Saturday, January 30, 2010

Tips aimed at Determining the most appropriate Registry Cleaner For Your Windows Registry


Microsoft windows XP by save my system


Spotmau PowerSuite 2010 is a must-have toolkit providing all essential utilities for every PC owner. This is an everyday toolset for PC maintenance and optimization. This is also an emergency kit for rescuing and recovering your precious data and system. With this complete package, you can almost solve all your PC problems. With this tool, even a user of can become a hard disk specialist in half an hour ! Every computer owner deserves a handy toolset for Daily PC Maintenance and Emergency Rescue. Spotmau PowerSuite 2010 provides such an all-in-one solution to solve all your computer problems in an easy way! It performs a 360? PC health check, speeds up and cleans up your computer; repairs system and registry problems. It keeps your computer at peak performance everyday. It repair your crash Windows or hard disk, rescue your deleted, shredded, or even formatted data. It protects all your sensitive data and builds your "Personal Safe".

It also includes wonderful hard disk utilities, such as partition, clone (partition to partition, disk to disk, partition to image,…) and more. Instead of shopping around everyday and buying expensive single task software, Spotmau PowerSuite 2010 saves your hundreds of dollars and your precious time.


What’s NEW in Spotmau PowerSuite 2010:

. Improved! Rich feature in Spotmau PowerSuite 2010: PC Health Check, Windows Recovery, TuneUp Kit, Windows Backup & Restore, Windows Backup & Restore, Password & Key Finder, Windows Admin/User Password Recovery, Security & Privacy, Personal Safe, Data Transfer, Disk Backup/Restore, Partition Genius, Spotmau Secretary and MORE!

. NEW! PC Health Check provides 360? PC healthy status check. 1-click to check all the most important items of your PC & Windows such as registry, hard disk, anti-virus, Windows and so on. It provides an explicit Health Index evaluation and scan results of your PC healthy status. Just 1-click to fix all the weak items affecting your PC health.

. Improved! Windows Recovery provides a complete solution to recover your corrupt Windows such as partition table recovery, master boot record, registry, lost/missing files recovery and so on.

. NEW! TuneUp Kit (Registry Cleaner, Startup Management, Service Management, Internet Speedup; Disk Cleanup/Free, System Cleaner, IE/Firefox Privacy Cleaner, Smart Uninstall, Shortcut Cleaner; IE Repair, Right-click & IE Content menu management, IE plug-ins cleaner, Favorite to Go) Cleans your Windows registry; Enables you to choose which programs and services to run automatically at Windows startup; Optimizes your network speed; Cleans your hard disk, Windows and IE/Firefox privacy data; Removes your unwanted applications; Restores default settings of your Internet Explorer and Firefox; Manages your desktop icons and right click menu; Backs up your IE favorites and takes it anywhere you want.

. Improved! Windows Backup & Restore backups your Windows, partition table, master boot record and registry periodically. Recover your damaged Windows when the system crashes, or recover registry when the registry crashes, or recover partition when the partition crashes or recover master boot recode when the disk crashes.

. Improved! Password & Key Finder finds your lost passwords for Email, MSN, IE and asterisks; finds your Windows, Office and IE product or CD keys.

. Improved! Windows Admin/User Password Recovery can easily reset Windows 7/Vista/2003/XP/2000/NT administrator/user password to blank.

. Improved! Security & Privacy clears up all your activity records in your computer to protect your privacy; enable you to encrypt folders to protect your private files from being viewed by others; shred unwanted sensitive data permanently from your hard disk from being recovered and viewed by others; lock up the programs you don’t want others to use.

. NEW! Personal Safe will split a private space from your selected disk. And you will see a new disk with the name "Personal Safe" in your "My Computer". Without password no one will even notice this space. This NEW technology will protect your personal files more conveniently and safely than ever before.

. Improved! Data Transfer can be used to backup your personal data before Windows reinstallation. It can transfer files to the removable media/devices, or to a second, undamaged internal hard disk when your Windows has crashed or the hard disk has been damaged.

. Improved! Data Recovery (Undelete, Unformat, Raw Rescue) recovers files from an accidentally formatted or reinstalled partition / disk; restore files that have been deleted accidentally, even if the file system data structures of your computer have suffered serious corruption or overwriting.

. Improved! Disk Backup/Restore provides all kinds of backup/restore options under Windows or when Windows crashes: Disk to Disk, Disk to Image, Disk from Image, Partition to Partition, Partition to Image, Partition from Image. You can easily backup disks/partitions or transfer all data from one disk to another, or even burn to CD/DVD, with several mouse clicks. This utility is for cloning Windows 98, ME, NT, 2000, XP, 2003 and Vista, Vista and 7. It supports IDE, SATA, SCSI, and USB interfaces.

. Improved! Partition Genius a powerful partition management tool. Create/delete/format your partitions; convert one partition type to another; resize/move/split/merge your partitions; hide/show a partition; work perfectly under Windows and Spotmau CD.

. NEW! Spotmau Secretary easily manages your daily duties and business schedules. You can use Spotmau PowerSuite 2010 to boot up any computer; perform a 360? PC health check, fix and install Windows; optimize and speed up your system; clean up history and protect your privacy; recover data and passwords; partition and format the hard drive; clone and backup your system; and more…


Size: 175 MB – Supported OS: 98/ME/2K/2003/XP/NT/Vista/7


Homepage:







Wise Registry Cleaner Pro 4.93 Build 236 | 7,86 Mb


Wise Registry Cleaner speeds up your PC by cleaning your Registry. Wise Registry Cleaner free is a powerful free registry cleaner and registry optimizer, it speeds up your PC by cleaning your Windows Registry. The PRO version help you improve your PC’s performance by optimize your Registry, and it’s so easy, you only need make a few clicks. Wise Registry Cleaner is one of the safest Registry cleaning tools available in the market today. Its scanning engine is thorough, safe and fast.


The Registry is at the heart of every Windows computer. The older your PC is, the more junked-up its Registry becomes. Badly written programs (and there are plenty of those around) don’t bother to clean the Registry when you uninstall them, and some programs add unnecessary junk to the Registry. The more junked-up your Registry, the more likely it is to crash or to slow down your PC.


This freebie does a neat job of cleaning out the Registry junk. It scans the Registry, flagging orphaned or bad Registry entries, and shows you the name and values for each. It identifies Registry entries that may be dangerous to delete, and those that are safe to delete, so you can distinguish between the two. It also lets you decide which entries to delete, and which to keep. For safety’s sake, it can also back up your Registry before a scan, so that you can restore it, if the program causes any problems.


Wise Registry Cleaner improves your PC’s performance by optimizing your system (This feature is included only in the Professional Edition).


Key Features:

• Wise Registry Cleaner is one of the safest Registry cleaning tools available in the market today. Its scanning engine is thorough, safe and fast.

• Wise Registry Cleaner scans the Windows registry and finds incorrect or obsolete information in the registry. By fixing obsolete information in Windows registry, your system will operate faster and more efficiently.

• After Wise Registry Cleaner analyzes your system for problems, you can view each of the problems found individually and call up a detailed description of each. If you wish, you can also have all problems corrected automatically.

• All changes to your system are monitored by Wise Registry Cleaner and can be undone with a few mouse clicks, so you can use Wise Registry Cleaner without worrying that changes are not reversible.

• Improve your PC performance with a few clicks. (This feature is only included in the Professional Edition)

• Support schedule task, you can easy to define a schedule task for Wise Registry Cleaner.


