Wednesday, June 18, 2008

Remote Desktop Connection Limit Exceeded

Remote Desktop Limit Exceeded:

When you try to connect to a Windows Server 2003 box using Remote Desktop Connection (mstsc), you get an error message that you can not connect; because the number of connection exceeded the limits.

The number of available connection sessions through Remote Desktop Connection are limited to two (active or disconnected), and inorder to connect an empty session must be available to you. One of the mistakes is to exist the Remote Desktop Connection tool by clicking the X at the top right corner; this will disconnect the session, however it will not terminate it. So be sure to exit the RDC by using the log off command.


You cannot use the /console switch to connect to the console session of a computer that is running Microsoft Windows 2000 Server.

Monday, June 16, 2008

Record video from your screen


- Fraps:

Fraps is a universal Windows application that can be used with games using DirectX or OpenGL graphic technology. In its current form Fraps performs many tasks and can best be described as:

Benchmarking Software - Show how many Frames Per Second (FPS) you are getting in a corner of your screen. Perform custom benchmarks and measure the frame rate between any two points. Save the statistics out to disk and use them for your own reviews and applications.

Screen Capture Software - Take a screenshot with the press of a key! There's no need to paste into a paint program every time you want a new shot. Your screen captures are automatically named and timestamped.

Realtime Video Capture Software - Have you ever wanted to record video while playing your favourite game? Come join the Machinima revolution! Throw away the VCR, forget about using a DV cam, game recording has never been this easy! Fraps can capture audio and video up to 2560x1600 with custom frame rates from 10 to 100 frames per second!

Download here: Download Fraps

- CamStudio:

CamStudio is able to record all screen and audio activity on your computer and create industry-standard AVI video files and using its built-in SWF Producer can turn those AVIs into lean, mean, bandwidth-friendly Streaming Flash videos (SWFs)

Download here: Download CamStudio

Microsoft Outlook: Safe Mode

To open Outlook in Safe Mode

1. Open the Start menu and click on Run.

2. Type the command line Outlook /safe in the Open: field (Notice that there is a space between Outlook and the forward slash). Click OK.

Tuesday, June 10, 2008

Exchange Public Folders

Propagating permissions from a parent Exchange public folder to all subfolders

  1. To force subfolders to inherit a parent public folder's permissions, right click on the parent public folder and select the All Tasks -> Manage Settings to launch the Manage Public Folder Settings Wizard. (Prior to Exchange 2003 Service Pack 2, there was a Propagate Settings command accessible from the All Tasks menu, but Microsoft replaced it with the Manage Settings command to avoid confusion.)

  2. Click Next to bypass the wizard's Welcome screen.

  3. Select the Overwrite Settings option and click Next.

  4. You will now see a screen that asks you which settings you want to overwrite. Choose the Folder Rights option and click Next, followed by Finish.

The permissions on the Exchange Server public folder subfolders will now be replaced.

Monday, June 9, 2008

Antivirus protection

Antivirus software are computer programs that attempt to identify, neutralize or eliminate malicious software. Antivirus is so named because the earliest examples were designed exclusively to combat computer viruses; however most modern antivirus software is now designed to combat a wide range of threats, including worms, phishing attacks, rootkits, trojan horses and other malware. Antivirus software typically uses two different approaches to accomplish this:

  • examining (scanning) files to look for known viruses matching definitions in a virus dictionary, and
  • identifying suspicious behavior from any computer program which might indicate infection.

The second approach is called heuristic analysis. Such analysis may include data captures, port monitoring and other methods.

Most commercial antivirus software uses both of these approaches, with an emphasis on the virus dictionary approach. Some people claim that a Firewall program performs the functions of a Anti-Virus, however they are mistaken.

Don't hesitate to post a comment

Sunday, June 8, 2008

Firewall protection

Function:

A firewall is a dedicated appliance, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

A firewall's basic task is to regulate some of the flow of traffic between computers networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internat network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).

