|Windows (33) blog.crowe.co.nz.Models.Category
I recently has a user who found that email messages from specific people would cause her Outlook 2010 to crash 100% of the time. Most peoples emails were perfectly fine and others were not.
There were lots of entries in the Windows Event Log like the following
Faulting application name: OUTLOOK.EXE, version: 14.0.4760.1000, time stamp: 0x4ba8fefd
Faulting module name: USP10.DLL, version: 1.626.7600.20602, time stamp: 0x4b304c27
Exception code: 0xc0000005
Fault offset: 0x00027466
Faulting process id: 0xa38
Faulting application start time: 0x01cb6ef5e0cefe77
Faulting application path: C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
Faulting module path: C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\USP10.DLL
I read up online and found this article http://social.technet.microsoft.com/Forums/en-US/outlook/thread/178bce4f-707e-42ac-8743-ac41b7a4e046/ where a lot of people where having a similar problem.
There were lot of opinions given there and they did nothing to help me fix the problem directly.
I ended up opening a case with Microsoft and together over a period of a week we diagnosed the problem.
The problem was – A Corrupt Font
I found a few posts online which referred to Helvetica Font (above link and also other places) being corrupt and causing problems with Outlook.
But in my case it was an Arial Narrow font.
* I have suggested that Microsoft Write a tool to test all fonts for corruption – who knows what will happen.
One of the responses from Microsoft was
Based on my research I found that the affected emails which you sent to me is in Helvetica font. Looks like the issue is specific to Helvetica font.
This problem may occur if your document contains Type 1 fonts, such as Helvetica and TimesNewRomanPS.
Note: The same problem can occur in Microsoft Office Outlook 2010 if an email message contains Type 1 fonts.
To resolve this problem, please follow the action below.
Determine which offending Type 1 font is being applied to your document, and then remove the offending Type 1 Font Substitutions entry from the registry. To do this, follow these steps:
- Click Start, type regedit in the Start Search box, and then press Enter.
Collapse this imageExpand this image
If you are prompted for an administrator password or for confirmation, type the password, or provide confirmation.
- In Registry Editor, locate the following subkey:
- Under the FontSubstitutes entry, select the offending Type 1 font.
- Right-click the font, and then click Delete.
- Exit Registry Editor.
- Restart the computer.
- Uninstall the offending Type 1 fonts. For more information about how to uninstall fonts, see the following Microsoft Knowledge Base article:
314960 (http://support.microsoft.com/kb/314960/ ) How to install or remove a font in Windows
- Install the OpenType versions of the offending Type 1 fonts.
For more detailed information, please refer to http://support.microsoft.com/default.aspx?scid=kb;en-US;2119612
** IMPORTANT ** The Microsoft response above did not fix the problem but more investigation showed that Arial fonts were the issue
This problem was on a Windows 7 machine (and mine was as well) so I decided to copy the Arial fonts from the bad machine to my machine. After this “I” got the problem as well!!! (I made a backup of the fonts first!)
The Fix (for me anyway) - Copy my good Arial Fonts to the bad computer
In order to resolve this I needed to copy the good fonts from my machine to a temp directory on my machine and then copy them to a temp folder on the bad machine and then copy the font from the temp folder to the Fonts applet.
Normally using the Fonts applet you can not copy fonts to anywhere else, but by opening a CMD prompt you can make copies of them.
So on the good computer open a CMD prompt and change directory to c:\windows\fonts
You can now copy the good fonts to another folder on the local machine such as c:\temp
You now need to copy the fonts from the c:\temp folder to a folder on the bad computer – again c:\temp
Then on the bad computer open the Fonts applet (you can just type fonts and hit enter at the search programs and files area in the start menu)
Now with that window open you can drag the fonts from c:\temp to the fonts window and you will be prompted to overwrite any existing fonts (if copying more than one font you can let it overwrite all fonts)
Now by the time I got around to checking these fonts we had sent 100’s of megabytes of debug logs to Microsoft, removed all add-ons, started in safe mode, rebooted heaps of times and generally spent a lot of time on the problem.
I had been in contact with Microsoft on the phone and via email and a week or more time had passed with the user not being able to open emails from specific users.
I would assume you could copy all fonts from a known good machine to the bad computer. If you copy all fonts you may never know what font was corrupt, but there is a good chance that in less than 5 minutes you will have a working Outlook again.
Microsoft Office Word has encountered a problem and needs to close
Microsoft Forum on this topic
How many of you who have forked out the extra bucks for the Windows Vista Ultimate version of Windows have got very use to seeing the following image?
I thought that I have only seen this message for ages so I took a look and this is the last ultimate extra I got:
Checkout that date - March 21, 2007
Well today is August 25, 2007 so that is only 5 months with no updates.
What a complete and utter waste of time Microsoft for wasting everyones time with this package of nothing!
When are you going to realise that people get pissed this with this stupid policy that you run, as if you don't have simple tools you could just throw in each week or two to keep people happy who paid the extra $
Quote from Paul Thurrott back in Febraury 2007 - http://www.winsupersite.com/reviews/winvista_ultimate_extras.asp
Given the paucity of Extras, and the overwhelming feeling that some of these should have simply been included in more Vista versions, the Windows Ultimate Extras aren't exactly a slam dunk: I don't see anything absolutely essential here, though the BitLocker Drive Preparation Tool is certainly useful (and GroupShot is, of course, a winner, assuming it's ever released - not yet Paul). We'll see if anything more compelling turns up over time, as Microsoft has pledged to ship more Extras in the months ahead. Let's hope some of them help justify Vista Ultimate's high price: Until then, this package of Extras is decidedly mediocre. What a disappointing start.
