Wednesday, December 21, 2011

Back-up is the operation done to prevent data loss. The principle is to make copies of particular data in order to use those copies for restoring the information if a failure occurred (a data loss event due to deletion, corruption, theft etc.). The back-up can be done manually (copying the data to a different location) or automatically using a backup program, such as Backup4all which you can easily download below (opens in new window so you can still continue reading the article):

Each program has its own approach in executing the backup, but there are four common backup types implemented and generally used in most of these programs: full backup, differential backup, incremental backup and mirror backup. A type of backup actually defines how the data is copied from the source to the destination and lays the grounds of a data repository model (how the back-up is stored and structured).

The image below provides an overview comparison between these backup types, for detailed information about each read the rest of the article:

Backup types comparison

Full backup

Full backup is the starting point for all other types of backup and contains all the data in the folders and files that are selected to be backed up. Because full backup stores all files and folders, frequent full backups result in faster and simpler restore operations. Remember that when you choose other backup types, restore jobs may take longer. As an example, for a full backup job that runs four times the representation below is conclusive on how the backed up data will grow with every run:

 

full backup

Since this is the foundation of all other backup types, a detailed article explains it thoroughly: What is full backup?


Differential backup

Differential backup contains all files that have changed since the last FULL backup. The advantage of a differential backup is that it shortens restore time compared to a full backup or an incremental backup. However, if you perform the differential backup too many times, the size of the differential backup might grow to be larger than the baseline full backup. In the image below you can see an example on how a differential backup would look like for a backup job that runs four times:

differential backup

Read the differential backup page for more details.


Incremental backup

Incremental backup stores all files that have changed since the last FULL, DIFFERENTIAL OR INCREMENTAL backup. The advantage of an incremental backup is that it takes the least time to complete. However, during a restore operation, each incremental backup must be processed, which could result in a lengthy restore job. The representation below shows how a backup job running four times would look like when using incremental:

incremental backup

This is one of the most popular backup types, you can find more about it and how to use incremental in a backup strategy here: incremental backups.


Mirror backup

Mirror backup is identical to a full backup, with the exception that the files are not compressed in zip files and they can not be protected with a password. A mirror backup is most frequently used to create an exact copy of the source data. It has the benefit that the backup files can also be readily accessed using tools like Windows Explorer. The image below shows how a mirror backup job would look after four iterations (first mirror will back-up everything, subsequent fast mirror backups will back-up only new/modified files):

mirror backup



Source: http://www.backup4all.com/kb/backup-types-115.html

Monday, September 20, 2010

How to Make Firefox Really Fast Tutorial & Pics

 


Fast loading web pages while surfing the Internet may have more to do with your web browser settings[/URL] and preferences than your Internet connection speed.
Try these easy Firefox tweaks and you'll see that you're surfing the Internet from 3 to 30 times faster!


To get started, open your Firefox web browser. In the address/location bar type [about:config] and then press your Enter key. (NOTE: DON'T TYPE THE BRACKETS.)


Tweak #1:

In the Filter bar type [network.http.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.



Tweak #2:

In the Filter bar type [network.http.pipelining.maxrequests]. Then, double-click on this line under Preference Name and change the value from 4 to a higher number anywhere from 10 to 30. I set mine to 30.



Tweak #3:

In the Filter bar type [network.http.proxy.pipelining]. Then, double-click on this line under Preference Name in order to change the value from false to true.


Tweak #4:

In the Filter bar type [network.dns.disableIPv6]. Then, double-click on this line under Preference Name in order to change the value from false to true.



Tweak #5:

In the Filter bar type [plugin.expose_full_path]. Then, double-click on this line under Preference Name in order to change the value from false to true.



Tweak #6:

In the Filter bar type [network.protocol-handler.external.ms-help]. Now, you are going to create a new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer.

In the New Integer value box type in [nglayout.initialpaint.delay] and click OK. Then in the Enter Integer value box type [0] (that's a zero) and click OK.



Tweak #7:

In the Filter bar again type [network.protocol-handler.external.ms-help]. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [content.notify.backoffcount] and click OK. Then in the Enter Integer value box type [5] and click OK.



Tweak #8:

In the Filter bar again type [network.protocol-handler.external.ms-help]. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in [ui.submenuDelay] and click OK. Then in the Enter Integer value box type [0] (that's a zero) and click OK.




Now, close your web browser and restart it. You'll see how much faster web pages are loading. I sure did.
Let me know if these tweaks increase your Internet browsing speed. Know of any other tweaks or tricks? Let me know and I'll add them.

 
 
 
Credit Goes to Original Post.

Friday, July 30, 2010

FAQ about video formats

1. What is x264?


x264 is an open-source encoder for the H.264 codec used for High-Definition movies on HD-DVDs and Blu-Ray Discs. It has a high compression which is way superior to xvid. That means you get more quality at equal bitrates. A 700MB x264 rip will be sharper and more detailed than a 700MB xvid rip from the same source. x264 is the future in DVDrips!

02. What is a .mkv file?


MKV means "matroska video" and it is a "extensible open standard Audio/Video container" (AVI is a container, too!). This file format combines several videostreams, audiostreams, subtitles, chapters and information in only one file. It supports new standards like 6-channel AAC (Advanced Audio Coding) audio or x264 video.

Friday, June 18, 2010

Blue Screen of Death Survival Guide: Every Error Explained


----------------------------------------------------------------------
Picture this: It's late at night, you're sitting at your computer playing a game or working on a project when, suddenly, Windows freezes completely. All your work is gone, and you find a blue screen full of gibberish staring back at you. Windows is dead, Jim, at least until you reboot it. You have no choice but to sigh loudly, shake your fist at Bill Gates and angrily push the reset button. You've just been visited by the ghost of windows crashed: the Blue Screen of Death.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_PCs.png)

Also known as the BSoD, the Blue Screen of Death appears when Windows crashes or locks up. It's actually a Windows "stop" screen, and is designed to do two things: tell you the reason for the error, and to calm your nerves, hence the use of the color blue (studies show it has a relaxing effect on people). Though Blue Screens are difficult to decipher, all the information you need to figure out what caused it is right there in front of you in blue and white — and that's where we come in. We're going to show you how to dissect the blue screen error details, so you can fix the problem that's causing them.

BSoD 101: A Crash Course

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Main.png)

Error Name

There are many parts to a BSOD, but the most important is right at the top. The actual name of the error is presented in all caps with an underscore between each word. In some cases this will be all that's needed to get to the root of the problem (thanks to the handy guide you are about to read). Most of the time, however, more information will be required.

Troubleshooting Advice

Nearly every BSOD includes a portion of text with some basic troubleshooting advice, the first of which recommends restarting your computer. Gee, thanks for the tip Microsoft. Before you restart, copy the exact all-caps error code and hexadecimal values shown above and below this portion of generic text. The next paragraph provides sound advice, alerting the user to check to make sure their hardware is installed properly, or to undo any recent software or hardware upgrades.

Memory Dump

Every BSOD is accompanied by a memory dump. What this means is when Windows crashes, it dumps whatever it is holding in system memory to a file, and saves the file on your hard drive for debugging purposes. If you contact Microsoft for technical assistance, they'll want to know the contents of this file.

Stop Code

The "technical information" section portion contains the actual Windows stop code, in oh-so-easy-to-read hexadecimal form. Despite appearing unintelligible at first glance, this combination of numbers and letters is instrumental in determining the cause of the crash. Pay particular attention to the first set of numbers and letters. It precedes the other four, which are enclosed in parenthesis. If a specific driver is associated with the crash, it will be listed on the very next line.

I Run Vista, so I'm Immune to BSODs, Right?

