Showing posts with label xp. Show all posts
Showing posts with label xp. Show all posts

How to change windows xp login screen ?

Default login screen of windows xp make you boring. If you can change your login screen off and on I think it will not a bad idea. To change your windows xp login screen you need following files

1. Resource Tuner
2. logonUI.exe file

I have created a customized login screen here for your help. Download this Resource Tuner with crack and logonUI.exe  free form here. DOWNLOAD

After downloading this files unzip the Login Screen by Emdad Khan.jar--> emdadblog.zip file and copy the emdadblog folder to WINDOWS\RESOURCE location. See below picture

How to change login screen

Now run emdadblog(setup).exe  (from emdadblog folder) to use this customized login screen for  windows xp. If you wish to restore the previous login screen in windows xp, then use the emdadblog(restore).exe file.

Now log off and see that your loging screen has changed like below picture

how to change login screen with resource tuner

Come to your own customized login screen. If you wish to use your own login screen rather then mine login screen you can do it. To use your own customized login screen for windows XP follow below steps

1. First install the Resource Tuner in your computer which you downloaded before.

2. Open logonUI.exe file with resource tuner.

3. Navigate to Bitmap and click on 100. See below picture

how to login screen with resource tuner

4. Now double click on 100 and choose a .bmp file of your own picture and replace with your previous .bmp picture. See below picture


5. You can also change other things such as "WELCOME" "LOGGING OFF" "SHUTDOWN" text message and so on with resource tuner.

6. After changing login screen according to you save it  as logonUI.exe and move to emdadblog folder. Now run the emdadblog(setup).exe file to use your own customized login screen.

7. Now log off to see your customized login screen.

Mission  accomplished

What is Malicious Software ?

malicious software

Malicious software, such as viruses, worms and Trojan horses, deliberately harm a computer and is sometimes referred to as malware. Spyware is a general term used to describe software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of the computer, generally without appropriately obtaining consent first. Other kinds of spyware make changes to the computer that are annoying and cause the computer to slow down or stop responding.

There are a number of ways spyware or other unwanted software appears on a computer, including software flaws and some Web browsers. A common method is to covertly install the software during the installation of other software that you want to install. Preventing the installation of malicious software requires that you understand the purpose of the software you intend to install, and you have agreed to install the software on the computer. When you install an application, read all disclosures, the license agreement, and the privacy statement. Sometimes the inclusion of unwanted software is documented, but it might appear at the end of a license agreement or privacy statement.

Consider the following scenario: You are deploying Windows 7 throughout the organization. To decide upon which operating system features to implement, you need to understand security risks that might be relevant to the organization. Take part in a class discussion about this scenario.

Question 1: What are common security risks that you must consider when deploying a new operating system?

Answer

During a desktop deployment, it is important to address any security risks that affect application compatibility, data loss, and user functionality. Some of the more common security risks are categorized as follows:

* Malware risks: Viruses, Trojan horses, spyware
* Data risks: Stolen laptops or removable universal serial bus (USB) hard drives
* Web browser risks: Malicious Web sites, phishing
* Network risks: Internal worm attacks, internal workstations that do not comply with organizational security policies

Question 2: How can you be sure that you have addressed the appropriate security risks before and after a desktop deployment?

Answer

Conduct a structured security risk management process that will help you to identify and assess risk, identify and evaluate control solutions, implement the controls, and then measure the effectiveness of the mitigation. Identifying security risks before a desktop deployment helps you to be proactive in mitigating and implementing solutions.

What is a GPT Disk ?

As operating systems evolve and hard disks grow larger, the inherent restrictions of an MBR partitioned disk limit the viability of this partitioning scheme as an option in many scenarios. Consequently, a new disk partitioning system has been developed: Globally unique identifier (GUID) partition table or GPT.

GPT contains an array of partition entries describing the start and end LBA of each partition on disk. Each GPT partition has a unique identification GUID and a partition content type. Also, each LBA described in the partition table is 64-bits in length. The GPT format is specified by the Unified Extensible Firmware Interface (UEFI), but is not exclusive to UEFI systems. Both 32-bit and 64-bit Windows operating systems support GPT for data disks on BIOS systems, but they cannot boot from them. The 64-bit Windows operating systems support GPT for boot disks on UEFI systems.


GPT disks features

GPT-based disks address the limitations of MBR-based disks. GPT disks support:

* 128 partitions per disk: This is a vast improvement over MBR-based disks.
* 18 Exabyte (EB) volume size: This is a theoretical maximum because hard disk hardware is not yet available that supports such vast volume sizes.
* Redundancy: The GPT is duplicated and protected by Cyclic Redundancy Checks (CRC).

You can implement GPT-based disks on Windows Server® 2008, Windows Vista, and Windows 7. You cannot use the GPT partition style on removable disks.

GPT architecture

On a GPT partitioned disk, the following sectors are defined:

* Sector 0 contains a legacy protective MBR. The protective MBR contains one primary partition covering the entire disk.
 
   * The protective MBR protects GPT disks from previously-released MBR disk tools such as Microsoft MS-DOS FDISK or Microsoft Windows NT Disk Administrator.

