Tuesday, July 31, 2012
HOW TO UPDATE DRIVER PCS USING WINDOWS UPDATE
Ok in this new tutor i have show all of you on how to use Windows update to update your PCs Driver,
Locked Files Wizard
The Locked Files Wizard, formerly known as CopyLock, is an assistant that allows you to either delete, move or rename files or folders used by the system or any other application or process. You can display and possibly stop the processes or services that use executables, folders or dynamic-link libraries (DLL) and try the operation again to possibly avoid restarting your system and thus save time.
The wizard also allows you to quickly pick the image path of a process (Select > File from Process) or a program that runs at startup from the Registry (Select > File from Registry), to manage it. This may be useful to quickly remove worms, trojans or any other malware from a system.
Additionally you can manage the pending operations that are delayed until the next reboot.
The package includes a command-line version that can be used from a Command window or a script.
Disclaimer: you can possibly crash your system or prevent an installed program from working if you are not careful, use at your own risk. And Click Here For Download
Thursday, July 19, 2012
Advanced SystemCare 6 Beta 1.0
Features:
Prevent spyware, hijackers and bad websites from being installed
Erase the history of all activities in your computer
Scan and fix invalid and improper registry entries
Detect and remove invalid startup items
Search and Clean up unused Windows garbage
Repair system configurations, Eliminate System Bottlenecks and Prevent Crashes
Tune up Windows to improve both system and Internet performance, unleash the power of your Windows
Analyze and Show detailed information of hardware and Windows
Finish all Work with one click, Super Easy to Use
Changelog:
+ Brand New User Interface for Easier and Simpler Use
+ New Surfing Protection Technology for TOP Online Security and Safer Online Environment
+ New Performance Monitoring Technology as an Add-On for More Comprehensive and Efficient Optimization
+ New Generation Technology for Much Lighter Installation Package Yet More Powerful Functions
+ New Internet Boost Technology for Faster and Smoother Online Experience
+ New Generation Super Engine for Disk Defragment to make scan and optimization much faster
+ More Secure, Stable, Smart and Reliable Performance Gives You Peace of Mind
+ Improved Active Optimize Function for Smarter Real-time Optimization
+ Improved Toolbox for Daily PC Maintenance
+ Improved Turbo Boost Function for More Efficient Working and Superb Gaming Experience
+ Enhanced Registry Fix and Vulnerability Scanning Technology Ensures More Effective Performance
+ More to be discovered by you
Click here to Download from TusFile
Secrete and Amazing Photoshop Tutorial
Here are the secrete and Amazing Photoshop Tutorial that i have not been meet before, and i just meet this Tutorial and i also shared it for all of you who want to be an expert with PS software. Click here to download this tutorial: secrete and Amazing Photoshop
Tuesday, July 17, 2012
Performing a Backup
This lesson will show you, step by step, how to perform the various types of backup as described in the previous lesson.
In the following example, the C:\Data folder will be backed up using the Backup Utility.
Notice that the A (Archive Attribute) is currently set for all of the files.
The backup utility can be quickly accessed by typing the command “ntbackup”.
By default, the Backup Utility will use Wizard Mode. Uncheck the Always start in wizard mode checkbox.
Select Advanced Mode, which enables you to configure the backup exactly as you want it.
Select the Backup tab.
From the tree view, select the location of the backup.
Check the box next to the folder you wish to backup, e.g. Data. You can also backup an entire drive by selecting the checkbox next to the relevant drive letter.
Once you have selected all the files you wish to backup, you can save the selection by clicking Job.
And selecting Save Selections.
Choose a name for the backup selection and click Save.
You can now open the backup selection each time you perform a backup, rather than re-selecting all of the files.
Next, specify a location for the backup, e.g. A network share or removable hard disk.
Once a location has been specified, select the Start Backup button.
Because this is a new backup, you should select the Replace the data on the media with this backup radio button.
Select the Advanced Option
The Disable volume shadow copy option allows the backup of locked and open files. If this option is selected, some files that are open or in use might be skipped.
You can choose the Backup type from the Backup Type drop-down list.
In this case, a Normal backup is required.
Click on OK once all options have been configured.
To begin the backup select Start Backup.
The backup will then begin.
Once completed, you can either view a Report or Close the Backup dialog box.
Notice that the Archive attribute on the files in the data folder have now been cleared.
The backup has been saved to the network share as “databackup.bkf”.
Performing a Differential Backup
In this scenario, a differential backup is performed the day after the normal backup. Because the current.txt file has been modified, the archive attribute is set.
Open the ntbackup utility and select Job.
Select Load Selections.
And open the backup selection saved previously.
Specify a new name for the backup file.
Select Start Backup.
Click the Advanced Button.
Select the Backup type drop-down list.
Select the Differential Option.
Click on OK once all options have been configured.
Click on Start Backup to begin the backup process.
Once the backup is complete, click on Close.
