Welcome, Guest
You have to register before you can post on our site.



Search Forums

(Advanced Search)

Forum Statistics
» Members: 539
» Latest member: Jarosz
» Forum threads: 7,286
» Forum posts: 6,227

Full Statistics

Online Users
There are currently 21 online users.
» 0 Member(s) | 21 Guest(s)

Latest Threads
Youth Football Socks Bulk
Forum: General Discussion
Last Post: Delorabegum
09-14-2018, 01:08 PM
» Replies: 0
» Views: 5,878
Custom Precision Gearbox ...
Forum: Networking and Security
Last Post: Delorabegum
08-08-2018, 08:25 AM
» Replies: 0
» Views: 1,171
How To Convert BKF files
Forum: General Discussion
Last Post: Wandasallazars
03-29-2018, 10:46 AM
» Replies: 0
» Views: 5,701
Goal for Mosley: Join Lew...
Forum: General Discussion
Last Post: linlybest
02-09-2018, 07:05 AM
» Replies: 0
» Views: 4,951
Ravens begin exploring QB...
Forum: General Discussion
Last Post: linlybest
02-09-2018, 06:50 AM
» Replies: 0
» Views: 2,701
Will owner Steve Bisciott...
Forum: General Discussion
Last Post: linlybest
02-09-2018, 06:30 AM
» Replies: 0
» Views: 3,107
Todd Gurley Wins NFL Offe...
Forum: General Discussion
Last Post: aliciahuang
02-07-2018, 06:19 AM
» Replies: 0
» Views: 2,581
an Imperfect Super Bowl M...
Forum: General Discussion
Last Post: aliciahuang
02-07-2018, 05:57 AM
» Replies: 0
» Views: 2,456
NHL Power Rankings 2018: ...
Forum: General Discussion
Last Post: aliciahuang
02-06-2018, 06:06 AM
» Replies: 0
» Views: 2,636
Forum: General Discussion
Last Post: aliciahuang
02-06-2018, 05:46 AM
» Replies: 0
» Views: 2,574

Photo Exchange 2013 how to enable circular logging
Posted by: rajeev - 10-06-2017, 09:20 AM - Forum: MS Exchange Server - No Replies

Exchange 2013 maintains a single set of transaction log files for each database. A transaction is defined as any operation that changes the state or contents of the database. The transaction log files for an individual database record all the transactions performed on the database. Records of the transactions are written to the transaction logs before they are made in the database itself, to ensure that all committed transactions can be recovered in the event of a database failure. Exchange 2013 database transaction logs are stored on disk before the transactions are committed to the database file.

How to Enable/Disable Circular logging in Exchange 2013
>Login to ECP
>Go to Server 
>Go to Databases
>Click Maintenance
>Check/uncheck circular logging
Refer as in below screenshot

Once Done you will required to dismount and mount database. 
To dismount click on more and select dismount.
To mount click on more and select mount
you can refer Refer below screenshot

Please do let me know if this helped you.

Print this item

  How To reset windows update components
Posted by: rajeev - 08-30-2017, 12:13 PM - Forum: Windows Administration - No Replies

There may be several issues installing windows update and it throws one or the other error. Frustrated, Please follow below steps to reset windows update components manually.

1) Open command prompt as administrator
2) Stop windows updates services. run command <net stop bits>, <net stop wuauserv>, <net stop appidsvc>, <net stop cryptsvc>
3) Now delete qmgr*.dat file. you can run this command to delete it. <Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat">
4) Rename software distribution folder from C:\Windows\
5) Reset BITS service by running these commands <sc.exe sdset bits D: (A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU)>


6) In command promt run this command to <cd /d %windir%\system32>

7) Register below BITS files:

regsvr32.exe atl.dll
regsvr32.exe urlmon.dll
regsvr32.exe mshtml.dll
regsvr32.exe shdocvw.dll
regsvr32.exe browseui.dll
regsvr32.exe jscript.dll
regsvr32.exe vbscript.dll
regsvr32.exe scrrun.dll
regsvr32.exe msxml.dll
regsvr32.exe msxml3.dll
regsvr32.exe msxml6.dll
regsvr32.exe actxprxy.dll
regsvr32.exe softpub.dll
regsvr32.exe wintrust.dll
regsvr32.exe dssenh.dll
regsvr32.exe rsaenh.dll
regsvr32.exe gpkcsp.dll
regsvr32.exe sccbase.dll
regsvr32.exe slbcsp.dll
regsvr32.exe cryptdlg.dll
regsvr32.exe oleaut32.dll
regsvr32.exe ole32.dll
regsvr32.exe shell32.dll
regsvr32.exe initpki.dll
regsvr32.exe wuapi.dll
regsvr32.exe wuaueng.dll
regsvr32.exe wuaueng1.dll
regsvr32.exe wucltui.dll
regsvr32.exe wups.dll
regsvr32.exe wups2.dll
regsvr32.exe wuweb.dll
regsvr32.exe qmgr.dll
regsvr32.exe qmgrprxy.dll
regsvr32.exe wucltux.dll
regsvr32.exe muweb.dll
regsvr32.exe wuwebv.dll

