Do you need more examples of Configuration?

We want to know! Tell us what areas of technology need several configuration examples.

What do you mean exactly?

Tags: Cisco Support

Similar Questions

  • Hi, I have 3 movies (860 MB 950 mb 1, 750 MB) I try to 4.7 Gb Cd in again that it alerts you need more than 7 GB of space! Please help me how I can do? Thank you

    Hi, I have 3 movies by (860 + 950 MB + 1, 750 MB) I try to 4.7 Gb Cd in again that it alerts you need more than 7 GB of space! Please help me how I can do? Thank you

    The files must be legal DVD or still to retranscode them. If so, it will use "automatic" (in which case it should adapt), or settings you have applied.

    Look at assets in the project Panel and columns for the status of transcoding DVDs and transcoding DVD setting. What did he say? Or better, post a screenshot.

    try to make 4.7 Gb Cd

    I assume you mean DVD.

  • Why you need more of an MP3 player

    I'm so happy to have 2 players! I refreshed just the contents of my "rocket"... and fill the only external memory took almost an hour and a half (maybe due to the qualification of class 2 card?) not to mention to decide what to put on it and what to stop at once and the internal memory. But because I also have a Clip, I was amused at all this time. I didn't play all the music on the computer because I didn't want to slow it down at all. So to all of you who say, "you do not need to have more than one!" (as I was told when I shared that I had a Clip too) I say, "Bollocks!"

    Dalaug234 wrote:

    It's a good reason.  Or when you're music to transfer on your rocket or the Clip, you can use it.  Or if an indictment will output (if any).

    Basically, that's what I wanted to say... be able to listen to one when loading the other or the other load is a great option

  • CoreTelephony error in trace file as a file for coretelephony tracing operation has failed, perhaps you need more disk space. Details "error opening the file/tmp/ct.shutdown, err = operation not permitted

    I got this error:

    "CoreTelephony Trace file error
    A file for CoreTelephony tracing operation failed, you might run out of disk space. Details "error opening the file/tmp/ct.shutdown, err = operation not permitted"

    I tried to solve it by searching for CoreTelephony errors. Could not resolve yet.
    Software does not, especially of photoshop...

    Any ideas?

    Same thing here, iMac with OS X 10.11.6. All started a couple days ago. Have not found any valid solution online yet, I tried rebooting in recovery mode and check disk, but it seems that everything is ok with the drives and permissions.

  • Need more performance on my Satellite A200 - 23K

    Hello everyone.
    I would like to ask for help, please, because I'm confused. I bought my computer toshiba laptop about 2 years ago. At the time I thought it was a pretty good laptop for games because I wanted a laptop. Now my problem is that I'm confused. Confused performance. I can't play on low etc. My framerate is quite large. I used windows vista. Then after 3 formats, I decided to go back to xp pro. There was a significant change, but still I couldn't go any lower. I would ask a help, is possible to upgrade my laptop for a better? As the purchase of new equipment, or it's useless.

    My characteristics of the model then:
    CPU: Intel Core 2 Duo T5450 at 1.66 GHZ
    Graphics card: Ati Radeon Mobility 2600
    BIOS version: 5.60
    RAM: 2G
    OS: Windows Xp Pro Service Pack 3
    Card mother ID SROSA001.86C.0034.D.0805152046
    Bus Type Intel GTL +

    My computer shows my motherboard as?. These last 2 things are the only information I have. I really need help. My questions are.
    (1) can I put my computer hardware?
    (2) where I can download decent drivers because the drivers of toshiba support are so old. Example ati radeon driver.
    (3) how can I boost my computer's performance?

    So if anyone can help me, I really appreciate it. If you need more information about my hardware please ask. I could really use some help because im so confused. I even downloaded ati tray tools and support toshiba ati driver and I don't even know which use.

    Hello

    > 1) can I upgrade my hardware?

    No, you can't do it. Only you can improve memory and the hard drive. But not the Cpu or gpu. You can read here the article support Tosh:

    http://forums.computers.Toshiba-Europe.com/forums/Ann.jspa?annID=13

    (> 2) where I can download decent drivers, because support for toshiba drivers are so old. Example ati radeon driver.
    You can visit radeon ati to get drivers and try to install.

    (> 3) how can I push the performance of my computer?

