Tuesday, October 28, 2014

Junos Pulse VPN client install issue - roll back

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\MaxNumFilters
In my case, I had 13 filters but the MaxNumFilters was only set at 8! Some installs (like Virtual PC) will not complete if you have 13 or more

http://answers.microsoft.com/en-us/windows/forum/windows_7-performance/how-can-i-find-out-how-many-network-filter-drivers/78a969d0-1e37-402a-b94d-877334cc07a7

Tuesday, September 16, 2014

You receive a "The User Profile Service failed the logon” error message

To delete the error SID and create a new profile, follow these steps:
  1. Delete the error SID.
    To have us fix this problem for you, go to the "Fix it for me" section. If you would rather fix it yourself, go to the "Let me fix it myself" section.

    Fix it for me

    To fix this problem automatically, click the Fix this problem link. Then click Run in the File Download dialog box, and follow the steps in this wizard. 
    Fix this problem 
    Microsoft Fix it 50446

    Notes
    • This wizard may be in English only, but the automatic fix also works for other language versions of Windows.
    • If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.

    Let me fix it myself

    Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
    322756 How to back up and restore the registry in Windows
    To resolve this problem yourself, follow these steps:
    1. Delete the profile by using the Computer Properties dialog box. To do this, follow these steps:
      1. Click Start, right-click Computer, and then click Properties.
      2. Click Change settings.

        2705066
      3. In the System Properties dialog box, click the Advanced tab.

        2705067
      4. In the User Profiles area, click Settings.
      5. In the User Profiles dialog box, select the profile that you want to delete, click Delete, and then clickOK.
    2. Click Start, type regedit in the Search box, and then press ENTER.
    3. Locate and then click the following registry subkey:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
    4. Right-click the SID that you want to remove, and then click Delete.
  2. Log on to the computer and create a new profile.

Monday, September 8, 2014

How to Make a USB Bootable

Have an old USB drive lying around that you don't use anymore? Turn it into an operating install disk for Windows, Linux or Mac, or a diagnostic tool for your PC. Follow this guide to learn how.

Method 1 of 5: Making a USB Drive to Install Any PC Operating System

  1. Make a USB Bootable Step 1.jpg
    1
    Open the Command Prompt. You will need to run Command Prompt as an Administrator. Right-click on it and select Run as Administrator. You may need to enter the Administrator password.
    • This method will create a USB drive that is bootable. You can then copy the contents of an operating installation disc onto the drive to create a portable installation drive.
    • This method only works in Windows Vista, 7, and 8.
    Ad
  2. Make a USB Bootable Step 2 Version 2.jpg
    2
    Open the disk management utility. This can be opened by entering the command diskpart.
  3. Make a USB Bootable Step 3 Version 2.jpg
    3
    Display the connected disks. Type the command list disk to show a list of all the drives connected to your computer. Your USB drive should be listed here as well. Make note of the number next to your USB drive.
  4. Make a USB Bootable Step 4 Version 2.jpg
    4
    Select the USB drive. Enter the command select disk #, replace “#” with the number from the previous step.
  5. Make a USB Bootable Step 5 Version 2.jpg
    5
    Clean the flash drive. Enter the command clean to have the disk management utility verify the integrity of the USB drive, and erase all data.
  6. Make a USB Bootable Step 6 Version 2.jpg
    6
    Create a bootable partition. Once the USB drive is clean, type in create partition primary. You will see a message saying that the operation was successful.
  7. Make a USB Bootable Step 7 Version 2.jpg
    7
    Select the new partition. Enter the command select partition 1 and press Enter. Once you receive a confirmation message, type active and press Enter. This will activate the partition.
  8. Make a USB Bootable Step 8.jpg
    8
    Format the USB drive. Input the command format fs=fat32. When you press Enter, the program will work for a few minutes (if it is a small USB, e.g. 32Gb could actually take hours to SLOW format), and the progress will be displayed as a percentage.
  9. Make a USB Bootable Step 9 Version 2.jpg
    9
    Assign the USB a drive letter. Enter the command assign to give the thumb drive a letter designation. Type exit to end the disk management program.
  10. Make a USB Bootable Step 10 Version 2.jpg
    10
    Copy the operating system. Once the USB drive has been made bootable, you can copy over the installation files for the operating system you want to install. You can do this by dragging and dropping using your preferred file manager/explorer.
    • Copy over any drivers you might need during the operating system installation to make the process much smoother.

