Do you need more examples of Configuration?
We want to know! Tell us what areas of technology need several configuration examples.
What do you mean exactly?
Tags: Cisco Support
Similar Questions
-
Hi, I have 3 movies by (860 + 950 MB + 1, 750 MB) I try to 4.7 Gb Cd in again that it alerts you need more than 7 GB of space! Please help me how I can do? Thank you
The files must be legal DVD or still to retranscode them. If so, it will use "automatic" (in which case it should adapt), or settings you have applied.
Look at assets in the project Panel and columns for the status of transcoding DVDs and transcoding DVD setting. What did he say? Or better, post a screenshot.
try to make 4.7 Gb Cd
I assume you mean DVD.
-
Why you need more of an MP3 player
I'm so happy to have 2 players! I refreshed just the contents of my "rocket"... and fill the only external memory took almost an hour and a half (maybe due to the qualification of class 2 card?) not to mention to decide what to put on it and what to stop at once and the internal memory. But because I also have a Clip, I was amused at all this time. I didn't play all the music on the computer because I didn't want to slow it down at all. So to all of you who say, "you do not need to have more than one!" (as I was told when I shared that I had a Clip too) I say, "Bollocks!"
Dalaug234 wrote:
It's a good reason. Or when you're music to transfer on your rocket or the Clip, you can use it. Or if an indictment will output (if any).
Basically, that's what I wanted to say... be able to listen to one when loading the other or the other load is a great option
-
I got this error:
"CoreTelephony Trace file error
A file for CoreTelephony tracing operation failed, you might run out of disk space. Details "error opening the file/tmp/ct.shutdown, err = operation not permitted"I tried to solve it by searching for CoreTelephony errors. Could not resolve yet.
Software does not, especially of photoshop...Any ideas?
Same thing here, iMac with OS X 10.11.6. All started a couple days ago. Have not found any valid solution online yet, I tried rebooting in recovery mode and check disk, but it seems that everything is ok with the drives and permissions.
-
Need more performance on my Satellite A200 - 23K
Hello everyone.
I would like to ask for help, please, because I'm confused. I bought my computer toshiba laptop about 2 years ago. At the time I thought it was a pretty good laptop for games because I wanted a laptop. Now my problem is that I'm confused. Confused performance. I can't play on low etc. My framerate is quite large. I used windows vista. Then after 3 formats, I decided to go back to xp pro. There was a significant change, but still I couldn't go any lower. I would ask a help, is possible to upgrade my laptop for a better? As the purchase of new equipment, or it's useless.My characteristics of the model then:
CPU: Intel Core 2 Duo T5450 at 1.66 GHZ
Graphics card: Ati Radeon Mobility 2600
BIOS version: 5.60
RAM: 2G
OS: Windows Xp Pro Service Pack 3
Card mother ID SROSA001.86C.0034.D.0805152046
Bus Type Intel GTL +My computer shows my motherboard as?. These last 2 things are the only information I have. I really need help. My questions are.
(1) can I put my computer hardware?
(2) where I can download decent drivers because the drivers of toshiba support are so old. Example ati radeon driver.
(3) how can I boost my computer's performance?So if anyone can help me, I really appreciate it. If you need more information about my hardware please ask. I could really use some help because im so confused. I even downloaded ati tray tools and support toshiba ati driver and I don't even know which use.
Hello
> 1) can I upgrade my hardware?
No, you can't do it. Only you can improve memory and the hard drive. But not the Cpu or gpu. You can read here the article support Tosh:
http://forums.computers.Toshiba-Europe.com/forums/Ann.jspa?annID=13
(> 2) where I can download decent drivers, because support for toshiba drivers are so old. Example ati radeon driver.
You can visit radeon ati to get drivers and try to install.(> 3) how can I push the performance of my computer?
You can add more memory, I guess that your model supports up to 4 GB of memory
-
Hello!
