Thursday, November 27, 2014

Google Chrome Issues


C: → Users → YOUR USERNAME → AppData → Local → Google → Chrome → User Data

Important:  pen the default folder and backup “Bookmarks” (copy and save it other location).

Now mark all folders and files in, a User Data folder and Delete it

GOOGLE CHROME Download Error

(Can not Continue. The application is improperly formatted. Contact the application vendor for assistance)

You can either use the following
(Enable the browser to run components signed with Authenticode)

To enable Internet Explorer to run components signed with Authenticode:
  1. Open Internet Explorer
  2. Click the menu Tools
  3. Click Internet options
  4. Click Security tab
  5. Select Trusted sites zone
  6. Click Custom Level...
  7. Select the item Run components signed with Authenticode or click Enable
  8. Click OK to apply
If the above does not work, You will have to delete the Google chrome from your C drive
Delete the Folder Google and re-install via's installer.
It must work or contact me I will help you to install it.

Friday, November 21, 2014

VPN Issues

VPN Issue:

Unable to open web based VPN site.

Reason\Issue: Java not available

1. Go to Internet options in Internet explorer and goto Compatibility view Settings
2. Add the site in there.
3. Re launch Internet explorer
Must resolve the issue, if not let me know

VPN Window Minimized






Friday, June 27, 2014

Adjust Internet Explorer ActiveX settings

  1. Open Internet Explorer.
  2. Click the Tools menu, and then click Internet Options.
  3. On the Security tab, click the Custom level button.
  4. Scroll down the Security Settings list until you see ActiveX controls and plug-ins.
  5. For Automatic prompting for ActiveX controls, click Enable.
  6. Scroll down to Download signed ActiveX controls and click Enable or Prompt.
  7. Scroll down to Run ActiveX controls and plug-ins and click Enable or Prompt.
  8. Scroll down to Script ActiveX controls marked safe for scripting and click Enable or Prompt.
  9. Click OK, and then click OK again.

Tuesday, June 24, 2014

Outlook Issue- Provide your Outlook Issue and I will provide you the resolution

Outlook Issues\Configurations

1. How to Configure Yahoo with Outlook Client

-- Click on new account

-- Click on Manually configure
-- Choose the internet login default Corporation or your own email address for yahoo

Incoming server name: 
Outgoing server name:
Go to more setting
- incomig server 993
- encryption ssl
- outgoing server 465

2. Synchronization Logs in Outlook

Outlook 2010: Synchronization logs in Unread Messages folder

 you may see messages like this show up in your “Unread Messages” folder:
First, don’t be alarmed—this is not an error—this is a change in how Outlook 2010 handles logging. However, if you are the kind of user that likes to manage e-mails in the unread messages folder, all of these synchronization log messages can get annoying. Here is how you can filter them out of the Unread Messages folder:

1. In Outlook, select the Unread Messages folder
2. Click the View tab on the ribbon
3. Click “View Settings”
4. Click Filter, then Advanced
5. Click Field and select Frequently-used fields and select “Subject.” Select “Doesn’t Contain” for Condition and enter “Synchronization Log:” for Value.
6. Click “Add to List” then “OK.”
Now your Unread Messages folder will no longer display synchronization logs.

3. Unable to Open Hyperlinks in Outlook

  1. Close Outlook
  2. Open Internet Explorer.
  3. On the Tools menu, click Internet Options.
  4. Click the Advanced tab, and then click the Reset button.
  5. On the Programs tab, under Internet programs, click Set Programs, then “Set your Default Programs”, select your e-mail program and click “Set this program as Default”. Repeat for Internet Explorer.
  6. Click OK and close the dialogs.

If this does not work then

  1. Close Outlook
  2. Open Internet Explorer.
  3. On the Tools menu, click Internet Options.
  4. Click the Advanced tab, and then click the Reset button.
  5. Under Internet programs, verify that the correct e-mail program is selected.
  6. Click to select the Internet Explorer should check to see whether it is the default browser check box.
  7. Click Apply, and then click OK.

