tag:blogger.com,1999:blog-45470756503004475732024-03-13T01:20:56.963-07:00Computers & TechnologyThis blog is for technology oriented people who wants to know new rapidly changing technologies.
http://feeds.feedburner.com/blogspot/farjadfarjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.comBlogger135125tag:blogger.com,1999:blog-4547075650300447573.post-73484585221994150852013-04-16T22:34:00.001-07:002019-05-03T08:05:05.379-07:00How to export ISA Server 2004 rules to excel 2007After a very long time I am back with another tip for my readers.The common practice done by most system administrators is to document the configurations and final solutions of anything performed by them for their future use and reference. So here I am going to explain how to export ISA Server 2004 Firewall policies into excel 2007.<br />
<span style="font-size: large;"><b> </b></span><br />
<span style="font-size: large;"><b>Applications involved:</b> </span><br />
<br />
• ISA Server 2004<br />
• Windows 7 on client side {As I have done it on windows 7}<br />
• Excel 2007<br />
• ISA2XLSV2.hta {Use to read rules from xml file}<br />
<br />
<span style="font-size: large;"><b>Procedure:</b> </span><br />
<br />
<b>Step # 1:</b> Move on to Server Machine on which ISA Server 2004 is installed<br />
<b>Step # 2:</b> Now open ISA Server Management Console<br />
<b>Step # 3:</b> Expend the server<br />
<b>Step # 4:</b> Select Firewall policy<br />
<b>Step # 5:</b> Right click on “Firewall policy” and select Export<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4C5bcCh1RHrSvyEanT-5J9cBCDwIHxEqVmWrL-_kdF0kgseDcmfogHFXoWVoX6QJKDlSVmv2f87zsRtzIpP3Lxn06tKsVDuYNwzT2FkQAwib-K_Y33UGEIIh_KALVJRdZtZKUTUkTFYWg/s1600/export.JPG" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4C5bcCh1RHrSvyEanT-5J9cBCDwIHxEqVmWrL-_kdF0kgseDcmfogHFXoWVoX6QJKDlSVmv2f87zsRtzIpP3Lxn06tKsVDuYNwzT2FkQAwib-K_Y33UGEIIh_KALVJRdZtZKUTUkTFYWg/s320/export.JPG" /></a><br />
<br />
<b>Step # 6: </b>Now save the file on your desired place. This will export all the group policies into an xml file.<br />
<b>Step # 7:</b> Here we require tool named ISAInfo2XLS.hta which can be downloaded from <a href="http://www.4shared.com/file/LXRXnxR-/ISAInfo2XLSv2.html" target="_blank">Here </a><br />
<b>Step # 8:</b> Now import your xml file in this tool<br />
<b>Step # 9:</b> Expend “Firewall Policy” tab and click on “Array Rules”<br />
<b>Step # 10:</b> Copy all the data from right pane and past it into a text file.<br />
<b>Step # 11:</b> Now open ms excel and press open select file type to “All Files” and now locate your text file press ok<br />
<b>Step # 12:</b> It will run automatically run “Text Import Wizard” from here select “Delimited” and press next<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3j8S672A0kOg-K2H2k_Ov_J7SqKWbvUMCziapQjCGJuqW3jEcuRhAeG_ViD6mzjZrdtonZihYYteeGEzjnGrcS2_3T_wkjtHCV6cqtBmvKQdR9BSwvfdC9HKGd4g6WjmMYy9LL9xJKPae/s1600/1.jpg" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3j8S672A0kOg-K2H2k_Ov_J7SqKWbvUMCziapQjCGJuqW3jEcuRhAeG_ViD6mzjZrdtonZihYYteeGEzjnGrcS2_3T_wkjtHCV6cqtBmvKQdR9BSwvfdC9HKGd4g6WjmMYy9LL9xJKPae/s320/1.jpg" /></a><br />
<br />
<b>Step # 13:</b> On this screen select others and type a pipe sign from keyboard “ | ” looks like this and press next<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOx9N2aAmC9GPwz7M71tJORY1MbM4vkkcb7fMCzD9SABr1LvmjaTEgHzR-Q00pZohhvn8UXe2_inhdM0KAgBEEB_9pVNDOlunK0HaxOLL5YZN8VOngxWLMZxSqgmrsxDMNKxRoByaUZnr3/s1600/2.jpg" imageanchor="1"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOx9N2aAmC9GPwz7M71tJORY1MbM4vkkcb7fMCzD9SABr1LvmjaTEgHzR-Q00pZohhvn8UXe2_inhdM0KAgBEEB_9pVNDOlunK0HaxOLL5YZN8VOngxWLMZxSqgmrsxDMNKxRoByaUZnr3/s320/2.jpg" /></a><br />
<br />
<b>Step # 14:</b> On next screen just press “Finish”. It will generate your desired file.<br />
<b>Step # 15:</b> Now you have to format it a bit as per your requirement.<br />
<br />
So there you go. Now you have all firewall policies in excel format {You can do the same for all kind of ISA server policies like system policies etc}. Hope you all find it useful for documenting the firewall or other ISA server policies. farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0Pakistan30.375321 69.34511599999996216.438034000000002 48.690818999999962 44.312608 89.999412999999961tag:blogger.com,1999:blog-4547075650300447573.post-4318140618791094382010-08-25T21:19:00.000-07:002010-08-25T23:20:59.125-07:00System Preventive Maintenance Guidelines<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFPjWL8rJJDLXvS65POER9NUbtnnfOAJ1X7qpISdj48P1lMX2NLTvTg4xTUi0ebftdCHo0zUwHuirj7a4LRVeSD947PIXKcmHQDs2O7IL-XR1PZR4zK7hZ3Y1BsA9c66noK3QChRtAwrK6/s1600/computer+fix.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 294px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFPjWL8rJJDLXvS65POER9NUbtnnfOAJ1X7qpISdj48P1lMX2NLTvTg4xTUi0ebftdCHo0zUwHuirj7a4LRVeSD947PIXKcmHQDs2O7IL-XR1PZR4zK7hZ3Y1BsA9c66noK3QChRtAwrK6/s320/computer+fix.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5509592404797042418" /></a><br /><br />After a long time Faizu Baba is back again with some of the guidelines so that people can take proactive actions to avoid system crash.<br /> <br /><span style="font-weight:bold;">Preventive maintenance</span><br /><br />Preventive maintenance refers to carrying out measures to prevent problems from occurring, in contrast to corrective maintenance, which seeks to solve an already-existing problem. In the long run, preventive maintenance saves time and money, protects your data, improves computer performance, and prolongs computer life. These are accomplished by considering and planning for the risks involved in working with computers (e.g. data loss, hardware failure). Preventive maintenance can be classified into following:<br /><br />1. Hardware Maintenance<br />2. Software Maintenance<br /><br /><span style="font-weight:bold;">Hardware Maintenance</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglB67AcFUP2EmhKmGicDf9qdpJW7CgIRvleuG_GEVTHSmJT_ZP3ujiIjP62qalM6TKvb1Da6Lf3TjlTt4t4M-lLglmf_3m5VTk0sid0RRzW_HcaatD6VU718k8c9uJ0s8JFKfUywyF4wVY/s1600/halt.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 74px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglB67AcFUP2EmhKmGicDf9qdpJW7CgIRvleuG_GEVTHSmJT_ZP3ujiIjP62qalM6TKvb1Da6Lf3TjlTt4t4M-lLglmf_3m5VTk0sid0RRzW_HcaatD6VU718k8c9uJ0s8JFKfUywyF4wVY/s320/halt.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5509579159583512194" /></a><br />Hardware maintenance encompasses preventive maintenance of following items:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXVzKQW9lR6cGzowqJDSHOmZFtFYk10eEuiQE3xZXgPfrKsdD4fe_GO9dP6HfpJzPEoqEKESYWJ8KcnzuTI9TlLoK2Ea6CsuHc7LBqjRgLdCPnbIcTNuALBX1R0L_ClnaAtkh5O5XO_Prt/s1600/computer-fix-it-guy.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 318px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXVzKQW9lR6cGzowqJDSHOmZFtFYk10eEuiQE3xZXgPfrKsdD4fe_GO9dP6HfpJzPEoqEKESYWJ8KcnzuTI9TlLoK2Ea6CsuHc7LBqjRgLdCPnbIcTNuALBX1R0L_ClnaAtkh5O5XO_Prt/s320/computer-fix-it-guy.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5509597485416280498" /></a><br />Clean the case: Wipe the case and clear its ventilation ports of any obstructions. Compressed air is great for this, but don't blow dust into the PC or its optical and floppy drives. Keep all cables firmly attached to their connectors on the case.<br /><br />Maintain the mouse: When a non-optical mouse gets dirty, the pointer moves erratically. Unscrew the ring on the bottom of the unit and remove the ball. Then scrape the accumulated gunk off the two plastic rollers that are set 90 degrees apart inside the ball's housing. Similarly when an optical mouse gets dirty clean its bottom protrude edges<br /><br />Keep a keyboard neat: Turn the keyboard upside down and shake it to clear the crumbs from between the keys. If that doesn't suffice, blast it (briefly) with compressed air.<br /><br />Make your monitor sparkle: Gently clean the screen with a standard glass cleaner, such as Glint, and a lint-free cloth.<br /><br />Check your power protection: Do not connect power sources directly into wall outlets but rather connect them first to some form of surge protector. Surge protectors prevent electrical surges from destroying hard drives and erasing data.<br />Swipe your CD and DVD media: Gently wipe each disc with a moistened, soft cloth. Use a motion that starts at the center of the disc and then moves outward toward the edge. Never wipe a disc in a circular motion.<br /><br />Clean the CD-ROM drive: Clean the laser. One can use cleaning media for this purpose. Many programs are installed corrupted from a dirty CD reader.<br /><br />Give an Air Below: Give the system an air below in around 4-6 months. However, if the computer is operates in a dusty environment, it should be cleaned more frequently. But before give it an air below do not forget to unplug all the connections inside and outside the CPU. Also put emphasis on the slots of all cards and RAM banks.<br /><br />Change of CMOS: If your system is 4-5 years old then it is recommended to change your CMOS or you can do it when the system asks to do so. <br /><br />Swipe the RAMS and Cards: Gently wipe the dust from the RAM and all other cards by using an eraser and Tissue paper. Check rams with utility called memtest86 (but it is a time taking activity) (http://www.memtest.org/) <br /><br />Periodic Checkups: Also check the hardware with some hardware diagnostic utilities like <br />• #1-TuffTEST-Lite™ PC Diagnostic (http://www.tufftest.com/tt01-lite.htm)<br />• Sandra Standard (http://www.softsea.com/review/SiSoft-Sandra-Standard.html)<br /><br />Periodic Checkups of HDD: Always check the hard drive status by scandisk, chkdsk and by enabling S.M.A.R.T option in BIOS.<br /><br />Hardware Upgrades: Proactively upgrade the hardware by forecasting the upcoming needs. Before installing any software also check its minimum hardware requirements and act accordingly.<br /><span style="font-weight:bold;"><br />Software Maintenance</span><br /> <br />Firmware Upgrades: Check the vendor’s website for latest firmware version for the system. It is recommended to upgrade the firmware if the vendor suggests it as a critical update or the system is generating issues.<br /><br />Driver Update: Always keep the system up to date with latest drivers from vendor’s website so the system can work more efficiently.<br /><br />Windows Service Pack Upgrades: Check the vendor’s website time to time for latest service packs of Windows and update the systems with it.<br /><br />Windows Update: After updating the service just not finishes the task, one should download and install the windows updates time to time from Microsoft’s site (http://www.update.microsoft.com/windowsupdate/v6/default.aspx?ln=en-us). So the system becomes updated with latest fixes, malicious software removal tool and etc.<br />Get rid of Temporary files: If the system has multiple profiles on it and expose to internet very frequently then it must contain temporary files that occupies lots of disk space and cache which cause slow performance. So periodically empty all the temporary internet files, files in Recycle Bin, C:\Windows\Temp, C:\Windows\Prefetch and the temporary folder in user’s own profile. Do not forget to remove files with a tilde (~). <br />To do it more easily and efficiently use a tool called CCleaner which can be downloaded from following URL (http://www.piriform.com/ccleaner).<br /><br />Delete .zip files: Users unzip files on their system and leave the zip files which occupy the space on disk.<br /><br />Set Swap files: By default, Windows automatically adjusts your swap file's size to meet its needs. A nearly full hard disk squeezes your swap file, and this can lead to sluggish performance or sometimes a system crash. Freezing the swap file's size may increase system performance because Windows no longer has to adjust the file size, but it also increases your PC's risk of running out of memory. So it is recommended to save only important data (frequently needed data) as permanent.