Method 2 of 5: Making a Windows Vista or 7 Install Drive

  1. Make a USB Bootable Step 11.jpg
    1
    Create or Obtain A Windows Vista/7 ISO. Install a free burning program. There are a number of free burning utilities available online. You need one that can create ISO files. If you received your Windows 7 as a downloadable ISO file from Microsoft, you can skip to Step 2.
    • Insert your Windows 7 DVD. Open your new burning program. Look for an option such as “Copy to Image” or “Create Image.” If prompted, select your DVD drive as the source.
      Make a USB Bootable Step 11Bullet1.jpg
    • Save your ISO file. Choose an easy to remember name and location for the file. The ISO you make will be equal in size to the disc you are copying. This means it can take up several gigabytes of space on your hard drive. Be sure you have enough storage available.
      Make a USB Bootable Step 11Bullet2.jpg
    • Creating the ISO can take a long time, depending on the speed of your computer and DVD drive.
  2. Make a USB Bootable Step 12.jpg
    2
    Download Windows 7 USB/DVD Download Tool. This is available for free from Microsoft. Despite its name, this tool works with Windows Vista ISOs as well. You can run this tool on virtually any version of Windows.
  3. Make a USB Bootable Step 13.jpg
    3
    Select the Source file. This is the ISO that you created or downloaded in the first section. Click Next.
  4. Make a USB Bootable Step 14.jpg
    4
    Select USB device. You are given the option to either burn to a DVD or create a USB device. For this guide, click USB Device.
  5. Make a USB Bootable Step 15.jpg
    5
    Choose your USB device. Make sure that your flash drive is connected correctly. You will need at least 4GB space on your flash drive to copy over the Windows installation.
  6. Make a USB Bootable Step 16.jpg
    6
    Wait while program works. The program will format the USB drive to boot correctly, then copy the ISO file onto the drive. The copying process can take up to 15 minutes to complete, depending on the speed of your machine.

Method 3 of 5: Making a Windows XP Install Drive

  1. 1
    Gather your software and hardware. You will need USB_Prep8 and bootsect.exe. These are developer tools both freely available online. You will also need a flash drive at least 1GB in size, and a Windows XP installation CD or DVD.
    • Insert the USB drive and the Windows XP disc. Close any Autoplay windows that open.
http://www.wikihow.com/Make-a-USB-Bootable 

Thursday, August 21, 2014

outlook cannot add the folder because creating a new outlook data file

Problem:

outlook cannot add the folder because creating a new outlook data file

Solution:


If yes, please check HKEY_CURRENT_USER\Software\Policies\Microsoft\office\14.0\outlook and remove the key DisablePST.
http://social.technet.microsoft.com/Forums/exchange/en-US/b77fe5f7-9d79-4f5c-9b7f-8b9c77b5d62a/outlook-tries-to-add-pst?forum=exchangesvrclientslegacy


Tuesday, August 5, 2014

lync 2013 crashing while share desktop

Control Panel -> Performance and Information Tools -> Adjust Visual Effects -> Uncheck “Enable desktop composition”

http://social.technet.microsoft.com/Forums/en-US/1d94dfd8-49c9-4664-86ec-87bb8d432494/lync-2013-desktop-crashes-when-desktop-sharing

Friday, July 4, 2014

networking stoping while sleep mode windows 7

Navigate to the control panel and open the Device Manager. Open the Network adapters section, right-click your wifi adapter and choose Properties. Navigate to the Power Management tab, uncheck allow the computer to turn off this device and set it to allow this device to wake the computer and then save the changes you made.

http://www.tomshardware.com/forum/48676-63-wifi-turns-sleep-mode

 

Thursday, June 26, 2014

"From" Lync Presence Not Appearing in Outlook 2013

I was experiencing the same behaviour - We have Exchange 2010, Outlook 2013, Lync 2010.  Lync repair did not work.

Fix:  Delete/Re Create Outlook Account
  1. Close outlook
  2. Open Control Panel > Mail > Email Accounts
  3. Delete the default profile
  4. Create a new profile - Manually
  5. Set offline slider to "All" (all the way to the right)
  6. Start Outlook
  7. Bingo
http://answers.microsoft.com/en-us/office/forum/office_2013_release-outlook/from-lync-presence-not-appearing-in-outlook-2013/f3435832-9e7e-4d4b-b65e-c0f0b67570e3?page=2 