These tools view a GPT disk as having a single encompassing (possibly unrecognized) partition by interpreting the protected MBR, rather than mistaking the disk for one that is unpartitioned.

   * Legacy software that does not know about GPT interprets only the protected MBR when it accesses a GPT disk.

* Sector 1 contains a partition table header. The partition table header contains the unique disk GUID, the number of partition entries (usually 128), and pointers to the partition table.

* The partition table starts at sector 2. Each partition entry contains a unique partition GUID, the partition offset, length, type (also a GUID), attributes, and a 36 character name.

* The following table describes the partitions.

Partition Type Size Description
A EFI System Partition (ESP) 100 MB Contains the boot manager, the files that are required for booting an operating system, the platform tools that run before operating system boot, or the files that must be accessed before operating a system boot. The ESP must be first on the disk. The primary reason for this is that it is impossible to span volumes when the ESP is logically between what you are attempting to span.
B Microsoft Reserved (MSR) 128MB Reserved for Windows components. This partition is hidden in Disk Management and does not receive a drive letter. Usage example: When you convert a basic GPT disk to dynamic, the system decreases the size of the MSR partition and uses that space to create the Logical Disk Manager (LDM) Metadata partition.
C Operating system (OS) Remaining Disk Contains the OS and is the size of the remaining disk.

Question:
How does a GPT partitioned disk on a 64-bit Windows 7 operating system use an MBR?

Answer


On a GPT partitioned disk, Sector 0 contains a legacy protective MBR. The protective MBR contains one primary partition covering the entire disk. The protective MBR protects GPT disks from previously released MBR disk tools such as Microsoft MS-DOS FDISK or Microsoft Windows NT Disk Administrator. These tools view a GPT disk as having a single encompassing (possibly unrecognized) partition by interpreting the protected MBR, rather than mistaking the disk for one that is unpartitioned. Legacy software that does not know about GPT interprets only the protected MBR when it accesses a GPT disk.

What is the differences between Internet Protocol Version IPv4 and IPv6 ?

Internet Protocol Version IPv6 is a newer version of Internet Protocol Version IPv4. In IPv6 significant changes has been created to overcome the Internet  Protocol Version IPv4 limitations. In IPv4 limitations include the following :

Limited address space: IPv4 uses only 32-bits to represent addresses. IANA has allocated the majority of these addresses.

Difficult routing management: IANA has not provisioned allocated IPv4 addresses for efficient route management. As a result, Internet backbone routers have over 85,000 routes in their routing tables.

Complex host configuration: Automatic configuration of IPv4 hosts requires that you implement DHCP.

No built-in security: IPv4 does not include any method for securing network data. You must implement Internet Protocol Security (IPSec) and other protocols to secure data on IPv4 networks, but this requires significant configuration and can be complex to implement.

Limited Quality of Service (QoS): The implementation of QoS in IPv4 relies on the use of TCP and User Datagram Protocol (UDP) ports to identify data. This may not be appropriate in all circumstances.


IPv6 improvements


IPv6 enhancements help enable secure communication on the Internet and over corporate networks. Some IPv6 features include the following:

Larger address space: IPv6 uses a 128-bit address space, which provides significantly more addresses than IPv4.

More efficient routing: IANA provisions global addresses for the Internet to support hierarchical routing. This reduces how many routes that Internet backbone routers must process and improves routing efficiency.

Simpler host configuration: IPv6 supports dynamic client configuration by using DHCPv6. IPv6 also enables routers to configure hosts dynamically.

Built-in security: IPv6 includes native IPSec support. This ensures that all hosts encrypt data in transit.

Better prioritized delivery support: IPv6 includes a Flow Label in the packet header to provide prioritized delivery support. This designates the communication between computers with a priority level, rather than relying on port numbers that applications use. It also assigns a priority to the packets in which IPSec encrypts the data.

Redesigned header: The design of the header for IPv6 packets is more efficient in processing and extensibility. IPv6 moves nonessential and optional fields to extension headers for more efficient processing. Extension headers are no more than the full size of the IPv6 packet, which accommodates more information than possible in the 40 bytes that the IPv4 packet header allocates.

What Are Public and Private IPv4 Addresses?

Devices and hosts that connect directly to the Internet require a public IPv4 address. Hosts and devices that do not connect directly to the Internet do not require a public IPv4 address.

Public IPv4 addresses


Public IPv4 addresses must be unique. IANA assigns public IPv4 addresses. Usually, your ISP allocates you one or more public addresses from its address pool. The number of addresses that your ISP allocates to you depends upon how many devices and hosts that you have to connect to the Internet.

Private IPv4 addresses


The pool of IPv4 addresses is becoming smaller, so IANA is reluctant to allocate superfluous IPv4 addresses. Technologies such as Network Address Translation (NAT) enable administrators to use a relatively small number of public IPv4 addresses, and at the same time, enable local hosts to connect to remote hosts and services on the Internet.


IANA defines the following address ranges as private. Internet-based routers do not forward packets originating from, or destined to, these ranges.