    You can add more memory, I guess that your model supports up to 4 GB of memory

  • NEED TO CHANGE MY CONFIGURATION OF RAID 0, RAID 1. PLEASE HELP AS FOR HOW TO DO IT. URGENT!

    Hello!

    I had a glance but quite impossible to find the answers I was hoping to find.  I understand a fair bit about how works RAID and indeed when I ordered my computer, I ordered a RAID 1 configuration, but it arrived as a RAID 0 Configuration. In time, I left and wish later, I do not have, but at the time, I was in the middle of a heavy calendar of study...

    I have a computer processor i7 3 GHz with 8 GB 1333 MHz DDR3 RAM.  It's a few years old but has a bit of life left in it, so I would reconfigure if possible.  At present, it is implemented with DISK 0 have 3 partitions - a 118MB OEM partition, a partition RECOVERY from NTFS of 10,88 GB and a 1.8 to NTFS OS (c :)) Partition main, then 1 drive has a main 63 GB NTFS partition.)  It runs on W7.

    Of course, if I just start to change the sizes of disc autour, I lost the operating system and all and may end up with a metal box not able to do anything. so, where can I start and in what order I progress, please to reach a situation of RAID 1?  I have a complete set of diskettes to install W7 and want to update to 10 by Thursday.  I understand that I have to format the drives to break the current RAID configuration and get the good detection of both discs and am fully backed up, but I need to know in what order I am progressing.

    Any help would be welcome.  Looking forward to some responses!

    Burybellringer.

    Hello

    According to the description you want to change the configuration of RAID 0 to RAID 1 on the system.

    Certainly, I understand your concern.

    To get more information about it, we have a dedicated forum where these issues are dealt with and would be better suited to the TechNet community.

    Please visit the link below to find a community that will provide the best support.

    https://social.technet.Microsoft.com/forums/Windows/en-us/home?category=w7itpro

    I hope this information is useful.

    Please let us know if you need more help, we will be happy to help you.

    Thank you.

  • Need help with the configuration of the Site with crossed on Cisco ASA5510 8.2 IPSec VPN Client (1)

    Need urgent help in the configuration of the Client VPN IPSec Site with crossed on Cisco ASA5510 - 8.2 (1).

    Here is the presentation:

    There are two leased lines for Internet access - a route 1.1.1.1 and 2.2.2.2, the latter being the default Standard, old East for backup.

    I was able to configure the Client VPN IPSec Site

    (1) with access to the outside so that the internal network (172.16.0.0/24) behind the asa

    (2) with Split tunnel with simultaneous assess internal LAN and Internet on the outside.

    But I was not able to make the tradiotional model Hairpinng to work in this scenario.

    I followed every possible suggestions made on this subject in many topics of Discussion but still no luck. Can someone help me here please?

    Here is the race-Conf with Normal Client to Site IPSec VPN configured with no access boarding:

    LIMITATION: Cannot boot into any other image ios for unavoidable reasons, must use 8.2 (1)

    race-conf - Site VPN Customer normal work without internet access/split tunnel

    :

    ASA Version 8.2 (1)

    !

    ciscoasa hostname

    domain cisco.campus.com

    enable the encrypted password xxxxxxxxxxxxxx

    XXXXXXXXXXXXXX encrypted passwd

    names of

    !

    interface GigabitEthernet0/0

    nameif outside internet1

    security-level 0

    IP 1.1.1.1 255.255.255.240

    !

    interface GigabitEthernet0/1

    nameif outside internet2

    security-level 0

    IP address 2.2.2.2 255.255.255.224

    !

    interface GigabitEthernet0/2

    nameif dmz interface

    security-level 0

    IP 10.0.1.1 255.255.255.0

    !

    interface GigabitEthernet0/3

    nameif campus-lan

    security-level 0

    IP 172.16.0.1 255.255.0.0

    !

    interface Management0/0

    nameif CSC-MGMT

    security-level 100

    the IP 10.0.0.4 address 255.255.255.0

    !