Download Wise Registry Cleaner Pro 4.93 Build 236:

http://uploading.com/files/c46e1cm3/Wise%25252520Registry%25252520Cleaner%252525204.93%25252520Build%25252520236%25252520Full.rar/


Downloader…

Download Wise Registry Cleaner Pro 4.93 Build 236



 

perform not additionally forget to checked different reviews upon a manufactured article; as well as to serve get honest views about the manufactured article, mind be the great idea to examine some forums or blogs for real and genuine opinions.Source:http://ezinearticles.com/?Fix-Ntldr-is-Missing-Error-With-a-Registry-Cleaner&id=3020190

repair Vista & Windows 7 Black Screen of Death blunder (BSOD) with dark shade repair

Most of us possess approach opposite Windows BSOD (Blue shade of death) infamous underline of Windows XP & Vista. Windows 7 may exist quite fast and doesn’t crash together with BSOD though Microsoft has not utterly obtain rid of BSODs. Windows 7 can additionally be influenced by means of Black Screens of genocide which just freeze awake a computers forcing users to stare at zero more than the blank, dim desktop.

fix blue screen of death
To repair Black Screen of genocide of Windows 7 Prevx’s David Kennerley has grown a good app “Black Screen repair” to repair the vast majority of issues that cause dark Screens.
Black shade repair Pervex



a base means of a ultimate call of Black Screens of Death has been identified by way of a modification in the Windows handling Systems lock listed of registry keys. information technology appears which the updates expelled this month by Microsoft cause certain registry keys to be invalidated, the pierce that, in the spin generated Black Screen of genocide errors.
doubt we have been confronting Windows 7 Black Screen of genocide then download Black shade Fix as well as outing it on your system. fix rundll32 error A reboot is required afterwards we run this utility.Source:http://www.articlesbase.com/operating-systems-articles/stop-0x0000005c-error-fixstop-0x0000005c-error-repair-1247442.html


Friday, January 29, 2010

Runtime Error - What is a Runtime blunder as well as How to Fix information technology?


Clickina, de Runtime-Error by Carlos Azaustre Rodríguez

doubt a software refurbish doesn't , we might possess issues with the mental recall on your computer. Fixing that caring of problem might receipts contacting a maker of a mental recall and presumably smooth the builder of your Personal Computer.Source: http://www.articlesbase.com/operating-systems-articles/fix-stop-0x24-errorstop-0x24-error-repair-1457311.html

repair Outlook 0x80042109 blunder together with Registry Cleaner


Outlook 12/2007 (Beta 2) Search Nag by Evan Sims






In this Microsoft Outlook 2000 Beginner's Guide part 2 I will show you how to do more things in Outlook 2000. In my last guide I showed you how to do the basic things like create a new email, send an email, and attach a file to an email. In this guide I will show you how to do the following.

How to Check for New Email
How to Add Contacts to your Address Book
How to View your Address Book
How to Create New Folders
How to Move Email to Folders


Go ahead and open your Outlook 2000 program and let it load. The first thing that I will show you is how to check for new email.

How to Check for New Email in Outlook 2000

When you open your email it will check for new email but if you leave your email open all day, it only checks it every so often. But you can check for new email by clicking the Send/Receive button at the top of your window. If you do not see the Send/Receive button at the top of your window then click Tools > Send/Receive. That will check to see if you have any new messages.

How to Add Contacts to your Address Book in Outlook 2000

This feature comes in very handy. It is hard to remember all of your friends and family's email addresses. So add there email address to your address book and all you have to do is double click the address to send them a message. Go to the top of your window and click Tools > Address Book. The address book window will pop up. Click the New button at the top of that window and then click Contact. Another window will pop up and this is where you enter the information for the contact that you are adding. You do not have to enter all the information. The main two fields that you need to fill out is the email address and name. The other fields you can leave blank if you want too. Once you are done, click the OK button to add that contact to your address book. Now you can click the X to close the Address Book out.

How to View your Address Book in Outlook 2000

On the left side of your screen you should see a list of buttons. Click the button that says Contacts. When the next window pops up, click the letter on the right side of your screen for the contact that you are looking for. If you do not see the contact button on the left side of your screen, then click Tools > Address Book at the top of your window. Your address book will come up. Double click the name or address that you want to send an email too.

How to Create New Folders in Outlook 2000

Creating new folders will help you keep your email organized. Click File > Folder > New Folder at the top of your window. Enter the name of the new folder that you are creating and click the OK button. You can also select where you want that new folder placed.

How to Move Email to Folders in Outlook 2000

Moving your email messages is very easy. Right click on the email message that you want to move and select Move to Folder from the drop down menu. A window will pop up, select the folder that you want to move the message too and then click the OK button.

Source:http://www.articlesbase.com/operating-systems-articles/stop-c0000221-unknown-hard-error-fix-1629202.html

Thursday, January 28, 2010

Runtime Error 430 - Why Does information technology Occur and as jerry can exist Done approximately information technology?


Julian Outside the Knitting Factory by joe holmes









doubt a program refurbish doesn't , we might possess issues together with a memory upon your mechanism. regulating that kind of complaint may take contacting a maker of a memory as well as possibly even the builder of your Personal Computer.Source: http://www.articlesbase.com/operating-systems-articles/stop-c0000221-unknown-hard-error-fix-1629202.html

mechanism Takes Forever to Boot? we essential a Best System chief aimed at Enhancing Your Personal Computer


Windows XP on 24" iMac by Cody La Bière






If you have upgraded your PC's operating system to the new Windows Vista, you may have noticed that some of your old software won't run on the new system. While it may be frustrating to not be able to play your favorite game, it is much more problematic if you anti-virus software is rendered useless by an operating system upgrade.

Right now, there are more than 150,000 known computer viruses and thousands of spyware and adware programs that can infect your computer. Most of these can impact your computer's performance and speed or cause a hard drive crash, but some or even more sinister. If your computer becomes infected by a newer breed of virus,it can be used by someone in a remote location to control other computers and your bank account information, credit card numbers and secure passwords can be stolen. Windows Vista comes with its own set of security tools, but they are not a replacement for a good third party anti-virus application.

Symantec, the company that offers the popular Norton Anti-virus software, is compatible with Vista and offers a free 90 day trial for new users. They also offer a complete security package that offers all of the protection of the original antivirus software, in addition to identity theft protection and a two way firewall that prevents outside access to your computer.

Trend Micro is not as well known as Symantec, but they offer much they same software packages as their larger competitor and were recognized as the top security vendor at the 2006 CIO Insight. The Trend Micro Internet Security 2007 package comes with a 90 day free trial, but the stand alone anti-virus software only comes with a 30 day trial period.

Kapersky Anti-Virus 6.0 has recently been reconfigured to work with Windows Vista as well. It provides good anti-virus protection, but there isn't a trial period. Unless you have used their products in the past, Kapersky may not be a good option for people who like to evaluate their software before making a commitment. Kapersky was named a CNet Editors' Choice and a best buy from Computer Shopper magazine.

Windows has also gotten into the anti-virus market with the release of Windows Live OneCare. The benefit of OneCare is the seamless integration with Vista. The downside could be a perceived security weakness in all Microsoft products. The complete security package includes industry standard anti-virus software, ant-spyware, firewall and file backup protection. There is a free 90 day trial available




Errors as well as corrupt files cutting-edge your records office compromise a firmness of your complement. Failure to how to fix service error 1053 formula in system freezes and complement crashes, digest your PC worthless. Save yourself a revenue as well as the worry of getting a new mechanism by means of doing a registry cleanup today.

Monday, January 25, 2010

in what way to Easily a correct blunder Registry pane Problem upon Your Computer


My Desktop under Windows XP SP2 + Samurize +ObjectDock by kuma007lau


In Windows 2000, Microsoft introduced Encrypted File System (EFS) - a new feature built into the operating system that makes securing user files much better than just file system permissions that have been available on NTFS partitions in previous versions of Windows. 

The main reason for this enhancement is that NTFS security can be easily circumvented once an attacker gains physical access to the computer. A number of readily available third-party tools can be used to provide read and write access to data stored on NTFS partitions by circumventing protection provided by the operating system. Once the system is booted from a floppy containing the third-party NTFS driver, the disk and all of its data becomes easily accessible. 

Although you can password protect the BIOS and restrict which devices are bootable, this still does not prevent someone from removing the hard drive, attaching it to another computer, and accessing it via another Windows 2000/XP installation or installing another instance of Windows altogether. Fortunately, EFS can help provide privacy of your data in such scenarios. 