Thursday, April 22, 2010


Linux is a freely-circulated open source system, which makes it greatly cost-effective for hosts to provide, maintain, and operate. It also has a extremely strong position for both speed and stability. It’s so accepted that the best part of websites are essentially hosted on a Linux operating system.
SECURITY: Although Linux and Windows can both face hacking attempts, for the reason that Linux is open sourced, patches to close security holes are implemented very quickly since so many people contribute to making it better every day.
COST: Yet again, it’s an open source OS, so it doesn’t need any licensing charge for using Linux operating systems. It expenses a smaller amount for the host to offer the service.
1. Linux is free software., Linux is a open-source OS.People can change code .
2. We can Add programs which will help to use your computer better.
3. Linux wants the programmers to extend and redesign it's OS time after time, but with open-source, so you can see what happens and you can edit the OS.
4. The various distributions of Linux come from different companies (i.e LIndows , Lycoris, Red Hat, SuSe, Mandrake, Knopping, Slackware).,Linux is capable of networking, file sharing and being a web server.
5. Linux is very cheap or free.
6. Linux is customizable in a way that Windows is not.
7. Microsoft Windows is a closed-source operating system created by Bill Gates, supreme ruler of the earth. It is gradually losing it's grip on the market because it is insecure, slow, and wasteful.
8. Windows and Linux are two different operating systems. The purpose of an operating system is to: 1. control all the hardware components that are part of your computer. 2. manage a computer's ability to do several things at once 3. provide a base set of services to programs to keep software manufacturers from have to reinvent the wheel a million times for the same thing. The Linux operating system was developed from a base of Unix (another operating system) after the Unix systems stopped being free. The Linux people believe in free and open software, and so they "reinvented" Unix, and improved it slightly to make Linux.
9. Most hard drive installations of Linux utilize a "swap partition", where the disk space allocated for paging is separate from general data, and is used strictly for paging operations. This reduces slowdown due to disk fragmentation from general use.
10. Linux kernel 2.6 once used a scheduling algorithm favoring interactive processes. Here "interactive" is defined as a process that has short bursts of CPU usage rather than long ones. It is said that a process without root privilege can take advantage of this to monopolize the CPU,when the CPU time accounting precision is low. However, Completely Fair Scheduler, now the standard scheduler, addresses this problem

Windows, similar to your personal computer, is a Microsoft owned commercial operating system. Its major benefit is that it can also run Microsoft software such as Access and MS SQL databases.
SECURITY: Because it is a commercial operating system, it could take a little longer at fixing a few security issues (frequently by releasing security packs) while they must usually be provided through Microsoft.
COST: As you buy Windows for your private computer, servers needs to pay Microsoft for extra licensing amount to make use of their operating system. That’s why hosts generally charge extra for Windows hosting.

1. Window NT is devloped by Microsoft company.
2. Window NT is programmed in C and C++
3. You can't change any thing in windows. you can't even see which processes do what and build your onw extension.
4. All the flavors of Windows come from Microsoft.
5. Windows is expensive
6. Windows is not customizable.
7. Linux is an open source operating system that, until fairly recently, was only used on servers. Now it is used on Mac OS X computers, and more people are starting to use it on computers that aren't servers. It is very secure, efficient, and flexible.
8. Windows and Linux are two different operating systems. The purpose of an operating system is to: 1. control all the hardware components that are part of your computer. 2. manage a computer's ability to do several things at once 3. provide a base set of services to programs to keep software manufacturers from have to reinvent the wheel a million times for the same thing.

Windows is a proprietary operating system owned by Microsoft. It was developed independently from Unix, and its internal details are much different. They should perform the same tasks, however at the deepest levels, details differ, and so a program written to run on Windows will not run on Linux, and vice versa.
Widows comes in several "flavors", like Windows NT, Windows 2000, and Windows XP, all of which are slightly different, but share enough in common that programs written for one flavor will run on the others 99.9% of the time.
9. Windows NT family (including 2000, XP, Vista, Win7) most commonly employs a dynamically allocated pagefile for memory management. A pagefile is allocated on disk, for less frequently accessed objects in memory, leaving more RAM available to actively used objects. This scheme suffers from slow-downs due to disk fragmentation
10. NT-based versions of Windows use a CPU scheduler based on a multilevel feedback queue, with 32 priority levels defined. The kernel may change the priority level of a thread depending on its I/O and CPU usage and whether it is interactive , raising the priority of interactive and I/O bounded processes and lowering that of CPU bound processes, to increase the responsiveness of interactive applications.

Friday, March 26, 2010

Raid Technology

RAID stands for Redundant Array of Inexpensive (or sometimes "Independent") Disks.