8) Reset winsock by running command <netsh winsock reset>

9) for proxy settings run <netsh winhttp reset proxy>

10) Start all services stopped in step 2 above <net start (service name)>

11) install latest windows update agent 

12) Restart your computer

Print this item

  Goodbye vSphere Webclient
Posted by: rajeev - 08-26-2017, 05:34 AM - Forum: VMware - No Replies

Yes that is true. VMware is saying good bye to vSphere web client in its future releases. It will be replaced with flash based web client. The next release will no more have vSphere web client. VMware has advised all its customers to start getting used to vSphere client by getting rid of use of web client. 

VMware This blog has more details of this Goodbye vSphere Web client

Print this item

  How to Enable circular logging in Exchange 2010
Posted by: rajeev - 08-24-2017, 10:37 AM - Forum: MS Exchange Server - No Replies

Enabling Circular logging might become essential when you are not using a Backup Exec or backup software which truncate transaction logs automatically. If transaction logs are not getting truncated, these will take huge space on the disk. Enabling circular logging will clear transaction logs automatically. Let us see how you can enable Circular logging on Exchange 2010

Open EMC
Browse to Organization configuration > Mailbox.
Right click Database to which you want to enable circular logging and click on properties.
Click on Maintenance tab and check box "Enable Circular Logging". Click Apply Ok and exit.
Not finished yet. You have to Dismount and then Mount database to effect the changes.

You can also use command shell to do this:

Set-MailboxDatabase -CircularloggingEnabled:$true

Please must see this article prior to making a move to Enable Circular Logging which states Why not to Enable Circular Logging

Print this item

  Petya Ransomware Emerged
Posted by: rajeev - 07-03-2017, 11:08 AM - Forum: Networking and Security - No Replies

Following the recent WannaCry ransomware attack, a new variant leveraging Petya ransomware emerged globally on Tuesday, June 27, 2017 starting in the Ukraine and spreading to millions of potentially affected people around the world. Machines which are up-to-date with Microsoft updates and security patches has a low probability of exposure. Unfortunately, this attack includes the ability to leverage one vulnerable machine on a network and propagate to other machines that were actually current. This has been reported second major ransomware attack in two months.

The malicious software will reach to machine through attachment or from melicious websites. The ransomware infects computers and then waits for about an hour before rebooting the machine. Thereafter it will started encrypting files on the computer. The ransomware takes over machine and will demands $300 as ransom. This ransom is paid in Bitcoins. This is not clear yet who is behind it, but thinkers assume someone who wanted the malware to look like ransomware. It is also guessed that the motive of this attack is destructive against Ukrainian Government. Security researcher Nicholas Weaver told cybersecurity blog Krebs on Security that ‘Petya’ was a “deliberate, malicious, destructive attack or perhaps a test disguised as ransomware”. Pseudonymous security researcher Grugq noted that the real Petya “was a criminal enterprise for making money,” but that the new version “is definitely not designed to make money.

This is designed to spread fast and cause damage, with a plausibly deniable cover of ‘ransomware'. The payment mechanism in the malware was inept to the point of uselessness because it has a single hard coded payment address, meaning the money can be traced. The requirement to email proof of payment to a webmail provider, meaning that the email address can be – and was – disabled; and the requirement to send an infected machine’s 60-character, case sensitive “personal identification key” from a computer which can’t even copy-and-paste, all combine to mean that “this payment pipeline was possibly the worst of all options (sort of ‘send a personal cheque to: Petya Payments, PO Box … ’)”

Almost after one hour of infection Petya will reboot the computer. If you observe that you computer is infected, turn it off completely; Disconnect from Internet. Don't think of paying ransome because the contact details provided may or may not be correct. Format your hard disk and reinstall operating system. Restore your files from backup.

Make sure you have genuine windows and all updates installed including all Microsoft security patches. Ensure good anti virus or Malware protection software is installed. Keep a good backup of important data. Don't open attachment from unknown source. Understand well that nothing on internet is free now-a-days; everything comes packaged with something. Stay protected !!!!

All information above is based on web search and online authentic technical channels. Verify your self before acting in any way.

Print this item

  There are no Remote Desktop License Servers available to provide a license
Posted by: gotzuadmin - 02-22-2017, 07:44 AM - Forum: Windows Administration - No Replies

Its windows server 2012 and you are trying RDP to it but getting kicked out with error "there are no Remote Desktop License Servers available to provide a license .. "

First please ensure that you have configured your terminal service fine. Open gpedit.exe and browse to Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Licensing
You will see three keys there but your focus is only "Set the Remote Desktop licensing mode". Enable this and set License mode Per User but you can change to Per Device if your CALs are like that.
Some people will like to define terminal server name/IP by enabling "Use the specified RD license servers" Though this may not be a mandatory option but you can do if it is required.
Force removing of grace period key from if you had Trial RDS enabled and are expired. Removing that registry key is not as simple like cleaning other registry keys. Here is How to force cleanup grace period registry key .

