Monday, April 20, 2015

Windows 7: Problem with Icon Size in Manage Wireless Networks


In the "Manage Wireless Networks" window. First press the ALT to bring up the menu. Select: Tools / Folder Options / View / Reset Folders

Back in the View menu, the greyed out options should be selectable again.

Hope this helps,

Thursday, April 16, 2015

Error message when trying to email a document from the client using Outlook.

 

This requires that Outlook be configured as the default mail client in Windows. If you are certain that Microsoft Outlook is set as the default mail client, but are still getting that issue, then check the Windows registry under HKEY_LOCAL_MACHINE\SOFTWARE\Clients\Mail and that the (Default) string data value is set to Microsoft Outlook.


Thursday, April 2, 2015

Desktop Support Questions

What is active directory?

Active directory authorizes and authenticates all users and computers in a window domain network, ensuring the security of the computer and software. Through active directory various functions can be managed like creating admin users, connecting to printers or external hard drives.

What is DHCP and what it is used for?

DHCP stands for dynamic host configuration protocol. It is used to allocate IP addresses to a large number of the computer system in a network.  It helps in managing the large number of IP’s very easily.

What is DNS?

DNS mean Domain Naming Service and it is used for resolving IP addresses to name and names to IP address. DNS is like a translator for computers, computers understand the number and not the alphabet. For example, if we type like hotmail.com, the computer don’t understand this so they use DNS which converts (hotmail.com) into (numbers) and then executes the command.

What is forward and reverse lookup in DNS?

When we convert IP address into names is called Reverse lookup, while converting names into IP address is called Forward lookup

What is ‘A’ record and what is ‘MX record’?

‘A’ record is also known as host record, and it has ability to map the IP address by  name. It is with this record that DNS can find out the IP address of a name. While, ‘MX record’ also known as mail exchanger record, by the help of ‘MX’ record, location of the mail server is identified. The record is also found in DNS.

What is IPCONFIG command?

IPCONFIG command is used to display the IP information of the computer assigned like DNS IP address and gateway IP address.

What would you use to connect two computers without using switches?

Cross cables are used to connect two computers without using switches.

What is a domain?

Domain is a set of computers which network recognizes by the internet. It can be used by 
centrally administer computers. It is created when you install active directory.

What are the types of operating system or O.S?

 The two types of operating systems are:  NOS : Network Operating System. Examples of NOS- Windows NT, 2000,2003 SOS : Simple Operating System. Examples of SOS - Windows 95,98, ME

Explain about RAS server?

RAS means Remote Access Server.  It allows operating the tool or information that typically resides on a network or IT devices through combination of hardware and software, for example connecting to printer or file. It is usually used for mobile users who are in the network. It uses telephone line to provide connectivity to its users. It can also connect two or more than two offices in the network.

Explain about VPN server?

VPN means Virtual Private Network. It is a private communications network often used by companies or organizations to communicate confidentially over a public network.  This is used by the mobile users in the network.


What is Ping command?

Between two or more devices, to check the physical IP connectivity Ping command is used.

What is OU?

OU means for Organizational Unit. It is a container within Active Directory which can hold users, groups and computers.  It is the smallest unit on which administrator can assign group policy settings.

Explain group policy?

Group policy provides the stream line access to all the users in the network, it can be used to define the users security and networking policies.  By group policy you can keep control over certain function like not allowing the users to shut down the system or using the control panel or running the command. Group policy is applicable on active directory container like OU, site and Domain.

What is a “Default Gateway”?

Default gateway is the IP address of the router in the network.  In any case, if the users wants to switch on to another network, or if they cannot locate their particular network than their query will be forwarded to default gateway.

How you can take backup of emails in ms outlook?

To take a back-up in the ms outlook, you have to go in control panel. In control panel you have to go under mail option and then open the data file, select personal folder and click on open folder. After that, you have to copy .pst and have to paste it wherever you want the backup.

What is the major difference you can mention about Gateway and Router?

Gateway works on different network architecture and router works on same network 
architecture.
How many classes are there for “IP addresses” and what are the ranges?

They are segregated into five classes

1. Class A ====        0 -126 (127 is reserved for loop back)
2. Class B ====        128- 191
3. Class C ====        192-223
4. Class D ====        224-239
5. Class E ====        240-255

What is the difference between incremental backup and differential backup?

In incremental backup only incremental parts are backup and not the full back up, while in differential backup we take full back up after the normal backup.

What is reservation?

Basically the term “Reservation” is used in DHCP server. Some network equipment or
Computer system needs a specific IP address, in such case we make a reservation in DHCP server for that particular computer system.  By creating reservation it gives access to that particular IP address and at the same time prevents other computer system to use that IP address.

What is SMTP server or POP server?

SMTP stands for simple mail transfer protocol. It is basically used for sending and receiving the mail, whereas, POP stands for post office protocol it is used for mail receiving purpose in the network.

Sunday, March 29, 2015

Exclude an address from a scope


Applies To: Windows Server 2003, 2008 & 2012.

To exclude an address from a scope

1. Open DHCP.

2. In the console tree, click Address Pool.
Where?
DHCP/applicable DHCP server/applicable superscope (if used)/applicable scope/Address Pool

3. On the Action menu, click New Exclusion Range.

4. In the Add Exclusion dialog box, type the Start IP address that you want to exclude from this
scope.

To exclude a range of more than one IP address, type an End IP address.