RAID is a method of combining several hard disk drives into one logical unit (two or more disks grouped together to appear as a single device to the host system). RAID technology was developed to address the fault-tolerance and performance limitations of conventional disk storage. It can offer fault tolerance and higher throughput levels than a single hard drive or group of independent hard drives. While arrays were once considered complex and relatively specialized storage solutions, today they are easy to use and essential for a broad spectrum of client/server applications

RAID technology was first defined by a group of computer scientists at the University of California at Berkeley in 1987. The scientists studied the possibility of using two or more disks to appear as a single device to the host system.
Although the array's performance was better than that of large, single-disk storage systems, reliability was unacceptably low. To address this, the scientists proposed redundant architectures to provide ways of achieving storage fault tolerance. In addition to defining RAID levels 1 through 5, the scientists also studied data striping -- a non-redundant array configuration that distributes files across multiple disks in an array. Often known as RAID 0, this configuration actually provides no data protection. However, it does offer maximum throughput for some data-intensive applications such as desktop digital video production.

A number of factors are responsible for the growing adoption of arrays for critical network storage.
More and more organizations have created enterprise-wide networks to improve productivity and streamline information flow. While the distributed data stored on network servers provides substantial cost benefits, these savings can be quickly offset if information is frequently lost or becomes inaccessible. As today's applications create larger files, network storage needs have increased proportionately. In addition, accelerating CPU speeds have outstripped data transfer rates to storage media, creating bottlenecks in today's systems.
RAID storage solutions overcome these challenges by providing a combination of outstanding data availability, extraordinary and highly scalable performance, high capacity, and recovery with no loss of data or interruption of user access.
By integrating multiple drives into a single array -- which is viewed by the network operating system as a single disk drive -- organizations can create cost-effective, minicomputersized solutions of up to a terabyte or more of storage.


There are several different RAID "levels" or redundancy schemes, each with inherent cost, performance, and availability (fault-tolerance) characteristics designed to meet different storage needs. No individual RAID level is inherently superior to any other. Each of the five array architectures is well-suited for certain types of applications and computing environments. For client/server applications, storage systems based on RAID levels 1, 0/1, and 5 have been the most widely used. This is because popular NOSs such as Windows NT® Server and NetWare manage data in ways similar to how these RAID architectures perform.

Data striping without redundancy (no protection).
• Minimum number of drives: 2
• Strengths: Highest performance.
• Weaknesses: No data protection; One drive fails, all data is lost.

Data A Data A
Data B Data B
Data C Data C

Disk mirroring.
• Minimum number of drives: 2
• Strengths: Very high performance; Very high data protection; Very minimal penalty on write performance.
• Weaknesses: High redundancy cost overhead; Because all data is duplicated, twice the storage capacity is required.
Standard Host
Data A Data A
Data B Data B
Data C Data C
Original Data Mirrored Data
Standard Host
Adapter 1 Standard Host
Adapter 2
Data A Data A
Data B Data B
Data C Data C
Original Data Mirrored Data


No practical use.
• Minimum number of drives: Not used in LAN
• Strengths: Previously used for RAM error environments correction (known as Hamming Code ) and in disk drives before he use of embedded error correction.
• Weaknesses: No practical use; Same performance can be achieved by RAID 3 at lower cost

Byte-level data striping with dedicated parity drive.
• Minimum number of drives: 3
• Strengths: Excellent performance for large, sequential data requests.
• Weaknesses: Not well-suited for transaction-oriented network applications; Single parity drive does not support multiple, simultaneous read and write requests
Block-level data striping with dedicated parity drive.
• Minimum number of drives: 3 (Not widely used)
• Strengths: Data striping supports multiple simultaneous read requests.
• Weaknesses: Write requests suffer from same single parity-drive bottleneck as RAID 3; RAID 5 offers equal data protection and better performance at same cost.,

Block-level data striping with distributed parity.
• Minimum number of drives: 3
• Strengths: Best cost/performance for transaction-oriented networks; Very high performance, very high data protection; Supports multiple simultaneous reads and writes; Can also be optimized for large, sequential requests.
• Weaknesses: Write performance is slower than RAID 0 or RAID 1.
Parity A Data A Data A
Data B Parity B Data B
Data C Data C Parity C

