Friday, June 26, 2009

network monitoring software WhatsUpGold

network monitoring software/WhatsUp Gold - Network Monitoring UtilityWhatsUp Gold network management software monitors over 100,000 networks worldwide. At Ipswitch we’ve been dedicated to IT managers for over 15 years and listen to our customer’s network needs. ...

Monday, June 22, 2009

Official Ways to Disable or Manually Uninstall the Microsoft Windows Genuine Advantage Notifications from Microsoft

Normal 0 false false false MicrosoftInternetExplorer4 st1\:*{behavior:url(#ieooui) } /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in;...

Disable and Remove Windows Genuine Advantage Notifications Nag Screen

This page has been updated, visit the new article on how to bypass and disable the WGA or way to make your Windows genuine permanently.Microsoft has released WGA Notifications application which effectively turned Microsoft Windows operating system into a ‘nagware’, with a “This copy of Windows is not genuine” warning. What the Windows Genuine Advantage Notifications application...

Thursday, June 18, 2009

XP expires

To reduce instances of "casual copying" (a nice name for software piracy), Microsoft has implemented a two-stage antipiracy scheme in its upcoming OS. The first stage is the installation and registration counter: this lets you ...

Automated System Recovery

This tip will attempt to show you how to set up and use Automated System Recovery in Windows XP.ASR is a two–part system of recovery:1.ASR backup2.ASR restore.You should make Automated System Recovery (ASR) sets regularly as part of your plan for system recovery in case of it failing.IMPORTANT: ASR should be a last resort for system recovery, it should be used only after every...

McAfee Command Line Tool for removing Virus

Follow the steps to clean Virus:1) Click Here to Download a File (Download) (OR) Go to the following linkhttp://www.mcafee.com/apps/downloads/security_updates/superdat.asp?region=us&segment=enterprise I. Select SDAT tab II. Click on sdat5598.exe and save the fileNOTE: Verify that the file should be more than 100MB2) Create a folder SDAT at c:\3) Copy the file...

Using sfc /scannow for your windows repair

Self File Protection System In Windows Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in;...

If your Task Manager is Disabled

Main 1) Click "Start" Button 2) Select "Run" 3) Type "regedit" 4)Navigate HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System 5) After Point System Check in the right pane for Disabletaskmgr, if you find it double click and change the D-word Valu to zero(0) 6)...

Search Option Not Working

Do the Following to restore your search option1) Click Start and then Run2) Run the following files I. regsvr32 wshom.ocx II. regsvr32 jscript.dll III. regsvr32 urlmon.dll3) Then you will see that your search engine works norma...

Help Desk and Asset Management software for IT People

ServiceDesk Plus is a web-based helpdesk software that helps you manage all your communications from a single point. It offers an integrated Request management (Trouble Ticketing), Asset management, Purchase order management, Contract Management, Self-Service Portal, and Knowledge...

Fast Duplicate File Finder Detects Extra Copies on Hard Disk Space

H is a Free Software utility that you can consider. Named as Fast Duplicate File Finder, it will able to help you identify duplicated copies in your hard disk drives and allow you to delete them, freeing up the hard Disk Space more optimized PC performance.Once install and launch...

Wednesday, June 17, 2009

How To Monitor for Unauthorized User Access in Windows 2000

Summary:This article describes how to monitor your system for unauthorized user access. There are two main steps: Enabling security auditing and viewing the security logs. Note that different systems have different security needs, and the security topic is complex. Any user who sets up security audits on your system must be assigned to administrative groups or be...

How to determine whether users changed their passwords before an account lockout

Summary :This step-by-step article describes how to determine whether users changed their passwords before an account lockout. You may want to configure an audit account management policy to determine whether users changed their passwords before an account lockout occurred. This policy may be useful when users forget their new passwords, or when users continue to use their old...

How to track users logon/logoff

The Auditing loadTOCNode(2, 'summary'); Option 1:1. Enable Auditing on the domain level by using Group Policy: Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy There are two types of auditing that address logging on, they are Audit Logon Events and Audit Account Logon Events. Audit "logon events" records...

Tuesday, June 16, 2009

Wednesday, June 3, 2009

Multi Ping batch file script

If you want ping for multi ip address and know the status in log fileThis script will help you a lotcopy this all script in a notepadsave as ping.bat file on desktopAnd create a computers.txt text document in c:\ ( C drive)Here give required IP address in computers.txt fileLikeNow...