check-in at remote destination (how to)

Hi guys,.

I need to check in to a remote location.
I understand that the base here

< i > < /i > http://download.oracle.com/docs/cd/B19306_01/server.102/b14231/archredo.htm#sthref1029

I do haave to do with the use of a service name.

But what I did not / do not have any service/database oracle on the remote server.
I just want this place to be an additional backup for my archive logs location.

T1) how can I achieve with the LOG_ARCHIVE_DUPLEX_DEST parameter?

Q2) in the event of any scenario, arch and cannot write to the location of destinataion (e.g., complete hard drive) how many times it retries? If the attempts may be unlimited? I don't want to lose all logs archived.


Rgds,
Noob

I do haave to do with the use of a service name.

And that service re-present another name database.

But what I did not / do not have any service/database oracle on the remote server.
I just want this place to be an additional backup for my archive logs location.

You can use OS commands to do this (not reliable), but if want to do so you need a database in waiting on the other side:

http://download.Oracle.com/docs/CD/B28359_01/server.111/b28294/cascade_appx.htm

Q2) in the event of any scenario, arch and cannot write to the location of destinataion (e.g., complete hard drive) how many times it retries? If the attempts may be unlimited? I don't want to lose all logs archived.

http://download.Oracle.com/docs/CD/B10501_01/server.920/a96521/archredo.htm#4396

REOPEN=n sets the minimum number of seconds before ARCn should try to reopen a failed destination. The default value for n is 300 seconds. A value of 0 is the same as turning off the REOPEN option. In other words, ARCn will not attempt to archive after a failure. If you do not specify the REOPEN keyword, ARCn will never reopen a destination following an error.

You cannot use REOPEN to specify a limit on the number of attempts to reconnect and transfer archived logs. The REOPEN attempt either succeeds or fails, in which case the REOPEN information is reset.

If you specify REOPEN for an OPTIONAL destination, Oracle can overwrite online logs if there is an error. If you specify REOPEN for a MANDATORY destination, Oracle stalls the production database when it cannot successfully archive.

Kind regards
S.K.

Tags: Database

Similar Questions

  • someone was able to access my laptop remotely today, how would I know if they let any virus or spyware on it.

    someone was able to access my laptop remotely today, how would I know if they let any virus or spyware on it. I have norton 360 virus protection that has not detected any viruses. IM worried about using my computer to stuff order online where they can steal my credit card details / number while im using it

    Hello

    How do you know that someone will access your computer from outside? Allow access and do you
    you know who it was?

    Here is some information that should help you:

    Was it a SCAM phone call that initiated the connection distance:

    Avoid scams to phone for tech support
    http://www.Microsoft.com/security/online-privacy/avoid-phone-scams.aspx

    Its a total scam. Uninstall their software and then perform a system restore before you install.
    Change all your sensitive passwords at all sites - e-mail, Bank, credit cards and others. (Do not
    on the computer compromise and it would be better to do it on the phone or in person.)

    You can even restore your system to factory fresh to make sure their software violates not
    your security. (Ways to re - install Windows Clean - removing everything on the backup drive so all the data
    before hand.)

    It is also possible that they consulted Bank, passwords and information of credit card on your computer. If
    in order to check for malicious software as shown below. Change your passwords. Contact the Bank and credit
    phone card companies. Do the same for any investment or other sensitive professionals or personal
    accounts that may have been violated.

    ====================================================================
    ====================================================================

    In the United States, you can contact the FBI, Attorney general, the police authorities and consumer
    Watch groups. Arm yourself with knowledge.

    No, Microsoft wouldn't you not solicited. Or they would know if errors exist on your
    computer. So that's the fraud or scams to get your money or worse to steal your identity.

