Skip to main content

Posts

Showing posts from July, 2013

Backup Registry

Backup Registry Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state. How to Export Registry Keys Click Start, and then click Run. In the Open box, type regedit, and then click OK. On the File menu, click Export. In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry. Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save. How to Restore the Registry To restore registry keys that you exported, double-click the .reg file that you saved. __________________

Automatic Windows Installation...no keypress required !!!

Automatic Windows Installation...no keypress required !!! -------------------------------------------------------------------------------- An unattended Windows XP/2003 install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here: Code: http://unattended.msfn.org Make your unattended setup now!

Auto Shutdown Pc without using any external program

Auto Shutdown Pc without using any external program -------------------------------------------------------------------------------- Auto Shutdown Pc without using any external program ::::::::::::::::::: ********** METHOD # 1 *************** Do you know that you can make your PC shutdown at a time u wish to? Here is the trick!! How To Make A Shutdown Timer! Step 1: Right click on your desktop and choose "New=>shortcuts". Step 2: In the box that says "Type the location of the shortcut", type in "shutdown -s -t 3600" without the quotation marks and click next. Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs. Step 3: Make up a name for the shortcut and you're done. You can change the icon by right clicking=>properities=>change icon=>browse. To abort To make an abort key to stop the shutdown timer just create another shortcut and make the "location of the shortcut" to " shutdown

Auto End Tasks to Enable a Proper Shutdown

Auto End Tasks to Enable a Proper Shutdown This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. QUOTE Windows Registry Editor Version 5.00 Code: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] "AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control] "WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg 3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Application and Boot file Defrag

Application and Boot file Defrag This type of defrag pushes all commonly used programs and boot files to the edge of the hard drive for faster access. Windows XP normally schedules this every three days when it is idle, however you can force it to do this by useing the b switch anytime i.e defrag c: -b

Another Hidden Windows XP Application : Windows Event Viewer

Another Hidden Windows XP Application : Windows Event Viewer Windows Event Viewer is a little-known tool that can help you troubleshoot PC problems. It keeps a log of things that happen on your system. But you will have to do some work to find it. Now, if you want to know if little Billy has been playing computer games, you'll have to look elsewhere. Event Viewer just tracks system events. For example, you'll see entries for when the computer is booted or shut down. To locate the Event Viewer, click Start>>Control Panel. Double-click Administrative Tools and double-click Event Viewer. In the left side of the window, you'll see three entries: Application, Security and System. You'll probably be most interested in System events, or maybe Application events. To view the events for a specific category, click its name in the left pane. The events for that category will be listed in the right pane. The events listed probably won't mean much to you. For example, it

Anonymous visit to windows update

Code: Please back up your registry before trying any of these registry tricks. Would you like to use the Windows Update feature without being forced to register with Microsoft? OK then, this is what you can do: Launch good ol' Regedit. Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr entVersion. Look for a value named RegDone. If it isn't there create a new value with that name. Right click the new value and choose Modify. Make the value 1. Close Regedit and Enjoy!

add the open cmd prompt to folder context menus

add the open cmd prompt to folder context menus also drives and My Computer copy what's in the code area to notepad and save as cmdhere.reg CODE Windows Registry Editor Version 5.00 Code: [HKEY_CLASSES_ROOT\Drive\shell\cmd] @="Command Prompt" [HKEY_CLASSES_ROOT\Drive\shell\cmd\command] @="cmd.exe /k \"cd %L\"" [HKEY_CLASSES_ROOT\Directory\shell\cmd] @="Command Prompt" [HKEY_CLASSES_ROOT\Directory\shell\cmd\command] @="cmd.exe /k \"cd %L\"" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd] @="Command Prompt" [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\cmd\command] @="cmd.exe /k \"cd %L\""

Add on your Window tips

Add on your Window tips Are you sick of seeing the same tips again and again when you first logon to Windows? Now you can change them to whatever you want, whether it's quotes, jokes or a to-do list, anything is possible. Open your registry and find the key below. Code: HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Tips Create a new string valued named by incrementing the existing value names and set it to the required tip text.

