Wednesday, June 16, 2010

How to disable Windows Vista User Account Control ?

This new security tool called 'Windows Vista User Account Control' is meant to keep your computer
safe and clean of viruses that's one thing which is very important for your computer. But you don't want to get bothered with annoying warnings from Windows Vista each time you install a program or when you make a change in Vista's settings.

Without any doubt is Vista's most irritating tool this User Account Control (UAC). The User Account Control takes care that Windows asks permission to several system sources over and over again. I have to admit that this standard setting helps you to keep your computer clean, but do you really want to give permission for every small setting change, like changing the Windows' standard font?

I think your answer is NO!

Fortunately there is an easy way to disable the User Account Control. You can disable the UAC by clicking:

* Start
* (Settings)
* Control Panel
* User Accounts

The next screen is shown:



In this screen you see the option 'Turn User Account Control on or off'.
By clicking this option the next screen is shown:



Here you simply remove the '√' from the checkbox to disable the UAC tool. After clicking the 'Ok' button you will be asked to restart your computer the activate your changes. After your computer is restarted you won't be bothered anymore by the UAC.

If you want to enable the User Account Control again, you simply repeat the above and you place back the '√' in the checkbox and click 'Ok'. After restarting your computer the UAC is activated again to help you protect your computer better.

Shrink a partition in windows vista

Step 1:
Click with your right mouse button on 'Computer' and then click 'manage'.
The next screen is shown.



In this screen you click in the left pane on 'Disk Management' below 'Storage'.
Then the next screen is shown.



Now you see all your partitions which you have created. To shrink a partition you simple right click on the partition and in the menu which appears you click 'Shrink Volume'.
The next screen is then shown.



Here you can enter the amount of space to shrink in MB.

If there is empty space available behind the partition there is also the possibility to extend the the partition using the option 'Extend Volume'.
There one thing you can not do. You can not move a partition or extend it with an empty space which is in front of a partition.

Saturday, June 5, 2010

The Power User's Guide to the Windows 7 Taskbar

The Power User's Guide to the Windows 7 Taskbar


It seems like every week we learn about a new tip to enhance the Windows 7 taskbar, and it's hard to keep them all straight. Here's the complete power user's guide to tweaking and using your taskbar like a pro.

Learn to Use the Taskbar Like a Pro



Before you even get started trying to tweak your taskbar, you should make sure that you understand how to use all of the features, and there might be more than you think—check out our complete guide to Windows 7 shortcuts to learn useful basic maneuvers, like how you can hold down the Ctrl key while left-clicking to cycle through a group of taskbar buttons, or hold down Shift while right-clicking to show the regular window menu. Here's the full list of Taskbar-specific shortcuts:

•Win+number (1-9): Starts the application pinned to the taskbar in that position, or switches to that program.
•Shift+Win+number (1-9): Starts a new instance of the application pinned to the taskbar in that position.
•Ctrl+Win+number (1-9): Cycles through open windows for the application pinned to the taskbar in that position.
•Alt+Win+number (1-9): Opens the Jump List for the application pinned to the taskbar.
•Win+T: Focus and scroll through items on the taskbar.
•Win+B: Focuses the System Tray icons.
•Drag+Drop taskbar buttons or System Tray icons: to reorganize them.
•Shift+Click on a taskbar button: Open a program or quickly open another instance of a program.
•Ctrl+Shift+Click on a taskbar button: Open a program as an administrator.
•Shift+Right-click on a taskbar button: Show the window menu for the program (like XP does).
•Shift+Right-click on a grouped taskbar button: Show the window menu for the group.
•Ctrl+Click on a grouped taskbar button: Cycle through the windows of the group.
•Drag a File to a taskbar button: to pin the file to the current application's Jump List.
•Shift+Drag a File to a taskbar button: to open a file with the current application.
•Middle-Click on a taskbar button: to open a new instance of the application.
•Middle-Click on a Aero Thumbnail: to close that application instance.
•Left-Click + Drag upwards: to open the Jump List for an application.