    boot system Disk0: / asa821 - k8.bin

    boot system Disk0: / asa843 - k8.bin

    passive FTP mode

    DNS server-group DefaultDNS

    domain cisco.campus.com

    permit same-security-traffic inter-interface

    permit same-security-traffic intra-interface

    object-group network cmps-lan

    the object-group CSC - ip network

    object-group network www-Interior

    object-group network www-outside

    object-group service tcp-80

    object-group service udp-53

    object-group service https

    object-group service pop3

    object-group service smtp

    object-group service tcp80

    object-group service http-s

    object-group service pop3-110

    object-group service smtp25

    object-group service udp53

    object-group service ssh

    object-group service tcp-port

    port udp-object-group service

    object-group service ftp

    object-group service ftp - data

    object-group network csc1-ip

    object-group service all-tcp-udp

    access list INTERNET1-IN extended permit ip host 1.2.2.2 2.2.2.3

    access-list extended SCC-OUT permit ip host 10.0.0.5 everything

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq www

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any https eq

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq ssh

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 no matter what eq ftp

    list of access CAMPUS-LAN extended permitted udp 172.16.0.0 255.255.0.0 no matter what eq field

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq smtp

    list of access CAMPUS-LAN extended permitted tcp 172.16.0.0 255.255.0.0 any eq pop3

    access CAMPUS-wide LAN ip allowed list a whole

    access-list CSC - acl note scan web and mail traffic

    access-list CSC - acl extended permit tcp any any eq smtp

    access-list CSC - acl extended permit tcp any any eq pop3

    access-list CSC - acl note scan web and mail traffic

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq 993

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq imap4

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq 465

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq www

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq https

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq smtp

    access-list extended INTERNET2-IN permit tcp any host 1.1.1.2 eq pop3

    access-list extended INTERNET2-IN permit ip any host 1.1.1.2

    access-list sheep extended ip 172.16.0.0 allow 255.255.0.0 172.16.0.0 255.255.0.0

    access list DNS-inspect extended permit tcp any any eq field

    access list DNS-inspect extended permit udp any any eq field

    access-list extended capin permit ip host 172.16.1.234 all

    access-list extended capin permit ip host 172.16.1.52 all

    access-list extended capin permit ip any host 172.16.1.52

    Capin list extended access permit ip host 172.16.0.82 172.16.0.61

    Capin list extended access permit ip host 172.16.0.61 172.16.0.82

    access-list extended capout permit ip host 2.2.2.2 everything

    access-list extended capout permit ip any host 2.2.2.2

    Access campus-lan_nat0_outbound extended ip 172.16.0.0 list allow 255.255.0.0 192.168.150.0 255.255.255.0

    pager lines 24

    Enable logging

    debug logging in buffered memory

    asdm of logging of information

    Internet1-outside of MTU 1500

    Internet2-outside of MTU 1500

    interface-dmz MTU 1500

    Campus-lan of MTU 1500

    MTU 1500 CSC-MGMT

    IP local pool 192.168.150.2 - 192.168.150.250 mask 255.255.255.0 vpnpool1

    IP check path reverse interface internet2-outside

    IP check path reverse interface interface-dmz

    IP check path opposite campus-lan interface

    IP check path reverse interface CSC-MGMT

    no failover

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 621.bin

    don't allow no asdm history

    ARP timeout 14400

    interface of global (internet1-outside) 1

    interface of global (internet2-outside) 1

    NAT (campus-lan) 0-campus-lan_nat0_outbound access list

    NAT (campus-lan) 1 0.0.0.0 0.0.0.0

    NAT (CSC-MGMT) 1 10.0.0.5 255.255.255.255

    static (CSC-MGMT, internet2-outside) 2.2.2.3 10.0.0.5 netmask 255.255.255.255

    Access-group INTERNET2-IN interface internet1-outside

    group-access INTERNET1-IN interface internet2-outside

    group-access CAMPUS-LAN in campus-lan interface

    CSC-OUT access-group in SCC-MGMT interface

    Internet2-outside route 0.0.0.0 0.0.0.0 2.2.2.5 1

    Route internet1-outside 0.0.0.0 0.0.0.0 1.1.1.5 2

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    the ssh LOCAL console AAA authentication

    AAA authentication enable LOCAL console

    Enable http server

    http 10.0.0.2 255.255.255.255 CSC-MGMT

    http 10.0.0.8 255.255.255.255 CSC-MGMT

    HTTP 1.2.2.2 255.255.255.255 internet2-outside

    HTTP 1.2.2.2 255.255.255.255 internet1-outside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs set group5

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    Crypto map internet2-outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    crypto internet2-outside_map outside internet2 network interface card