Notice that the archive bit on the modified file stays selected. The differential backup will only contain this file.
Performing an Incremental Backup
With an incremental backup, the archive bit will be cleared. In this example, two files in the folder have been modified since the normal backup.
Again, using the ntbackup utility, open the backup selection, and begin the backup process.
This time, select the Incremental Backup type.
Once the backup has finished, click on Close.
Notice that, unlike a differential backup, the archive bit has now been cleared.
Creating a Backup Schedule
Incremental Backup Strategy
Monday – Normal Backup of entire computer
Tuesday – Incremental Backup of Data folder
Wednesday – Incremental Backup of Data folder
Thursday – Incremental Backup of Data folder
Friday – Incremental Backup of Data folder
The backup utility allows you to schedule backup jobs to run at pre-set times. In this example, every Monday a normal backup of the entire computer is performed. Every Tuesday, Wednesday, Thursday and Friday nights, an incremental backup of the data folder is performed.
Launch the ntbackup utility and select the Schedule Jobs tab.
Select the Add Job button.
Click on Next to continue.
Select which files you would like to backup, in this case Back up everything on this computer. Once selected, click Next.
Choose a name and location for the backup and click Next.
Ensure Normal backup is selected and click Next.
Click on Next to continue.
Because this is a normal backup, data should not be appended to the end of an existing backup. Select the Replace the existing backup radio button.
Click on Next to continue.
Choose a name for the Schedule and then select the Set Schedule button.
Using the Schedule options, a backup schedule for the job can be set.
In this example, a normal backup will be performed every Monday night. Click on OK to continue.
The scheduled task will need to run with the permissions of a user with the relevant rights, e.g. A member of the Administrators or Backup Operators group. Click on OK to continue.
Click on Next to continue.
Click on Finish to close the wizard.
The normal backup job has now been created. Click on Add Job to create the incremental backup schedule.
Click on Next to continue.
Select which files you would like to backup, in this case Back up selected files, drives, or network data. Once selected, click Next.
Select the files to be backed up.
Click on Next to continue.
Click on Next to continue.
Select the Backup type drop-down list and select Incremental.
Click on Next to continue.
Click on Next to continue.
Because this is an incremental backup, it is often easier to append data to the end of an existing backup. Click on Next to continue. N.B. You should set the Tuesday backup to replace the existing backup .
Choose a name for the backup job and click Set Schedule.
Choose a schedule from the available options.
The backup will be performed at midnight every Tuesday, Wednesday, Thursday, and Friday. Click on Next to continue.
Click on Next to continue.
Click on Finish to close the wizard.
The backup schedule has now been set.
Wedding Album Maker Gold
Create amazing DVD, VCD slideshows from your wedding photos, music - and burn them directly to a DVD or CD disc. Your family and friends can play your wedding slideshow discs on their TV with a DVD player, or on their computer. With Wedding Album Maker Gold, you'll create personalized discs that are as easy to use as an ordinary DVD. With more than 260 transition effects, you can easily share your love story and excitement of your wedding day with your friends and family.
Monday, July 16, 2012
The Backup Utility
One of the most important tasks for any network administrator is the creation and management of a solid backup and restore procedure. Microsoft Windows Server 2003 provides many powerful tools that will enable you to perform backups of local and remote data, active directory and open and locked files.
Windows provides a powerful utility for this purpose known as the Backup Utility or “ntbackup”. The Backup Utility will enable you to schedule backups for periods of low utilization, such as during the night, additionally the backup utility also supports Incremental, Differential and System State Backups.
Backup Types
When using the backup utility you must decide which backup type to perform. The different backup types relate in one way or another to an attribute maintained by every file, this attribute is known as the The Archive Attribute. The archive (A) attribute is a flag that is set whenever a file is created or changed. Once a file has been backed up, the archive bit is cleared until the file is modified. You can also modify this attribute manually.
To do this, right-click on any file, select Properties and then Advanced. The archive flag can then be set by using the File is ready for archiving control.
Normal Backups
With a normal backup, all selected files and folders are backed up. As each file is backed up, the archive attribute is cleared. A normal backup does not use the archive attribute to determine which files to backup. Every backup strategy should begin with a normal backup. A normal backup is often the most time and space consuming method. However, restores from a normal backup are the most efficient.
Incremental Backups
With incremental backups, selected files with the archive attribute set are backed up. The archive bit for the file is then cleared. If you perform an incremental backup one day after a normal backup, the job will contain only files that were created or changed during the day. Incremental backups are the fastest and smallest type of backup. However, they are less efficient to restore. You must first restore a normal backup and then restore, in order of creation, each incremental backup.
Differential Backups
With differential backups, selected files with the archive attribute are backed up, but the archive attribute is not cleared. A differential backup will contain files that have changed since the last normal or incremental backup but not the last differential backup. Differential backups are more efficient than incremental backups, however they may take up a lot of space. To restore a system, you would perform a normal backup followed by the most recent differential backup.
