What are synthetic backups?

Standard

Synthetic backups are created from a full backup of a file and subsequent incremental backups. With an incremental backup only changed information in the file is backed up. So a file’s backup could look like this:-

– Full backup – 10-January 2005 – 1000 blocks
– Incremental backup – 12 January 2005 – 100 blocks
– Incremental backup – 15 January 2005 – 120 blocks

A synthetic backup is needed if the backed up file needs copying as a single backup entity, or if it needs restoring. The contents of a synthetic backup differ depending upon the date chosen. In our example two synthetic backups could be produced: one for 12 January 2005; and one for 15 January 2005. The data they contain would be different; the 12 January 2005 synthetic backup would not contain any changes to the file subsequent to that, whereas the 15 January 2005 synthetic backup would.

Backup file meta data
Synthetic backups don’t work unless incremental backup data is timed and dated and the file locations they refer to are known.

For example, the 12 Jan 2005 incremental backup could refer to paragraph 5 in a 200 paragraph Word document. It also has a new paragraph 6 making the original paragraph 6 now paragraph 7 and so on throughout the document.

The 15 Jan 2005 incremental backup could refer to paragraph 5 again and also paragraph 7. The synthetic backup wil only work if it has, in effect, a map of the components of the original backup file and keeps track of how they are altered. For example, the 15 Jan 2005 synthetic backup would need to know that paragraph 7 refered to paragraph 7 in the 12 Jan 2005 version of the document and not the 10 Jan 2005 version. The synthtic backup application needs to create and maintain metadata for the backups it deals with so as to create fully accurate synthetic backups.

What can be done is to create a fresh full backup periodically by combining the current full backup file and subsequent incremental backups. The two kinds of files are merged by the backup application to create a new full but synthetic backup. It is synthetic because it has not been copied directly from the original data.

Where is the synthetic backup run?
Synthetic backups should be run on a media server dedicated to the job of front-ending a backup and restore type set of media resources. If it is carried out on general application servers then they can lose significant numbers of cycles and consume significant network bandwidth performing a synthetic backup run.

Why run a synthetic backup scheme?
This question really means why do incremental backups? There are two reasons. One is to reduce the resources needed for a backup. A full backup wil require a set of server cpu cycles, some network bandwidth and backup media space. Each time you do a full backup you would need the same level of these three resources.

By running an incremental backup you need only a fraction of the server CPU cycles, network bandwidth and additional backup media space. That reduces the backup window, the time needed to run the backup, considerably.

But it increases the time needed for a restore because now a restore would need to return to the user the original backup file and all subsequent incremental backup files, and then the restored file needs re-building to merge in each incremental backup file’s data. It takes more time, uses more server cycles and network bandwidth.

By consolidating the original backup file and incremental backup files into a single synthetic backup then restore speed is faster because just one file now needs streaming to the user. Also the server CPU cycles needed for the restore are cut back.

Another benefit is disaster recovery. If you wish to store full backup files in an offsite vault then storing synthetic fulls lets you keep the backup window advantages of incremental backups and not suffer the disadvantage of user server system-based merging of full and incremental backups when a restore from the vault is needed.

Most mainstream backup application suppliers offer synthetic backup facilities: Veritas; Legato; IBM; and CA. Sepaton, a virtual tape system supplier (Sepaton = ‘no tapes’ backwards) uses a point-in-time snapshot as its source file. It could take a point-in-time snapshot of a Veritas NetBackup file and, because it ‘understands’ that file’s format, can build a set of pointers to create a new synthetic full backup. This is done in a minute or two rather than hours needed for a tape-based synthetic backup to be created.

However, there may be limitations. A backup application may have limitis it imposes on the number or size of incremental backups it supports. Also incremental backup schemes may not be generally efficacious on files which have a high change rate; over 10 per cent say. It’s always a good idea to check with your backup vendor for such restrictons.

List of One Day International cricket records

Standard

List of One Day International cricket records

From Wikipedia, the free encyclopedia
Page semi-protected

This is a list of One-Day International cricket records, that record team and individual performances in One Day International (ODI) cricket. Like the Test cricket and its records, ODI matches generate vast numbers of statistics which have been logged since the first ODI matches began in 1971. The Cricket World Cup is the most major of many ODI tournaments held between the 16 teams currently given full ODI status by the International Cricket Council.

