Wednesday, December 21, 2011

Trace a deleted file on a server,Track who deleted your files,How to trace a deleted file on a server

Trace a deleted file on a server,Track who deleted your files,How to trace a deleted file on a server

Trace a deleted file on a server,Track who deleted your files,How to trace a deleted file on a server


Many of our administrators are facing a deleted file on a server especially when its on the file server.
In this article we try to teach you how to trace a deleted file on a server by the user.

This can be accomplished through auditing. Lets start out by identifying what folder we want to watch – and be careful where you turn on auditing…turn it on too many folders with too many options and you can have huge performance issues.

We find the folder we want, and right click on it and go to properties:

Trace a deleted file on a server,Track who deleted your files,How to trace a deleted file on a server

Thursday, December 15, 2011

Wednesday, December 7, 2011

Teamviewer 7 Download , Teamviewer 7,Download Teamviewer 7

Teamviewer 7 Download , Teamviewer 7,Download Teamviewer 7

TeamViewer - the All-In-One Solution for
Remote Access and Support over the Internet

TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in front of it. Find out why more than 100 million users trust TeamViewer!

Thursday, December 1, 2011

Wednesday, November 30, 2011

GLPI with Windows Server AD Integration,GLPI With Active Directory Integration,GLPI LDAP/AD Authentication, LDAP/Active Directory Authentication

GLPI with Windows Server AD Integration,GLPI With Active Directory Integration,GLPI LDAP/AD Authentication, LDAP/Active Directory Authentication

GLPI with Windows Server AD Integration,GLPI With Active Directory Integration



GLPI with Windows Server AD Integration,GLPI



You can make use of an existing LDAP directory to authenticate users to GLPI. Once you configure LDAP authentication, LDAP users will be added to the GLPI database as they log on. Some of the LDAP attributes (Name, email address, location) will be copied to the GLPI user database - with this approach GLPI is able to use more than one authentication scheme (e.g. simply use LDAP and GLPI-integrated logins together).


Parameters are slightly different depending on the LDAP implementation you are using. Microsoft Active Directory in particular uses attribute names which differ from standard LDAP attributes.

Thursday, November 24, 2011

Wednesday, November 23, 2011

Wednesday, October 26, 2011

unblocker,website unblocker,youtube unblocker,facebook unblocker,file unblocker,master unblocker,unblocker download,unblocker sites

unblocker,website unblocker,youtube unblocker,facebook unblocker,file unblocker,master unblocker,unblocker download,unblocker sites


unblocker is a site unblocker service that will allow you to browse the Internet with greater freedom. If you are unfortunate enough to have a censored Internet connection then you can use  Unblocker to unblock websites for you. Access your favorite chatting and socializing websites easily with pro unblocker.

Thursday, October 13, 2011

Install WSUS on Windows Server 2008

Install WSUS on Windows Server 2008

How To Install WSUS on Windows Server 2008

 Install WSUS on Windows Server 2008

Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. By using WSUS, administrators can fully manage the distribution of updates that are released through Microsoft Up
date to computers in their network.

Tuesday, October 11, 2011

Router Default Password,Default Router Password,Default Password for Router,Default Router Password list,Router Password List

Router Default Password,Default Router Password,Default Password for Router,Default Router Password list,Router Password List


Are you having trouble getting into a router? are you not remind Default Password for Router or Default Logins and Passwords for Router? you might be wondering why you would need a list of default router passwords?

Well if you reset the settings on your router the password goes back to the factory default. If you don’t have the Default Router Password list you’ve just locked yourself out of your router. This is the point where you’d start searching on-line for the Default Router Password.

Friday, August 26, 2011

Integration of Yahoo traffic data into Bing Webmaster Tools reports

Integration of Yahoo traffic data into Bing Webmaster Tools reports

Announcing the integration of Yahoo traffic data into Bing Webmaster Tools reports

 

Bing Webmaster Tools will now be showing integrated data from Yahoo within certain areas and reports.  Given the combined effort the Search Alliance represents, it makes sense to showcase relevant data from both engines within a webmaster account.  Most areas and data within the accounts will not be affected.  The short list of areas you will notice changes in are as follows:
On the Traffic Tab: Traffic summary report and Page Traffic reports will be impacted as follows:


Thursday, August 25, 2011

18 things you need to know about SEO

18 things you need to know about SEO

18 things you need to know about SEO


SEO,SEO tips,google SEO



Let's take a look at some of the bigger ticket issues folks should focus on when optimizing their websites.  This list is not meant to cover everything, but to focus in on some of the more important aspects you should look at addressing. The first part of this list is presented in a rough order of importance based on getting work done.  In many case, you'll find your own circumstances won't allow your focus and investments to match this list.  Don't sweat it.  This list represents the ideal for a freshly planned website, prior to being built out.  If your circumstances slide you in at random points in this list, don't worry about it. The point is this is a solid place to start from.  As opposed to, say... investing time in a link buying program, or in a social "liking" scheme.