Class Mask Range
A 10.0.0.0/8 10.0.0.0 - 10.255.255.255
B 172.16.0.0/12 172.16.0.0 - 172.31.255.255
C 192.168.0.0/16 192.168.0.0 - 192.168.255.255

Note:
RFC3330 defines these private address ranges.

What is a Default Gateway?

A default gateway is a device, usually a router, on a TCP/IP internet that forwards IP packets to other subnets. A router connects groups of subnets to create an intranet.

In an intranet, any given subnet might have several routers that connect it to other subnets, both local and remote. You must configure one of the routers as the default gateway for local hosts. This enables the local hosts to transmit with hosts on remote networks.

When a host delivers an IPv4 packet, it uses the subnet mask to determine whether the destination host is on the same network or on a remote network. If the destination host is on the same network, the local host delivers the packet. If the destination host is on a different network, the host transmits the packet to a router for delivery.

When a host on the network uses IPv4 to transmit a packet to a destination subnet, IPv4 consults the internal routing table to determine the appropriate router for the packet to reach the destination subnet. If the routing table does not contain any routing information about the destination subnet, IPv4 forwards the packet to the default gateway. The host assumes that the default gateway contains the required routing information.

In most cases, use a Dynamic Host Configuration Protocol (DHCP) server to assign the default gateway automatically to a DHCP client. This is more straightforward than manually assigning a default gateway on each host.


a default gateway is a device, usually a router a TCP/IP internet that forwards IP packets to other subnets
A default gateway is a device, usually a router a TCP/IP internet that forwards IP packets to other subnets


How to share a Printer over a network using Windows XP?

To share a printer over a network using windows XP is helpful for a large business organization. To share a printer over a network using windows xp follow this

To share a Printer

1. First login to your windows XP with administrative right.
2. Click Start and  Go to Control Panel
3. Click Printers and other hardware, and then click Printers and Faxes. (From category view)
4. In the Printers and Faxes folder, right click on the installed printer and choose Sharing. See below picture

Printer Share

Note : Make sure you've enabled File and Printer sharing for Microsoft Networks on network card's properties. See below picture

Printer Sharing

5. Now from the Sharing option choose "Share this Printer" and give a name. Then click apply and OK. See below picture

Printer sharing

That's it. The printer will immediately available for the other computers to use over the network.

To connect to the printer

From the desired computer to use the printer over a network follow this

1. Click start and go to control panel
2. Click Printers and other hardware, then click Add a Printer.(In category view)
3. A wizard will open, Click Next. See below picture

Printer sharing

4. From here choose "A network printer, or a printer attached to another computer" and click Next. See below picture

Printer sharing

5. In Next step you will get three options to connect to share printer. Choose the appropriate option and finish the wizard. See below picture



Now you are ready to use remote printer to do your job.

Mission accomplish

What is an Internet Protocol Version 4 (IPv4) address ?

To troubleshoot network connectivity problems for your users, you must me familiar with Internet Protocol /IP address and how they work. Assign a unique Internet protocol version 4 /IPv4 address to each network computer, the IPv4 address the computer to other computers on the network.

Internet Protocol Version 4 / IPv4



Components of an Internet Protocol version 4/IPv4 address
IPv4 uses 32-bit addresses, so if you view the address in its binary format, it has 32 characters, as the following example shows:

11000000101010000000000111001000

IPv4 divides the address into four octets, as the following address shows :

11000000.10101000.00000001.11001000

To make the Internet Protocol Address more readable, binary representation of the address typically it in decimal form. For example :

192.168.1.200

The address, in conjunction with a subnet mask, identifies:
1. The unique identity of the computer, which is the host ID.
2. The subnet on which the computer resides, which is the network ID.
3. This enables a networked computer to communicate with other networked computers in a routed environment.

Internet Protocol address version 4 /IPv4 classes
The Internet Assigned Numbers Authority (IANA) organizes IPv4 addresses into classes. The number of hosts that a network has determines the class of addresses that is required. IANA has named the IPv4 address classes from Class A through Class E.

Class A  = Any IP address in which the first octet has a value between 1 and 127 is a part of a Class A network. there are only 126 available Class A network, each with up to 16,777,214 hosts.

Because Class A networks are very large, they are allocated to very large organizations. It is no longer possible for individual companies to obtains Class A Networks.

Class A subnet Mask is 255.0.0.0

Note : All IP address on the network 127.0.0.0 refer to the local host. The Internet Protocol / IP addre4ss on this network are used for diagnostics only.

Class B  = An Internet Protocol / IP address in which the first octet has value between 128 and 191 is part of a Class B Network. There are 16,384 Class B Network, each with up to 65,534 hosts .Class B Networks are assigned to a variety of large companies and universities. For example, the 131.107.0.0 network is allocated to Microsoft Corporation.

Class B subnet Mask is 255.255.0.0

Class C  = An Internet protocol / IP address in which the first octet has value between 192 to 223 is part of a Class C Network. There are 2,097,152 Class C Networks, each with up to 254 hosts.Class C address are assigned to many small and medium-size organization. In some cases, companies are assigned a Class C Network for each of their locations.