RAID 01(0+1) AND RAID 10(1+0)
Combination of RAID 0 (data striping) and RAID 1 (mirroring). RAID 01 (0+1) is a mirrored configuration of two striped sets (mirror of stripes); RAID 10 (1+0) is a stripe across a number of mirrored sets(stripe of mirrors). RAID 10 provides better fault tolerance and rebuild performance than RAID 01. Both array types provide very good to excellent overall performance by combining the speed of RAID 0 with the redundancy of RAID 1 without requiring parity calculations.
• Minimum number of drives: 4
• Strengths: Highest performance, highest data protection (can tolerate multiple drive failures).
• Weaknesses: High redundancy cost overhead; Because all data is duplicated, twice the storage capacity is required; Requires minimum of four drives

RAID 01 (0+1 mirror of stripes)
Data A Data A mA mA
Data B Data B mB mB
Data C Data C mC mC
Original Data Original Data Mirrored Data Mirrored Data

RAID 10 (1+0 stripe of mirrors)
Data A mA Data B mB
Data C mC Data D mD
Data E mE Data F mF
Original Data Mirrored Data Original Data Mirrored Data


There are three primary array implementations: software-based arrays, bus-based array adapters/controllers, and subsystem-based external array controllers. As with the various RAID levels, no one implementation is clearly better than another -- although software-based arrays are rapidly losing favor as high-performance, low-cost array adapters become increasingly available. Each array solution meets different server and network requirements, depending on the number of users, applications, and storage requirements.
It is important to note that all RAID code is based on software. The difference among the solutions is where that software code is executed -- on the host CPU (software-based arrays) or offloaded to an on-board processor (bus-based and external array controllers).
Description Advantages
Software-based RAID Primarily used with entry-level servers, software-based arrays rely on a standard host adapter and execute all I/O commands and mathematically intensive RAID algorithms in the host server CPU. This can slow system performance by increasing host PCI bus traffic, CPU utilization, and CPU interrupts. Some NOSs such as NetWare and Windows NT include embedded RAID software. The chief advantage of this embedded RAID software has been its lower cost compared to higher-priced RAID alternatives. However, this advantage is disappearing with the advent of lower-cost, bus-based array adapters. • Low price
• Only requires a standard controller.
Hardware-based RAID Unlike software-based arrays, bus-based array adapters/controllers plug into a host bus slot [typically a 133 MByte (MB)/sec PCI bus] and offload some or all of the I/O commands and RAID operations to one or more secondary processors. Originally used only with mid- to high-end servers due to cost, lower-cost bus-based array adapters are now available specifically for entry-level server network applications.

In addition to offering the fault-tolerant benefits of RAID, bus-based array adapters/controllers perform connectivity functions that are similar to standard host adapters. By residing directly on a host PCI bus, they provide the highest performance of all array types. Bus-based arrays also deliver more robust fault-tolerant features than embedded NOS RAID software.

As newer, high-end technologies such as Fibre Channel become readily available, the performance advantage of bus-based arrays compared to external array controller solutions may diminish. • Data protection and performance benefits of RAID
• More robust fault-tolerant features and increased performance versus software-based RAID.
External Hardware RAID Card Intelligent external array controllers "bridge" between one or more server I/O interfaces and single- or multiple-device channels. These controllers feature an on-board microprocessor, which provides high performance and handles functions such as executing RAID software code and supporting data caching.

External array controllers offer complete operating system independence, the highest availability, and the ability to scale storage to extraordinarily large capacities (up to a terabyte and beyond). These controllers are usually installed in networks of stand alone Intel-based and UNIX-based servers as well as clustered server environments. • OS independent
• Build super high-capacity storage systems for high-end servers.


UDMA SCSI Fibre Channel
Best Suited For Low-cost entry level server with limited expandability Low to high-end server when scalability is desired Server-to-Server campus networks
Advantages • Uses low-cost ATA drives • Performance: up to 160 MB/s
• Reliability
• Connectivity to the largest variety of peripherals
• Expandability • Performance: up to 100 MB/s
• Dual active loop data path capability
• Infinitely scalable


The concept behind RAID is relatively simple. The fundamental premise is to be able to recover data on-line in the event of a disk failure by using a form of redundancy called parity. In its simplest form, parity is an addition of all the drives used in an array. Recovery from a drive failure is achieved by reading the remaining good data and checking it against parity data stored by the array. Parity is used by RAID levels 2, 3, 4, and 5. RAID 1 does not use parity because all data is completely duplicated (mirrored). RAID 0, used only to increase performance, offers no data redundancy at all.
A + B + C + D = PARITY