    Crypto ca trustpoint _SmartCallHome_ServerCA

    Configure CRL

    Crypto ca certificate chain _SmartCallHome_ServerCA

    certificate ca xyzxyzxyzyxzxyzxyzxyzxxyzyxzyxzy

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as a67a897as

    a67a897as a67a897as a67a897as a67a897as a67a897as

    quit smoking

    ISAKMP crypto enable internet2-outside

    crypto ISAKMP policy 10

    preshared authentication

    aes encryption

    md5 hash

    Group 2

    life 86400

    Telnet 10.0.0.2 255.255.255.255 CSC-MGMT

    Telnet 10.0.0.8 255.255.255.255 CSC-MGMT

    Telnet timeout 5

    SSH 1.2.3.3 255.255.255.240 internet1-outside

    SSH 1.2.2.2 255.255.255.255 internet1-outside

    SSH 1.2.2.2 255.255.255.255 internet2-outside

    SSH timeout 5

    Console timeout 0

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    internal VPN_TG_1 group policy

    VPN_TG_1 group policy attributes

    Protocol-tunnel-VPN IPSec

    username ssochelpdesk encrypted password privilege 15 xxxxxxxxxxxxxx

    privilege of encrypted password username administrator 15 xxxxxxxxxxxxxx

    username vpnuser1 encrypted password privilege 0 xxxxxxxxxxxxxx

    username vpnuser1 attributes

    VPN-group-policy VPN_TG_1

    type tunnel-group VPN_TG_1 remote access

    attributes global-tunnel-group VPN_TG_1

    address vpnpool1 pool

    Group Policy - by default-VPN_TG_1

    IPSec-attributes tunnel-group VPN_TG_1

    pre-shared-key *.

    !

    class-map cmap-DNS

    matches the access list DNS-inspect

    CCS-class class-map

    corresponds to the CSC - acl access list

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    message-length maximum 512

    Policy-map global_policy

    CCS category

    CSC help

    cmap-DNS class

    inspect the preset_dns_map dns

    !

    global service-policy global_policy

    context of prompt hostname

    Cryptochecksum: y0y0y0y0y0y0y0y0y0y0y0y0y0y

    : end

    Adding dynamic NAT for 192.168.150.0/24 on the external interface works, or works the sysopt connection permit VPN

    Please tell what to do here, to pin all of the traffic Internet from VPN Clients.

    That is, that I need clients connected via VPN tunnel, when connected to the internet, should have their addresses IP NAT'ted against the address of outside internet2 network 2.2.2.2 interface, as it happens for the customers of Campus (172.16.0.0/16)

    I am well aware of all involved in here, so please be elaborative in your answers. Please let me know if you need more information about this configuration to respond to my request.

    Thank you & best regards

    MAXS


    Hello

    If possible, I'd like to see that a TCP connection attempt (e.g. http://www.google.com) in the ASDM logging of the VPN Client when you set up the dynamic NAT for the VPN Pool also.

    I'll try also the command "packet - trace" on the SAA, while the VPN Client is connected to the ASA.

    The command format is

    packet-tracer intput tcp

    That should tell what the SAA for this kind of package entering its "input" interface

    Still can not see something wrong with the configuration (other than the statement of "nat" missing Dynamics PAT)

    -Jouni

  • What is the difference between files? examples; PDF, http, wps. Why is there a manyand then why do you need different programs to open?

    Original title: files

    What is the difference between files? examples; PDF, http, wps. Why is there a manyand then why do you need different programs to open?

    On Tuesday, February 7, 2012 16:28:19 + 0000, RonaldMatte wrote:

    What is the difference between files? examples; PDF, http, wps. Why is there a manyand then why do you need different programs to open?

    Each file type is in a different format.  The formats are different
    essentially for two reasons:

    1. the files contain any other type of information. For
    example, an mp3 file contains a music and a xls file contains a
    worksheet. The music and spreadsheets are very different things and one
    a unique type of guy would not work for both.

    2. There is also the example of the types of files that are very different, even
    Although basically they both contain the same type of data. For example,.
    a doc file is a file created by Microsoft Word processor (or
    some compatible programs) and a wpd file is a text file
    created by WordPerfect. This is because Word and WordPerfect are two
    very different programs, with very different characteristics. Designers
    and authors of each of the programs designed for a type of file that would be
    works very well with their program.