    Do not fall for the fake phone Tech Support
    http://blogs.msdn.com/b/securitytipstalk/archive/2010/03/09/Don-t-fall-for-phony-phone-tech-support.aspx

    Avoid scams that use the Microsoft name fraudulently - Microsoft is not unsolicited
    phone calls to help you fix your computer
    http://www.Microsoft.com/protect/fraud/phishing/msName.aspx

    Scams and hoaxes
    http://support.Microsoft.com/contactus/cu_sc_virsec_master?ws=support#tab3

    Microsoft Support Center consumer
    https://consumersecuritysupport.Microsoft.com/default.aspx?altbrand=true&SD=GN&ln=en-us&St=1&wfxredirect=1&gssnb=1

    Microsoft technical support
    http://support.Microsoft.com/contactus/?ws=support#TAB0

    Microsoft - contact technical support
    http://Windows.Microsoft.com/en-us/Windows/help/contact-support

    ===========================================================
    ===========================================================

    Follow these steps carefully:

    If you need search malware here's my recommendations - they will allow you to
    scrutiny and the withdrawal without ending up with a load of spyware programs running
    resident who can cause as many questions as the malware and may be more difficult to detect as the
    cause.

    No one program cannot be used to detect and remove any malware. Added that often easy
    to detect malicious software often comes with a much harder to detect and remove the payload. Then
    its best to be thorough than paying the high price later now too. Check with them to one
    extreme overkill point and then run the cleaning only when you are sure that the system is clean.

    It can be made repeatedly in Mode safe - F8 tap that you start, however, you must also run
    the regular windows when you can.

    TDSSKiller.exe. - Download the desktop - so go ahead and right-click on it - RUN AS ADMIN
    It will display all the infections in the report after you run - if it will not run changed the name of
    TDSSKiller.exe to tdsskiller.com. If she finds something or not does not mean that you should not
    check with the other methods below.
    http://support.Kaspersky.com/viruses/solutions?QID=208280684

    Download malwarebytes and scan with it, run MRT and add Prevx to be sure that he is gone.
    (If Rootkits run UnHackMe)

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Malwarebytes - free
    http://www.Malwarebytes.org/products/malwarebytes_free

    SuperAntiSpyware Portable Scanner - free
    http://www.SUPERAntiSpyware.com/portablescanner.HTML?tag=SAS_HOMEPAGE

    Run the malware removal tool from Microsoft

    Start - type in the search box-> find MRT top - right on - click RUN AS ADMIN.

    You should get this tool and its updates via Windows updates - if necessary, you can
    Download it here.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN
    (Then run MRT as shown above.)

    Microsoft Malicious - 32-bit removal tool
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=AD724AE0-E72D-4F54-9AB3-75B8EB148356&displaylang=en

    Microsoft Malicious removal tool - 64 bit
    http://www.Microsoft.com/downloads/details.aspx?FamilyId=585D2BDE-367F-495e-94E7-6349F4EFFC74&displaylang=en

    also install Prevx to be sure that it is all gone.

    Download - SAVE - go to where you put it-right on - click RUN AS ADMIN

    Prevx - Home - free - small, fast, exceptional CLOUD protection, working with others
    security programs. It is a single scanner, VERY EFFICIENT, if it finds something to come back
    here or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    Choice of PCmag editor - Prevx-
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Try the demo version of Hitman Pro:

    Hitman Pro is a second scanner reviews, designed to save your computer from malicious software
    (viruses, Trojans, rootkits, etc.). who infected your computer despite safe
    what you have done (such as antivirus, firewall, etc.).
    http://www.SurfRight.nl/en/hitmanpro

    --------------------------------------------------------

    If necessary here are some free online scanners to help the

    http://www.eset.com/onlinescan/

    -----------------------------------

    Original version is now replaced by the Microsoft Safety Scanner
    http://OneCare.live.com/site/en-us/default.htm

    Microsoft safety scanner
    http://www.Microsoft.com/security/scanner/en-us/default.aspx

    ----------------------------------

    http://www.Kaspersky.com/virusscanner

    Other tests free online
    http://www.Google.com/search?hl=en&source=HP&q=antivirus+free+online+scan&AQ=f&OQ=&AQI=G1

    --------------------------------------------------------

    After the removal of malicious programs:

    Also follow these steps for the General corruption of cleaning and repair/replace damaged/missing
    system files.