January 17, 2007 & February 14, 2007
Disapointing start, well add 6 months to that statement Paul and there is nothing new going on, infact nothing really since you posted your comments.
I saw a very interesting Key Note speech while at TechEd 2007 - http://www.microsoft.com/nz/teched07/keynote.aspx and http://www.microsoft.com/nz/teched07/live/knv1.aspx
The main thing that Lou Carbone shared with the audience was leaving indeliable marks that make a difference in the world we live in. The main topic what Lou was wanting to get across was we should move from making and selling to sensing and responding.
So what does this mean - well it means understanding your customers and not just selling to them, we are all customers at the end of the day, and we all want to be treated with respect and dignity.
Come on Microsoft, play the game and sort this program out for your customers, remember those little people who actually pay your wages!
AIR NEW ZEALAND have made their RSS feed unusable as it contains no details any more of the prices, flights etc and hence this gadgetno longer has any value unless you want to see the source code!
have written another Windows Vista Gadget, this time at the request of Darryl Burling who works for Microsoft New Zealand. He asked if I could turn the RSS feed on the Grab A Seat site into a gadget. The gadget I have written requests the feed every 5 minutes and just displays what is available, never actually storing the feed but just consuming it. The items in the list are removed when no seats remain for that promotion.
You need to be quick as there have been some fares from Auckland to Los Angeles for $498 return and the also Auckland - Shanghai return for $498.
Domestic fares don't run out as fast as the international, but I did notice the other day that the fares had changed by 2am so the early bird will get the seat in this case.
So what is Grab A Seat?, well as far as Air New Zealand is concerned it is this “Ludicrously low fares up for grabs“
To learn more about the Air New Zealand promotion see http://www.grabaseat.co.nz
What the gadget looks like:
With the flyout open it looks like this:
You can download it from my Windows Live Gallery profile:
What you need to know: These fares are only available online for one day only or until sold out. Seats are strictly limited - see the online 'counter' for the number of seats left. Travel periods are strictly limited and fares may not be available on all flights or days during stated travel period. Flight restrictions and routing restrictions apply. Prices are per person, child discounts do not apply. General terms and conditions and Smart Saver and/or Global Saver Max terms and conditions apply.
I came across an interesting message in a forum and tried it out and it works.
I was very annoyed that NTBackup was removed from Vista. The new backup solution just does not give me flexibility I want. So I went and figured what files you need from XP to run NTBackup on Vista. Turns out that you need the following files which all exist in c:\windows\system32
You do get a popup when starting it still, but it all works. You can then also associate BKF files with ntbackup.exe to give them the NTBackup icon and there you go!
On your vista machine create a folder and place all files in there.
Note: When you use the NTBackup to schedule a task it just called NTBACKUP.EXE so if it is not part of your path you will need to edit the scheduled job otherwise it won't run.
This 92-page issue contains the best MSDN Magazine Visual Studio 2005 coverage from the past two years, updated for the final release. Find out what's new in C#, C++, Visual Basic, Windows Forms, ASP.NET, Team System, security, and C++generic types -- download your copy now!
Microsoft have not by the looks of things released the Beta 2 version of Windows Vista to the general public.
This Beta 2 release is now available in three languages (English, German, and Japanese) and in 32-bit and 64-bit editions.
When you register for the Customer Preview Program you will receive the Beta 2 release plus Windows Vista Release Candidate 1 (RC1) — the next major pre-release of Windows Vista — when it is available later this year. The information on this page pertains to both Beta 2 and RC1.
The Customer Preview Program is available in a limited quantity both through download and DVD kit ordering. Once the allotted quantity has been reached the program will be closed and no new orders will be accepted.
There are two ways to get Windows Vista Beta 2:
- Order the DVD kit and have it shipped to your home or office.
- Download the ISO file to your PC
(An ISO file is an exact representation of a CD or DVD, including the content and the logical format. Once you download the ISO file, you’ll need to burn it to a DVD before you can install the software.)
Note: If you install into a Virtual Environment then get ready for very poor performace. You are better to install onto a real PC - performance is about 50 times better compared to the virtual environment.
I am running SBS2003 at home and as part of this I am running the following on the server:
- Microsoft Windows 2003 Server SP1
- Microsoft Active Directory
- Microsoft Exchange Server 2003
- Microsoft SQL Server 2000 (recently upgraded to Microsoft SQL Server 2005)
- Sophos Antivirus
- Microsoft IIS 6.0 with 12 sites
Ever since I have upgraded the SQL server from 2000 to 2005 I have noticed that in this blog I am getting error messages saying Timeout when connecting to the SQL server.
I am not suprised since the machine only has 1 GB of Ram and Exchange will consume as much as it can.
But I never had this problems before - I never got a timeout until SQL was upgraded to SQL 2005.
If I free memory on the server then the web site works again...
I am not sure if SQL 2005 just wants more RAM than 2000 but it is looking like that.
I am in a bit of a situation since the server is running in as much memory as the box will take - no point upgrading until I can justify a super powerful box running Windows 2003 Server R2 with Microsoft Virtual Server 2005.
So just a note to people thinking of upgrading to SQL 2005 - you may need more RAM....
VMware Player is free software that enables PC users to easily run any virtual machine on a Windows or Linux PC. VMware Player runs virtual machines created by VMware Workstation, GSX Server or ESX Server and also supports Microsoft virtual machines and Symantec LiveState Recovery disk formats.