Numerous batting, bowling and fielding records exist. Sachin Tendulkar currently holds the record of most ODI runs and the highest number of centuries, while Michael Bevan, the Australian cricketer, holds the best batting average of any retired player.

Contents

[hide]

Listing criteria

In general the last five are listed in each category (except when there is a tie for the first place among the five, when all the tied record holders are noted).

Listing notation

Team Notation

  • (300–3) indicates that a team scored 300 runs for three wickets and the innings was closed, either due to a successful run chase or if no overs remained (or are able) to be bowled.
  • (300) indicates that a team scored 300 runs and was all out, either by losing all ten wickets or by having one or more batsmen unable to bat and losing the remaining wickets.

Batting Notation

  • (100*) indicates that a batsman scored 100 runs and was not out.
  • (175) indicates that a batsman scored 175 runs and was out after that.

Bowling Notation

  • (5–100) indicates that a bowler has captured 5 wickets while giving away 100 runs.

Currently playing

  • Record holders who are currently playing ODIs (i.e. their record details listed could change) are shown in bold.

Team records

Team scoring records

Highest innings totals

Rank Score Teams Venue Season
1 443–9 (50 overs)  Sri Lanka v  Netherlands Amstelveen 2006
2 438–9 (49.5 overs)  South Africa v  Australia (match report) Johannesburg 2005–06
3 434–4 (50 overs)  Australia v  South Africa (match report) Johannesburg 2005–06
4 418–5 (50 overs)  South Africa v  Zimbabwe Potchefstroom 2006–07
5 414–7 (50 overs)  India v  Sri Lanka Rajkot 2009–10
Source: Cricinfo.com. Last updated 27 November 2011.

Highest match aggregate

Rank Score Teams Venue Season
1 872–13 (99.5 overs)  Australia (434–4) v  South Africa (438–9) (match report) Johannesburg 2005–06
2 825–15 (100 overs)  India (414–7) v  Sri Lanka (411–8) Rajkot 2009–10
3 726–14 (95.5 overs)  India (392–4) v  New Zealand (334) Christchurch 2008–09
4 697–14 (99.4 overs)  Australia (350–4) v  India (347) Hyderabad 2009–10
5 696–14 (99.3 overs)  Australia (346–5) v  New Zealand (350–9) Hamilton 2006–07
Source: Cricinfo.com. Last updated 18 January 2011.

Largest successful run chases

Rank Score Teams Venue Season
1 438–9 (49.5 overs)  South Africa v  Australia (match report) Johannesburg 2005–06
2 350–9 (49.3 overs)  New Zealand v  Australia Hamilton 2006–07
3 340–5 (48.4 overs)  New Zealand v  Australia Auckland 2006–07
4 334–8 (49.2 overs)  Australia v  England Sydney 2010–11
5 332–8 (49 overs)  New Zealand v  Australia Christchurch 2005–06
6 329–9 (49.5 overs)  Zimbabwe v  New Zealand Bulawayo 2011–12
Source: Cricinfo.com. Last updated 23 December 2009.

Lowest innings totals

Rank Score Teams Venue Season
1 35 (18 overs)  Zimbabwe v  Sri Lanka Harare 2004
2 36 (18.4 overs)  Canada v  Sri Lanka Paarl 2003
3 38 (15.5 overs)  Zimbabwe v  Sri Lanka Colombo 2001
4 43 (19.5 overs)  Pakistan v  West Indies Cape Town 1993
5 44 (24.5 overs)  Zimbabwe v  Bangladesh Chittagong 2009
Source: [1]. Last updated 16 September 2011.

Individual records

Individual records (batting)

Highest career runs

Rank Runs Innings Player Period
1 18,111 442 India Sachin Tendulkar 1989–2011
2 13,686 360 Australia Ricky Ponting 1995–2011
3 13,430 433 Sri Lanka Sanath Jayasuriya 1989-2011
4 11,739 350 Pakistan Inzamam ul Haq 1991–2007
5 11,372 303 South Africa Jacques Kallis 1996–2011
Source: Cricinfo.com. Last updated 27 November 2011