Unfortunately, no. A common misconception is that blue screens don't even exist in Vista, but not only are they still there, but we're here to tell you we've seen them first hand. The good news is Microsoft put a lot of work into how Vista handles critical errors and other glitches that in previous OSes would cause a system crash. Most of the time, if a problem occurs, Vista will attempt to fix the problem without any interruption. For example, if your videocard crashes, you may see a messge saying "Display driver stopped responding and has recovered." In XP and previous OSes, this almost always would have resulted in a system crash.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Recovered.png)

In some cases, Vista will be unable recover on its own, and the result is a blue screen. By default, Vista will reboot itself after briefly flashing the blue screen. It happens so fast you might miss it, but once Windows reloads, you'll be greeted with an error message similar to the above. You can try clicking the 'Check for solution' button, just as you can try your hand playing the lotto. Neither one is likely to result in anything.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Restart.png)

Instead, scroll down and take note of the blue screen codes. Armed with this information, you can perform your own detective work. Alternately, if you'd prefer to see the actual blue screen rather than automatically rebooting, right-click the My Computer icon on your desktop, select Properties, and click on Advanced System Settings. In the System Properties window that appears, select the Advanced tab, click Settings under Startup and Recovery, and uncheck the box that says 'Automatically Restart.' The same steps also apply to XP.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Problems.png)

In another nod towards streamlining the troubleshooting process, Vista's Problem Reports and Solutions wizard can save you oodles of time in PC detective work, and may even alert you to potential conflicts you weren't even aware existed. You can find this applet by name in your Control Panel, or just type Problem Reports and Solutions in Vista's search box. Once loaded, click 'Check for new solutions' in the left-hand column. If Vista finds any conflicts, it will list them in the main window, along with any potential resolutions.

IRQL_NOT_LESS_OR_EQUAL (0x0000000A)

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_IRQL.png)

The most common cause of this conflict is improperly installed drivers for a piece of hardware you recently installed. For example, if you've installed a webcam two weeks ago, and have been getting BSoDs ever since, start your investigation with the webcam. First, disconnect the hardware, and uninstall the drivers for it completely. If that fixes the blue screen, you can search for updated drivers or contact the manufacturer.

If you haven't installed any new drivers recently, you'll need to do some more detective work. Start by examining the blue screen to see if it lists a specific driver. Looking at the blue screen, check the text at the very bottom of the screen. You'll probably see a file name. This is the driver that caused the problem. If, for example, the driver in question is named nv4_disp.dll (an nVidia-related file), and you've recently switched from an Nvidia videocard to an ATI part, then it's reasonable to assume that either the old driver was not uninstalled correctly, or the new drivers weren't properly installed.

Swapping Videocards

If you've narrowed your search of offending drivers down to those associated with your videocard, turn off the system, disconnect the power, and remove and reseat the videocard. Next, go into the BIOS (press F2 or Delete when your BIOS prompts you to do this, or consult your user manual or motherboard manufacturer's website) and check the bus speed for your videocard. We typically recommend leaving the PCI-E frequency set to Auto in the BIOS, but if you've overclocked your system, it can inadvertently knock the bus speed beyond a stable spec, which can cause blue screens. If that's the case, manually set your PCI-E frequency to 100MHz.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Uninstall.png)

You're more like to experience this IRQL error when switching form one videocard brand to another, as the drivers will conflict with each other. The safe way to swap videocards is to completely remove all remnants of your old videocard drivers using a utility called -http://www.drivercleaner.net/ (Driver Cleaner)-, or the freebie alternative -http://downloads.guru3d.com/Guru3D---Driver-Sweeper-(Setup)_d1655.html (Driver Sweeper)-. To begin the process, open up your Control Panel, select Add or Remove Programs in XP or Programs and Features in Vista, highlight the videocard drivers, and click Uninstall. Reboot the computer, holding down the F8 key to enter safe mode. Run the Driver Cleaner utility to scrub away any remnants of the previous drivers that a typical uninstall overlooks. After you reboot, install the appropriate drivers for your new videocard.

Some Sound Advice

When the error is related to an audio driver, take note of the program that was running when the BSoD occurred. Make sure the offending application's sound options are configured correctly -- it's especially important that it uses the correct audio device -- and download any patches available that address known issues. You should update your soundcard's drivers as well.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Soundcard.png)

If you're using an add-in soundcard, verify that the motherboard's onboard audio is disabled in the BIOS, so the two audio drivers don't conflict with each other.

Change Doctors

System services known to cause this error include virus scanners and backup utilities. We've had good luck sticking with the major players, such as AVG, Norton, Kaspersky, AntiVir, and Nod32 for our antivirus scanning, and Norton Ghost and Acronis TrueImage for backup duties. Do not run more than one antivirus application on your computer at the same time!

DATA_BUS_ERROR (0x0000002E)

(IMAGE: http://www.maximumpc.com/files/u69/RAM.png)

This is one of the easier BSoDs to diagnose, as faulty memory sticks are almost always to blame. If you get this error, think for a second: Are those DIMMs you just added compatible with your motherboard? Your motherboard manufacturer's website will have a list of specific brands verified to work with your particular board, although these are often incomplete.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Memory_Slots.png)

Next, are they installed in the correct slots? Some motherboards are more finicky than others when it comes to proper slot placement, and the situation is compounded when dealing with a dual- or tri-channel board. Most motherboards that run dual-channel require that you install matching sets of RAM in the same-color slots, while others, such as some MSI boards, require that you install them in alternate slots. And if you have a Core i7 setup, you may need to install your RAM starting with the slot farthest from the CPU. When in doubt, RTFM.

Once you've verified that your RAM is installed correctly and is compatible with your motherboard, check to make sure they're running within spec. It's possible you may have set your memory's latency timings too aggressive, or maybe the sticks can't handle the frequency you're trying to run them at. Your BIOS could also mis-read the SPD settings. Whatever the case, look up the correct parameters for your RAM and try manually setting them in the BIOS.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Memtest.png)

If the problem persists, the the problem is likely a bad stick. To find out which stick is bad you can simply remove one stick, then run your system for a while to see if the blue screens stop. Then swap the sticks and run your test again. If the machine blue screens with one stick, but not the other, you've found your culprit. You can also run a diagnostic program such as -http://www.memtest.org/ (Memtest86+)- to help determine which stick is defective. If you're running Vista, you can also use Microsoft's Windows Memory Diagnostics Tool. Type the name of the program in Vista's search box, and once selected, it will run the next time you reboot. Because most RAM sold today includes a lifetime warranty, be sure to check with your vendor before you toss out a bad stick.

NTFS_FILE_SYSTEM or FAT_FILE_SYSTEM (0x00000024 or 0x00000023)

While many blue screens can be traced back to a new hardware install or bad memory, this particular error screams in capital letters that something is fishy with your hard drive. The error that gets displayed depends on the file system your OS is using. In most cases, the file system will be NTFS. With really old systems, the error will read FAT16. If you get this error, be sure to do one thing immediately, before you even being to contemplate its cause: Back up your important data.

Call the Cable Guy

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_SATA.png)

The easiest solutions are often the most overclocked, but they can also be the most effective. Checking your hard drive's cable connections falls into this category. SATA cables are notorious for working themselves loose -- we've had this happen to us on many occasions. If using a SATA drive, make sure you have only one power cable connected, not two (many SATA hard drives include a SATA power cable and a legacy four-pin connector). With a PATA drive, remove the ribbon cable and look for any bent or broken pins. Carefully line up the cable and push it securely into place. You might also have a bad cable, so if you have a space cable lying around -- one you know to be good -- swap it with the one in your PC.

Check Please!

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Chkdsk_0.png)

Now it's time to check your drive for errors. To do this, we'll first run a diagnostic scan. In XP, click Start, then Run, and type cmd. In Vista, simply type cmd in the Start Search box, then right-click cmd.exe and select Run as Administrator.. At the flashing command prompt, type chkdsk /f /r and reboot the system if prompted. The /f and /r switches attempt to fix file-system errors, then look for an mark any bad sectors before automatically rebooting when the scan completes.