Sunday, August 14, 2011

Arabic Language For Samsung Galaxy S 19000 , Arabic Language for Samsung Mobile, Download Arabic Language For Samsung

Arabic Language For Samsung Galaxy S 19000 , Arabic Language for Samsung Mobile, Download Arabic Language For Samsung

Arabic Language for Sam sung Mobile,add arabic language - Samsung Mobile Middle East Asia
arabic language mobile i900,arabic language for samsung ,Add Arabic Language to samsungGalaxy S 19000 ,
Samsung Arabic Language  ,Download Language For Samsung,Arabic language for samsung mobile ,free download, Software arabic language for samsung mobile giveaway,Arabic Language For Samsung,Download Arabic Language For Samsung


Samsung Galaxy S 19000



Prerequisites for Firmware update:

  • Please note that before proceeding to the updating of the Galaxy S, ensure that your phone is having the model number as Samsung Galaxy S GT I9000 and not any other similar looking phones like Captivate, Mesmerize, SL I9003 or any other phones as if you install with this firmware then some of the functionalities won’t run and could even lead to serious damage to your phone.
  • Ensure that all data which is present in your phone is backed up in your computer which can be done.
  • You have removed the SIM card as well as the external SD cards if any in the phone,
  • Most importantly you need to ensure that your phone has atleast75-80% of battery power left.
  • Ensure that your computer / laptop which runs on a XP, Vista or Windows 7 OS the firewall and other antivirus programs are disabled and also you should have admin privileges to download and install the software including the drivers and also along with this you will be requiring the USB port on your computer which supports USB 2.0.
  • Ensure that you  disable any firewalls, antivirus if any. Be rest assured as all the files which are mentioned in this article are safe and virus free.

Tuesday, August 9, 2011

Teamviewer 6 Download , Download Teamviewer 6

Teamviewer 6 Download , Download Teamviewer 6

TeamViewer - the All-In-One Solution for
Remote Access and Support over the Internet

TeamViewer connects to any PC or server around the world within a few seconds. You can remote control your partner's PC as if you were sitting right in front of it. Find out why more than 100 million users trust TeamViewer!

Thursday, July 14, 2011

Blogger Dashboard  gets a new look,Googles Blogger Dashboard gets a new,Blogger Dashboard

Blogger Dashboard gets a new look,Googles Blogger Dashboard gets a new,Blogger Dashboard


2010 was a big year for Blogger. We cemented ourselves as one of the largest blogging platforms and the sixth largest website in the world, according to Alexa. Blogger users published more than half a billion blog posts, which were read by more than 400 million active readers across the globe. We introduced template designer, real-time stats, comment spam filtering, mobile templates, web fonts and more. And to top it all off, we were dubbed the most reliable blogging service around.

2011 promises to be another exciting year.


Monday, July 4, 2011

Share Buttons not Working Blogger,Official Sharing Buttons on Blogger

Share Buttons not Working Blogger,Official Sharing Buttons on Blogger


Share Buttons not Working Blogger,Official Sharing Buttons on Blogger


Blogger has been rolling out new features to improve the looks and usability of the blogs. Blogger is now testing out a new Social Sharing icon set consisting of Email, Blogger,Twitter(with goo.gl shortener),Facebook and Google buzz buttons. The set looks simple and elegant with some cool mouse over effects. These Sharing buttons are now available in your regular dashboard.If you need to take a peek at these new sharing icons, then take a look at my post page(and try sharing it :P ).
You are still reading. So i guess that you are really interested in implementing these Sharing buttons on your Blogger Blog.


Sunday, July 3, 2011

Teamviewer for mobile phone,TeamViewer app for iPhone iPod touch iPad and for Android,Teamviewer for Android

Teamviewer for mobile phone,TeamViewer app for iPhone iPod touch iPad and for Android,Teamviewer for Android

Teamviewer for mobile phone,TeamViewer app for iPhone iPod touch iPad and for Android,Teamviewer for Android


With the TeamViewer app for Apple iOS and for Android you are able to  access remote computers from everywhere. It allows you to give  spontaneous support as well as having permanent access to unattended  computers.

Mobile and flexible with the TeamViewer app

  • Support your clients and colleagues spontaneously.
  • Access your office desktop with all of its documents and installed applications.
  • Remotely administer unattended computers (e.g. servers).
  • Free for non-commercial use: support family and friends or have remote access to your own computer.

TeamViewer App for Android

Tuesday, June 28, 2011

html or htm,htm vs. html,What is the difference between the HTM and HTML extensions

html or htm,htm vs. html,What is the difference between the HTM and HTML extensions



Other then the obvious, the letter "L," there's not much of a difference between the two extensions. Most, if not all, web browsers and servers will treat a file with an HTM extension exactly as it would a file with an HTML extension, and vice versa. 


Practical Differences
Practically speaking, there is no difference between the two extensions. Both denote that the file contains HTML. This is really a matter of convention and is not an absolute, but most realize that a file whose extension is htm or html contains HTML.