Once you've mastered the shortcut keys and mouse tricks, or at least those you'll actually use, it's time to learn how to fully use Windows 7's Jump Lists, from tweaking the number of items shown to pinning document templates and quickly accessing private browsing modes.

Tweak Your Taskbar Settings




Now that you fully understand all of the tips and tricks to using the built-in features, it's time to tweak the taskbar to work just the way you want it to-for instance, if you don't want taskbar buttons pulling up the Aero Peek thumbnails every time, there's a registry hack that can change the default left-clicking behavior to switch to the last active window instead.




Rather than dealing with messy registry hacks, the 7 Taskbar Tweaker customization tool gives you fine-grained control over what happens when you left, middle, or right-click on taskbar buttons, and even customizes window grouping and whether dragging to the taskbar pins items or opens them. If the new Aero Peek doesn't work quite the way you want, you can use a registry hack to make Aero Peek display instantly, or just use the Desktop Peek Tweak tool to make the changes more easily.



If the look and feel is what you want to change, you can check out AeroWorks to re-skin your Windows 7 taskbar without patching anything, or use the Windows 7 Start Button Changer to change that orb to something that fits your mood a little better. You can use the Windows 7 Taskbar Thumbnail Customizer to tweak the size and spacing of the thumbnail windows that show up when you hover your mouse over a taskbar button. You can even get the old-style network activity icon back in the system tray if you really want it.

Pin Anything to Your Taskbar




So you've mastered the taskbar, tweaked the settings just the way you want, and it's time to pin all of your favorite applications to the taskbar, but there's just one problem: Windows doesn't let you pin just anything. No worries, however, because you can use a trick to not only pin individual folders to the taskbar, but actually pin any item. If you really want to tweak your system, you can use transparent shortcuts to separate and organize your taskbar icons, or add a fully functional recycle bin.



Once you've pinned an application to the taskbar, there's a simple trick to customizing it that might not be immediately obvious—just pop up the Jump List, and then right-click on the application name to get to the real properties screen, where you can add extra command-line parameters, or set the compatibility mode.

Enhance the Taskbar's Application Launching




The windows 7 taskbar combines window management with an application launcher, since you can right-click on any item and pin it to the taskbar, but that's not nearly enough for a power user. We've already told you how you can boost your productivity with Jump Lists, and that starts with using some more powerful application launchers that enhance your taskbar experience-Jumplist Launcher consolidates applications into a single button, while JumpLaunch turns your Quick Launch folder into a Jump List.
If you like some minimal eye candy for your taskbar, check out the slick 7 Stacks utility, or use Standalone Stack to not only launch applications, but browse through your file system with popup navigation that can be pinned to your taskbar. Of course, you aren't limited to launching applications, since you can also close all windows from the taskbar.




Monitor Your System with Add-ons



There's any number of desktop widgets that can show you the weather or monitor your system, but they all have the same problem-if you've got a window maximized, you won't be able to see anything. You can get around this problem by simply docking an application to the taskbar that gives you your system monitoring right there in the taskbar button itself.
If weather is your thing, check out how Weatherbar integrates weather forecasts directly into the taskbar, or you can use SuperbarMonitor to add drive space, battery life, and memory or CPU usage into separate buttons on the taskbar. If monitoring the web is more your thing, you can integrate a taskbar RSS reader, or put Gmail notifications into a taskbar button.


Virtual desktop application Dexpot is not only a powerful virtual desktop manager, but the latest version includes full support for Windows 7's Aero Peek thumbnails—you can pin the application to the taskbar, and use the thumbnails to easily navigate between multiple virtual desktops.


Revert the Whole Thing Back to XP/Vista Style



If the new taskbar with all of the great functionality just isn't your thing, you can actually revert everything back to work almost the same as it did back on the Windows XP or Vista days.

