’s more secure and encrypted than NTLM (NT authentication)

1. Which protocol is used for Public Folder?
ANS: SMTP
What is the use of NNTP with exchange?
ANS: This protocol is used the news group in exchange.


1. What is the content of System State backup?
The contents are: Boot files, system filesActive directory (if it’s done on DC)SysVol folder(if it done on DC)Certificate service ( on a CA server)Cluster database ( on a cluster server)registryPerformance counter configuration informationComponent services class registration database



Q: What are the perquisites for installation of Exchange Server?
The prerequisite are
IISSMTPWWW serviceNNTP.NET FrameworkASP.NETThen run ForestprepThen run domainprep

Question: What is Multi Master Replication?
Answer: Multi-master replication is a method of replication employed by databases to transfer data or changes to data across multiple computers within a group. Multi-master replication can be contrasted with a master-slave method (also known as single-master replication).


DFS? DFS Namespace ?
1. DFS Replication. New state-based, multimaster replication engine that is optimized for WAN environments. DFS Replication supports replication scheduling, bandwidth throttling, and a new byte-level compression algorithm known as remote differential compression (RDC).
DFS Namespaces. Technology that helps administrators group shared folders located on different servers and present them to users as a virtual tree of folders known as a namespace. DFS Namespaces was formerly known as Distributed File System in Windows 2000 Server and Windows Server 2003.


What are the four domain functional levels?
Windows 2000 MixedWindows 2000 NativeWindows Server 2003 InterimWindows Server 2003
Windows 2000 Mixed
When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000 mixed.Under this domain functional level, Windows NT, 2000, and 2003 domain controllers are supported. However,certain features such as group nesting, universal groups, and so on are not available.
Windows 2000 Native
Upgrading the functional level of a domain to Windows 2000 Native should only be done if there areno Windows NT domain controllers remaining on the network. By upgrading to Windows 2000 Native functional level,additional features become available including: group nesting, universal groups, SID History, and the ability to convertsecurity groups and distribution groups.
Windows Server 2003 Interim
The third functional level is Windows Server 2003 Interim and it is often used when upgrading fromWindows NT to Windows Server 2003. Upgrading to this domain functional level provides support forWindows NT and Windows Server 2003 domain controllers. However, like Windows 2000 Mixed, it does not provide new features.
Windows Server 2003The last functional level is Windows Server 2003. This domain functional level only provides support forWindows Server 2003 domain controllers. If you want to take advantage of all the features included withWindows Server 2003, you must implement this functional level. One of the most important features introducedat this functional level is the ability to rename domain controllers

Read More
Posted in Windows Server | No comments

Windows Server 2008 Core Command Guide

Posted on 10:09 by Unknown



Windows Server 2008 Core Command Guide

What
Command
Set DNS IP
Netsh int ipv4 set dns
“local area connection”
static 192.168.1.120 primary
Disable firewall
Netsh firewall set
opmode mode=disable
add Credential
cmdkey /add:
IP_ADDRESS /user:
administrator /pass:password
Changing password
Net user administrator*
Set time and date
Control timedate.cpl
Show interfaces
Netsh interface
ipv4 interfaces
Set interface IP
Netsh interface
ipv4 set address
name=”2”
source=static address=
172.16.11.162
mask=255.255.255.0
gateway=172.16.11.1
View hostname
Hostname
Change hostname
Netdome rename
computer %computername% /newname:NAME
Restart server
Shutdown /r t 0
Join server to domain
Netdom join servername /domain:DOMAINNAME /userd:administrator /password:*
Server activation
C:\windows\system32
>cscript slmgr.vbs /?
Check expiration date
Cscript slmgr.vbs -xpr
Activate server
Cscript slmgr.vbs -ato
Automatic updates
Cscript Scregedit.wsf
Check automatic update status
Cscript scregedit.wsf /au /v
Enable automatic updates
Cscript scregedti.wsf /au 4
View Roles install on server
Oclist
Install Role
Ocsetup role_name
(use oclist to
check role names)
View services started
Net start
Uninstall role
Ocsetup role_name /uninstall
View logs
Wevutil qe system
Enable remote desktop
Cscript scregedit.wsf /ar 0
Disable remote desktop
Cscript scredit.wsf /ar 1
view remote desktop settings
Cscript scredit.wsf /ar v
Allow pre windows vista RDP connection
Cscript scredit.wsf /cs 0
Log off from server
logoff
Start command prompt
cmd.exe
(start from taskmgr if
you close existing windows)
Start virtual disk service to manage disks
Net start vbs
Check for windows updates immediately
Wuauclt /detectnow



