Tuesday, 20 May 2014

Remove Windows.old From a Server

Delete the windows.old from an upgraded Windows Client:Win7 & above or Server: 2008 & above
For a client OS that's upgraded, the Disk Cleanup utility can be used to delete the very large windows.old folder containing the old OS. This isn't available on a server OS without installing the Desktop Experience feature.
To delete, it is necessary to take ownership of the folder, give administrators full control, then delete. This can be done with the commands below:
  • takeown /F c:\Windows.old\* /R /A /D Y
  • cacls c:\Windows.old\*.* /T /grant administrators:F
  • rmdir /S /Q c:\Windows.old 
Using GUI: I improvised and claimed ownership of the parent folder as well as ensured I had Full Control and that all child folders and files were altered to inherit these attributes - at that point I deleted the folder successfully.

Change default desktop background

Citrix Terminal Server
How to change the default desktop for Citrix XenApps server:

Tuesday, 29 April 2014

Default attachment path in windows 7 and above email clients

Tips of the Day..!
you might sometimes wonder where does the attachments vanish in case you open an attachment and modify them directly from your email client like; Windows live mail or Microsoft outlook.
below is the path where you can search for.. simple way is to open any one of the attachment from your email client and click file save as, this will give you a clear idea of default source location.
Windows Live Mail default attachment cache location:
C:\Users\kt.rinith\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
Microsoft Outlook default attachment cache location:
C:\Users\kt.rinith\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook

Scintillating Facts: Increase Speed on your Laptop (Windows 7 & Windows 8)

Scintillating Facts: This write-up is experience based as on how to Increase Speed on your Laptop (Windows 7 & Windows 8):
remove unused adwares after use.
Disable add-ons  from IE
Reliable third party tools which has been tested and rated above average will also do. For personal use free versions will do which are rated as virus free softwares. Few of them to pick-up are:
i) CCleaner  - available @http://www.piriform.com/ccleaner/download . This removes obsolete traces and reorders the system.
ii) Check the unwanted and suspicious services and disable if not required. Type MSConfig to review them.
iii) Block Adware pop-ups while access internet via Internet Explorer or other browsers. It's simple. Download Adblock Plus for IE and follow the quick steps.

Failover cluster node setup Errors

setup errors in SQL cluster environment..
TITLE: SQL Server Setup failure.
------------------------------
SQL Server Setup has encountered the following error:
Object reference not set to an instance of an object..
------------------------------
Solution:  Open Failover Cluster Manager and move the Instance in question related resources to the other node and re-deploy the SQL server failover cluster node setup.

Tuesday, 28 January 2014

Different methods to check System Configuration

Fairly simple one is to check the System Properties (Right-click My Computer, and then click Properties) or from BIOS (before the computer boots)
Windows key + R will take you to Run Command and type Msinfo32
Msinfo32  provides system information
Type dxdiag (either in command prompt or Run window)
provides DirectX Diagnostic Tool results
devmgmt.msc - shortcut to device manager
perfmon – performance of the system can also be monitored by adding various system related counters.

Tuesday, 7 January 2014

‘Creepware’ on the rise: Beware..!

Remote-access Trojans (RATs) is a galloping concern among common people across the world.
Malware that secretly installs tools similar to those used by network admins to control machines remotely. Once the malware is installed on a machine, cyber pranksters can take control of the entire system, including the webcam.
Many have heard the stories about people being spied on using their own computer or people being blackmailed using embarrassing or incriminating video footage unknowingly recorded from compromised webcams.
According to leading AV and security solution provider, creepware programs, such as Pandora RAT, allow an attacker to gain access to files, processes, services, the clipboard, active network connections, the registry and printers. Some programs also allow an attacker to remotely control the desktop; take screenshots; record webcam footage; record audio; log keystrokes; steal passwords; download files; open Web pages; display onscreen messages; play audio messages using the text-to-speech function; restart the computer; and cause system failure.
To stay protected against creepware or any other 'X'ware, keep antivirus definitions, operating systems, and software up-to-date, and avoid opening emails from unknown senders or clicking on suspicious email attachments. Users should also exercise caution when clicking on enticing links sent through email, instant messages, or posted on social networks, and only download files from trusted sources.
Also be suspicious of unexpected webcam activity. When you're not using the webcam, keep the shutter closed..!