One of the first things most Windows 7 adopters ask is how to get the Quick Launch back, and luckily there's an easy trick to add the Quick Launch bar back—just add a new toolbar with %appdata%\Microsoft\Internet Explorer\Quick Launch as the folder location. You can also head into the taskbar settings and tweak the whole thing to look just like older versions of Windows. Of course, if you really hate the taskbar, there's always the option of using Taskbar Eliminator to ditch the taskbar entirely.

Wednesday, June 2, 2010

One-click To Add Elevated Command Prompt Shortcut In Right-click Menu

Start from Windows Vista to Windows 7, a user created Windows account of Administrator group doesn’t explicitly running program with true administrator privilege, unless using the system defined administrator account.

Thus, when you hold down the SHIFT key followed by right click a folder to select “Open command window here” doesn’t execute CMD.exe with elevated privilege.

To fix this nuisance, you can either log in with the system defined administrator account or apply a simple Registry hack that add an elevated Command Prompt shortcut in right-click context menu.

One-click Registry hack to add true administrator Command Prompt shortcut in right-click context menu

This Registry hack is applicable to Windows Vista and Windows 7, both x32/64-bit.

Download and extract the ElevatedCmd.zip, verify the file checksum (given at below), double click ElevatedCmd.reg to proceed:

[ md5 checksum (.zip): e94fc460bf480265670330203cb0c3cc ]
[ md5 checksum (.reg): 8a76ef862374e65bc9229ad6c32a58fe ]
(You might interested in HashCheck that integrate MD5 file checksum function in right-click menu)

You will be asked by User Account Control to allow ElevatedCmd.reg makes change in your computer followed by Registry Editor warning message:



If you trust me, just click OK/Yes to apply the hack on Windows Vista, Windows 7 or higher.

Explorer Closes with Error Message – Solution:

When i open computer ,one error message comes with only close message to click which is about explorer,and when i click on it disappears and my computer doesn't work. Nothing opens, just a desktop background,nothing works,please give me help, I can't format because I have important files in C drive in which I have windows installed.

Lets dig it. More precisely, lets put it this way:

When you start your Windows XP-based computer, you may receive the following error message:

Explorer has encountered an error and needs to close. We are sorry for the inconvenience.
Also, you may not be able to open folders, such as the My Documents folder or the My Computer folder.

Cause
This problem may be caused by Qcbar.dll, a program that adds adult Web site links to the Internet Explorer Favorites menu.
Solution

Tips: When everything disappears, try hitting Ctrl+Alt+Delete at keyboard. Windows Task Manager will appear. Click at the New Task button. Type there explorer. Hit Ok. See if explorer opens for you. You can choose command to open any application from another post which is 99 commands for windows.

Some commands you may try are as:

Add/Remove Programs command is appwiz.cpl
Command Prompt cmd
Computer Management compmgmt.msc
Network Connections control netconnections
Network Connections ncpa.cpl
Registry Editor regedit
Registry Editor regedit32
My recommendations are to disable internet connection before you start computer and open task manager and then view processes and delete any process you find suspicious. Then try above add or remove command there. Remove any malicious program if installed. If the problem remains, then proceed to the steps mentioned below.
To resolve this problem use one of the following methods.

Method 1
Remove the Link from Your Favorites Folder in Internet Explorer.
To do so, start Internet Explorer, and then click Uninstall on the Adult Links menu in the Favorites folder.