    Start - type this in the search box-> find COMMAND at the top and RIGHT CLICK – RUN AS ADMIN

    Enter this at the command prompt - sfc/scannow

    How to fix the system files of Windows 7 with the System File Checker
    http://www.SevenForums.com/tutorials/1538-SFC-SCANNOW-Command-System-File-Checker.html

    How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.exe) program
    generates in Windows Vista cbs.log
    http://support.Microsoft.com/kb/928228

    Also run CheckDisk, so we cannot exclude as much as possible of the corruption.

    How to run check disk in Windows 7
    http://www.SevenForums.com/tutorials/433-disk-check.html

    -----------------------------------------------------------------------

    If we find Rootkits use this thread and other suggestions. (Run UnHackMe)

    http://social.answers.Microsoft.com/forums/en-us/InternetExplorer/thread/a8f665f0-C793-441A-a5b9-54b7e1e7a5a4/

    ======================================

    If necessary AFTER THAT you are sure that the machine is clean of any malware.

    How to do a repair of trouble Windows 7 installation (it's for Windows 7 and there are similar procedures
    for Vista if necessary.)
    http://www.SevenForums.com/tutorials/3413-repair-install.html

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

  • Ccmuser and remote Destinations

    Hi all

    I'm trying to get a unique ring to work with cell phones.  Currently, if the remote Destination profile and the remote Destination are implemented CCMadmin, after the display disabled button is activated all works well.  However, I allow users the ability to create and associate the remote destinations themselves so that they can maintain the Scheduler portion and relieve some administrative overhead.  Currently user is able to pick up their remote Destination, but faced a 404 not updated when you try to view.  User can also create a new RD, but the association of the lines for the DN by default not checked, if an admin-related r & d works as expected.  Done test user part of the Standard MAC UserGroup so a group of roles that allow read access to all CCMUser options and upgrade to the remote Destination.  All the parameters of the company for CCMUser are set to true.  All the ideas that built-in role or roles options must be granted?

    The system version: 7.0.1.11001 - 8

    Darryl,

    Why not having them to use the Web page of ccmuser for them to choose their RDP from a defined list. There are a few publishing that users are able to perform from the ccmuser page, and you wouldn't have to worry about give them permissions for pages Web CCMAdmin.

  • My ex is connected to my iCloud email secretly and do not think I know so now I can't link my email with my iPhone journal inside iCloud to check my mail or anything, how can I solve this

    My ex is connected to my iCloud email secretly and do not think I know so now I can't link my email with my iPhone journal inside iCloud to check my mail or anything how do I fix this someone please help lol

    Caitlyn,

    In the interest of privacy, I would recommend that you create a new password for your iCloud account.

    https://appleid.Apple.com/

  • HP link Setup requires an account on the remote computer, how do you do that?

    HP link Setup requires an account on the remote computer, how do you do that? Someone please help! Thank you.

    I understand that you need to know how to set up a user name and password on the remote PC to HP LinkUP.

    This document explains how to use the program.  Looking at the screenshots included, looks like it's just using the user account that is within Windows on the system.  If the local account on the Windows (remote system) system user does not have a password, then HP Link UP may not work for security reasons.  Some remote access programs (even on a LAN) have access problems with empty passwords on the remote system.

    This document has a video on the program if you want to examine.

    Let me know what happens.

  • I used him copy / paste to add several checkboxes on my form, but now in preview mode when I check the first box it automatically checks all the boxes.  How can I stop this from happening?

    I used him copy / paste to add several checkboxes on my form, but now in preview mode when I check the first box it automatically checks all the boxes.  How can I stop this from happening?

    For later use, it happened because your fields have the same field name, and fields with the same name automatically have the same value.

    So all you had to do was so each had a unique name and it would have worked, but using the command create several fields is preferable because it renames the fields for rename you them.

  • Newbie question: in what configuration file &lt; flex: access remote destination &gt; tags go?

    I seem to have read the document integration spring/Blaze about 10 times, but I don't know where to put all my < flex: access remote-Ref destination = "yaddayaddaService" / > tags.  I don't want annotation allows you to set these remote destinations.

