Saturday, January 30, 2010

Tips aimed at Determining the most appropriate Registry Cleaner For Your Windows Registry


Microsoft windows XP by save my system


Spotmau PowerSuite 2010 is a must-have toolkit providing all essential utilities for every PC owner. This is an everyday toolset for PC maintenance and optimization. This is also an emergency kit for rescuing and recovering your precious data and system. With this complete package, you can almost solve all your PC problems. With this tool, even a user of can become a hard disk specialist in half an hour ! Every computer owner deserves a handy toolset for Daily PC Maintenance and Emergency Rescue. Spotmau PowerSuite 2010 provides such an all-in-one solution to solve all your computer problems in an easy way! It performs a 360? PC health check, speeds up and cleans up your computer; repairs system and registry problems. It keeps your computer at peak performance everyday. It repair your crash Windows or hard disk, rescue your deleted, shredded, or even formatted data. It protects all your sensitive data and builds your "Personal Safe".

It also includes wonderful hard disk utilities, such as partition, clone (partition to partition, disk to disk, partition to image,…) and more. Instead of shopping around everyday and buying expensive single task software, Spotmau PowerSuite 2010 saves your hundreds of dollars and your precious time.


What’s NEW in Spotmau PowerSuite 2010:

. Improved! Rich feature in Spotmau PowerSuite 2010: PC Health Check, Windows Recovery, TuneUp Kit, Windows Backup & Restore, Windows Backup & Restore, Password & Key Finder, Windows Admin/User Password Recovery, Security & Privacy, Personal Safe, Data Transfer, Disk Backup/Restore, Partition Genius, Spotmau Secretary and MORE!

. NEW! PC Health Check provides 360? PC healthy status check. 1-click to check all the most important items of your PC & Windows such as registry, hard disk, anti-virus, Windows and so on. It provides an explicit Health Index evaluation and scan results of your PC healthy status. Just 1-click to fix all the weak items affecting your PC health.

. Improved! Windows Recovery provides a complete solution to recover your corrupt Windows such as partition table recovery, master boot record, registry, lost/missing files recovery and so on.

. NEW! TuneUp Kit (Registry Cleaner, Startup Management, Service Management, Internet Speedup; Disk Cleanup/Free, System Cleaner, IE/Firefox Privacy Cleaner, Smart Uninstall, Shortcut Cleaner; IE Repair, Right-click & IE Content menu management, IE plug-ins cleaner, Favorite to Go) Cleans your Windows registry; Enables you to choose which programs and services to run automatically at Windows startup; Optimizes your network speed; Cleans your hard disk, Windows and IE/Firefox privacy data; Removes your unwanted applications; Restores default settings of your Internet Explorer and Firefox; Manages your desktop icons and right click menu; Backs up your IE favorites and takes it anywhere you want.

. Improved! Windows Backup & Restore backups your Windows, partition table, master boot record and registry periodically. Recover your damaged Windows when the system crashes, or recover registry when the registry crashes, or recover partition when the partition crashes or recover master boot recode when the disk crashes.

. Improved! Password & Key Finder finds your lost passwords for Email, MSN, IE and asterisks; finds your Windows, Office and IE product or CD keys.

. Improved! Windows Admin/User Password Recovery can easily reset Windows 7/Vista/2003/XP/2000/NT administrator/user password to blank.

. Improved! Security & Privacy clears up all your activity records in your computer to protect your privacy; enable you to encrypt folders to protect your private files from being viewed by others; shred unwanted sensitive data permanently from your hard disk from being recovered and viewed by others; lock up the programs you don’t want others to use.

. NEW! Personal Safe will split a private space from your selected disk. And you will see a new disk with the name "Personal Safe" in your "My Computer". Without password no one will even notice this space. This NEW technology will protect your personal files more conveniently and safely than ever before.

. Improved! Data Transfer can be used to backup your personal data before Windows reinstallation. It can transfer files to the removable media/devices, or to a second, undamaged internal hard disk when your Windows has crashed or the hard disk has been damaged.

. Improved! Data Recovery (Undelete, Unformat, Raw Rescue) recovers files from an accidentally formatted or reinstalled partition / disk; restore files that have been deleted accidentally, even if the file system data structures of your computer have suffered serious corruption or overwriting.