VMware Player can be used by anyone to run virtual machines on a Windows or Linux PC. VMware Player makes it quick and easy to take advantage of the security, flexibility, and portability of virtual machines.
Run any virtual machine. Run virtual machines created by VMware Workstation, GSX Server or ESX Server. VMware Player also supports Microsoft virtual machines and Symantec LiveState Recovery disk formats.
Revert to previous state. Revert virtual machines to a previous 'clean' state within seconds.
Access host PC devices. Use host CD/DVD drives, network adapters, and plug-and-play USB devices.
Copy and paste. Copy text and files between the virtual machine and the host PC.
Drag and drop. Drag and drop files between a Windows host PC and a Windows virtual machine.
Shared folders. Use shared folders to easily share files between virtual machine and the host PC.
Multiple networking options. Virtual machines can share or obtain new IP addresses or be isolated from the network and host.
32- and 64-bit host and guest operating system support. Run a wide variety of virtual machines containing 32- and 64-bit operating systems simultaneously on the same physical PC. Compatible 64-bit guest operating systems include select Microsoft Windows, Red Hat, SUSE, and FreeBSD distributions.
Adjustable memory. Tune virtual machine memory for optimal performance.
Configurable shutdown. Power down or suspend the virtual machine when closing VMware Player.
For more details see : http://www.vmware.com/products/player/
IP Lookup is a small free Windows software tool for finding the owner of an IP block. Specify an IP Number and IP Lookup will retrieve all available information including the name and address of the ISP or the organization that owns the IP block. The software can also resolve a host name into the corresponding IP and then lookup the IP. Is your firewall software reporting too many access attempts from a specific IP address? IP Lookup will help you track down his ISP. Once you gather enough data you should be able to file a report with the ISP.
For more details see:
I came across a number of cool scripting utilities today that may help others; these are:
- Do-It-Yourself Script Center Kit
- Scriptomatic 2.0
- TechNet Script Center Sample Scripts
- WMI Code Creator v1.0
- HTA Helpomatic
- TechNet Script Center Sample Scripts
- Technet Script Center
- ADSI Scriptomatic
Do-It-Yourself Script Center Kit
The Do-It-Yourself Script Center Kit includes all the materials you need to create your own version of the TechNet Script Center, either as stand-alone Web pages, stand-alone .vbs files, or as a .chm Help file. Included in the Kit are a database ( Microsoft Access ) of all the scripts found in the TechNet Script Center Script Repository as of January 2005, as well helper scripts for creating Web pages, .vbs files, and .chm files.
The Kit also includes instructions for using these helper scripts.
For more details see:
A completely new version of the famous Scriptomatic, the utility that writes WMI scripts for you. (And, in the process, teaches you the fundamental concepts behind writing WMI scripts for yourself.) U
nlike its predecessor, Scriptomatic 2.0 isn’t limited to writing just VBScript scripts; instead, Scriptomatic 2.0 can write scripts in Perl, Python, or JScript as well.
In addition, Scriptomatic 2.0 gives you a host of new output formats to use when running scripts, including saving data as plain-text, as a stand-alone Web page, or even as XML.
Scriptomatic 2.0 handles arrays, it converts dates to a more readable format, and it works with all the WMI classes on your computer; on top of all that, it also writes scripts that can be run against multiple machines.
For more details see:
Incase you want the old 2002 version :
TechNet Script Center Sample Scripts
Sample scripts found in the TechNet Script Center. The sample scripts are not supported under any Microsoft standard support program or service. You can, however, report issues and bugs by sending e-mail to email@example.com
The HTA Helpomatic is a utility that helps script writers create HTML Applications (HTAs). HTAs enable you to provide a graphical user interface for your scripts, an interface that can include anything from list boxes to radio buttons to checkboxes. The HTA Helpomatic includes sample VBScript code and sample HTML code showing you how to do things like add a button to an HTA. Equally important, the Helpomatic also shows you how you can run a script any time that button is clicked. As an added bonus, the Helpomatic enables you to modify the scripts and HTML code and test those modifications in the utility itself.
For more details see:
WMI Code Creator v1.0
The WMI Code Creator tool generates code that uses WMI to obtain management information or perform management tasks. You can use the tool to learn how to manage computers using WMI scripting and WMI .NET. The tool generates code that runs on the local computer, a remote computer, or a group of remote computers based on your selection from the Target Computer menu on the tool. You can also execute the generated code directly from the tool.
The tool is meant to help IT Professionals quickly create management scripts and to help developers learn WMI scripting and WMI .NET. The tool helps take the complexity out of writing code that uses WMI and helps developers and IT Professionals understand how powerful and useful WMI can be for managing computers.
Using the tool, you can query for management information such as the name and version of an operating system, how much free disk space is on a hard drive, or the state of a service. You can also use the tool to execute a method from a WMI class to perform a management task. For example, you can create code that executes the Create method of the Win32_Process class to create a new process such as Notepad or another executable. The tool also allows you to generate code to receive event notifications using WMI. For example, you can select to receive an event every time a process is started or stopped, or when a computer shuts down.
The tool also allows you to browse through the available WMI namespaces and classes on the local computer to find their descriptions, properties, methods, and qualifiers.
The code that creates the tool is also included in the download. The tool was created using WMI .NET, and the code for the tool can help developers understand how WMI .NET is used to create applications and manage information. Be sure to read the end-user license agreement that is included in the download.