Change Drivers

Even though we don't really think about hard drives as needing drivers, the controller's they're attached to most certainly do. A buggy SATA controller driver can wreak havoc on your data. Your motherboard's chipset drivers include specific drivers for the IDE/ATA controller tha the hard drives are connect to, so you'll need to install the latest version for your motherboard. To find your chipset drivers, you'll need to go to your motherboard manufacturer's website and search the support section, or head directly to your chipset manufacturer's website.

UNEXPECTED_KERNEL_MODE_TRAP (0x0000007F)

If you see this blue screen, you're probably overclocking your CPU, but this is not always the case. The 7F error is known to attack indiscriminately, lashing out at more than just overclockers. This particular BSoD can rear its head in response to bad RAM, a faulty motherboard, or a corrupted BIOS.

Overzealous Overclocking

If you've overclocked, the first thing you should do to isolate the problem (or any problem, for that matter) is to revert your overclocked components to their default speeds. If the blue screen goes away, then your overclock was too aggressive. The best way to ensure that your overclock is stable is to stress the hell out of your PC. To do this, many enthusiasts turn to the torture test named -http://www.mersenne.org/ (Prime95)-. This utility stressed your rig's CPU and memory subsystems. If any errors are found, it's a good indication that your system is not completely stable.

Hot Potato!

This BSoD could also be generated by an overheating PC, so it's a good practice to monitor your system temps on a regular basis. There are several temp monitoring programs available, such as -http://www.google.com/url?sa=t&source=web&ct=res&cd=1&url=http%3A%2F%2Fwww.alcpu.com%2FCoreTemp%2F&ei=vs3rSZGRCoqyMd7PtdAF&usg=AFQjCNGSOa9k11mYqDoozf058ltF0aLQMg (Core Temp)-, -http://www.google.com/url?sa=t&source=web&ct=res&cd=1&url=http%3A%2F%2Fwww.techpowerup.com%2Frealtemp%2F&ei=yM3rScS_NYugM5TGpNkF&usg=AFQjCNFIZT4ezBctVGYet1xq3pd3AXXpZA (Real Temp)-, -http://www.google.com/url?sa=t&source=web&ct=res&cd=1&url=http%3A%2F%2Fwww.almico.com%2Fspeedfan.php&ei=1s3rSZW4EZmqMtvFvO0F&usg=AFQjCNHjPjmFuQJwp3IUFKLphybQl1SlRg (SpeedFan)-, and many others.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Core_Temp.png)

As far as temperatures go, most CPUs can get very hot without incurring any damage. Temperatures of 75C under load aren't unheard of for hot-running CPUs, though most newer chips probably won't get as high. In general, it's a good idea to keep your CPU below 70C, and below 50C at idle. This will vary by processor make, model, and even steppings (revisions) of the same chip.

If a processor is running hot, examine your case's airflow and see if there are any obstructions. Check your fans for dust buildup, including the top of the heatsink that's cooling your CPU. A high-quality cooler will also bring temperatures down. And you should always have some sort of thermal paste between the CPU and the cooler. Finally, verify that all fans are spinning. If the fan is plugged in and still not spinning, replace the defective fan immediately.

The BIOS Beckons

If your BIOS is corrupt or has trouble with a new component, such as newly released processor core, your first order of business is to update to the latest version. Before updating the BIOS, you should change its settings back to default (there is usually a "reset to default" setting in the BIOS that makes this process easy, or you can simply clear the CMOS via the jumper on your motherboard). You should never attempt to update your BIOS on a system that is overclocked and unstable. A sudden reboot in the middle of the BIOS-flashing process will destroy your motherboard, turning it into a fancy doorstop. And remember: Never, under any circumstances, restart or shut down the system while you're flashing yoru BIOS. You can download the latest BIOS from your motherboard manufacturer's website.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_BIOS_Update.png)

When there are several different versions to choose from, skip right to the latest release rather than updating incrementally. Some motherboard vendors include utilities for updating the BIOS from within Windows. This makes the process easy enough for even novices to undertake, but for obvious reasons, we recommend avoiding this route when a system is prone to blue screens.

Mating Memory

Mismatched or bad memory sticks can also cause this blue screen. To scratch this one off of the troubleshooting list, run a single stick of RAM that Memtest86 has verified to be error free. If this solves the problem, replace the bad stick. If not, move on to the next step.

CPU is Kaput

We don't see this often, but another known cause for this particular error is a bad processor. Most people don't have the means to test the CPU in another system, so your options here may be limited. Local computer repair shops are sometimes willing to run the processor for a night or two for a nominal cost, but you can also contact AMD or Intel for a replacement if it's within the warranty period.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_CPU_0.png)

Other Notable BSoDs

PAGE_FAULT_IN_NONPAGED_AREA

Faulty hardware, including RAM (system, video, or L2 cache).

INACCESSIBLE_BOOT_DEVICE

Caused by improperly configured jumpers on PATA hard drives, a boot sector virus, or incorrect IDE controller drives, which can also occur when installing the wrong chipset drivers.

VIDEO_DRIVER_INIT_FAILURE

Caused by installing the wrong drivers for a videocard or rebooting before driver installation could complete.

BAD_POOL_CALLER

Caused by a faulty or incompatible hardware driver, particularly when upgrading Windows XP instead of performing a clean install.

PFN_LIST_CORRUPT

Caused by faulty RAM.

MACHINE_CHECK_EXCEPTION

A bad CPU -- or one that is too aggressively overclocked, or an underpowered or faluty power supply.

An End Run Around the BSoD

Reading blue screens of death is fun and all, but there's another, easier way to discover what your PC's problem is: the Event Viewer. When an error occurs in Windows, the OS adds a note to the system's log files. These logs are accessible through Windows's Event Viewer, and they contain all the information we need to know what ails our poor computer.

In XP, go the Start menu and open the Control Panel. Click Administrative Tools, then double-click the Event Viewer icon. Altternately, select Run from the Start menu and type eventvwr.msc, which will bring you right into the Event Viewer. In Vista, just type Event Viewer in the Start Search box.

(IMAGE: http://www.maximumpc.com/files/u69/BSOD_Event_Viewer.png)

On the left-hand pane, highlight the applicaton or system icon (under Windows Logs in Vista). On the right-hand pane, you'll see up to three different events labled Information, Warning, and Error. These are sorted by the time in which they occured. Scroll to the approximate time of the last system restart and double-click the events.

This brings up a Properties window detailing information that should clue you in on any problem. For example, if one of the events contains a bugcheck message with 0x0000002E, we know this is a DATA_BUS_ERROR, and is usually indicative of faulty RAM. On the other hand, there might be several events pointing to a specific driver, such as nv4_disp.dll. This tells us we should focus on the videocard and any recent changes related to the display hardware.

Armed with this information, we're ready to beging the troubleshooting steps outlined previously. If typing the event ID into Google and Microsoft's Knowledge Base (-http://support.microsoft.com/ (http://support.microsoft.com)-) doesn't help, head over to -http://www.eventid.net/ (www.eventid.net)-. This site contains a repository of comments and errors from other users, as well as the steps they took to alleviate their problems.

We recommend you familiarize yourself with the event viewer, even if your system is healthy. Rooting out minor problems before they progress will ensure your Windows install keeps humming along uneventfully.





Source: http://www.maximumpc.com/article/features/blue_screen_survival_guide (Maximum PC)
----------------------------------------------------------------------

Saturday, September 19, 2009

Hide Disk Partition with Easy Steps

Want to hide disk partition then here is a solution those who share computers with others and want to hide full hard disk partition for and kind of reasons. By hiding any of the hard disk partition it will not make it out of work any program installed on these partitions will work as it works before hiding the disk drive.