I had a glance but quite impossible to find the answers I was hoping to find. I understand a fair bit about how works RAID and indeed when I ordered my computer, I ordered a RAID 1 configuration, but it arrived as a RAID 0 Configuration. In time, I left and wish later, I do not have, but at the time, I was in the middle of a heavy calendar of study...
I have a computer processor i7 3 GHz with 8 GB 1333 MHz DDR3 RAM. It's a few years old but has a bit of life left in it, so I would reconfigure if possible. At present, it is implemented with DISK 0 have 3 partitions - a 118MB OEM partition, a partition RECOVERY from NTFS of 10,88 GB and a 1.8 to NTFS OS (c :)) Partition main, then 1 drive has a main 63 GB NTFS partition.) It runs on W7.
Of course, if I just start to change the sizes of disc autour, I lost the operating system and all and may end up with a metal box not able to do anything. so, where can I start and in what order I progress, please to reach a situation of RAID 1? I have a complete set of diskettes to install W7 and want to update to 10 by Thursday. I understand that I have to format the drives to break the current RAID configuration and get the good detection of both discs and am fully backed up, but I need to know in what order I am progressing.
Any help would be welcome. Looking forward to some responses!
Burybellringer.
Hello
According to the description you want to change the configuration of RAID 0 to RAID 1 on the system.
Certainly, I understand your concern.
To get more information about it, we have a dedicated forum where these issues are dealt with and would be better suited to the TechNet community.
Please visit the link below to find a community that will provide the best support.
https://social.technet.Microsoft.com/forums/Windows/en-us/home?category=w7itpro
I hope this information is useful.
Please let us know if you need more help, we will be happy to help you.
Thank you.
-
Need urgent help in the configuration of the Client VPN IPSec Site with crossed on Cisco ASA5510 - 8.2 (1).
Here is the presentation:
There are two leased lines for Internet access - a route 1.1.1.1 and 2.2.2.2, the latter being the default Standard, old East for backup.
I was able to configure the Client VPN IPSec Site
(1) with access to the outside so that the internal network (172.16.0.0/24) behind the asa
(2) with Split tunnel with simultaneous assess internal LAN and Internet on the outside.
But I was not able to make the tradiotional model Hairpinng to work in this scenario.
I followed every possible suggestions made on this subject in many topics of Discussion but still no luck. Can someone help me here please?
Here is the race-Conf with Normal Client to Site IPSec VPN configured with no access boarding:
LIMITATION: Cannot boot into any other image ios for unavoidable reasons, must use 8.2 (1)
race-conf - Site VPN Customer normal work without internet access/split tunnel
:
ASA Version 8.2 (1)
!
ciscoasa hostname
domain cisco.campus.com
enable the encrypted password xxxxxxxxxxxxxx
XXXXXXXXXXXXXX encrypted passwd
names of
!
interface GigabitEthernet0/0
nameif outside internet1
security-level 0
IP 1.1.1.1 255.255.255.240
!
interface GigabitEthernet0/1
nameif outside internet2
security-level 0
IP address 2.2.2.2 255.255.255.224
!
interface GigabitEthernet0/2
nameif dmz interface
security-level 0
IP 10.0.1.1 255.255.255.0
!
interface GigabitEthernet0/3
nameif campus-lan
security-level 0
IP 172.16.0.1 255.255.0.0
!
interface Management0/0
nameif CSC-MGMT
security-level 100
the IP 10.0.0.4 address 255.255.255.0
!