. Improved! Disk Backup/Restore provides all kinds of backup/restore options under Windows or when Windows crashes: Disk to Disk, Disk to Image, Disk from Image, Partition to Partition, Partition to Image, Partition from Image. You can easily backup disks/partitions or transfer all data from one disk to another, or even burn to CD/DVD, with several mouse clicks. This utility is for cloning Windows 98, ME, NT, 2000, XP, 2003 and Vista, Vista and 7. It supports IDE, SATA, SCSI, and USB interfaces.

. Improved! Partition Genius a powerful partition management tool. Create/delete/format your partitions; convert one partition type to another; resize/move/split/merge your partitions; hide/show a partition; work perfectly under Windows and Spotmau CD.

. NEW! Spotmau Secretary easily manages your daily duties and business schedules. You can use Spotmau PowerSuite 2010 to boot up any computer; perform a 360? PC health check, fix and install Windows; optimize and speed up your system; clean up history and protect your privacy; recover data and passwords; partition and format the hard drive; clone and backup your system; and more…


Size: 175 MB – Supported OS: 98/ME/2K/2003/XP/NT/Vista/7


Homepage:







Wise Registry Cleaner Pro 4.93 Build 236 | 7,86 Mb


Wise Registry Cleaner speeds up your PC by cleaning your Registry. Wise Registry Cleaner free is a powerful free registry cleaner and registry optimizer, it speeds up your PC by cleaning your Windows Registry. The PRO version help you improve your PC’s performance by optimize your Registry, and it’s so easy, you only need make a few clicks. Wise Registry Cleaner is one of the safest Registry cleaning tools available in the market today. Its scanning engine is thorough, safe and fast.


The Registry is at the heart of every Windows computer. The older your PC is, the more junked-up its Registry becomes. Badly written programs (and there are plenty of those around) don’t bother to clean the Registry when you uninstall them, and some programs add unnecessary junk to the Registry. The more junked-up your Registry, the more likely it is to crash or to slow down your PC.


This freebie does a neat job of cleaning out the Registry junk. It scans the Registry, flagging orphaned or bad Registry entries, and shows you the name and values for each. It identifies Registry entries that may be dangerous to delete, and those that are safe to delete, so you can distinguish between the two. It also lets you decide which entries to delete, and which to keep. For safety’s sake, it can also back up your Registry before a scan, so that you can restore it, if the program causes any problems.


Wise Registry Cleaner improves your PC’s performance by optimizing your system (This feature is included only in the Professional Edition).


Key Features:

• Wise Registry Cleaner is one of the safest Registry cleaning tools available in the market today. Its scanning engine is thorough, safe and fast.

• Wise Registry Cleaner scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing obsolete information in Windows registry, your system will operate faster and more efficiently.

• After Wise Registry Cleaner analyzes your system for problems, you can view each of the problems found individually and call up a detailed description of each. If you wish, you can also have all problems corrected automatically.

• All changes to your system are monitored by Wise Registry Cleaner and can be undone with a few mouse clicks, so you can use Wise Registry Cleaner without worrying that changes are not reversible.

• Improve your PC performance with a few clicks. (This feature is only included in the Professional Edition)

• Support schedule task, you can easy to define a schedule task for Wise Registry Cleaner.


Download Wise Registry Cleaner Pro 4.93 Build 236:

http://uploading.com/files/c46e1cm3/Wise%25252520Registry%25252520Cleaner%252525204.93%25252520Build%25252520236%25252520Full.rar/


Downloader…

Download Wise Registry Cleaner Pro 4.93 Build 236



 

perform not additionally forget to checked different reviews upon a manufactured article; as well as to serve get honest views about the manufactured article, mind be the great idea to examine some forums or blogs for real and genuine opinions.Source:http://ezinearticles.com/?Fix-Ntldr-is-Missing-Error-With-a-Registry-Cleaner&id=3020190

repair Vista & Windows 7 Black Screen of Death blunder (BSOD) with dark shade repair

Most of us possess approach opposite Windows BSOD (Blue shade of death) infamous underline of Windows XP & Vista. Windows 7 may exist quite fast and doesn’t crash together with BSOD though Microsoft has not utterly obtain rid of BSODs. Windows 7 can additionally be influenced by means of Black Screens of genocide which just freeze awake a computers forcing users to stare at zero more than the blank, dim desktop.