For more details see:
Technet Script Center
The TechNet script center is a repositaty specially tailed for scripting, there are columns and verything you need to learn how to write scripts for Windows is right there!
Find articles, documentation, webcasts, and even hands-on labs for all levels, right at your fingertips.
The ADSI Scriptomatic is designed to help you write ADSI scripts; that is, scripts that can be used to manage Active Directory or IIS.
The ADSI Scriptomatic also teaches you an important point about ADSI scripting: like WMI, there are consistent patterns to ADSI scripts.
For example, the ADSI Scriptomatic will help you write a script to delete a user account. It will also help you write scripts for deleting groups and organizational units.
And if you take a close look at the scripts for deleting different objects, you’ll see something very interesting: theyre practical identical!
Tweakomatic is a nifty new utility that writes scripts that enable you to retrieve and/or configure Windows and Internet Explorer settings. So what, you might say. Well, think about it. Because these are Windows Management Instrumentation (WMI) scripts, they can be used to configure settings on remote computers. Need to change something on a remote computer? Then haul out Tweakomatic. And think about this: because Tweakomatic writes scripts, you could do something like run these scripts as logon or logoff scripts. In other words, you could quickly, easily, and automatically configure settings on any or all the computers in your organization. Tweakomatic is undoubtedly the single best thing Microsoft has released since Windows itself
For more details see:
Below are a list of the Microsoft Resource Kits that are available online.
Internet Information Services (IIS) 6.0 Resource Guide
This searchable technical reference provides information about running IIS as a Web application platform, ensuring that IIS stays secure, monitoring and tuning IIS, administering the server programmatically, and capitalizing on built-in IIS scalability features to manage large-scale deployments.
Internet Information Services (IIS) 6.0 Resource Kit Tools
The IIS 6.0 Resource Kit Tools can help you administer, secure, and manage IIS. Use them to query log files, deploy SSL certificates, employ custom site authentication, verify permissions, troubleshoot problems, migrate your server, run stress tests, and more.
Internet Information Services (IIS) 6.0 Deployment Guide
Get a prescriptive, task- and scenario-based guidance to help you design and deploy an IIS 6.0 solution–be it a new installation, upgrade, or migration–within your organization. Deploying Internet Information Services (IIS) 6.0 is available as part of the Microsoft Windows Server 2003 Deployment Kit.
Microsoft Windows Server 2003 Resource Kit: Special Promotional Edition
Get the definitive resource for Windows Server 2003, filled with practical guidance on managing and tuning system performance to help optimize speed, reliability, and efficiency.
Windows Server 2003 Technical Reference
Looking for The Microsoft Windows Server 2003 Resource Kit? See the Windows Server 2003 Technical Reference documentation, which provides comprehensive information about the technologies included in the Microsoft Windows Server 2003 operating system. This set of Technical Reference documentation is designed to assist IT planners and administrators by providing the foundational information about the technology components of the operating system.
Windows Server 2003 Deployment Kit
The Microsoft Windows Server 2003 Deployment Kit provides guidelines and recommended processes for designing and deploying Windows Server 2003 technologies to meet your business needs and IT goals.
Migrating from Microsoft Windows NT Server 4.0 to Windows Server 2003
The Migrating from Microsoft Windows NT Server 4.0 to Microsoft Windows Server 2003 guide is designed for IT administrators in small- and medium-sized organizations. It provides guidelines for the migration of domain controller, DHCP/WINS server, file/print server, remote access server, and Web server roles from Windows NT 4.0 to Windows Server 2003.
Windows Server 2003 Resource Kit Tools
The Resource Kit Tools are a set of software tools for network administrators, developers, and power users to manage TCP/IP, networks, the registry, security, remote administration, configuration, batch files, and many other areas of the Windows Server 2003 operating system. To install the tools, download and run Rktools.exe.
Windows XP Professional Resource Kit Documentation
Windows XP Professional Resource Kit Documentation helps IT professionals deploy, manage, and support the Windows XP operating system. In addition to this free online version of the printed book, Windows XP Professional Resource Kit Documentation is available in print from Microsoft Press.
Windows 2000 Resource Kits
From the Windows 2000 Resource Kits home page, you can view Windows 2000 Resource Kit books and references online, review extensive information about deploying Windows 2000, download free tools, and buy the Windows 2000 Resource Kits.
Windows 2000 Resource Kit Tools
These tools help you streamline administrative tasks such as managing Active Directory, administering security features, working with Group Policy and Terminal Services, automating application deployment, and other important jobs. This page contains updated versions of the most popular and useful Resource Kit tools.
Web Resources Page
These resources are referenced in the Windows Resource Kits and lead to information that is useful to Windows users.
Other Microsoft Resource Kits
Get easy access to product Resource Kits here.
Get ideas for new keywords that can help you improve your relevance to queries that user submit to search engines
Example from Google
I used the following keywords:
- Metabase, ADSI, Blog, iis, sharepoint, internet,information,services,ii5,iis6,Windows,Sharepoint
and got the following results ( Note: more results where returned that displayed below )
- internet providers
- internet service providers
- internet access
- cable internet
- dial up internet
- internet banking
- internet roaming
- escort services
- windows media player
- windows xp upgrade
- cable internet service
- sash windows
- internet services
- dating services
- dial up internet access
- phone services
- cleaning services
- cheap internet service
- international internet
- nanny services
- hosting services
- internet radio
- information security
- windows server
- windows 98 upgrade
- windows 2000
- mailing services
- moving services
- management information system
Example from Overture
I used the following key word:
and got the following results ( Note: more results where returned that displayed below )
EFS is "mail relay" software. It was specifically designed to give people with "part time" (dialup) connections to the Internet (or those with fulltime connections but their Internet Service Provider (ISP) does not support ETRN - which is not a protocol I recommend anyway) a way of retrieving mail from their ISP and delivering messages to an internal mail server, such as Microsoft Exchange Server, Lotus Notes 4 or 5, the freeware EMWAC IMS or in fact any RFC compliant SMTP server. You do not need a fulltime connection to the Internet to run EFS - it works with both static (full time) and dynamic (part time) IP addresses.
