Académique Documents
Professionnel Documents
Culture Documents
Desktop Certification
Reference Materials
Disclaimer: This document contains proprietary information of Wipro Ltd IAS. No part of this publication may be reproduced,
stored in a retrieval system or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording
or otherwise, without the prior written permission of Wipro Ltd. IAS. The information contained herein is confidential to Wipro
Ltd. IAS and its Service Partners, shall not be distributed to any persons other than those involved in the assessment &
delivery of services. Wipro Ltd. IAS reserves the right to revise and update this document as and when required. Wipro Ltd.
IAS reserves the right to withdraw the document excluding customer specific information at the time of termination of services.
All product names referenced herein are trademarks of their respective companies.
2010 Wipro Ltd Internal & Restricted
Topics - Overview
Hardware
Basics
Troubleshooting
Networking
N Computing
Peripherals
Software
Process
Antivirus
Endpoint Apps.
Internet/Intranet
Linux Basics
Mail Clients
Toolkit
Unistall
Windows OS
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Standard Installation
Process
HARDWARE BASICS
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
MEMORY TYPES
ADDON CARDS
SDRAM
DDR
or DDR1
DDR2
DDR3
Power Supply(SMPS)
150 Watts
200 watts
250 watts
300 Watts
350 watts
Housing
ATX HOUSING
MATX HOUSING
SFF HOUSING
Processors
Intel & AMD Processors
Mother Boards
Intel and Non-Intel M/B
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Housing/Chassis
AT Housing
ATX Housing
SFF Housing
Input/Output Devices
Keyboard, Mouse, Monitors
Printers, Camera, Micro Phone, Head
Phones/Speaker, Scanners, Printers, Plotters etc.
Power Supply:
Supplies power throughout the computer. Power supplies converts
potentially lethal 110-115 or 220-230 volt alternating current (AC) into a steady
low-voltage direct current (DC) usable by the computer. A power supply is
rated by the number of watts it generates.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Optical Drives:
CD-ROM :
A CD-ROM (Compact Disk Read Only Memory) is a drive which reads
aluminum-coated round plastic discs however does not write to the discs
invented in the United States 1972
OTHER CD TECHNOLOGIES:
CD-R /- (CD Recordable) Drive which you are able to write to once. Once the
drive is written to it cannot be erased.
CD-RW - (CD ReWritable) drive which is a popular alternative to the CD-R
drive. CD-RW has the capability of being written to at least one thousand times.
8
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
DVD (Digital Versatile Disc or Digital Video Disc) - Is the new future of computer
CD-ROM drives. DVD drives became a new computer standard September of 1995
The DVD technology is very different from the technology used in standard
CD-ROM drives. DVD uses shorter wavelength lasers to read smaller pits and
lands. Discs also have two layers the first layer is semi-reflective to allow the laser
to penetrate it and get to the substance beneath it.
DVD drives also spin at a base speed that is about three times as fast as a single
speed CD-ROM drive.
DVD-ROM : DVD-RAM will be capable of holding 2.6GB per side.
DVD-RW : Standard of ReWritable DVD discs being promoted by Hewlett
Packard , is capable of holding 4.7 GB of data.
DIVIX: (Digital video express) - New DVD-ROM which was developed and
promoted by several large companies including Disney, Dreamworks SKG, The
Divix player is more expensive then a standard DVD drive
9
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Mbit/s
RPM
150
1.23
200-500
300
2.46
400-1,000
600
4.92
800-2,000
1,200
9.83
1,600-4,000
10
1,500
12.3
2,000-5,000
12
1,800
14.7
2,400-6,000
20
1,200-3,000
up to 24.6
4,000 (CAV)
32
1,920-4,800
up to 39.3
4,800 (CAV)
36
2,160-5,400
up to 44.2
7,200 (CAV)
40
2,400-6,000
up to 49.2
8,000 (CAV)
48
2,880-7,200
up to 59.0
9,600 (CAV)
52
3,120-7,800
up to 63.9
10,400 (CAV)
56
3,360-8,400
up to 68.8
11,200 (CAV)
6,750-10,800
up to 88.5
2,000 (multi-beam
72
10
KiB/s
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
IDE HDD
11
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
13
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
15
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
16
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
17
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Processor
The processor (CPU, for Central Processing Unit) is the computer's brain. It allows the
processing of numeric data, meaning information entered in binary form, and the
execution of instructions stored in memory.
Hyper threading is the technology used in processors which enables one processor to act as
a multiple processor. In multi-core architecture, more than one processors are integrated
in one physical packaging.