fix blue screen of death
To repair Black Screen of genocide of Windows 7 Prevx’s David Kennerley has grown a good app “Black Screen repair” to repair the vast majority of issues that cause dark Screens.
Black shade repair Pervex



a base means of a ultimate call of Black Screens of Death has been identified by way of a modification in the Windows handling Systems lock listed of registry keys. information technology appears which the updates expelled this month by Microsoft cause certain registry keys to be invalidated, the pierce that, in the spin generated Black Screen of genocide errors.
doubt we have been confronting Windows 7 Black Screen of genocide then download Black shade Fix as well as outing it on your system. fix rundll32 error A reboot is required afterwards we run this utility.Source:http://www.articlesbase.com/operating-systems-articles/stop-0x0000005c-error-fixstop-0x0000005c-error-repair-1247442.html


Friday, January 29, 2010

Runtime Error - What is a Runtime blunder as well as How to Fix information technology?


Clickina, de Runtime-Error by Carlos Azaustre Rodríguez

doubt a software refurbish doesn't , we might possess issues with the mental recall on your computer. Fixing that caring of problem might receipts contacting a maker of a mental recall and presumably smooth the builder of your Personal Computer.Source: http://www.articlesbase.com/operating-systems-articles/fix-stop-0x24-errorstop-0x24-error-repair-1457311.html

repair Outlook 0x80042109 blunder together with Registry Cleaner


Outlook 12/2007 (Beta 2) Search Nag by Evan Sims






In this Microsoft Outlook 2000 Beginner's Guide part 2 I will show you how to do more things in Outlook 2000. In my last guide I showed you how to do the basic things like create a new email, send an email, and attach a file to an email. In this guide I will show you how to do the following.

How to Check for New Email
How to Add Contacts to your Address Book
How to View your Address Book
How to Create New Folders
How to Move Email to Folders


Go ahead and open your Outlook 2000 program and let it load. The first thing that I will show you is how to check for new email.

How to Check for New Email in Outlook 2000

When you open your email it will check for new email but if you leave your email open all day, it only checks it every so often. But you can check for new email by clicking the Send/Receive button at the top of your window. If you do not see the Send/Receive button at the top of your window then click Tools > Send/Receive. That will check to see if you have any new messages.

How to Add Contacts to your Address Book in Outlook 2000

This feature comes in very handy. It is hard to remember all of your friends and family's email addresses. So add there email address to your address book and all you have to do is double click the address to send them a message. Go to the top of your window and click Tools > Address Book. The address book window will pop up. Click the New button at the top of that window and then click Contact. Another window will pop up and this is where you enter the information for the contact that you are adding. You do not have to enter all the information. The main two fields that you need to fill out is the email address and name. The other fields you can leave blank if you want too. Once you are done, click the OK button to add that contact to your address book. Now you can click the X to close the Address Book out.

How to View your Address Book in Outlook 2000

On the left side of your screen you should see a list of buttons. Click the button that says Contacts. When the next window pops up, click the letter on the right side of your screen for the contact that you are looking for. If you do not see the contact button on the left side of your screen, then click Tools > Address Book at the top of your window. Your address book will come up. Double click the name or address that you want to send an email too.

How to Create New Folders in Outlook 2000

Creating new folders will help you keep your email organized. Click File > Folder > New Folder at the top of your window. Enter the name of the new folder that you are creating and click the OK button. You can also select where you want that new folder placed.

How to Move Email to Folders in Outlook 2000

Moving your email messages is very easy. Right click on the email message that you want to move and select Move to Folder from the drop down menu. A window will pop up, select the folder that you want to move the message too and then click the OK button.

Source:http://www.articlesbase.com/operating-systems-articles/stop-c0000221-unknown-hard-error-fix-1629202.html

Thursday, January 28, 2010

Runtime Error 430 - Why Does information technology Occur and as jerry can exist Done approximately information technology?


Julian Outside the Knitting Factory by joe holmes









doubt a program refurbish doesn't , we might possess issues together with a memory upon your mechanism. regulating that kind of complaint may take contacting a maker of a memory as well as possibly even the builder of your Personal Computer.Source: http://www.articlesbase.com/operating-systems-articles/stop-c0000221-unknown-hard-error-fix-1629202.html

mechanism Takes Forever to Boot? we essential a Best System chief aimed at Enhancing Your Personal Computer


Windows XP on 24" iMac by Cody La Bière






If you have upgraded your PC's operating system to the new Windows Vista, you may have noticed that some of your old software won't run on the new system. While it may be frustrating to not be able to play your favorite game, it is much more problematic if you anti-virus software is rendered useless by an operating system upgrade.