A small tutorial on Real Media Format

A small tutorial on Real Media Format You may find this helpful if you donwload hundreds of short episodes in rm format like me and tired of double-click to open next files. Very easy. Use notepad to open a new file, type this inside: Code: file://link to file1 file://link to file2(type as many as you want) Close file. Rename it to FileName.rm Then you`re done!!!! Ex: I put my playlist file here: C:\Movies\7VNR And the movie files are in C:\Movies\7VNR\DragonBall Then inside my playlist file I`ll have something like this: file://DragonBall/db134.rm file://DragonBall/db135.rm file://DragonBall/db136.rm file://DragonBall/db137.rm file://DragonBall/db138.rm

How To Compare Two Text Files Using Notepad++

Let’s say you have two text files that are pretty similar in content and you want to find out what the differences are between those two. You can easily do so using Notepad++. Basically, once you have Notepad++ installed, here is what you do: 1. Open up the two files that you want to compare in Notepad++. 2. Goto Plugins > Compare > Compare 3. That’s it! Both files will show up side by side and you will see the differences highlighted. Update 1 : For those who have downloaded newer versions and can’t find the Plugins > Compare > Compare menu, please read how to get compare plugin back into notepad++. Update 2 : There’s now an even easier way to get new plugins such as the “compare plugin” installed into Notepad++. Just use the new Notepad++ Plugin Manager introduced since Notepad v5.6. Go to the Plugins menu > Plugin Manager , check the Compare check box and press install.

Hide your documents inside the image:

1.      To hide your documents, choose an image. 2.      Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR . 3.      In addition, most important is that paste both the files on desktop . You may do this anywhere instead of desktop if you have some basic understanding of command line. 4.      Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it. Cd Desktop CD stands for change directory by typing above command you change your directory to desktop . 5.     After that type command given below. Copy /b imagename.jpg + filename .rar finalimage.jpg     v   Replace imagename.jpg with the name of image you want use for hiding the document. Don't  forget to add image format (E.g. .jpg,.png,.gif) v   Replace filename with name of your file you want to hide. It must be in .rar format. v  Finally replace finalimage.jpg with whatever name you want your final image

How To Reset a Windows 7/windows 2008 r2 server Password

Problem:- .Insert either your Windows 7 installation DVD, or a Windows 7 System Repair disc, into your optical drive and then restart your computer. If you have either on a flash drive, that'll work too. Tip: See How to Boot From a CD, DVD, or BD Disc or How to Boot From a USB Device if you've never booted from portable media before or if you're having trouble doing so. After your computer boots from the disc or flash drive, click Next on the screen with your language and keyboard choices. Tip: Don't see this screen or do you see your typical Windows 7 logon screen? Chances are good that your computer booted from your hard drive (like it normally does) instead of from the disc or flash drive you inserted, which is what you want. See the appropriate link in the tip from Step 1 above for help. Click on the Repair your computer link. Note: If you booted with a system repair disc instead of a Windows 7 installation disc or flash drive, you won

Changing a forgotten root password on an ESX host

Note : In some cases a defective keyboard can cause problems logging into an ESX host. You might want to test with a different physical keyboard if you are having difficulties with known login credentials.   If you have forgotten or do not know the password for the root user on an ESX host, you may be able to change it without reinstalling.    Warning : This can be used maliciously and should be safeguarded against through proper physical access to the host, authenticated remote console access, monitoring and protection against reboot procedures (e.g. grub password) and limited access to the management network.   For more information on security best practices, see http://www.vmware.com/resources/techresources/726 .   Note : The procedure(s) below perform a password reset. This "blindly" replaces the existing root password with a new one. This is not a password recovery mechanism. That is, it does not allow you to learn the original root passw

Useful Websites for Networking Information

As a network administrator, the Internet is your best friend for networking resources, solutions, news, and guidance. Here are some websites for you to visit often. To register domains: InterNIC Network Solutions register.com To check your TCP/IP configuration: DNSstuff To see if your e-mail server has been blacklisted: DNSBL.info To stay current in the industry, try these standards organizations: Institute of Electrical and Electronics Engineers International Organization for Standardization Internet Engineering Task Force Internet Society

Basic Switch Commands to Remember for the CCENT Certification Exam

This section outlines some of the popular commands you use on a Cisco switch for the CCENT certification exam. Most of the basic router commands, such as setting passwords and banners, work on the switch. Command(s) Result Switch#show mac-address-table Used to display the MAC address table on the switch. Switch>enable Switch#config term Switch(config)#hostname NY-SW1 NY-SW1(config)# Used to change the hostname on the switch. NY-SW1>enable NY-SW1#config term NY-SW1(config)#interface vlan1 NY-SW1(config-if)#ip address 23.0.0.25 255.0.0.0 NY-SW1(config-if)#no shutdown NY-SW1(config-if)#exit NY-SW1(config)#ip default-gateway 23.0.0.1 Configures the switch for an IP address so that you can remotely connect to the switch and manage it. Also notice that the default gateway is set. If you do not set the default gateway, you will be unable to manage the switch from a different network. Switch>enable Switch#config term Switch(config)#interface f0/5 S