Let?s start with steps to Hide Disk Partitions

* Hit the ?Start? menu button followed by "Run."
* Then type "gpedit.msc" in command line to open the group policy editor.
* Now select "User Configuration" and click the "+" sign next to it. And also Click the "+" sign next to "Administration Template."
* Then go to "Windows Components" and click the "+" next to it. Hit mouse button on "Windows Explorer."
* Now find out the line that says "Hide these specific drives in my computer" on the right side of the screen. Double-click ""Hide these specific drives in my computer." You can also right-click, then click "Properties."
* Now select the "Enabled." Box and Click the arrow next to "Restrict All Drives" and check out with mouse for the drives you want to hide. Click "Apply." Click "OK." Click the red "X" in the top right corner to exit group policy editor.
* Now open "My Computer" to check out the drive is surly hidden.
* Next you have to check personal firewall software for errors. If it pops up with a screen asking you to allow registry changes, click "Yes.


Sunday, August 30, 2009

Backing up and Restoring Microsoft Outlook 2003 PST File

Recently, I had to move my Microsoft Outlook 2003 PST (Personal Store, I think) file to another machine so I had to learn a bit about how Outlook uses PST files. The PST file may contain your emails, contacts, notes, calendar events, and tasks. The instructions below will help you to backup and restore your PST file on the same computer or on a different computer with Outlook 2003.

Note: Copying the PST file does not preserve the email services (such as POP3, IMAP, etc.) that you have configured. (The email services are also referred to as email support in the Outlook dialogs.)

Backing Up Your PST File

  • Find out where your PST file is located:
    1. Run Outlook
    2. Select menu Tools–>Options…–>Mail Setup–>Data Files…
    3. You should see an entry for your PST file. If you see more than one, that's okay; just redo the instructions for each PST file.
    4. Double-click on the entry to get a details dialog and look at the Filename field for the location of your PST file. (By default, your PST file should be named "Personal Folders" and its filename/location should be "C:\Documents and Settings\your_username\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst".)
    5. I strongly recommend renaming your PST file to something more specific than the default "Personal Folders" name. Later on, it will get confusing if you have several PST files with the exact same name.
  • Backup your PST file:
    1. Quit Outlook
    2. Make a copy of the PST file for your backup purpose

Restoring Your PST File

  1. Copy your backup PST file to a machine with Outlook installed. Note the location of the PST file as this will be its permanent location.
  2. Run Outlook. If this is the first time you are running Outlook, just create a default configuration without email support; aka, just select the defaults.
  3. Select menu Tools–>Options…–>Mail Setup–>Data Files…
  4. You will see the default "Personal Folders".
  5. Click on the Add button, hit Ok, browse to your PST file location, and hit Ok to close the dialog.
  6. You should now see two PST files. (If you have renamed your PST file during the backup, you should only see one "Personal Folders" which is the default PST. Otherwise, you may see two. If you see two, I strongly recommend renaming your PST file at this point.)
  7. Before you can delete the original, default PST file (with comment "Default delivery location"), you must configure your own PST file as the default mail delivery location. If you try to delete the original PST at this point, Outlook will throw an error.
  8. Click Close and Ok to close the Options dialog.
  9. Select menu Tools–>Email Accounts….
  10. Select "View or change existing e-mail accounts" and click Next button.
  11. Select your personal PST file under the "Deliver new e-mail to the following location" dropbox. (Selection is by name so you might get confused if you didn't rename your PST file.)
  12. Click Finish to close the E-mail Accounts dialog.
  13. Select menu Tools–>Options…–>Mail Setup–>Data Files…
  14. Select the original, default PST file and hit the Remove button.
  15. Once the original PST file is deleted, click Close and Ok to close the Options dialog.
  16. You have successfully restored your Outlook PST file!
  17. Optionally, you can go to the "C:\Documents and Settings\your_username\Local Settings\Application Data\Microsoft\Outlook" directory and delete the default PST file "Outlook.pst" which is no longer used.

Getting Address Book to use your Outlook PST Contacts

Try to open the address book by going to menu "Tools–>Address Book". If you do not see the contacts from your Outlook PST file, then you will need to configure the Address Book:

  1. Go to menu "Tools–>E-mail Accounts…".
  2. Select "View or change existing directories or address books" and click Next.
  3. Select and remove any pre-existing "Outlook Address Book" entry that you see.
  4. Click on Add… button, select "Additional Address Books" option, and click on Next.
  5. Select "Outlook Address Book" under "Additional Address Book Types" and click Next, then click Finish.
  6. Restart your Outlook client.
  7. Go to menu "Tools–>Address Book". If you do not see your Outlook PST file contacts listed, then repeat the actions above. (I had to do it twice to get the Address Book working.)

Note: Strangely, Outlook only allows you to create one "Outlook Address Book".

Outlook Profiles and Related

Outlook supports having multiple profiles (or configurations) that it can be launched with. By default, it will come with one profile; which is automatically loaded, so you will never see this feature. You can create a second profile and configure Outlook to prompt for the profile when starting:

  1. Right-click on the Outlook Icon on your desktop or in the Start menu and select Properties to display the Mail Setup dialog. (Note: This won't work on a shortcut to the Outlook program.)
  2. Select Show Profiles
  3. To create a new Profile:
    • Select the Add… button.
    • Input a profile name and hit the Ok button.
    • Click on the Close button and Ok button to not configure email support (POP3, IMAP, etc.); otherwise, configure away.
    • Outlook will create a new profile with a default data file named Outlook.pst (or Outlook1.pst, Outlook2.pst, Outlook3.pst, etc., if there is a pre-existing file in the "C:\Documents and Settings\your_username\Local Settings\Application Data\Microsoft\Outlook" directory of the same name).
  4. Configure Outlook to prompt for a profile on startup by selecting "Prompt for a profile to be used".
  5. Hit the Ok button to close the Mail Setup dialog.
  6. The next time you start Outlook, it will prompt you for the profile to use.

I found some other Outlook related tidbits of info that you might find useful:

  • At this location ""C:\Documents and Settings\your_username\Application Data\Microsoft\Outlook":
    • The "outcmd.dat" file stores your toolbar customizations. Quit Outlook, delete this file, and restart Outlook to restore the toolbar to default settings and recreate icons that some add-ins might have installed.
    • I think the Outlook temporary setting files are kept in the . I see some files there that have the same names as the profiles. Strangely, when the profiles are deleted, these files remain, instead of being deleted.
  • At this location ""C:\Documents and Settings\your_username\Local Settings\Application Data\Microsoft\Outlook":
    • The "extend.dat" file keeps a registry cache of add-in settings. Quit Outlook, delete this file, and restart Outlook to force Outlook to retrieve the settings from the registry again.
    • If you have a profile with "Exchange Server" email support, you will see a file named "outlook.ost". I think this is the local offline cache of emails and contacts for your Exchange Server account.
    • New Outlook PST files (Outlook.pst, Outlook1.pst, Outlook2.pst) are created here.

Hopefully, you will find some of the info above useful. (Information about "extend.dat" and "outcmd.dat" were derived from Resetting dat-files.)


Source

Backing Up Windows Desktop Locally and Remotely

To prevent data loss on my Windows desktop, I've created automated scripts to backup the data locally and remotely.

For both sections below, we will pretend that I want to backup two directories:

  • C:\Documents and Settings\username\My Documents\Tax Files
  • C:\Documents and Settings\username\My Documents\Photos

Backing Up Windows Desktop Locally

The best way to backup your data locally is to have a second hard drive and copy your data to that second hard drive. This way, if the primary hard drive dies, you still have a copy of your data on the second hard drive.

To do the copy, you could just use the DOS "xcopy" command, but that is very inefficient if you have a large amount of data to copy; each time, it will copy everything again (even if nothing changes). The better way to copy is to apply only the differences between the original data and the copy on the second hard drive. I recommend using Beyond Compare for this purpose (unfortunately, it costs $30).

