Search Chirayu Software Solutions Blog

Wednesday, May 28, 2014

Allow Scheduled Task to run also if user is not logged in.

To give the built-in Administrators group the right to log on as a batch job

  1. On the Destination Server, click Start, click All Programs, and then click Administrative Tools.
  2. In the Administrative Tools menu, select Group Policy Management.
  3. In the Group Policy Management Console tree, click Forest: <ServerName>, and then click Domains.
  4. Click the name of your server, expand Domain Controllers, right-click Default Domain Controllers Policy, and then click Edit.
  5. In the Group Policy Management Editor, click Default Domain Controllers Policy<ServerName>Policy, expand Computer Configuration, and then click Policies.
  6. In the Policies tree, expand Windows Setting, and then click Security Settings.
  7. In the Security Settings tree, expand Local Policies, and then click User Rights Assignment.
  8. In the results pane, scroll to Log on as Batch Job, and then click Log on as a batch job.
  9. In the Log on as a batch job Properties dialog box, click Add User or Group.
  10. In the Add User or Group dialog box, click Browse.
  11. In the Select Users, Computers, or Groups dialog box, type Administrators.
  12. Click Check Names to verify that the built-in Administrators group appears, and then click OK three times.

Tuesday, May 27, 2014

The 'Microsoft.Jet.OLEDB.4.0' provider is not registered on the local machine, Windwos 7

jet.Oledb.4.0 doesnt work for 64Bit machine.

You can use Microsoft.ACE.OLEDB.12.0 for 64 bit system. You can check is it 32 bit or 64 bit system. If 32 bit then use .JET.OLEDB else use ACE.OLEDB.

You can check following link for downloading AccessDatabaseEngine

http://www.microsoft.com/download/en/details.aspx?id=13255

Friday, May 23, 2014

Set Security for folders in Windows XP

If you cannot find the security tab in properties of folder try following to get the security tab :

1) Open 'My Computer'
2) Click tools - > folder options - View Tab , scroll to the last option
3) "enable simple file sharing" , uncheck it and apply and ok.

Now you will have a security tab , WINXP home , you might need to log into
administrator account in safe mode to do this.

Thursday, May 22, 2014

Disable autorun.inf so it cannot install virus

Apply the following settings to disable autorun.inf file.

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\IniFileMapping\Autorun.inf]
@="@SYS:DoesNotExist"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoAutorun"=dword:00000001

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoAutorun"=-

Disable USB Mass Storage Device in PC

Use the following registry hack to stop USB Mass Storage Device drivers from starting when the system boots up.

Run Registry Editor (regedit).
Navigate to the following registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor

In the right pane, double click on the Start value name.
Change the value data to 4 to disable the removable USB mass storage device drive access.
Disable USB Mass Storage Device Drive Access

To revert and re-enable the drive access for removable USB mass storage device driver, change back the value data for Start to its original default of 3.
The change will take effect immediately to block any USB mass storage device such as USB flash drive, USB key and portable harddisk from been used in the system, while still allowing hardware components to work properly via USB connection. The hack works in most Windows operating system such as Windows Vista, XP, Windows Server 2008, 2003 and 2000.


Wednesday, May 21, 2014

Set Registry Permissions using regini DOS Command

Save Text File with following contents :

\Registry\Machine\Software\ODIN [1 5 8 11 14 17 21]

Save it as "regacl.txt"

On DOS Prompt enter

REGINI REGACL.TXT

This command will change the permissions of the registry location mentioned in the text file.

Windows 7 not starting, only Logo is coming

When Windows your PC gets stuck at the windows LOGO it means some device and driver problem is there.

If you think it is due to some internet virus then you can go to safe mode and remove the Network Adapter from device manager.

Then restart the PC it will start working.


Tuesday, May 20, 2014

Setting Security Permissions To Folders using DOS Prompt

As of Vista, cacls is deprecated. Here's the first couple of help lines:
C:>cacls
NOTE: Cacls is now deprecated, please use Icacls.
Displays or modifies access control lists (ACLs) of files
You should use icacls instead. This is how you grant John full control over D:\test folder and all its subfolders:
C:>icacls "D:\test" /grant John:(OI)(CI)F
According do MS documentation:
  • F= Full Control
  • CI= Container Inherit - This flag indicates that subordinate containers will inherit this ACE.
  • OI= Object Inherit - This flag indicates that subordinate files will inherit the ACE.