Thursday, June 2, 2011

Cyberduck to iPhone,Connect Your iPhone to a Mac Using CyberDuck,How To Connect Your iPhone to a Mac Using CyberDuck

Cyberduck to iPhone,Connect Your iPhone to a Mac Using CyberDuck,How To Connect Your iPhone to a Mac Using CyberDuck

Cyberduck to iPhone,Connect Your iPhone to a Mac Using CyberDuck,How To Connect Your iPhone to a Mac Using CyberDuck





Cyberduck is a program developed by multiple programmers in an open-source fashion and is used, in part, to transfer data via SSH. SSH, or Secure Shell, is a network protocol that allows data to be exchanged using a secure channel between two networked devices. It allows users direct access to an iPhone's systems and files. This is useful for quick file transfer, changing wallpapers and phone customization. Cyberduck can be downloaded for free.

In this article we need to know thee way to connect your iPhone to your Mac using CyberDuck.
you can follow the follwing steps to success connecting iPhone to Mac unsing  CyberDuck.
you can download it from below link:

Cyberduck


1. First, make sure you have OpenSSH installed on your iPhone (Open 'Cydia'' and search for 'OpenSSH)

2. Connect your Mac and iPhone to your wireless network.


Cyberduck,Download Cyberduck,Cyberduck Free Download, cyberduck windows,cyberduck iphone, cyberduck MAC,cyberduck pc,cyberduck leopard,cyberduck download for windows,cyberduck review,cyberduck software,cyberduck for vista

Cyberduck,Download Cyberduck,Cyberduck Free Download, cyberduck windows,cyberduck iphone, cyberduck MAC,cyberduck pc,cyberduck leopard,cyberduck download for windows,cyberduck review,cyberduck software,cyberduck for vista

Cyberduck,Download Cyberduck,Cyberduck Free Download, cyberduck windows,cyberduck iphone, cyberduck MAC,cyberduck pc,cyberduck leopard,cyberduck download for windows,cyberduck review,cyberduck software,cyberduck for vista

 

Cyberduck


Cyberduck is an open source FTP and SFTP, WebDAV, Cloud Files, Google Docs, and Amazon S3 client for Mac OS X and Windows (as of version 4.0) licensed under the GPL. Cyberduck is written in the Java language and using the Cocoa user interface framework. It supports FTP/TLS (FTP secured over SSL/TLS), using AUTH TLS as well as directory synchronization. The user interacts with the Cocoa application's GUI, including file transfer by drag and drop, and notifications via Growl. In addition, it is also able to open some files in external text editors.





Tuesday, May 31, 2011

Friday, May 20, 2011

Install Active Directory Domain Services in pictures, Install Active Directory Domain Services  ,Windows Server 2008

Install Active Directory Domain Services in pictures, Install Active Directory Domain Services ,Windows Server 2008

Install Active Directory Domain Services in pictures, Install Active Directory Domain Services  ,Windows Server 2008


Since Windows 2000, Active Directory has been the driving force behind Microsoft Server Networking Services.
Active Directory provides the structure to centralize the network and store information about network resources across the entire domain. Active Directory uses Domain Controllers to keep this centralized storage available to network users.
In this scenario we are going to install Active Directory fresh with a brand new Domain Controller after a fresh install of Windows Server 2008.

Requirements for Active Directory Domain Services

Let’s go through some of the requirements for a fresh install of Active Directory Domain Services. Some of these will be required to be done before hand; others as noted can be done during the install:
  • Install Windows Server 2008
  • Configure TCP/IP and DNS networking configurations
  • The disk drives that store SYSVOL must be on a local drive configured NTFS
  • Active Directory requires DNS to be installed in the network. If it is not already installed you can specify DNS server to be installed during the Active Directory Domain Services installation.
Once you verify that these requirements have been met we can get started.


Thursday, May 19, 2011

Installing Distributed File System in Pictures, Install DFS Role on Windows server 2008,Windows Server 2008

Installing Distributed File System in Pictures, Install DFS Role on Windows server 2008,Windows Server 2008

Installing Distributed File System (DFS),Install DFS Role on Windows server 2008


DFS stands for Distributed File System and provides two very important benefits for system administrators of Wide Area Networks (WAN) with multiple sites that have a need to easily store, replicate, and find files across all locations.
The first is the benefit of being able to have one Namespace that all users can use, no matter what their location, to locate the files they share and use.

The second is a configurable automatic replication service that keeps files in sync across various locations to make sure that everyone is using the same version.
Let’s take a look at these two very important aspects of DFS.
DFS NameSpaces – Each namespace appears as a folder with subfolders underneath.
The trick to this is that those folders and files can be on any shared folder on any server in your network without the user having to do any complicated memorization of server and share names. This logical grouping of your shares will also make it easier for users at different sites to share files without resorting to emailing them back and forth.

Sunday, May 15, 2011

Av.exe ,Remove AV.exe Virus ,Get an AV.exe Removal  ,get rid av.exe

Av.exe ,Remove AV.exe Virus ,Get an AV.exe Removal ,get rid av.exe



Av.exe ,Remove AV.exe Virus ,Get an AV.exe Removal  ,get rid av.exe


ave.exe is a variant of av.exe installed by the Trojan FakeRean. Just like av.exe, this variant also chooses randomly from a list of names each time it is installed. It has a list of names for all the current versions of Windows with a mathching fake Windows Security Center or a fake Windows Action Center.