Warning: I tried using the free RSync program, but it had problems with long path names and will sometimes remove access permissions from directories and files that it copies on Windows. As a result, I wasn't able to access the directories and files or delete them. With administrative rights, I was able to recursively give myself full rights to the directories and files again. In short, I don't recommend using RSync for copies where the destination target is Windows. For remote Unix targets, you can recursively adjust the permissions by using ssh to issue a chmod: ssh user@hostname 'chmod -R 755 /directory'

Here is the Beyond Compare script file, named "daily_backup.bc2″, which I used:

# Turn on logging to a file
log normal "C:\temp\bc_synclog_%date%.txt"

# Load the source and destination folder
load "C:\Documents and Settings\username\My Documents" "D:\Backups\Daily\My Documents"

# Mirror only these directories (the endings slash indicates directory)
filter "Tax Files\;Photos\"

# One-way Mirror from source to destination
sync create-empty mirror:lt->rt

Here is the DOS batch file, named "daily_backup.bat", which is used to launch Beyond Compare:

"C:\Program Files\Tools\Beyond Compare 2\bc2.exe" @"C:\Scripts\daily_backup.bc2"

move C:\Temp\bc_synclog_*.txt "D:\Backups\Daily\"

Now to schedule Windows to run the DOS batch file once a day:

  1. Go to menu "Start->Control Panel->Scheduled Tasks->Add Scheduled Task". Click Next.
  2. Click Browse button and select the DOS batch file "daily_backup.bat".
  3. Select "Daily" and click Next.
  4. Select a start time and click Next.
  5. Input your password. Click Next. Click Finish.

Backing Up Windows Desktop Remotely

The issue with a local backup is that if there is an accident (like a fire), both hard drives may be destroyed. The best backup is to another server which is not physically located in the same location as your desktop.

If you have a remote server which allows FTP access, you can use Beyond Compare to do the copy. Here is the Beyond Compare script to do so:

# FTP prompts if overwriting, set auto confirm yes
option confirm:yes-to-all

# Turn on logging to a file
log normal "C:\temp\bc_synclog_remote_%date%.txt"

# Load the source and destination folder (all on one line)
load "C:\Documents and Settings\username\My Documents" "ftp://username:password@ftp.hostname/backup"

# Mirror only these files and directories
filter "Tax Files\;Photos\"

# Mirror
sync create-empty mirror:lt->rt

If the Beyond Compare FTP hangs, you may need to enable passive mode.

  1. Launch Beyond Compare
  2. Go to menu "Tools->Options->FTP->Firewall / Proxy"
  3. Check the "Passive Mode" box

Beyond Compare FTP does not support delta copies (just copying the differences in the files); so for efficiency, you may wish to use the free RSync if your remote server supports rsync.

Here is the DOS batch script to issue the RSync command:

cd "\Documents and Settings\username\My Documents"

C:\Scripts\RSync\rsync.exe -vrt –delete "Tax Files" username@hostname:~/backup/

C:\Scripts\RSync\rsync.exe -vrt –delete Photos username@hostname:~/backup/

Unless you establish trust with the remote server (ssh.exe and ssh-keygen.exe comes with RSync and the keys are stored into the "%HOME%\.ssh" directory on Windows), RSync will prompt you for the password. This will make automating the remote backup rather difficult since it won't be able to run unattended. In the case where your remote server doesn't support establishing trust, you will need to use a scripting tool like Expect, which comes as part ActiveState Tcl.

Warning: Other programs may come with their own ssh.exe and ssh-keygen.exe executables which are not compatible with RSync. To avoid issues, you will want to make sure that the RSync directory is the first one in the "%PATH%" environmental variable.

After installing the ActiveState Tcl above (pick the standard distribution of ActiveTcl which is free), you will need to run the following command to install Expect:

C:\Scripts\Tcl\teacup.exe install Expect

Here is the Tcl/Expect script, named "expect_rsync.tcl", that will run RSYNC, wait for the password prompt, and input the password for you:

# Load the expect extension
package require Expect

# Enable logging
log_user 1

# Set timeout for password wait to 10 secs
set timeout 10

# Input arguments
array set OPTS {
   host   ""
   user   ""
   passwd ""
   backup ""
}

# Usage info
proc usage {code} {
   global OPTS
   puts [expr {$code ? "stderr" : "stdout"}] \
   "$::argv0 -host hostname -user username -passwd password -backup location ?options?
   -help         (print out this message)"
   exit $code
}

# Parse the arguments
proc parseargs {argc argv} {
   global OPTS
   foreach {key val} $argv {
      switch -exact — $key {
         "-host" { set OPTS(host) $val }
         "-user" { set OPTS(user) $val }
         "-passwd" { set OPTS(passwd) $val }
         "-backup" { set OPTS(backup) $val }
         "-help" { usage 0 }
      }
   }
}

parseargs $argc $argv

# Make sure we are not mssing any input arguments
if {$OPTS(host) == "" || $OPTS(user) == "" || $OPTS(passwd) == "" || $OPTS(backup) == ""} {
   usage 1
}

# Spawn an rsync process
spawn rsync -vrt –delete $OPTS(backup) $OPTS(user)@$OPTS(host):~/backup/
match_max 10000

set id $spawn_id

# Look for passwod prompt
expect -i $id timeout {
   puts "timed out"
   exit -1
} eof {
   puts "spawn failed with eof"
   exit -1
} "*?assword:*" {
   send -i $id — "$OPTS(passwd)\r"
}

# send blank line make sure we continue session
send -i $id — "\r"

# Close session and wait for spawn return
wait -i $id

Here is the DOS batch script to issue the Tcl RSync command:

cd "\Documents and Settings\username\My Documents"

C:\Scripts\Tcl\tclsh85.exe C:\Scripts\RSync\expect_rsync.tcl -host hostname -user username -passwd password -backup "Tax Files"

C:\Scripts\Tcl\tclsh85.exe C:\Scripts\RSync\expect_rsync.tcl -host hostname -user username -passwd password -backup Photos

Encrypting Your Remote Backup Files

If your remote server is not 100% secure (it may be your web hosting service), you may wish to encrypt your backups before copying them to the remote server. I use Winzip for this purpose. Winzip 10 or later comes with a free command line interface which we can script.

Here is the DOS batch script I use to zip, encrypt, and copy to the remote server:

"C:\Program Files\Tools\WinZip\wzzip.exe" -spassword -ez -p -r -u -ycAES256 -ybc -yu "C:\Documents and Settings\personal\My Documents\zip_archives\tax_files.zip" "C:\Documents and Settings\personal\My Documents\Tax Files\*"

"C:\Program Files\Tools\WinZip\wzzip.exe" -spassword -ez -p -r -u -ycAES256 -ybc -yu "C:\Documents and Settings\personal\My Documents\zip_archives\photos.zip" "C:\Documents and Settings\personal\My Documents\Photos\*"

C:\Scripts\RSync\rsync.exe -vrt –delete zip_archives username@hostname:~/backup/

The "-u" flag given to Winzip tells Winzip to update the archive file. This will add new files to or update existing files in the zip archive which have changed. Using this flag will drastically reduce subsequent executions of Winzip. Note that Winzip will not remove files from the archive, so if you wish to have a 100% accurate archive file, just delete the archive file and a subsequent run of Winzip will regenerate it.

RSync over SSH

In the worse case, your remote server may support SSH but not RSync. You can still run RSync over the SSH connection. Here is the updated RSync command to use:

C:\Scripts\RSync\rsync.exe -vrt –delete -e "ssh -p port -l username -v" zip_archives hostname:~/backup/

You may omit "-p port" if your remote server uses the default SSH port of 22.

Unfortunately, if you cannot establish trust with the remote server and need to input the password, automation using the Tcl/Expect script is not possible. There is an issue in the current version of ActiveState Expect that prevents it from working with RSync over SSH.