Class C subnet Mask is 255.255.255.0

Class D  = An Internet protocol / IP address in which the first octet has value between 224 to 239 is part of a Class D Network. Class D address are not assigned to a individual hosts. Class D addresses are assigned to groups of computers called multicast groups. Using multicast groups is an efficient way to deliver information on a network when multiple hosts need the same information at the same time.

Class E  = An Internet protocol / IP address in which the first octet has value 240 is part of a Class E Network. This Class E network are reserved for experimental use and are never used on TCP/IP networks except for the broadcast address. The address 255.255.255.255 is a broadcast. Packets addressed to this Internet Protocol Address are delivered to all host on the local network.

Broadcasts are used when applications are not configured with the Internet Protocol address of the host that they should be contacting. For example, Dynamic Host Control Protocol / DHCP clients use broadcasts to communicative with a DHCP server and obtain an Internet Protocol / IP address.

How to recover forgot administrator user account password in windows XP ?

To forget user account password specially administrator password is common in windows xp. But in this situation what to do to recover forgot administrator password in windows xp? I will show you a effective and easiest way to recover your forgot administrator user password in this post.

To recover your administrator user account password follow below instruction step by step :

1. Place your Windows XP CD in your cd-rom  and configure the bios to boot your computer from cd-rom.

2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now.

5. The Licensing Agreement comes next - Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair.

It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”

Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process. See below picture

How to recover forgot administrator user account password in windows XP

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10.  A command console will now open up giving you the potential for wide access to your system. See below picture

How to recover forgot administrator user account password in windows XP

11. At the command prompt, type NUSRMGR.CPL and press Enter. You have just gained graphical access to your User Accounts in the Control Panel. See below picture

How to recover forgot administrator user account password in windows XP

12. Now simply pick the account you need to change and remove or change your password as you prefer.

How to recover forgot administrator user account password in windows XP

13. If you want to log on without having to enter your new password, you can type control userpasswords2 at the command prompt and choose to log on without being asked for password.Now from here uncheck the "users must enter a user name and password to use this computer". After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy). See below picture

How to recover forgot administrator user account password in windows XP

14. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.

How to Configure and Use Remote Desktop ?

Remote Desktop is designed to allow users to remotely gain access to a Windows XP Professional desktop from another computer on the network. After connecting to the remote desktop, a user sees the remote desktop in a window and can access files, folders, and applications on the remote computer. After a connection is established, the local desktop is locked for security reasons, preventing anyone from viewing the tasks that are being performed remotely.

Remote Desktop is designed to allow a user to have full control over a Windows XP Professional desktop from another computer on the network or even from the Internet. This is useful when a user is working from home, another office, or another site and requires access to information or programs on a primary office computer. While a user is remotely accessing a computer, local access by another user is not permitted. An exception to this is an administrator; administrators are permitted to log on locally while another user is connected remotely, but the remote session is then terminated. When you are connected to a computer via Remote Desktop, many of the resources on the host computer are available on the client computer. These resources include the following:



File System While you are connected to the remote host, the file system on the client computer can be made available. If you open My Computer on the host computer, you will see the hard drives for the client computer. This feature allows you to copy information between the host and client computer.

Audio generated on the host computer plays through the client computer’s sound system.

Port The applications running within the session can have access to the ports on the client computer, which allows them to access and manipulate printers, scanners, and other peripheral devices.

Printer The default local or network printer for the client computer becomes the default printing device for the Remote Desktop session. You print a document on the host computer to the printer connected to the client.

Clipboard The Remote Desktop host and the client computer share a Clipboard, which allows data to be copied between applications running on the remote computer and applications running on the client computer. Remote Desktop Requirements Remote Desktop requires the following :

1. A remote computer that is running Windows XP Professional and that is connected to a local area network (LAN) or the Internet. This is the computer to which you want to gain access remotely.

2. A client computer with access to the host computer through a LAN, dial-up, or virtual private network (VPN) connection that has the Remote Desktop Connection program or the Terminal Services Client installed. A version of the Remote Desktop Connection program is available for most versions of Windows. Just insert the Windows XP Professional installation CD-ROM on the client computer and select the option to install the Remote Desktop Connection software.

3. A user account with appropriate permissions. The user must be an administrator or a member of the Remote Users group, and have a password. How to Configure a Computer to Accept Remote Desktop Connections Remote Desktop configuration is a two-part process. First, you must configure the host computer to allow Remote Desktop connections. Then, you must configure the client computer with the Remote Desktop Connection client software. To configure a computer running Windows XP Professional to allow Remote Desktop connections, follow these steps :

1. From the Start menu (or from the desktop or in Windows Explorer), right-click My Computer and select Properties.

2. On the Remote tab, in the Remote Desktop section, select Allow Users To Connect Remotely To This Computer, as shown in below picture.

How to enable remote assistance

3. If the user account to be used to connect remotely is not a member of the Administrators group, click Select Remote Users, add the appropriate user account, and then click OK.