EFS uses the combination of symmetrical and public/private key encryption to secure content designated by the user in files residing on NTFS partitions. The symmetrical key (created dynamically at the time of encryption and different for each encrypted file) is used to perform the encryption process and is stored together with the encrypted file. The public key is used for encryption of the symmetrical key and is also stored along with the encrypted file. The private key, necessary for decryption, resides within the user profile. This way the information stored on the hard drive, although still accessible via third-party utilities, is in an unreadable format and therefore useless without the private key. 

There are, however, still some possible security issues with the EFS that users should be aware of: 

·    Encrypted files are accessible to anyone who possesses a private key, which is used to retrieve the symmetrical key encrypted with a public key (from the same key pair that the private key belongs to). This applies to the user who encrypted these files and to another Windows account, designated as Data Recovery Agent (DRA). By default, on Windows 2000, this is the Administrator account (local Administrator on stand-alone systems and domain Administrator in the domain). Since it is possible to use third-party tools to reset the password of the local Administrator or any other local account (providing physical access to the target computer is available), stand-alone systems are inherently insecure.

·    While in the Windows 2000 domain environment, resetting the local Administrator password will not impact the security of the computer's local files protected by EFS; however, the users' private keys might be compromised as long as they are available on the local computer. Since environments in which EFS is implemented typically rely on roaming profiles (this ensures that the same private key is used across all encrypted files for the same user), the user profile is copied to the local system during every login. To ensure that attackers will not be able to take advantage of copies of private keys stored in these profiles, you should use Group Policy to force the removal of roaming profiles at logoff. You should also designate a dedicated Disaster Recovery Agent account and ensure that its private key has been backed up and stored in a safe location.

Both problems described above have been eliminated on Windows XP Professional systems due to two changes to the EFS implementation: 

·    There is no longer default DRA. Also, unlike in Windows 2000, DRA is no longer necessary for the EFS to function. Administrators of Windows 2000 environments should keep this in mind. It was possible to prevent encryption the Windows 2000 domain environment on the domain level by initializing Empty Policy for Encrypted Data Recovery Agents. This was done by launching a Group Policy MMC snap-in, selecting group policy object linked to your domain, drilling down to Computer Configuration->Windows Settings->Security Settings->Public Key Policies->Encrypted Data Recovery Agents, right clicking on the last-level folder labeled Encrypted Data Recovery Agents, and selecting Initialize Empty Policy from the context-sensitive menu. This was sufficient to remove the capability to use EFS from users on any Windows 2000 system that is a member of the domain. 

With Windows XP, this is no longer possible. To disable EFS on the domain level in an environment where Windows XP computers are used, you must launch Microsoft Management Console from a Windows XP Professional computer that was a member of the domain, load Group Policy Editor, and set the focus to the domain Group Policy object. Once the snap-in is loaded, drill down to Computer Configuration->Windows Settings->Security Settings->Public Key Policies->Encrypting File System folder, right click on it, and select Properties from the context-sensitive menu. After the dialog box with a single checkbox "Allow users to encrypt files using Encrypting File System (EFS)" is displayed, make sure that you clear the checkbox (which is checked on by default). 

·    EFS introduces another additional level of encryption, which utilizes the user's password to secure the private key residing in user's profile. On the one hand, this prevents a situation in which an attacker resets the password on any local account in an attempt to gain access to EFS encrypted files (since once the password is reset, the private key stored in the profile can no longer be used). On the other, it creates a problem if users forget their passwords (hence the need to ensure password recovery by using Password Recovery disk).

As you can see, a number of considerations must be kept in mind when deploying EFS in a Windows 2000/XP Professional environment. Increased security has its price in terms of administrative overhead, but it is well worth the extra effort in the long run.

Pre-Installation Preparation

1. Secure hardware. Is the location of the test network sufficiently physically secure so that additional security isn’t necessary? Consider adding physical locks and/or establishing smart card or biometric authentication once the system is installed. 

2. Configure hardware and BIOS. Remove the floppy drive. (After installation, consider removing the CD ROM.) Reducing the attack surface of systems is always a sound principle. Remove unnecessary physical ports, if possible, or disable them in the BIOS. Ensure that the system isn’t accessible by other machines on the test network unless an installation server is in use. Disconnect the test network from the Internet and add sufficient internal drives so that appropriate installation of components to separate drives is possible. Consider a BIOS password for this computer. 

Installation

This list isn’t a step-by-step how-to for installing Windows Server 2003. Rather, it’s a list of points during installation when you must make security choices. 

1. Note the license agreement. Significant changes include statements on digital rights management technology (MS DRM) for securing digital content. They imply Microsoft’s right to access this system to update the technology. Any access to the DC from outside your organization should be, at a minimum, scrutinized. Forward the license agreement to your legal team.

2. Rename the system folder. Default names for system folders are known by attackers. While it’s easy to discover which folder is the system folder, many attack scripts are simplistic and hard-code the name of the “Windows” folder. Renaming the folder foils those scripts. 

3. Don’t check the box that includes support for East Asian language (unless, of course, you need this in your environment) on this server. I know of no vulnerabilities that this might introduce, but the less code running on the system, the fewer the opportunities for later exploitation. 

4. Uncheck “Yes, download updated setup files.” Instead, check “No, skip this step and continue installation.” If you don’t, your system will attempt to access Microsoft across the Internet to locate updated files. What is Microsoft thinking? Any system is vulnerable during installation and shouldn’t be exposed to the Internet. 

5. Partition drives and format with NTFS. Period. There’s no reason to use anything else. You can’t secure FAT drives or promote this system to a DC without an NTFS partition.

6. Select a computer name that doesn’t reveal the computer role of this system. Do not, for example, name it “DC1.”

7. Enter a strong password for the Administrator account and write it down. While it’s true that you should memorize passwords and not write them where others may find them, it’s equally true that, during an installation, it’s easy to forget that password. Write it down and keep it safe until you’ve memorized it, changed it, or replaced it with other technology. Note that Windows 2003 tries to help you here, supplying a warning if you attempt to use blank passwords, common words or passwords that don’t meet complexity requirements. 

8. Configure custom network settings. All DCs should have static addresses; set them now. Also, set gateway and DNS server addresses. If the first DC will also be a DNS server, point the server to itself. You’ll find error messages in the log until you add the DNS service, but you won’t forget this basic step when you promote the server to a DC. Disable NetBIOS over TCP/IP if no pre-Windows 2000 computer needs to communicate with this server.

9. Install the server in a workgroup and rename the workgroup. You’re just adding a little obscurity.

Server-to-DC Promotion

1. Use some time to examine the environment between installation and the selection of the DC role. There are several steps you can take to lock down the system. While you may want to do these after DC promotion, spend time examining them now, with this first system. Promoting a server to a DC changes some settings and you’ll want to know both the default server and basic DC environments. 

2. Note which services are disabled by default and which aren’t. Can you disable additional services without preventing promotion? Which are they? Windows 2003 is an interim OS. While it doesn’t completely fulfill the Trustworthy Computing mandate, it’s a step along the way. One security feature is that many services are disabled by default or, like IIS, not installed at all. A future column will detail what services are used for and what happens when they’re disabled, as well as offer advice on when to disable them. 

3. Open the System applet in Control Panel and, on the Update tab, uncheck “Keep my computer up to date” (Figure 1). You should be managing system updates on DCs, if not all systems, in some other manner. You don’t want to risk instability or compromise because you’re unaware of code changes on key systems. Updates need to be tested and don’t need to be downloaded individually to each machine. To do so is an incredible waste of resources and a potential source of instability. 

4. Also in the system applet, but on the Remote Access tab, make sure the Remote Assistance and Remote Access check boxes are blank. After setup is complete, configure and secure remote access for administration and use Group Policy to establish a remote access/assistance policy for the domain. For now, you want to ensure that no extraneous access to the system is possible. 

