Showing posts with label SM's. Show all posts
Showing posts with label SM's. Show all posts

Sunday, 3 July 2011

How to Repair a Suspected Database

Sometimes when you connect to your database server, you may find it in suspect mode. Your database server won’t allow you to perform any operation on that database until the database is repaired.

A database can go in suspect mode for many reasons like improper shutdown of the database server, corruption of the database files etc.

To get the exact reason of a database going into suspect mode can be found using the following query

DBCC CHECKDB (‘YourDBname’) WITH NO_INFOMSGS, ALL_ERRORMSGS

Output of the above query will give the errors in the database.

To repair the database, run the following queries in Query Analyzer,

EXEC sp_resetstatus ‘yourDBname’;
ALTER DATABASE yourDBname SET EMERGENCY
DBCC checkdb(‘yourDBname’)
ALTER DATABASE yourDBname SET SINGLE_USER WITH ROLLBACK IMMEDIATE
DBCC CheckDB (‘yourDBname’, REPAIR_ALLOW_DATA_LOSS)
ALTER DATABASE yourDBname SET MULTI_USER


     You should keep one thing in mind while using the above queries that the repair mode used here , REPAIR_ALLOW_DATA_LOSS, is a one way operation i.e. once the database is repaired all the actions performed by these queries can’t be undone. There is no way to go back to the previous state of the database. So as a precautionary step you should take backup of your database before executing above mentioned queries.

Saturday, 2 July 2011

Discussion about System Adminstrators

Gist of settlement & Charter of Demands regarding System Administrator


Demand No. 6
Immediate finalization of Cadre Restructuring proposals including Postal Accounts as assured by the Secretary Department of Posts and its implementation.
  • Cadre review proposals including the system Administrators will be finalized before 31.08.2011. Committee will be reconstituted with DDG (P) as chairman. For Postal Accounts problems separate meeting was held and the minutes will be issued separately. First sitting up of the Postal Accounts cadre restructuring committee will be held on 05.07.2011.
Demand No. 10
10. Drop the proposed move of ending the services of existing System Administrators by outsourcing the technology work to the outsider agencies. Create the System Administrators Posts as assured with specified norms and other works and make the cadre as a promotional cadre to PA/SA.
  • This will be considered in the cadre review committee. Formal Proposal will be made before 31.08.2011. Regarding conveyance allowance, order have been issued.

Wednesday, 29 June 2011

How to Setup Wireless Internet Setup

Modern communication relies heavily on Wireless Networking and it is therefore gaining popularity for Home and Business Networking. Wireless Networking offers the advantage of mobility and eliminates the use of cables. Computers at home or in a small office can easily be connected through Wireless Networking.

Setting up a secured network through a Netgear or any Router will keep your data free from spying and avert entry of any uninvited user into your network. You will have to follow certain guidelines to set up a Secured Wireless Network that will be provided either through Wireless Protected Array (WPA) or Wireless Encryption Protocol (WEP).

GUIDELINES
Connect to Modem
Power off your modem.
Connect one end of the Ethernet Cable to the ‘input’, marked at the backside of the router and other end to the modem.

Power Modem back on.
Generally it is a good rule to wait at least a minute before continuing to the next step.
Connect to Computer
·                       Connect one end of a second Ethernet Cable to one of the available ports on the Router. Most modern Routers include four ports.
Power your Router
·                       Plug your Router to a power source and wait till until your Router’s LED signals that it is connected to the internet. Generally Routers have a green LED indicator that turns solid when connected.
Install Software and Drivers
·                       If your Router included a disk to install Drivers, insert disk and continue following the disks instructions to install Drivers and set up your Network.
·                       If your Router does not include a disk continue to next steps.