boot system Disk0: / asa821 - k8.bin
boot system Disk0: / asa843 - k8.bin
passive FTP mode
DNS server-group DefaultDNS
domain cisco.campus.com
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
object-group network cmps-lan
the object-group CSC - ip network
object-group network www-Interior
object-group network www-outside
object-group service tcp-80
object-group service udp-53
object-group service https
object-group service pop3
object-group service smtp
object-group service tcp80
object-group service http-s
object-group service pop3-110
object-group service smtp25
object-group service udp53
object-group service ssh
object-group service tcp-port
port udp-object-group service
object-group service ftp
object-group service ftp - data
object-group network csc1-ip
object-group service all-tcp-udp
access list INTERNET1-IN extended permit ip host 1.2.2.2 2.2.2.3
access-list extended SCC-OUT permit ip host 10.0.0.5 everything
list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq www
list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any https eq
list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq ssh
list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 no matter what eq ftp
list of access CAMPUS-LAN extended permitted udp 172.16.0.0 255.255.0.0 no matter what eq field
list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq smtp
list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq pop3
access CAMPUS-wide LAN ip allowed list a whole
access-list CSC - acl note scan web and mail traffic
access-list CSC - acl extended permit tcp any any eq smtp
access-list CSC - acl extended permit tcp any any eq pop3
access-list CSC - acl note scan web and mail traffic
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq 993
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq imap4
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq 465
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq www
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq https
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq smtp
access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq pop3
access-list extended INTERNET2-IN permit ip any host 1.1.1.2
access-list sheep extended ip 172.16.0.0 allow 255.255.0.0 172.16.0.0 255.255.0.0
access list DNS-inspect extended permit tcp any any eq field
access list DNS-inspect extended permit udp any any eq field
access-list extended capin permit ip host 172.16.1.234 all
access-list extended capin permit ip host 172.16.1.52 all
access-list extended capin permit ip any host 172.16.1.52
Capin list extended access permit ip host 172.16.0.82 172.16.0.61
Capin list extended access permit ip host 172.16.0.61 172.16.0.82
access-list extended capout permit ip host 2.2.2.2 everything
access-list extended capout permit ip any host 2.2.2.2
Access campus-lan_nat0_outbound extended ip 172.16.0.0 list allow 255.255.0.0 192.168.150.0 255.255.255.0
pager lines 24
Enable logging
debug logging in buffered memory
asdm of logging of information
Internet1-outside of MTU 1500
Internet2-outside of MTU 1500
interface-dmz MTU 1500
Campus-lan of MTU 1500
MTU 1500 CSC-MGMT
IP local pool 192.168.150.2 - 192.168.150.250 mask 255.255.255.0 vpnpool1
IP check path reverse interface internet2-outside
IP check path reverse interface interface-dmz
IP check path opposite campus-lan interface
IP check path reverse interface CSC-MGMT
no failover
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 621.bin
don't allow no asdm history
ARP timeout 14400
interface of global (internet1-outside) 1
interface of global (internet2-outside) 1
NAT (campus-lan) 0-campus-lan_nat0_outbound access list
NAT (campus-lan) 1 0.0.0.0 0.0.0.0
NAT (CSC-MGMT) 1 10.0.0.5 255.255.255.255
static (CSC-MGMT, internet2-outside) 2.2.2.3 10.0.0.5 netmask 255.255.255.255
Access-group INTERNET2-IN interface internet1-outside
group-access INTERNET1-IN interface internet2-outside
group-access CAMPUS-LAN in campus-lan interface
CSC-OUT access-group in SCC-MGMT interface
Internet2-outside route 0.0.0.0 0.0.0.0 2.2.2.5 1
Route internet1-outside 0.0.0.0 0.0.0.0 1.1.1.5 2
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
the ssh LOCAL console AAA authentication
AAA authentication enable LOCAL console
Enable http server
http 10.0.0.2 255.255.255.255 CSC-MGMT
http 10.0.0.8 255.255.255.255 CSC-MGMT
HTTP 1.2.2.2 255.255.255.255 internet2-outside
HTTP 1.2.2.2 255.255.255.255 internet1-outside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs set group5
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
