Skip to main content

Home/ Windows and Microsoft information/ Group items tagged Library

Rss Feed Group items tagged

Jessica Olsen

Windows Explorer Always Opens in Libraries View in Windows 7, How to Change Target Fold... - 0 views

  • PS: If you want to restore Windows Explorer shortcut functionality and want to open Libraries again, simply remove the newly added text strings in Target text box and set it to %windir%\explorer.exe again
  • If you want to set the target to a desired drive or folder, don't add the double-quotes. Simply add the path at the end. For example, if you want to open C: drive, set the target text string to %windir%\explorer.exe C: or if you want to open a folder for example D:\Setup, then set the target text string to %windir%\explorer.exe D:\Setup
  • So the whole text string would become %windir%\explorer.exe ""
Jessica Olsen

Configure a Service Item - 0 views

  • rvice name Type the unique name for the service, or click Browse (…) to select a service from a list of installed services on the current computer. Important A service's unique name does not always match its display name. For example, the unique name of the Server service is LanmanServer
  •  
    Helps one understand what setting mean and do in the service snap-in for windows under Administrative tools.
Jessica Olsen

Windows 7 Manageability Overview - 0 views

  • PowerShell Integrated Scripting Environment PowerShell scripts are standard text files. With Windows Vista and earlier versions of Windows, the built-in editor was Notepad. While Notepad is perfect for quickly editing text files, and it is sufficient for writing scripts, a more robust editor would enable IT professionals to learn, create, and debug scripts more efficiently. Windows 7 includes the PowerShell Integrated Scripting Environment (ISE), a graphical PowerShell development environment with debugging capabilities and an interactive console, as shown in Figure 1.
  • PowerShell Cmdlets Cmdlets (pronounced command-lets) are one of the most powerful features of PowerShell. A cmdlet is a task-oriented command that is used in the Windows PowerShell environment. For example, PowerShell includes cmdlets that: Append text to a file Read and write XML files Manage services Manage files and folders PowerShell 2.0 supports over 500 new cmdlets to manage client computers and servers, edit the registry and file system, perform WMI calls, and connect the powerful .NET Framework development environment. You can also extend PowerShell by creating custom cmdlets or use community-developed extensions.
Jessica Olsen

Convert - 0 views

  • convert [<Volume>] /fs:ntfs [/v] [/cvtarea:<FileName>] [/nosecurity] [/x]
  • You must create the placeholder file by using the fsutil file createnew command prior to running convert. Convert does not create this file for you. Convert overwrites this file with NTFS metadata. After conversion, any unused space in this file is freed.
Jessica Olsen

Windows 7 Security Baseline - 0 views

  • The .cab file for the Windows 7 SP1 security baseline includes the following components: Win7SP1 BitLocker Security Compliance 1.0 Win7SP1 Computer Security Compliance 1.0 Win7SP1 Domain Security Compliance 1.0 Win7SP1 User Security Compliance 1.0 Windows 7 SP1 Security Guide.docx Win7SP1_IT_GRC_MCA_MP.cab
Jessica Olsen

Cmdkey - 0 views

  • Syntax Copy cmdkey [{/add:<TargetName>|/generic:<TargetName>}] {/smartcard|/user:<UserName> [/pass:<Password>]} [/delete{:<TargetName>|/ras}] /list:<TargetName> Parameters   Parameters Description /add:<TargetName> Adds a user name and password to the list. Requires the parameter of <TargetName> which identifies the computer or domain name that this entry will be associated with. /generic:<TargetName> Adds generic credentials to the list. Requires the parameter of <TargetName> which identifies the computer or domain name that this entry will be associated with. /smartcard Retrieves the credential from a smart card. /user:<UserName> Specifies the user or account name to store with this entry. If UserName is not supplied, it will be requested. /pass:<Password> Specifies the password to store with this entry. If Password is not supplied, it will be requested. /delete{:<TargetName> | /ras} Deletes a user name and password from the list. If TargetName is specified, that entry will be deleted. If /ras is specified, the stored remote access entry will be deleted. /list:<TargetName> Displays the list of stored user names and credentials. If TargetName is not specified, all stored user names and credentials will be listed. /? Displays help at the command prompt.
  • o display a list of all user names and credentials that are stored, type: Copy cmdkey /list
  • To add a user name and password for user Mikedan to access computer Server01 with the password Kleo, type: Copy cmdkey /add:server01 /user:mikedan /pass:Kleo To add a user name and password for user Mikedan to access computer Server01 and prompt for the password whenever Server01 is accessed, type: Copy cmdkey /add:server01 /user:mikedan To delete the credential that remote access has stored, type: Copy cmdkey /delete /ras To delete the credential that is stored for Server01, type: Copy cmdkey /delete:Server01
Jessica Olsen

Event ID 6001 - Windows Logon Availability - 0 views

  •  
    Make more resources available. Troubleshooting and answers. Technet.
Jessica Olsen

A Support Guide for Wireless Diagnostics and Troubleshooting - 0 views

  • This article assumes knowledge of IEEE 802.11-based wireless LAN networking including related technologies such as IEEE 802.1X and Wi-Fi Protected Access (WPA™). This article is not meant to be a detailed explanation of the inner workings of the Windows Wireless Zero Configuration service. For basic knowledge of wireless networking, see the Windows Server 2003 Wireless Networking Web site
  • he first step to take for a wireless issue is to gather information that might be needed to perform a preliminary diagnosis, including the following:
  • Wireless logs. Logging can be enabled through the netsh ras set tracing * en command. After enabling logging, you can either restart the computer or restart the Wireless Zero Configuration (for Windows XP) or Wireless Configuration (for Windows Server 2003) service with the net stop wzcsvc and net start wzcsvc commands. The wireless logs are located in the systemroot\tracing folder. The log files most useful for troubleshooting wireless issues are the following:
  • ...1 more annotation...
  • Symptom Diagnosis For the times that an immediate or trivial solution is not apparent, symptomatic analysis is best used to determine where you should look next. Symptoms and Solutions Table 1 lists common issues, causes, and likely solutions.
1 - 18 of 18
Showing 20 items per page