DOS Batch Tools

I had to create two command line tools to enhance the DOS batch functionality. The first tool is called WinClose.exe and it is used to close running programs. I used it to close Microsoft Outlook to unlock the storage file so that I could copy it. The second tool is called Wait.exe and it is used to pause the batch execution to allow Microsoft Outlook enough time to completely close (5 seconds) before the copy occurs. You can find these two tools in my Open Source page.



Configure Microsoft Outlook 2003 for Gmail IMAP and Yahoo Mail POP3

IMAP and POP3 are different protocols for retrieving email. POP3 is the older and much simpler protocol; it will only give you access to the Inbox folder. IMAP is younger and more sophisticated; it will give you access to your Inbox and other folders. If your email provider supports IMAP, I would suggest using it over POP3.

Configuring Gmail IMAP

Your Gmail account comes with free POP3 and IMAP access. You just have to enable it.

  1. Log into your Gmail account.
  2. Click on Settings and then "Forwarding and POP/IMAP".
  3. Click on "Enable IMAP".
  4. Or if you wish to use POP3, click on "Enable POP for all mail" and select "keep Gmail's copy in the inbox" in the dropdown for "When messages are accessed with POP". The reason for the latter option is to prevent POP3 from downloading the mail messages to your Outlook and deleting the mail messages from Yahoo Mail itself.
  5. Click on "Save Changes".

You can now configure Outlook to access your Gmail account using IMAP.

  1. Run Outlook.
  2. Select menu "Tools–>E-mail Accounts…".
  3. Select "Add a new e-mail account" and click Next.
  4. Select IMAP and click Next.
  5. Input your name into "Your Name" field and your email address into "E-mail Address" as you would like it to appear in the From field of your emails.
  6. Input "imap.gmail.com" into the "Incoming mail server (IMAP)" field and "smtp.gmail.com" into the "Outgoing mail server (SMTP)" field.
  7. Input your full Gmail username (with the @gmail.com) into the "User Name" field and your Gmail password into the "Password" field.
  8. Do not check the "Log on using Secure Password Authentication (SPA)" box.
  9. Click on the "More Settings…" button.
    • Under General, you can change the name that this email account will show up in Outlook as; I suggest changing this to match your full email address. (You may need to restart Outlook for this change to take effect everywhere.)
    • Under "Outgoing Server", check the "My outgoing server (SMTP) requires authentication" box and the "Use same settings as my incoming mail server" option.
    • Under Advanced, check the "This server requires an encrypted connection (SSL)" box and input 993 into the "Incoming server (IMAP)" field. (You will want to do it in this order because checking the SSL box will reset the port number.)
    • Next, check the "This server requires an encrypted connection (SSL)" box and input 465 into the "Outgoing server (SMTP)" field. (You will want to do it in this order because checking the SSL box will reset the port number.)
    • Finally, you may wish to increase the "Server Timeouts" from the default 1 minute to 2 minutes.
  10. Click OK, Next, and Finish.
  11. You should see your Gmail account show up as a new root entry in your Outlook's All Mail Folders.

Because of how Gmail persists emails, deleting Gmail messages using Outlook is a two step process:

  1. Under Outlook, go to the Gmail's "All Mail" folder.
  2. Locate the message which you wish to delete and drag-n-drop it to Gmail's Trash folder.
  3. Go to the Trash folder, select the messages you wish to delete, and hit the Delete key on your keyboard. The subject lines for the selected messages will be striken through.
  4. Go to menu "Edit –> Purge Deleted Messages".
  5. Note: dragging the message from the "Inbox" folder instead of from the "All Mail" folder will just remove the message from the "Inbox" folder and leave it in "All Mail" folder.

Configuring Yahoo Mail POP3

Yahoo Mail only supports POP3 access and only if you have a Yahoo Plus Mail account. If you don't have a Yahoo Plus Mail account and are technically inclined, you can use the free YPOPs application.

If you have a Yahoo Plus Mail account, you can configure Outlook to access your Yahoo Mail using POP3.

  1. Run Outlook.
  2. Select menu "Tools–>E-mail Accounts…".
  3. Select "Add a new e-mail account" and click Next.
  4. Select POP3 and click Next.
  5. Input your name into "Your Name" field and your email address into "E-mail Address" as you would like it to appear in the From field of your emails.
  6. Input "plus.pop.mail.yahoo.com" into the "Incoming mail server (IMAP)" field and "plus.smtp.mail.yahoo.com" into the "Outgoing mail server (SMTP)" field.
  7. Input your short Yahoo username (without the @yahoo.com) into the "User Name" field and your Yahoo password into the "Password" field.
  8. Do not check the "Log on using Secure Password Authentication (SPA)" box.
  9. Click on the "More Settings…" button.
    • Under General, you can change the name that this email account will show up in Outlook as; I suggest changing this to match your full email address. (You may need to restart Outlook for this change to take effect everywhere.)
    • Under "Outgoing Server", check the "My outgoing server (SMTP) requires authentication" box and the "Use same settings as my incoming mail server" option.
    • Under Advanced, check the "This server requires an encrypted connection (SSL)" box and input 995 into the "Incoming server (IMAP)" field. (You will want to do it in this order because checking the SSL box will reset the port number.)
    • Next, check the "This server requires an encrypted connection (SSL)" box and input 465 into the "Outgoing server (SMTP)" field. (You will want to do it in this order because checking the SSL box will reset the port number.)
    • Then, you may wish to increase the "Server Timeouts" from the default 1 minute to 2 minutes.
    • Finally, check the "Leave a copy of the messages on the server" box and the "Remove from server when deleted from 'Deleted Items'" box. This will keep the mail messages on your Yahoo account until you delete it from Outlook's "Deleted Items" folder.
  10. Click OK, Next, and Finish.
  11. Unlike with IMAP, your POP3 account will not show up as a new root entry in your Outlook's All Mail Folders. Instead, POP3 messages are delivered to the store designated as the default delivery location. You can find the default delivery store by doing the following:
    • Select menu "Tools–>E-mail Accounts…"
    • Select "View or change existing e-mail accounts" and click Next
    • The default delivery store is shown in the "Deliver new e-mail to the following location" dropdown.

If you are an AT&T SBC Yahoo subscriber, you can link your yahoo account to your AT&T account and thus, upgrade your yahoo account to a plus account. If you do so, you can use the following alternative POP3 and SMTP server settings, "pop.att.yahoo.com" and "smtp.att.yahoo.com"; though the POP3 and SMTP server settings above should also work.

Deleting your Yahoo mail follows the standard Outlook functionality. You will find your Yahoo mail in your default delivery store. If you delete the mail from your Outlook Inbox folder, it should appear in the Outlook "Deleted Items" folder (even though in Yahoo, it remains in the Inbox folder). If you delete mail from the Outlook "Deleted Items" folder, that mail will finally be removed from your Yahoo account.

Which email account to use when composing a new email?

If you have several POP3 and IMAP accounts, you may want to select one of the accounts as the default to use when composing and sending a new message. Basically, when composing a new email, what is the default From address to use? You can set the default account to use by doing the following:

  1. Go to menu "Tools->E-mail Accounts…"
  2. Select "View or change existing e-mail accounts" and click Next.
  3. Select each account (under "Outlook processes e-mail for these accounts in the following order") and use the "Move Up" and "Move Down" buttons to re-order it. The first account listed will be the default account used when composing and sending a new email message.
  4. Click Finish.

If you are replying to an existing email message, Outlook will use the account that the email was received on to determine which of your email addresses to use as the From address. For example, if you are replying to an email sent to "you@you.com", then the reply email will use "you@you.com" as the From address.

The info above was taken from Outlook 2003 – Gmail Help and POP Yahoo! Mail Plus with Microsoft Outlook 2002 (XP) and 2003.