<br /><br />Remove Old Programs: Periodically remove all unnecessary programs, like games, old versions of same utilities / softwares and etc. For un-installation one can use windows add/remove program utility but it leaves orphaned registry keys so more effective way is to do this by a utility named Revo-Uninstaller (http://www.revouninstaller.com/). This utility not only removes the program but also its registry values.<br /><br />Registry cleaning: Adding and removing system components leaves orphaned entries in the Windows Registry. This can increase the time your PC takes to boot and can slow system performance. So, one should run registry cleaner periodically. Some good registry cleaning tools are<br />• RegistryDrill (http://www.easydesksoftware.com/regdrill.htm)<br />• RegistryCleaner(http://www.eusing.com/free_registry_clean/registry_cleaner.htm)<br /><br />Disk Defragment: Windows stores files on a hard drive in rows of contiguous segments, but over time the disk fills and segments become scattered, so they take longer to access to keep the disk in shape run Windows' Disk Defragmenter utility. But defragmentation does not defragment swap files so doing it more efficiently use a utility named Defraggler (http://www.piriform.com/defraggler) it will defrag swap files as well.<br /><br />Removal of duplicate files: Users mostly create multiple copies of same files to avoid so by removing them one should save lots of space on HDD for this use following utilities:<br /><br />• Auslogics' Duplicate File Finder (http://download.cnet.com/Auslogics-Duplicate-File-Finder/3000-2248_4-10964299.html)<br />• Duplicate Cleaner (http://download.cnet.com/Duplicate-Cleaner/3000-2248_4-11309622.html)<br /><br />Avail system’s best performance: Always use system on best performance. For this move right-click My Computer and choose Properties. Click Advanced, and then choose the Settings button under Performance now select “Adjust for best performance”.<br /><br />Startup Programs: Remove all unnecessary programs from startup. For this move on Start → Run → type msconfig now move on to startup tab and uncheck all unnecessary programs.<br /><br />Check for memory Leaks: Always keep an eye on the memory leaks. For this one can use system monitor or sysinternal’s utility called Process Explorer which can be downloaded from here (http://technet.microsoft.com/en-us/sysinternals/bb896653.aspx).<br /><br />Antivirus update: Always keep update the antivirus with latest definitions.<br /><br />Antispyware & Antimalware: Today viruses are not the only risk so keeping update with antispyware and antimalware enables system work more effectively & efficiently. Antispyware and antimalware are as follows<br /><br />• Malewarebytes (http://www.malwarebytes.org)<br />• SuperAntispyware ( http://www.superantispyware.com/)<br />• Hitmanpro's Surfright (http://www.surfright.nl/en/hitmanpro)<br /><br />Data Placement: Educate the user to place data on his secondary partition and create its shortcut on the desktop. This will also make system faster as C: drive only use for installed applications.<br /><br />Data Backup: Educate the user to place his/her important data on server and on network shares or in home directory. So they should be on minimum risk.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com1tag:blogger.com,1999:blog-4547075650300447573.post-85432945009408054032010-05-17T22:59:00.000-07:002010-05-17T23:49:33.343-07:00How to Reset BIOS passwordHello friends, I am here with one of the most craziest problem's solution which is BIOS passwords. Mostly people set passwords on Bios and somehow they forgot those and put themselves in the fix. Now here is the solution for password reset.<br /><br />Here i am going to tell you the password reset process by following ways:<br /><br />1.Resetting the BIOS Password using Hardware<br />2.Resetting the BIOS Password using Software<br />3.Using a Backdoor BIOS Password<br />4.By vendor specific solution<br /><br /><span style="font-weight:bold;">Resetting the BIOS Password using hardware<span style="font-style:italic;"></span></span><br /><br />In this process we use the traditional ways of password resetting. As we all know the BIOS password is stored in CMOS memory that is maintained while the PC is powered off by a small battery, which is attached to the motherboard. If you remove this battery, all CMOS information (including the BIOS password) will be lost. You will need to re-enter the correct CMOS setup information to use the machine. The machines owner or user will most likely be alarmed when it is discovered that the BIOS password has been deleted.<br /><br />On some motherboards, the battery is soldered to the motherboard, making it difficult to remove. If this is the case, you have another alternative. Somewhere on the motherboard you should find a jumper that will clear the BIOS password. If you have the motherboard documentation, you will know where that jumper is. If not, the jumper may be labeled on the motherboard. If you are not fortunate enough for either of these to be the case, you may be able to guess which jumper is the correct jumper. This jumper is usually standing alone near the battery. If you cannot locate this jumper, you might short both of the points where the battery connects to the motherboard.<br />If all else fails, you may have to clear the BIOS password by resetting the RTC (Real Time Clock) IC (Integrated Circuit) on your motherboard.<br /><br />Many RTC's require an external battery. If your RTC is one of this type, you can clear the BIOS password just by unsocketing the RTC and reseating it.<br /><br />RTC's which require external batteries include:<br /><br /> * Dallas Semiconductor DS12885S<br /> * TI benchmarq bq3258S<br /> * Motorola MC146818AP<br /> * Hitachi HD146818AP<br /> * Samsung KS82C6818A<br /><br />Most RTC chips with integrated batteries can be reset to clear the BIOS password by shorting two pins together for a few seconds.You can discover how to reset the BIOS password stored in most RTC (Real Time Clock) chips by reading the manufacturers data sheet for that RTC. Some RTC's, like the Dallas DS1287 and TI benchmarq bq3287mt cannot be cleared. The solution to resetting the BIOS password on systems with those RTC's is to purchase a replacement RTC chip.<br /><br /><span style="font-weight:bold;">Resetting the BIOS Password using Software<span style="font-style:italic;"></span></span><br /><br />Many software also provide the functionality to resetting the password as we know every system must store the BIOS password information somewhere. If you are able to access the machine after it has been booted successfully, you may be able to view the BIOS password. You must know the memory address where the BIOS password is stored, and the format in which the BIOS password is stored. Or, you must have a program that knows these things.<br /><br />You can write your own program to read the BIOS password from the CMOS memory on a PC by writing the address of the byte of CMOS memory that you wish to read in port 0x370, and then reading the contents of port 0x371.<br /><br /><a href="http://www.11a.nu/software/bios-pc-bios-security-and-maintanance-toolkit/">!BIOS</a> will recover the BIOS password for most common BIOS versions, including IBM, American Megatrends Inc, Award and Phoenix.<br /><br /><a href="http://www.cgseurity.org/wiki/CmosPwd">CmosPwd</a> will recover the BIOS password for the following BIOS versions:<br /><br />* ACER/IBM BIOS<br />* AMI BIOS<br />* AMI WinBIOS 2.5<br />* Award 4.5x/4.6x/6.0<br />* Compaq (1992)<br />* Compaq (New version)<br />* IBM (PS/2, Activa, Thinkpad)<br />* Packard Bell<br />* Phoenix 1.00.09.AC0 (1994), a486 1.03, 1.04, 1.10 A03, 4.05 rev 1.02.943, 4.06 rev 1.13.1107<br />* Phoenix 4 release 6 (User)<br />* Gateway Solo - Phoenix 4.0 release 6<br />* Toshiba<br />* Zenith AMI<br /><br /><span style="font-weight:bold;">Using a Backdoor BIOS Password<span style="font-style:italic;"></span></span><br />Some BIOS manufacturers implement a backdoor password. The backdoor password is a BIOS password that works, no matter what the user sets the BIOS password to. These passwords are typically used for testing and maintenance. Manufacturers typically change the backdoor BIOS passwords from time to time.<br />AMI Backdoor BIOS Passwords<br /><br />Reported AMI backdoor BIOS passwords include A.M.I., AAAMMMIII, AMI?SW , AMI_SW, BIOS, CONDO, HEWITT RAND, LKWPETER, MI, and PASSWORD.<br />Award Backdoor BIOS Passwords<br /><br />One reported Award backdoor BIOS password is eight spaces. Other reported Award backdoor BIOS passwords include 01322222, 589589, 589721, 595595, 598598 , ALFAROME, ALLY, ALLy, aLLY, aLLy, aPAf, award, AWARD PW, AWARD SW, AWARD?SW, AWARD_PW, AWARD_SW, AWKWARD, awkward, BIOSTAR, CONCAT, CONDO, Condo, condo, d8on, djonet, HLT, J256, J262, j262, j322, j332, J64, KDD, LKWPETER, Lkwpeter, PINT, pint, SER, SKY_FOX, SYXZ, syxz, TTPTHA, ZAAAADA, ZAAADA, ZBAAACA, and ZJAAADC.<br />Phoenix Backdoor BIOS Passwords<br /><br />Reported Phoenix BIOS backdoor passwords include BIOS, CMOS, phoenix, and PHOENIX.<br />Backdoor BIOS Passwords from Other Manufacturers<br /><br />Reported BIOS backdoor passwords for other manufacturers include:<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1dVAzltSVBEiQkovrb8TqmwkHwV5ItvVbCwNUt0HCSxzTDUlre6j4scaXlAFHrI-QhJeHJVKQC7ucDUned_cvVriObNMAY8tcz9HXmHhqcU1mOKuvVgc5SAMT211MTsjsAOo1e7R0lQBI/s1600/manu.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 185px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1dVAzltSVBEiQkovrb8TqmwkHwV5ItvVbCwNUt0HCSxzTDUlre6j4scaXlAFHrI-QhJeHJVKQC7ucDUned_cvVriObNMAY8tcz9HXmHhqcU1mOKuvVgc5SAMT211MTsjsAOo1e7R0lQBI/s320/manu.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5472494287964083890" /></a><br />Remember that what you see listed may not be the actual backdoor BIOS password, this BIOS password may simply have the same checksum as the real backdoor BIOS password. For Award BIOS, this checksum is stored at F000:EC60.<br /><br /><span style="font-weight:bold;">Vendor Specific Solutions for Resetting the BIOS Password<span style="font-style:italic;"></span></span><br /><br />Most vendors provides their own solutions for password resetting like <br /><span style="font-style:italic;"><br />Dell soluiton</span><br />Dell Dimension BIOS Password Recovery<br /><br />The BIOS password may be cleared from a Dell Dimension by moving the password jumper on the motherboard.<br /><br />The location of the password jumper on a Dell Dimension motherboard can be found by reviewing the Dimension User Guides.<br /><br />For most Dell Dimension desktops, the steps to reset a BIOS password and clear all CMOS settings are:<br /> * Locate the 3-pin CMOS password reset jumper on the system board.<br /> * Remove the jumper plug from pins 1 and 2.<br /> * Place the jumper plug on pins 2 and 3 and wait approximately 5 seconds.<br /> * Replace the jumper plug on pins 1 and 2.<br /><br />Dell Optiplex BIOS Password Recovery<br /><br />The BIOS password may be cleared from a Dell Optiplex by removing the password jumper (PSWD) from the motherboard.<br /><br />The location of the password jumper on a Dell Optiplex motherboard can be found by reviewing the Optiplex User Guides.<br /><br />For most Dell Optiplex desktops, the steps to reset a BIOS password and clear all CMOS settings are:<br /><br /> * Locate the 3-pin CMOS password reset jumper on the system board.<br /> * Remove the jumper plug from pins 1 and 2.<br /> * Place the jumper plug on pins 2 and 3 and wait approximately 5 seconds.<br /> * Replace the jumper plug on pins 1 and 2.