Incremental Backup Strategy
Monday – Normal Backup
Tuesday – Incremental Backup
Wednesday –Incremental Backup
Thursday – Incremental Backup
Friday – Incremental Backup
In this backup strategy, all files are backed up on a Monday. All files that have changed each day are backed up with an Incremental Backup.
If the server was to fail on a Thursday, then you would need to restore Monday’s Normal backup, followed by Tuesday’s and Wednesday’s Incremental Backups.
Differential Backup Strategy
Monday – Normal Backup
Tuesday – Differential Backup
Wednesday –Differential Backup
Thursday – Differential Backup
Friday – Differential Backup
With a Differential backup strategy, all files are backed up on a Monday. All files that have changed since the normal backup are backed up with each Differential Backup.
If the hard disk fails on the server on a Friday, then you would restore Monday’s Normal Backup, followed by Thursday’s Differential Backup.
Backup Types
With copy backups, all selected files and folders are backed up. A copy backup neither clears or uses the archive bit. A copy backup can be used to copy or backup the computer without affecting a normal backup schedule. With daily backups, all selected files and folders that have changed during the day are backed up based on the modify date of the files. The archive attribute is neither used or cleared. Daily backups can be used to perform a backup without affecting a normal backup schedule.
Wednesday, July 4, 2012
how to use Advance System Care version Pro full 2012.
Click Here for download Advance System Care Pro 2012
Tuesday, July 3, 2012
Security Templates
Security settings can be set through predefined Security Templates. There are various grades of these of increasingly restrictive security. Each of them can be customised, and saved to be used in various group policies for local machines and domains. This is such a handy and much-used facility that there is an MMC Snap in just for it:
The Security Templates snap-in is used to manage security templates.
This tool permits an existing template to be customised if required and saved in the default folder systemroot\security\templates as an .inf file, for deployment later.
These templates have descriptive names. For example workstations (wk ws, or w), servers (sv or s) and domain controllers (dc) are clearly indicated. This is a useful aide-memoire for the exam.
Compatible Templates
This is needed for compatibility with older applications. These applications should be run under Power Users accounts.
Secure Templates
Amongst other things, these have restricted settings for Security options in Account Policies. Windows NT 4.0 machines must have Service Pack 4 installed to use this
Highly Secure Templates
Communicates only with Windows 2000+ machines, empties the Power Users group, protects network traffic with IPSec.
Setup security
This is the default policy applied to servers and clients and can be used to restore a machine to its original settings.
rootsec
Rootsec applies permissions to the root of the system drive and all its subfolders
iesacls
Iesacls sets permissions on registry keys for internet explorer.
While it’s perfectly possible to edit the .inf files in the Templates folder using Notepad, a safer alternative is suggested here.
Highlight an existing template and save it under a different name. (Right-click and select Save As)
Settings can then be viewed and altered just as if you are editing the local security policy.
Security templates can be easily transferred to other machines and applied. Templates are also a great way of backing up your security settings.
Security Configuration & Analysis
Analysis is done by comparing the current system security settings against a security template imported to a personal database. This template contains the preferred or recommended security settings (base configuration). Values found are compared to the base configuration. If the current system settings match the base configuration settings, they are assumed to be correct. If not, the attributes in question are displayed for investigation.
To perform analysis and configuration using a security template the Security Configuration and Analysis MMC snap-in is used.
The first time the Security Configuration and Analysis MMC is created and opened, no database has been defined. The instructions about how to proceed are quite clear, however!
No existing databases are available, so create one……and click Open
A template for comparison needs to be selected here, Now click Open.
The security settings may now be adjusted (Configured) or examined (Analysed). It’s recommended that an analysis is done first.
Right-click on Security Configuration and Analysis and Select Analyze Computer Now.
The results of the analysis need to be collected into a log file. Windows makes a suggestion for the location of this log but other locations can be selected.
Clicking here reveals the analysing display. This checks items as they are compared with the model in the database.
Nothing appears to have happened after all this, but the items which might need to be altered appear in the tree. To find out if anything needs to be altered, the log file needs to be viewed. Right click here and select view log file.
There are two displays of the analysis results here, shown in the left and right panes. Scroll the right pane, looking for the flagged mismatches.
The analysis can be displayed graphically by browsing through the various policy folders. Items with a red-cross do not match the settings in the template.
You can then apply the template to the machine by right-clicking on Security Configuration and Analysis.
And selecting Configure Computer Now.
All settings in the template are now applied to the computer. N.B. You will need to reanalyze the computer to obtain this page.
Using the Command Line
As well as using the easy to use MMC tools Microsoft Windows ships with the “secedit” utility which can be used to apply templates via the command line. Secedit is a more powerful option because it allows you to apply specific parts of a template rather than the entire template.
For more information on how to use the Secedit command run “secedit –help” from a command prompt.
Subscribe to:
Posts (Atom)