So far I have seen the follwing names:
On Windows XP:
  • Antivirus XP
  • XP Smart Security
  • XP Smart Security 2010
  • XP Antimalware
  • XP Antimalware 2010
  • XP Security Tool
  • XP Security Tool 2010
  • XP Internet Security
  • XP Defender Pro
  • XP Security
On Windows Vista:
  • Vista Antimalware
  • Vista Security Tool 2010
  • Vista Smart Security
  • Vista Smart Security 2010
  • Total Vista Security
  • Vista Security
  • Vista Defender Pro
  • Vista Internet Security
On Windows 7:
  • Win 7 Defender
  • Win 7 Defender Pro
  • Total Win 7 Security
  • Win 7 Smart Security 2010
  • Win 7 Internet Security
  • Win 7 Security Tool
  • Win 7 Antimalware
  • Antispyware Win 7
  • Win 7 Security

 

Turn System Restore off and on

Turn System Restore off and on

Turn System Restore off and on

System Restore is a utility included in modern Windows operating systems starting from Windows Millennium edition. Installation of a software, driver or a Malware infection can make unexpected changes to the system files and cause Windows to behave in an unpredictable manner. System Restore regularly saves “restore points” on your computer, so that the system files can be restored to an earlier point in time. System Restore is not available for a disk that’s formatted using the FAT or FAT32 file systems.
System Restore saves information about Windows system files, programs, registry settings and other system information that Windows uses. They do not contain personal files, such as email, documents or photos.

Turn System Restore off or on Windows XP in pictures

Turn System Restore off or on Windows XP in pictures

Turn System Restore off or on Windows XP

System Restore is a utility included in modern Windows operating systems starting from Windows Millennium edition. Installation of a software, driver or a Malware infection can make unexpected changes to the system files and cause Windows to behave in an unpredictable manner. System Restore regularly saves “restore points” on your computer, so that the system files can be restored to an earlier point in time. System Restore is not available for a disk that’s formatted using the FAT or FAT32 file systems.
System Restore saves information about Windows system files, programs, registry settings and other system information that Windows uses. They do not contain personal files, such as email, documents or photos.

Turn System Restore off or on Windows Vista in pictures

Turn System Restore off or on Windows Vista in pictures

Turn System Restore off or on Windows Vista

System Restore is a utility included in modern Windows operating systems starting from Windows Millennium edition. Installation of a software, driver or a Malware infection can make unexpected changes to the system files and cause Windows to behave in an unpredictable manner. System Restore regularly saves “restore points” on your computer, so that the system files can be restored to an earlier point in time. System Restore is not available for a disk that’s formatted using the FAT or FAT32 file systems.
System Restore saves information about Windows system files, programs, registry settings and other system information that Windows uses. They do not contain personal files, such as email, documents or photos.

Turn System Restore on or off Windows 7 in pictures

Turn System Restore on or off Windows 7 in pictures

Turn System Restore on or off Windows 7

System Restore is a utility included in modern Windows operating systems starting from Windows Millennium edition. Installation of a software, driver or a Malware infection can make unexpected changes to the system files and cause Windows to behave in an unpredictable manner. System Restore regularly saves “restore points” on your computer, so that the system files can be restored to an earlier point in time. System Restore is not available for a disk that’s formatted using the FAT or FAT32 file systems.
System Restore saves information about Windows system files, programs, registry settings and other system information that Windows uses. They do not contain personal files, such as email, documents or photos.

Tuesday, May 10, 2011

Microsoft buy Skype,Microsoft buys Skype for $8.5 billion,Microsoft will acquire Skype

Microsoft buy Skype,Microsoft buys Skype for $8.5 billion,Microsoft will acquire Skype



In its largest acquisition ever and the tech world's most massive deal in years, Microsoft Corp. is buying Internet communications company Skype Global for a stunning $8.5 billion.
"The combination will extend Skype's world-class brand and the reach of its networked platform, while enhancing Microsoft's existing portfolio of real-time communications products and services," the companies said in a statement.

Tuesday, April 26, 2011

Wednesday, April 13, 2011

Free AVG  2012,Free AVG  2012 , AVG2011, AVG2012,Free Download AVG 2011,Download AVG 2011

Free AVG 2012,Free AVG 2012 , AVG2011, AVG2012,Free Download AVG 2011,Download AVG 2011


Basic protection for surfing, searching and social networking AVG 2011
Millions of people around the world use AVG Anti-Virus Free AVG 2011 for their basic online activities. Whether it's surfing the Internet, conducting web searches, or simply keeping up with friends on Facebook, AVG Anti-Virus Free (AVG 2011) has got you covered.