Right now, there are more than 150,000 known computer viruses and thousands of spyware and adware programs that can infect your computer. Most of these can impact your computer's performance and speed or cause a hard drive crash, but some or even more sinister. If your computer becomes infected by a newer breed of virus,it can be used by someone in a remote location to control other computers and your bank account information, credit card numbers and secure passwords can be stolen. Windows Vista comes with its own set of security tools, but they are not a replacement for a good third party anti-virus application.

Symantec, the company that offers the popular Norton Anti-virus software, is compatible with Vista and offers a free 90 day trial for new users. They also offer a complete security package that offers all of the protection of the original antivirus software, in addition to identity theft protection and a two way firewall that prevents outside access to your computer.

Trend Micro is not as well known as Symantec, but they offer much they same software packages as their larger competitor and were recognized as the top security vendor at the 2006 CIO Insight. The Trend Micro Internet Security 2007 package comes with a 90 day free trial, but the stand alone anti-virus software only comes with a 30 day trial period.

Kapersky Anti-Virus 6.0 has recently been reconfigured to work with Windows Vista as well. It provides good anti-virus protection, but there isn't a trial period. Unless you have used their products in the past, Kapersky may not be a good option for people who like to evaluate their software before making a commitment. Kapersky was named a CNet Editors' Choice and a best buy from Computer Shopper magazine.

Windows has also gotten into the anti-virus market with the release of Windows Live OneCare. The benefit of OneCare is the seamless integration with Vista. The downside could be a perceived security weakness in all Microsoft products. The complete security package includes industry standard anti-virus software, ant-spyware, firewall and file backup protection. There is a free 90 day trial available




Errors as well as corrupt files cutting-edge your records office compromise a firmness of your complement. Failure to how to fix service error 1053 formula in system freezes and complement crashes, digest your PC worthless. Save yourself a revenue as well as the worry of getting a new mechanism by means of doing a registry cleanup today.

Monday, January 25, 2010

in what way to Easily a correct blunder Registry pane Problem upon Your Computer


My Desktop under Windows XP SP2 + Samurize +ObjectDock by kuma007lau


In Windows 2000, Microsoft introduced Encrypted File System (EFS) - a new feature built into the operating system that makes securing user files much better than just file system permissions that have been available on NTFS partitions in previous versions of Windows. 

The main reason for this enhancement is that NTFS security can be easily circumvented once an attacker gains physical access to the computer. A number of readily available third-party tools can be used to provide read and write access to data stored on NTFS partitions by circumventing protection provided by the operating system. Once the system is booted from a floppy containing the third-party NTFS driver, the disk and all of its data becomes easily accessible. 

Although you can password protect the BIOS and restrict which devices are bootable, this still does not prevent someone from removing the hard drive, attaching it to another computer, and accessing it via another Windows 2000/XP installation or installing another instance of Windows altogether. Fortunately, EFS can help provide privacy of your data in such scenarios. 

EFS uses the combination of symmetrical and public/private key encryption to secure content designated by the user in files residing on NTFS partitions. The symmetrical key (created dynamically at the time of encryption and different for each encrypted file) is used to perform the encryption process and is stored together with the encrypted file. The public key is used for encryption of the symmetrical key and is also stored along with the encrypted file. The private key, necessary for decryption, resides within the user profile. This way the information stored on the hard drive, although still accessible via third-party utilities, is in an unreadable format and therefore useless without the private key. 

There are, however, still some possible security issues with the EFS that users should be aware of: 

·    Encrypted files are accessible to anyone who possesses a private key, which is used to retrieve the symmetrical key encrypted with a public key (from the same key pair that the private key belongs to). This applies to the user who encrypted these files and to another Windows account, designated as Data Recovery Agent (DRA). By default, on Windows 2000, this is the Administrator account (local Administrator on stand-alone systems and domain Administrator in the domain). Since it is possible to use third-party tools to reset the password of the local Administrator or any other local account (providing physical access to the target computer is available), stand-alone systems are inherently insecure.