5. Click Add.

Notes
To open DHCP, click Start, click Settings, click Control Panel, double-click Administrative
Tools, and then double-click DHCP.
Addresses that are excluded from the scope are not offered by the DHCP server to clients
obtaining leases from this scope.
List of Nortel & Avaya Phone System Feature Code List

Feature #    - Cancels a feature
Feature   0    - Speed Dial
Feature *0    - Button Inquiry
Feature   1    - Send Message
Feature *1    - Programs External Autodial Key
Feature   2    - Ring Again
Feature *2    - Programs Internal Autodial Key
Feature   3    - Call Conference
Feature *3     - Programs Feature Key
Feature   4    - Call Forward
Feature *4    - Programs Speed Dial
Feature   5    - Last Number Redial
Feature *6    - Ring Type
Feature *7    - Contrast  Display
Feature   60  - Page General
Feature   61  - Page Sets
Feature   62  - Page External Speakers
Feature   63  - Page All
Feature   64  - Line Pool
Feature   65  - View Message
Feature   66  - Voice Call
Feature   67  - Save Number
Feature   68  - Class Of Service
Feature   69  - Priority Call
Feature   70  - Transfer
Feature   74  - Call Park
Feature   75   - Group Pickup
Feature   76   - Directed Pickup
Feature   77   - Call Duration timer
Feature   78   - Dialing Pause
Feature   79   - Exclusive Hold
Feature *80   - Ringer Volume
Feature *81   - Move Lines
Feature *82   - Dialing Modes
Feature *84   - Call Logs
Feature *85   - Assign Call Log Password
Feature   82   - Call Camp
Feature   83   - Privacy On Lines
Feature   84   - Redirected Line
Feature   85   - Do Not Disturb
Feature   86   - Background Music On Speaker
Feature   88   - Block Voice Call
Feature *89 - Release
ACD Feature Codes:
Feature 801 - Call Queuing
Feature 802 - Group Listen
Feature 803 - Display Date & Time
Feature 811 - Caller ID Info
Feature 812 - View Call Log
Feature 813 - Manual Call Log
Feature 815 - Deletes Call Log Items
Feature 871 - Night Service
Voicemail Feature Codes:
Feature 980 - Leave Message
Feature 981 - Open Mailbox
Feature 985 - Norstar Voicemail Directory Number
Feature 986 - Transfer directly to Voicemail
Feature 987 - Voicemail Interupt (pulls call from voicemail)

I really hope this helps you with any questions you might have about feature codes on a Nortel & AyaPhone System. Please check out our store to view some of our auctions.


Monday, March 23, 2015

To change your password or security question:
1.Click Settings at the top of any Gmail page, and open the Accounts and Import tab.
Security tips for keeping your Email account secure

1.    Check for viruses and malware. Run a scan on your computer with trusted anti-virus software. If the scan detects any suspicious programs or applications, remove them immediately.

2.    Change your password at least twice a year. Make sure you choose a password that contains a combination of numbers, characters, and case-sensitive letters to strengthen the security of your account.

3.    Perform regular operating system and browser updates. Whether you use Windows or Mac OS, we recommend update when you get a notification.
                                                                                                                                                      
4.    Never use your Email Account password on another website. If this website is compromised and your password is discovered, someone could try to sign in to your Email Account with the same information.

5.    Protect your password. Never enter your password after following a link in an email from an untrusted site. Always go directly to your Email Account Website. Also never send your password via email. Any Mail website will never email you to ask for your password or other sensitive information.

6.    Never tell anyone your password; if you do tell someone, change it as soon as possible.

7.    Use a strong password in characters + Numeric and don't write it down or send it via email.

8.    Update your secondary email address and your security question. This will help you recover your account if you ever lose access to it. Make sure that you have access to the email address listed as your secondary, and the answer to your security question is easy for you to remember, but hard for others to guess.

9.    Always sign out of your account when you're using your & public computer. Just click Sign out.

10.  Clear forms, passwords, cache, and cookies in your browser on a regular basis, especially on a public computer.

11.  Make sure the URL domain on the given page is correct, and click on any images and links to verify that you are directed to proper pages within the site. For example, the Gmail URL is http://mail.google.com/ or, http://www.hotmail.com. Although some links may appear to contain 'gmail.com,' you may be redirected to another site after entering such addresses into your browser.

12.  Always look for the closed lock icon in the status bar at the bottom of your browser window whenever you enter any private information, including your password.

13.  Avoid downloading pirated software
Protect yourself against social engineering attacks: Social engineering is a way for criminals to gain access to your computer. The purpose of social engineering is usually to secretly install spyware or other malicious software or to trick you into handing over your passwords or other sensitive financial or personal information.




If your Folder/Files Disappear from flash driver ( USB DRIVE ) & Showing Desktop.ini file. Use Below Method.

Deleting shortcut making virus and desktop.ini that opens at startup

To Delete shortcut making virus :--->

After plug in your virus affected drive, just press Win key + R to open Run box and type “cmd” and press Enter key. (Without double quotes)


In the opened command prompt, open your drive by enter your drive letter.


For example, if your drive letter is enter g: and press Enter. (To find your drive letter just open “My Computer” and check your drive icon)


Now type “del *.lnk” and hit Enter.(without double quotes)

Then type the below command and hit Enter. (without double quotes)
“attrib -s -r -h *.* /s /d /l”


That’s it, just wait some seconds. Then open and check your drive. Your folders will be retrieved