Tuesday 29 April 2014

Default attachment path in windows 7 and above email clients

Tips of the Day..!
you might sometimes wonder where does the attachments vanish in case you open an attachment and modify them directly from your email client like; Windows live mail or Microsoft outlook.
below is the path where you can search for.. simple way is to open any one of the attachment from your email client and click file save as, this will give you a clear idea of default source location.
Windows Live Mail default attachment cache location:
C:\Users\kt.rinith\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
Microsoft Outlook default attachment cache location:
C:\Users\kt.rinith\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook

Scintillating Facts: Increase Speed on your Laptop (Windows 7 & Windows 8)

Scintillating Facts: This write-up is experience based as on how to Increase Speed on your Laptop (Windows 7 & Windows 8):
remove unused adwares after use.
Disable add-ons  from IE
Reliable third party tools which has been tested and rated above average will also do. For personal use free versions will do which are rated as virus free softwares. Few of them to pick-up are:
i) CCleaner  - available @http://www.piriform.com/ccleaner/download . This removes obsolete traces and reorders the system.
ii) Check the unwanted and suspicious services and disable if not required. Type MSConfig to review them.
iii) Block Adware pop-ups while access internet via Internet Explorer or other browsers. It's simple. Download Adblock Plus for IE and follow the quick steps.

Failover cluster node setup Errors

setup errors in SQL cluster environment..
TITLE: SQL Server Setup failure.
------------------------------
SQL Server Setup has encountered the following error:
Object reference not set to an instance of an object..
------------------------------
Solution:  Open Failover Cluster Manager and move the Instance in question related resources to the other node and re-deploy the SQL server failover cluster node setup.

Tuesday 28 January 2014

Different methods to check System Configuration

Fairly simple one is to check the System Properties (Right-click My Computer, and then click Properties) or from BIOS (before the computer boots)
Windows key + R will take you to Run Command and type Msinfo32
Msinfo32  provides system information
Type dxdiag (either in command prompt or Run window)
provides DirectX Diagnostic Tool results
devmgmt.msc - shortcut to device manager
perfmon – performance of the system can also be monitored by adding various system related counters.

Tuesday 7 January 2014

‘Creepware’ on the rise: Beware..!

Remote-access Trojans (RATs) is a galloping concern among common people across the world.
Malware that secretly installs tools similar to those used by network admins to control machines remotely. Once the malware is installed on a machine, cyber pranksters can take control of the entire system, including the webcam.
Many have heard the stories about people being spied on using their own computer or people being blackmailed using embarrassing or incriminating video footage unknowingly recorded from compromised webcams.
According to leading AV and security solution provider, creepware programs, such as Pandora RAT, allow an attacker to gain access to files, processes, services, the clipboard, active network connections, the registry and printers. Some programs also allow an attacker to remotely control the desktop; take screenshots; record webcam footage; record audio; log keystrokes; steal passwords; download files; open Web pages; display onscreen messages; play audio messages using the text-to-speech function; restart the computer; and cause system failure.
To stay protected against creepware or any other 'X'ware, keep antivirus definitions, operating systems, and software up-to-date, and avoid opening emails from unknown senders or clicking on suspicious email attachments. Users should also exercise caution when clicking on enticing links sent through email, instant messages, or posted on social networks, and only download files from trusted sources.
Also be suspicious of unexpected webcam activity. When you're not using the webcam, keep the shutter closed..!

Sunday 5 January 2014

Encrypt your drive with Bitlocker

Need to have TPM activated on BIOS to get these features.. However, if you don't have TPM enabled laptops, activate bitlocker without a TPM

Tuesday 24 September 2013

CREATE DATABASE failed with clustered Microsoft SQL Server 2008 instance : resolved

Trying to create a database on a clustered SQL 2008 instance? Getting the following error message?
Cannot use file
'D:\MSSQL10_50.MSSQLSERVER\MSSQL\DATA\myDatabase.mdf' for clustered server. Only formatted files on which the cluster resource of the server has a dependency can be used. Either the disk resource containing the file is not present in the cluster group or the cluster resource of the Sql Server does not have a dependency on it.
CREATE DATABASE failed. Some file names listed could not be created. Check related errors.
If so, you forgot to configure the disk dependency in Failover Cluster Manager! SQL prevents you from creating databases on volumes which aren't a dependency of the SQL Server resource. This is to prevent situations where SQL Server comes online before the disk containing the database which would lead to a "I can't see the database!" error from SQL.
To remediate this, simply add the dependency.
  1. Open Failover Cluster Manager
  2. Select your clustered application
  3. Right-click the SQL Server resource, and then bring the resource into an Offline state by clicking Bring Offline.   
  4. Right-click on your SQL Server resource then click Properties.
  5. Click on the Dependencies tab.
  6. Click the Insert button to add an additional row, then select the shared disk that contains your SQL databases.
  7. Ensure that all resources are required (there is an AND next to subsequent resources) then click OK.