<br /><br />Dell Inspiron BIOS Password Recovery<br /><br />Each Dell Inspiron has a master password which will clear the BIOS password. You can get this number by calling Dell Technical Support at (800)624-9896.<br /><br />Dell Technical Support will request the Service Tag and Express Service Code from the bottom of your Inspiron.<br /><br />If you were not the original owner of the Inspiron, Dell will transfer registration of the used Inspiron from the original owner with only the Service Tag and Express Service Code from the tag on the laptop.<br /><br />To transfer the registration of a used Dell Inspiron, fill out the Transfer of Ownership form on Dell's web site.<br /><br />Dell Latitude BIOS Password Recovery<br /><br />Christophe Grenier has written a program that will calculate the master BIOS password for Dell Latitudes from the Service Tag number. That program is available at http://www.users.globalnet.co.uk/~skynet/zips/latitude.exe.<br /><br />If you cannot boot your Latitude to run this program, you can get the master password for your Dell by calling Dell Technical Support at (800)624-9896.<br /><br />Dell Technical Support will request the Service Tag and Express Service Code from the bottom of your Latitude.<br /><br />If you were not the original owner of the Latitude, Dell will transfer registration of the used Latitude from the original owner with only the Service Tag and Express Service Code from the tag on the laptop.<br /><br />To transfer the registration of a used Dell Latitude, fill out the Transfer of Ownership form on Dell's web site.<br /><br /><span style="font-style:italic;">IBM solution</span><br />An IBM ThinkPad laptop can have three hardware passwords set:<br /> * Power-On Password<br /> * Hard Disk Password<br /> * Supervisor Password<br />Power-On Password<br /><br />RT/CMOS RAM has 8 bytes reserved for the power-on password and the check character. The 8 bytes are initialized to hex 00. The microprocessor can access these bytes only during POST. After POST is completed, if a power-on password is installed, the password bytes are locked and cannot be accessed by any program.<br /><br />During power-on password installation, the password (1 to 7 characters) is stored in the security space.<br /><br />Installing the password is a function of the built-in system program Easy-Setup. The power-on password does not appear on the screen when it is installed, changed, or removed. After the power-on password has been installed, it can be changed or removed only during POST.<br /><br />Hard Disk Password<br /><br />The hard-disk password (HDP) protects the data on your removable hard disk drive from being accessed by unauthorized persons.<br /><br />Supervisor Password<br /><br />The supervisor password protects the system information in Easy-Setup from being changed by unauthorized persons.<br /><br />How to Reset an IBM ThinkPad Power On Password using Software<br /><br />If you can boot the IBM ThinkPad, KeyMaker will recover the BIOS password.<br /><br />How to Reset an IBM ThinkPad Power On Password Using Hardware<br /><br />If you cannot boot the ThinkPad, you will have to reset the IBM ThinkPad password via hardware.<br /><br />If only the power-on password is set, do the following to remove the power-on password.<br /> 1. Power off the computer<br /> 2. Remove the DIMM cover on the bottom side of the computer.<br /> 3. Short-circuit the two password pads or put a jumper on the contacts to short the circuit.<br /> 4. Under the short-circuit condition, power on the computer and wait until the POST ends. After the POST ends, the password prompt does not appear. The power-on password is removed.<br /> 5. Reinstall the DIMM cover.<br /><br />If both the power-on password and the supervisor password are set, do the following to remove the passwords:<br /> 1. Power on the computer by pressing and holding F1.<br /> 2. Enter the supervisor password. The Easy-Setup menu appears.<br /> 3. Click on the Password icon.<br /> 4. Click on the Power on icon.<br /> 5. Enter the supervisor password and press the Space bar.<br /> 6. Press Enter twice.<br /> 7. Click on Exit; then click on Restart.<br /><br /><span style="font-style:italic;">Toshiba's Solution</span><br /><br />Older Toshiba laptops can be convinced to boot without their power-on BIOS password by attaching a dongle to the parallel port which crosses a number of the pins. The pin out is:<br /><br />Pins<br />1-5-10<br />2-11<br />3-17<br />4-12<br />6-16<br />7-13<br />8-14<br />9-15<br /><br /><span style="font-style:italic;">Acer Solution</span><br />If you can boot the Acer, you may be able to reset the BIOS password using Acer eSettings Management.<br /><br /> * Click the Start button<br /> * Click the All Programs menu item<br /> * Click the Empowering Technology menu item<br /> * Click the Acer eSettings Management menu item<br /> * Once inside Acer eSettings Management, click the Security button.<br /><br />Sending Your Computer to Acer to a BIOS Password Reset<br /><br />Acer refuses to assist customers with BIOS password issues. The only option they will discuss involves sending them your laptop and paying a $100 fee.<br /><br /><span style="font-style:italic;">Resetting an Acer BIOS Password Using Hardware</span><br /><br />If you cannot boot the Acer and don't want to send your computer back to Acer for an unknown amount of time, you can try to reset the BIOS password via hardware.<br /><br />you can reset the Acer BIOS passwords by simply opening the notebooks and removing the CMOS batteries for 30 minutes.<br /><br />Once your BIOS password is removed, you will need to press the key during POST (Power On Self Test) to enter the Acer BIOS setup.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com2tag:blogger.com,1999:blog-4547075650300447573.post-17634085170855770332010-04-04T20:56:00.000-07:002010-04-04T21:53:18.321-07:00How to Shutdown or restart the remote system autometicallyPeople from here, there and everywhere do not fear because Faizu Baba is here. As you all know that this blog always try to help you resolve your technology related issues. So I am back with another resolution. One of my friend asked me for a scheduled PC shutdown or restart. For which i have made a script which will help you schedule your shutdown or restart.<br /><br />@ECHO OFF<br />PING 192.168.0.1 |FIND /I "TTL">NUL<br />IF NOT %ERRORLEVEL%==1 (<br /> SHUTDOWN -s -f -m \\192.168.0.1 -t 60 -c "To abort system auto shutdown Click Start -> Run -> Cmd.exe -> OK -> shutdown a [Hit Enter]" >>C:\ShutResult.txt)<br />EXIT /B 0<br /><br />What above script do is firstly it pings the system with stated IP address and when it will get the reply then this script will automatically shutdown this. But keeping this thing in mind that may be a user is using this system I have placed a comment that how to abort this process. <br />Now what you need to do is just copy and paste this script save it with a name shut.cmd or shut.bat. Now schedule this with windows task scheduler on any system and enjoy remotely shutdown of a system.<br /><br /><span style="font-weight:bold;">Note:</span><br />If you want to schedule a restart then just change the -s switch to -r and this script becomes the scheduled restart script.<br />This script is for remotely shutdown or restart the system.<br /><br />After writing this script you have schedule it on windows task scheduler for which you have to follow following steps.<br />To open Scheduled Tasks, click Start, click All Programs, point to Accessories, point to System Tools, and then click Scheduled Tasks.<br /><br />To schedule a new task:<br /><br />1. Double-click Add Scheduled Task to start the Scheduled Task Wizard, and then click Next in the first dialog box.<br />2. The next dialog box displays a list of programs that are installed on your computer, either as part of the Windows XP operating system, or as a result of software installation.<br /><br />Use one of the following procedures:<br /> * If the program that you want to run is listed, click the program, and then click Next.<br /> * If you want to run a program, script, or document that is not listed, click Browse, click the folder and file that you want to schedule, and then click Open.<br />3. Type a name for the task, and then choose one of the following options:<br /> * Daily<br /> * Weekly<br /> * Monthly<br /> * One time only<br /> * When my computer starts (before a user logs on)<br /> * When I log on (only after the current user logs on)<br /><br />4. Click Next, specify the information about the day and time to run the task, and then click Next.<br /><br />Note that the information about the day and time to run the task vary depending on the selection that you made in the previous wizard dialog box. For example, if you chose Weekly, you must indicate the day of the week, the time, and if the task should run every week, every 2 weeks, every 3 weeks, and so on.<br /> 5. Type the name and password of the user who is associated with this task. Make sure that you choose a user with sufficient permissions to run the program. By default, the wizard selects the name of the user who is currently logged on.<br /> 6. Click Next, and then click Finish after you verify the choices that you have made.<br /><br />Now leave all the things on the script.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-21879263289982554322010-03-18T02:01:00.000-07:002010-04-27T07:30:17.364-07:00How to convert Bulk Office 2003 files to Office 2007 formatHello, my friends. Today what I am going to tell you is a very good tweak. Most of us are using MS office 2007 and facing this issue that files with Office version 2003 takes too much time to be converted in office 2007 format. But when Faizu Baba is here do not fear. The solution is Migration Manager. It is a free tool from Microsoft that was designed for administrators to work with Office 2007 files. However, anyone can use it as it is quite handy in use but if someone follow the directions below. There are some commands you have to type into the command prompt.<br />First download the Migration Manager tool and extract it to a folder on your hard drive, i.e. C:\Convert. Next download and install the Office Compatibility Pack for Word, Excel and PowerPoint. <br />Now go to the C:\Convert\Tools directory and open the ofc.ini file in Notepad.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiws0xOZZYPke4OsPEaofi_XGaPAB5bSFkn_-ED8tBhyphenhyphenzpeBoBkzh20MLCYt_vTuOznUaQI2xR6KEIqK8mwmzTeSUWM7QrL7mWtWqdZxfRzSqvRmwseXBlOlWb1V79Z6jDzEvXlE7Ba_Y1w/s1600-h/01.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 100px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiws0xOZZYPke4OsPEaofi_XGaPAB5bSFkn_-ED8tBhyphenhyphenzpeBoBkzh20MLCYt_vTuOznUaQI2xR6KEIqK8mwmzTeSUWM7QrL7mWtWqdZxfRzSqvRmwseXBlOlWb1V79Z6jDzEvXlE7Ba_Y1w/s320/01.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5449899934816452146" /></a><br />Find the path below in the INI file:<br /><span style="font-weight:bold;"><br />fldr=C:\Documents and Settings\Administrator\My Documents</span><br /><br />Now replace the current path in the file with your desired path and also remove the semi colon sign ";" written before the path. Actually this path that you enter above will be the path that the program will look into for all of the files you want to convert to Office 2007. You can also enter a server share if you have documents stored on the network:<br /><br />fldr=\\server\share\docs<br /><br />By default, the program will go through the directory and all sub-directories and convert all Word files (doc to docx), Excel files (xls to xlsx), Powerpoint files (ppt to pptx), Access databases, MS Project files, and Visio diagrams.<br /><br />In order to run the program, you have to open the command prompt, Start – Run – type in CMD, and navigate to c:\convert\tools\. You can do this by typing in CD C:\convert\tools or whatever your path is.