Highest individual scores

Rank Runs Player Match Venue Season
1 200* India Sachin Tendulkar  India v  South Africa Gwalior 2009–2010
2 194* Zimbabwe Charles Coventry  Zimbabwe v  Bangladesh Bulawayo 2009
3 194 Pakistan Saeed Anwar  Pakistan v  India Chennai 1997
4 189* West Indies Cricket Board Sir Viv Richards  West Indies v  England Manchester 1984
5 189 Sri Lanka Sanath Jayasuriya  Sri Lanka v  India Sharjah 2000
Source: Cricinfo.com. Last updated 12 September 2011

Highest career average

Rank Average Runs Player Period
1 55.17 2538 South Africa Hashim Amla 2008–2011
2 53.58 6912 Australia Michael Bevan 1994–2004
3 51.37 1798 England Jonathan Trott 2009–2011
4 51.17 4862 Australia Michael Hussey 2004–2011
5 51.15 6497 India Mahendra Singh Dhoni 2004–2011
Qualification: 40 innings.Source: Cricinfo.com. Last updated: 27 November 2011.

Best strike rates

Rank Strike Rate Runs Player Period
1 117.06 590 Bermuda Lionel Cann 2006–2009
2 114.95 707 Canada Rizwan Cheema 2008–2011
3 114.01 6818 Pakistan Shahid Afridi 1996–2011
4 113.60 810 India Yusuf Pathan 2008–2011
5 106.28 626 Zimbabwe Andy Blignaut 1999–2010
Qualification:500 Balls facedSource: Cricinfo.com. Last updated: 27 November 2011.

Most centuries

Rank Centuries Innings Player Period
1 48 442 India Sachin Tendulkar 1989–2011
2 30 360 Australia Ricky Ponting 1995–2011
3 28 433 Sri Lanka Sanath Jayasuriya 1989–2011
4 22 300 India Sourav Ganguly 1992–2007
5 21 240 South Africa Herschelle Gibbs 1996–2010
Source: Cricinfo.com. Last updated: 27 November 2011.

Fastest fifty

Rank Balls faced Player Match Venue Season
1 17 Sri Lanka Sanath Jayasuriya  Pakistan v  Sri Lanka Singapore 1996
2 18 Australia Simon O’Donnell  Australia v  Sri Lanka Sharjah 1990
3 18 Pakistan Shahid Afridi  Pakistan v  Sri Lanka Nairobi 1996
4 18 Pakistan Shahid Afridi  Pakistan v  Netherlands Colombo 2002
5 19 South Africa Mark Boucher  South Africa v  Kenya Cape Town 2001
Source: ESPNcricinfo.com. Last updated 18 October 2011.

Fastest century

Rank Balls faced Player Match Venue Season
1 37 Pakistan Shahid Afridi  Pakistan v  Sri Lanka Nairobi Gymkhana Club 1996
2 44 South Africa Mark Boucher  South Africa v  Zimbabwe Senwes Park 2006
3 45 West Indies Cricket Board Brian Lara  West Indies v  Bangladesh Dhaka 2006
4 45 Pakistan Shahid Afridi  Pakistan v  India Kanpur 2005
5 48 Sri Lanka Sanath Jayasuriya  Sri Lanka v  Pakistan Singapore 1996
Source: [2]. Last updated 1 September 2010

Most sixes in career

Rank Sixes Player Innings
1 293 Pakistan Shahid Afridi 307
2 270 Sri Lanka Sanath Jayasuriya 433
3 193 India Sachin Tendulkar 442
4 190 India Sourav Ganguly 300
5 169 West Indies Cricket Board Chris Gayle 223
Source: [3]. Last updated 27 November 2011

Most fours in career

Rank fours Player Match
1 1981 India Sachin Tendulkar 453
2 1500 Sri Lanka Sanath Jayasuriya 445

Individual records (bowling)

Most wickets

Rank Wickets Matches Player Period
1 531 350 Sri Lanka Muttiah Muralitharan 1993–2011
2 502 356 Pakistan Wasim Akram 1984–2003
3 416 262 Pakistan Waqar Younis 1989–2003
4 400 322 Sri Lanka Chaminda Vaas 1994–2008
5 393 303 South Africa Shaun Pollock 1996–2008
Source: Cricinfo.com. Last updated 28 May 2011

Best innings figures

Rank Bowling Figures Player Match Venue Season
1 8–3–19–8 Sri Lanka Chaminda Vaas  Sri Lanka v  Zimbabwe Colombo 2001
2 7–4–15–7 Australia Glenn McGrath  Australia v  Namibia Potchefstroom 2003
3 10–0–20–7 Australia Andy Bichel  Australia v  England Port Elizabeth 2003
4 10–1–30–7 Sri Lanka Muttiah Muralitharan  Sri Lanka v  India Sharjah 2000
5 10–0–36–7 Pakistan Waqar Younis  Pakistan v  England Leeds 2001
Source: Cricinfo.com. Last updated 31 January 2011.