Method 2
Manually Delete the Qcbar Program Files.
This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs.
To do this, follow these steps:
• Click Start, and then click Run.
• Type regedit in the Open box, and then click OK.
• Delete each of the following registry entries. To do this, right-click each registry entry below, click Delete, and then click Yes.
HKEY_CLASSES_ROOTAllch.IEObj
HKEY_CLASSES_ROOTAllch.IEObj.1
HKEY_CLASSES_ROOTCLSID{765E6B09-6832-4738-BDBE-25F226BA2AB0}
HKEY_CLASSES_ROOTCLSID{D6FC35D1-04AB-4D40-94CF-2E5AE4D0F8D2}
HKEY_CLASSES_ROOTInterface{ED7D1356-F7C2-4A27-A87C-C0DFEB3A628F}
HKEY_CLASSES_ROOTInterface{242CA913-1637-4F74-9729-EA349AF3ECAC}
HKEY_CLASSES_ROOTQcBar
HKEY_CLASSES_ROOTQcBar.1
HKEY_CLASSES_ROOTTypeLib{C02EE3A0-1881-419F-A5ED-737223463292}
HKEY_CLASSES_ROOTTypeLib{60381D4B-8129-449A-A5F2-5417AD0571CC}
HKEY_CURRENT_USERSoftwareQcBar
HKEY_LOCAL_MACHINESOFTWAREMicrosoftCode Store DatabaseDistribution Units{765E6B09-6832-4738-BDBE-25F226BA2AB0}
HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerToolbar{765E6B09-6832-4738-BDBE-25F226BA2AB0}
• Shut down, and then restart your computer.
• Manually delete the Qcbar program files. To do this, follow these steps:
Click Start, and then click Run.
Type cmd in the Open box.
Switch to the C:Documents and SettingsUserNameStart MenuProgramsAccessories folder, and then type the following commands:
del "%WinDir%Downloaded Program Filesallch.dll"
del "%WinDir%Downloaded Program FilesQcBar.dll"
• In the Internet Explorer Favorites folder, delete the Adult Links folder, delete the AdultSearch folder, and then delete the Sports folder.
• Delete the Adult Links Daily shortcut from the Desktop menu and from the Start menu.
Hope it helps.
If all fails, remove hard disk, approach any computer nerd friend, tell him to boot this hard with his PC, secure your files from C and reinstall windows.
If you have any other computer related problem, you can use TechMynd contact page to ask the solution to your PC related problems.

Wednesday, May 12, 2010

Basic information on Active Directory, DNS, DHCP, RAID

DNS:A Domain Naming server is a hierarchical namespace structure designed to provide host to IP address name resolution and registration.

DNS ZONE TYPE:
Forward lookup zone: resolves names to IP address.
Reverse lookup zone:
resolves IP addresses to Host names.
AD INTEGRATED ZONE
AD–integrated DNS enables AD storage and replication of DNS zone databases. Windows 2000 & 2003 DNS servers which accommodates storing zone data in AD. When you configure a computer as a DNS server, zones are usually stored as text files on name servers — that is, all of the zones required by DNS are stored in a text file on the server computer. These text files must be synchronized among DNS name servers by using a system that requires a separate replication topology and schedule called a zone transfer However, if you use AD integrated DNS you configure a domain controller as a DNS name server, zone data is stored as an AD object and is replicated as part of domain replication.
STUB ZONE
A Stub zone is a read only copy of a zone that contains only those resources records necessary to identify the authoritative DNS servers for the actual zone. A stub zone is used to keep a parent zone aware of authoritative DNS servers for a delegated zone and thereby maintain DNS name resolution efficiently. A stub zone is conposed of (A), (NS), (SOA)
Types of DNS Records: -
A(Host):
Represents a computer or device on the network. 'A'records are the most common and most used DNS records.
PTR(Pointer):
Used for finding the DNS name that corresponds to an IP address. The PTR is found only in the reverse lookup zone.
NS(NameServer):
The NS RRs facilitate delegation by identifying DNS servers for each zone. They appear in all forward and reverse look-up zones.
SOA(Start Of Authority):
The first record in any zone file is a SOA. the SOA identifies a primary DNS name server for the zone as the best source of information for the data within that zone and as an entity processing the updates for the zone.
SRV(Service Record):
Indicates a network service offered by a host.- CNAME(Alias):an alias is hostname that refers to another hostname.
=========================================
DHCP: Is a standard for simplifing management of host IP configuration.
SUPERSCOPE: Superscope is a administrative feature of DHCP server that you can create and manage through the DHCP console. Using a Superscope you can group multiple scopes as a single administrative entity.
DHCP Authorize: This procedure is usually only needed if you are running a DHCP server on a member server. In most cases, if you are installing a DHCP server on a computer also running as a domain controller, the server is automatically authorized the first time you add the server to the DHCP console.
SCOPE: DHCP scope is a poole of IP addresses which are offered to DHCP clients.
=========================================
WHAT ARE FSMO ROLES IN ACTIVE DIRECTORY?
Windows 2000 and Windows 2003 Active directory follow the multimaster model. Under this model there are five roles which which can be held by the DCs (Domian Controllers).