Wednesday, April 16, 2014

tcp window size

HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\ interface-name
Data typeRangeDefault value
REG_DWORD 0x0–0x3FFFFFFF ( bytes ) (See description.)
Description
Determines the largest TCP receive window that the system offers. The receive window is the number of bytes a sender can transmit without receiving an acknowledgment. This entry overrides TCP's negotiated maximum receive window size and replaces it with the value of this entry.
TCP uses a receive window that is four times the size of the maximum TCP segment size (MSS) negotiated during connection setup, up to a maximum size of 64 KB. TCP for Windows 2000 also supports windows scaling, as detailed in RFC 1323, TCP Extensions for High Performance. Scaling enables TCP to provide a receive window of up to 1 GB.
For Ethernet networks, the default value of this entry is 0x4470 (17,520, or 12 segments of 1,460 bytes each). For other networks, the default value is 0xFFFF (65,535) unless 0xFFFF is larger than:
  • Four times the maximum TCP data size on the network; and
  • 0x2000 (8,192) rounded up to an even multiple of the network TCP data size.
Note Image Note
This entry determines the maximum receive window size for this interface. When configuring this interface, this entry takes precedence over the GlobalMaxTcpWindowSize entry, which establishes a maximum window size for all interfaces.
Windows 2000 automatically uses windows scaling if the value of this entry is greater than 64 KB. To disable windows scaling, set the value of the Tcp1323Opts entry to 0 or 2.
Windows 2000 does not add this entry to the registry. You can add it by editing the registry or by using a program that edits the registry


Friday, April 11, 2014

System File Checker: Run sfc /scannow & Analyze its logs in Windows 7 | 8

he System File Checker or sfc.exe is a utility in Microsoft Windows located in C:\Windows\System32 folder. This utility allows users to scan for and restore corrupt Windows system files.

System File Checker

In Windows 8, Windows 7 & Vista, the System File Checker is integrated with Windows Resource Protection, which protects registry keys and folders as well as critical system files. If any changes are detected to a protected system file, the modified file is restored from a cached copy located in the Windows folder itself.
So if at any point of time if you find that you have hacked some system files or maybe applied some tweaks or replaced system files, maybe while customizing your Windows, and you now find that your Windows is not working properly, you may want to consider running this utility first, before trying a System Restore. To do so, you will have to first open anelevated command prompt window.
To run the System File Checker in Windows 8, Windows 7 or Windows Vista, type cmd in start search box. In the result, which appear, right click on cmd and select Run As Administrator.

Run sfc /scannow

In the command prompt window which opens, type sfc /scannow and hit Enter.
sfc cmd 600x271 System File Checker: Run sfc /scannow & Analyze its logs in Windows 7 | 8
The sfc utility will run for a while and if any corruptions are found, replace them on re-boot.
In case you are unable to start the System File Checker and you instead get the “Windows Resource Protection Could Not Start the Repair Service” error, you may want to check up if your Windows Modules Installer service has been Disabled. To do so, type services.msc in start search and hit Enter. The status of this services should be set to Manual. Alternatively, you can also download our very useful freeware utility FixWin and click on the System File Checker Utilitybutton. This will run sfc.exe.
Some more sfc switches:
Scan once at next boot:   sfc /scanonce
Scan at every boot:  sfc /scanboot
Purge File Cache:  sfc /purgecache
Return to Default Setting:  sfc /revert
You can also use the sfc.exe program to help you troubleshoot crashes that occur in the user mode part of Windows 7 & Vista. These crashes may be related to missing or damaged operating system files. To do so you may have to access the log files.

How to view the log file.
The sfc.exe program writes the details of each verification operation and of each repair operation to the CBS.log file. Each sfc.exe program entry in this file has an [SR] tag. The CBS.log file is located in the %windir%\Logs\CBS folder.
You can search for [SR] tags to help locate SFC.exe program entries. To perform this kind of search and to redirect the results to a text file, follow these steps:
Click Start, type cmd in the Start Search box, right-click cmd in the Programs list, and then click Run as administrator.
Type the following command, and hit Enter:
findstr /c:”[SR]” %windir%\logs\cbs\cbs.log >sfcdetails.txt
The sfcdetails.txt file includes the entries that are logged every time that the SFC.exe program runs on the computer.
How to interpret the log file entries:
The sfc.exe program verifies files in groups of 100. Therefore, there will be many groups of SFC.exe program entries. Each entry has the following format: date time entry_type details. For more details on how to interpret, visit KB928228.
http://www.thewindowsclub.com/how-to-run-system-file-checker-analyze-its-logs-in-windows-7-vista 

Friday, April 4, 2014

How to enable ROOT password in Ubuntu 12.0.4

1. Open a terminal
2. Type sudo passwd -u root
(This is enable root account password expiry time)
3. Type passwd root
(This command is for changing the ROOT password)
4. Please enter the password as required by you
5. Again enter the password as the same entered first time.
6. Type su
(Now it would ask for ROOT password give your password and enter into ROOT.