Individual records (other)

Most matches played

Rank Matches Player Period
1 453 India Sachin Tendulkar 1989–2011
2 445 Sri Lanka Sanath Jayasuriya 1989–2011
3 378 Pakistan Inzamam-ul-Haq 1991–2007
4 367 Australia Ricky Ponting 1995–2011
5 356 Pakistan Wasim Akram 1984–2003
Source: Cricinfo.com. Last updated: 22 August 2011.

Partnership records

Highest partnerships

Rank Runs Players Opposition Venue Season
1 331 (2nd wicket) India Sachin Tendulkar & India Rahul Dravid v  New Zealand Hyderabad 2002–03
2 318 (2nd wicket) India Saurav Ganguly & India Rahul Dravid v  Sri Lanka Taunton 1999
3 286 (1st wicket) Sri Lanka Sanath Jayasuriya & Sri Lanka Upul Tharanga v  England Headingley 2006
4 283 (1st wicket) Sri Lanka Upul Tharanga & Sri Lanka Tillakaratne Dilshan v  Zimbabwe Pallekele 2010-11
5 275* (4th wicket) India Mohammad Azharuddin & India Ajay Jadeja v  Zimbabwe Cuttack 1997-98
“Source: Cricinfo.com“. Last updated: 16 Oct 2011.

Highest partnerships by wickets

Wicket Runs Players Opposition Venue Season
1 286 Sri Lanka WU Tharanga & Sri Lanka ST Jayasuriya v  England England 2006
2 331 India Sachin Tendulkar & India Rahul Dravid v  New Zealand Hyderabad 1999
3 237* India Rahul Dravid & India Sachin Tendulkar v  Kenya Bristol 1999
4 275* India Mohammad Azharuddin & India Ajay Jadeja v  Zimbabwe Cuttack 1998
5 223 India Mohammad Azharuddin & India Ajay Jadeja v  Sri Lanka Colombo 1997
6 218 Sri Lanka Mahela Jayawardene & India Mahendra Singh Dhoni v Africa XI Chennai 2007
7 130 Zimbabwe Andy Flower & Zimbabwe Heath Streak v  England Harare 2001
8 138* South Africa Justin Kemp & South Africa Andrew Hall v  India Cape Town 2006
9 132 Sri Lanka Angelo Mathews & Sri Lanka Lasith Malinga v  Australia Melbourne 2010
10 106* West Indies Cricket Board Viv Richards & West Indies Cricket Board Michael Holding v  England Manchester 1984
“Source: Cricinfo.com“. Last updated: 27 November 2011.

WSUS Troubleshooting Survival Guide

Standard

WSUS Troubleshooting Survival Guide

We encourage you to enhance this guide by identifying missing areas (scenarios, features, lifecycle…), provide links to and write descriptions of existing content, and providing new content where there are gaps. Join the community!

Introduction

While troubleshooting a particular technology, there are some key steps that should be done before start reviewing data and performing troubleshooting itself. We can summarize the troubleshooting process in the following core phases:

  1. Understanding the problem.
  2. Collecting data.
  3. Analyzing data.
  4. Performing an action towards the resolution of the problem.
  5. Re-evaluate and see if the action plan succeeded.
  6. If it did, document the actions that were done in order to fix the problem.
  7. If it didn’t, re-evaluate the initial action plan and the initial findings, look for gaps and areas that can be explored further. Elaborate another data gathering plan and move back to step 2.

While troubleshooting a technology such as Windows Server Update Services (WSUS) you also need to identify where the issue is located (client or server) in order to correctly perform data gathering. Sometimes data gathering phase must be done in both locations (client and server) at the same time in order to better understand what’s happening. It is also important to mention that during phase 1 (understanding the problem) it is highly recommended that you have a clear understanding of the topology where WSUS is located. Drawing the topology will help you to identify potential points of failure and will assist you asking follow up questions. For example: is WSUS behind a firewall? Is the firewall allowing anonymous access from WSUS to the Internet? These are following up questions that can assist you while scoping the issue and understanding the problem. Make sure to document all those details, this way you can go back and review your notes while analyzing the data to double check the scenario and the details of it.

