Monday, July 13, 2009

how to disable chkdsk at startup

did your pc try to scan your hard disk every time you restart or after power on the cpu,but sometime you proceed with the scan there is no errors displaying the hard drive.do you want to stop this annoying process? then follow these steps.

  • first go to the command prompt
  • If you have drive C: as your hard drive
  • then run the command to disable chkdsk from scanning C: drive would be chkntfs /x c:
  • If you have 2 drive, C and D, you can disable chkdsk with the command of chkntfs /x c: d:
The chkntfs utility works by modifying the BootExcecute value in the system registry. The BootExecute value is located in the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CURRENTCONTROLSET\CONTROL\Session Manager

The default value is for BootExecute is autocheck autochk *. When you use the /x switch, it will add a /k parameter prior to the asterisk. The /k parameter excludes volumes from being checked for the presence of a dirty bit.

For example, if you run the command chkntfs /x c: in command prompt. This command would modify this registry entry to autocheck autochk /k:c *

after completing above process successfully your problem will be solved.

Sunday, July 12, 2009

problems while deleting a file

have you facing a problems while deleting the files that you dont want anymore? displaying errors when you try to delete them or rename just like below.
  • Cannot delete file: Access is denied
  • There has been a sharing violation.
  • The source or destination file may be in use.
  • The file is in use by another program or user.
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
with the software called unlocker you can easily delete those files that you dont want to use.this step by step guide shows how to use unlocker in your pc.
  • First install unlocker to your pc
  • Then Simply right click the folder or file and select Unlocker
  • If the folder or file is locked, a window listing of lockers will appear
  • Simply click Unlock All and you are done!
you can download unlocker in http://nstech.synthasite.com/freeware-tools.php

Saturday, July 11, 2009

understanding local groups

a local group is a collection of user accounts on a computer. use local groups to assign permissions to resources residing on the computer on which the local group is created. windows xp professional creates local groups in the local security database.

preparing to use local groups

guidelines for using local groups include the following
  • use local groups on computers that do not belong to a domain
you can use local groups only on the computer on which you create them. although local groups are available on member servers and domain computers running windows 2000 server, do not use local groups on computers that are part of a domain. using local groups on domain computers prevents you from centralizing group administration. local groups do not appear in the active directory service, and you must administer them separately for each computers.
  • you can assign permissions to local groups to access only the resources on the computer on which you create the local groups.
note - you cannot create local groups on domain controllers because domain controllers cannot have a security database that is independent of the database in active directory.

membership rules for local groups include following
  • local groups can contain local user accounts from the computer on which you create the local groups.
  • local groups cannot belong to any other group.

understanding groups

a group is a collection of user accounts. groups simplify administration by allowing you to assign permissions and rights to a group of users rather than to each user account individually.
  • groups are collection of user accounts
  • members receive permissions given to groups
  • users can be members of multiple groups
  • groups can be members of other groups
permissions control what users can do with a resource such as a folder, file or printer. when you assign permissions, you allow users to gain access to a resource and you define the type of access that they have. fro example, if several users need to read the same file, you can add their user accounts to a group and then give the group permission to read file. rights allow users to perform system tasks, such as changing the time on a computer and backing up or restoring files.

password requirenments

to protect access to the computer, every user account should have a password. consider the following guidelines for passwords.
  • always assign a password to the administrator account to prevent unauthorized access to the account.
  • determine whether the administrator or the users will control passwords. you can assign unique passwords to user accounts and prevent users from changing them, or you can allow users to enter their own passwords the first time they log on. in most cases users should control their passwords.
  • use passwords that are hard to guess. for example avoid using passwords with an obvious association, such as a family members name.
  • passwords can contain up to 128 characters, a minimum length of 8 characters is recommend.
  • include both uppercase and lowercase letters (unlike user names, user passwords are case sensitive) numerals and the valid non-alphanumeric characters.