Configure your Network
·                       Take note of the Router’s IP address that is selected automatically (default) and mentioned in the user’s guide. Most Routers by default use, http://192.168.1.1 as the default IP address
·                       Open your default web browser and type in the router’s address in the provided empty search field.
·                       Insert a valid Username and Password. If you have not set one up and it requires one, the default for most brands of Routers is, Username: Admin, Password: Password.
·                       You can also get to your Routers (Homepage) by going to Start Menu\Control Panel\Network and Sharing Center. Click the center icon at top, which usually has the house as an icon if you saved your Network as a Home Network. On the next page under Network Infrastructure you should see your Router listed. Just Right-Click your Router Icon and you should have a menu option to view Homepage.
Basic settings
·                       Choose your Basic Settings such as Router Name, and IP Addressing
·                       Locate Wireless Security or Wireless Settings. Choose a name(SSID) for your Network that you can easily identify and whether you wish to broadcast your Wireless Signal.
·                       Select channel to broadcast on, by default a Router usually has this set to Auto which is fine for most users.
·                       Select Wireless Mode. This is your speed for your wireless. Example: 54Mbps, 145Mbps and 300Mbps.
For your Wireless Security settings, most modern Routers include the following types of security:
·                       None – No security. Not recommended if you are in an area where someone who lives next door to you could use your Wireless Connection to connect to the Internet.
·                       WEP – Older security encryption used for Wireless Networks with better options now available. This option does not give a password but a unique key that users enter to connect.
·                       WPA-PSK[TKIP] – Better security than WEP and sometimes users still use this if they have issues with devices connecting. Still a great Security Option. There is a 54Mbps limit on this connection using Legacy G.
·                       WPA2-PSK[AES] – Newer security using N support and if you have no issues with devices connecting this is the recommended Security Option as it gives you the best security.
·                       WPA-PSK[TKIP]+WPA2-PSK[AES] – If you have issues with devices connecting you can use this setting as it gives you a combination of WPA and WPA2.
Another thing to note outside of setting up your Router is setting up Sharing for Computers and Devices connected to your Network. Windows 7 has come along way in making this easier for users and most users can do this by following the walk-through in Windows.

Tuesday, 28 June 2011

DB Analyzer dated 27.06.2011

Recent additions in DBAnalyzer
1. Agreement - Sanchay Post & V2SBCO data
2. Miscellaneous - Balance Verification List for RD accounts
3. Database Discrepancies - PPF - HUF Accounts (3 reports)
4. Reports - Signatures exceeding 150 kb
5. Reports - List of Live RD Accounts allotted to Closed Agents
6. Separate LoT for NREGS / IGNOAPS / IGNWPS / IGNDPS / BPL for HO & SOs

Download Document                               Download DB Analyzer
 

Sunday, 26 June 2011

UIDAI_AADHAAR KYR+ ( Installation Guide )


 



Install this latest Accounts MIS Client to upload KYR+ files
received from Enrolment Agents.


For using the KYR Plus please follow the following steps :


1.) Download the files from folder UIDAI KYR Plus for DOP and Pre-requisites.
2.) Pre-requisites contains 32 bit and 64 bit Microsoft Access Database Engine. If your System don't have Microsoft Office install it.
3.) Use Setup_KYR_Plus_v1500.exe for installation.


Click Here To Download Latest Installation & Guides.

IDrive: Get FREE 12 GB Space for Online Data Backup

I recently switched my Online Data Backup service to IDrive and I must say that it has really impressed me alot. The service is very fast and offers a decent desktop client and an explorer plugin for quick file/folders backup.
You can easily configure scheduled backups, manage bandwidth use, perform fast restores and backup data on mapped drives.


IDrive Standout Features:
* Keeps deleted files for 30 days
* Can backup file changes as often as every 10 minutes (real time backup)
* Saves up to 30 versions of a file (file versions)
* Can manage multiple accounts through a single account
* Has a bandwidth throttle for controlling bandwidth usage (auto-controlled upload/download speed)
This service is extremely easy to use and provides backup scheduling by the day, week, time and month. It provides continuous backup and can be configured to backup changes in files as often as every 10 minutes. IDrive can also backup mapped drives such as from external drives that are connected to your computer. You can even restore from a specific time frame and not just from the most recent backup.
IDrive offers a pretty decent pricing structure for their Personal Use and Pro for Business packages. IDrive also provides a 2GB account for free. You can store up to 2 GB of data in the free account and try out all the features of IDrive but you can avail an extra 10 GB of space absolutely FREE just by referring your email contacts.