The goal of this document is to give you a troubleshooting framework for WSUS and at the same have a single location for you to add new troubleshooting scenarios and techniques for WSUS. As stated in the initial paragraph of this document, we strongly encourage you to enhance this article.

WSUS Components

In order to have a better experience troubleshooting WSUS it is recommended that you have a brief understanding of the WSUS components. Client and Server components can be found in the articles below:

Another core foundation while troubleshooting WSUS is the understanding of the Windows Update Agent result codes and setup return codes. The articles below cover these areas:

WSUS Installation and Synchronization Issues

Even before having WSUS ready to deploy updates a common scenario that can happen is not be able to install WSUS or you are able to install but unable to perform synchronization. This section describes some of the common WSUS installation/synchronization issues:

Server Administration Issues

While administering a WSUS Server there are many scenarios that can happen and will require further troubleshooting. Here are some important resources in this area:

There are also scenarios where the troubleshooting will be done on the server and client side, for example when WSUS Agents are not reporting to the Server. Here are some important resources on this area:

Another scenario where troubleshooting is done on both sides is when the issue is related with Background Intelligent Transfer Service (BITS). Here are some important resources related to BITS:

Client Administration Issues

If it was identified during the scoping phase that the issue is related to the client, there are some troubleshooting techniques that can be done to make sure client is working properly. The main resources for this area are listed below:

Tools

There are many tools that can be used while troubleshooting WSUS, here are some examples:

Related Articles

Here are some related articles from Microsoft and also other sources such as but not limited to partners, MVPs and IT PROs:

This article was originally written by:

Yuri Diogenes , Senior Technical Writer
Windows Server iX | IT Pro Security
Microsoft Corporation

 

http://social.technet.microsoft.com/wiki/contents/articles/wsus-troubleshooting-survival-guide.aspx

Move your print spools to another disk

Standard

Since spooling can take up a bit of I/O, moving this to a disk other than on your system disk can help speed things up a bit. This also helped me a few years ago when I had a 12 GB system partition (remember when vendors shipped drives like that) and needed to free up some space.

1. Open the Printers and Faxes applet.
2. Click on File and Server Properties.
3. Click the Advanced tab.
4. Change the directory of the Spool Folder to the other drive.
5. Click apply.
6. Restart the Print Spooler. Open a command line and run net stop spooler && net start spooler.

Internet Explorer Control Panel Restrictions

Standard

These tweaks allow you to control access to the Internet
Explorer setup and control panel functions (found under Tools -> Internet
Options).          

Open your registry and find the key below.

Create a new DWORD value based on the options below, and set
the new value to equal "1" to enable the restriction or "0"
to disable the restriction.

Advanced – Prevent changes to advanced settings

Autoconfig – Prevent changes to Automatic Configuration

Cache – Prevent changes to temporary file settings

CalendarContact – Prevent changes to calender and contacts

Certificates – Prevent changes to security certificates

Check_If_Default – Prevent changes to default browser check

Colors – Prevent Color changes

Connection Settings – Prevent changes to connection settings

Connection Wizard – Disable the Connection Wizard

Fonts – Disable font changes

History – Disable changes to History settings

HomePage – Disable changes to Home Page settings

Languages – Disable Language changes

Links – Disable Links changes

Messaging – Disable Messaging changes

Profiles – Disable changes to Profiles

Proxy – Disable changes to Proxy settings

Ratings – Disable Ratings changes

Wallet – Disable changes to Wallet settings

Accessibility – disables all options under Accessibility

GeneralTab – removes General tab

SecurityTab – removes Security tab

ContentTab – removes Content tab

ConnectionsTab – removes Connections tab

ProgramsTab – removes Programs tab

PrivacyTab – removes Privacy tab

AdvancedTab – removes Advanced tab

CertifPers – prevents changing Personal Certificate options

CertifSite – prevents changing Site Certificate options

CertifPub – prevents changing Publisher Certificate options

SecChangeSettings – prevents changing Security Levels for
the Internet Zone

SecAddSites – prevents adding Sites to any zone

Privacy Settings – prevents changs to privacy settings

FormSuggest – disables AutoComplete for forms

FormSuggest Passwords – prevents Prompt me to save password
from being displayed

Connwiz Admin Lock – disables the Internet Connection Wizard

Settings – prevents any changes to Temporary Internet Files

ResetWebSettings – disables the Reset web Setting button

 

Registry Settings

User Key:
[HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\

Control Panel]

System Key:
[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Internet Explorer\

Control Panel]

Data Type: REG_DWORD (DWORD Value)

Value Data: (0 = disable restriction, 1 = enable
restriction)

Networking

Standard
What is the ANDing process?