<br />Now type in the command ofc.exe and press Enter. The program will automatically begin converting the old Office XP and 2003 files to Office 2007 and give you a summary report at the end.<br />If you have other documents in the folders that are already in Office 2007 format or that are PDF’s, etc, don’t worry, the program will just skip over that files and not convert it. The path where your converted files are now as follows<br />C:\Documents and Settings\User name\Converted\ORIGINAL_PATH_NAME<br />User name = Your current user name under which this activity is perfomed<br />ORIGINAL_PATH_NAME= The folder name on which you have run this utility<br /><br />Note that your original files are not touched or modified in any way, so you can rest assured that your files will not be damaged or lost in the conversion process. Overall, it’s a simple and fast way to convert many Word 2003, Excel 2003 and Powerpoint 2003 files to Office 2007 format. Enjoy!<br /><br /><span style="font-weight:bold;">Downloads required for this conversion</span><br /><a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=13580CD7-A8BC-40EF-8281-DD2C325A5A81&displaylang=en">Migration Manager</a><br /><a href="http://www.microsoft.com/downloads/details.aspx?familyid=941B3470-3AE9-4AEE-8F43-C6BB74CD1466&displaylang=en">Office Compatibility Pack</a>farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com2tag:blogger.com,1999:blog-4547075650300447573.post-7894782692215211982010-02-25T02:33:00.000-08:002010-02-25T03:17:26.529-08:00Backup, Restore and Sync your BookmarksFriends, as you know that this blog keeps you inform about new technologies, softwares and etc. So Faizu Baba is here with another amazing information.<br />As we all are aware that Bookmarks play an important role in our daily life due to we search a lot of websites over internet and frequently and make them our bookmarks but the problem is we have multiple bookmark lists like one at home and second one at office and most of all both of them contain different list of websites due to this everyone of us wonder that there should be a way to sync them. Now the good news is, there is a solution called "XMARKS". <br /><br />"XMARKS" is an addon which provides following funtionalities<br /><br /><span style="font-weight:bold;">1. Smarter Search</span><br />Xmarks will highlight the 3 top sites in your Google results based on how many people have bookmarked them. Simply move your mouse over the site info icon to learn more about that site.<br /><br /><span style="font-style:italic;">i.Get site info before you click on a link</span><br />Simply move your mouse over the site info icon to learn more about that site. Xmarks shows you bookmark popularity, average review, related topics and more.<br />Click through to Xmarks.com and discover more!<br />Clicking on GET SITE INFO shows you lots more on Xmarks.com. Discover similar sites, read user reviews, and even write your own. <br /><br /><span style="font-weight:bold;">2. Site Info built into your browser</span><br /><br /><span style="font-style:italic;">i. Start with any web site</span><br />Enter the address of a web site and click the blue GET SITE INFO button to get started.<br /><br /><span style="font-style:italic;">ii. Get Site Info</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkDzIRtf8EaS9ZZn_0mwO-i_HxiJ3iSC3Gt26sr2ht2HB8rh2C8x__yg1uJdzTB042e2xv2qWO0b6iK8R0_E-ZAWUAwqwqlVJSN8OwNDtyGfrQjhD7a0Fu-9CuI9Zu1JT8KEMfqBrhYNau/s1600-h/site_info1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 178px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkDzIRtf8EaS9ZZn_0mwO-i_HxiJ3iSC3Gt26sr2ht2HB8rh2C8x__yg1uJdzTB042e2xv2qWO0b6iK8R0_E-ZAWUAwqwqlVJSN8OwNDtyGfrQjhD7a0Fu-9CuI9Zu1JT8KEMfqBrhYNau/s320/site_info1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5442138081095835810" /></a><br />Xmarks helps you quickly assess how good a site is and what it’s about. The bookmark icons indicate how many other people have bookmarked this site; the stars indicate the average user review. The list of topics help describe the site and are clickable to discover other sites within that topic.<br /><br /><span style="font-style:italic;">iii. Discover Similar Sites</span><br />Xmarks uses the power of hundreds of millions of bookmarks to automatically uncover similar sites. Now you can leverage the research of millions of users to help find the best sites on the Web.<br />Read Reviews<br />The description of a web site doesn’t always tell the whole story. Now you can read user reviews and see a more complete picture. If you have experience with the site, you too can easily write a review and leave your mark!<br /><br />Click on the Xmarks info icon in your location bar to see detailed information about the site you are on, and discover other great sites just like it. <br /><br /><span style="font-weight:bold;">3. Sync and Backup</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiCoKalG3HyBKfvPFxlMbIMZCiuqcxRXtXaRUzs5c2bKIszdrm3nRpnNIfZAAWhkXWLNFNIVKSkxOzy0r0tNpfgumufqXK2hkpD70JaDeOHM5unsL5CiFi_4GP5Oa5IMkWk6Fop3_Dwxiq/s1600-h/xmarks-sync-illustration.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 178px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiCoKalG3HyBKfvPFxlMbIMZCiuqcxRXtXaRUzs5c2bKIszdrm3nRpnNIfZAAWhkXWLNFNIVKSkxOzy0r0tNpfgumufqXK2hkpD70JaDeOHM5unsL5CiFi_4GP5Oa5IMkWk6Fop3_Dwxiq/s320/xmarks-sync-illustration.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5442137170580334146" /></a><br />Install Xmarks on each computer you use, and it seamlessly integrates with your web browser and keeps your bookmarks safely backed up and in sync.<br />Xmarks will sync across browsers too. Today it support Firefox, Internet Explorer, and Safari (Mac OS). <br /><br /><span style="font-style:italic;">i.Every change is backed up</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPiiUGdzDOhyuxpU1aPIWnmwuAkEp7UaG1c3mcaq21Z-NxiB41AXur38UfbcZcUF6UEICFahpydvIWGdNgIovzZoD6XHWwcrrvadBYmwwIfQ2T2Dii-q5D7QZHdqj9LplFogMD9Er-LDVR/s1600-h/backup1.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 178px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPiiUGdzDOhyuxpU1aPIWnmwuAkEp7UaG1c3mcaq21Z-NxiB41AXur38UfbcZcUF6UEICFahpydvIWGdNgIovzZoD6XHWwcrrvadBYmwwIfQ2T2Dii-q5D7QZHdqj9LplFogMD9Er-LDVR/s320/backup1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5442137431786342514" /></a><br />Whenever you add, delete or edit a bookmark, Xmarks will automatically backup the changes on our servers and store them for six months.<br />To view and restore past bookmark collections, visit my.xmarks.com.<br />Then select "Tools" > "Explore and Restore Old Bookmarks" to get started.<br /><br /><span style="font-style:italic;">ii.Explore & Restore details</span><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEb9ESE5pvTIPu7nhBjnoDYG8UzRiQZs02aQmK_1l6eImxSpeeSDY89II0-W43FW4BXwTwA9tCNdajoU0hQj8_BXzvzTVicuyD-TB3mVUmtx01FiRnFAuH8Bw1Mg0zy2m69phdRIYnzOZR/s1600-h/restore.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 178px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEb9ESE5pvTIPu7nhBjnoDYG8UzRiQZs02aQmK_1l6eImxSpeeSDY89II0-W43FW4BXwTwA9tCNdajoU0hQj8_BXzvzTVicuyD-TB3mVUmtx01FiRnFAuH8Bw1Mg0zy2m69phdRIYnzOZR/s320/restore.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5442137592776613378" /></a><br />Pick a backup collection to view its contents, export it to an HTML file or restore those bookmarks back into your Xmarks account.<br />Use this feature to undo mistakes when managing your bookmarks, or to recover deleted bookmarks that you later realize you need.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-20244580053598841792010-02-19T20:21:00.000-08:002010-02-19T21:08:51.412-08:00How to prevent your mobile data loss in case of snatchingFolks,today what i am going to tell you is a wonderful site named "RSEVEN". Most of us encountered with mobile theft or mobile snatchers. As we all are aware that mobile phone is our most personal device; it is with us most of the time that's why it contains very important data regarding our daily activities; calls made, text received, pictures taken, contact, emails and etc so this theft or snatching not only cause our financial loss but loss of our valuable data as well. <br />So whenever we lost our mobile. We are really in merciful situation because we not only lost our precious data but become isolated from our entire gathering.<br />Now the question is that how to prevent our data loss because this is the only thing we can do in such situations. The answer is "Rseven.com". By this site you can create backup of your mobile data even record your incomming and outgoing calls voice and voice mailbox as well. When you backup and sync your mobile to Rseven, the Rseven.com website will show those activities in a Timeline format and displays the strength of your relationships with the people that you communicate with and by which whenever you want to restore your activities you can in the chronological order.<br /><br />For further reference i am attaching this video.<br /><br /><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.blogger.com/video.g?token=AD6v5dyNpNaufkCoz6Z_mz8soafHVp3DhOmQ4gSrHt4j_6HPk3SZzp9k3emNZcTXeleN1w8K6CWFGsLhN0MGgWuqRw' class='b-hbp-video b-uploaded' frameborder='0'></iframe>farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-49645220519659736962010-02-02T00:36:00.000-08:002010-02-02T00:39:35.955-08:00Find Computer name through usernameIf you want to search computer name of a system on network through its username what you have to do is copy this script and paste it on notepad save it with any name but extension should be .bat or .cmd forexample: "username.cmd"<br /><br /><br />@ECHO OFF<br /><br />:GETUSERNAME<br />ECHO.<br />SET UName=<br />SET /P UName=Enter Username for %USERDOMAIN%: <br />IF [%UName%]==[] (<br /> ECHO Please provide username.<br /> CALL :GETUSERNAME)<br /><br />NET USER "%UName%" /DOMAIN 2>NUL>NUL<br />IF ERRORLEVEL 1 (<br /> ECHO Username not found in Active Directory.<br /> GOTO :GETUSERNAME)<br /><br /> ECHO Please wait... &ECHO.<br /> FOR /F "delims=\\ " %%c IN ('NET VIEW ^|FIND "\\"') DO (<br /> PING -n 1 -l 10 -w 100 %%c |FIND /I "TTL" >NUL<br /> IF NOT ERRORLEVEL 1 (<br /> REG QUERY "\\%%c\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v DefaultUserName |FIND /I "%UName%" >NUL<br /> IF NOT ERRORLEVEL 1 ECHO %UName% is logged onto %%c))<br /><br /> ECHO.<br /> PAUSE<br /> FOR /L %%v IN (1,1,24) DO ECHO. <br /> PAUSE<br /> <br /><br />:ENDSCRIPT<br /> EXITfarjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com5tag:blogger.com,1999:blog-4547075650300447573.post-53773268249704890052010-01-03T05:21:00.000-08:002010-01-03T05:45:32.887-08:00How to rename an existing Domain with childFriends, this post of mine is for Network administrators, IT Manager and System Administrators, today i am going to discuss how to rename a running domain with multiple childs. You people can have such guides on microsoft's official website but here i am going to explain this procedure in a bit easier way. <br />First we have to know the requirements for Domain rename procedure:<br /><br /><strong>Domain Rename Requirements</strong><br /><br />1.<em>Forest functionality</em>: You can rename domains only in a forest where all of the domain controllers are running Microsoft® Windows® .Server 2003 Standard Edition, Microsoft® Windows® Server 2003 Enterprise Edition, or Microsoft® Windows® Server 2003 Datacenter Edition operating systems, and the Active Directory forest functional level has been raised to Windows Server 2003.<br /><br />2.<em>Administrative privileges</em>: The domain rename procedure requires Enterprise Admins privileges to perform the various steps in the procedure. <br /><br />3.<em>Control station</em>: The computer to be used as the control station for the domain rename operation must be a member computer (not a domain controller) running Windows Server 2003 Standard Edition, Windows Server 2003 Enterprise Edition, or Windows Server 2003 Datacenter Edition.