Crypto map internet2-outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
crypto internet2-outside_map outside internet2 network interface card
Crypto ca trustpoint _SmartCallHome_ServerCA
Configure CRL
Crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca xyzxyzxyzyxzxyzxyzxyzxxyzyxzyxzy
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as
a67a897as a67a897as a67a897as a67a897as a67a897as
quit smoking
ISAKMP crypto enable internet2-outside
crypto ISAKMP policy 10
preshared authentication
aes encryption
md5 hash
Group 2
life 86400
Telnet 10.0.0.2 255.255.255.255 CSC-MGMT
Telnet 10.0.0.8 255.255.255.255 CSC-MGMT
Telnet timeout 5
SSH 1.2.3.3 255.255.255.240 internet1-outside
SSH 1.2.2.2 255.255.255.255 internet1-outside
SSH 1.2.2.2 255.255.255.255 internet2-outside
SSH timeout 5
Console timeout 0
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
internal VPN_TG_1 group policy
VPN_TG_1 group policy attributes
Protocol-tunnel-VPN IPSec
username ssochelpdesk encrypted password privilege 15 xxxxxxxxxxxxxx
privilege of encrypted password username administrator 15 xxxxxxxxxxxxxx
username vpnuser1 encrypted password privilege 0 xxxxxxxxxxxxxx
username vpnuser1 attributes
VPN-group-policy VPN_TG_1
type tunnel-group VPN_TG_1 remote access
attributes global-tunnel-group VPN_TG_1
address vpnpool1 pool
Group Policy - by default-VPN_TG_1
IPSec-attributes tunnel-group VPN_TG_1
pre-shared-key *.
!
class-map cmap-DNS
matches the access list DNS-inspect
CCS-class class-map
corresponds to the CSC - acl access list
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map global_policy
CCS category
CSC help
cmap-DNS class
inspect the preset_dns_map dns
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum: y0y0y0y0y0y0y0y0y0y0y0y0y0y
: end
Adding dynamic NAT for 192.168.150.0/24 on the external interface works, or works the sysopt connection permit VPN
Please tell what to do here, to pin all of the traffic Internet from VPN Clients.
That is, that I need clients connected via VPN tunnel, when connected to the internet, should have their addresses IP NAT'ted against the address of outside internet2 network 2.2.2.2 interface, as it happens for the customers of Campus (172.16.0.0/16)
I am well aware of all involved in here, so please be elaborative in your answers. Please let me know if you need more information about this configuration to respond to my request.
Thank you & best regards
MAXS
Hello
If possible, I'd like to see that a TCP connection attempt (e.g. http://www.google.com) in the ASDM logging of the VPN Client when you set up the dynamic NAT for the VPN Pool also.
I'll try also the command "packet - trace" on the SAA, while the VPN Client is connected to the ASA.
The command format is
packet-tracer intput tcp
That should tell what the SAA for this kind of package entering its "input" interface
Still can not see something wrong with the configuration (other than the statement of "nat" missing Dynamics PAT)
-Jouni
-
Original title: files
What is the difference between files? examples; PDF, http, wps. Why is there a manyand then why do you need different programs to open?
On Tuesday, February 7, 2012 16:28:19 + 0000, RonaldMatte wrote:
What is the difference between files? examples; PDF, http, wps. Why is there a manyand then why do you need different programs to open?
Each file type is in a different format. The formats are different
essentially for two reasons:1. the files contain any other type of information. For
example, an mp3 file contains a music and a xls file contains a
worksheet. The music and spreadsheets are very different things and one
a unique type of guy would not work for both.2. There is also the example of the types of files that are very different, even
Although basically they both contain the same type of data. For example,.
a doc file is a file created by Microsoft Word processor (or
some compatible programs) and a wpd file is a text file
created by WordPerfect. This is because Word and WordPerfect are two
very different programs, with very different characteristics. Designers
and authors of each of the programs designed for a type of file that would be
works very well with their program.Ken Blake, Microsoft MVP (Windows desktop experience) since 2003
Please reply to the newsgroup -
I'm having a problem with Windows Media Player 11. I download a file from Limewire 5.3.6 play in wmp, and it won't work at all. I get an error message saying; "Windows media could not read the file. One or more codecs may be missing. I tried to download the codecs and that did not work.