    Should it go in the spring configuration file that I use for the servlet of AMF endpoint (as specified by the contextConfigLocation parameter).  Or they go to a high-level cross-servlet configuration file?

    What is the usual way to deal with these?

    Hello

    The convention is to declare:

    1 declare the Spring beans (for example yaddayaddaService) in the files specified by the parameter contextConfigLocation.

    2. Add the Spring - Flex specific configuration (configure message agent, declare destinations) in WEB-INF\flex- servlet.xml, assuming that you have configured the model of Message Broker URL as follows in the web.xml file:

       
            Flex
            org.springframework.web.servlet.DispatcherServlet
            1
       

       
            Flex
            messagebroker / *.
       

    The repository SVN BlazeDS/distribution contains the spring sample webapp (spring - samples.war) that you can watch as well.

    Hope that helps.

    Rohit

  • Connection to remote JMS and remote destination

    Hi all

    I have two different domain weblogic server instances.
    I want to get the JMS connection factory and remote remote destination queue.
    I try something like below. but when I create createQueueSession I get connection not found exception.

    Properties: = new Properties ();
    h.put (Context.INITIAL_CONTEXT_FACTORY, "WebLogic.JNDI.WLInitialContextFactory");
    h.put(context.PROVIDER_URL,"T3://127.0.0.1:7001");
    h.put (Context.SECURITY_PRINCIPAL, "weblogic");
    h.put (Context.SECURITY_CREDENTIALS, "weblogic1");

    Context ctx = new InitialContext (h);
    queue = ctx.lookup ("JmsQueue") (line);
    Factory factory =.
    CTX.lookup ("JmsConnectionFactory") (Factory);
    connection = factory.createQueueConnection ();
    session = connection.createQueueSession (QueueSession.AUTO_ACKNOWLEDGE, true);


