Skip to main content

Home/ Windows and Microsoft information/ Group items tagged article

Rss Feed Group items tagged

Jessica Olsen

Event ID 4107 Microsoft Windows CAPI2 - TechNet Articles - United States (English) - Te... - 0 views

  • essage Failed extract of third-party root list from auto update cab at: <http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab> with error: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
Jessica Olsen

How to Install Windows 7 Without the Disc | PCWorld - 0 views

  • The above links point to Digital River, a licensed distributor of Microsoft software. These downloads are each over 3GB, and your product key will work only with your edition of Windows, so make sure to select the right one.
Jessica Olsen

A Support Guide for Wireless Diagnostics and Troubleshooting - 0 views

  • This article assumes knowledge of IEEE 802.11-based wireless LAN networking including related technologies such as IEEE 802.1X and Wi-Fi Protected Access (WPA™). This article is not meant to be a detailed explanation of the inner workings of the Windows Wireless Zero Configuration service. For basic knowledge of wireless networking, see the Windows Server 2003 Wireless Networking Web site
  • he first step to take for a wireless issue is to gather information that might be needed to perform a preliminary diagnosis, including the following:
  • Wireless logs. Logging can be enabled through the netsh ras set tracing * en command. After enabling logging, you can either restart the computer or restart the Wireless Zero Configuration (for Windows XP) or Wireless Configuration (for Windows Server 2003) service with the net stop wzcsvc and net start wzcsvc commands. The wireless logs are located in the systemroot\tracing folder. The log files most useful for troubleshooting wireless issues are the following:
  • ...1 more annotation...
  • Symptom Diagnosis For the times that an immediate or trivial solution is not apparent, symptomatic analysis is best used to determine where you should look next. Symptoms and Solutions Table 1 lists common issues, causes, and likely solutions.
Jessica Olsen

The Windows 7 startup process is slow when you create many restore points - 0 views

  •  
    hotfix request to get by email for Windows 7 Performance Problems caused by too many restore points recorded.
Jessica Olsen

File shares on iSCSI devices may not be re-created when you restart the computer - 0 views

  • Make the Server service dependent on the iSCSI Initiator service
  • If you have administrative access to the server, you can perform this command from a network computer. To do this, type the following command, and then press ENTER: sc \\computer_name config LanManServer depend= Samss/Srv/MSiSCSI
Jessica Olsen

Available Research Services - Providers - Office.com - 0 views

  •  
    Research Service Overview This page lists third-party research services that run through the Office Research Task Pane. These services let Microsoft Office customers find relevant, high-quality information from directly within the applications of the Microsoft Office System. To learn more about the research task pane, please read the Microsoft Assistance article entitled "About research services".
Jessica Olsen

Use cipher.exe for command line encryption | TechRepublic - 0 views

  • Use the /a switch for encrypting individual files rather than directories.
  • Using the /i switch
  • syntax cipher /e /s: <directory name>
  • ...6 more annotations...
  • The /s switch in conjunction with /e or /d is used to encrypt or decrypt subdirectories within a directory.
  • The /w switch is used to overwrite data in unallocated space on the disk.
  • Using the /r switch to generate a new recovery agent certificate
  • se the /u switch to update encryption keys for existing encrypted files.
  • syntax cipher /e /a <directory path\filename>,
  • Using the /a switch
1 - 10 of 10
Showing 20 items per page