I'm having a problem with Windows Media Player 11. I download a file from Limewire 5.3.6 play in wmp, and it won't work at all. I get an error message saying; "Windows media could not read the file. One or more codecs may be missing. I tried to download the codecs and that did not work.
===================================
The following free utility can help you identify
the codec you need.Download GSpot
http://www.free-codecs.com/download/GSpot.htm
(left-click the text: "Download GSpot")
(on the next screen...
left click: 'Download [GSpot 2.70]')GSpot Super quick start
http://www.headbands.com/GSpot/v26x/Quick_Start.htmlEvaluation of video files and Codecs with GSpot
http://www.windowsmoviemakers.NET/PapaJohn/68/GSpot.aspxGood luck.
John Inzer - MS - MVP - digital media experience -
Destination folder access denied. You need permission to perform this action.
OK, I'm absolutely sick freaking that. I am logged on as administrator, and there are some files that I can't remove everything. I get the message "Destination folder access denied you need permission to perform this action."
Why the hell do I need permission? I am an administrator and it's MY computer!
I tried to fix this for hours now, searching through the forums looking for answers, trying all the things that people give to think (as the change of ownership of the files - didn't work).
I tried to turn of UAC, but it tells me that I have to restart, which I do, but then when the computer turns UAC turns on again!
Gaaaah! It's driving me crazy - I'm trying to delete files and folders that I need not, they take up valuable space and they have nothing to do with the functioning of the system.
Now I know why everyone hates on Vista.
A lot of files and folders in Vista are unable even to administrators (unlike was the case with XP). To remove a file, you need all rights to him and maybe same property (and these can be inherited from parent folders or their parent folders is not just a simple matter to change the permissions of the file - unless you remove the inheritance rights in the section advanced as well). It has nothing to do with YOUR computer, it has to do with the protection of the system of files to be modified, moved, deleted or otherwise modified by people who do not really know what they're doing and causing significant damage. There are places called junction pointshttp://msdn.microsoft.com/en-us/library/bb968829 (VS.85) .aspx which should NOT be accessed by anyone for any reason for example. Now there are places in your own profile which you denied access. That's how it works on Vista (and I don't think it's different in Windows 7).
If you think you should have access to delete the file and know that it will cause no harm, so some information here about obtaining permissions (you want full rights for yourself) and appropriate (not always required but sometimes useful). Being the owner does not necessarily give you the permissions of all rights - sometimes, you need to do both. Don't forget to go to the Advanced section to check the rights listed there as well as on the home page - they can block you all also if you don't fix them as well.
To view your permissions, right-click on the file/folder, click Properties, and check the Security tab. Check the permissions you have by clicking on your user name (or group of users). Here are the types of permissions, you may have:http://windows.microsoft.com/en-US/windows-vista/What-are-permissions. You must be an administrator or owner to change the permissions (and sometimes, being an administrator or even an owner is not sufficient - there are ways to block access (even if a smart administrator knows these ways and can move them - but usually should not because they did not have access, usually for a very good reason).) Here's how to change the permissions of folder under Vista:http://www.online-tech-tips.com/windows-vista/set-file-folder-permissions-vista/. To add take and the issuance of right of permissions and ownership in the right click menu (which will make it faster to get once it is configured), see the following article:http://www.mydigitallife.info/2009/05/21/take-and-grant-full-control-permissions-and-ownership-in-windows-7-or-vista-right-click-menu/.
To solve this problem with folders, folders takeownership or the reader (as an administrator) and give you all the rights. Right-click on the folder/drive, click Properties, click the Security tab and click on advanced and then click the owner tab. Click on edit, and then click the name of the person you want to give to the property (you may need to add if it is not there--or maybe yourself). If you want that it applies to subfolders and files in this folder/drive, then check the box to replace the owner of subcontainers and objects, and click OK. Back and now there is a new owner for files and folders/player who can change the required permissions. Here is more information on the ownership of a file or a folder:http://www.vistax64.com/tutorials/67717-take-ownership-file.html. To add take ownership in the menu of the right click (which will make it faster to get once it is configured), see the following article:http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/.