The best part about EFS is that once it's setup, it is basically maintenance free. Similar mail retrieval programs usually require you to add a separate mailbox for every user that mail will be distributed for - the simple downside of this, continuous maintainance and double data-entry. EFS does away with this by allowing you to specify the domain that you will be accepting mail for (just as you are required to do for your mail server). It is this "Internal routing" feature that makes EFS unique amongst most other POP3 retrievers, the ability to accept and deliver mail for your domain.
For more details see http://www.chimera.co.nz/
Today Microsoft released version 1.0 of the Shared Computer Toolkit for Windows XP, a new set of security and management tools for people who manage shared computers in school computer labs, libraries, Internet cafes, or community technology centers.
Windows XP customers can now download v1.0 for free at www.microsoft.com/sharedaccess.
The Shared Computer Toolkit was designed to help:
- Make it easier for administrators to control the desktop experience and Restrict users from changing system settings, accessing system data, or running unauthorized software.
- Defend shared computers from viruses, spyware and other unauthorized changes by clearing changes to the hard disk, or effectively resetting the disk, every time the computer restarts.
- Enhance the user experience with a simplified desktop and a new privacy feature that clears personal information including passwords, Internet history and recently used documents each time a new user logs on to a shared computer.
Ever had such an annoying message given by Windows?
It has many other flavors:
- Cannot delete file: Access is denied
- There has been a sharing violation.
- The source or destination file may be in use.
- The file is in use by another program or user.
- Make sure the disk is not full or write-protected and that the file is not currently in use.
Try this freeware application to show you what process has the file open:
Microsoft Sharepoint technology is allows us to interface with its content via WebDav.
The Sharepoint File System is a proprietary web folder (WebDAV) implementation that is served through IIS 6.0.
WebDAV RFC 2518 (http://www.ietf.org/rfc/rfc2518.txt) defines WebDAV as a set of methods, headers, and content-types ancillary to HTTP/1.1 for the management of resource properties, creation and management of resource collections, namespace manipulation, and resource locking (collision avoidance). Read more on WebDAV at http://www.webdav.org.
The general way that you normally interface with a WebDav enabled server is via My Network Places
Open Windows Exploer
Select "My Network Places" on the left pane under "Other Places"
Click on "Add a Network Place"
The "Add Network Place" wizard will then start, click on Next
Select "Choose another network location" and click next
Type in your path to your document library such as "http://www.mywebserver.com/Shared Documents" and click next
Give it a name and click next
Your Network Place will then be displayed in an explorer window. This window however does use the full path that you specified as the location/address in Explorer ( \\www.mywebsite.com\Shared Documents ). Wouldn't it be nicer to map it to a drive letter such as X: so that any application can save directly into the Sharepoint document library?
Well you can if you follow these steps instead.
From Windows Explorer
Open Windows Explorer
Select Tools / Map Network Drive
Select your drive letter
Under Folder : enter your url to your document library such as "http://www.mywebserver.com/Shared Documents"
If you want to connect as a specific user click "Connect using a different name" and enter the other user credentials.
Click on Finish
From a CMD.EXE Prompt
- Start a command prompt (type cmd.exe into the Start-Run option)
- Type in the following:
net use x: "http://www.mywebserver.com/Shared Documents" /user:DOMAIN\LOGIN PASSWORD
- You will now have a drive letter mapped to the Shared Documents folder.
Note: You will need to enable the WebClient service if it is not running already on Windows XP
Welcome to my ASP.NET Server Control : LookupEditControl. This control uses a number of different technologies to do its magic.
There is a lot of talk these days about AJAX but not a lot of source in the edit control stage from what I have found. There is always the Google Suggest discussions but no real code.
I have written an ASP.Net server control (currently still in development) that does what I need and works quite well, but not 100% well, still more work to do.
Here are some of the features that I have implemented and currently basically work
- ASP.Net Server Control
- Multi Browser Compatible (IE 6, and Firefox 1.04, maybe others?)
- Supports Multiple Columns in the popup window
- Supports saving a value that is visible in the Columns just like a DropDownList
- Supports updating values when you have tabbed off the control, this was for those times when you type too quick and the control is still doing its lookup.
- Supports defining the width of the Popup Window
- Supports CSS styles for the columns and the Popup Window
- Supports Keyboard Up/Down
- Supports Mouse Selection
- Popup Window Displays over Select Tags with no bleeding
I really am looking for people to help me with this project as I need testers and people with ideas who may be better than me to help clean up the code.
If you want to see it in action browse to http://code.crowe.co.nz/LookupEditControl/
Please let me know what you think of this control as I have spent a lot of time and I am quite happy with it but there are issues yet to be fixed.