    Ken Blake, Microsoft MVP (Windows desktop experience) since 2003
    Please reply to the newsgroup

  • I want to play an avi file from Limewire on windows media player and everytime I try I get the error message one or more codecs you need is maybe missing. What should I do?

    I'm having a problem with Windows Media Player 11. I download a file from Limewire 5.3.6 play in wmp, and it won't work at all. I get an error message saying; "Windows media could not read the file. One or more codecs may be missing. I tried to download the codecs and that did not work.

    I'm having a problem with Windows Media Player 11. I download a file from Limewire 5.3.6 play in wmp, and it won't work at all. I get an error message saying; "Windows media could not read the file. One or more codecs may be missing. I tried to download the codecs and that did not work.

    ===================================
    The following free utility can help you identify
    the codec you need.

    Download GSpot
    http://www.free-codecs.com/download/GSpot.htm
    (left-click the text: "Download GSpot")
    (on the next screen...
    left click: 'Download [GSpot 2.70]')

    GSpot Super quick start
    http://www.headbands.com/GSpot/v26x/Quick_Start.html

    Evaluation of video files and Codecs with GSpot
    http://www.windowsmoviemakers.NET/PapaJohn/68/GSpot.aspx

    Good luck.
    John Inzer - MS - MVP - digital media experience

  • Destination folder access denied. You need permission to perform this action.

    OK, I'm absolutely sick freaking that. I am logged on as administrator, and there are some files that I can't remove everything. I get the message "Destination folder access denied you need permission to perform this action."

    Why the hell do I need permission? I am an administrator and it's MY computer!

    I tried to fix this for hours now, searching through the forums looking for answers, trying all the things that people give to think (as the change of ownership of the files - didn't work).

    I tried to turn of UAC, but it tells me that I have to restart, which I do, but then when the computer turns UAC turns on again!

    Gaaaah! It's driving me crazy - I'm trying to delete files and folders that I need not, they take up valuable space and they have nothing to do with the functioning of the system.

    Now I know why everyone hates on Vista.

    A lot of files and folders in Vista are unable even to administrators (unlike was the case with XP).  To remove a file, you need all rights to him and maybe same property (and these can be inherited from parent folders or their parent folders is not just a simple matter to change the permissions of the file - unless you remove the inheritance rights in the section advanced as well).  It has nothing to do with YOUR computer, it has to do with the protection of the system of files to be modified, moved, deleted or otherwise modified by people who do not really know what they're doing and causing significant damage. There are places called junction pointshttp://msdn.microsoft.com/en-us/library/bb968829 (VS.85) .aspx which should NOT be accessed by anyone for any reason for example.  Now there are places in your own profile which you denied access.  That's how it works on Vista (and I don't think it's different in Windows 7).

    If you think you should have access to delete the file and know that it will cause no harm, so some information here about obtaining permissions (you want full rights for yourself) and appropriate (not always required but sometimes useful).  Being the owner does not necessarily give you the permissions of all rights - sometimes, you need to do both.  Don't forget to go to the Advanced section to check the rights listed there as well as on the home page - they can block you all also if you don't fix them as well.

    To view your permissions, right-click on the file/folder, click Properties, and check the Security tab.  Check the permissions you have by clicking on your user name (or group of users).  Here are the types of permissions, you may have:http://windows.microsoft.com/en-US/windows-vista/What-are-permissions.  You must be an administrator or owner to change the permissions (and sometimes, being an administrator or even an owner is not sufficient - there are ways to block access (even if a smart administrator knows these ways and can move them - but usually should not because they did not have access, usually for a very good reason).)  Here's how to change the permissions of folder under Vista:http://www.online-tech-tips.com/windows-vista/set-file-folder-permissions-vista/. To add take and the issuance of right of permissions and ownership in the right click menu (which will make it faster to get once it is configured), see the following article:http://www.mydigitallife.info/2009/05/21/take-and-grant-full-control-permissions-and-ownership-in-windows-7-or-vista-right-click-menu/.

    To solve this problem with folders, folders takeownership or the reader (as an administrator) and give you all the rights.  Right-click on the folder/drive, click Properties, click the Security tab and click on advanced and then click the owner tab.  Click on edit, and then click the name of the person you want to give to the property (you may need to add if it is not there--or maybe yourself). If you want that it applies to subfolders and files in this folder/drive, then check the box to replace the owner of subcontainers and objects, and click OK.  Back and now there is a new owner for files and folders/player who can change the required permissions.  Here is more information on the ownership of a file or a folder:http://www.vistax64.com/tutorials/67717-take-ownership-file.html. To add take ownership in the menu of the right click (which will make it faster to get once it is configured), see the following article:http://www.howtogeek.com/howto/windows-vista/add-take-ownership-to-explorer-right-click-menu-in-vista/.