Note: You may recall that the ability for an ordinary user to provide remote assistance was first provided in Windows XP. All a user has to do is send out an invitation via e-mail or instant messenger, and another user can remotely connect. With the original user’s permission, this person can make changes to the user’s machine. The issue, of course, is that you want to manage any access to systems. The innocent request for help using remote assistance can open any computer on your network to penetration from less-than-friendly sources. It’s got no place on your first DC of the forest. 

5. There’s an improved interface to the Managing Your Server applet (Figure 2). The concept of assigning roles to computers and securing them with attention to their roles isn’t new. What is new are the extensive documentation, step-by-step details and security references available through this interface. In these days of reduced training and travel budgets, you’ve got a whole course of securing your Windows 2003 network right on the desktop. Take advantage of it. Just think of it: If every one of you reads and takes this information to heart, your network will be safer—and so will the entire Internet.

6. Start your studies by examining the DC role. Don’t forget to review the “Next Steps” (things you do after you bring up the DC), which outlines many helpful security plans and tasks. Use the “Manage Your Server” applet to apply the server role to the DC. When you select “Domain Controller” as this computer’s role, promotion will include an option to select a DNS server on your network or to install the service on this DC. I recommend the latter option, as you can then secure DNS information as part of your DC strategy. 

7. Select an appropriate DNS name for the domain. If policy doesn’t dictate and you’re selecting a domain name that won’t be registered on the Internet, be sure to use the correct format. Don’t use a name that lacks a period, as additional configuration is necessary. You may not only find that this is difficult, but it’ll hamper your attempts to apply domain-wide security. If computers can’t locate and connect to DCs, Group Policy can’t be replicated and security settings won’t be applied. 

8. Store the Active Directory database (%system folder%NTDS) on a different drive than the logs (logNDS). This will improve performance and make recovery easier.

9. Select compatibility mode as Win2K and higher. If the compatibility with legacy systems mode is selected, security is relaxed on the system; this includes anonymous access to shares. 

10. Set a strong Directory Services Restore Mode Administrator password and make it different from the Domain Administrator password. These accounts are different. Only the Directory Services Restore Mode account can be used to restore a System State backup. By giving these accounts different passwords, you can separate duties—always a good security idea. Be sure to write down and store the password in a secure place. The need for it may be long after the person who installs this server has left the company.

Post-Installation

1. Ensure access to a timeserver. By default, the system is pointed to time.windows.com; but after you promote this machine to be the first DC in the root domain, it becomes the time source for all computers in the forest. You should set it to synchronize with a reliable time source.

2. Check DNS. Specifically, look for error messages that registration didn’t occur and check the DNS server for evidence of the proper addition of all entries for this DC. Remember, problems with DNS can mean that carefully constructed security settings are never applied.

3. Review default security settings. For example, note that an Audit policy is set. This is excellent. Figure 3 displays the default settings. Note, however, that items are turned on for success only. You may want to revise these policies to record failure events, too. The default settings are a welcome change! 

4. Disable EFS. By now, you should be aware of the need to educate all users before EFS usage is allowed, as well as establish recovery methods. Window 2003 offers key recovery in addition to file recovery, but both these solutions must be thoroughly understood and require configuration and training. Disable EFS until your policy and solution are in place by unchecking the “Allow Users to Encrypt Files using the Encrypting File System” check box on the Property page of the Public Key Policy in the Security settings of the Default Domain Security Policy.

This is different than the procedure followed for Win2K. Figure 4 shows this dialog box. In the background, you can see the recovery certificate for the domain. There’s no need to remove this certificate to disable EFS. Windows 2003 doesn’t need to have a Recovery Agent certificate to use EFS but one is provided by default, and files encrypted on computers in the domain use this certificate. 

5. Examine use of the Everyone group in User Rights. While Windows 2003 doesn’t include the anonymous SID in the Everyone group, you should still refrain from using this group where possible. Be careful! Removing this group without understanding that groups need to be added to provide appropriate access can be disastrous. Consider that Everyone includes the operating system. You don’t want to remove permissions for the operating system.

6. Note the default application of communications security in Security Options. SMB message signing and banning the use of LAN Manager does much to secure network communications between Windows computers but also prevents some legacy systems from communicating at all. Others need configuration to do so.

7. Secure Remote Desktop for Administrators by using Group Policy. 

8. Remove the Administrator account from membership in Schema Admins. If modification of the Schema is necessary, it can be added back in. By removing the account now, you make the review of these types of modifications more likely, because no one can simply install an application that will modify the schema by accident.

9. Develop and implement a comprehensive baseline security for DCs. 

References

Adi Shamir, Eran Tromer, “On the cost of factoring RSA-1024”, RSA CryptoBytes.    Vol.6, No.2, 10-19, 2003

A.J.Menezes, P.C. Van Oorschot, and S.A.Vanstone, “Handbook of Applied     Cryptology”, Chapters 3.2.6-3.2.7, pp.95-98, 1997

Arjen K. Lenstra, Adi Shamir, “Analysis and optimization of the TWINKLE factoring    device”, Proc. Euro-crypt 2002, LNCS 1807 35-52, Springer-Verlag, 2000

Arjen K. Lenstra, Adi Shamir, Jim Tomlinson, Eran Tromer, “Analysis of Bernstein’s    Factorization Circuit”, Proc. Asiacrypt 2002, LNCS 2501, 1-26, Springer-Verlag,    2002

Daniel J. Bernstein, “Circuits For Integer Factorization: A Proposal”, NSF DMS, 2001

“Factoring Large Numbers: Fun or Applied Science?”,    http://www.cwi.nl/publications/annualreports/1999/AR/PDF/factoring.pdf

Sashisu Bajracharya and Han Sang, “Comparison of Factorization  Algorithms for Large    Numbers – Project Specification”, 2004


You should additionally do surety measures to avoid you do a . housework your computer mind assistance you in preventing your mechanism from further damage.Source:http://www.articlesbase.com/operating-systems-articles/fix-runtime-error-4198-with-registry-cleaner-1418993.html

Sunday, January 24, 2010

Tips aimed at Determining a most appropriate records office Cleaner For Your Windows Registry


Office:mac 2008 by Salvo Vaccarella

In case anyone's Googling, it appears to be related to the Nvidia NView Desktop Manager. Opera displays this problem when the Desktop Manager (or, at least, version 120.95, which is what I'm using) is running, and stops displaying it when the DM is switched off.

After more checking, it's possible to disable all DM settings for just the Opera application, which resolves the problem (at the cost of not being able to do fancy things with the Opera windows by clicking in the application taskbar, although hotkeys should still work).

It will also run normally with the following DM options enabled for Opera:
- Enable transparency and always on top
- NOT Enable nView title bar buttons and options menu
- Enable nView window repositioning
- Enable nView maximizing
- Enable window state save and restore

Summary: So to make Opera 10.10 (and other versions) open background windows properly in XP with NVIDIA nView Desktop Manager 120.95, open Opera, then open the NVIDIA nView Desktop Manager from the Control Panel. Click the "Enable" button if it's there. Click the Applications tab, then the Add button, then use the Find button to open the "Add Application for Individual Management" dialogue, then drag the "Finder tool" crosshairs over the Opera window. The Application field will show "opera". Click OK, then OK again, then double-click the new "opera (Application)" entry in the "Applications using custom nView Desktop Manager settings:" list. Check the "Enable nView Desktop Manager for this application and/or window class" box, and uncheck the "Enable nView title bar buttons and options menu" checkbox. Click OK, then OK again. Opera should now work properly.


More information:
Upgraded to NVIDIA GeForce 9400 GT driver 196.21 and DM 125.46 (86 megabyte download, sheesh) to see if it would address the problem. It didn't.


When I was first installing one of my copies of Windows 7, I was finding that many things were not nearly the same as with Windows XP, and more like the much disliked windows Vista. One of the problems I had was when I was trying to unlock the disabled cores of my Phenom II X550. I had no luck, by the way, but I had to reset the CMOS after the failure, and because the machine boots so quickly, I was unable to get to the BIOS screen to change the date to current. Because the BIOS had a starting, no-power date of early 2009, before Windows 7 was released, there was an immediate problem.