Source


Saturday, August 29, 2009

How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system

Determine the operating system bit count

Locate the operating system that is running on your computer in this section, and then follow the steps to determine the bit count of your operating system.

Windows Vista

If you have Windows Vista, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System window in Control Panel
  1. Click Start
    Collapse this imageExpand this image
     Start button
    , type system in the Start Search box, and then click system in the Programs list.
  2. The operating system is displayed as follows:
    • For a 64-bit version operating system: 64-bit Operating System appears for the System type under System.
    • For a 32-bit version operating system: 32-bit Operating System appears for the System type under System.
Method 2: View System Information window
  1. Click Start
    Collapse this imageExpand this image
     Start button
    , type system in the Start Search box, and then click System Information in the Programs list.
  2. When System Summary is selected in the navigation pane, the operating system is displayed as follows:
    • For a 64-bit version operating system: x64-based PC appears for the System type under Item.
    • For a 32-bit version operating system: x86-based PC appears for the System type under Item.
If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.

Windows XP

If you have Windows XP, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel
  1. Click Start, and then click Run.
  2. Type sysdm.cpl, and then click OK.
  3. Click the General tab. The operating system is displayed as follows:
    • For a 64-bit version operating system: Windows XP Professional x64 Edition Version < Year> appears under System.
    • For a 32-bit version operating system: Windows XP Professional Version <Year> appears under System.
    Note <Year> is a placeholder for a year.
Method 2: View System Information window
  1. Click Start, and then click Run.
  2. Type winmsd.exe, and then click OK.
  3. When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
    • If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
    • If the value that corresponds to Processor starts with ia64 or AMD64, the computer is running a 64-bit version of Windows.
If you cannot determine the operating system bit count with these methods, go to the "Next Steps" section.

Windows Server 2003

If you have Windows Server 2003, there are two methods to determine whether you are running a 32-bit or a 64-bit version. If one does not work, try the other.
Method 1: View System Properties in Control Panel
  1. Click Start, and then click Run.
  2. Type sysdm.cpl, and then click OK.
  3. Click the General tab. The operating system is displayed as follows:
    • For a 64-bit version operating system: Windows Server 2003 Enterprise x64 Edition appears under System.
    • For a 32-bit version operating system: Windows Server 2003 Enterprise Edition appears under System.
Method 2: View System Information window
  1. Click Start, and then click Run
  2. Type winmsd.exe, and then click OK.
  3. When System Summary is selected in the navigation pane, locate Processor under Item in the details pane. Note the value.
    • If the value that corresponds to Processor starts with x86, the computer is running a 32-bit version of Windows.
    • If the value that corresponds to Processor starts with EM64T or ia64, the computer is running a 64-bit version of Windows.
If you cannot determine the operating system bit count by using these methods, go to the "Next Steps" section.

Notes
  • To find the computer's bit count, see the documentation that was included with the computer, or contact the hardware manufacturer.
  • Intel Itanium-based computers can run only 64-bit versions of Windows. Intel Itanium-based computers cannot run 32-bit versions of Windows. Currently, 64-bit versions of Windows run only on Itanium-based computers and on AMD64-based computers.


Source

Monday, August 24, 2009

what CAM/TS/TC/SCR means?

CAM -

A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be' fairly empty and a fairly clear signal will be heard.


TELESYNC (TS) -

A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.


TELECINE (TC) -

A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.


SCREENER (SCR) -

A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.


DVD-SCREENER (DVDscr) -

Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.

R5-

R5 refers to a specific format of DVD released in DVD Region 5, the former Soviet Union, and bootlegged copies of these releases that are distributed on the Internet. In an effort to compete with movie piracy, the movie industry chose to create a new format for DVD releases that could be produced more quickly and less expensively than traditional DVD releases. R5 releases differ from normal releases in that they are a direct Telecine transfer of the film without any of the image processing common on DVD releases, and without any special features. This allows the film to be released for sale at the same time that DVD Screeners are released. Since DVD Screeners are the chief source of high-quality pirated movies, this allows the movie studios to beat the pirates to market. In some cases, R5 DVDs may be released without an English audio track, requiring pirates to use the direct line audio from the film's theatrical release. In this case, the pirated release is tagged with ".LINE" to distinguish it from a release with a DVD audio track.

The image quality of an R5 release is generally comparable to a DVD Screener release, except without the added scrolling text and black and white scenes that serve to distinguish screeners from commercial DVD releases. The quality is better than Telecine transfers produced by movie pirates because the transfer is performed usingprofessional-grade film scanning equipment.


DVDRip -

A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD, AVI (DivX/Xvid) and more recently MKV/MP4 (H.264).


VHSRip -

Transferred off a retail VHS, mainly skating/sports videos and XXX releases.


TVRip -

TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.


WORKPRINT (WP) -

A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.


DivX Re-Enc -

A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.


Watermarks -

A lot of films come from Asian Silvers/PDVD (see below) and these are tagged by the people responsible. Usually with a letter/initials or a little logo, generally in one of the corners. Most famous are the "Z" "A" and "Globe" watermarks.


Asian Silvers / PDVD -

These are films put out by eastern bootleggers, and these are usually bought by some groups to put out as their own. Silvers are very cheap and easily available in a lot of countries, and its easy to put out a release, which is why there are so many in the scene at the moment, mainly from smaller groups who don't last more than a few releases. PDVDs are the same thing pressed onto a DVD. They have removable subtitles, and the quality is usually better than the silvers. These are ripped like a normal DVD, but usually released as VCD.


Scene Tags...

PROPER -

Due to scene rules, whoever releases the first Telesync has won that race (for example). But if the quality of that release is fairly poor, if another group has another telesync (or the same source in higher quality) then the tag PROPER is added to the folder to avoid being duped. PROPER is the most subjective tag in the scene, and a lot of people will generally argue whether the PROPER is better than the original release. A lot of groups release PROPERS just out of desperation due to losing the race. A reason for the PROPER should always be included in the NFO.


LIMITED -

A limited movie means it has had a limited theater run, generally opening in less than 250 theaters, generally smaller films (such as art house films) are released as limited.


INTERNAL -

An internal release is done for several reasons. Classic DVD groups do a lot of INTERNAL releases, as they wont be dupe'd on it. Also lower quality theater rips are done INTERNAL so not to lower the reputation of the group, or due to the amount of rips done already. An INTERNAL release is available as normal on the groups affiliate sites, but they can't be traded to other sites without request from the site ops. Some INTERNAL releases still trickle down to IRC/Newsgroups, it usually depends on the title and the popularity. Earlier in the year people referred to Centropy going "internal". This meant the group were only releasing the movies to their members and site ops. This is in a different context to the usual definition.


STV -

Straight To Video. Was never released in theaters, and therefore a lot of sites do not allow these.


ASPECT RATIO TAGS -

These are *WS* for widescreen (letterbox) and *FS* for Fullscreen.


REPACK -

If a group releases a bad rip, they will release a Repack which will fix the problems.


NUKED -

A film can be nuked for various reasons. Individual sites will nuke for breaking their rules (such as "No Telesyncs") but if the film has something extremely wrong with it (no soundtrack for 20mins, CD2 is incorrect film/game etc) then a global nuke will occur, and people trading it across sites will lose their credits. Nuked films can still reach other sources such as p2p/usenet, but its a good idea to check why it was nuked first in case. If a group realise there is something wrong, they can request a nuke.


NUKE REASONS...

this is a list of common reasons a film can be nuked for (generally DVDRip)

BAD A/R = bad aspect ratio, ie people appear too fat/thin
BAD IVTC = bad inverse telecine. process of converting framerates was incorrect.
INTERLACED = black lines on movement as the field order is incorrect.


DUPE -

Dupe is quite simply, if something exists already, then theres no reason for it to exist again without proper reason.