    ====================================================================================================================

    If this does not work, try to use one of the following free products to remove the file/folder.  Unlocker to: http://www.softpedia.com/get/System/System-Miscellaneous/Unlocker.shtml or file Assassin http://www.malwarebytes.org/fileassassin.php (with or without forcing the deletion: http://www.mydigitallife.info/2008/12/27/force-delete-cannot-delete-locked-or-in-used-files-or-folders-with-fileassassin/). These programs often work when the normal functions to remove Vista not work properly - but it helps if troubleshoot you permission first (even those programs may not work to override only).

    I hope this helps.

    Good luck!

    Lorien - MCSA/MCSE/network + / has + - if this post solves your problem, please click the 'Mark as answer' or 'Useful' button at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • Do you need a VPN L2L NAT

    Hi all

    I need to create a VPN L2L tunnel between us and another local company. We use a 3845 router and the other carrier uses a 3745 router. I created a lot of VPN tunnels in the past using NAT. In this case, I don't have to. is it possible for a tunnel VPN work with the same configuration without using NAT. My router and the device being connected to all have a public IP address on the same subnet.

    Thank you

    Stevan

    Hello

    Yes, you can create L2L without having to use NAT.

    See the examples of configuration (under VPN Site to Site with PIX/IOS):

    http://www.Cisco.com/en/us/partner/products/HW/vpndevc/ps2030/prod_configuration_examples_list.html

    Before that, you have probably more experience configuration tunnel as shown in the url below:

    http://www.Cisco.com/en/us/Partner/Tech/tk583/TK372/technologies_configuration_example09186a00800949ef.shtml

    Rgds,

    AK

  • Windows 7 need more RAM for games that xp

    Why some games need more RAN for windows 7, for example:

    arkham asylum Batman needs 1 GB of RAM for windows xp and 2 GB for windows 7

    The more you get on versions of Windows, the more RAM is required. There are a variety of reasons, but all simply, Vista and Windows 7 require more memory that make old versions of Windows. New technology requires more power.

    The game itself shouldn't need more that about 500-600 MB of RAM, however, the specs say you should leave little memory RAM remains for tasks of Windows and other programs you may have running in the background (such as anti-virus, etc.)

    I am in no way affiliated with Microsoft. The information provided by me are unsecured and has no right. Use the information I provide at your own risk.

  • XP key wep changes for new router linksys after the connection. you need to reinstall the WEP every time you start from the top.

    XP key wep changes for new router linksys after the connection. you need to reinstall the WEP every time you start from the top.

    Hello

    Let us perform the steps below and check out them.

    a. click "Start," "Control Panel", then "Add or Remove Programs". In the box "Currently installed programs", find the name of your wireless router. Click on the name of the software, and then click 'remove '. Click 'Yes' when prompted to confirm.
    b. click "Start" then "run". Type "Services.msc" and click "OK". Select 'Wireless Zero Configuration'. Click on 'start '.
    c. click 'Action', 'properties '. In the drop-down menu "Startup Type", click on the arrow and select 'Automatic' to assign the commissioning of automatic Wireless Auto Configuration. Click on 'OK '.
    d. restart your computer.
    e. right click on "Wireless connections" icon Select "View available wireless connections." Click on "change the order of preferred networks. Select the name of your network, and then click "Properties". Erase the old key and enter a new. Click the checkbox next to "Automatically use that key." Click on 'OK '.

    I hope this helps.

    Thank you, and in what concerns:
    Shekhar S - Microsoft technical support.

    Visit our Microsoft answers feedback Forum and let us know what you think.
    If this post can help solve your problem, please click the 'Mark as answer' or 'Useful' at the top of this message. Marking a post as answer, or relatively useful, you help others find the answer more quickly.

  • Windows Defender who need more information about certain files?

    Hello - I just receive a windows defender popup after a game of Battlefield 2, requesting more information about 2 files that are used by punkbuster - w resident c:\windows\system32\drivers\pnkbstrk.sys in the folder system32\drivers and pnkbstrb.exe in the system32 folder.