1 + 2 + 3 + 4 = 10
1 + 2 + X + 4 = 10

7 + X = 10
-7 + = -7
--------- ----------
X 3


RAID technology does not prevent drive failures. However, RAID does provide insurance against disk drive failures by enabling real-time data recovery without data loss.
The fault tolerance of arrays can also be significantly enhanced by choosing the right storage enclosure. Enclosures that feature redundant, hot-swappable drives, power supplies, and fans can greatly increase storage subsystem uptime based on a number of widely accepted measures:
Mean Time to Data Loss. The average time before the failure of an array component causes data to be lost or corrupted.
Mean Time between Data Access (or availability). The average time before non-redundant components fail, causing data inaccessibility without loss or corruption.
Mean Time To Repair. The average time required to bring an array storage subsystem back to full fault tolerance.
Mean Time Between Failure. Used to measure computer component average reliability/life expectancy. MTBF is not as well-suited for measuring the reliability of array storage systems as MTDL, MTTR or MTDA (see below) because it does not account for an array's ability to recover from a drive failure. In addition, enhanced enclosure environments used with arrays to increase uptime can further limit the applicability of MTBF ratings for array solutions

Friday, March 12, 2010


1. You have installed windows service pack 2 and after updating windows up to service pack 3, you are able to log in system but receiving a continuous message that it is not a genuine copy of windows. What are the solutions available to this problem in both manner legal of illegal?

Windows Genuine Notification popped up because Windows Update again installed it via Automatic Updates. It pops up while a user logs in to windows, displays a message near the system tray and keeps on reminding you in between work that the copy of windows is not genuine. It has been reported since its first release that even genuine users are getting this prompt, so Microsoft has them self release instructions for its removal. When I searched on Google about this issue, I landed up on pages which were providing many methods of its removal including those patching up existing files with their cracked versions which I would highly recommend avoiding them as they might contain malicious code and can be used to get you into more trouble.
I found out this method of removal of Windows Genuine Notification :
1. Launch Windows Task Manager.
2. End wgatray.exe process in Task Manager.
3. Restart Windows XP in Safe Mode.
4. Delete WgaTray.exe from C:\Windows\System32.
5. Delete WgaTray.exe from C:\Windows\System32\dllcache.
6. Lauch RegEdit.
7. Browse to the following location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
8. Delete the folder ‘WgaLogon’ and all its contents
9. Reboot Windows XP.
But the latest version of the WGN tool is a little tricky to handle. It will pop up again as soon as you end it from the task manager and while it is running in the memory, you can’t delete it too.

Download a patch from the Internet and run it in your windows

Register your windows from Microsoft official website.

2.You have downloaded windows 7 from Microsoft official website in December 2009 on present day your system is rebooting after 2 hours. What are the solutions available to overcome this problem. Legal or Illegal?

If you have a warm fuzzy feeling inside when thinking about Microsoft and their decision to let you play with their new OS for free until August next year; get ready for the kicker. From March that release candidate you are running is going to start reminding you a commercial copy of the OS needs to be purchased to continue enjoying the benefits of Windows 7 in the most intrusive way possible.
You can understand Microsoft wanting to remind users that they need to buy Windows 7, but it’s the method they have decided to employ that is going to annoy and frustrate users. From March 2010 Windows 7 RC will start automatically rebooting your PC every two hours. So, if you happen to be doing something important you’ll have to stop as the friendly “buy me!” shutdown reminder is invoked.
For the RC, bi-hourly shutdowns will begin on March 1st, 2010. You will be alerted to install a released version of Windows and your PC will shut down automatically every 2 hours. On June 1st, 2010 if you are still on the Windows 7 RC your license for the Windows 7 RC will expire and the non-genuine experience is triggered where your wallpaper is removed and “This copy of Windows is not genuine” will be displayed in the lower right corner above the taskbar.
This isn’t a new tactic Microsoft has implemented to remind users they need to upgrade and it did the same thing with Vista previews. Windows 7 is expected to release in October this year, but at the very latest will be out by January next year giving you plenty of time to buy a copy before the automatic shutdowns begin.