<br /><br />4.<em>DFS root server</em>: To rename a domain with domain based DFS roots, all DFS root server must be running Windows 2000 server with SP3 or higher.<br /><br /><strong>Pre Domain Rename Steps:</strong><br /><br />1.Raise Forest Functional Level to Windows server 2003:<br /><br />•Open Active Directory Domain and Trusts.<br />•In the scope pane, right click Domains and then raise all domain functional levels to windows server 2003.<br />•After that right click Active Directory Domain and Trust and then click Raise Forest Functional Level.<br />•n the Select an available forest functional level box, click Windows Server 2003, and then click raise.<br />•Click OK to raise the forest functionality, and then click OK again<br /><br />2.Prepare DNS Zones for Domain Rename<br />Whenever an application or client request access to AD, a Active Directory server is located by DC locator mechanism, DC locator uses SRV resource record in DNS to locate Domain Controller, due to this reason before renaming an AD domain we need to create appropriate DNS Zones.<br /><br />•Firstly compile a list of DNS Zones to be created<br />•Use the DNS mmc for this purpose<br />•Add a forward lookup zone<br />•Configure the dynamic DNS update by “Allow Dynamic Updates<br /><br />3.Configure Member Computers for Host Name Changes.<br /><br />By default, the Primary DNS suffix of a member computer of an AD domain is configured to change automatically when the domain membership of the computer changes. Same thing happens when the DNS name of a domain to which a computer is joined changes. To apply the Group policy to change Primary DNS suffix to group of member Computers:<br /><br />•Before doing this move on a member computer, in control Panel click System.<br />•Click computer Name tab and then click change.<br />•Click more and verify whether change primary domain suffix when domain membership changes is selected.<br />•Now verify this by registry. Open registry by regedit.<br />•Navigate HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Set\Tcpip\Parameters.<br />•Verify whether the value REG_RWORD SyncDmainWithMembership is 0x1. This value indicates that the primary DNS changes when the domain membership changes.<br />•Now to apply above settings on all member computers move on Active Directory Users and Computers, right-Click the domain or OU now click Group policy tab.<br />•Create a new Group Policy object and edit.<br />•Under Computer Configuration, expand Administrative Templates, Network and then click DNS client.<br />•In the results pane, double click Primary DNS suffix and Enabled and then enter a primary DNS suffix box, type the DNS suffix for the domain whose member computers are in the group. <br /><br />4.Activities to Discontinue Prior to Domain Rename<br /><br />•Creating or removing domains from forest<br />•Creating or removing application directory from forest<br />•Adding or removing domain controllers from forest<br />•Creating or deleting shortcut trust within forest<br />•Adding or removing attributes from global catalog.<br /><br /><strong>Procedures of the Windows Server 2003 domain rename:</strong><br /><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivbVU70y4rszzIfp2OO2bKHeNM-4yF6evEdvX3Vj8jLJqCTPC7RN36zaO_tJjPxtUgFbuqGUuoSEyMfrkcWeoDYuPk9X4l87LG10V6_6F5Pj5IaIJjKfOjNHOAI-SiywW-LsQbmf7IyTzg/s1600-h/1.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 198px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivbVU70y4rszzIfp2OO2bKHeNM-4yF6evEdvX3Vj8jLJqCTPC7RN36zaO_tJjPxtUgFbuqGUuoSEyMfrkcWeoDYuPk9X4l87LG10V6_6F5Pj5IaIJjKfOjNHOAI-SiywW-LsQbmf7IyTzg/s320/1.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5422506842449171186" /></a><br /><strong>Step #01: Backup All Domain Controllers</strong><br /><br />Perform a full system state backup of all domain controllers in the forest.<br /><br /><strong>Step #02: Setup the Control Station</strong><br /><br />Create a computer with Windows server 2003 standard edition, Windows Server 2003 Enterprise Edition or Windows Server 20003 Datacenter Edition operating system. Join this computer to the existing domain (Remember do not install active directory on this system or do not use a domain controller for domain renaming operation.). Now setup Control Station with the required tools for domain rename operation.<br /><br />1.On the control station create a directory named X:\Domain Rename where X: is a local disk drive<br />2.Insert windows server 2003 Standard Edition, Windows Server 2003 Enterprise Edition or Windows Server 20003 Datacenter Edition operating system CD and copy the files from the valueadd directory as follows:<br />Copy M:\valueadd\msft\mgmt\DomainRename\*.* X:\Domain Rename<br />Where M: is the CDrom drive, varif that two tools random.exe and gpfixup.exe have been copied into the working directory of X:\Domain Rename on the control station.<br />3.Install the Support Tools from Support\Tools folder from windows server 2003 Standard Edition, Windows Server 2003 Enterprise Edition or Windows Server 20003 Datacenter Edition operating system CD. Verify that the tools repadmin.exe and dfsutil.exe are installed on control station.<br /><br /><strong>Step #03: Generate the Current Forest Description</strong><br />To generate forest structure in XML encoded file user must be a member of enterprise admin group in the current forest and local admin group of the control station.<br /><br />1.On the control station, open a command prompt and change to the X:\Domain Rename directory.<br />2.At the command prompt, type the following command and press ENTER:<br /> rendom /list<br />3.Save a copy of the current forest description file (domainlist.xml) as domainlist-save.xml for future reference by using the following copy command:<br />copy domainlist.xml domainlist-save.xml<br /><br /><strong>Step #04: Specify the New Forest Description</strong><br />To perform this, change the current forest description with new forest description in domainlist.xml.<br /><br />1.Open domanlist.xml file in a simple text editor such as Notepad.<br />2.Replace current DNS, NetBIOS and application directory partitions to the planned new DNS and NetBIOS names.<br />3.Now save it with the same name.<br />4.To review the new forest description in domainlist.xml use following command and then press ENTER<br />rendom /showforest <br /> <br /><strong>Step #05: Generate Domain Rename Instruction<br /> </strong><br />To generate the domain rename instructions and upload them to the domain naming master.<br /><br />1.On the control station, open a command prompt<br />2.From within the X:\Domain Rename directory, execute the following command:<br />rendom /upload<br />3.Verify that the domain rename tool created the state file dclist.xml in the directory X:\Domain Rename and that the state file contains an entry for every domain controller in the forest.<br />The rendom /upload command generates the domain rename instructions and upload them to Active Directory.<br /><br /><br /><strong>Step #06: Push Domain Rename Instruction to all DCs and Verify DNS Readiness</strong><br />To discover the DNS host name of the domain naming master.<br /><br />1.On the control station, open a command prompt<br />2.At the command prompt, type the following and then press ENTER:<br />Dsquery server –hasfsmo name<br />3.To force synchronization of changes made to the domain naming master. Type following command and press ENTER.<br />Repadmin /syncall /d /e /P /q DomainNamingMaster<br />Where DomainNamingMaster is the DNS host name of the domain controller that is the current domain naming master for the forest.<br /><br /><strong>Step #07: Verify Readiness of Domain Controllers</strong><br /><br />To verify the readiness of domain controllers in the forest<br /><br />1.On the control station, open a command prompt and change to the X:\Domain Rename directory<br />2.At the command prompt, tupe the following command and then press ENTER<br />rendom /prepare<br />3.Once the command has finished execution, examine the state file dclist.xml to determine whether all domain controllers have achieved the prepared state. <br /><br /><strong>Step #08: Execute Domain Rename Instructions</strong><br /><br />To execute the domain rename instructions on all domain controllers<br /><br />1.On the control station, open a command prompt.<br />2.At the command prompt, type the following and then press ENTER<br />rendom /execute<br />3.When the command has finished execution, examine the state file dclist.xml determine whether all domain controllers have reached either the Done state or the Error state.<br />4.If the dclist.xml file shows any DCs remaining in the prepared state.<br /><br /><br /><strong>Step #09: Unfreeze the Forest Configuration</strong><br /><br />To ensure that all services on the control station learn the new domain name<br /><br />1.Reboot the control station twice to ensure all services running on it learn of the new domain name of which the control station is a member. {Do not restart the control station by turning its power off and then back on.<br />2.To unfreeze the forest configuration, execute the following command from X:\DomainRename.<br />rendom /end <br /><br /><strong>Step #10: Re-establish External Trust</strong><br /><br />All external trusts should be deleted and recreated from/to domain rename operation occurred. When a domain in the forest is renamed, the following trust relationships become invalid.<br /><br />1.Any inter-forest trust relationship established at the forest root level (cross-forest trust)<br />2.Any external trust relationship with a domain in another forest.<br /><br /><strong>Step #11: Fix Distributed File System (DFS) Topology</strong><br /><br />To fixup DFs topology in every renamed domain following steps should be followed:<br /><br />1.For a renamed domain examine the DFS topology using the DFS MMC or dfsutil.exe.<br />2.The Dfs root path would need to be changed in the topology. For example, if the name of domain abc.com changed to xyz.com then a domain based Dfs root named \\abc.com\public to \\xyz.com\public.<br />3.On control station, open a command prompt for each Dfs root and type the command <br />Dfsutil /RenameRoot /Root: DfsRootPath /OldDomain: OldName /NewDomain: NewName /Verbose<br />Where <br />DfsRootPath is old Dfsrootpath<br />OldName is exact old name to be replaced in the topology for the Dfs root<br />NewName is the exact new name to replace the old name in the topology.<br /><br /><strong>Step #12: Re-establish External Trust</strong><br /><br />To fixup Group Policy in every renamed domain following steps should be followed:<br /><br />1.On the control station open a command prompt and change to the path X:\Domain Rename<br />2.Now type the following command<br />Gpfixup /olddns: OldDomainDnsName /newdns: NewDomainDnsName /oldnb: OldNetBIOSName /newnb: NewDomainNetBIOSName /dc:DcDnsName 2>&1 >gpfixup.log<br />Where<br />OldDomainDnsName is the old DNS name of the renamed domain<br />NewDomainDnsName is the new DNS name of the renamed domain<br />OldNetBIOSName is the old NETBIOS name of the renamed domain<br />NewDomainNetBIOSName is the new NETBIOS name of the renamed domain<br />DcDnsName is the DNS host name<br />3.The output of the command execution both status or error is saved to the file gpfixup.log<br />4.To force replication of the Group policy fixup changes made at the DC named in DCDNSName of this procedure to the rest of the DCs in the renamed domain, type the following and then press ENTER<br />repadmin /syncall /d /e /P /q DcDNSName NewDomainDN<br />Where<br />DCDnsName is the DNS host name of the DC that was targeted by the gpfixup command <br />NewDomainDN is the distinguished name (DN) corresponding to the new DNs name of the renamed domain.