Cannot add to the server Junk E-mail Lists, you are over the size allowed on the server. The Junk E-mail Filter on the server will be disabled until your Junk E-mail Lists have been reduced to the size allowed by the server

Microsoft Exchange has a limit to the size of the rule where your different "junk" lists are stored. By default, the limit is 510 KB.

In relation to this limit, there are four known causes for the above errors.
  • You have a large number of entries in your Safe Senders, Blocked Senders, and Safe Recipients lists

    By default, you have a cumulative limit of 510 KB for all of your junk e-mail lists. If you have a large number of entries in these lists (cumulatively), then you may receive the above error when you attempt to add more items to the lists.
  • The Max Extended Rule Size registry value is incorrectly configured on the Exchange server

    On an Exchange server, you can configure the following registry data:

    Registry key: HKLM\System\CurrentControlSet\Services\MSExchangeIS\ParametersSystem
    ValueMax Extended Rule Size
    Type: DWORD
    Data: an integer specifying the maximum size, in bytes, you want to allow for the junk e-mail rule

    The value you enter in the registry is interpreted as the maximum rule size in bytes. Therefore, if you want to specify a limit that is higher than the default 510 KB, you need to enter a value higher than 522240 (decimal).

    The above error can occur when you inadvertently specify a value lower than the default limt. For example, you enter a value of 1024 under the assumption that this is doubling the default limit of 510 KB. Since the value you enter is interpreted as a number of bytes, a value of 1024 means you have configured a limit of 1024 bytes, substantially lower than the default limit of 510 KB.
  • The PR_RULE_MSG_STATE property of the Junk E-mail Rule message is incorrectly configured

    With an Exchange mailbox, your junk e-mail settings are stored in a hidden message in the associated contents table of your Inbox folder. The subject of this hidden message is Junk E-mail Rule. This message has a property calledPR_RULE_MSG_STATE and the default value on this property is 49 (decimal) or 0x31 (hexadecimal). If you then disable junk email filtering in Outlook Web App, the value of this property becomes 48 (decimal) or 0x30 (hexadecimal). Therefore, if the value specified on this property is something other than 48 or 49 (decimal), then you may receive the above error.
  • The "Also trust e-mail from my Contacts" option is enabled in Outlook

    On the Safe Senders tab of the Junk E-mail Options dialog box you can configure the Also trust e-mail from my Contacts option. If enabled, and you have a large number of contacts in your Contacts folder, you may inadvertently exceed the 510 KB limit on your mailbox. With this option enabled, Outlook attempts to add all of the email addresses for your contacts to the Safe Senders list. 
http://support.microsoft.com/kb/2669081 

Wednesday, March 19, 2014

Setup and Configure SMTP Server on Windows Server 2008 R2



Setup and Configure SMTP Server on Windows Server 2008 R2


Installing the SMTP feature

1. Click Start > Run and then enter servermanager.msc in the Open dialogue box then click OK to load Server Manager:
C:\>servermanager.msc
2. Use the Add Features Wizard to select SMTP Server on the Select Features page. To initiate this, right-click on Features and click Add Feature:
3. In the Features section check SMTP Server and click Next:
4. You may see a dialogue box like the one below stating that certain role services and features are required for SMTP:
5. Click Add Required Role Services and then you will return to the previousFeatures section. Ensure SMTP Server is checked then click Next.
6. In the Web Server (IIS) section, click Next to proceed to the Role Servicessection:
7. The Role Services should be pre-populated – IIS 6 Management Compatibility should be selected, and below it, IIS 6 Metabase Compatibilityand IIS 6 Management Console should also be checked. Click Next to continue:
8. In the Confirmation section click Install:
9. In the Results section click Close to complete the installation of the SMTP Server:

Configuring the SMTP Server

The next step is to configure SMTP. To do so we will need to open Internet Information Services (IIS) Manager 6.
10. Click Start > Run and then enter inetmgr6 in the dialogue box then click OKto load IIS Manager 6.
11. In IIS 6 Manager right-click on SMTP Server and select Properties:
12. In the General tab, unless you want the SMTP Server to use a specific IP address,  leave the settings as they are so that the IP address is set to (All Unassigned):
13. To proceed, click on the Access tab:
14. Click on the Authentication button and ensure Anonymous access is checked and then click OK:
15. Once back in the Access tab, click on the Connection button. Select Only the list below and then click Add. Enter 127.0.0.1 as the IP addess and then click OK:
The Connection setting controls which computers can connect to the SMTP server and send mail. By granting only localhost (127.0.0.1) access, limits only the server itself the ability to connect to the SMTP server. This is a requirement for security.
16. Click OK to return to the Access tab and then click on the Relaybutton. Enter 127.0.0.1 as the IP addess and then click OK:
The Relay section determines which computers can relay mail through this SMTP server. By only allowing the localhost IP address (127.0.0.1) relay permissions it means that only the server itself can relay mail. Conversely, it prevents the SMTP server from being an open relay and being used to send unsolicited spam email by other computers on the internet, which could lead to the SMTP server being blacklisted.
17. Next, go to the Messages tab. Here you can enter an email address where copies of non-delivery reports are sent to. You can also configure the location of the Badmail director, however, the default setting should suffice:
20130427131034
18. Next, go to the Delivery tab:
19. Click on the Outbound Security button and ensure Anonymous access is selected. As the only server that can connect and relay mail through the SMTP server is localhost this security settings is fine:
20. Click OK to return to the Delivery tab and then click on Outbound Connections. Leave the defaults as they are:
21. Click OK to return to the Delivery tab and then click on Outbound Connections, then click on the Advanced button:
20130427131219
Here you will need to enter the fully-qualified domain name of the SMTP server. This will be the host name or A record that has been created in your DNS zone file. This is straight-forward to do but you will have to confirm how you do this with the party that manages DNS for your domain. I have entered mail.vsysad.comas this is fully-qualified. If you click on the Check DNS button you can confirm whether your chosen name resolves successfully. In my case it does as I see the following:
 22. Click OK and then OK again to exit the SMTP Virtual Server Properties.
You can also perform this test by running nslookup to confirm the existence of the host name as well as confirming the IP address it resolves to – which should the IP address of your server:
20130427131924

Testing the SMTP Server

The next step is to verify that the SMTP server is able to send email successfully. To do this follow the steps below:
23. Create a text file on your desktop called email.txt and paste the following into it, remembering to change the email address information to reflect your own details:
From: blog@yourdomain.com
To: email@yourdomain.com
Subject: Email test
This is the test body of the email
.
24. Save the changes to email.txt and then copy the file toC:\inetpub\mailroot\Pickup. The SMTP server monitors this folder and when it detects the email.txt file, it will read the contents and send the email to the address in the To: section. This should happen almost immediately.
25. Check the email address the email was sent to and it should arrive shortly – the email was sent to my Gmail account:
20130429184511
An alternative way of doing this is to use a script to perform the same email test. Simply save the code below into a file called email.vbs, remembering to change the email address information to reflect your own details:
Dim sch, cdoConfig, cdoMessage
sch = "http://schemas.microsoft.com/cdo/configuration/"
Set cdoConfig = CreateObject("CDO.Configuration")
With cdoConfig.Fields
.Item(sch & "sendusing") = 1 ' cdoSendUsingPort
.Item(sch & "smtpserver") = "127.0.0.1"
'    .Item(sch & "smtpserverport") = 25
.update
End With
Set cdoMessage = CreateObject("CDO.Message")
With cdoMessage
Set .Configuration = cdoConfig
.From = "blog@yourdomain.com"
.To "email@yourdomain.com"
.Subject = "Email test"
.TextBody = "This is the test body of the email"
'.AddAttachment "c:\images\myimage.jpg"
.Send
End With
Set cdoMessage = Nothing
Set cdoConfig = Nothing
MsgBox "Email Sent"
Once the file has been saved to the desktop double-click on it and it should automatically send the the email. A message box pops up to confirm that the email was sent:
Note: You can also use telnet and PowerShell to test mail sending/routing via SMTP Server. Please refer to this post to see how to do this.
That’s all there is to it! Now you have a fully functioning STMP server that can successfully send emails. Many of the companies that I have worked with use this method to send emails generated by their web applications.

Troubleshooting

DNS

It is essential to have DNS setup and working properly, if not you may experience problems with mail delivery. Follow the instructions in this post which shows you how to verify correct DNS configuration using the SMTPDIAG tool. Ensure that you have a PTR record for reverse DNS lookups configured. The PTR record allows your SMTP server’s public IP address to be resolved back to your hostname. Some of the major email hosts use this technique to block spammers. Your web host should have a control panel that allows you to configure reverse DNS if you have a dedicated public IP address. Rackspace Cloud users can follow this link for instructions on how to create a reverse DNS record.

SMTP Folders

If emails are not being successfully delivered you may notice that messages are building up in specific SMTP folders. These are likely to be, but not limited to, Badmail & Queue. Please visit this post to understand the purpose of each SMTP folder and how to approach issues when messages are queuing up in those folders.
http://www.vsysad.com/2012/04/setup-and-configure-smtp-server-on-windows-server-2008-r2/