The five roles are given below:
• Schema Master: The schema master domain controller controls all updates and modifications to the schema. To update the schema of a forest, you must have access to the schema master. There can be only one schema master in the whole forest.
• Domain naming master: The domain naming master domain controller controls the addition or removal of domains in the forest. There can be only one domain naming master in the whole forest.
• Infrastructure Master: The infrastructure is responsible for updating references from objects in its domain to objects in other domains. At any one time, there can be only one domain controller acting as the infrastructure master in each domain.
• Relative ID (RID) Master: The RID master is responsible for processing RID pool requests from all domain controllers in a particular domain. At any one time, there can be only one domain controller acting as the RID master in the domain.
• PDC Emulator: The PDC emulator is a domain controller that advertises itself as the primary domain controller (PDC) to workstations, member servers, and domain controllers that are running earlier versions of Windows. For example, if the domain contains computers that are not running Microsoft Windows XP Professional or Microsoft Windows 2000 client software, or if it contains Microsoft Windows NT backup domain controllers, the PDC emulator master acts as a Windows NT PDC. It is also the Domain Master Browser, and it handles password discrepancies. At any one time, there can be only one domain controller acting as the PDC emulator master in each domain in the forest.

What is replication in active directory?
REPLICATION Replication is a process of sending update information for data that has changed in the directory to other domain controllers, as a Part of the AD planning an implementation process.*2000/2003 uses MULTI-MASTER replication for the AD.
Types of UPDATES which force replication: Add, Modify, ModifyDN, delete
USN: Update sequence numbers
GUID: Globally unique identifier

REPLICATION PARTITIONS: Schema Partition: contains object and attribute definitions. In other words it contains a list of definitions that define what objects and attributes for those objects can exist in the AD.Configuration partition: contains information about the physical structure of the AD, such as the sites and domains and where DC resides in the enterprise. It is replicated to all DC's in the tree or forest.Domain partition: contains information about all AD objects that are specific to that domain, such as users, groups and other resources. All domain partition information is completely replicated to all domain controllers within the domain.

REPLICATION TOPOLOGY
KCC: Knowledge Consistency Checker: It builds the topology for the intrasite replication between the DCs. It uses only RPC to communicate with the directory service.
Bridgehead server: A point where a replication information leaves or enters a site for intersite replication.

BENIFITS
• Optimize replication for speed and bandwidth consumption between domain controllers.• Locate the closest domain controller for client logon, services, and directory searches.
• Direct a Distributed File System (DFS) client to the server that is hosting the requested data within the site.
• Replicate the system volume (SYSVOL), a collection of folders in the file system that exists on each domain controller in a domain and is required for implementation of Group Policy
=============================================================
What is RAID?
ANS: Redundant Array of Inexpensive disk is a way to increase capaxity, performance and reliablility.
RAID0: (Striping) Not really RAID as it has no fault tolerance, Data is striped across all disks, Excelent read/write performance.
RAID1: (Mirroring) Need at least 2 drives, tolerates single drive failure, often used for OS drive or boot volume.
RAID5: Requires at least 3 drives, data and parity striped across all disks, can tolerate failure of any one disk without losing data but performance does degrade.