4. Click OK again.

Note  Verify that the user account to be used to connect remotely has a password assigned. User accounts used for remote connections must have passwords.If you are using Windows Firewall, you must configure it to allow Remote Desktop connections. If you are using another software firewall, or if there is a hardware firewall on your network, you must enable inbound connections on TCP port 3389 to support Remote Desktop connections. You can also change the port on which Remote Desktop accepts connections. For more information on changing this port number, read the Knowledge Base article, How to change the listening port for Remote Desktop

How to Connect to a Remote Computer ?

After a computer running Windows XP Professional is configured to allow Remote Desktop connections, you can connect to that computer by using the Remote Desktop Connection client software on another computer. From the Start menu, select All Programs, then Accessories, then Communications, and then Remote Desktop Connection. In the Remote Desktop Connection dialog box, click the Options button to display configurable options, as shown below picture. The only information that you must enter to establish a connection is the name or IP address of the computer. Other configurable options include the following :

How to connect to a remote computer

General options, including the user name, password, and domain name used for authentication and the ability to save connection settings

Display options, including the configuration of the size of the remote connection display (all the way up to full screen) and color settings

Local Resources options, including sound and keyboard configuration, and which local devices to connect to when logged on the remote computer

Programs options, which provide the ability to automatically launch a program when a connection is established

Experience options, which allow the configuration of the connection speed to optimize performance, and provide the ability to control the display of the desktop background, themes, menu and windows animation, and other items that can affect performance

To use the Remote Desktop Connections client, use these steps:




1. From the Start menu, select All Programs, then Accessories, then Communications, and then Remote Desktop Connection.

2. In the Remote Desktop Connection dialog box, see below picture, enter the name or IP address of the remote computer and click Connect.

Remote desktop connection

3. When prompted, enter the appropriate user account and password, and then click OK.

4. If another user is currently logged on to the remote system, a Logon Message dialog box appears, indicating that in order to continue, that user must be logged off and any unsaved data will be lost. If this occurs, click Yes to continue.

5. The Remote Desktop session is established. shown below picture displays a remote connection window.

Remote desktop connection

How to Configure and Use Remote Assistance ?

The Remote Assistance feature allows a user to request help from an expert user. Unlike with Remote Desktop, in Remote Assistance, the user needing help must issue an invitation to the other user and the other user must accept the invitation. After the connection is established, the expert user can take shared control of the user’s desktop, chat with the user, and send and receive files. Taking shared control of the desktop requires the user’s permission. Remote Assistance can minimize or eliminate the need to physically visit a remote computer to solve a problem.

How to Establish a Remote Assistance Session ?

A Remote Assistance session requires that both the user needing help and the expert user actively participate in establishing the connection. The session is established in the following phases :

1. The user that needs help sends a Remote Assistance invitation to the expert user.

2. The expert user responds to the invitation.

3. The user accepts the expert user’s assistance.To send a Remote Assistance invitation, use these steps :

1. From the Start menu, select Help And Support.

2. In the Help And Support Center, under Ask For Assistance, select Invite A Friend To Connect To Your Computer With Remote Assistance, and then select Invite Someone To Help You.

3. Select the method that you want to use to create the invitation, as shown in below picture. You can send invitations directly by using Windows Messenger, by using an e-mail attachment, or by saving an invitation file and transmitting it to the helper user (for example, you could save the file to a shared folder on the network).

How to establish a remote assistance session

4. When prompted, enter the requested information, including your name, a message, when the invitation should expire, and (optionally) a password to be used to establish the connection.

5. Click Send Invitation.

Note When an invitation is sent through an e-mail attachment or saved as a file, the file has a .MsRcIndicent extension.

An expert user must respond to an invitation to continue the process. If the invitation is by using Windows Messenger, you must accept the invitation that is presented in the Messenger pop-up window. If the invitation is sent by e-mail, you must open the attached invitation. If the invitation file is transmitted in some other fashion, you must access and open it. If a password is required, you must enter the password in the Remote Assistance dialog box.

Tip Using Windows Messenger to establish a Remote Assistance connection is the easiest method because the Windows Messenger connection can usually be established regardless of whether there are firewalls on either the user’s or the expert helper’s network. If you use another method of establishing a Remote Assistance session, you must configure a firewall to allow the connection. Like Remote Desktop, Remote Assistance uses TCP port 3389 by default.

Windows then notifies the user requiring assistance that the request has been accepted. The user must click Yes in the Remote Assistance dialog box as a final indication of acceptance, and Remote Assistance then establishes the connection.

Windows XP Professional user Authentication Process

To gain access to a computer running Windows XP Professional or to any resource on that computer (whether the computer is configured to use the Welcome screen or the Log On To Windows dialog box), you must provide a user name and possibly a password.The way Windows XP Professional authenticates a user depends on whether the user is logging on to a domain or logging on locally to a computer see below picture

Windows XP Professional user Authentication Process


The steps in the authentication process are as follows:

1. The user logs on by providing logon credentials—typically user name and password and Windows XP Professional forwards this information to the security subsystem of that local computer.