ILMerge is a utility that can be used to merge multiple .NET assemblies into a single assembly. ILMerge takes a set of input assemblies and merges them into one target assembly. The first assembly in the list of input assemblies is the primary assembly. When the primary assembly is an executable, then the target assembly is created as an executable with the same entry point as the primary assembly. Also, if the primary assembly has a strong name, and a .snk file is provided, then the target assembly is re-signed with the specified key so that it also has a strong name.
ILMerge is packaged as a console application. But all of its functionality is also available programmatically. While Visual Studio does not allow one to add an executable as a reference, the C# compiler does, so you can write a C# client that uses ILMerge as a library
For more details see - http://www.microsoft.com/downloads/details.aspx?FamilyID=22914587-B4AD-4EAE-87CF-B14AE6A939B0&displaylang=en
I came across this interesting article on the F-Lock keys on recent Microsoft Keyboards.
The F Lock key is a hardware switch in the keyboard. Its state cannot be controlled programmatically. Its default condition is "off". As a result, whenever the keyboard is reset, or loses power, the F Lock key will always be in an "off" state. Do note that with the MSFT keyboards released after September 2004, the keyboard will retain F Lock status through a reboot.
For some, this is not a desirable default; some people want "normal" function key operation.
While there is no way to control the F Lock key state programmatically, Windows 2000, Windows XP and Windows Server 2003 provide a method whereby keys can be remapped by using the Scan Code Mapper. The Scan Code Mapper can be used to change the functions of the function keys. Unfortunately, this functionality is not available for earlier Windows versions.
For more details and a way to switch the keys around see - http://www.mvps.org/jtsang/flock.html
We all know that Microsoft has not released the source code to the .NET Framework.
If you do not know about a tool called .Net Reflector, then you are missing something very important. With this tool you can view the code to .NET DLL's that have not been obfuscated
I was looking to try and find a problem with a Server Control I was writing for ASP.Net - this server control was inherited from TextBox and I had a problem with trying to add a collection property to the control. I could get it rendered correctly to the WebForm but when I reopened the web form the .TEXT property was filled with my collection details and the collection property was empty.
Using this tool you can see code for objects such as TextBox and therefore maybe make a better choice in the way you develop code.
See example below for the AddAttributesToRenderMethod of the TextBox class for ASP.Net
For more details where you can download this tool see - http://www.aisto.com/roeder/dotnet/
Also see Lutz Roeder's Weblog for more details regarding .Net Reflector
For addons such as rendering the source in different languages see http://csharp21.tripod.com/ReflectorAddIns
I wish I had used this tool before - thanks Lutz for writing it and releasing it to the community.
If you have a fully patched Windows XP Service Pack 2 machine and you try to browse the IIS Help virtual directory in the default web site you will notice that it no longer displays as is shown below.
The reason why this happens is that there was a vulnerability in the way Internet Explorer was showing HTML Help files which cause malicious code to run on your computer.
This is discussed in the Microsoft Security Bulletin:
MS05-026: A vulnerability in HTML Help could allow remote code execution
Microsoft engineers though about this issue of web sites using HTML help not working on the client and produced a workaround which involves editing the registry on the local client computer.
To implement this registry change so you can see the IIS HELP online you will need to perform the following:
- Open the Windows Registry Editor (regedit.exe)
- Navigate to the following key:
- You then need to create a new key called "HHRestrictions"
- You then need to add a new string value called "UrlAllowList"
- You then need to give it a value of :
Note: there is a semi-colon between the two paths above
The resulting actions can be seen in the screen snap below.
For more details on this procedure and other options such as implementing this on a domain see the following article:
Certain Web sites and HTML Help features may not work after you install security update 896358 or security update 890175
After you perform the above you will be able to use the HTML Help control which is used by the IISHELP virtual directory but another security feature will make all of the links in the help open in the same frame as the contents.
After you install security update 896358, content that should be displayed in a different frame is displayed in the frame that contains the HTML Help ActiveX control
With Outlook Express a quick way to view the source of a newsgroup message is to press Ctrl-F3
To use the mouse you will need to perform a number of steps:
- Right click the message in the message list (not in the body of the message)
- Select Properties
- Select the Details Tab
- Select Message Source
If you want to use outlook express as a newsreader only and do not want to use it for email the following command line parameters may be useful to you.
outnews or newsonly
This option starts Outlook Express in the News Reader Only mode. When you use this option, you cannot send or receive e-mail, and the Mail tab in the Internet Accounts dialog box is missing.
Also if you want to only use Outlook Express for email then use the following parameter
This option starts Outlook Express in the Mail Only mode. When you use this option, you cannot view newsgroups, and the News tab in the Internet Accounts dialog box is missing.
Note that this command-line switch does not work in Outlook Express 5.
By default on Windows XP when you do a search for files the Microsoft search tool will search inside of zip files which means that this tool takes for ever to run.
If you have WinZIP or another archiver on your system then the following will allow you to stop this behaviour.
- Open a CMD.EXE dos prompt
- Navigate to c:\windows\system32 (or what ever path you have windows installed into)
- Type in the following:
regsvr32 /u zipfldr.dll
You should then get a dialog saying DllUnregisterServer in zipfldr.dll succeeded.
An installer is the first experience of a user with your application. Slow or unsuccessful software installations are the most irritating computer problems. A quick and user friendly installer is therefore an essential part of your software product.
NSIS (Nullsoft Scriptable Install System) is a tool that allows programmers to create such installers for Windows. It is released under an open source license and is completely free for any use.
NSIS can create Windows installers that are capable of installing, uninstalling, setting system settings, extracting files, etc. Because NSIS is based on script files, you can create both simple or advanced installers.