A firewall's function within a network is similar to firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.

Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.

Don't hesitate to post a comment

Spyware protection for free

Spyware is computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the user's informed consent.

While the term spyware suggests software that secretly monitors the user's behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habit, sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.

In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers.

Remove spyware:

Install Windows Defender from the Microsoft Website. (Free product).

Windows Defender is a free program that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software. It features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected and minimizes interruptions and helps you stay productive.

Don't hesitate to post a comment

Saturday, June 7, 2008

Fix Blue Screen of Death


What is a Blue Screen of Death?

The Blue Screen of Death, or more properly the 'Windows stop message' occurs when Windows detects a problem or error from which it cannot recover. The operating system halts and diagnostic information is displayed on a blue screen. In newer versions of the operating system, the contents of the PC's memory are dumped to a file for later analysis.


Bug checks provide diagnostic information such as STOP codes and driver names that can help lead to problem resolution. Because of the volatile state of the system, this information cannot always be recorded when the event occurs. It is important that you record the information associated with the bug check and driver information sections. Many of the bug check messages have relevant information that you should read and understand if they apply to your situation. Finally, if you have enabled memory dumps, wait until the dump is complete before restarting the computer (if you do not have automatic restart enabled). Your device vendor and/or Microsoft use the memory dumps to help understand the state of the system at the time that the bug check occurred. You can change the memory dump settings through the Startup and Recovery button in the System Properties’ Advanced tab, while the STOP messages might not always indicate the root cause of the problem, in combination with other sources of data; it can help direct a trained support technician to track down the root cause of the problem.

Check the Microsoft Knowledge Base

The Microsoft Knowledge Base contains many articles that explain specific STOP error messages, and resolutions or ways to work around problems. Search the Microsoft Knowledge Base for at least the first hexadecimal number contained in the error message. Using the example above, search for 0x0000001e. It also may be helpful to search for the identified file name and other hexadecimal numbers.

Don't hesitate to post a comment

Friday, June 6, 2008

How to make money from your blog: 5 Tips

Many of the people who write blogs today simply want to share their opinion on something. But then there are the business-minded folks, who have found a way to use blogs, or Web logs, to bring in a little extra cash too.

1.
Sell advertising. This is likely the most common means of leveraging a blog to generate income. If yours happens to become a well-known blog, or one that is well-received in a particular niche, it's always possible to sell ad space on your own. For lesser-known blogs, services such as Google's AdSense or BlogAds enable bloggers to establish ad programs.AdSense's — which lets you select several ads that are consistent with the content of your blog — pays you based on how many readers click on the ads for further information. Even better, it's free. BlogAds, on the other hand, hooks bloggers up with would-be advertisers and levies a commission in return for any ad placements that result. "The nice thing, too, is that the ads are relatively unobtrusive," says Scott Allen, co-author of "The Virtual Handshake: Opening Doors and Closing Deals Online."

2. Help sell others' products. Here is another click-through opportunity. Affiliate programs enable your blog to serve as a conduit between readers and online sites offering various goods and services. One popular choice is Amazon.com. If, for instance, you offer book reviews or even just mention a book in passing in your blog, an affiliate program provides a means for your readers to click directly from your blog to Amazon to obtain further information about the book. If they break out the checkbook or charge card, you get paid as well.

3. Solicit contributions. Not every blog-related income opportunity involves hawking goods or services. As Blanche DuBois did in "A Streetcar Named Desire," consider relying on the kindness of strangers. Ask for contributions. If, for instance, your small-business blog supports a cause or issue in some fashion — say you repeatedly mention tax reform, health care or some other topic — you can always ask for reader support.Even if you've attracted a group of regular followers who simply enjoy reading what you have to say, they may be willing to underwrite their loyalty with a little financial help. Programs such as PayPal make it easy to establish a simple on-site contribution collection button. "There are lots of worthy 'cause' blogs that would qualify for donations from grateful members of the blog community," says Las Vegas communications consultant Ned Barnett.