Current Processors:
Dual Core & Core 2 Duo
Runs two independent processor cores in one physical package at the same frequency.
Quad Core:
Runs 4 independent processor cores in one physical package at the same frequency.
18
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Dual Core
19
Core 2 Duo
Clock Speed
Power Consumption
Cache Support
FSB Speed
Cost
These processors are priced from $120 to $270 for different versions of
processors Higher Cost
Over-locking
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
20
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
21
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
28
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
LPX form factor motherboards also often come with on board video
display adapter cards built into the motherboard. If the card built in is of
good quality, this can save the manufacturer money and provide the
user with a good quality display However, if the user wants to upgrade to
a new video card, this can cause a problem unless the integrated video
can be disabled in the Bios setup. LPX motherboards also usually come
with serial, parallel and mouse connectors attached to them, like ATX.
While the LPX form factor can be used by a manufacturer to save
money and space in the construction of a custom product, these
systems suffer from non-standardization, poor expandability, poor
upgradability, poor cooling and difficulty of use for the do-it-yourselfer.
They are not recommended for the homebuilder, but if you are upgrading
one of these systems, you may not have many alternatives.
33
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
The system BIOS is what starts the computer running when you turn it on. The
following are the steps that a typical boot sequence involves. Of course this will vary
by the manufacturer of your hardware, BIOS, etc., and especially by what
peripherals you have in the PC. Here is what generally happens when you turn on
your system power:
The internal power supply turns on and initializes. The power supply takes some
time until it can generate reliable power for the rest of the computer, and having it
turn on prematurely could potentially lead to damage. Therefore, the chipset will
generate a reset signal to the processor (the same as if you held the reset button
down for a while on your case) until it receives the Power Good signal from the
power supply.
35
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
The BIOS performs the power-on self test (POST). If there are any fatal
errors, the boot process stops.
The BIOS looks for the video card. In particular, it looks for the video card's
built in BIOS program and runs it. This BIOS is normally found at location
C000h in memory. The system BIOS executes the video card BIOS, which
initializes the video card. Most modern cards will display information on the
screen about the video card. (This is why on a modern PC you usually see
something on the screen about the video card before you see the messages
from the system BIOS itself). The BIOS then looks for other devices' ROMs to
see if any of them have BIOS. Normally, the IDE/ATA hard disk BIOS will be
found at C8000h and executed. If any other device BIOS are found, they are
executed as well. The BIOS displays its startup screen The BIOS does more
tests on the system, including the memory count-up test, which you see on
the screen. The BIOS will generally display a text error message on the
screen if it encounters an error at this point.
36
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Power-On Self Test (POST) :The first thing that the BIOS does when it boots the PC is to perform
what is called the Power-On Self-Test, or POST for short. The POST is a
built-in diagnostic program that checks your hardware to ensure that
everything is present and functioning properly, before the BIOS begins
the actual boot. It later continues with additional tests (such as the
memory test that you see printed on the screen) as the boot process is
proceeding.
The POST runs very quickly, and you will normally not even noticed that
it is happening--unless it finds a problem. You may have encountered a
PC that, when turned on, made beeping sounds and then stopped
without booting up. That is the POST telling you something is wrong with
the machine. The speaker is used because this test happens so early on,
that the video isn't even activated yet! These beep
39
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
( E4XXX)
40
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
41
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
42
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
43
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Standard Memory
name
clock
45
Cycle
time[2]
I/O bus
clock
100 MHz
133 MHz
166 MHz
200 MHz
Data
transfers
per
second
200
Million
266
Million
333
Million
400
Million
JEDEC
standard
VDDQ
voltage
Module
name
2.50.2 V PC-1600
2.50.2 V PC-2100
2.50.2 V PC-2700
2.60.1 V PC-3200
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Peak
transfer
rate
1600
MB/s
2100
MB/s
2700
MB/s
3200
MB/s
SDRAM
SDRAM is a dynamic random access memory (DRAM) that
has a synchronous interface. Traditionally, dynamic random
access memory (DRAM) has an asynchronous interface.