Read More
Posted in Windows Server | No comments

NIC Guide for DOP People

Posted on 05:43 by Unknown
NIC WAN Guide for DOP People : View
Read More
Posted in Guidelines | No comments

Sunday, 19 September 2010

General Network Connectivity Problems

Posted on 10:46 by Unknown

MS-Windows Troubleshooting


General Network Connectivity Problems (e.g. cannot connect to remote computer)


Symptom:

Unable to connect to remote computer. General network connectivity problems.

Cause:

There are a number of things which can prevent two workstations from communicating with each other over the network. These include (and this is unlikely to be an exhaustive list):
  • Poor or incorrect network protocol configuration
  • Network hardware problems
  • Software problems
The same can also cause problems even when superficially the network appears to be working.
Part of the problem in solving network connectivity problems is identifying what the underlying problem is or what the problems are.

Remedy:

The remedy to the problem depends on the root cause. The following should be regarded as a checklist of things to test:
  1. Check that the workstation be ‘pinged’, i.e.:
ping workstation
If this produces the message ‘Bad IP address workstation.’ then this indicates a name resolution failure, in other words NT has been unable to look up the IP address for the workstation. If the (target) workstation is on the same local network then ask the administrator to check that DSN is working correctly. If it is on a remote network then the IP address will probably need to be explicitly specified in the local TNSNAMES file. Alternately try pinging by specifying explicitly the IP address of the workstation, i.e.:
ping workstation-ip-address
e.g.
ping 192.10.44.1 (or whatever the ip address of the workstation is.)
If ping produces a message of the form:
Reply from ip-address: bytes=32 time<10ms TTL=128
Reply from ip-address: bytes=32 time<10ms TTL=128
Reply from ip-address: bytes=32 time<10ms TTL=128
Reply from ip-address: bytes=32 time<10ms TTL=128
Then this indicates that there is network connectivity between the two workstations. Packets are being sent to the workstation and replies received. The time may vary. However, if it produces the message:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Then this indicates that there is no network connectivity between the two workstations. Things to check:
  • That the remote workstation is switched on.
  • That both workstations are (physically) plugged into the network.
  • That the hubs are switched on.
  • That the ip address that is being pinged (which ping echoes) is correct for the workstation. If it is not then this indicates either a DNS failure or an incorrect TNSNAMES entry.
  • That the remote workstation does not have a firewall that is preventing ping acknowledgements from being returned.
  • If both workstations are on a local network that their TCP subnet is the same. This can be checked using:
ipconfig
Do this on both workstations. For each network adapter this will show the following information:
IP Address. . . . . . . . . : ip-addresss
Subnet Mask . . . . . . . . : subnet-mask
Default Gateway . . . . . . : gateway-ip
 (may be blank)
For a local network the subnets should be the same. The ip-address logically and-ed with the subnet-mask should give the same result. If it does not then the workstations are on different subnets. Check the ip-addresses.
  • If the workstations are on different subnets then the packet will have been sent not directly to the workstation but via a gateway (and from there on to the workstation). To show the default gateway use:
ipconfig
To list all other possible gateways use the command:
route print
This lists other possible gateways that the workstation may use according to the ip address of the target. If the destination IP address does not match one of the network destinations listed then the default gateway will be used.
If there is no default gateway the add the ip address of the gateway as the default. Otherwise check that the gateway is listed in the routing table. The ‘route’ command allows new entries to be added.
Repeat the process (at both ends) but by pinging the gateway. This will establish whether there is basic communications between the workstation and its local gateway. If both sides can communicate with their respective gateways then the problem must lie with the link between the gateways. Consult your network administrator.
  1. If the computers are on different networks try:
tracert workstation
This will show the route to the computer any may give a better indication of where on the route the problem lies.
  1. Ping demonstrates that there is network connectivity between the two workstations. To check network reliability trying pinging with larger packets and for longer. Try each of the following:
ping workstation -l 1024 -t
ping workstation -l 4096 -t
ping workstation -l 8192 -t