Network Basics: Ethernet Configurations

Network Basics: Ethernet Configurations Ethernet has a variety of possible configurations, standard, fast and gigabit. Each version operates at different speeds and use different types of media. All the versions of Ethernet are compatible with each other, so you can mix and match them on the same network by using devices such as bridges, hubs, and switches to link network segments that use different types of media. Standard Ethernet Standard Ethernet is the original Ethernet and the slowest. It runs at 10 Mbps, which was considered fast in the 1970s but is now considered slow and obsolete. Standard Ethernet comes in four incarnations, depending on the type of cable used to string the network together: 10Base5: The original Ethernet cable was thick (about as thick as your thumb), heavy, and difficult to work with. It's seen today only in museums. 10Base2: This thinner type of coaxial cable (it resembles television cable) became popular in the 1980s and l

Securing a Cisco Network

Securing a Cisco Network Security is always a concern, and your Cisco network needs to be properly secured. In the following sections, you see how to secure your Cisco network by configuring NAT, by configuring an ACL, and by applying that ACL. Securing your Cisco network by configuring NAT The following commands are used to configure NAT overload services on a router called Router1. In this example, a list of source address is created in access list #1, which is then used as the inside source list. The FastEthernet 0/0 port is the overloaded public address port that all inside addresses get translated to. Router1> enable Router1# configure terminal Router1(config)# access-list 1 permit 10.0.0.0 0.255.255.255 Router1(config)# ip nat inside source list 1 interface FastEthernet 0/0 overload Router1(config)# interface FastEthernet0/0 Router1(config-if)# ip nat outside Router1(config-if)# interface FastEthernet0/1 Router1(config-if)# ip nat inside Securing

Viewing Routing Information for Cisco Networking

Viewing Routing Information for Cisco Networking After setting up any routing protocol that you want to implement - RIP, OSPF, or EIGRP - you can view all of your routing information through the ip route command. The following is an example of the output of this command. The output includes a legend showing the codes for each routing protocol, and the specific routes are identified by the source protocol. Router2> enable Password: Router2# show ip route Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route Gateway of last resort is not set D 192.168.10

Managing Static Routing for Cisco Networking

Managing Static Routing for Cisco Networking When working with your routers on your Cisco network, it's very likely that you'll want to have your routers route data. The first step in having your router pass data from one interface to another interface is to enable routing; just use these commands. Router1> enable Router1# configure terminal Router1(config)# ip routing Whether or not you choose to use a dynamic routing protocol, you may add static routes to your router. The following will add a static route to Router1 to send data to the 192.168.5.0/24 network using the router with the IP address of 192.168.3.2. Router1> enable Router1# configure terminal Router1(config)# ip routing Router1(config)# ip route 192.168.5.0 255.255.255.0 192.168.3.2 Managing routing information protocol for Cisco networking Routing Information Protocol (RIP) is widely used, with version 2 allowing you to use Variable Length Subnet Masks (VLSM) across your network.

Working with Spanning Tree Protocol for Cisco Networking

Working with Spanning Tree Protocol for Cisco Networking Spanning Tree Protocol (STP) enables you to create redundant loops on your Cisco network for fault tolerance, and prevents inadvertent loops that may be created on your network from bringing the network to its knees. The following code will enable the Cisco proprietary Rapid Per VLAN Spanning Tree Protocol (PVST) over the open standard of Multiple Spanning Tree Protocol (MSTP). In addition to configuring STP on the switch, you will also configure port 2 on the switch for portfast, which allows the port to immediately transition to forwarding mode. Switch1> enable Switch1# configure terminal Switch1(config)# spanning-tree mode rapid-pvst Switch1(config)# interface FastEthernet 0/2 Switch1(config-if)# spanning-tree portfast %Warning: portfast should only be enabled on ports connected to a single host. Connecting hubs, concentrators, switches, bridges, etc... to this interface when portfast is enabled,