SDRAM is widely used in very old computers; from the original SDRAM further
generations of DDR (or DDR1), and then DDR2 and DDR3 have entered the mass
market, with DDR4 currently being designed
46
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
DDR RAM
47
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
PC2-3200
PC2-4200
PC2-43001
PC2-5300
PC2-54001
3200 MB/s
Data
transfers
per
second
400
200 MHz Million
533
266 MHz Million
667
333 MHz Million
800
400 MHz Million
1066
533 MHz Million
PC2-6400
PC2-8500
PC2-86001
6400 MB/s
Standard Memory
name
clock
Since the memory clock runs at half the external data bus clock rate, DDR2
memory operating at the same external data bus clock rate as DDR will
provide the same bandwidth but with higher latency, resulting in inferior
performance. Alternatively, DDR2 memory operating at twice the external
data bus clock rate as DDR may provide twice the bandwidth with the same
latency (in nanoseconds). The best-rated DDR2 memory modules are at least
twice as fast as the best-rated DDR memory modules.
48
Cycle
time
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
I/O Bus
clock
Module
name
Peak
transfer
rate
4266 MB/s
5333 MB/s
8533 MB/s
Timings[2][3]
3/3/3
4/4/4
3/3/3
4/4/4
4/4/4
5/5/5
4/4/4
5/5/5
6/6/6
6/6/6
7/7/7/
49
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
HARDWARE BASICS ATA's ribbon cables have had 40 wires for most of its history (44 conductors
for the smaller form-factor version used for 2.5" drives - the extra four for
power), but an 80-wire version appeared with the introduction of the Ultra
DMA/33 (UDMA) mode. All of the additional wires in the new cable are
ground wires, interleaved with the previously defined wires to reduce the
effects of capacitive coupling between neighboring signal wires, reducing
crosstalk. Capacitive coupling is more of a problem at higher transfer rates,
and this change was necessary to enable the 66 megabytes per second
(MB/s) transfer rate of UDMA4 to work reliably. The faster UDMA5 and
UDMA6 modes also require 80-conductor cables.
ATA cables:
`Though the number of wires doubled, the number of connector pins and the pin-out
remain the same as 40-conductor cables, and the external appearance of the
connectors is identical. Internally the connectors are different; the connectors for the
80-wire cable connect a larger number of ground wires to a smaller number of ground
pins, while the connectors for the 40-wire cable connect ground wires to ground pins
one-for-one. 80-wire cables usually come with three differently colored connectors
(blue controller, gray slave drive, and black master drive) as opposed to
uniformly colored 40-wire cable's connectors (all black). The gray connector on 80conductor cables has pin 28 CSEL not connected; making it the slave position for
drives configured cable select
50
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
AT (Advanced technology):
They are similar to the original motherboards found in the IBM AT. The
microprocessor, memory and expansion slots are all in line with each other.
The advancement in the field of electronics resulted in the design of
smaller components that occupied less space. This configuration is known as
Baby AT
ATX:
The ATX motherboard has the microprocessor and memory slots at right
angles to the expansion slots. This puts the microprocessor and memory in
the same line with the fan output of the power supply allowing the
microprocessor to cool. In addition, more space was available, as the
microprocessor and memory were not in line with the expansion slots.
51
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
52
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
A 6-circuit FireWire
400 (IEEE) alpha
connector
Serial Port
Parallel Port
LPT
DIN Connector
USB
53
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Fire ware:
Video:
Power Cord
Mini Jack:
54
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
56
Agenda
Basics of Networking
Networking Standards
Network Devices & Definitions
TCP/IP Network Addressing
VLAN & ARP
Basic Definitions for L2 & L3 Networks
57
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Basics of Networking
What & Why is Network
Distribute pieces of computation among computers (nodes)
Coordination between processes running on different nodes
Remote I/O Devices
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Basics of Networking
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Basics of Networking
Physical Layer:
o Standardized protocol dealing with electrical, mechanical and signaling interfaces.
o Concerned with the transmission of bits
Data Link Layer:
o Logical Link Control (LLC) defines how data is transferred over the cable and
provides data link service to the higher layers.
o Medium Access Control (MAC) defines who can use the network when multiple
computers are trying to access it simultaneously (i.e. Token passing, Ethernet
[CSMA/CD], etc...).
o Handles errors in the physical layer.
o Groups bits into frames and ensures their correct delivery.
Network:
o Concerned with the transmission of packets.
o Choose the best path to send a packet (routing).
o It may be complex in a large network (e.g. Internet).
o Shortest (distance) route vs. route with least delay.
o Most popular protocol widely used is x.25 and TCP/IP
60
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Basics of Networking
Transport Layer:
o Network layer does not deal with lost messages.Transport layer ensure reliable
service. It breaks the message (from sessions layer) into smaller packets, assigns
sequence number and sends them.
o TCP/IP is widely used for network/transport layer. UDP (Universal Datagram
Protocol): Internet connectionless transport protocol.