====================================================================================================================
If this does not work, try to use one of the following free products to remove the file/folder. Unlocker to: http://www.softpedia.com/get/System/System-Miscellaneous/Unlocker.shtml or file Assassin http://www.malwarebytes.org/fileassassin.php (with or without forcing the deletion: http://www.mydigitallife.info/2008/12/27/force-delete-cannot-delete-locked-or-in-used-files-or-folders-with-fileassassin/). These programs often work when the normal functions to remove Vista not work properly - but it helps if troubleshoot you permission first (even those programs may not work to override only).
I hope this helps.
Good luck!
Lorien - MCSA/MCSE/network + / has + - if this post solves your problem, please click the 'Mark as answer' or 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.
-
Hi all
I need to create a VPN L2L tunnel between us and another local company. We use a 3845 router and the other carrier uses a 3745 router. I created a lot of VPN tunnels in the past using NAT. In this case, I don't have to. is it possible for a tunnel VPN work with the same configuration without using NAT. My router and the device being connected to all have a public IP address on the same subnet.
Thank you
Stevan
Hello
Yes, you can create L2L without having to use NAT.
See the examples of configuration (under VPN Site to Site with PIX/IOS):
http://www.Cisco.com/en/us/partner/products/HW/vpndevc/ps2030/prod_configuration_examples_list.html
Before that, you have probably more experience configuration tunnel as shown in the url below:
Rgds,
AK
-
Windows 7 need more RAM for games that xp
Why some games need more RAN for windows 7, for example:
arkham asylum Batman needs 1 GB of RAM for windows xp and 2 GB for windows 7
The more you get on versions of Windows, the more RAM is required. There are a variety of reasons, but all simply, Vista and Windows 7 require more memory that make old versions of Windows. New technology requires more power.
The game itself shouldn't need more that about 500-600 MB of RAM, however, the specs say you should leave little memory RAM remains for tasks of Windows and other programs you may have running in the background (such as anti-virus, etc.)
I am in no way affiliated with Microsoft. The information provided by me are unsecured and has no right. Use the information I provide at your own risk.
-
XP key wep changes for new router linksys after the connection. you need to reinstall the WEP every time you start from the top.
Hello
Let us perform the steps below and check out them.
a. click "Start," "Control Panel", then "Add or Remove Programs". In the box "Currently installed programs", find the name of your wireless router. Click on the name of the software, and then click 'remove '. Click 'Yes' when prompted to confirm.
b. click "Start" then "run". Type "Services.msc" and click "OK". Select 'Wireless Zero Configuration'. Click on 'start '.
c. click 'Action', 'properties '. In the drop-down menu "Startup Type", click on the arrow and select 'Automatic' to assign the commissioning of automatic Wireless Auto Configuration. Click on 'OK '.
d. restart your computer.
e. right click on "Wireless connections" icon Select "View available wireless connections." Click on "change the order of preferred networks. Select the name of your network, and then click "Properties". Erase the old key and enter a new. Click the checkbox next to "Automatically use that key." Click on 'OK '.I hope this helps.
Thank you, and in what concerns:
Shekhar S - Microsoft technical support.Visit our Microsoft answers feedback Forum and let us know what you think.
If this post can help solve your problem, please click the 'Mark as answer' or 'Useful' at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly. -
Windows Defender who need more information about certain files?
Hello - I just receive a windows defender popup after a game of Battlefield 2, requesting more information about 2 files that are used by punkbuster - w resident c:\windows\system32\drivers\pnkbstrk.sys in the folder system32\drivers and pnkbstrb.exe in the system32 folder.
It seems that anti-malware apps are prone to detect falsely as a virus because of the way they work, and when I scan them with my other anti-virus/anti-malware tools they find nothing wrong - but when I checked the windows Defender directly, I noticed there are several guests in a history dating back to early November, saying "this program has undesirable behaviors."