In order to determine whether a destination host is local or remote, a computer will perform a simple mathematical computation referred to as an AND operation. While the sending host does this operation internally, understanding what takes place is the key to understanding how an IP-based system knows whether to send packets directly to a host or to a router. 
what is ANDing process Anding is a process in which we AND "IP address" with "subnet mask" to get Network ID.

Useful Run – Commands

Standard

To
Access….                           Run
Command

Accessibility Controls                 access.cpl  

Accessibility Wizard                   accwiz  

Add Hardware Wizard               hdwwiz.cpl 

Add/Remove Programs             appwiz.cpl 

Administrative Tools control      admintools 

Bluetooth Transfer Wizard         fsquirt

Calculator                                 calc

Certificate Manager                   certmgr.msc

Check Disk Utility                      chkdsk

Clipboard Viewer                      clipbrd

Command Prompt                     cmd

Component Services                 dcomcnfg

Computer Management             compmgmt.msc

Control Panel                            control  

Date and Time Properties          timedate.cpl 

Device Manager                        devmgmt.msc

Disk Cleanup Utility                   cleanmgr

Disk Defragment                       dfrg.msc

Disk Management                     diskmgmt.msc

Display Properties                     control desktop 

Display Properties                     desk.cpl

Display Properties                     control
color 

(W/Appearance Tab Preselected)

Event Viewer                            eventvwr.msc

Files and Settings Transfer Tool migwiz  

Findfast                                    findfast.cpl

Folders Properties                     control folders

Fonts                                        control
fonts 

Fonts Folder                              fonts

Group Policy Editor (XP Prof)     gpedit.msc

Help and Support                      helpctr  

HyperTerminal                          hypertrm  

Iexpress Wizard                        iexpress

Internet Explorer                      iexplore  

Internet Properties                   inetcpl.cpl 

Internet Setup Wizard               inetwiz  

IP Configuration                        ipconfig
/all

(Display Connection Configuration)   

IP Configuration                        ipconfig
/displaydns

(Display DNS Cache Contents) 

IP Configuration                        ipconfig
/flushdns

(Delete DNS Cache Contents)  

IP Configuration                        ipconfig
/release

(Release All Connections) 

IP Configuration                        ipconfig /renew

(Renew All Connections)

Keyboard Properties                 control keyboard 

Local Security Settings              secpol.msc

Local Users and Groups             lusrmgr.msc

Microsoft Excel (if installed)       excel  

Microsoft Frontpage (if installed) frontpg  

Microsoft Paint                          mspaint  

Microsoft Powerpoint (if installed)      powerpnt  

Microsoft Word (if installed)               winword  

Mouse Properties                      control mouse 

Mouse Properties                      main.cpl

Netmeeting                              conf  

Network Connections        control      netconnections 

Network Connections                        ncpa.cpl 

Network Setup Wizard              netsetup.cpl

Notepad                                   notepad

On Screen Keyboard                 osk

Outlook Express                        msimn  

Paint                                         pbrush  

Password Properties                  password.cpl

Performance Monitor                 perfmon.msc

Performance Monitor                 perfmon

Phone and Modem Options        telephon.cpl 

Power Configuration                  powercfg.cpl 

Printers and Faxes                    control printers 

Printers Folder                          printers

Regional Settings                      intl.cpl 

Registry Editor                          regedit

Registry Editor                          regedit32

Remote Desktop                       mstsc

Scheduled Tasks                       control schedtasks 

Services                                   services.msc

Shared Folders                          fsmgmt.msc

Shuts Down Windows                shutdown

Sounds and Audio                     mmsys.cpl 

System Configuration Editor      sysedit

System Configuration Utility      msconfig

System Information                  msinfo32  

System Properties                    sysdm.cpl 

Task Manager                           taskmgr

Telnet Client                             telnet

User Account Management        nusrmgr.cpl

Utility Manager                         utilman

Windows Backup Utility             ntbackup  

(if installed)  