    It seems that anti-malware apps are prone to detect falsely as a virus because of the way they work, and when I scan them with my other anti-virus/anti-malware tools they find nothing wrong - but when I checked the windows Defender directly, I noticed there are several guests in a history dating back to early November, saying "this program has undesirable behaviors."

    I wonder if it is normal to get this fast - I'm using Vista for several years now and this is the first time I ever saw him, it is a legitimate part of Windows Defender? the prompt has been along the lines of "Microsoft needs more information about this software These files can help Microsoft improve the effectiveness of Windows Defender to help protect your system. If you do not want to send a file deactivate the checkbox next to it. "Followed by w c:\windows\system32\drivers\pnkbstrk.sys, then another with pnkbstrb.exe.

    Thanks in advance.

    Hello

    All this is normal. There has been releases of versions of malware to these files if Windows Defender
    is to ensure that those of your system are legitimate.

    Games is particularly known for the possibility of introducing malware so most antivirus/antispyware/security
    programs check these viligently. Added that often a developer (game) will change something it then
    causes a part of their program to be detected as malware. It works in two ways, the detection program
    changes in its methods and/or the detected program has changed and is causing a false positive.

    ===================================================================

    Here's what I use and recommend: (these are all free and very effective versions.)

    Avast and Prevx proved extremely reliable and compatible with all I have
    launched on them. Microsoft Security Essentials and Prevx have also proven to be very
    reliable and compatible. Use MSE or Avast and Prevx, Prevx 3 but not all.

    Avast Home free - stop any shields is not necessary except leaving Standard, Web, and
    Operation of the network.

    Prevx - Home - free

    Windows Firewall

    Windows Defender (is not necessary if you use MSE)

    Protected IE - mode

    IE 8 - SmartScreen filter WE (IE 7 phishing filter)

    I also IE always start with asset if filter InPrivate IE 8.
    (It may temporarily turn off with the little icon to the left of the + bottom
    right of IE)

    Two versions of Avast are available 5.x and 4.8 x

    Avast - home - free - 5.x stop shields you do not use (except files, Web, network, &)
    Shields of behavior) - double click on the icon in the Notification area - real time Orange - click on the
    Shield that you want to stop - STOP. To stop the Orange icon to show an error indicator-
    Click on the Orange icon - top right - settings - click on the status bar - uncheck shields you
    disabled - click OK
    http://www.avast.com/free-antivirus-download

    Avast 4.8 x - home - free - stop shields, you don't need except leaving Standard, Web,.
    and the network running. (Double-click the blue icon - look OK. - upper left - Shields details
    Finish those you don't use).
    http://www.avast.com/free-antivirus-download#TAB4

    Or use Microsoft Security Essentials - free
    http://www.Microsoft.com/Security_Essentials/

    Prevx works well alongside MSE or Avast

    Prevx - home - free small, fast, exceptional protection CLOUD, working with other security
    programs. It is a single scanner, VERY EFFICIENT, if it finds something come back here
    or use Google to see how to remove.
    http://www.prevx.com/   <-->
    http://info.prevx.com/downloadcsi.asp  <-->

    PCmag - Prevx - Editor's choice
    http://www.PCMag.com/Article2/0, 2817,2346862,00.asp

    Also get Malwarebytes - free - use as scanner only. If you ever think malware and that
    would be unusual with Avast and occasional Prevx running with the exception of a low level cookie
    (not much), to UPDATE and then run it as a scanner. I have a lot of scanners and they
    never find anything of note that I started to use this configuration.

    http://www.Malwarebytes.org/

    I hope this helps.

    Rob Brown - MS MVP - Windows Desktop Experience: Bike - Mark Twain said it right.

  • How can you photoshop pictures, and what software do you need.

    Hello

    Can I download a free software, I have windows vista basic and really don't have a clue about emails only very basic pc etc so need help as much as possible on photoshop. pls someone help me thank you very much

    Hello

    Thanks much for all your advice and time, but I don't think I explained myself very well sorry. Yes, I have windows live photo gallery, but it is not enough for what I want to do, what I need is something more advanced, I want to be able for example is to make eyes / grand/smaller nose,.

    and said it is called photoshop, but the windows photo gallery is not enough to do and as im sure good on pc with anything download etc im really stuck, I know how to get pictures from the camera to the pc and then put them in the file of the photo, but really that's about it and use the fix in the hue of color of window etc. on windows live Gallery but that's all,

    so im thinking that I need something much more advanced, please can you help me find me a free software and tips on how to download etc.