2. Windows XP Professional compares the logon credentials with the user information in the local security database, which resides in the security subsystem of the local computer.

3. If the credentials are valid, Windows XP Professional creates an access token for the user, which is the user’s identification for that local computer. The access token contains the user’s security settings, which allow the user to gain access to the appropriate resources on that computer and to perform specific system tasks.

Note In addition to the logon process, any time a user makes a connection to a computer, that computer authenticates the user and returns an access token. This authentication process is invisible to the user.

If a user logs on to a domain, Windows XP Professional contacts a domain controller in the domain. The domain controller compares the logon credentials with the user information that is stored in Active Directory. If the credentials are valid, the domain controller creates an access token for the user. The security settings contained in the access token allow the user to gain access to the appropriate resources in the domain.

Available Windows XP Editions

There are a number of different editions of Windows XP, each of which is designed for different users and computing devices. The following editions are part of the Windows family:

1. Windows XP Professional Edition
2. Windows XP Home Edition
3. Windows XP Media Center Edition
4. Windows XP Tablet PC Edition
5. Windows XP 64-Bit Edition

XP EDITION

Windows XP Professional Edition

Windows XP Professional Edition is intended for computers that are part of a corporate network, for the majority of computers on small networks, and for home users who need certain advanced capabilities. Windows XP Professional sets the standard for desktop performance, security, and reliability.

Windows XP Home Edition

Windows XP Home Edition, which is intended for home users, simplifies many aspects of networking and file management so that home users have a cleaner experience. In particular, Windows XP Home Edition has the following limitations compared with Windows XP Professional :

1. Computers running Windows XP Home Edition cannot join a domain.
2. Windows XP Home Edition does not support the use of NTFS or print permissions. Instead, Windows XP Home Edition supports only Simple File Sharing.
3. Windows XP Home Edition does not support the use of dynamic disks
4. Windows XP Home Edition does not support the Encrypting File System (EFS),
5. Windows XP Home Edition supports only one processor, whereas Windows XP Professional supports two processors.
6. Windows XP Home Edition does not include Internet Information Services.
7. Windows XP Home Edition does not include Remote Desktop.
8. Windows XP Home Edition does not provide Remote Installation Services (RIS) support.


You can learn more at Windows XP Home Edition

Windows XP Media Center Edition

The Windows XP Media Center Edition 2004 operating system is available only on new Media Center PCs—computers with special hardware features that enable users to connect the computer as an integral part of a home entertainment system. Because of its special requirements, Media Center PCs running Windows XP Media Center Edition are available only from Microsoft PC manufacturer partners.

For more information visit Windows XP Media Center Edition

Windows XP Tablet PC Edition

The Windows XP Tablet PC Edition operating system expands on Windows XP Professional, providing all the features and performance of Windows XP Professional, while also providing additional capabilities designed to take advantage of a touch-screen interface: pen input, handwriting recognition, and speech recognition. Windows XP Tablet PC Edition offers users the efficiency and dependability of Windows XP Professional. For developers, it offers a rich platform for creating new applications or extending their current applications to take advantage of Tablet PC handwriting and speech capabilities.

For more information visit Windows XP Tablet PC Edition


Windows XP 64-Bit Edition

Microsoft Windows XP 64-Bit Edition, which provides support for the 64-bit computing platforms, is designed to meet the demands of advanced technical workstation users who require large amounts of memory and floating point performance in areas such as mechanical design and analysis, 3D animation, video editing and composition, and scientific and high-performance computing applications. One of the key differences between the 64-bit and 32-bit platforms is that the 64-bit platform supports considerably more system memory—up to 16 GB of physical RAM.

For more information visit Windows XP 64-Bit Edition

How to make my important data secure with New Technology File System (NTFS) ?

With the New Technology File System (NTFS) now you can make your important data 99.99% secure. None can see your important data even administrators group members. In NTFS you can use encryption option to secure your important data.You can encrypt files and folders. To encrypt your important data with  New Technology File System(NTFS) follow this



Go to your desired files or folders location and right click on it. Go to properties ->from general option click on advanced -> from here check the "Encrypt contents to secure your data" -> click OK  twice. See below pictures

make my important data secure with National Teaching Fellowship Scheme (NTFS) ?
Most of us know about this tricks but here have a little bit extra tricks that have to know.

Compression and encryption never works together. It means that compression and encryption works against each other. If you don't believe try yourself to do this.

Most important matters is that, when you use encryption on your files or folders, a security KEY will be implemented immediately between user account and files or folders. And this security KEY makes your files and folders 99.99% secure. This security KEY never shared with others user accounts even with administrators groups related user accounts.

This ENCRYPTION utility has a side effects. If you by mistake delete your user account that carried a security KEY, no longer you will be able to use this encrypted files and folders.

How to make a batch a file to clean your Computer ?

By making a batch file you can easily clean your computer recent,temp,history and others file. Temporary file use huge space on hard disk.

How to make a batch a file to clean your Computer
 

Here I have a created a batch file to do the job that i have mentioned. You have to just simply copy below text in your notepad and save as yourname.cmd
 


Now after saving this above text as yourname.cmd just double click on it. Your  recent,temp,history and others file will be clean.