Tuesday, April 12, 2011

iphone 4.3.1,download iphone 4.3.1

iphone 4.3.1,download iphone 4.3.1


The latest update to iOS version 4.3.1, is available via iTunes now.
It's a minor update, fixing some bugs and other minor issues. Here's what's new, according to Apple:
  • Fixes an occasional graphics glitch on iPod Touch (4th generation)
  • Resolves bugs related to activating and connecting to some cellular network
  • Fixes image flicker when using Apple Digital AV Adapter with some TVs
  • Resolves an issue authenticating with some enterprise web services

Monday, April 4, 2011

Block Teamviewer in TMG 2010 |  UnBlock Teamviewer Using TMG 2010 | Permit  Teamviewer Using TMG 2010 | Allow Teamviewer Using TMG 2010 | Stop Teamviewer| Teamviewer Ports

Block Teamviewer in TMG 2010 | UnBlock Teamviewer Using TMG 2010 | Permit Teamviewer Using TMG 2010 | Allow Teamviewer Using TMG 2010 | Stop Teamviewer| Teamviewer Ports



Block Teamviewer Using TMG 2010 |  UnBlock Teamviewer Using TMG 2010 | Permit  Teamviewer Using TMG 2010 | Allow Teamviewer Using TMG 2010 | Stop Teamviewer| Teamviewer Ports



Many of systems Administrator using TMG 2010 and some times you need to block some sites ,application and ports due to security or policy issue.

In this article we need to know how we block / unblock the teamviewer using TMG 2010.

First of all we need to know how is the teamviewer work and what port its used for working?

1- TeamViewer use TCP 5938 port.
2- TeamViewer uses the follwing sites :
http://dyngate.com 
http://teamviewer.com 

Saturday, April 2, 2011

Friday, April 1, 2011

Restore Using Backup Exec | Backup Exec Restore

Restore Using Backup Exec | Backup Exec Restore


Backup Exec by Symantec is a robust software solution that stores enterprise files across a network. The software has a graphical user interface that allows administrators to easily restore files that are corrupted or accidentally deleted. Using Backup Exec to restore files takes only a few steps. Restoring from Backup Exec means you have already performed a backup and have stored files on the desired media. Backup Exec automatically backs up files and directories configured in the program. This example assumes that you have the software installed and have already performed regular backups.

Instructions


Top 100 Word Profitable In Adsense 2011| 100 Word Profitable In Adsense 2011 | Profitable Word  In Adsense 2011

Top 100 Word Profitable In Adsense 2011| 100 Word Profitable In Adsense 2011 | Profitable Word In Adsense 2011



In this article we show the top paying keyword in 2010-2011 in google ad-sense,most expensive ad-words

we hope you are take in your mind to make site about one word not one for all word so you can earn more and more money.




The words and $ as below you can download it from below link:
Adsense_Top_Paying_Keyword
http://goo.gl/DvOIg

Note: Inside the link there is New Year Gift 2011 form Me about Google adsense tips.



Top 100 Word Profitable In Adsense 2011|Google Adsense Top Paying Keywords 2011| The most expensive keywords in AdSense 2011| High paying Keywords 2011| Top Profitable Keyword 2011|Adsense Top Paying Keyword 2011 | highest paying adsense keywords 2011

Thursday, March 31, 2011

Prepare Tapes for Backup Exec in Tape Library

Prepare Tapes for Backup Exec in Tape Library


Symantec Backup Exec is an enterprise-level backup assistant application. It allows you to configure regular backups of data from single computers to entire server farms. Simply configure drives, media and data locations, and Backup Exec can run your jobs indefinitely, letting you know if any issues arise. Once your tape drive is set up in the application and you've created a job backing up your data, you must set up media, or tapes, in a media set. You direct your backup job to pull media from a certain set, so you have to make sure that a media set of that name exists.

Instructions




  1. Add a New Media Set

    • 1 Open Symantec Backup Exec by clicking its link from your "Start" menu.
    • 2
      Select the "Media" tab.
    • 3
      Click "New Media Set" under Media Set Tasks.
    • 4
      Type the name of your new media set in the "Properties" window that opens. Make sure the name matches the name referenced in your backup job. Click "OK."

    Configure New Media

    • 1
      Insert a new tape into your tape drive.
    • 2
      Select the "Devices" tab in Backup Exec.
    • 3
      Right-click your drive and click "Inventory." This will force the application to mount the new media and read its label. It will then show the new tape in the media window to the right.
    • 4
      Click "Label media" under "Media Tasks" with your drive still selected.
    • 5
      Type the name you wish to give your tape in the window that opens up. This sets the media label to the name you provide. Click "OK."
    • 6
      Right-click the tape from the media window on the right side of the page and click "Associate with Media Set."
    • 7
      Select the appropriate media set from the "Associate With" dropdown list and click "Yes." Your new tape is now prepared and added to a media set in your library. It is ready for use.
    • 8
      Repeat the steps above for each new tape you need to configure.

Wednesday, March 30, 2011

The security database on the server does not have a computer account for this workstation trust relationship in windows 7

The security database on the server does not have a computer account for this workstation trust relationship in windows 7

The security database on the server does not have a computer account for this workstation trust relationship in windows 7




Many of Systems administrator may be seen this error when some one try to enter his account on the domain.

there are several solution you can use it to solve this issue.

1-Make sure your computer account is not disabled in Active Directory users and computers

2-try to check the DNS and its seen the FQDN.

3-try to login in as admin domain and make gpupdate /force then logout then enter by user domain.

4-try to join and disjoin your client from the domain.

5-finally try to delete his profile and make new one (Remind you must make full backup for data before).


We hope these steps i mentioned may be solve this issue.