    weblogic.jms.common.JMSException: connection not found
    at weblogic.jms.dispatcher.DispatcherAdapter.convertToJMSExceptionAndThrow(DispatcherAdapter.java:110)
    at weblogic.jms.dispatcher.DispatcherAdapter.dispatchSync(DispatcherAdapter.java:45)
    at weblogic.jms.client.JMSConnection.setupJMSSession(JMSConnection.java:520)
    at weblogic.jms.client.JMSConnection.createSessionInternal(JMSConnection.java:488)
    at weblogic.jms.client.JMSConnection.createQueueSession(JMSConnection.java:453)
    at weblogic.jms.client.WLConnectionImpl.createQueueSession(WLConnectionImpl.java:787)
    to the web. MessageSenderManagedBean.sendMessage (MessageSenderManagedBean.java:60)
    at sun.reflect.NativeMethodAccessorImpl.invoke0 (Native Method)
    at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
    at java.lang.reflect.Method.invoke(Method.java:597)
    at com.sun.el.parser.AstValue.invoke(AstValue.java:157)
    at com.sun.el.MethodExpressionImpl.invoke(MethodExpressionImpl.java:283)
    at org.apache.myfaces.trinidad.component.MethodExpressionMethodBinding.invoke (MethodExpressionMethodBinding.java
    (: 46).
    at com.sun.faces.application.ActionListenerImpl.processAction(ActionListenerImpl.java:102)
    at org.apache.myfaces.trinidad.component.UIXCommand.broadcast(UIXCommand.java:190)
    at javax.faces.component.UIViewRoot.broadcastEvents(UIViewRoot.java:475)
    at javax.faces.component.UIViewRoot.processApplication(UIViewRoot.java:756)
    at oracle.adfinternal.view.faces.lifecycle.LifecycleImpl._invokeApplication(LifecycleImpl.java:698)
    at oracle.adfinternal.view.faces.lifecycle.LifecycleImpl._executePhase(LifecycleImpl.java:285)
    at oracle.adfinternal.view.faces.lifecycle.LifecycleImpl.execute(LifecycleImpl.java:177)
    at javax.faces.webapp.FacesServlet.service(FacesServlet.java:265)
    to weblogic.servlet.internal.StubSecurityHelper$ ServletServiceAction.run (StubSecurityHelper.java:227)
    at weblogic.servlet.internal.StubSecurityHelper.invokeServlet(StubSecurityHelper.java:125)
    at weblogic.servlet.internal.ServletStubImpl.execute(ServletStubImpl.java:292)
    at weblogic.servlet.internal.TailFilter.doFilter(TailFilter.java:26)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    at oracle.adf.share.http.ServletADFFilter.doFilter(ServletADFFilter.java:62)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    at oracle.adfinternal.view.faces.webapp.rich.RegistrationFilter.doFilter(RegistrationFilter.java:97)
    to org.apache.myfaces.trinidadinternal.webapp.TrinidadFilterImpl$ FilterListChain.doFilter (TrinidadFilterImpl.jav
    a: 420)
    at oracle.adfinternal.view.faces.activedata.AdsFilter.doFilter(AdsFilter.java:60)
    to org.apache.myfaces.trinidadinternal.webapp.TrinidadFilterImpl$ FilterListChain.doFilter (TrinidadFilterImpl.jav
    a: 420)
    at org.apache.myfaces.trinidadinternal.webapp.TrinidadFilterImpl._doFilterImpl(TrinidadFilterImpl.java:247)
    at org.apache.myfaces.trinidadinternal.webapp.TrinidadFilterImpl.doFilter(TrinidadFilterImpl.java:157)
    at org.apache.myfaces.trinidad.webapp.TrinidadFilter.doFilter(TrinidadFilter.java:92)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    at oracle.dms.wls.DMSServletFilter.doFilter(DMSServletFilter.java:326)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    at weblogic.servlet.internal.RequestEventsFilter.doFilter(RequestEventsFilter.java:27)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    to weblogic.servlet.internal.WebAppServletContext$ ServletInvocationAction.run (WebAppServletContext.java:3592)
    at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)
    at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:121)
    at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:2202)
    at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:2108)
    at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1432)
    at weblogic.work.ExecuteThread.execute(ExecuteThread.java:201)
    at weblogic.work.ExecuteThread.run(ExecuteThread.java:173)
    Caused by: weblogic.jms.common.JMSException: connection not found
    at weblogic.jms.dispatcher.Request.handleThrowable(Request.java:89)
    at weblogic.jms.dispatcher.Request.getResult(Request.java:52)
    at weblogic.messaging.dispatcher.Request.wrappedFiniteStateMachine(Request.java:1124)
    at weblogic.messaging.dispatcher.DispatcherImpl.syncRequest(DispatcherImpl.java:184)
    at weblogic.messaging.dispatcher.DispatcherImpl.dispatchSync(DispatcherImpl.java:219)
    at weblogic.jms.dispatcher.DispatcherAdapter.dispatchSync(DispatcherAdapter.java:43)
    ... more than 47
    Caused by: java.lang.Exception: connection not found
    at weblogic.messaging.dispatcher.InvocableManager.invocableFind(InvocableManager.java:107)
    to weblogic.jms.dispatcher.InvocableManagerDelegate$ MyInvocableManager.invocableFind (InvocableManagerDelegate.ja
    will: 298)
    at weblogic.messaging.dispatcher.Request.wrappedFiniteStateMachine(Request.java:943)
    ... more than 50

    With respect,
    WP

    You must always make sure that your WebLogic servers focus on two areas; say that a WebLogic Server in the local domain cannot have the same name as a WebLogic Server in the remote domain.

  • How to check if the remote VPN failover is configured

    Hello world

    We have two sites and have both remote access VPN configured.

    IF a VPN site fails users automatically fail over to another site.

    Need to know what that orders can I run on ASA to check if remote VPN failover is there?

    Also what lines by running config shhould I seek?

    Thank you

    Mahesh

    Based on your configuration, it can vary, below link has someVPN failover configurations, you can find a few commands to check redundancy on your network:

    http://www.Cisco.com/en/us/docs/iOS/12_2/12_2y/12_2yx11/feature/guide/ft_vpnha.html#wp1093554

    What you should look at your config running is also based on your configuration, it should be something like: main, standby or emergency.