What is Disk Quota and how to use disk quota with NTFS ?

NTFS supports the use of disk quota. Disk quota enable you to specify the amount of disk space that is available to a user. By enabling disk quota, you can track and control disk space usage. You can configure weather users allowed to exceed their limits, and you can also configure windows XP professional to log an event when a user exceeds a specified warning level or disk quota limit.

I will show you in this post on how to use disk quota with NTFS.



I create two user in my PC named emdad(administrative user) and emdadblog(non administrative user). I will implement disk quota limit on emdadblog. Now I have logged in my PC with emdad user. See below picture.

How to use disk quota in NTFS

Emdad user account belongs to administrators group. Now to use disk quota go to my computer -> select desired HDD drive, right click on it and go to properties - > navigate to disk quota. See below picture


How to use disk quota in NTFS


Now from the disk quota tab check the "Enable quota management" and click on "Quota Entries". A new window will appear and from here go to -> Quota -> New Quota Entry. A window will appear like below this.

How to use disk quota in NTFS

Now from here type your desired user name that you want to implement disk quota limitation. I used emdadblog user to implement disk quota limitation. After giving user name click OK. New window will appear like below picture


How to use disk quota in NTFS

Now from here specify the disk space that a user can use. You can specify disk space KB to EB as well as also set a warning level. I use 300 KB to disk space use and set 150 KB as a warning level for emdadblog user. Now close the window and click apply and OK. Login to emdadblog user account.


How to use disk quota in NTFS

After logging to emdadblog user account check out the drive properties that I have implemented at earlier time.


How to use disk quota in NTFS

FAQ :

1. Why my drive does not showing disk quota option ?

Answer : Because you have not used NTFS drive.

2. How to convert file system to NTFS without loosing data ?



Answer : To convert your drive into NTFS without loosing data  type below command into your command prompt (CMD)

convert x: /fs:ntfs

where X is the drive name. If you use any name instead of your drive letter type the name in X.

3. Why quota option is not working on my implemented user account ?

Answer : Your disk quota option will not work if you implement this option on administrative rights related users.

4. How to implement this disk quota  on administrative user accounts ?

Answer : To implement disk quota option on administrative rights related user account just enable  "Limit disk space to" and set the disk space quota limit. See below picture


How to use disk quota in NTFS

What is computer acronym ?

Computer acronym
An acronym is a short word that is made from the first letter of a group of words. Here is the list of computer acronyms and elaborations.

--- A ---
ADSL - Asymmetric Digital Subscriber Line
AGP - Accelerated Graphics Port
ALI - Acer Labs, Incorporated
ALU - Arithmetic Logic Unit
AMD - Advanced Micro Devices
APC - American Power Conversion
ASCII - American Standard Code for Information Interchange
ASIC - Application Specific Integrated Circuit
ASPI - Advanced SCSI Programming Interface
AT - Advanced Technology
ATI - ATI Technologies Inc.
ATX - Advanced Technology Extended

--- B ---

BFG - BFG Technologies
BIOS - Basic Input Output System
BNC - Barrel Nut Connector

--- C ---

CAS - Column Address Signal
CD - Compact Disk
CDR - Compact Disk Recorder
CDRW - Compact Disk Re-Writer
CD-ROM - Compact Disk - Read Only Memory
CFM - Cubic Feet per Minute (ft�/min)
CMOS - Complementary Metal Oxide Semiconductor
CPU - Central Processing Unit
CTX - CTX Technology Corporation (Commited to Excellence)



--- D ---

DDR - Double Data Rate
DDR-SDRAM - Double Data Rate - Synchronous Dynamic Random Access Memory
DFI - DFI Inc. (Design for Innovation)
DIMM - Dual Inline Memory Module
DRAM - Dynamic Random Access Memory
DPI - Dots Per Inch
DSL - See ASDL
DVD - Digital Versatile Disc
DVD-RAM - Digital Versatile Disk - Random Access Memory

--- E ---

ECC - Error Correction Code
ECS - Elitegroup Computer Systems
EDO - Extended Data Out
EEPROM - Electrically Erasable Programmable Read-Only Memory
EPROM - Erasable Programmable Read-Only Memory
EVGA - EVGA Corporation

--- F ---

FC-PGA - Flip Chip Pin Grid Array
FDC - Floppy Disk Controller
FDD - Floppy Disk Drive
FPS - Frame Per Second
FPU - Floating Point Unit
FSAA - Full Screen Anti-Aliasing
FS - For Sale
FSB - Front Side Bus

--- G ---

GB - Gigabytes
GBps - Gigabytes per second or Gigabits per second
GDI - Graphical Device Interface
GHz - GigaHertz

--- H ---

HDD - Hard Disk Drive
HIS - Hightech Information System Limited
HP - Hewlett-Packard Development Company
HSF - Heatsink-Fan

--- I ---

IBM - International Business Machines Corporation
IC - Integrated Circuit
IDE - Integrated Drive Electronics
IFS- Item for Sale
IRQ - Interrupt Request
ISA - Industry Standard Architecture
ISO - International Standards Organization