<br /><br /><strong>Post Domain Rename Steps:</strong><br /><br />1.Rename the Host machine of domain controller<br />2.Restart the domain Controller<br />3.Restart the Control Station<br />4. Restart all Member Stationsfarjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-31417693470365887362009-12-30T03:23:00.000-08:002009-12-30T03:33:32.552-08:00Public DNS by GoogleGood News folks after Open DNS now Google has announced its public DNS servers as well. Google Public DNS is a free, global Domain Name System (DNS) resolution service, that you can use as an alternative to your current DNS provider. Only thing you want to use this service is, configure your network with following DNS IP address,<br /><br />8.8.8.8<br />8.8.4.4<br /><br /><span style="font-weight:bold;">Microsoft Windows</span><br /><br />DNS settings are specified in the TCP/IP Properties window for the selected network connection. <br /><br />Example: Changing DNS server settings on Microsoft Windows Vista<br /><br />1. Go the Control Panel.<br />2. Click Network and Internet, then Network and Sharing Center, then Manage network connections.<br />3. Select the connection for which you want to configure Google Public DNS. For example:<br />* To change the settings for an Ethernet connection, right-click Local Area Connection, and click Properties.<br />* To change the settings for a wireless connection, right-click Wireless Network Connection, and click Properties.<br /><br />If you are prompted for an administrator password or confirmation, type the password or provide confirmation.<br /> <br />4. Select the Networking tab. Under This connection uses the following items, click Internet Protocol Version 4 (TCP/IPv4), and then click Properties.<br />5. Click Advanced and select the DNS tab. If there are any DNS server IP addresses listed there, write them down for future reference, and remove them from this window.<br />6. Click OK.<br />7. Select Use the following DNS server addresses. If there are any IP addresses listed in the Preferred DNS server or Alternate DNS server, write them down for future reference.<br />8. Replace those addresses with the IP addresses of the Google DNS servers: 8.8.8.8 and 8.8.4.4.<br />9. Restart the connection you selected in step 3.<br /><br /><span style="font-weight:bold;">Mac OS X</span><br /><br />DNS settings are specified in the Network window. <br /><br />Example: Changing DNS server settings on Mac OS 10.5<br /><br />1. From the Apple menu, click System Preferences, then click Network. <br />2. If the lock icon in the lower left-hand corner of the window is locked, click the icon to make changes, and when prompted to authenticate, enter your password.<br />3. Select the connection for which you want to configure Google Public DNS. For example:<br />* To change the settings for an Ethernet connection, select Built-In Ethernet, and click Advanced.<br />* To change the settings for a wireless connection, select Airport, and click Advanced.<br />4. Select the DNS tab.<br />5. Click + to replace any listed addresses with, or add, the Google IP addresses at the top of the list: 8.8.8.8 and 8.8.4.4.<br />6. Click Apply and OK.<br /><br /><span style="font-weight:bold;">Linux</span><br /><br />In most modern Linux distributions, DNS settings are configured through Network Manager.<br /><br />Example: Changing DNS server settings on Ubuntu<br /><br />1. In the System menu, click Preferences, then click Network Connections.<br />2. Select the connection for which you want to configure Google Public DNS. For example:<br />* To change the settings for an Ethernet connection, select the Wired tab, then select your network interface in the list. It is usually called eth0.<br />* To change the settings for a wireless connection, select the Wireless tab, then select the appropriate wireless network.<br />3. Click Edit, and in the window that appears, select the IPv4 Settings tab.<br />4. If the selected method is Automatic (DHCP), open the dropdown and select Automatic (DHCP) addresses only instead. If the method is set to something else, do not change it.<br />5. In the DNS servers field, enter the Google Public DNS IP addresses, separated by a space: 8.8.8.8 8.8.4.4<br />6. Click Apply to save the change. If you are prompted for a password or confirmation, type the password or provide confirmation.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-8859088850914414842009-12-17T23:50:00.000-08:002010-03-03T21:53:29.645-08:00Online TO-DO listTeuxDeux is a minimal and uncomplicated tool that you can use to manage your to-do lists inside the browser.<br /><br />Type something in the input box and it will added to your pending task list for that day. Hover your mouse over a task and just click once to mark that item as done.<br /><br />The most interesting part about TeuxDeux is this – if the due date of a task is today and you don’t complete it in time, it will automatically be added to your next day’s pending task list.<br /><br />If that’s not what you want, you can manually drag tasks and pending items to any other future dates but there’s no need for you to look back in the past to catch up with any pending tasks.<br /><br />To download it please visit follwing link<br />http://teuxdeux.com/farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-49973064348766586712009-12-03T21:54:00.000-08:002009-12-03T22:20:26.237-08:00Enhance your internet activities with Sea MonkeyFolks today i gonna tell you about a very interesting internet suite named "SeaMonkey". It is considered as the modern internet suite. Such a software suite was previously made popular by Netscape and Mozilla, and now the SeaMonkey project continues to develop and deliver high-quality updates to this concept.<br /><br />SeaMonkey has inherited the successful all-in-one concept of the original Netscape Communicator and continues that product line based on the modern, cross-platform architecture provided by the Mozilla project.<br /><br />1>The Internet browser at the core of the SeaMonkey suite uses the same rendering engine and application platform as its sibling Mozilla Firefox, with popular features like tabbed browsing, feed detection, popup blocking, smart location bar, find as you type and a lot of other functionality for a smooth web experience.<br />2>SeaMonkey's Mail and Newsgroups client shares lots of code with Mozilla Thunderbird and features adaptive Junk mail filtering, tags and mail views, web feeds reading, tabbed messaging, multiple accounts, S/MIME, address books with LDAP support and is ready for both private and corporate use.<br />3>Additional components include an easy-to-use HTML Editor, the ChatZilla IRC chat application and web development tools like a DOM Inspector and a JavaScript debugger.<br />4>If that's still not enough, SeaMonkey can be extended with numerous Add-Ons that provide additional functionality and customization for a complete Internet experience.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5MPTobMo6shRGdxshtvA0_9lruk-vurAwpQ0hzHvkkQRylHaaDHvDf71WY2Ryy_czMTb9Qxy5l8G_esA3o4GBrRTdwJ0xG1dAcdt4QVdi5Bg__Ic4UPO9fMo34IuCws-O_9_Ea0quED1/s1600-h/seamonkey.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 203px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjc5MPTobMo6shRGdxshtvA0_9lruk-vurAwpQ0hzHvkkQRylHaaDHvDf71WY2Ryy_czMTb9Qxy5l8G_esA3o4GBrRTdwJ0xG1dAcdt4QVdi5Bg__Ic4UPO9fMo34IuCws-O_9_Ea0quED1/s320/seamonkey.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5411261825820430402" /></a>farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-1883463666424728022009-11-25T02:28:00.000-08:002009-12-03T22:29:16.371-08:00Show Desktop icon missingMany people confronted with this issue that some time they loose "Show Desktop" icon.It can accidentally be deleted or you may loose it for some other reason, but the bottom line is : only few people know how to restore it. So for visitors of this blog the solution is right here.<br /><br />To recreate it open Notepad and paste following lines on it:<br /><br />[Shell]<br />Command=2<br />IconFile=explorer.exe,3<br />[Taskbar]<br />Command=ToggleDesktop <br /><br />Now save this file with "Desktop.scf" {without quotations. This will save like this:<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA033ypyQGpuMmQ-aEIFqCxLTY9c9thAAWsWfPqHF3-hk_qfpz8T6okKBAhl54m76QT1Oa0D_eOOnckwiLbhG2px1b1O8Q5yXZ-ztvNjFnOZAkxPmmxB4lt1MqaR9S-vS70W-Fhwfcq19Q/s1600-h/desktop.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 47px; height: 48px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjA033ypyQGpuMmQ-aEIFqCxLTY9c9thAAWsWfPqHF3-hk_qfpz8T6okKBAhl54m76QT1Oa0D_eOOnckwiLbhG2px1b1O8Q5yXZ-ztvNjFnOZAkxPmmxB4lt1MqaR9S-vS70W-Fhwfcq19Q/s320/desktop.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5411263437815496178" /></a><br />Now copy it and past this on following location.<br /><br />C:\Documents and Settings\<span style="font-weight:bold;">"User Name"</span>\Application Data\Microsoft\Internet Explorer\Quick Launch<br /><br /><span style="font-weight:bold;">Note:</span><br />"User Name" mentioned in above path is your current user name.<br /><br />Now it is all done. Enjoy.....farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-16360026841482517182009-11-24T00:51:00.000-08:002009-11-24T00:54:31.818-08:00Display a message box before User LogonIf you want to pop up a message box when Computer starts and before logon screen on Win9X or WinNT, then you can use this trick.<br /><br />Run the Registry Editor using Start->Run and then type "regedit" and Enter. You will come up with a windows with title Registry Editor. You will see that something like this. <br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG2V_ude7TJkgeZoRLBQPapeGnaS3IeGbe4-qerD-z9CYXFcrzMOMnPsHgdcv67rU266xE86dl_I4cUgATSUfxud_WNgDALEkLdq8pj1kL15K1yXq_ycCaZgbwRWb3b2CfKCrNIvSVm5J6/s1600/registry.gif"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 221px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG2V_ude7TJkgeZoRLBQPapeGnaS3IeGbe4-qerD-z9CYXFcrzMOMnPsHgdcv67rU266xE86dl_I4cUgATSUfxud_WNgDALEkLdq8pj1kL15K1yXq_ycCaZgbwRWb3b2CfKCrNIvSVm5J6/s320/registry.gif" border="0" alt=""id="BLOGGER_PHOTO_ID_5407590502379064690" /></a><br />Here is a view of Registry editor. On the left pane we have a tree view with some items. These are actually the roots of different types of keys. We are going to to discuss only two of them which are needed by us. The remaining will wait for another time.<br /><br />HKEY_CURRENT_USER holds the information about the currently logged on user.<br /><br />HKEY_LOCAL_MACHINE holds the information about the whole computer.<br /><br />Go to:<br /><br />For Win9X<br />HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\WinLogOn<br /><br />And For WinNT<br />HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinLogOn<br /><br />And make two String Keys named<br /><br />LegalNoticeCaption and LegalNoticeText<br /><br />Put any value which you want to display. First is the Title of the Message box and second is the text to be displayed. After doing this, you will get welcome message each time windows starts.<br />NOTE: Modifying the registry is dangerous. If you make any mistake you may corrupt your registry. This may cause your system to crash or become unstable.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-9205822236948761452009-11-10T22:31:00.000-08:002009-11-10T22:32:28.618-08:00Browse Local hard drives with Admin PrivilegesIt’s for computer administrator and system persons with admin rights. !<br /><br />You can open / browse (files and folders) with admin rights from limited user logging<br /><br />Steps as follows….<br /><br />Goto to command prompt and type runas /user:localhost\administrator "mmc compmgmt.msc"<br /><br />it will open computer management.