The security database on the server does not have a computer account for this workstation trust relationship in windows 7

Monday, March 28, 2011

Google now supports the Cherokee language as an option for searches

Google now supports the Cherokee language as an option for searches

Google now supports the Cherokee language as an option for searches

In an attempt to preserve the endangered Cherokee language, Google has added it as an interface option.

The addition, announced today, means Cherokee speakers can now make it their default language for searches, and help keep the language alive.
 Google also introduced an on-screen keyboard option. In practice, this means anyone who can read and write Cherokee can look up anything on Google. Users can change their language setting to Cherokee here.

Cherokee, an Iroquoian language, did not have a written form until the early 19th century, when it got a syllabary (a set of written symbols to represent syllables) writing system. The Cherokee Nation has about 300,000 members, though only about 20,000 people speak the Cherokee language.

“I believe that efforts like those of Google are essential to keeping our language alive,” Cherokee Nation Principal Chief Chad Smith said in a statement. “We have been working hard to get our young people interested in learning our Native tongue, but we cannot be successful unless they can read and write in the medium of their era -– all the digital devices that are currently so popular.”

With this latest addition, Google now supports 146 interface languages and encourages users to sign up for Google in Your Language to make a case for interfaces in other endangered languages.

Google made similar additions of other North American native languages Maya and Nahuatl last year.

Sunday, March 27, 2011

Backup Exec selects media

Backup Exec selects media

 Backup Exec selects media 



A common problem with Backup Exec is that unexpected media get used for a backup job. This generally stems from the complexity of a few settings, combined with misunderstandings about how media sets work.
Once you have your media sets configured, you need to think about how you want the media to be used for the backup jobs. The two settings that determine the selection criteria are the Overwrite Protection Level and the Media Overwrite Option. When you first configure Backup Exec, you get asked what you want to set for these options. Unless you knew otherwise, you probably chose the defaults.
The Overwrite Protection Level determines how aggressively Backup Exec is going to try and protect your data. There are three options:
  • Full - Overwrite Protection Periods will be applied to media sets
  • Partial - Overwrite Protection Periods will be applied to media sets
  • None - Overwrite Protection Periods will not be applied to media sets
Starting with the easiest to eliminate, the None options means that any media can be overwritten, regardless of any Overwrite Protection Period you have set. Unless you have a specific need for this, I'd advise against it.
The Full and Partial options are very similar. The difference is that if you choose Partial, then imported media can be overwritten. The safest option is to choose Full protection. If you frequently import media and use it for your backup jobs, use partial.
Once you have set your Overwrite Protection Level, you need to set the Media Overwrite option. This determines whether Backup Exec is going to be biased towards using new media first, or reusing old media first. The options are:
  • Overwrite scratch media before overwriting recyclable media contained in the targeted media set
  • Overwrite recyclable media contained in the targeted media set before overwriting scratch media
The first option will encourage Backup Exec to use any new tapes rather than overwrite older tapes. The second option will encourage Backup Exec to overwrite older tapes rather than use new media.
Once you've understood and configured these two options, how does Backup Exec actually choose what media to use? The first thing that is used to determine is what tape drive, library, library partition, or B2D folder is selected. Obviously for a tape drive, or partition with only one tape in, either the media is usable or it's not.
On page 229 and 230 of the Backup Exec 10d Administrator's Guide there is a table which tells you the answer, so rather than copy that, I'd encourage you to read it for yourself. However, if you have Full Overwrite Protection set, I'll summarise:

An overwrite job with Overwrite scratch media first set:

  1. Use any media in the scratch set
  2. Use the oldest (if any) recyclable (overwritable) media in the targeted media set
  3. Use the oldest (if any) recyclable (overwritable) media in any other media set

An overwrite job with Overwrite recyclable media first set:

  1. Use the oldest (if any) recyclable (overwritable) media in the targeted media set
  2. Use any media in the scratch set
  3. Use the oldest (if any) recyclable (overwritable) media in any other media set
It's clear to see that with the first option, if you have plenty of scratch media to start with, it'll get used up quickly!

An append job  

If any appendable media is found in the backup device, that is used first. If no appendable media is found, then either the job changes to an overwrite job, or the job is terminated. If an append job fills a tape, then the next overwritable piece of media is used to continue the job.

Saturday, March 26, 2011

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

My Tweets or Hashtags Are Missing from Search! 

Are you not seeing some of your Tweets in Twitter Search? This page will help you figure out why!

Are Any of your Tweets in search?

First, please check to see if any of your Tweets are in search. Here's how:
  1. Go to Twitter Search and
  2. Type "from:username" into the search box, whereas 'username' is our username.
  3. Search for your Tweets.
For example, here's how @palstu searched for her Tweets:
 Twitter Search for palstu account


If your Tweets are showing up here, then your account is in Twitter Search! Yay! If only some of your Tweets appear, or, you're missing a few tweets, don't fret; we're working to get as many Tweets into Twitter Search as possible.
Due to resource constraints, not every tweet can be indexed in Twitter Search. Our engineers are always working to index more updates, but we can't force individual, missing Tweets into search. Rest assured that your followers will still see all your updates and @replies, and we'll update on this page as we improve this issue.