--- J ---

JBL - JBL (Jame B. Lansing) Speakers
JVC - JVC Company of America

- K ---

Kbps - Kilobits Per Second
KBps - KiloBytes per second

--- L ---

LG - LG Electronics
LAN - Local Area Network
LCD - Liquid Crystal Display
LDT - Lightning Data Transport
LED - Light Emitting Diode

--- M ---

MAC - Media Access Control
MB  -  MotherBoard or Megabyte
MBps - Megabytes Per Second
Mbps - Megabits Per Second or Megabits Per Second
MHz - MegaHertz
MIPS - Million Instructions Per Second
MMX - Multi-Media Extensions
MSI - Micro Star International

--- N ---

NAS - Network Attached Storage
NAT - Network Address Translation
NEC - NEC Corporation
NIC - Network Interface Card

--- O ---

OC - Overclock (Over Clock)
OCZ - OCZ Technology
OEM - Original Equipment Manufacturer

--- P ---

PC - Personal Computer
PCB - Printed Circuit Board
PCI - Peripheral Component Interconnect
PDA - Personal Digital Assistant
PCMCIA - Peripheral Component Microchannel Interconnect Architecture
PGA - Professional Graphics Array
PLD - Programmable Logic Device
PM - Private Message / Private Messaging
PnP - Plug 'n Play
PNY - PNY Technology
POST - Power On Self Test
PPPoA - Point-to-Point Protocol over ATM
PPPoE - Point-to-Point Protocol over Ethernet
PQI - PQI Corporation
PSU - Power Supply Unit



--- R ---

RAID - Redundant Array of Inexpensive Disks
RAM - Random Access Memory
RAMDAC - Random Access Memory Digital Analog Convertor
RDRAM - Rambus Dynamic Random Access Memory
ROM - Read Only Memory
RPM - Revolutions Per Minute

--- S ---

SASID - Self-scanned Amorphous Silicon Integrated Display
SCA - SCSI Configured Automatically
SCSI - Small Computer System Interface
SDRAM - Synchronous Dynamic Random Access Memory
SECC - Single Edge Contact Connector
SODIMM - Small Outline Dual Inline Memory Module
SPARC - Scalable Processor ArChitecture
SOHO - Small Office Home Office
SRAM - Static Random Access Memory
SSE - Streaming SIMD Extensions
SVGA - Super Video Graphics Array
S/PDIF - Sony/Philips Digital Interface

--- T ---

TB - Terabytes
TBps - Terabytes per second
Tbps - Terabits per second
TDK - TDK Electronics
TEC - Thermoelectric Cooler
TPC - TipidPC
TWAIN - Technology Without An Important Name

--- U ---

UART - Universal Asynchronous Receiver/Transmitter
USB - Universal Serial Bus
UTP - Unshieled Twisted Pair

--- V ---

VCD - Video CD
VPN - Virtual Private Network

--- W ---

WAN - Wide Area Network
WTB - Want to Buy
WYSIWYG - What You See Is What You Get

--- X ---

XGA - Extended Graphics Array
XFX - XFX Graphics, a Division of Pine
XMS - Extended Memory Specification
XT - Extended Technology

What is File Compression and how to use compress?

Use compression when you need more space on your hard-disk drive. Compressing files, folders, and programs decrease their size and reduces the amount of space they use on drives or removable storage device. You can also compress disk drives.

Windows supports two types of compression : NTFS file compression and compressed (zipped) folders. You can use Microsoft Windows Explorer to configure both types.

Uses of Compression : you will get the most compression from txt files, bitmap files, spreadsheets, and presentation files. You will have less compression with graphic and video files that are already compressed Avoid compressing system folders and files because this affects the server and operating system performance.

NTFS file compression : volume, folders and files on an NTFS volume are either compressed or uncompressed. Compression is configured as an attribute of a file or folder. New files created in a compressed folder are compressed by default. A file an be compressed but have an uncompressed file within it. The compression state of a folder does not necessarily reflect  the compression state of files within that folder.



Space allocation : when files are copied, NTFS calculates disk space based on the size of the uncompressed file. This is important because files are uncompressed during the copy process and the system must be sure there is enough space for the uncompressed file. If you copy a compressed file to an NTFS partition that does not have enough space for the uncompressed file, an error message notifies you that there is not enough disk space for the file.

Comparison of compression methods : The two compression methods are compared in the following table



Attribute
NTFS file compression
Compressed (zipped) Folders
File system
NTFS
NTFS or FAT, FAT32
Compressible objects
Files, folders and drives
Files and Folders
User interaction
Transparent, when saving a file to a folder that is compressed
Manual
Performance
Decrease if system files are compressed
No decrease
Password Protection
No
Yes
Encrypt
No
Yes
Change display color
Yes
No

How to use Compression ?

To compress a file, folder or drive right click on it and go to properties. From the general tab check the "Compress this disk drive to save disk space" click apply and OK. See below picture.

What is File Compression and how to use compress?