I wonder if it is normal to get this fast - I'm using Vista for several years now and this is the first time I ever saw him, it is a legitimate part of Windows Defender? the prompt has been along the lines of "Microsoft needs more information about this software These files can help Microsoft improve the effectiveness of Windows Defender to help protect your system. If you do not want to send a file deactivate the checkbox next to it. "Followed by w c:\windows\system32\drivers\pnkbstrk.sys, then another with pnkbstrb.exe.
Thanks in advance.
Hello
All this is normal. There has been releases of versions of malware to these files if Windows Defender
is to ensure that those of your system are legitimate.Games is particularly known for the possibility of introducing malware so most antivirus/antispyware/security
programs check these viligently. Added that often a developer (game) will change something it then
causes a part of their program to be detected as malware. It works in two ways, the detection program
changes in its methods and/or the detected program has changed and is causing a false positive.===================================================================
Here's what I use and recommend: (these are all free and very effective versions.)
Avast and Prevx proved extremely reliable and compatible with all I have
launched on them. Microsoft Security Essentials and Prevx have also proven to be very
reliable and compatible. Use MSE or Avast and Prevx, Prevx 3 but not all.Avast Home free - stop any shields is not necessary except leaving Standard, Web, and
Operation of the network.Prevx - Home - free
Windows Firewall
Windows Defender (is not necessary if you use MSE)
Protected IE - mode
IE 8 - SmartScreen filter WE (IE 7 phishing filter)
I also IE always start with asset if filter InPrivate IE 8.
(It may temporarily turn off with the little icon to the left of the + bottom
right of IE)Two versions of Avast are available 5.x and 4.8 x
Avast - home - free - 5.x stop shields you do not use (except files, Web, network, &)
Shields of behavior) - double click on the icon in the Notification area - real time Orange - click on the
Shield that you want to stop - STOP. To stop the Orange icon to show an error indicator-
Click on the Orange icon - top right - settings - click on the status bar - uncheck shields you
disabled - click OK
http://www.avast.com/free-antivirus-downloadAvast 4.8 x - home - free - stop shields, you don't need except leaving Standard, Web,.
and the network running. (Double-click the blue icon - look OK. - upper left - Shields details
Finish those you don't use).
http://www.avast.com/free-antivirus-download#TAB4Or use Microsoft Security Essentials - free
http://www.Microsoft.com/Security_Essentials/Prevx works well alongside MSE or Avast
Prevx - home - free small, fast, exceptional protection CLOUD, working with other security
programs. It is a single scanner, VERY EFFICIENT, if it finds something come back here
or use Google to see how to remove.
http://www.prevx.com/ <-->-->
http://info.prevx.com/downloadcsi.asp <-->-->PCmag - Prevx - Editor's choice
http://www.PCMag.com/Article2/0, 2817,2346862,00.aspAlso get Malwarebytes - free - use as scanner only. If you ever think malware and that
would be unusual with Avast and occasional Prevx running with the exception of a low level cookie
(not much), to UPDATE and then run it as a scanner. I have a lot of scanners and they
never find anything of note that I started to use this configuration.I hope this helps.
Rob Brown - MS MVP - Windows Desktop Experience: Bike - Mark Twain said it right.
-
How can you photoshop pictures, and what software do you need.
Hello
Can I download a free software, I have windows vista basic and really don't have a clue about emails only very basic pc etc so need help as much as possible on photoshop. pls someone help me thank you very much
Hello
Thanks much for all your advice and time, but I don't think I explained myself very well sorry. Yes, I have windows live photo gallery, but it is not enough for what I want to do, what I need is something more advanced, I want to be able for example is to make eyes / grand/smaller nose,.
and said it is called photoshop, but the windows photo gallery is not enough to do and as im sure good on pc with anything download etc im really stuck, I know how to get pictures from the camera to the pc and then put them in the file of the photo, but really that's about it and use the fix in the hue of color of window etc. on windows live Gallery but that's all,
so im thinking that I need something much more advanced, please can you help me find me a free software and tips on how to download etc.