Verify that RDS licensing server is configured fine. Load Server Manager and goto RD services/Overview / Deployment properties. Click on RD Licensing and use Per user or Per Device as per purchased CALs.
Finally from Administrative Tools open Terminal server License manager and add your CALS and install.

You shall be good to go. Please comment if you have any questions or suggestions.

Print this item

  How to extend terminal server trial license
Posted by: gotzuadmin - 02-22-2017, 07:19 AM - Forum: Windows Administration - No Replies

The terminal trial license period is for 120 days. What if you are still undecided to buy licenses but want terminal server trial license to be extended for another term. Though this is an easy by deleting  l$rtmtimebomb registry key under Grace Period. It looks so simple but no matter if you are logged in as administrator account, you will not be able delete saying permission denied. Taking ownership or elevating rights will not work either.
Here comes to PsExec Tool will be your savior here. How to use it? Follow below simple steps and you will be good to go:

Download Sysinternal Suite from Technet.
Extract the compressed folder. Now you will be see many utilities including PsExec and PsExec64. If your Terminal server is 64 bit then use PsExec64. The syntex is as below:

psexec64 -s -i regedit.exe

This load registry with supreme elevated rights. Browse to below registry and delete   l$rtmtimebomb key

HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\RCM\GracePeriod

Deleting this key will get you activate terminal trial licenses on your server
Deleting a registry may cause your server to crash or stop responding so make sure to export settings before deleting any registry and you should have complete backup of your server and capability to restore from backup
Any suggestion and comment is much appreciated.

Print this item

  Offsite backup module you are using
Posted by: gotzuadmin - 02-03-2017, 10:47 AM - Forum: Backup and Disaster Recovery - No Replies

What Offsite backup module you are using in your network.

Also specify if own cloud storage is supported.


Print this item

  Install and Configure VM ware ESXi 4.1 host
Posted by: gotzuadmin - 01-29-2017, 04:20 PM - Forum: VMware - No Replies

As it was stated in previous post that ESXi 4.1 software has a footprint as small as 70 mb, just like firmware insalled on the system. It comes as embedded in a server's physical hardware by vendor or burnt onto an external USB key. But remember that moving ESXi embedded on USB external key from one server to another is not supported. The ESXi software also comes as an installable CD/DVD.

Let's now proceed with the installation. We are considering Dell server which meets all pre-rquisits, hardware requirements etc. and we are installing from a DVD. To know more about hardware requirements please visit below link: http://kb.vmware.com/kb/1022101

Turn on the server, insert the DVD and boot from disk. Once installation is initiated, it will take few minutes to complete without any further keyboard inputs and you will be presented with following screen after installation is complete.

Next step is to configure your ESXi 4.1 host. Press F2 to go to configuration screen. You will be prompted for user name password. By default admin user is 'root' and password is blank. Once you login you will reach to configuration console know as (DCUI) Direct Console User Interface. The DCUI looks as below:
First thing is to configure root password. It is important to configure root password to be able to login to vSphere client. 

-Configure Host Name
-Configure IP Address, Subnet mask, Gateway
-Configure DNS servers.

Once above configuration is done, press F2 to exit the DCUI and F12 to reboot your host. Make sure you add a host record to your DNS server for this ESXi host. Now you are ready to create virtual machines on your ESXi 4.1 host. Open browser on any machine in the same subnet in which you have your host. Type the host name or IP address of your ESXi 4.1 host and you will be presented with below screen:

Click Download vSphere Client, once download completes continue with the istallation. Once installation is complete launch vSphere client from Start > All programmes >> enter the IP address or Host Name of your ESXi 4.1 host >> user name - root and password.

You are now in virtualisation world, explore all settings and my next post will be about creating virtual machines.

Print this item

  VMware vSphere Disk Provisioning for a Virtual Machine
Posted by: gotzuadmin - 01-29-2017, 04:17 PM - Forum: VMware - No Replies

VMware vSphere Disk Provisioning for a Virtual Machine

There are two type of provisioning; Thin and Thick but in production Thick is widely practiced. Thick provisioned disk takes entire allocated space and give better performance. Though thin provisioned disk does not require entire allocated space immediately but if you have more number of thin provisioned disks in your vSphere environment, high chances are that datastore will run out of disk space. More over performance too is lower in thin provisioned disk as compared to thick provisioned disk.

Apart from provisioning disks you will have to be careful in selecting type of Virtual disk; i.e. Independent disk or non-Independent. First and far-most Independent disks are non-snapshot supportive. That means if you create an Independent disk you have further two options to select which are Persistent or Nonpersistent.

If you select an Independent disk in Persistent mode that means data is written to disk permanently.

If you select an Independent disk in Nonpersistent mode that means data written to disk is not permanent. The Virtual machine will loose all changes when it is rebooted. 

Print this item