Windows Explorer                     explorer  

Windows Firewall                      firewall.cpl

Windows Version (to show which version of windows)        winver  

Wordpad                                   write

Remove Saved Passwords in windows xp

Standard

1. Click Start and select Run

2. In the Open field type "rundll32.exe keymgr.dll, KRShowKeyMgr"

3. Once the Stored Usernames and Passwords interface opens you can select any of the entries and select Properties to view the existing information

4. To remove a saved password you can select one of the entries and select Remove. A confirmation screen will appear. Click on OK and the account will be removed

5. You can add additional saved passwords as well by clicking on the Add button and entering the appropriate information

6. Repeat the steps above as needed to add, remove or edit saved passwords

7. When you are done using the interface click the Close button

Create “Show Desktop icon” in XP

Standard

We need to create shortcut to recreate it :

  • Click Start->Run
  • In the "open" box, type "notepad" (without the quotes)
  • Click OK
  • Copy the following lines in your new notepad window :

[Shell]
Command=2
IconFile=explorer.exe,3
[Taskbar]
Command=ToggleDesktop

  • Click "File" in the notepad menu and select "Save As"
  • Save the file to your desktop as Show Desktop.scf
  • Drag the new icon from your desktop to your Quick Launch toobar and select "Move here"

If we can’t move the new Desktop icon to your Quick Launch toolbar for whatever reason, we can also try the following technique :

  • Right-click the new show desktop icon on your desktop and select copy
  • Open Windows Explorer and navigate to 
    C:\Documents and Settings\<Username>\Application Data\Microsoft\Internet Explorer\Quick Launch (replacing <username> with the username for which you want to restore the show desktop icon)
  • In the right pane of the explorer window, right-click an empty spot and select "paste"

Maybe we don’t see the Application Data folder in our Explorer. To see it, we must enable visibility for hidden folders :

  • In Windows Explorer, click the menu "Tools" and select "Folder Options…"
  • Click the "View" tab
  • Under "Advanced Settings", select "Show hidden files and folders"
  • Click ok

How email works (MTA, MDA, MUA)

Standard
Email, as simple as it is to use, relies on a more complicated set of operating procedures than that of the Web. For most users, its operation is transparent, which means that it is not necessary to understand how email works in order to be able to use it.

However, the short introduction below has been provided to help users understand its basic principles, give them an idea of how to best configure their email clients and inform them about the underlying mechanisms of spam.

How email works

Email is based around the use of electronic mailboxes. When an email is sent, the message is routed from server to server, all the way to the recipient’s email server. More precisely, the message is sent to the mail server tasked with transporting emails (called the MTA, for Mail Transport Agent) to the recipient’s MTA. On the Internet, MTAs communicate with one another using the protocol SMTP, and so are logically called SMTP servers (or sometimes outgoing mail servers).

The recipient’s MTA then delivers the email to the incoming mail server (called the MDA, for Mail Delivery Agent), which stores the email as it waits for the user to accept it. There are two main protocols used for retrieving email on an MDA:

  • POP3 (Post Office Protocol), the older of the two, which is used for retrieving email and, in certain cases, leaving a copy of it on the server.
  • IMAP (Internet Message Access Protocol), which is used for coordinating the status of emails (read, deleted, moved) across multiple email clients. With IMAP, a copy of every message is saved on the server, so that this synchronisation task can be completed.

For this reason, incoming mail servers are called POP servers or IMAP servers, depending on which protocol is used.

To use a real-world analogy, MTAs act as the post office (the sorting area and mail carrier, which handle message transportation), while MDAs act as mailboxes, which store messages (as much as their volume will allow) until the recipients check the box. This means that it is not necessary for recipients to be connected in order for them to be sent email.

To keep everyone from checking other users’ emails, MDA is protected by a user name called a login and by a password.

Retrieving mail is done using a software program called an MUA (Mail User Agent).

When the MUA is a program installed on the user’s system, it is called an email client (such as Mozilla Thunderbird, Microsoft Outlook, Eudora Mail, Incredimail or Lotus Notes).

When it is a web interface used for interacting with the incoming mail server, it is called webmail.