I hope you can help and have the time im very grateful for any help and advice
Thanks sugarplum
sugarplum92
==========================================
Photoshop is a real program produced by Adobe and Yes, the
Word is often used in reference to photos that have been published.
"Looks like it has been retouched.Adobe Photoshop is not freeware, but they offer a trial version
You can use for a time limited.There are many image editors and a number of free but if
you have a fast internet connection following free online
the Publisher may be worth a try. At least it would give you an idea of
what you agree.Sumo Paint home page
http://www.Sumopaint.com/home/Sumo Paint Editor
http://www.Sumopaint.com/app/You mentioned "do the eyes and nose larger/smaller'...try the"
following steps.When you open the form from the Publisher if you press the F11 key
your keyboard, it must develop in full screen.First of all, you need to upload a photo. On the screen of the editor... go...
File / open my computer and navigate to the photo you
you want to change. When the photo is displayed in the box for editing... go to
See / adapt to the screen.Now, go to... Filter / distortion / pinch.
In the palette of pinch... try dragging the sliders at the top of the page
in the Center... now when you drag the cursor to the lower left or right
from scratch... it should contract or expand the center of the face
(this assumes that the face is centered on the photo).If you arrive at a result, you are happy with click left OK and you
can save the image as follows...File / save to my computer...
Enter a new name for the edited version, so it will not delete
the original.Select... JPG / 100 / Save...
In few seconds the backup screen will appear... Choose a backup location...
Desktop might be a good choice... then on the left, click the "Save" button.If you wish you can download and install a program on your hard drive...
the free version of Serif PhotoPlus 9 might be useful to try:(FWIW... it's always a good idea to create a system)
Restore point before installing software or updates)Serif PhotoPlus SE
http://www.freeserifsoftware.com/software/PhotoPlus/default.asp
(left click the button "Download PhotoPlus SE")Here is a link to a .pdf of the PhotoPlus 9 manual version.
http://www.serif.com/community/PDFs/PhP9companion.PDF
(when it appears on the screen... you can download a copy to your hard drive
drive by going to... File / save as... Choose a backup location and left
Click on the "Save" button)And the following link may be worth a visit:
Top 11 free Photo for Windows editors
http://graphicssoft.about.com/od/pixelbasedwin/TP/freephotoedw.htmBe aware that there is a learning curve a little stiff with image
editing software and since you are running Vista Basic... you can
have resource problems. The program can be very slow, and in some
instances, you will notice that it will freeze.Good luck and have fun: o)
Volunteer - MS - MVP - Digital Media Experience J - Notice_This is not tech support_I'm volunteer - Solutions that work for me may not work for you - * proceed at your own risk *.
Maybe you are looking for
-
DVD burner not burning not files
Hellothe light on the dvd burner that lights up when the driver is in use is constantly on when the pc is turned onand my dvd writer onlyh burns up to 3% and stops,Please what could be the problem and what do you recommend I do.Thanks in advanceAlfre
-
put new hard drive in the computer and software hp reloaded... I have a pro 8600 printer. until I replaced my hard drive If I wanted to do anything all I had to do is click on hp8600 on the desktop and it would open a window and He asked you what you
-
Why have we not areas for DVD playback?
ORIGINAL TITLE: generalcomplaint Why have we not areas for DVD playback? I find it extremely shocking when you lock my machines. How dare you treat me this way. Do you think that it is productive? jerk like more. Fool I would classify as. Please expl
-
Age of Empires III: Asian Dynasties uninstalling problem
I installed Age of Empires III and two packs of its expansion. But when uninstalling, I left the Asian Dynasties and proceeded with the other two, and now I can not uninstall the package Asian Dynasties. Even when I try to install all the Asian Dynas
-
Re-install temporarily deleted software during the upgrade to Windows 7
After I installed Windows 7, I turned off the computer during the process of reloading of some software that he had temporarily removed. Quesston: How can I re - load this software?