4. Market your services in your blog. Many people associate blogs exclusively with a cyberspace-based soapbox — a place to shout your opinions and little more than that. Granted, blogs are an ideal venue to share your thoughts with others, but don't overlook their capacity to generate new business as well. When appropriate, work in references to what you do and, in turn, what you may be able to offer any would-be client or customer who may be reading your blog. That can spread your opinion and your business moxie at the same time."Instead of short commentaries that begin a dialogue with readers, as many blogs do, I write the equivalent of journal articles that demonstrate my abilities, strategies and perspectives on specific issues," Barnett says. "When it resonates, it means money. Since starting this approach, I have generated three new paying clients and brought in about $10,000 on revenue — directly attributable to specific blogs."

5. Use a blog to deepen your existing customer relationships. Nor does any marketing material inserted in blog content have to be limited to bringing in completely new business. By using a blog to regularly communicate with existing clients as well as other readers, you can take advantage of the opportunity to fully inform them about everything your business does. That may expand your readers' understanding of the full scope of your products or services."My blog has helped existing clients determine the range of my skills and services," says Ted Demopoulos of Demopoulos Associates, a Durham, N.H. consulting and training concern. "One client who had only used me for training in the past was surprised at my range of expertise and is now using me for a consulting project. Another who only used me on technical projects is now considering me for a more business-oriented project."

Don't hesitate to post a comment

Google Adsense

Google AdSense is a fast and easy way for website publishers of all sizes to display relevant, unobtrusive Google ads on their website's content pages and earn money. Because the ads are related to what your users are looking for on your site, you'll finally have a way to both monetize and enhance your content pages. Learn more about Adsense for content.

It's also a way for web site publishers to provide Google search to their site users, and to earn money by displaying Google ads on the search results pages. Find out more about Adsense for search.

The program is free, and combines pay-per-click and pay-per-impression advertising - meaning you get paid for valid clicks on the ads on your site or search results pages as well as impressions on your content pages. So go ahead and try this program. One application gets you approved for both AdSense and AdSense for search - you can decide to use any combination of these products.

We'll review your application and follow up with an email within 2-3 days. If you are accepted into the program, you can log in to your new account and get the HTML code to insert into your webpages.

Keep in mind that participation in AdSense requires you to have a website.

Don't hesitate to post a comment

How to reinstall or repair Internet Explorer 7 in Windows XP

Method to follow to repair Internet Explorer

If you have Internet Explorer 7, you can repair damaged files or missing registration information in Internet Explorer 7. To do this, follow these steps:
1.Start Internet Explorer 7.
2.On the Tools menu, click Internet Options.
3.On the Advanced tab, click Reset.
4.In the Reset Internet Explorer Settings dialog box, click Reset to confirm.

Don't hesitate to post a comment

Repair Pst (Outlook) file

Repairing a Personal Folders file (.pst)

You may need to use the Inbox Repair Tool if you open your Outlook .pst file and receive this message:

Unable to expand the folder. The set of folders could not be opened. Errors could have been detected in the file drive:\Documents and Settings\user\Local Settings\Application Data\Microsoft\Outlook\Outlook.pst. Quit all mail-enabled applications, and then use the Inbox Repair Tool.

For seriously corrupted PST files, try running Scandisk.exe (look under Programs | Accessories | System Tools) first, then Scanpst.exe, repeating 3-4 times until neither program returns an error. We've know this technique to restore data that the user though was lost forever.

Microsoft Outlook limits the size of Personal Folders .pst files and offline folders .ost files to 2GB. If a new or changed item increases the size over than limit, you will not be able to use the .pst or .ost file. Even if you delete items from the server mailbox, the .ost file will not synchronize. If you run the Inbox Repair Tool (Scanpst.exe), the file does not resolve the problem. To resolve this problem, download the crop tool from the Microsoft Website or Download & Install a Recovery PST Software.

Don't hesitate to post a comment