Small overhead size
NSIS is created to be small, fast and and efficient. While other installers often add hundreds of kilobytes or several megeabytes to your installer data, a full featured NSIS installer has an overhead of only 34 KB.
Compatible with all major Windows versions
You can create a single installer that is compatible with Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP and Windows Server 2003.
For more details see - http://nsis.sourceforge.net/features/
This article discusses the essential network ports, protocols and services that are used by Microsoft client and server operating systems, server-based programs and their subcomponents in the Microsoft Windows server system. Administrators and support professionals may use this Microsoft Knowledge Base article as a road-map to determine what ports and protocols Microsoft operating systems and programs require for network connectivity in a segmented network.
Please note - Stolen from http://www.port80software.com/200ok/archive/2005/06/15/606.aspx but I thought you would like to read and it is really for me to read when I need a HTTP Inspection tool which is like everyday.
Some of the tools are implemented as proxies, allow rewriting of headers and all sort of fun stuff, while others plug-in to the browser and monitor the requests passively. While folks may know of LiveHeaders for Mozilla (http://livehttpheaders.mozdev.org) or HttpWatch for IE (http://www.httpwatch.com), here are a few more that we have found varying in price and capabilities.
Stuck in the middle with you -- a few proxies:
We quite like this proxy, which is being updated all the time.
A Java-based HTTP proxy to see full headers -- and change ‘em on the fly.
Another Java-based HTTP inspection proxy.
Toolbars! Toolbars! Get your HTTP toolbars here!:
IE Inspector - HTTP Analyzer
Similar to the popular HttpWatch but cheaper -- the DOM inspector though is much more interesting...
Interesting integration with the specification to show you header information and decent filtering.
This is a packet sniffer that can see all the HTTP stuff going on – on your box. When you need a powertool, Bob Villa-style.
Yet another IE plug-in -- is there a pattern of free tools emerging here?
Yet another IE plug-in -- but this one is FOSS for the budget-minded (free and open, baby).
We even have our own internal tool (httpScope) that we use internally. It may one day be released at a Port80 near you…
ps: Sorry I know I should link to your article but it was such a good list that I wanted it for myself so the next time I forget I can refer to it. At least I am giving credit where it is due!
Another great free tool is Ethereal - which is a full packet sniffer - a tool I use all time - for more details see - http://www.ethereal.com/
Also see this article (although it is now a bit dated - it does show you what you need to know) which describes what you can do with Ethereal - http://iisfaq.com/Default.aspx?tabid=2976
Microsoft Log Parser is a very cool little tool that you can use with a SQL query language to render details from a number of different log file formats including:
- IIS log files in the NCSA Common, Combined, and Extended Log File Formats
- IIS log files in the Microsoft Log File Format.
- IIS log files in the W3C Extended Log File Format
- IIS log files in the Centralized Binary Log File Format
- IIS when configured to log in the ODBC Log Format
- Active Directory Objects
- Comma, Tab and Space Delimited Text Files
- Enterprise Tracing for Windows trace log files (.etl files) and live ETW trace sessions
- Windows Event Log and from Event Log backup files (.evt files).
- Files and Directories
- HTTP Error log files created by the Http.sys driver (IIS 6+ )
- NETMON input format parses network capture files (.cap files) captured by the Network Monitor program (or exported from Ethereal)
- Registry Values
- Generic text files.
- URLScan IIS filter log files
- W3C Extended Log File Format
- XML Files
- Your Own Custom Plugins
You tell Log Parser what information you need and how you want it processed.
The results of your query can be custom-formatted in text based output, or they can be persisted to more specialty targets like SQL, SYSLOG, or a chart.
An example query:
SELECT TOP 10 cs-uri-stem, COUNT(*)
GROUP BY cs-uri-stem
ORDER BY COUNT(*) DESC
For more details on Log Parser see http://www.microsoft.com/technet/scriptcenter/tools/logparser/default.mspx
The Unoffical Log Parser web site created and maintained by Mike Gunderloy see http://www.logparser.com/
For some additional scripts and code examples for using Log Parser from c# see http://www.logparser.com/Repository.htm
A book has been released called the Log Parser Toolkit - see http://www.syngress.com/catalog/?pid=3110
For a details explanation of how Log Parse works see http://www.microsoft.com/technet/community/columns/profwin/pw0505.mspx
For examples of using the COM interface to Log Parser see http://www.microsoft.com/technet/community/columns/scripts/sg0105.mspx
I came across in interesting observation while looking at the Webmaster Guidelines page on google today.
- Don't use "&id=" as a parameter in your URLs, as we don't include these pages in our index.
For more Google guidelines see http://www.google.com/intl/en/webmasters/guidelines.html
In Windows XP by default the programs displayed in the start menu will scroll, if you want to reset them to be displayed in multiple columns instead of scrolling do the following.
- Right click the Start Menu, and then select Properties.
- Choose the Start Menu tab, then click Customize.
- Select the Advanced tab
- Scroll down the list of Start Menu Items until you find the entry Scroll Programs and remove the check.
- Click OK, and nthen click OK again.