<br /><br />Select "disk management" under StorageIn right panel you can see the local drives. Just right<br /><br />click and open the drive which you want to accessfarjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-67545084591582121832009-10-13T20:12:00.000-07:002009-10-13T21:11:58.190-07:00How to hide partition with Command Prompt1.Select start then Run in the Run type cmd or start → All Programs → Accessories → Command Prompt or Press Windows + R key and type cmd.<br />2.In command prompt type DISKPART<br />3.Then type LIST VOLUME, after this you will get an partition overview<br />4.Type SELECT VOLUME (number), press ENTER then type REMOVE LETTER (letter)<br />5.After this partition will be hidden<br />6.To get it back just type ASSIGN LETTER (letter).farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-43497007130976485692009-10-13T03:55:00.000-07:002009-10-13T04:03:09.513-07:00Virus Unwise.exe removing techniqueHi friends after a long break i am back in action, as i have encountered with a virus named unwise.exe so i thought to share its solution with you people.<br /><br />Unwise_.exe Virus affected in internet browsing. That virus blocked all sites and Run that Virus in computer running process. Below are manual removal instructions for unwise.exe so you can remove the unwanted file from your PC. Always be sure to back up your PC before you modify anything.<br /><br /><span style="font-weight:bold;">Use Windows Task Manager to Remove unwise.exe Processes</span><br /><br />1. To open the Windows Task Manager, use the combination of CTRL+ALT+DEL or CTRL+SHIFT+ESC.<br />2. Click on the “Image Name” button to search for ” unwise.exe” process by name.<br />3. Select the ” unwise.exe” process and click on the “End Process” button to kill it.<br /><br /><span style="font-weight:bold;">Use Windows File Search Tool to Find unwise.exe Path</span><br /><br />1. Go to Start > Search > All Files or Folders.<br />2. In the “All or part of the the file name” section, type in ” unwise.exe” file name(s).<br />3. To get better results, select “Look in: Local Hard Drives” or “Look in: My Computer” and then click “Search” button.<br />4. When Windows finishes your search, hover over the “In Folder” of ” unwise.exe”, highlight the file and copy/paste the path into the address bar. Save the file’s path on your clipboard because you’ll need the file path to delete unwise.exe in the following manual removal steps.<br /><br /><span style="font-weight:bold;">Registry Clearing</span><br /><br />Take START then Command Prompt–>Type regedit then Click OK.After one window open .Click on Ctrl+F and type umwise_.exe.Click Search Button and all (unwise_.exe)entries deleted.<br /><br /><span style="font-weight:bold;">Detect and Delete Other unwise.exe Files</span><br /><br />1. To open the Windows Command Prompt, go to Start > Run > cmd and then press the “OK” button.<br />2. Type in “dir /A name_of_the_folder” (for example, C:\Spyware-folder), which will display the folder’s content even the hidden files.<br />3. To change directory, type in “cd name_of_the_folder”.<br />4. Once you have the file you’re looking for type in del “name_of_the_file”.<br />5. To delete a file in folder, type in “del name_of_the_file”.<br />6. To delete the entire folder, type in “rmdir /S name_of_the_folder”.<br />7. Select the ” unwise.exe” process and click on the “End Process” button to kill it.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-61805033266705638502009-08-24T22:29:00.000-07:002009-08-24T22:45:21.940-07:00How to build your family tree over internetDear Folks! today i gonna tell you about a very interesting site named Geni.com. People like me who are very proud on their families and know their roots will definitely like this site. This site enables you to create your family tree through there simple interface. Your relatives who are added to the tree can join Geni and add other relatives. This make it easy to grow your tree.<br /><br />Everyone in the tree has a profile which shows more about them and enables other family members to stay in touch with them. Families can work together to build profiles for common ancestors.<br /><br />Family members can also share photos, videos, events, discussions, and more. A family timeline shows the history of everyone in the family.<br /><br />Geni is private. Only the people in your family tree can log in to your tree and your profile. Geni will not share your personal information with third parties. We will not sell your email address or spam you. Users control which communications they would like to receive from Geni.<br /><br />Geni was founded by former executives and early employees of PayPal, eGroups, eBay, and Tribe, and is backed by venture capital firms Founders Fund and Charles River Ventures.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-61524330431799282262009-08-17T00:50:00.000-07:002009-08-17T00:56:06.065-07:00How to convert a partition from FAT32 to NTFSGuyz... Due to some software requirement or any reason you people need to convert a FAT partition to NTFS. But you don't know how to convert it without formatting or any data loss. So don't worry just be happy becuase the solution is right here.<br />1. Firstly move on to command prompt by typing "cmd" in Run<br />2. Enter the command "convert c: /fs:ntfs" to convert the C: partition from FAT32 to NTFS. <br /><br />Where c: is the partition name. You can use any partition name which you want to convert.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-71103854209185430282009-08-03T01:44:00.000-07:002009-08-03T02:06:16.916-07:00Become a Model in Intel's Rockstar AdvertisementDear Fellows today i am here with an amazing trick. Anyone who is a TV maniac, must have seen the Intel Rockstar Ad, its quite an interesting ad. Now did you ever wish to see yourself in place of the Rockstar, surely i wished a lot whenever i used to see that ad, and i am sure there were thousands like who used to wish the same. Thanks to Intel, you can now put yourself in that ad, YES ITS TRUE. You just have to upload a pic of yours(Only Face), and rest everything will be done automatically and that's it within a few seconds your video will be ready. There are 3 limitations which has to be kept in mind while uploading the pic.<br /><br />1. No eyewears<br />2. No hair on the forehead<br />3. Mouth should be closed<br /><br />Just keep these three points in mind while uploading your image.<br /><br />The site also uploads the video on youtube if you want, so that you can share it with your friends.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-43966874103663625252009-07-30T02:12:00.000-07:002009-07-30T02:34:28.292-07:00For IT Engineers appreciationAn IT Engineer unpacked the server from its box, installed an operating system, patched it for security, made sure the power and air conditioning was working in the server room, monitored it for stability, set up the software, and kept backups in case anything went wrong. <br /><br />An IT Engineer installed the routers, laid the cables, configured the networks, set up the firewalls, and watched and guided the traffic for each hop of the network that runs over copper, fiber optic glass, and even the air itself to bring the Internet to your computer. All to make sure the webpage found its way from the server to your computer.<br /><br />An IT Engineer makes sure your network connection is safe, secure, open, and working. A IT Engineer makes sure your computer is working in a healthy way on a healthy network. A IT Engineer takes backups to guard against disaster both human and otherwise, holds the gates against security threats and crackers, and keeps the printers going no matter how many copies of the tax code someone from Accounting prints out.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTFKo4ff1xZRsZimhKneDW8ybo8PDaSYqpirVKUr5Z2LBONqtjluaUjIowdzBxw53XAQ8UhV-kGDqXRFKx0eDczfI-atD-Jeu_rIaQvJuLCsxbTTJY2bMrzcfrIPCaAEeeVChlh-kbylvs/s1600-h/IT+Engineer.JPG"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 199px; height: 200px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTFKo4ff1xZRsZimhKneDW8ybo8PDaSYqpirVKUr5Z2LBONqtjluaUjIowdzBxw53XAQ8UhV-kGDqXRFKx0eDczfI-atD-Jeu_rIaQvJuLCsxbTTJY2bMrzcfrIPCaAEeeVChlh-kbylvs/s320/IT+Engineer.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5364180341329376402" /></a><br /><br />An IT Engineer worries about spam, viruses, spyware, but also power outages, fires and floods. When the email server goes down at 2 AM on a Sunday, your IT Engineer is called, wakes up, and goes to work.<br /><br />An IT Engineer is a professional, who plans, worries, hacks, fixes, pushes, advocates, protects and creates good computer networks, to get you your data, to help you do work -- to bring the potential of computing ever closer to reality.<br /><br />So if you can read this, thank your IT Engineer -- and know he or she is only one of dozens or possibly hundreds whose work brings you the email from your aunt on the West Coast, the instant message from your son at college, the free phone call from the friend in Australia, and this webpage.<br /><br /><span style="font-weight:bold;">Show your appreciation</span><br /><br />Friday, July 31, 2009, is the 10th annual IT Engineer Appreciation Day. On this special international day, give your IT Engineer something that shows that you truly appreciate their hard work and dedication. (All day Friday, 24 hours, your local timezone).<br /><br />Let's face it, IT Engineers get no respect 364 days a year. This is the day that all fellow IT Engineers across the globe, will be showered with expensive sports cars and large piles of cash in appreciation of their diligent work. But seriously, we are asking for a nice token gift and some public acknowledgement. It's the least you could do. <br /><br />Consider all the daunting tasks and long hours (weekends too.) Let's be honest, sometimes you don't know your IT Engineers as well as they know you. Remember this is one day to recognize your IT Engineer for their workplace contributions and to promote professional excellence. Thank them for all the things they do for you and your business.<br /><br /><span style="font-weight:bold;">And Donot even dare to forget Me in this appreciation.</span>farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-90883224955841307392009-07-29T22:33:00.000-07:002009-07-29T23:00:36.420-07:00When your ISP's DNS is downThis for all my Pakistani friends who are using PTCL DSL. Usually People who are using PTCL complains that there DSL link is sync but still they are facing problem in browsing a web site. What they have to do is just first ping their gateway then the DNS. If gateway is pinging but the DNS is not use the following solution.<br /><br />Before we start firstly we have to understand the work of DNS. When you type an address like www.yahoo.com in your browser address bar, the computer doesn’t know where yahoo.com points and it will therefore ask the DNS server.<br /><br />The job of a DNS server is to translate this human-readable web address (like www.yahoo.com) into a computer-readable number also known as an IP address (209.131.36.158). Once your computer knows the IP location of a web domain name, it opens the website in your browser. <br /><br />DNS is such an integral part of our Internet life working behind the scenes every time we connect to a website. In most situations, our Internet Service Provider specifies the DNS Server address that we key into the browser network settings or the router.<br /><br />Now back to our problem. To solve this problem, we look at a simple and reliable service called OpenDNS that speeds up your Internet connection and also handles some other very important issues. There are no software to install, it’s very easy to set up and the price is just right - $0.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfiBuOnhv3qxpkQEY-y9LF3ase44a7Gg9TcH18XWiw451gSJhrpWKOd0RQIaW0lV7nFPD-pc48h0ppqN-RV5rXnQr4w6hM6pngQIZQ8wFWOA9FuVxIZ8M1DjLANf-BgdjUQguHepCgw7JM/s1600-h/opendns-ip-address.