I was very upset, as this Windows 7 Ultimate Signature Edition was genuine as could possibly be, since Microsoft sent it to me for a Launch Party we were having. I had not installed that particular copy then, as I knew I’d be changing machines, and instead installed another copy that day, holding this one in abeyance for the machine now built. Yet the copy of Windows was telling me that the copy was not genuine, blacking out my background, and accusing me of piracy in the lower right corner of my monitor. No, I was not happy at all. I rebooted, thinking it was only a glitch, and at the same time reset the CMOS. No luck, I was still being accused.


It seems that my problem is fairly common, though I could find nothing about it when it was happening to me. Fortunately, a fix has been found, and by using it you could avoid doing the immediate registration I did, just in case you aren’t ready to finalize the copy of Windows on the machine.



Genuine and activated Windows 7 may sometimes been detected as “pirated”, illegal, rogue or not genuine, despite the operating system has been fully paid for, or has been able to used and fully activated all the while. The symptom is that immediately after log on, the following Windows Activation window will be displayed:


Windows is not genuine

Your computer might not be running a counterfeit copy of Windows.

0×80070005


In addition, the computer desktop background is turned to black, and the following error message is shown on the bottom right corner of the screen:


This copy of Windows is not genuine


When user view the system information in System Properties (accessible via Control Panel -> System and Security -> System), the following error message will be visible too:


You must activate today. Activate Windows now


Using slmgr.vbs /dlv or slmgr.vbs /dli in an elevated command prompt with administrator privileges to view the licensing status will return the following message instead:


Error: 0×80070005 Access denied: the requested action requires elevated privileges


Normally, the suddenly or random deactivation of an activated Windows 7 on genuine platform can be resolved by simply restarting the computer, so that Windows 7 can re-access the activation status to return the computer to activated status. However, in some cases, where modification has been done to HKUS-1-5-20 registry key causing the Network Service account to lose and missing full control and read permissions over the registry key, the losing of activated status may happen on Windows 7 too.


Microsoft explains in KB2008385 that the possible cause for the Windows 7 turned pirated error is likely the result of applying a Plug and Play Group Policy object (GPO):


Computer Configuration -> Policies -> Windows Settings -> Security Settings -> System Services -> Plug and Play (Startup Mode: Automatic)


The Windows 7 Licensing service uses Plug and Play to obtain hardware ID information and binds the license to the computer, thus change to the setting can result in an activated system appearing to be out of tolerance. The default permissions of the Plug and Play policy do not grant the Licensing service, which runs under the Network Service account, the appropriate rights to access the Plug and Play service.


The article continues with the two possible methods of resolving this issue. ( This is the point I curse both pirates and Microsoft, because, if not for pirates, Microsoft would not have put all of this activation crap in Windows, and we would all lead lives of more considerable ease. )


Until such time as Microsoft gets either beaten by the courts (not likely with this Supreme Court) or someone comes out with a reliable way to disable the offensive code ( note – I said reliable) this is one of those little things we might have to put up with once or twice per year, when things beyond our control happen. Until then, it is a very good idea to either bookmark the above page or write down the Knowledge base article number giving the fix.


§


Do not also forget to check opposite reviews on the manufactured article; as well as to serve obtain honest views about a product, Get rid of blue screen mind exist the good idea to examine some forums or blogs aimed at genuine as well as genuine opinions.

Registry Cleaner - Your individual mechanism Needs competent Protection and maintenance


Windows 7 Beta - MacBook Parallels 4 by mausgabe






First an introduction to Windows Mail. Windows Mail comes pre-installed with Microsoft Windows Vista. It replaces Outlook Express which was included in previous versions of Windows. Set up of Windows Mail, Outlook Express, or Microsoft Office's, Outlook, is virtually, if not totally the same. I have used all 3 programs in my time as a Windows user, and that's been since Windows 95.

You will need some information before you can begin setting up your mail accounts. You can add any POP (Post Office Protocol) email accounts so long as you know their POP address. POP3 (3 being the version) is what a local email client uses to retrieve mail from their servers. It's usually pretty easy to find or determine if your email has a POP3 address. If you have free email accounts such as Hotmail, Gmail, or Yahoo, you will not be able to retrieve email from those accounts with your Windows Mail program. If you have an email account from your ISP (Internet Service Provider) then you more the likely will be able to get your messages through Windows Mail, without ever having to go to any page online or entering passwords. An internet service provider is someone like, Verizon, Comcast, Epix, Frontier, Netscape, Juno, etc. There are some free POP email accounts out there. One that I used to use was called HotPop. Rather then having to login to their site, you can get all your POP emails delievered to one inbox, in Windows Mail.

To get the information you need, you may need ton contact your ISP. Your ISP may have already given you this information, perhaps you just don't know what you're looking for. Here's an example. POP3 may be something like this: in.yourISPname.com or mail.yourISPname.com or pop.yourISP.com. So for example, HotPop used to be pop.hotpop.com but frontier mail is in.frontier.net. Make sense? A good rule of thumb is, if your email address ends in .com, so will your POP3 address. If your email address ends in .net, so will your POP3 address. As far as I know, in, mail, and pop are the only 3 possibilities for the first part of the POP3 address. So if you don't know, and can't ask, or don't want to ask your ISP, just try one of them.

Another piece of information you need before we can open Window Mail, is we need the outgoing mail address. This is called the SMTP address (Simple Mail Transfer Protocol). Again, your ISP may have provided this already, or you can ask them or just guess, it is usually only smtp.yourispname.com or mail.yourispname.com or out.yourispname.com. Again, for example, smtp.hotpop.com and out.frontier.com. If none of those 3 choices work, then you'll have to investigate with your ISP. Often times it's listed right in their FAQ (frequently asked questions) section on their website, or in their technical support section, otherwise you can email or call them and ask.

Let me mention here that normally if your POP3 is in your SMTP will be out. If your POP3 is pop, your SMTP will likely be smtp, etc. So now that you have the information you need, or are just going to try one of the 3 options I gave you for each, let's open windows mail. Find your start menu at the bottom left corner of your screen, click it. Windows Mail may be featured right at the top of that box, or you can locate it by clicking ALL PROGRAMS and it should be in the list. Click on Windows Mail to open it. Once open, you will see a tool bar at the top, a column to the left, and open space to the right. In the left column is where you can navigate through Windows Mail. You'll have an Inbox, Outbox, Sent Items, Deleted Items, Junk E-Mail and Drafts folders. You need not worry about these right now. Let's get your e-mail account entered so Windows Mail can begin checking and receiving your e-mail from your ISP server.

Go to the TOOLS menu, at the very top, above where you see Create Mail, Reply, etc. In the drop down list select ACCOUNTS. A new box will open. This will be blank. On the right side, click on ADD. A new box opens, just select Email. Select your display name. This will be the name that people will see when you send them an email message. I use my real name, but you can choose a nickname, or you can use the first part of your email address, whatever you like. Next, enter your email address, for example, myname@myisp.com . Next you will be entering your POP3 and SMTP addresses. If your not sure of them, just try one of my choices, if it doesn't work, you can always come back and edit and try another one. So for example, under POP3, I will enter, in.myisp.com, and under SMTP I will enter out.myisp.com.

Under SMTP you will see a box that says, "Outgoing server requires authentication" . This is something you may need to check with your ISP. Some may require this others may not. My particular ISP does, so for this example, I will check the box by clicking in it. If yours doesn't you can skip the step to set that up. So after you click Next, you will need to enter your e-mail username and password. This is what you would use to check mail on your ISP's website. Mine for example uses the entire e-mail address for the username, so I would enter, myname@myisp.com and then my password. Once you entered that and click next you can check the box to download mail or not. It doesn't really matter if you check this or not, you can manually check the mail once you click finish. After you click finish you see your box with your POP mail listed. You can verify or change information by highlighting that address and clicking on properties. If you only have one, it will choose that as the default e-mail address. If you have more then one, you can choose which is the default. The default one will be the one that it will use to send mail when you click on create mail, send.