Top 10 Benefits of Data Protection Manager
Here are the ten most valuable benefits (plus one bonus benefit) that Data Protection Manager (DPM) can provide to your organization.
||Recover files in minutes instead of hours|
A typical file recovery from tape takes hours and can be costly. The typical medium data center may have 10 to 20 or more recoveries per month. DPM enables the same recoveries in minutes, saving money for the business and time for IT administrators. Additionally, faster recovery keeps information workers productive because they spend less downtime waiting for their files to be recovered.
||Eliminate the backup window of your production servers|
Massive growth in storage capabilities has increased the time needed to back up file servers. At the same time, businesses face the requirement for 24×7 uptime and the fact that there is no good time to perform a backup. Because DPM moves only the byte-level changes of the file servers it backs up, it effectively eliminates the downtime required to back up your file servers. Customers never have to plan for such "backup windows" again.
||Shrink potential data loss down to one hour|
With legacy tape backup products, backing up file servers to tape more than once a day is not feasible. Traditionally, full backups are scheduled once per week and incremental backups are performed daily. This requires the use of many tapes, which is a more expensive option than disk-based backup, and creates the risk that any work done between the nightly backups is subject to permanent loss. DPM can back up data to the central DPM server every hour during the day, giving you the security and peace of mind to be able to restore any file object to a previous point in time. You can shrink your potential maximum data loss from a day down to an hour.
||Rely on having no more failed recoveries|
Given that DPM is a disk-based backup product, the reliability of file restores is significantly better than that of comparative tape-based systems. Recoveries of volumes, shares, folders, and files are virtually guaranteed. DPM also successfully protects even files that are open, which leads to a virtually fault-free backup system.
||Get easy and instant backup verification|
Recovering data using disk-based data protection is as fast and simple as browsing a set of folders on a file share and copying them directly from the DPM server to the production server. DPM provides better control of a business's recovery infrastructure so that the IT staff can more rapidly, reliably, and predictably recover data at a lower cost. With disk-based data protection, businesses achieve greater certainty about recovery because IT administrators can verify a successful backup by browsing through the disk and performing an online verification.
||Enable users to perform their own recoveries|
Recovery and backup processes generally involve multiple administrators, each having unique expertise, adding to the data management total cost of ownership. Corporations collectively spend billions of dollars annually on recovering lost data. DPM solves these problems by enabling self-service user recovery, which lets users access and retrieve files directly within Microsoft Windows XP and Microsoft Office XP applications without administrator intervention, thereby lowering administrator costs and increasing productivity.
||Set up and protect your file servers in minutes|
As new servers and shares are added to the network, DPM automatically discovers and alerts the administrator that unprotected servers exist in the environment. By using comprehensive wizards, the administrator can easily set the protection schedule. Backups of the data then occur according to the schedule and the server administrator does not need to initiate the backup process. DPM enables you to automatically discover and protect new servers and shares added to your environment in minutes.
||Use advanced functionality at low cost|
In many organizations, the data storage budget consumes up to one-third of the total IT budget. Furthermore, a significant share of the IT storage budget is related to backup and recovery. According to estimates, 70 percent of the cost of backup and recovery over a three-year period is related to manual labor costs. Fast, easy, and cost-effective data protection and recovery methods are crucial to lowering overall IT costs. DPM works with Microsoft Windows Server 2003 and Windows 2000 Server file server technologies to deliver low total cost of ownership by overcoming the deficiencies and cost of tape-based backup systems—essential objectives of enterprise computing infrastructures. DPM includes an exciting set of customer-focused services to increase return on investment and enhance user productivity.
||Remove tapes from branch offices and centralize backups at the data center|
Today, the primary way to protect remote servers is for branch office staff to back up data to expensive removable media, such as data tape cartridges, and then manually transport the media to an offsite storage facility. Tape restores within this configuration can be expensive and slow. DPM deploys agents on the remote file servers to send the data back to the central data center where it can be more securely backed up by one IT administrator.
||Take advantage of rich out-of-the-box reporting and monitoring functionality|
Because DPM is part of the Windows Server System, it contains tools that are already in your server software, such as Microsoft Management Console (MMC) and Windows Explorer. IT administrators are already familiar with these tools, which reduces training costs. Along with the comprehensive report functionality included with the product, DPM can also upload all of its reports and alerts to the Microsoft Operations Manager console.
||Save time with simple, easy-to-schedule backup management|
By using comprehensive wizards, the administrator can easily set a protection schedule specific to the servers being protected. Backups of the data then occur according to the schedule, ensuring that snapshots of the data are taken at the predetermined times. This creates nearly instantaneous shadow copies that can be stored on the DPM server and be further transferred to the tape backup during the regularly scheduled backup process, ensuring a comprehensive backup strategy for your company.
Increasingly, computer users are using different folders, drives, and even different computers (such as a laptop and a desktop) to store and retrieve files. There are new sources of files coming from every direction: digital cameras, e-mail, cell phones, portable media players, camcorders, PDAs, and laptops. Yet managing hundreds or thousands of files is still largely a manual operation. In some cases it is necessary to move files from one place to another; in other cases there is a need to keep two storage locations exactly in sync. Some users manage files manually, dragging and dropping from one place to another and keeping a mental card catalog in their heads. Others use one or more applications of one sort or another to provide this functionality for them.
Now there is an easier way. SyncToy is a free PowerToy for Microsoft Windows XP that provides an easy to use, highly customizable program that helps users to do the heavy lifting involved with the copying, moving, and synchronization of different directories. Most common operations can be performed with just a few clicks of the mouse, and additional customization is available without adding complexity. SyncToy can manage multiple sets of directories at the same time; it can combine files from two folders in one case, and mimic renames and deletes in another. Unlike other applications, SyncToy keeps track of renames to files and will make sure those changes get carried over to the synchronized folder