The ‘-l’ parameter specifies the size of the message to send (the default is 32bytes, real applications will send much larger blocks of data). The ‘-t’ parameter specifies that it should continue pinging until you ‘control-C’ it. I would recommend trying each in turn and only breaking it after a complete screen full of responses. As the packet size increases the time will also increase. However even with 8192 byte packets there should be no ‘Request timed out’ messages. If any are seen then this indicates a hardware problem, either with the network hardware or with one of the adapters in either of the workstations.
Typical response times I would expect for a set of sample packet sizes are as follows:
Packet Size100mbps LAN10mbps LAN100mbps to 10mbps LAN via single gateway
-l 4096time<10ms<10ms10ms
-l 8192time<10ms10ms10ms
-l 16000time<10ms30ms30ms
-l 30000time<10ms50ms50ms
-l 60000time=10ms100ms110ms
Network topology will vary between sites (for instance the number of routers and switches that the network traffic request must navigate), so please regard these as ballpark/guideline figures. Any small variation between these figures and the figures are your site are probably not significant. The first ping message may show a higher time or even timeout, this is not significant provided it is only the first message.
To check whether it is a network adapter on either of the workstations look in the NT (system) event log. This may indicate if the adapter is giving problems. It could also be the network cable, hub or particular hub port. If the problem affects one particular workstation then this is indicative of either a network card failure, bad network cable or network hub port failure. For example if there are problems between workstations ‘A’ and ‘B’, also between ‘A’ and ‘C’ but not between ‘B’ and ‘C’ then this clearly indicates that the problem is related to workstation ‘A’. Try a different port on the network hub, then a different network cable and then try a different network card.
  1. If ping attempts fail the network appears to be totally unresponsive at one workstation (i.e. it cannot see anything on the network, even other workstations on the local network for which there are no network connectivity issues) then it is worth reinstalling the latest service pack. Some old dlls on the system can produce network related problems. It’s worth a try.
  2. Enable ‘Black Hole Router detection’. Part of the underlying network protocol involves the network cards in both computers negotiating agreeing on the largest packet size that they can mutually manage. (For Ethernet this is typically 1550 bytes.) When communicating over a WAN it is possible that some of the routers or bridges along the route will not be able to handle packets as large as the network cards can manage. These should return a message indicating when a packet is too large and at the same time specify the maximum packet size they in turn can manage. Normal TCP-IP communication is self tuning in this way. However some (older?) routers or bridges fail to respond correctly and quietly drop the packet if it is too large. These are known as ‘black hole routers’. In NT black hole router detection is disabled by default. To turn it on requires adding (or modifying the following registry key):
HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ Services\ Tcpip\ Parameters\ EnabledPMTUBHDetect = 1
If adding this registry entry then add it as a REG_DWORD.
Other than event log, registry and service pack references these notes are also applicable to Windows .
Read More
Posted in Network Trouble shooting | No comments
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • How to watch online TV?
    I know we all are busy with our daily work, we do not have to time to tally our accounts or do our regular work also. Some times we want to ...
  • GDS COMMITTEE IMPLEMENTATION ORDERS RELEASED BY DIRECTORATE TODAY
    GDS COMMITTEE IMPLEMENTATION ORDERS RELEASED BY DIRECTORATE TODAY POSTAL DIRECTORATE ISSUED ORDERS TODAY FOR IMPLEMENTING THE GDS COMMITTEE ...
  • (no title)
    POSTAL RATES INDEX Letters / Book Post Registered Articl...
  • Pen Drive Recovery Tool
    Find below the Online recovery tool for the Transcend pendrives. A very good tool to recover the data or format the corrupted pendrives. 1) ...
  • THIRUKKURAL PDF DOWNLOAD (தமிழ் )
    CLICK HERE TO DOWNLOAD THIRUKKURAL (தமிழ்)    or CLICK HERE TO DOWNLOAD THIRUKKURAL (TAMIL & ENGLISH)    or CLICK HERE TO DOWNLOAD THIR...
  • Num Lock not enabled by Default on some new PC's
    Strangely enough to mine and I'm sure many other peoples surprise, the commands are no longer in BIOS. See below. HKEY_USERS\.DEFAULT\Co...
  • Commands in Windows Vista
    Windows Vista Command Line List and Reference The list of commands available in the command line shell for Windows Vista is similar to that ...
  • Save queries in Windows Server 2003's Active Directory Users and Computers tool
    Windows Server 2003 administrators can’t live without the Active Directory Users and Computers tool. Here’s a quick look at the saved querie...
  • Speednet Communication problem
    At the very outset, confirm the following and then proceed with further instructions. • Login to www.indiapost.gov.in/spc site and confirm t...
  • Simple ways to increase your computer’s performance – Save hard disk space! Tips
                          Do you have a computer that doesn’t have a huge hard drive, but you store a lot of pictures, videos, or other large fi...