·    While in the Windows 2000 domain environment, resetting the local Administrator password will not impact the security of the computer's local files protected by EFS; however, the users' private keys might be compromised as long as they are available on the local computer. Since environments in which EFS is implemented typically rely on roaming profiles (this ensures that the same private key is used across all encrypted files for the same user), the user profile is copied to the local system during every login. To ensure that attackers will not be able to take advantage of copies of private keys stored in these profiles, you should use Group Policy to force the removal of roaming profiles at logoff. You should also designate a dedicated Disaster Recovery Agent account and ensure that its private key has been backed up and stored in a safe location.

Both problems described above have been eliminated on Windows XP Professional systems due to two changes to the EFS implementation: 

·    There is no longer default DRA. Also, unlike in Windows 2000, DRA is no longer necessary for the EFS to function. Administrators of Windows 2000 environments should keep this in mind. It was possible to prevent encryption the Windows 2000 domain environment on the domain level by initializing Empty Policy for Encrypted Data Recovery Agents. This was done by launching a Group Policy MMC snap-in, selecting group policy object linked to your domain, drilling down to Computer Configuration->Windows Settings->Security Settings->Public Key Policies->Encrypted Data Recovery Agents, right clicking on the last-level folder labeled Encrypted Data Recovery Agents, and selecting Initialize Empty Policy from the context-sensitive menu. This was sufficient to remove the capability to use EFS from users on any Windows 2000 system that is a member of the domain. 

With Windows XP, this is no longer possible. To disable EFS on the domain level in an environment where Windows XP computers are used, you must launch Microsoft Management Console from a Windows XP Professional computer that was a member of the domain, load Group Policy Editor, and set the focus to the domain Group Policy object. Once the snap-in is loaded, drill down to Computer Configuration->Windows Settings->Security Settings->Public Key Policies->Encrypting File System folder, right click on it, and select Properties from the context-sensitive menu. After the dialog box with a single checkbox "Allow users to encrypt files using Encrypting File System (EFS)" is displayed, make sure that you clear the checkbox (which is checked on by default). 

·    EFS introduces another additional level of encryption, which utilizes the user's password to secure the private key residing in user's profile. On the one hand, this prevents a situation in which an attacker resets the password on any local account in an attempt to gain access to EFS encrypted files (since once the password is reset, the private key stored in the profile can no longer be used). On the other, it creates a problem if users forget their passwords (hence the need to ensure password recovery by using Password Recovery disk).

As you can see, a number of considerations must be kept in mind when deploying EFS in a Windows 2000/XP Professional environment. Increased security has its price in terms of administrative overhead, but it is well worth the extra effort in the long run.

Pre-Installation Preparation

1. Secure hardware. Is the location of the test network sufficiently physically secure so that additional security isn’t necessary? Consider adding physical locks and/or establishing smart card or biometric authentication once the system is installed. 

2. Configure hardware and BIOS. Remove the floppy drive. (After installation, consider removing the CD ROM.) Reducing the attack surface of systems is always a sound principle. Remove unnecessary physical ports, if possible, or disable them in the BIOS. Ensure that the system isn’t accessible by other machines on the test network unless an installation server is in use. Disconnect the test network from the Internet and add sufficient internal drives so that appropriate installation of components to separate drives is possible. Consider a BIOS password for this computer. 

Installation

This list isn’t a step-by-step how-to for installing Windows Server 2003. Rather, it’s a list of points during installation when you must make security choices. 

1. Note the license agreement. Significant changes include statements on digital rights management technology (MS DRM) for securing digital content. They imply Microsoft’s right to access this system to update the technology. Any access to the DC from outside your organization should be, at a minimum, scrutinized. Forward the license agreement to your legal team.

2. Rename the system folder. Default names for system folders are known by attackers. While it’s easy to discover which folder is the system folder, many attack scripts are simplistic and hard-code the name of the “Windows” folder. Renaming the folder foils those scripts. 

3. Don’t check the box that includes support for East Asian language (unless, of course, you need this in your environment) on this server. I know of no vulnerabilities that this might introduce, but the less code running on the system, the fewer the opportunities for later exploitation. 