TCP/IP MODEL:
Application Layer
Transport Layer
Internet
Network Interface

OSI MODEL
Application Layer
Presentation layer
Session layer
Transport Layer
Network Layer
Data-link Layer
Physical layer


What is a switch?
A network switch, or bridge, is a specialized device that connects multiple network segments. It's a more modern and efficient form of the ubiquitous (and outdated) network hub. A hub, also known as a repeater, is a simple device that has been used for years to connect all nodes, or computers, on a network to a central location. Each node on a network has a unique hardware address called a MAC address. A hub is known as a repeater because when a packet of data, or frame, is sent through the hub, it is repeated to each and every computer on the network.This means that if a 1 GB video is sent to one computer through the hub, the file will also be sent to all of the other computers on the hub. This is very inefficient for bandwidth management. "Hubs have two major drawbacks," says Ben deGonzague, a deployment engineer with TopCoder Software, a Glastonbury, Conn.-based software engineering firm. "First, network bandwidth is consumed as each and every frame is sent to all devices on a network. Second, your network is only as fast as the slowest device. Hubs have become obsolete with switching-based networks."A switch-based network is one that utilizes switches instead of hubs. A switch is a major upgrade to a hub. Instead of sending all network data to each and every network node, the switch will analyze the MAC address and determine where to send the data. Network bandwidth is not wasted by sending every frame to every port.So when a switch receives data for a file, if it was addressed to one computer it will only be sent there. The other computers on the network wouldn't know about it. This means that the network is now much more efficient, but it's also a step toward being more secure: "Since switches can segregate traffic from different nodes," says deGonzague, "this makes it more difficult for anyone to capture packets on your network.


What is a router?
While switches connect multiple computers, a router is required to connect multiple networks, like your LAN to the Internet. Routers work by storing large tables of networks and addresses, then using algorithms to determine the shortest routes to individual addresses within those networks. In this way efficient routers not only facilitate intra-network communications, but also play a role in overall network performance. delivering the information faster.While many consumers are familiar with small routers from companies like Linksys, which can be purchased for less than $50 at computer hardware stores, they shouldn't be confused with a proper router for business. "A typical router at home will connect your cable modem or DSL network to your internal network. This is just connecting two different networks. Routers for businesses on the other hand might have to connect several different networks," says deGonzague. Small business routers from vendors like Cisco often include management software, enabling IT staff to better manage network stability and, ultimately, performance.

Interview Qustion and Answer

1) What is Active Directory?
A central component of the Windows platform, Active Directory directory service provides the means to manage the identities and relationships that make up network environments. For example we can create, manage and administor users, computers and printers in the network from active directory.


2) What is DNS? Why it is used? What is "forward lookup" and "reverse lookup" in DNS? What are A records and mx records?
DNS is domain naming service and is used for resolving names to IP address and IP addresses to names. The computer understands only numbers while we can easily remember names. So to make it easier for us what we do is we assign names to computers and websites. When we use these names (Like yahoo.com) the computer uses DNS to convert to IP address (number) and it executes our request.
Forward lookup: Converting names to IP address is called forward lookup.
Reverse lookup: Resolving IP address to names is called reverse lookup.
'A' record: Its called host record and it has the mapping of a name to IP address. This is the record in DNS with the help of which DNS can find out the IP address of a name.
'MX' Record: its called mail exchanger record. Its the record needed to locate the mail servers in the network. This record is also found in DNS.


3) What id DHCP? Why it is used? What are scopes and super scopes?
DHCP: Dynamic host configuration protocol. Its used to allocate IP addresses to large number of PCs in a network environment. This makes the IP management very easy.
Scope: Scope contains IP address like subnet mask, gateway IP, DNS server IP and exclusion range which a client can use to communicate with the other PCs in the network.
Superscope: When we combine two or more scopes together its called super scope.


