A day to day diary of troubleshooting steps from the perspective of one Windows admin
A personal Home Page (erichagstrom.com)
A My Space profile
A My Space blog
A RR Home Page
A personal Home Page (redsporch.com)
Lisa's alter-ego (kittyweiser.com)
A photo story (kittynfritz.blogspot.com)
Our family Home Page (thehagstroms.com)
My computer consulting business in Austin Texas (easycom-austin.com)
A corporate home page
A: If your computer is attached to the ad.texas.net or ad.datafoundry.com domain, you are automatically protected. Group policy will install a “patch” when you logon or logoff as well as when you reboot or shutdown your computer. If you are not connected to the domain, or want to ensure that the “patch” is applied run the following command
regsvr32 /u shimgvw.dll
And you can run the following to undo this fix.
Q: I am trying to delete a file on my local machine and I recieve an "Access Denied" error. How can I change the permissions for this file
A: In most cases, this is due to your permissions being set to low. To change permissions for a file, or group of files, right click and choose properties. Then click the Security tab. If you recieve a warning that you do not have access to change permissions, then you need to first take ownership of the files. Otherwise, simply place checkmarks that correspond to the functionality that you need for that file. In order to delete a file, you will need to have at least Modify level permission. To take ownership of a file, click the Advanced button on the security tab. Then click the Owner tab. The windows displays the current owner, and the users that may take ownership. Simply choose the user you want to take ownership and click OK. Some notes about inheritence. Files and folders inherit the security settings of the parent which they were created within. So if File C is inside of Folder C, file C will have Folder C’s permissions. This can be overridden by clearing a checkmark in the Advanced Security section. The same things apply to ownership. Conversly, you can force child objects to inherit the new permissions you set on a folder by checking the appropriate box.
A: Click Start/Run (or press the windows key + R) and type winver. You can also get detailed system information by typing winmsd. The Windows System Information tool is also available from the Start Menu under Accessories/System Tools.
A: Open and command prompt and type ‘set“ without quotes. This will return all current environment variables and their paths.
A: Open the computer management console. You can find this under Control Panel/Administrative tools; You can also start the tool by right clicking My Computer and choosing Manage; or you can type the following at the run or command prompt.
In the computer management console on the toolbar click Action/Connect to Another Computer. Enter the computer name you want to manage and click OK. You can now now expand services and start, stop or restart a service. NOTE: In some cases you may need to open management console with alternate user credentials. Windows allows you to do this by holding down shift and right clicking Computer Management in the Control Panel/Administrative Tools folder and clicking runas; or you can type the following where username is your windows login.
runas /user:domain\username compmgmt.msc
A: Windows Explorer does not provide the facility to use the runas command in order to supply alternate credentials when accessing files. There is a workaround though. You must use Internet Explorer instead. Internet Explorer can also do file browsing and will also allow you to execute with alternate credentials. In order to do so, you need to hold down the shift key while right clicking the Internet Explorer shortcut. You will see runas… in the context menu. Click this and a dialog will present you with login options. You can then use alternate credentials to access your files.
A: If you have deleted a printing job but it won’t go away, try
Q: I have a backup scheduled to run, but when I check the scheduled task associated with the schedule, it reports: Last Result 0x1f and fails.
A: This is due to insufficient permisssions on the target directory that you are saving the backup to. Give the user that is running the task write permissions on this directory and this task will succeed with a 0×0 code.
Q: I have WSUS configured on my W2K3 Server with SP1 applied. My clients are configured with Group Policy to connect to the server for updates. In the C:\windows\WindowsUpdate.log file I see following error:
WARNING: Failed to synchronize, error = 0x80244008
A: From the affected client browse to http://servername/ClientWebService/client.asmx and note any errors. Repeat the steps for http://servername/SimpleAuthWebService/SimpleAuth.asmx. If runtime errors occur, ensure that ASP.net services have been installed on the server.
System.InvalidOperationException: Unable to generate a temporary class (result=1).error CS2001: Source file
A: This is due to Network Service account not having proper permissions on the C:\Windows\Temp folder. Add this user with List Folder/Read Data and Delete permissions.
A: According to http://support.microsoft.com/kb/555452 the problem is that duplicate registry entries are created on each of the cloned machines. The same KB has a batch file that can be run to delete the entries, and recreate them.
A: DFS is a Microsoft technology that allows you consolidate file
shares across multiple servers into a highly available, and easy to use
What it’s good for:
How it works:
A: FRS is a Microsoft Technology that completes file replication and
synchronization for DFS namespaces and SYSLOG shares on Domain
What is going on
In an optimal environment the following would apply
Volume Shadow Copy
Bad things that can happen
The staging folder must be as larger then the biggest file to be replicated and also have room for additional files. 660MB is the default size.
A: You will need to make sure that the printer has auditing enabled. You also need to ensure that the Group Policy that affects this object also has auditing enabled for Object Access.
Q: The folders button is depressed on all My Computer or Explorer windows that I open by default. How can I return to the default behaviour?
A: To change, from windows
explorer, click on Tools, Folder Options, and then the File Types tab.
Find (NONE) Folder in the list and highlight it. Click the Advanced
button. If your issue is the same, explore will be bold. Change it back to open, by clicking on open, then clicking the Set
Default button. Open should now be bold.
A: Offline files are used to allow you access to files located on a
network resource when you are not connected to the network. For
example: You have a laptop that has a drive mapped to a server share
where you store documents. When you are connected to the corporate LAN,
you have access to these files and can edit them directly. When you
disconnect from the LAN you lose access to these files; but you have a
local cache of the the same files that you can work with if your
Offline File Synchronization is enabled. Changes made to these files
are saved in this local cache and upon reconnection the corporate LAN
all changes are synced to the original location on the server share.
A: You can control how Offline Files are handled by changing the settings in the Control Panel/Folder Options Applet and choose the Offline Files tab. Once you are here, you can clear the check mark next to ”Enable Offline Files". All synchronization will stop at this point.
A: Open a command prompt and type:
You will have a list of your environmental variables, one of which is LOGONSERVER=ServerName
A: You can use conditional formatting to highlight the differences.
A: You can use this handy cut and paste trick
A: You have two choices, you can either hide them alltogether, or you can group them under one heading. The following steps need to be completed while you have your IMAP folder selected.
A: You can use the Task Request object.
A: You can use the Meeting Request object.
Q: How do I install the security certificate so that I am not prompted with the Security Warning when I start Outlook
A: In order to trust the certificate that is used to identify the mail server, you must install the proper Certification Authority (CA) certificate. If you double click the certificate, you will be shown it’s details. Here you can click the Install Certificate button. Choose to have it automatically placed in the appropriate store. When you open Outlook the next time, you will not be prompted to accept the Security Certificate.
A: A folder that contains all of your profile information for Thunderbird is created in C:\Documents and Settings\Username\Application Data\Thunderbird. Move (or copy) the entire Thunderbird folder to the same location for the new user.
A: Bluetooth and Wi-Fi (Wireless LAN using 802.11b or 802.11g) both operate in the 2.4 ghz spectrum. Bluetooth uses frequecny hopping and will address the entire range of the 2.4 ghz spectrum. Wi-Fi will use Digital Spread Spectrum and uses only a portion of the 2.4 ghz spectrum determined by the channel selected for that device. The issue is further complicated when you have Bluetooth and Wi-Fi antennae in close proximity. No real solution exists aside from using 5 ghz Wi-Fi (802.11A). Note that cordless phones, microwaves, and even lightning can cause this EMI (electro-magnetic interference.)
Thanks for visiting. Have feedback or questions? email me: erichagstrom at gmail dot com