What if none of your tweets appear in search?

There are a few reasons why all your tweets might not be missing from public search:
  1. Your tweets aren't recent: We only index tweets for about 6 days. If your most recent tweet is older than that, please tweet again and check.
  2. Your account is private: Private or "protected" accounts do not appear in search. Learn more about protected accounts here.
  3. Your account is new, or you recently changed your username: It can take a few days for new and updated accounts to be indexed by search.
  4. Your email is bouncing: If you log in and see a big red warning when you're at twitter.com that says your email address is having delivery issues, please take the steps to fix it! We want to show you in search, but we need you to fix your email first (see Screenshot 2 below).
  5. You are being filtered out of search due to a quality issue: In order to provide the best search experience for users, Twitter automatically filters search results for quality. This Search Quality help page has information why accounts are filtered from search
  6. You are missing because of current resource constraints: Right now, some users may not be seeing their Tweets because of resource constraints. This is more likely affecting you if you're a new user (with an account less than a couple of weeks old). Our search engineers are working on this known issue, and your Tweets should start showing up in search soon!

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

Monday, March 21, 2011

Malwarebytes Anti-Malware | Malwarebytes download |Malwarebytes free download |Malwarebytes free download Key Features| Malwarebytes Usage |

Malwarebytes Anti-Malware | Malwarebytes download |Malwarebytes free download |Malwarebytes free download Key Features| Malwarebytes Usage |




Malwarebytes' Anti-Malware


Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with viruses, worms, trojans, rootkits, dialers, spyware, and malware that are constantly evolving and becoming harder to detect and remove. Only the most sophisticated anti-malware techniques can detect and remove these malicious programs from your computer.
Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. In our product we have compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect. Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start. The realtime protection module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, we have implemented a threats center which will allow you to keep up to date with the latest malware threats.
Activating the full version unlocks realtime protection, scheduled scanning, and scheduled updating. For consumers and personal use, it is a one time fee of $24.95. For corporate and business customers, annual licenses are required, please see our Corporate Licensing program.

Key Features


  • Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit).
  • Light speed quick scanning.
  • Ability to perform full scans for all drives.
  • Malwarebytes' Anti-Malware protection module. (requires registration)
  • Database updates released daily.
  • Quarantine to hold threats and restore them at your convenience.
  • Ignore list for both the scanner and Protection Module.
  • Settings to enhance your Malwarebytes' Anti-Malware performance.
  • A small list of extra utilities to help remove malware manually.
  • Multi-lingual support.
  • Works together with other anti-malware utilities.
  • Command line support for quick scanning.
  • Context menu integration to scan files on demand.

Usage


Simply download Malwarebytes' Anti-Malware from the one of the links below. Double click the downloaded file to install the application on your computer. Once the application is installed, double click on the Malwarebytes' Anti-Malware icon to start the program. When the application is open, select Scan and the application will guide you through the remaining steps.

Issues Fixed


  1. Fixed issue with the scheduler not performing realtime updates.
  2. Fixed multiple issues with product crashing during a scan.
  3. Fixed issue with log not saving on certain command line scans.
  4. Fixed various issues with Finnish, Italian, and Norwegian languages.
  5. Fixed formatting and misspelling issues in product help file.

    Download


    • Version: 1.50.1
    • File Size: 7.35 MB
    • Operating Systems: Microsoft ® Windows 2000, XP, Vista, 7.
    • Languages Available: English, Arabic, Belarusian, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Korean, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish.
     Click Here to Download  Malwarebytes Anti-Malware Free



    1. Please download this official version of Malwarebytes' Anti-Malware.

      

    2. Install Malwarebytes' Anti-Malware by double clicking on mbam-setup.

    3. Follow the prompts. Make sure that Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware are checked. Then click finish.


    4. Malwarebytes' Anti-Malware will automatically update itself after the installation, click the OK button to close that box and you will now be at the main program Window as shown below.

    If you are having problems with the updater, you can use this link to manually update Malwarebytes' Anti-Malware with the latest database. Make sure that Malwarebytes' Anti-Malware is closed before installing the update.


    5. Close All opened Windows, Programs, File or Folders.


    6. Make sure you are on the Scanner tab. Select Perform quick scan then click the Scan button as shown below.




    7. Malwarebytes' Anti-Malware will now start scanning your computer for infected files as shown below.



    8. When the scan is finished a message box will appear, click OK to continue.


    9. Click Show Results.


    10. You will now be presented with a screen showing you the malware infections like shown below. Yours may look different depending on the infection you have.


    11. Click on Remove selected.


    12. When removing the files, Malwarebytes' Anti-Malware may require you to restart the computer in order to do a complete removal. If it displays a message stating that it needs to restart, click Yes.


    13. After that you can close the Malwarebytes' Anti-Malware window, your computer is now cleaned from the malware infection.


    To protect and prevent your computer from experiencing future threats like this, we highly recommend purchasing the FULL version of Malwarebytes' Anti-Malware with real-time (live) protection .