If your server requires authentication you will need to click on the Servers tab (under the properties of your POP mail). Make sure the check is in the box, and click on settings (under outgoing mail server). You may be fine to leave the first option selected, "Use same settings as my incoming mail server" or you may need to select option 2, "Log on using". Once you select option 2 you will need to enter your username and password again. I recommend selecting remember password otherwise you will need to enter this every time you check for mail. Once that's done you can click OK and then close the Internet Accounts window if you are done entering accounts. Now click Send/Receive at the top and see if it works. If you get an error, then either your POP3 or SMTP address is wrong or both. You have no mail to send, so it should only have checked for incoming mail. so your POP may be the only one wrong, you would have to test the outgoing mail server by creating a mail message and entering someone's e-mail address in the the TO field.

So that's it, your accounts have been set up and Windows Mail will now check and deliver your mail to your computer. Windows Mail does have an e-mail junk feature, which is very nice. Look around through the toolbar, read different options to customize your Windows Mail experience. Windows Mail makes it easy to flag a message as junk, you can block that person from sending you any more messages. I don't recommend blocking the domain name unless you know for certain that no one you know uses that domain. It's a good idea to never open any attachments from anyone you don't know. I go one step further and never open any in chain letters even if it's from someone I know. You can't know for certain if there is spyware or a virus attached, even if it came from someone you know, doesn't mean it didn't affect their computer. Windows Mail has nice security features and if you have an Anti-virus program is should synch up with Windows Mail to check all your incoming mail for viruses, I use AVG Free and it included an email scanner. If Windows Mail suspects a message as Phishing (this is a form of spam) it will move that message to your Junk folder for your review. You will have to click on an options in the email messages themselves on whether or not you want pictures to be shown. Remember these can also contain viruses.

These are the basics of using Windows Mail. There are some stationeries you can use to create messages. I personally don't use them. You can create message rules, you can create your own folders for you left column, like any emails you want to save. You can save an email to send later, and that will be placed into the Drafts folder. You can view your sent items folder. I recommend deleted all unwanted, unneeded emails on a daily basis, this includes the sent folder. You can set up Windows Mail to auto-delete mail that is located in your Deleted items folder and it will do this upon exiting the program. Go to TOOLS, Options for many things that you can do. You can have Windows Mail auto-check and deliver mail every 5, 10, 15, 30 minutes or whenever.

You can save all your email addresses in the Contacts folder located next to your Send/Receive button. Sending a message is simple. Click on Create Mail. Type your message in the open space. Type in a subject in the subject line. In the TO field type the email of the person to whom you are sending your message, you can choose more then one person, use a semi-colon to separate addresses. Windows Mail has memory and will likely give you name options as you begin typing the email address once you start using the program regularly. Having the names and addresses in the Contacts folder enhances that feature. If you have names in the contact folder, rather then typing the name or email address of a person you can click on TO and a box will pop up, just choose who you want to send the message too. CC means carbon copy and BCC means blind carbon copy. What this means is, if you don't want all your contacts to know all your contacts email addresses put all your contacts into the BCC section, except for one, which you'll need to put into the TO section. If you put them all in TO, or CC, then everyone will know everyone else's address. Use BCC for privacy if sending to multiple people.

Another tip: when you get an email message, if you want to add that person to your contact list, just highlight the message (you will see your preview in the lower section) right click, and choose add to contacts. Another note, you can read email in your preview window, or you can double click on the message to open into it's own window. Replying is easy. Click reply, type your message. Click send. Be careful of Reply All. If you were one of several in the TO or CC field and you click Reply All, your message will go to everyone, even if you only intended on one person. To forward a message is not unlike sending a new message. Click forward, type a message if you like, your forwarded message will be below, and then enter the names to which you want to send.

By the way, setting up Windows Mail to check your email accounts will remove those messages from your ISP server. So if you log in to your account via the web, those messages will not be there, they are now stored on your computer, within Windows Mail. You still will be able to check your messages anywhere on any computer, but as soon as you open Windows Mail and those messages download, they will not be in your web account. A note about Hotmail, Yahoo, and Gmail...at this time they are not able to be checked by any other mail client (Windows Mail is a mail client), you have to log in to their sites and check you mail. I believe that Hotmail and Yahoo do have that feature if you don't have a free account. All 3 of them I believe say that you can check other email accounts within your hotmail, yahoo, or gmail account, but in my experience, you can not check Yahoo mail in Hotmail and vice versa. You may be able to check your ISP mail with them if you wanted.




Do not also forget to checked different reviews on the product; and to serve get upright views approximately a manufactured article, Go away blue screen mind exist a great thought to examine a little forums or blogs aimed at real and real opinions.

Friday, January 22, 2010

struggling together with runtime error? idealisation tip guide on how to repair altogether sorts of runtime errors simply


Frets on Fire by valentin.d


A runtime error in Vista occurs when a program currently running encounters a problem. There are several reasons you might experience runtime errors in Vista. Runtime errors often occur when the software being used is out of date or is no longer compatible with Vista. Another instance of runtime errors is the presence of malware or spyware operating in the background while operating various programs. Utilize these steps to stop runtime errors in Vista for a more efficiently operating computer.

Items Needed to Stop Runtime Errors in Vista

Computer

Electricity

Window's Vista

Defrag Program

Anti-Virus Scan Program

Internet Connection

Install New Updates for Vista Regularly

Locate the icon for updating your computer's Vista system. The icon will read, New Updates Available, when you scroll your mouse cursor over it. Click the icon. Follow the directions on your computer screen for updating Vista. Restart your computer when the updates have been installed. This will ensure that they are accepted and implemented by your computer.

Perform a Registry Cleaner Regularly

Run a registry cleaner on your computer. This will remove all files that aren't needed and clean up your computer. A registry cleaner should be run a minimum of once a week.

Perform Virus, Malware or Spyware Scans

Perform a virus, malware and spyware scan on the computer. Follow the directions to remove any suspicious files. Often malware or spyware can result in numerous runtime errors or looping that is very frustrating and difficult to run your computer smoothly. Restart your computer when steps 2 and 3 are complete.

Run a Defrag on Your Computer

Defrag your computer to optimize space and performance after performing the first 3 steps. Schedule a daily defrag on your computer. Restart the computer when the defragmentation is complete.

Update and Reinstall Specific Programs Causing the Runtime Error

Determine if a specific program is causing the runtime error. Open the Window's task manager box. Close the applications running. Open each application one at a time. Watch the computer to see if a runtime error occurs. Uninstall the application causing the error. Reinstall with the latest version. Restart the computer.

Repairing and fixing the problems that cause runtime errors will ensure that your computer operates more efficiently. Runtime errors are not only frustrating to work with; they can cause damage to your computer. Extend the life of your computer and clean it up to avoid runtime errors.

Tips for Avoiding Runtime Errors

Keep your computer free of spyware and malware by visiting websites that you trust.

Warnings about Repairing Runtime Errors

Always have backup files before uninstalling applications and programs.




Source:http://www.articlesbase.com/operating-systems-articles/fix-svchostexe-application-errorsvchostexe-application-error-repair-1487023.html

Thursday, January 21, 2010

Runtime blunder - as is the Runtime blunder as well as in what way to Fix It?


runtime error in metro by fgirardin






Registry errors are most commonly a result of improperly removed software or an incomplete installation. Registry errors can make your computer act in bizarre fashions and leave you grinding your teeth with a hammer in hand. The most common results of registry errors include constant blue screens (or the more infamous blue screen of death), slower performance and internet surfing, runtime errors, system errors, frequent freezing of the computer and other random errors. As such, maintaining your registry, and cleaning it of any registry errors regularly is very important. Many people end up paying hundreds to a technician, or re-installing the whole Windows OS and losing data in hopes of doing away with the errors. In some cases, the registry errors still won't go away and the problem returns very quickly.