Categories

  • Computer Guidelines
  • Customer Care
  • DB Tools
  • Drivers
  • Entertainments
  • FAQ
  • For System Administrators
  • FTP
  • General Informations
  • General Knowledge
  • Guidelines
  • Hardwares
  • Health Tips
  • Internet Tips
  • Latest Software Updates
  • Network Trouble shooting
  • Printer Trouble shooting
  • Printing Tips
  • Recovery Tips
  • Registry Tips
  • Registry Tools
  • Security Guidelines
  • Security Tips
  • Software Tips
  • Softwares
  • SQL
  • Technology
  • Tips and Tricks
  • Tools
  • Trouble shooting
  • Useful Softwares
  • Utilities
  • Virus Solutions
  • Websites
  • windows 7
  • Windows Server
  • Windows Tips
  • Windows Vista
  • Windows XP FAQ

Blog Archive

  • ▼  2011 (138)
    • ▼  May (32)
      • Indian Acronyms and Abbreviations
      • Put all your Emails on a USB Drive for Offline Access
      • What is the difference between Cc and Bcc?
      • BSNL 3G Data Card Now at Rs. 1600
      • General Knowledge Questions and Answers
      • 5 Tips to Improve Your Windows 7 System’s Speed
      • SYS Informer v.1.0 Free ( PC Total Info)
      • 7Burn - Burning Studio v.2.0 Free
      • Steganography
      • Screen Resolution Changer
      • MailStore Home- Keep all your mails in one place
      • 5 Simple Tips to Fix a Slow Computer
      • Password Recovery Magic Products with Serial
      • Hiren’s Boot CD 13.2
      • Prime Minister and Council of Ministers - India ( ...
      • Put all your Emails on a USB Drive for Offline Access
      • Best Features of Google Chrome
      • What is the difference between Cc and Bcc?
      • Any Folder as a Photo Folder
      • SQL 2008 Express Editions and Service Packs
      • Put all your Emails on a USB Drive for Offline Access
      • Why Do We Love Skype?
      • Procedure for Schedule Backup in SQL 2008 Express ...
      • How to Make EXE Files Using Notepad
      • How to Protect your Data ?
      • Error in Opening database - Tables ( SQL 2000)
      • Icons, task bar disappears and Windows Explorer do...
      • Tips for Strong Password
      • Disable Network Search by XP
      • How To Change the Default Backup Path in SQL Server
      • How to Manually Uninstall SQL Server 2005
      • XP Services-Not Needed for All
    • ►  April (24)
    • ►  March (29)
    • ►  February (15)
    • ►  January (38)
  • ►  2010 (241)
    • ►  December (55)
    • ►  November (40)
    • ►  October (21)
    • ►  September (35)
    • ►  August (39)
    • ►  July (23)
    • ►  June (5)
    • ►  May (2)
    • ►  April (12)
    • ►  March (4)
    • ►  February (2)
    • ►  January (3)
  • ►  2009 (26)
    • ►  December (5)
    • ►  November (3)
    • ►  October (4)
    • ►  September (5)
    • ►  August (3)
    • ►  July (5)
    • ►  June (1)
Powered by Blogger.

About Me

Unknown
View my complete profile