      Sunday, March 20, 2011

      ie9,ie9download,internet explorer 9,explorer 9,Download Ie9 with your language

      ie9,ie9download,internet explorer 9,explorer 9,Download Ie9 with your language







      After two years since Internet Explorer 8 was launched,has released the final version of its latest web browser, Internet Explorer 9, available for download. Thanks to powerful competitors (Google Chrome and Mozilla Firefox) and the declining usage of Internet Explorer in general, Microsoft was forced to rebuild Internet Explorer not only to run faster (and to be more responsive), simpler and more secure, but also to be redeem itself in the eyes of web developers and standards-savvy designers against the bad reputation of being a non standards compliant browser.

      The first thing you'll notice when you run Internet Explorer 9 for the first time is its new, simplified and minimalist interface. There is a single location bar for searches and URLs (similar to Google Chrome) and the browser tabs opens on the same row as the location bar in a single strip alongside. There are of course, pros and cons associated with this. The benefit is clear - more browsing room. Although, if you open several tabs at the same time, it becomes difficult to distinguish the tabs. Among other news, the Stop and Refresh buttons live now inside the location bar along with the search drop-down menu icon. Also, all items associated with print, safety and other controls have gone now into the Tools menu.

      As Internet Explorer 8, the browser has tab sand-boxing. This feature prevents the crashing of your entire browser in case something goes wrong with a tab (i.e. freezes) and it will offer you the possibly to resurrect that tab. Moreover, when you open a 'New Tab' page, you'll be able to open closed tabs and previous browsing sessions among with the most frequently visited Web sites. As Google Chrome, IE9 allows you to drag a tab to create a new browser window. Additionally, the browser integrates with the Aero Snap feature in Windows 7 in order to drag a tab to a side (right or left) on your monitor, which makes it easy when you want to look at two sites simultaneously. Another interesting feature of IE9 is that you can pin specific sites to your Windows 7 desktop taskbar. To do so, click and hold on a tab and drag it to the taskbar to pin. This is quite useful, especially for sites we visit on a frequent basis. 



      Another important improvement is the overall browser performance thanks to a new Javascript engine as well as hardware acceleration. As a comparative, the rendering speed of the web pages and the performance executing Javascript is as fast as in Google Chrome, Faster than Mozilla Firefox and miles away over IE8. About the browser start times, its been also improved and to be honest, the whole thing feels fast and smooth. Moreover, its much-touted hardware acceleration, which uses the graphics processor to render web videos improves the performance a lot.

      The most important focus of IE9 it to be a safe, secure and private browser. In this manner, there are two main features. One is called ActiveX Filtering which once turned on, it will block all ActiveX controls from being loaded on websites, unless you choice to allow them on a particular website. In short explanation, ActiveX controls (e.g. Adobe's Flash Player which is safe, of course) are like small plugins you can install on your computer to enable your web browser to run small programs to display content. But, there are a lot of unsafe ActiveX controls out there and also a lot of unsafe websites which will add exploit holes in your system.

      Another addition to 'safe and secure' is the Tracking Protection which enables you to keep sites from tracking your activity across browsing sessions. Moreover, the tracking protection feature a Tracking Protection Lists. These are lists of websites that IE9 will block from loading on your computer, therefore they will be unable to track you since they cannot load the image or animation required to track you or run the tracking code.

      Finally, the SmartScreen Filter will warn you if you're downloading a known virus, before you run the file and also if you're downloading a file that hasn't been verified as safe. As expected, the other security feature built into the browser, called Protected Mode, which stops Internet Explorer 9 or ActiveX controls running in the browser from accessing the system to make malicious changes.

      Pluses: HTML 5 compatibility, address bar search function, ability to pin Web site shortcuts to taskbar in Windows 7, hardware acceleration, fast.

      Drawbacks / flaws: Slow install, forces a reboot, does not work in Windows XP, requires SP2 to work under Windows Vista, there are a number of features that only work on Windows 7.

      In conclusion: With all this being said, IE9 is fast and highly usable, actually, even enjoyable to use. Looks like Microsoft has put together all their focus to give Web users good reasons to at least give IE 9 a try.

      [warn] (2)No such file or directory: Failed to enable the ‘httpready’ Accept Filter | FreeBSD Apache HTTP Accept Filter Error

      [warn] (2)No such file or directory: Failed to enable the ‘httpready’ Accept Filter | FreeBSD Apache HTTP Accept Filter Error



      When Apache web server is starting up in FreeBSD system, Apache loads succcessfully and web server functioning properly, but the following warning error occurs:

      [warn] (2)No such file or directory: Failed to enable the ‘httpready’ Accept Filter


      The resolution to the above problem is to a accf_http module, which function is to buffer incoming connections until a certain complete HTTP requests arrive, into FreeBSD kernel by using kernel linker:

      kldload accf_http

      To permanently load enable HTTP Accept Filter FreeBSD kernel module (accf_http), add the following line
       into /boot/loader.conf:

      accf_http_load="YES"

      Note: The default settings is located in /boot/defaults/loader.cnf. To see the related settings about accf, use:
      grep accf /boot/defaults/loader.conf

      which will returns:

      accf_data_load=”NO” # Wait for data accept filter
      accf_http_load=”NO” # Wait for full HTTP request accept filter