Before anything else, what is the registry? The system registry is an important part of and present in all Windows computers. The registry keeps a record and a road-map of every single program that is installed on the computer, and also holds important information about how to run it properly. For example, your registry holds the the important information about how IE should act when you start it - start using file x, with the link b, and so on. If there is a registry error present, their might be an extra step, or a different step on the way that causes your computer to freeze, or an error box to pop up. Think of it as the DNA of your computer that holds all the necessary information for the cell (your computer program) to perform the different functions properly. The registry errors act like something of a mutation and mess up that information. In fact, some viruses will alter this information much like in the real world for some ulterior motive. For example, a virus might introduce a registry error and add in some extra instructions such as - if it's Friday, when you turn on IE, make an extra file with the different passwords and logins and store it on the computer. Then send out the file next Thursday through some channel of communication to a specific source.

Other registry errors can be introduced by Trojans, adware and spyware. When you install a program on your computer, it also adds in more information in you registry. When you remove the program, some of this information might not be removed and exists as a registry error. These instructions conflict with the actual genuine instructions of other programs and cause a delay in the running, or even just shut down the programs all together.

While many people mistake these simple registry errors to be signs of a "bad" PC, or a major issue that needs a professional technician to fix (that also costs hundreds), more than likely it's a registry error that can fixed easily with one of the many different software programs available today. The different kinds of registry errors include:

Missing file associations

Missing startup programs

Invalid device drivers

Invalid application paths

Missing DLL files

Missing help files

Missing system fonts and some others.

You can easily and effectively get rid of most, if not all, registry errors with a cheap and easy to use program. So if your PC is displaying any of these symptoms:

• PC runs much slower than when you first bought it
• PC keeps crashing at critical times
• Unable to remove a software using add/remove dialog
• PC doesn't shutdown correctly
• PC doesn't startup correctly
• PC needs frequent rebooting
• Getting the "Blue Screen of Death

Then you more that likely have registry errors that you will need to fix. And again, just get rid of the registry errors using a good registry fixing software before calling in a technician.

Happy PCing!

 

 

 

 

 




Source: http://www.articlesbase.com/operating-systems-articles/fix-microsoft-visual-c-runtime-library-error-with-registry-cleaner-1396665.html


Wednesday, January 20, 2010

Troubleshooting Common Outlook Error


Rheinblick - Outlook by dolorix



Hi

i re-installed my PC from scratch and just had it running. I checked my email using my email clients microsoft outlook 2003 SP3 and it seems to be working good except when I sent email, every time I sent an email in the subject it has always this error [unknown language 100%]



does anybody have any idea what's causing this? I also installed an antivirus Gdata 2010 the newest one.



Thanks


Hi

i re-installed my PC from scratch and just had it running. I checked my email using my email clients microsoft outlook 2003 SP3 and it seems to be working good except when I sent email, every time I sent an email in the subject it has always this error [unknown language 100%]



does anybody have any idea what's causing this? I also installed an antivirus Gdata 2010 the newest one.



Thanks

"Outlook.pst cannot be accessed - 0x80040116" error usually gets resolved using Inbox Repair tool (Scanpst.exe). Running only Inbox Repair tool doesn't fix Outlook problem though it shows that no errors were found. Reason being index of the .PST file is damaged. For resolving this issue, firstly run the "2 GB Truncation" tool, then run the Inbox Repair tool, and then open the repaired PST file.
Running 2 GB Truncation tool

"2 GB Truncation" tool known as Pst2gb.exe can be downloaded from the Microsoft Download Center. After download, you can see the other files with its exe, which are Msstdfmt.dll, Msvbvm60.dll, Pst2gb.exe, Readme.rtf, and Readme.txt.
(http://www.microsoft.com/downloads/details.aspx?familyid=B33B1DFF-6F50-411D-BBDF-82019DDA602E&displaylang=en)
Now follow the given steps:
1.Click Start, and then click Search.
2.Under What do you want to search for? click All files and folders.
3.In the All or part of the file name box, type *.pst.
4.In the Look in list, click Local Hard Drives (C:), and then click Search.
5.Note the path to the .pst file that you want to repair. By default, this file is named Outlook.pst.
6.Click Start, click Run, type pathpst2gb.exe -s, and then click OK.
7.Click Continue, and then click Browse.
8.Click the .pst file that you want to repair, and then click Open. By default, this file is named Outlook.pst.
9.Click Create, type a new unique file name for the .pst file such as Outlook-2 in the File name box, and then click Save.
10.In the Oversized PST Recovery Tool dialog box, click Start.
11.After you run the tool, click OK, and then click Close.

Running Inbox Repair tool to fix Outlook PST
1.Double-click scanpst.exe file.
2.Click Browse, and then open the folder that contains the new .PST file that you created by using the "2 GB Truncation" tool.
3.Click the new .PST file that you created and then Open.
4.In the Inbox Repair Tool dialog box, click Start.
5.When the file has been scanned, click Repair to repair the errors in the file.
6.When you receive the "Repair complete" message, click OK.
7.Restart the computer.

Now open the new created .PST file with Outlook. During the whole process there are chances of Outlook email data getting corrupt. But you can now fix Outlook PST easily with Outlook recovery software. This software recovers and restores emails and other email stuff from damaged Outlook PST files.

Source:http://www.articlesbase.com/operating-systems-articles/error-with-outlook-0x800ccc0ffix-0x800ccc0f-error-1152712.html

Tuesday, January 19, 2010

Troubleshooting usual Outlook Error


30 Days of Gratitude project: Day 29 Thankful for an optimistic outlook by Chessiekitty





Sometimes, your computer isn’t really under your control. Actually, many a times. And, when you want to log off from your windows xp system, the computer simply denies your command and doesn’t log off XP. Even after many failure attempts and rigorous clicking on the log off button; your windows xp machine doesn’t turn off?


Chances are, you may be encountering problems with your windows xp operating system. The solution being unknown depends on several factors. Some of the common windows xp errors found when you face the Can’t log off problem are..


- Alert Manager Event Interface: Alert Manager Event Interface unable to send alert to \CS-TREASURERpipeAlertManager. Error returned = The system cannot find the file specified.


- Faulting application outlook.ex


- Faulting module mspst32.dll


- Fault address 0×0000f83c

- The COM+ Event System failed to create an instance of the subscriber partition:{41E90F3E-56C1-4633-81C3-6E8BAC8BDD70}!new:{6295DF2D-35EE-11D1-8707-00C04FD93327}. CoGetObject returned HRESULT 8000401A.


Solution to Fix Can’t Log Off Windows XP Machine


Like I said, the solutions may vary. For some of the people, freshly installing outlook on windows xp would vanish this error. To do this, make sure you have already uninstalled outlook from windows xp.


Another way to fix can’t log off message in windows xp is by logging into xp system as an administrator and log off any other sessions.


Last but not the least, update your windows using windows update options which will fix such bugs and updates your computer for optimal security.


If you want to shut down XP then open your task manager using ctrl+alt+del and do it using the shut down option. I hope this solutions for solving windows unable to log off problem is fixed using any of the above methods.
















Source:http://www.articlesbase.com/operating-systems-articles/fix-outlook-0x80042109-error-with-registry-cleaner-1234190.html


Sunday, January 17, 2010

Troubleshooting Common Outlook Error


Microsoft Office Outlook by valentin.d


Many people have loads and loads on personal contacts in their Outlook email contacts folder and if they are moving to a new computer these contacts won't be stored on the new machine. So they need to make a backup of these and import them into the Outlook on their new machine. If you follow the below steps you can easily save your personal contacts on a CD/DVD/USB drive and then import them back into Outlook on your new machine. This will save you hours of re-entering your contacts into the list.

To back up the Contacts folder, you need to export the folder to a file in Personal Folders file (.pst) (Personal Folders file (.pst): Data file that stores your messages and other items on your computer. You can assign a .pst file to be the default delivery location for e-mail messages. You can use a .pst to organize and back up items for safekeeping).