Monday, May 19, 2014

Multicast Group Concept

Multicast Group Concept

Multicast is based on the concept of a group. A multicast group is an arbitrary group of receivers that expresses an interest in receiving a particular data stream. This group has no physical or geographical boundaries—the hosts can be located anywhere on the Internet or any private internetwork. Hosts that are interested in receiving data flowing to a particular group must join the group using IGMP (IGMP is discussed in the "Internet Group Management Protocol (IGMP)" section later in this document). Hosts must be a member of the group to receive the data stream.

IP Multicast Addresses

IP multicast addresses specify a "set" of IP hosts that have joined a group and are interested in receiving multicast traffic designated for that particular group. IPv4 multicast address conventions are described in the following sections.

IP Class D Addresses

The Internet Assigned Numbers Authority (IANA) controls the assignment of IP multicast addresses. IANA has assigned the IPv4 Class D address space to be used for IP multicast. Therefore, all IP multicast group addresses fall in the range from 224.0.0.0 through 239.255.255.255.

Note The Class D address range is used only for the group address or destination address of IP multicast traffic. The source address for multicast datagrams is always the unicast source address.

Table 1 gives a summary of the multicast address ranges discussed in this document.
Table 1 Multicast Address Range Assignments
Description
Range
Reserved Link Local Addresses
224.0.0.0/24
Globally Scoped Addresses
224.0.1.0 to 238.255.255.255
Source Specific Multicast
232.0.0.0/8
GLOP Addresses
233.0.0.0/8
Limited Scope Addresses
239.0.0.0/8

Globally Scoped Addresses

Addresses in the range from 224.0.1.0 through 238.255.255.255 are called globally scoped addresses. These addresses are used to multicast data between organizations and across the Internet.
Some of these addresses have been reserved for use by multicast applications through IANA. For example, IP address 224.0.1.1 has been reserved for Network Time Protocol (NTP).
IP addresses reserved for IP multicast are defined in RFC 1112, Host Extensions for IP Multicasting. More information about reserved IP multicast addresses can be found at the following location:
http://www.iana.org/assignments/multicast-addresses.

Note You can find all RFCs and Internet Engineering Task Force (IETF) drafts on the IETF website (http://www.ietf.org).

Source Specific Multicast Addresses

Addresses in the 232.0.0.0/8 range are reserved for Source Specific Multicast (SSM). SSM is an extension of the PIM protocol that allows for an efficient data delivery mechanism in one-to-many communications. SSM is described in the "Source Specific Multicast (SSM)" section later in this document.

GLOP Addresses

RFC 2770, GLOP Addressing in 233/8, proposes that the 233.0.0.0/8 address range be reserved for statically defined addresses by organizations that already have an AS number reserved. This practice is called GLOP addressing. The AS number of the domain is embedded into the second and third octets of the 233.0.0.0/8 address range. For example, the AS 62010 is written in hexadecimal format as F23A. Separating the two octets F2 and 3A results in 242 and 58 in decimal format. These values result in a subnet of 233.242.58.0/24 that would be globally reserved for AS 62010 to use.

Limited Scope Addresses

Addresses in the 239.0.0.0/8 range are called limited scope addresses or administratively scoped addresses. These addresses are described in RFC 2365, Administratively Scoped IP Multicast, to be constrained to a local group or organization. Companies, universities, or other organizations can use limited scope addresses to have local multicast applications that will not be forwarded outside their domain. Routers typically are configured with filters to prevent multicast traffic in this address range from flowing outside of an autonomous system (AS) or any user-defined domain. Within an autonomous system or domain, the limited scope address range can be further subdivided so that local multicast boundaries can be defined. This subdivision is called address scoping and allows for address reuse between these smaller domains.


Tuesday, May 6, 2014

Internal Server Error

Web.config is corrupt.

Delete existing web.config and get new web.config from backup