To get the additional free space:
1. Sign in to IDrive.com go to upgrade account.
2. Click Refer IDrive to your friends.
3. Give any of your email address and password to IDrive (which is absolutely secure). Make sure you have more than 5 contacts in your contact list of that email address.
4. You’ll immediately get the additional 10 GB of free space. For the confirmation you’ll receive an email.
Enjoy your huge FREE 12 GB (2+10GB) of online backup account!
Get your free backup space now on IDrive.com

Thursday, 23 June 2011

Force Delete, Remove File Which Is Access Denied On Windows


Any file Remover is a small, simple and yet powerful application which can solve your issue by forcefully removing such files which has been locked by the windows and are not being used by you. It comes up with a simple and user-friendly interface with only a single button which is used to simply delete the files selected by the user. In order to delete a file, you just have to give path by specifying that particular file which you want to be deleted permanently from your system. After selecting that file, you may simply click on Remove option that allows you to delete the file from your system permanently.

The only limitation in this tool that you may observe is that it doesn’t provide you an option into file context menu. So, in order to delete the file you can’t simply use the options available on the right click, rather each time for deleting the file you have to manually run this tool. One more thing that should be noted for this tool is that it doesn’t move the file to Recycle Bin after you delete it, rather it deletes the file completely from your system. So, you have to be careful enough before deleting that file as you can’t restore that file again once you have deleted it using Any File Remover.

Sunday, 19 June 2011

USB Disk Security 6 for Windows

 

Award-winning protection to secure your PC against threats from USB drive.

To download and install USB Disk Security please follow these instructions.

1. Download USB Disk Security 6 from the links below:

Download Link 



2. Save the installer

When the File Download dialog box appears click the "Save" button and download it onto your computer.

3. Run the installer

Please run the installer and follow the Setup Wizard to complete the installation.

Saturday, 18 June 2011

How to Disable the Shutdown Event Tracker in Server 2003 / 2008?

A nice feature that can sometimes by annoying is the Shutdown Event Tracker, that allows you to comment every time you shut off a server. While I do understand the auditing requirements to have this in place on production server, this feature is unnecessary for development and test servers and can be disabled.

To disable Shutdown Event Tracker we need to open the Group Policy Editor, the Group Policy Editor can be opened from pressing "START > RUN > GPEDIT.MSC " then press ENTER


From the navigation menu on the left side navigate to "Computer Configuration > Administrative Templates > System", then on the right side double click "Display Shutdown Event Tracker"

Change the option from "Not Configured" to "Disabled" > Press "Apply" then press "OK




Note you can also use this to enable Shutdown Event Tracker in Vista although I have no idea why someone would want to do that.
A restart is not required for this change to take effect.

MS Office Key Remover 1.0.0.4

Office Key Remover 1.0.0.4

Office Key Remover is a small tool which removes Microsoft Office's license information on your machine! This way you're able to change the license key of Microsoft Office.
This application may require administrator rights!

Screenshots:
Office Key Remover:




Instructions to change your Office product key

  1. Run Office Key Remover
  2. Choose which version's license data you want to be removed
  3. Start one of the Office products
  4. Enter another product key once you're asked (see screenshots above)

Requirements: 
· NET Framework 3.5 (or higher versions)


Changelog

Version 1.0.0.4:
  • Updated installer (can uninstall now)
  • Updated administrator rights check to avoid problems
  • Several smaller improvements
  • False installer AV detection was fixed
  • Installer can uninstall the application now   

Download