  1. On the File menu, click Import and Export.
  2. Click Export to a file, and then click Next.
  3. In the Create a file of type list, click Personal Folder File (.pst), and then click Next.
  4. In the Select a folder to export from list, click Contacts.
  5. If you have subfolders below the Contacts folder that you want to include, select the Include subfolders check box.
  6. Click Next.
  7. Click Browse, choose a location for the file, such as My Documents, and then type a name for your backup file, such as ContactsBackup.pst.
  8. Click OK.
  9. Click Finish.
  10. In the Name box, type My Contacts Backup.
  11. Type the encryption and password settings if you need them, and then click OK
If you follow these simple steps in no time you will have a file that you can put on your CD/DVD/USB drive and hold onto until you get to your new machine and then you can simply import this file back into your Outlook. Once imported back into Outlook it will look identical to the way you had it before in your Outlook on your old machine. I know this is all explained in a juvenile way but most people who will need this tutorial don't know much about Outlook and need it explained simply so they can follow along. Once you have the exported contacts then follow these next steps to import the list on another computer.
  1. On the File menu, click Import and Export.
  2. Click Import form another program or file, and then click Next.
  3. In the Select file type to import from list, click Personal Folder File (.pst), and then click Next.
  4. In the Select a file to import list, click find your file.
  5. In the options choose the option you would like (replace, allow, or do not import duplicates)
  6. Click Next.
  7. Click Finish and it will import the .pst file and put the files where you specified.


Once you have completed all of the steps above then you will want to check the location where you put the files, in my case I want to check the contacts list and see if the new ones were put in there. This process can be used to transfer contacts from one machine to another for your Outlook 2003. Since these files are saved on the local machine and not on the exchange server if you don't do the import export then you will have to re-enter all of this information.




Source:http://ezinearticles.com/?Fix-Stop-Error-0x00000024-With-a-Registry-Cleaner&id=2884563


Wednesday, January 13, 2010

struggling opposite windows bsod? How to repair depressed shade of genocide on Windows XP the easy way


Windows Xp Dektop by LifesSweetDrug



I'm working on this page:

http://198.106.206.166/gbs-matte-eyeshadow.html



When I select an option ("Click here to select") my table of options shows with the swatches. This works fine in FF and IE.



However, when I actually click one of the options, I'm using innerHTML to re-write the main table content. It works great in FF, but gives me an error in IE7.



I've read that this is usually caused by two issues: 1) nested form tags, which I don't have and 2) improper HTML that's being writting using the innerHTML, which I think I've checked a few times.



Anyone see what I'm missing here?



Thanks




DISCLAIMER: This site does not store any files on its server. We only index and link to content provided by other sites. All the files are from internet.
In case of any query/objection regarding copyright or privacy, please inform us at Contact us and leave your comment here. We will immediately respond to you.



Download Free Ebook Video Training is powered by Wordpress.
Wordpress theme designed by Design Blog.


Copy: how to fix windows registry errors

Tuesday, January 12, 2010

Struggling opposite windows blue screen? Donot panic, check out to obtain a idealisation solution


Logitech LX 710 - Windows Vista Orb by Ticky_


In the Windows Operating System there is a little known about file known as the Registry. The Registry is a database that holds all of the important information that makes the Windows Operating System run efficiently. In many instances where the Operating System stops, working it can be attributed to a corrupted Registry. Therefore, it is important to perform preventive maintenance on the Registry, just as you would your hard drive.

As information is changed, and software is added, the Registry grows in size. The Registry is very similar to the hard drive in your computer. Over time, it becomes cluttered with irrelevant information and can even become fragmented as software is installed or uninstalled. This fragmenting of the data in the Registry will negatively affect your computers performance.

Software utilities are a great way to maintain and keep your Registry in peak condition. However, we must consider which is best to use, one of the many free programs available on the Internet, or purchased software from a program developer. I am reminded of an old saying, which goes, "You get what you pay for," and this holds true even where computer software is concerned. It has been my experience over the years that not all software is equal. There are very distinct differences between free and paid software.

I have found system utilities to be a very important part of keeping my computer productive and error free. Utilities that clean and defragment the Windows Registry are very important and should not be overlooked. I have used many free Registry cleaning and defragmenting software packages, but they never seemed to do a very good job, and almost never delivered the results that I was hoping for.

In my time using the free software packages that are supposed to clean and optimize the Windows Registry, I have yet to find one that does a decent job. I find many entries in the Windows Registry that I know are invalid or even wrong and after running the free software, those entries are still there.

Many of the free software being offered on the Internet are in perpetual development. This means that while you do have the ability to use it, it is still being worked on and has many bugs, which are being addressed as they arise. This software is in general only subject to very low quality assurance standards. Unfortunately, some of these programs are very poorly written and when they are used, they may remove important data from the Registry and cause your computer to crash or stop working at all.

In my opinion, it is simply a wise practice to purchase software rather than download the free stuff. With purchased software, you can be assured that you have software that has gone through rigorous quality assurance and that you can receive technical support should the need should arise.

One of the best Registry utilities I have found is Sammsoft's "Advanced Registry Cleaner." I have run comparison tests with other software and I have found that "ARC" does the best job at cleaning the Registry and removing obsolete Registry entries. It is important to realize that your computer represents a very large investment on your part and it is just as important to maintain it just as you would your car. It is important that you use the right tools for the job if you want your computer to work properly and efficiently.

Links

Sammsoft Advanced Registry Cleaner
http://www.registryoptimizer.com/

Sunday, January 10, 2010

Is your Computer intensely delayed? Here have been Some Tips To Improve the opening of your computer


windows 7 Build 7057 (RC1) en mi Acer Aspire One by Taller Hikari


Is your computer suddenly running slower than usual? Are there some programs or files that suddenly you can't access or open? These are just few of the problems computer users like you face. If your computer suddenly behaves differently than usual, it is quite certain that there is a problem. What you don't know is that a virus maybe causing all of your issues.

Viruses are rampant nowadays. Sometimes you don't even know you have one, until it makes your computer crash. Nobody wants that to happen. There are a number of ways on how to avoid being infected by these viruses.

I'm pretty sure you have heard about some of the anti-virus applications in the market. If you don't have one, you'd better install one. There are numerous anti-virus applications online that can be downloaded for free. These applications are your main line of defense against these viruses.

If you already have an anti-virus installed, you may think you are all set. Not yet. You have to keep your application up-to-date. Updated anti-viruses will protect you from the latest threats in the internet. You can set the program to look for updates on a regular basis. In addition, you should also set the program to automatically scan your computer regularly. This way, you are ensuring that your computer is clean and safe at all times.

In line with this, you should also be careful in opening emails and email attachments. If you do not know, viruses can easily spread in emails. If one of your email contact's computers is infected, it could send by itself to your email address. Thus, giving you the virus in the form of email attachments. In order to avoid this, you should be very careful in opening emails. You can do this by first checking the sender and the subject line. Try to see if this sender would typically send you an email with that subject line. If it seems out of the ordinary, then you might as well check it with the sender if he or she really sent you that email. Furthermore, you should always scan all email attachments before opening them in your computer.

Along with the anti-virus, you should also have a firewall installed. No, I'm not referring to the one you put at your houses to prevent fire from spreading. I'm talking about a firewall application for your computer. To keep it simple, a firewall acts like a gatekeeper between your computer and the internet. It checks out everything that goes in and goes out of your computer. In this way, you can prevent hackers and identity thefts in breaking in your computer and steal important information such as credit card numbers and bank account numbers. Also, you somehow prevent unwanted files that could be possible threats for your computer. Through firewalls, you can also control which programs can gain access to the internet.

These things that I have mentioned are the most basic ways in protecting your computer along with the data you have in it. As all things in the world, you cannot expect everything to be perfect. New viruses come out on a regular basis. Because of this, I suggest that you should always have a backup copy of your files. When I say backup, I do not mean that you save another copy of the files on the hard drive. But rather, you should save them in an external storage device. These external storage devices can be in the form of USB flash drives, CDs, and even DVDs. In doing so, you secure all your important files just in case something unexpected happens.

Article Resource: Benjamin Cance