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 92px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfiBuOnhv3qxpkQEY-y9LF3ase44a7Gg9TcH18XWiw451gSJhrpWKOd0RQIaW0lV7nFPD-pc48h0ppqN-RV5rXnQr4w6hM6pngQIZQ8wFWOA9FuVxIZ8M1DjLANf-BgdjUQguHepCgw7JM/s320/opendns-ip-address.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5364126056798831842" /></a><br />To use OpenDNS, all you have to do is open your Network Connections or Router’s settings page and update the default DNS server to point to the OpenDNS nameservers that are 208.67.222.222 and 208.67.220.220.<br /><br />Unlike the DNS servers of your less reliable ISP, OpenDNS servers store the IP addresses of millions of websites in their cache so it would take less time to resolve your requests. So if you have asked for an IP address of a website that has been previously requested by another OpenDNS user, you will get the reply instantly.<br /><br />Another huge advantage of using OpenDNS is that it blocks phishing websites from loading on your computer. It uses data from Phishtank, a community site that is also used by Yahoo! Mail to determine if some particular website is part of any online phishing scam.<br /><br />OpenDNS also takes care of any typos that you commit while typing the name of popular websites. For instance, if you type www.gogle.com omitting the additional “o” by mistake, OpenDNS will open the main www.google.com site automatically. <br /><br />If you are a parent worried about kids visiting adult websites on the home computer, you can configure OpenDNS to block any adult website from loading on the computer. In fact, quite a few business places use OpenDNS to block social sites like MySpace and Facebook on employee computers.<br /><br />Power users can assign abbreviations or OpenDNS Shortcuts to access their favourite websites more quickly.<br /><br />For instance, you can set “mail” as a shortcut for http://mail.google.com/ or something like “a” for www.reallylongname.com - just type the shortcut to access the site. A good alternative for browser based bookmarks and it works across all computers where you have logged in to your OpenDNS account.<br /><br />So enjoy...........farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com0tag:blogger.com,1999:blog-4547075650300447573.post-1474602104914095422009-07-28T03:32:00.000-07:002009-07-28T03:39:09.575-07:00How to change Windows XP's administrator PasswordDear readers, I am here with an amazing trick. Most of my friends ask me that how can they change their Windows XP forgotten password. So here is the solution.<br /><br />1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)<br /><br />2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”<br /><br />3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.<br /><br />4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now<br /><br />5. The Licensing Agreement comes next - Press F8 to accept it.<br /><br />6. The next screen is the Setup screen which gives you the option to do a Repair.<br /><br />It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”<br /><br />Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.<br /><br />7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.<br /><br />8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”<br /><br />9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.<br /><br />10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.<br /><br />11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.<br /><br />12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).<br /><br />13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.<br /><br />I tested the above on Windows XP Pro with and without SP1/2/3 and also used this method in a real situation where someone could not remember their password and it worked like a charm to fix the problem. This security hole allows access to more than just user accounts. You can also access the Registry and Policy Editor, for example. And its gui access with mouse control. Of course, a Product Key will be needed to continue with the Repair after making the changes, but for anyone intent on gaining access to your system, this would be no problem.<br /><br />And in case you are wondering, NO, you cannot cancel install after making the changes and expect to logon with your new password.<br /><br />Cancelling will just result in Setup resuming at bootup and your changes will be lost.<br /><br />Ok, now that your logon problem is fixed, you should make a point to prevent it from ever happening again by creating a Password Reset Disk. This is a floppy disk you can use in the event you ever forget your log on password. It allows you to set a new password.<br /><br /><strong>Here's how to create one if your computer is NOT on a domain:</strong><br /><br />Go to the Control Panel and open up User Accounts. <br />Choose your account (under Pick An Account to Change) and under Related Tasks, click "Prevent a forgotten password". <br />This will initiate a wizard. <br />Click Next and then insert a blank formatted floppy disk into your A: drive. <br />Click Next and enter your logon password in the password box. <br />Click Next to begin the creation of your Password disk. <br />Once completed, label and save the disk to a safe place <br />How to Log on to your PC Using Your Password Reset Disk<br /><br />Start your computer and at the logon screen, click your user name and leave the password box blank or just type in anything. This will bring up a Logon Failure box and you will then see the option to use your Password Reset disk to create a new password. Click it which will initiate the Password Reset wizard. Insert your password reset disk into your floppy drive and follow the wizard which will let you choose a new password to use for your account.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com1tag:blogger.com,1999:blog-4547075650300447573.post-87306338463500300922009-07-27T20:38:00.000-07:002009-07-27T20:47:46.399-07:00Now Recover your files with ZARFolks, it some times put you in hell when a disaster strikes to your computer. Data can be lost due to many different reasons. Accidental reformatting, power spikes, virus attacks and hardware malfunction are some of the scenarios where you will find yourself looking for a data recovery solution.<br /><br />But now we don't need to worry about it alot, Zero Assumption Recovery provides a suite of highly effective and thorough data recovery software for Microsoft® Windows™ operating systems. ZAR is suitable for home users and small businesses who need a powerful data recovery solution for FAT16/FAT32/NTFS file systems. The default settings are reliable and thorough, but more technical users can benefit from a wealth of optional configurations.<br /><br /><strong>Features</strong><br /><br />The main features of our Windows data recovery software are:<br /><br />Runs on Windows NT/2000/XP/2003/Vista <br />Supported filesystems are FAT16, FAT32 and NTFS (all versions) <br />Provides limited ext2 (Linux filesystem) support <br />Support for partition recovery <br />Support for hardware RAID0 and RAID5 recovery <br />Long and national file names are supported <br />Native NTFS compression is supported <br /><br /><strong>What makes ZAR different?</strong><br /><br />There are three main reasons:<br /><br /><strong>Firstly,</strong> it is easy to use. You can recover the data yourself as long as you are reasonably familiar with computers. ZAR is ideal for the home user who knows what a hard drive is and how many there are in his system - but more technically minded users can also benefit from a wide range of configuration options.<br /><br /><strong>Secondly,</strong> it takes its time. When you are trying to recover critical data, you need to be persistent and painstakingly thorough. ZAR slowly and methodically crawls through your disk, checking and cross-checking everything and recovering as much data as possible. Faster programs may skip though your disk in seconds and come out empty-handed. ZAR persists, and succeeds.<br /><br /><strong>Thirdly,</strong> it is more powerful than most. We know that you are trying to recover important data, and that every single piece that you retrieve could be vital. With Zero Assumption Recovery, nothing is assumed - ZAR never relies on anything located on the damaged disk. If incoherencies are discovered, thorough checks and cross-checks are used to derive the necessary information. The algorithms are built to withstand a severe pounding, which means that ZAR can recover data even when things seem hopeless.<br /><br /><strong>ZAR 8.4 system requirements and demo version restrictions</strong><br /><br />Windows 2000/XP/2003/Vista. <br />Additional media to recover data to (never save files to the volume you are recovering, for this may cause further damage to the volume!) <br />Damaged drive must be physically functional. It should be at least detected by BIOS. Multiple bad sectors can be handled (but the data they contained is lost forever), but controller failures are beyond any software repair. <br />Supported filesystems:<br /><br />FAT16 (Used in Windows 95) and FAT32 (used in Windows 95 OSR2, 98, ME, 2000 and XP) <br />NTFS versions 1.2 (Windows NT 4.0), 3.0 (Windows 2000), and 3.1 (Windows XP/2003/Vista). <br />Limited ext2 (Linux filesystem) support <br />Digital image recovery function operates regardless of the filesystem type. <br />Supported RAID layouts:<br /><br />Hardware RAID0 and RAID5 with any number of member disks. <br />It is possible to recover Windows 2000 Server, Windows 2003 server software RAID0 and RAID5 if the RAID members occupy the entire physical disk. <br />There are the following limitations in the evaluation version of ZAR 8.4: <br /><br />Only (up to) four directories can be recovered in the demo version of our computer data recovery software. <br />The demo version is unable to load the scan result file. However, it does save these files to avoid having to rescan the disk when you got the full version. <br />In digital image recovery mode program operates as freeware with no functional limitations. List of known compatible digital camera models and image formats is available Known camera compatibility list here. <br /><br /><strong>Zmeil 2.1 system requirements and demo version restrictions</strong><br /><br />Windows NT, 2000, XP, 2003 or Vista. <br />Internet Explorer 5.0 or later. <br />Plenty of a free disk space to store the recovered files. It is recommended to have a at least twice the size of the damaged email database available. <br />The evaluation version of Zmeil 2.1 only recovers 9 messages maximum per the database.<br /><br /><strong>Zlon 1.0 system requirements and demo version restrictions</strong><br /><br />Windows NT, 2000, XP, or 2003. <br />The evaluation version of Zlon 1.0 expires in 14 days. If you want to use it past the expiration you will need to order the unlock code from us.<br /><br /><strong>Zero Assumption Disk Space Visualizer 1.2 system requirements</strong><br /><br />Zero Assumption Disk Space Visualizer 1.2 runs generally on any machine Windows runs on, with the exception of the original (pre-OSR2) Windows 95 release and Windows NT 3.51.<br /><br /><br />You can download it from <a href="http://www.z-a-recovery.com/download.htm">here</a>farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com2tag:blogger.com,1999:blog-4547075650300447573.post-59415069042510759342009-07-27T00:45:00.000-07:002009-07-27T01:50:57.676-07:00Firefox is not opening HTTPS pagesDear Folks some of my readers queried me about a problem that firefox is not supporting HTTPS or not opening HTTPS Web pages. So don't worry the solution is very easy, You just have to define gateway IP in SSL Proxy. Now browse whatever SSL pages.farjadarshadhttp://www.blogger.com/profile/05550372524030920386noreply@blogger.com2