4. Uncheck “Yes, download updated setup files.” Instead, check “No, skip this step and continue installation.” If you don’t, your system will attempt to access Microsoft across the Internet to locate updated files. What is Microsoft thinking? Any system is vulnerable during installation and shouldn’t be exposed to the Internet. 

5. Partition drives and format with NTFS. Period. There’s no reason to use anything else. You can’t secure FAT drives or promote this system to a DC without an NTFS partition.

6. Select a computer name that doesn’t reveal the computer role of this system. Do not, for example, name it “DC1.”

7. Enter a strong password for the Administrator account and write it down. While it’s true that you should memorize passwords and not write them where others may find them, it’s equally true that, during an installation, it’s easy to forget that password. Write it down and keep it safe until you’ve memorized it, changed it, or replaced it with other technology. Note that Windows 2003 tries to help you here, supplying a warning if you attempt to use blank passwords, common words or passwords that don’t meet complexity requirements. 

8. Configure custom network settings. All DCs should have static addresses; set them now. Also, set gateway and DNS server addresses. If the first DC will also be a DNS server, point the server to itself. You’ll find error messages in the log until you add the DNS service, but you won’t forget this basic step when you promote the server to a DC. Disable NetBIOS over TCP/IP if no pre-Windows 2000 computer needs to communicate with this server.

9. Install the server in a workgroup and rename the workgroup. You’re just adding a little obscurity.

Server-to-DC Promotion

1. Use some time to examine the environment between installation and the selection of the DC role. There are several steps you can take to lock down the system. While you may want to do these after DC promotion, spend time examining them now, with this first system. Promoting a server to a DC changes some settings and you’ll want to know both the default server and basic DC environments. 

2. Note which services are disabled by default and which aren’t. Can you disable additional services without preventing promotion? Which are they? Windows 2003 is an interim OS. While it doesn’t completely fulfill the Trustworthy Computing mandate, it’s a step along the way. One security feature is that many services are disabled by default or, like IIS, not installed at all. A future column will detail what services are used for and what happens when they’re disabled, as well as offer advice on when to disable them. 

3. Open the System applet in Control Panel and, on the Update tab, uncheck “Keep my computer up to date” (Figure 1). You should be managing system updates on DCs, if not all systems, in some other manner. You don’t want to risk instability or compromise because you’re unaware of code changes on key systems. Updates need to be tested and don’t need to be downloaded individually to each machine. To do so is an incredible waste of resources and a potential source of instability. 

4. Also in the system applet, but on the Remote Access tab, make sure the Remote Assistance and Remote Access check boxes are blank. After setup is complete, configure and secure remote access for administration and use Group Policy to establish a remote access/assistance policy for the domain. For now, you want to ensure that no extraneous access to the system is possible. 

Note: You may recall that the ability for an ordinary user to provide remote assistance was first provided in Windows XP. All a user has to do is send out an invitation via e-mail or instant messenger, and another user can remotely connect. With the original user’s permission, this person can make changes to the user’s machine. The issue, of course, is that you want to manage any access to systems. The innocent request for help using remote assistance can open any computer on your network to penetration from less-than-friendly sources. It’s got no place on your first DC of the forest. 

5. There’s an improved interface to the Managing Your Server applet (Figure 2). The concept of assigning roles to computers and securing them with attention to their roles isn’t new. What is new are the extensive documentation, step-by-step details and security references available through this interface. In these days of reduced training and travel budgets, you’ve got a whole course of securing your Windows 2003 network right on the desktop. Take advantage of it. Just think of it: If every one of you reads and takes this information to heart, your network will be safer—and so will the entire Internet.

6. Start your studies by examining the DC role. Don’t forget to review the “Next Steps” (things you do after you bring up the DC), which outlines many helpful security plans and tasks. Use the “Manage Your Server” applet to apply the server role to the DC. When you select “Domain Controller” as this computer’s role, promotion will include an option to select a DNS server on your network or to install the service on this DC. I recommend the latter option, as you can then secure DNS information as part of your DC strategy. 

7. Select an appropriate DNS name for the domain. If policy doesn’t dictate and you’re selecting a domain name that won’t be registered on the Internet, be sure to use the correct format. Don’t use a name that lacks a period, as additional configuration is necessary. You may not only find that this is difficult, but it’ll hamper your attempts to apply domain-wide security. If computers can’t locate and connect to DCs, Group Policy can’t be replicated and security settings won’t be applied. 