4) What are the types of LAN cables used? What is a cross cable?
Types of LAN cables that are in use are "Cat 5" and "Cat 6". "Cat 5" can support 100 Mbps of speed and "CAT 6" can support 1Gbps of speed.
Cross cable: Its used to connect same type of devices without using a switch/hub so that they can communicate.


5) What is the difference between a normal LAN cable and cross cable? What could be the maximum length of the LAN cable?
The way the paired wires are connected to the connector (RJ45) is different in cross cable and normal LAN cable.
The theoritical length is 100 meters but after 80 meters you may see drop in speed due to loss of signal.


6) What would you use to connect two computers without using switches? Cross cable. 7) What is IPCONFIG command? Why it is used?
IPCONFIG command is used to display the IP information assigned to a computer. Fromthe output we can find out the IP address, DNS IP address, gateway IP address assigned to that computer.


8) What is APIPA IP address? Or what IP address is assigned to the computer when the DHCP server is not available?
When DHCP server is not available the Windows client computer assignes an automatic IP address to itself so that it can communicate with the network cmputers. This ip address is called APIPA. ITs in the range of 169.254.X.X.
APIPA stands for Automatic private IP addressing. Its in the range of 169.254.X.X.


9) What is a DOMAIN? What is the difference between a domain and a workgroup? Domain is created when we install Active Directory. It's a security boundary which is used to manage computers inside the boundary. Domain can be used to centrally administor computers and we can govern them using common policies called group policies.
We can't do the same with workgroup.


10) Do you know how to configure outlook 2000 and outlook 2003 for a user?
Please visit the link below to find out how to configure outlook 2000 and outlook 2003.http://www.it.cmich.edu/quickguides/qg_outlook2003_server.asp


11) What is a PST file and what is the difference between a PST file and OST file? What file is used by outlook express?
PST file is used to store the mails locally when using outlook 2000 or 2003. OST file is used when we use outlook in cached exchanged mode. Outlook express useds odb file.


12) What is BSOD? What do you do when you get blue screen in a computer? How do you troubleshoot it?
BSOD stands for blue screen of Death. when there is a hardware or OS fault due to which the windows OS can run it give a blue screen with a code. Best way to resolve it is to boot the computer is "LAst known good configuration". If this doesn't work than boot the computer in safe mode. If it boots up than the problemis with one of the devices or drivers.


13) What is RIS? What is Imaging/ghosting?
RIS stands for remote installation services. You save the installed image on a windows server and then we use RIS to install the configured on in the new hardware. We can use it to deploy both server and client OS. Imaging or ghosting also does the same job of capturing an installed image and then install it on a new hardware when there is a need. We go for RIS or iamging/ghosting because installing OS everytime using a CD can be a very time consuming task. So to save that time we can go for RIS/Ghosting/imaging.


14) What is VPN and how to configure it?
VPN stands for Virtual private network. VPN is used to connect to the corporate network to access the resources like mail and files in the LAN. VPN can be configured using the stepsmentioned in the KB: http://support.microsoft.com/kb/305550

15) Your computer slowly drops out of network. A reboot of the computer fixes the problem. What to do to resolve this issue?
Update the network card driver.


16) Your system is infected with Virus? How to recover the data?
Install another system. Insall the OS with the lates pathces, Antivirus with latest updates. Connect the infected HDD as secondary drive in the system. Once done scan and clean the secondary HDD. Once done copy the files to the new system.


17) How to join a system to the domain? What type of user can add a system to the domain?
Please visit the article below and read "Adding the Workstation to the Domain"
http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/directory/activedirectory/stepbystep/domxppro.mspx

18) What is the difference between a switch and a hub?
Switch sends the traffic to the port to which its meant for. Hub sends the traffic to all the ports.


19) What is a router? Why we use it?
Router is a switch which uses routing protocols to process and send the traffic. It also receives the traffic and sends it across but it uses the routing protocols to do so.


20) What are manageable and non manageable switches?
Switches which can be administered are calledmanageable switches. For example we can create VLAN for on such switch. On no manageable swiches we can't do so.