    I hope you can help and have the time im very grateful for any help and advice

    Thanks sugarplum

    sugarplum92

    ==========================================
    Photoshop is a real program produced by Adobe and Yes, the
    Word is often used in reference to photos that have been published.
    "Looks like it has been retouched.

    Adobe Photoshop is not freeware, but they offer a trial version
    You can use for a time limited.

    There are many image editors and a number of free but if
    you have a fast internet connection following free online
    the Publisher may be worth a try. At least it would give you an idea of
    what you agree.

    Sumo Paint home page
    http://www.Sumopaint.com/home/

    Sumo Paint Editor
    http://www.Sumopaint.com/app/

    You mentioned "do the eyes and nose larger/smaller'...try the"
    following steps.

    When you open the form from the Publisher if you press the F11 key
    your keyboard, it must develop in full screen.

    First of all, you need to upload a photo. On the screen of the editor... go...
    File / open my computer and navigate to the photo you
    you want to change. When the photo is displayed in the box for editing... go to
    See / adapt to the screen.

    Now, go to... Filter / distortion / pinch.

    In the palette of pinch... try dragging the sliders at the top of the page
    in the Center... now when you drag the cursor to the lower left or right
    from scratch... it should contract or expand the center of the face
    (this assumes that the face is centered on the photo).

    If you arrive at a result, you are happy with click left OK and you
    can save the image as follows...

    File / save to my computer...

    Enter a new name for the edited version, so it will not delete
    the original.

    Select... JPG / 100 / Save...

    In few seconds the backup screen will appear... Choose a backup location...
    Desktop might be a good choice... then on the left, click the "Save" button.

    If you wish you can download and install a program on your hard drive...
    the free version of Serif PhotoPlus 9 might be useful to try:

    (FWIW... it's always a good idea to create a system)
    Restore point before installing software or updates)

    Serif PhotoPlus SE
    http://www.freeserifsoftware.com/software/PhotoPlus/default.asp
    (left click the button "Download PhotoPlus SE")

    Here is a link to a .pdf of the PhotoPlus 9 manual version.
    http://www.serif.com/community/PDFs/PhP9companion.PDF
    (when it appears on the screen... you can download a copy to your hard drive
    drive by going to... File / save as... Choose a backup location and left
    Click on the "Save" button)

    And the following link may be worth a visit:

    Top 11 free Photo for Windows editors
    http://graphicssoft.about.com/od/pixelbasedwin/TP/freephotoedw.htm

    Be aware that there is a learning curve a little stiff with image
    editing software and since you are running Vista Basic... you can
    have resource problems. The program can be very slow, and in some
    instances, you will notice that it will freeze.

    Good luck and have fun: o)

    Volunteer - MS - MVP - Digital Media Experience J - Notice_This is not tech support_I'm volunteer - Solutions that work for me may not work for you - * proceed at your own risk *.

Maybe you are looking for

  • DVD burner not burning not files

    Hellothe light on the dvd burner that lights up when the driver is in use is constantly on when the pc is turned onand my dvd writer onlyh burns up to 3% and stops,Please what could be the problem and what do you recommend I do.Thanks in advanceAlfre

  • can not scan as I used to

    put new hard drive in the computer and software hp reloaded... I have a pro 8600 printer. until I replaced my hard drive If I wanted to do anything all I had to do is click on hp8600 on the desktop and it would open a window and He asked you what you

  • Why have we not areas for DVD playback?

    ORIGINAL TITLE: generalcomplaint Why have we not areas for DVD playback? I find it extremely shocking when you lock my machines. How dare you treat me this way. Do you think that it is productive? jerk like more. Fool I would classify as. Please expl

  • Age of Empires III: Asian Dynasties uninstalling problem

    I installed Age of Empires III and two packs of its expansion. But when uninstalling, I left the Asian Dynasties and proceeded with the other two, and now I can not uninstall the package Asian Dynasties. Even when I try to install all the Asian Dynas

  • Re-install temporarily deleted software during the upgrade to Windows 7

    After I installed Windows 7, I turned off the computer during the process of reloading of some software that he had temporarily removed.  Quesston: How can I re - load this software?