Using EtherChannel for Cisco Networking

Using EtherChannel for Cisco Networking Don't be afraid to use EtherChannel on your Cisco network. EtherChannel allows you to take up to eight network ports on your switch and treat them as a single larger link. This can be used to connect servers with multiple network cards that are bonded (or teamed) to a switch, or to connect multiple switches together. There are two main negotiation protocols, Port Aggregation Protocol (PAgP) which is a proprietary Cisco protocol and Link Aggregation Control Protocol (LACP) which is an open standards protocol. To set EtherChannel to use with of the protocols you will configure it to support one of the following modes. auto : Sets the interface to respond to PAgP negotiation packets, but the interface will start negotiations on its own. desireable : Sets the interface to actively attempt to negotiate a PAgP connection. on : Forces the connection to bring all links up without using a protocol to negotiate connections.

Creating a VLAN for Cisco Networking

Creating a VLAN for Cisco Networking When working with your Cisco network, you may want to separate users into different broadcast domains for security or traffic reduction. You can do this by implementing VLANs. The following example will create VLAN (VLAN2) and place the ports on a switch (from 1-12) into VLAN2. Switch1> enable Switch1# configure terminal Switch1(config)# interface vlan 2 Switch1(config-if)# description Finance VLAN Switch1(config-if)# exit Switch1(config)# interface range FastEthernet 0/1 , FastEthernet 0/12 Switch1(config-if-range)# switchport mode access Switch1(config-if-range)# switchport access vlan 2 If you are connecting two switches together, then you will want to allow all configured VLANs to pass between the two switches. This is accomplished by implementing a trunk port. To configure port 24 on your switch to be a trunk port, you will use the following code: Switch1> enable Switch1# configure terminal Switch1(config)# i

How to Configure a Cisco Network

How to Configure a Cisco Network Like all networks, a Cisco network needs to be properly configured. To do so, you need to know the configuration modes to use when configuring your network. You also should know how to configure an interface, configure a switch management interface, and configure an interface to use DHCP for your Cisco network. Configuration modes for Cisco networking When moving around in the Cisco IOS, you will see many prompts. These prompts change as you move from one configuration mode to another. Here is a summary of the major configuration modes: User EXEC mode: When you connect to a Cisco device the default configuration mode is user exec mode. With user exec mode you can view the settings on the device but not make any changes. You know you are in User EXEC mode because the IOS prompt displays a ">". Privileged EXEC mode: In order to make changes to the device you must navigate to Privileged EXEC mode where you may

OSI Model for Cisco Networking

OSI Model for Cisco Networking While you may not use the OSI model every day, you should be familiar with it, specifically when working with Cisco switches and routers (which operate at Layer 2 and Layer 3, respectively). Here are some of the items that operate at each level of the OSI model: Layer Description Examples 7. Application Responsible for initiating or services the request. SMTP, DNS, HTTP, and Telnet 6. Presentation Formats the information so that it is understood by the receiving system. Compression and encryption depending on the implementation 5. Session Responsible for establishing, managing, and terminating the session. NetBIOS 4. Transport Breaks information into segments and is responsible for connection and connectionless communication. TCP and UDP 3. Network Responsible for logical addressing and routing IP, ICMP, ARP, RIP, IGRP, and routers 2. Data Link Responsible for physical addressing, error correction, and preparing

Automatic Backup of Cisco Router Configuration

Introduction Routers often get upgraded or swapped out for a number of reasons. This document provides the user with some basic steps to migrate the configuration from an existing router to a new router. Prerequisites Requirements Before you use the information in this document, make sure that you meet these requirements: Access to a Trivial File Transfer Protocol (TFTP) or File Transfer Protocol (FTP) server. Connectivity - Routers must be able to access the FTP or TFTP server. Use the ping command to verify connectivity. Make a Backup of the Configuration There are several methods to choose from in order to back up and restore a configuration: Use a TFTP server Use an FTP server Use a Terminal Emulation Program Automatic Backup of Configuration using the Kron Method Backup Configuration to a TFTP Server   Configuration Script :- kron policy-list AutoSaveConfig cli write exit kron occurr

If a Layer 3 license is installed and a Layer 3 module is not installed

Author- Vaibhav Manchekar Configure SVI for management using the management command under vlan interface If a Layer 3 license is installed and a Layer 3 module is not installed or has not booted, the routed SVIs remain operationally down. http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/layer2/513_n1_1/b_Cisco_n5k_layer2_config_gd_rel_513_N1_1_chapter_0100.html#concept_A56F33CCA5B042DEB509ABBEC2240BA4