8. Store the Active Directory database (%system folder%NTDS) on a different drive than the logs (logNDS). This will improve performance and make recovery easier.

9. Select compatibility mode as Win2K and higher. If the compatibility with legacy systems mode is selected, security is relaxed on the system; this includes anonymous access to shares. 

10. Set a strong Directory Services Restore Mode Administrator password and make it different from the Domain Administrator password. These accounts are different. Only the Directory Services Restore Mode account can be used to restore a System State backup. By giving these accounts different passwords, you can separate duties—always a good security idea. Be sure to write down and store the password in a secure place. The need for it may be long after the person who installs this server has left the company.

Post-Installation

1. Ensure access to a timeserver. By default, the system is pointed to time.windows.com; but after you promote this machine to be the first DC in the root domain, it becomes the time source for all computers in the forest. You should set it to synchronize with a reliable time source.

2. Check DNS. Specifically, look for error messages that registration didn’t occur and check the DNS server for evidence of the proper addition of all entries for this DC. Remember, problems with DNS can mean that carefully constructed security settings are never applied.

3. Review default security settings. For example, note that an Audit policy is set. This is excellent. Figure 3 displays the default settings. Note, however, that items are turned on for success only. You may want to revise these policies to record failure events, too. The default settings are a welcome change! 

4. Disable EFS. By now, you should be aware of the need to educate all users before EFS usage is allowed, as well as establish recovery methods. Window 2003 offers key recovery in addition to file recovery, but both these solutions must be thoroughly understood and require configuration and training. Disable EFS until your policy and solution are in place by unchecking the “Allow Users to Encrypt Files using the Encrypting File System” check box on the Property page of the Public Key Policy in the Security settings of the Default Domain Security Policy.

This is different than the procedure followed for Win2K. Figure 4 shows this dialog box. In the background, you can see the recovery certificate for the domain. There’s no need to remove this certificate to disable EFS. Windows 2003 doesn’t need to have a Recovery Agent certificate to use EFS but one is provided by default, and files encrypted on computers in the domain use this certificate. 

5. Examine use of the Everyone group in User Rights. While Windows 2003 doesn’t include the anonymous SID in the Everyone group, you should still refrain from using this group where possible. Be careful! Removing this group without understanding that groups need to be added to provide appropriate access can be disastrous. Consider that Everyone includes the operating system. You don’t want to remove permissions for the operating system.

6. Note the default application of communications security in Security Options. SMB message signing and banning the use of LAN Manager does much to secure network communications between Windows computers but also prevents some legacy systems from communicating at all. Others need configuration to do so.

7. Secure Remote Desktop for Administrators by using Group Policy. 

8. Remove the Administrator account from membership in Schema Admins. If modification of the Schema is necessary, it can be added back in. By removing the account now, you make the review of these types of modifications more likely, because no one can simply install an application that will modify the schema by accident.

9. Develop and implement a comprehensive baseline security for DCs. 

References

Adi Shamir, Eran Tromer, “On the cost of factoring RSA-1024”, RSA CryptoBytes.    Vol.6, No.2, 10-19, 2003

A.J.Menezes, P.C. Van Oorschot, and S.A.Vanstone, “Handbook of Applied     Cryptology”, Chapters 3.2.6-3.2.7, pp.95-98, 1997

Arjen K. Lenstra, Adi Shamir, “Analysis and optimization of the TWINKLE factoring    device”, Proc. Euro-crypt 2002, LNCS 1807 35-52, Springer-Verlag, 2000

Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer, “Analysis of Bernstein’s    Factorization Circuit”, Proc. Asiacrypt 2002, LNCS 2501, 1-26, Springer-Verlag,    2002

Daniel J. Bernstein, “Circuits For Integer Factorization: A Proposal”, NSF DMS, 2001

“Factoring Large Numbers: Fun or Applied Science?”,    http://www.cwi.nl/publications/annualreports/1999/AR/PDF/factoring.pdf

Sashisu Bajracharya and Han Sang, “Comparison of Factorization  Algorithms for Large    Numbers – Project Specification”, 2004


You should additionally do surety measures to avoid you do a . housework your computer mind assistance you in preventing your mechanism from further damage.Source:http://www.articlesbase.com/operating-systems-articles/fix-runtime-error-4198-with-registry-cleaner-1418993.html