    HTH

  • Check memory on remote PC

    How can I find out how much memory is installed on a remote PC running Windows 7?  I used to be able to do this in Windows XP Pro as follows: right click on 'my computer' and select 'manage '. Right-click "computer management" and select "connect to another computer."  Enter the name of the computer. Now right-click to new "computer management" and select "Properties".  In seconds, you can see the amount of memory, as well as the CPU and other info.  If I try the same thing in Windows 7, I can't find "Properties" when I right click on "computer management".  Thank you.

    Maybe check the logs of the systems involved.

    Otherwise, it seems that you can adapt the script here to get this detail...

  • I do not want to install the remote features, how can I bypass section and you will have just to my email account?

    When I try to connect it to my hotmail account, I get only a notification to download an app that will allow me to use remote devices. I do not have and want to only access my mail from hotmail. How do the part of connection for e-mail?

    If your pop up notification receiver, block pop-up

  • Have 2 pc share a modem on the cable network. DON'T want NO pc is to see each other remotely. How we prevent that

    Also how to detect if pc1 'spy remotely on pc2.

    Moved to Windows Networking forum area.

    -steve

  • Now, the screen moves as the surface is larger than the actual size of the screen. I checked its display options, but how do I disable this screen oversized?

    Hello

    My mother was a member of the family to try to help inrease size but Bobo and now its screen in any program or simply from bottom of screen size is larger than the size of the screen.  She can move the mouse to the left to bring the extreme left veiw and then the same thing right but never have all the screen in veiw now.  How to restore to normal for her.  I tried control - display, but not... help her please help me

    Hi M Carmel,

    Thanks for posting in the Microsoft community.

    I understand that you are facing the issue with the resolution of the screen display.

    I suggest you to see the links and check.

    Change the resolution of your monitor

    http://Windows.Microsoft.com/en-us/Windows-XP/help/Setup/change-monitor-resolution

    Change your screen resolution

    http://Windows.Microsoft.com/en-us/Windows-XP/help/change-screen-resolution

    Please follow these recommended steps, review the additional information provided and after back if you still experience the issue. I will be happy to provide you with additional options available that you can use to get this resolved.

  • my router stop working. quick check it's plug. How can I fix it

    I LOST MY ROUTER AND CAN'T MAKE IT WORK HOW CAN I CHECK IT.

    Routers don't require all the Windows drivers.  They usually use internal DHCP services to assign a standard TCP/IP network address private (ie: 192.168.xxx.xxx.)  Then, the router would 'translate' the private IP address to the IP address of the service Internet "attribute" to the router and then you can browse the Internet.

    Usually, you should be able to access internal web pages of the router from most web browsers.  Generally, the "default gateway" Windows PC would be the IP to access these pages (ex: http://192.168.1.1.)

  • the Encrypt contents to secure data check box is not available, how to fix?

    When you encrypt a folder, if you open the properties of the folder, and then clickAdvanced, check the Encrypt contents to secure data box is not available (it appears grayed out).

    Hi Panvis,

    If you want to encrypt a file or folder by using EFS (ENCRYPTING File System), but the Advanced button is not displayed on the Properties dialog box or the encrypt the contents of the box secure data is grayed out, it could be for one of the following reasons

    You don't have an edition of Windows that supports the EFS. You can use EFS to encrypt files on Windows vista edition full, professional and Enterprise editions.

    The drive that you want to encrypt files on is not formatted using the NTFS file system. EFS only works on computers that use the NTFS file system. If the file you want to encrypt is on a drive that uses the FAT or FAT32 file system, you must convert the drive to NTFS to display the Advanced button.

    For more information, see:convert a hard disk or partition to NTFS.

    This option is not available in Windows Vista Starter, family basic and Windows editions Home Premium, for more information see the link below: http://windows.microsoft.com/en-US/windows-vista/Troubleshoot-encrypted-files-and-folders

    I hope this helps. Let us know the results.

    Thank you and best regards,

     

    Srinivas R

    Microsoft technical support.

    Visit our Microsoft answers feedback Forum and let us know what you think.

Maybe you are looking for