Saturday, August 22, 2009

The difference between POP and IMAP


There are two basic ways to set up an email program such as Eudora, Entourage or Outlook to check your email. One is to use a POP (POP3 actually: Post Office Protocol) and the other is to use IMAP (IMAP4 actually: Internet Message Access Protocol). POP is the most common way of doing this but from our point of view IMAP has certain major advantages over POP and that hopefully will become clear to you in a minute. Please don't confuse IMAP with IMP - IMP stands for Internet Messaging Program, and it's the web application used to read your NYUMC/Skirball email from a web browser, better referred to as webmail. There is a certain relation between IMP and IMAP but they're entirely different animals and the similarity of the acronyms is incidental.

If POP is used all your email messages are downloaded from the email server to your computer and stored on the hard drive. Most programs have the option to keep the messages on the server for x number of days but sooner or later the messages are removed from the server. Also, with POP your outgoing emails are kept locally on your hard drive which leads to the familiar and annoying situation where you have different emails on each computer that you use to check email: home, office, work, etc. Furthermore, the local file used by your email program to store messages is specific to the program, there is no widely accepted standard. So, if you ever decide to switch your email program, you will find it necessary to export/import the emails from one program to another which is often painfully slow or doesn't work very well at all. In some cases when moving between different programs and different operating systems (Mac, Windows, Linux) it may be altogether impossible. Most people don't even know where these files are and don't make any backups and don't know how to move them to another computer. POP has basically only two advantages: once the emails are downloaded to your computer, they open very fast since they reside on your local hard drive and your mail storage capacity is only limited by the free space on your hard drive, it's not subject to quotas and size limitations imposed by your mail provider, be it NYU, Earthlink, Verizon, etc. Also, POP is easier to implement and support and it creates less network traffic for your internet provider. For these reasons POP is often the only way your ISP will support.

If IMAP is used all your email messages are stored on the server and never removed. In most cases your email application creates a local cache of messages on your hard drive to speed up the opening of emails, but the originals are not touched. Also, with IMAP (this is the big one!) your sent mail and drafts are uploaded to the server! Because of this, you will see the same incoming and sent messages from any computer as long as your mail program is configured for IMAP. POP3 does not have this functionality. Furthermore, the IMAP folders on saturn are the same ones that IMP (the webmail program) uses. Therefore, if you use IMP to send email while being away from the Institute, then come back to your office, open Entourage you will see that email in your sent mail folder! Or, if you save your message-in-progress in the office it'll get uploaded to your drafts IMAP folder and you will be able to open it at home and continue working on it. Pretty neat, isn't it? Of course like anything good in this world it comes at a price:( First, reading email over IMAP is slower because messages are read "live" off the mail server. It's particularly slow the first time you open a folder or a message as it has to be downloaded and cached. Each next time it's quicker though. But IMAP is inherently slower than POP3, in particular over slower connections. The other negative side of IMAP is that it's sensitive to the size of your mailboxes, at least this is the case with certain mail servers as the one run by us. That is, if you have a lot of messages in your inbox checking your email may become slower and slower over time as your inbox grows large. Also, if your email provider imposes quotas IMAP may become a problem. To address this you need to manage and archive your email. You can create additional IMAP folders and move emails out of your inbox and sent mail. In most cases it's enough to do this once a month. On Saturn we don't impose email quotas though. Your mail storage is limited only by free space in your home directory, but you still need to manage your email to avoid the slowdowns, this is a technical issue.

Since IMAP is an internet standard and the emails are stored on the server it's easy to switch between email programs and operating systems. You can move or setup additional IMAP accounts in Outlook XP under Windows and Mail.app in OSX or Thunderbird uner Linux with equal ease and within minutes you will see all your emails even if you don't have access to your previous program or the other computer. There is no need to copy any files between computers just configure a few settings.

Also, with IMAP we can enable automatic spam filtering for you and the IMAP mail is backed up nightly.
Here is more info on spam filtering on Saturn.

As far as functionality and convenience are considered IMAP is the way to and we encourage you to switch to IMAP. We're working on a page with instructions and we're here to help you with the conversion as well.

Not all email programs have IMAP implemented properly though. All versions of Eudora are notorious for not being able to upload sent mail to the IMAP server properly, therefore we do not support IMAP under Eudora! Our preferred email program is Entourage and we support it 100%. It's a commercial program that comes as part of Microsoft Office for MacOS. We also support IMAP under Mozilla Thunderbird and the latest versions of Apple Mail that comes with OSX 10.4 (Tiger).

If you start using IMAP you should no longer use POP on any other computer! Using a mix of POP and IMAP will lead to conflicts and will basically defy the purpose of switching to IMAP in the first place. To get the the full benefits of IMAP you must switch to IMAP exclusively. For the reasons mentioned above it's OK to continue to use webmail (IMP) as it is essentially an IMAP client.

SUMMARY

POP advantages

- messages load very quickly once they're downloaded
- messages are stored on your hard drive so they're not subject to server storage limits and quotas
- widely supported by ISPs and email providers
- all email programs support it

POP disadvantages

- messages are stored on your hard drive so they're not accessible from other computers
- sent mail and drafts are not accessible from other computers either
- messages are eventually removed from the server
- messages are stored in files that are not compatible between different programs
- it's usually difficult to migrate from one program to another, sometimes impossible
- it's cumbersome to copy your email to another computer (office, home, school, laptop, etc.)
- users normally don't have backups of their email

IMAP advantages

- messages are stored on the server are accessible from any computer and webmail anywhere in the world
- IMAP mail folders remain synchronized with IMP (webmail)
- sent messages and drafts are also stored on the server
- server-side spam filtering is easily implemented with IMAP
- IMAP mail is backed up nightly on the server and can be restored
- ease of migration from a program to a program and from a computer to another computer/location
- ease of setting up additional computers to check your email, no need to copy anything fro one computer to another

IMAP disadvantages

- messages load slower, in particular the first time they're read
- sensitive to size and requires periodic archival of email messages
- subject to storage quotas (not the case with Saturn, however)
- very few ISPs and email providers offer IMAP as it is considered a high end option and it's complex for them to support
- not all email programs support it properly


Friday, June 5, 2009

Mark them as "favourite"


LINKS

NEWS


http://www.internetnews.com/


BLOG



NETWORKING



OPERATING SYSTEMS






VIDEOS





FLASH



RESOURCES








PERL




IT GAMES



http://www.opensourcewindows.org/


LINKS TO VIDEOS

http://blogs.cisco.com/channels

GOODIES FOR TECHS


HELPFULL



http://academicearth.org/courses/understanding-computers-and-the-internet 



http://academicearth.org 


This website has thousands of video lectures from the world's top scholars. Excellent source for Computer Science mayors and much more. 



http://ocw.mit.edu/OcwWeb/web/courses/av/index.htm



Computer Science and more... 



http://66.175.80.129/worldlibrary /searchResults.do?query=CISCO&maxResult=10&command=search 



http://worldlibrary.net/Collections.htm 



http://worldlibrary.net/



500,000 pdf + and more for 9$ a year. 



http://freevideolectures.com/computerscience.html 



Free lectures 


http://www.cantenna.com/wifi-antenna/index.html 



Acessing the Internet 


http://videolectures.net/ 


http://freevideolectures.com/ 


http://lecturefox.com 


http://www.magicjack.com/7/index.asp 


https://cisco.hosted.jivesoftware.com/ 


http://www.groupstudy.com/ 


http://dfw.cisco-users.org/study_groups.htm 


http://www.nylana.org/sigs/sig.php?sig=cisco 


http://www.cisco-users.org/other_cugs.htm 


http://www.facebook.com/group.php?gid=12615661836 


http://www.meetup.com/NYCCCIE/ 


http://my.safaribooksonline.com/search?category=itbooks.cert.cisco.ccna