Session & Presentation Layer:
o Just theory! Very few applications use it.
Application Layer:
o Collection of miscellaneous protocols for high level applications
o Electronic mail, file transfer, connecting remote terminals, etc.
o E.g. SMTP, POP, IMAP, FTP, Telnet, SSH, HTTP, HTTPS, SNMP, etc...
61
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Networking Standards
62
IEEE 802
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.5
IEEE 802.11
IEEE 802.15
IEEE 802.16
IEEE 802.17
: Internetworking
: Bridging & Management
: Logical Link Control
: CSMA/CD (Ethernet) Access Method
: Token Ring Access Method
: Wireless
: Wireless Personal Area Networks
: Broadband Wireless MAN
: Resilent Packet Rings
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
SWITCHES
BRIDGES
ROUTERS
FIREWALL
63
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
64
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
65
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
66
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
67
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
68
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
69
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
The following table displays several common netmask values in both the dotteddecimal and the mask-length formats.
70
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
72
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
73
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Network Cabling
Ethernet Straight Cabling:
The UTP cable contains eight conductors, arranged in four twisted pairs, and is
terminated with an RJ45 type connector. A normal straight-through & Cross
Over UTP Ethernet cable follows the EIA568B standard wiring as described
below.
Straight Through
Cross Over
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
N Computing
76
Host PC
(User 1)
User 2
User 3
User 4
User 5
User 6
User 7
77
How it Works
NComputing Terminal
Services software sets
up Virtual Independent
Desktops inside one
Windows or Linux PC.
78
NComputing User
eXtension Protocol
(UXP) delivers an
efficient secure,
multimedia interface.
NComputing Virtual
PCs are small, silent,
energy-efficient,
reliable, and very
inexpensive.
Ncomputing X300
The X300 access terminal kit enables you to dramatically cut computing
costs by sharing the untapped power of PCs.
The kit includes three access terminals, one PCI card, and terminal
services software that work together to efficiently harness excess
computing capacity and enable multiple users to share a single PC. It is
easy to manage and is compatible with standard PC applications.
The terminal services software for the X300, divides the host PC's
resources into independent sessions that give each user their own
robust PC experience. One PC can support up to seven users.
Supports multiple resolutions
1024x768, 800x600, 16-bit color
Small, efficient and eco-friendly
With a small footprint and no moving parts, the X300 runs completely
silent and saves energy by using
only 5 watts. It's design meets strict environmental guidelines and is
RoHS compliant.
79
Sophisticated Software
Desktop Virtualization
Simple Hardware
Virtual PC (access terminal)
Not a PC!
80
No CPU
No storage
No software
Technology
Minimum System Requirements
For one X300 PCI card, a host PC with at least the following:
A 1.3 GHz processor
512 MB RAM
Keyboard, mouse, and monitor required for each access terminal
Speakers optional for each access terminal (amplified speakers recommended)
For two X300 PCI cards, a host PC with at least the following:
A 2.4 GHz processor
1 GB RAM
Keyboard, mouse, and monitor required for each access terminal
Speakers optional for each access terminal (amplified speakers recommended)
Operating Systems
Windows
Linux
81
How it works
82
The end-user still has their own monitor, keyboard, mouse and speakers
Instead of connecting directly to a PC, these peripherals connect to the
small NComputing access terminal on their desk.
The access terminals then connect either directly (X Series) or over
Ethernet (L Series) to the host computer Generally 2D games are
supported at the moment. Casual games (Java and Flash), which can be
played on the Internet, are also supported.
High performance 3D games, which require a high speed GPU (Graphic
Processor Unit) and a hardware accelerated function, are currently not
supported. Other games including single user games which require a CD
for operation are not supported.
A game, which is designed to be used only on the same computer by
checking the IP, is not supported. Windows itself checks out those
specifications and rejects more than one loading, and thus those games are
not supported.
Advantages
The system has been designed to be highly efficient so as
not to require x86-class CPUs and chipsets like traditional
thin client devices.
Very low power requirements (less than 5 Watts)
No Obsolescence
MTBF - 45 years
Low cost of acquisition and Maintenance
Zero foot printVESA mounting
83
Environmental Impact
Saves 95%
in electricity
failures
UL, RoHS, ISO 9001 certified
84
Product Overview
X Series
Lowest Cost
Ultimate multimedia performance
PC in same room (10m)
1 watt per user
Up to 7 users can share one Low End PC
PCI-based X300
L Series
Ethernet-based L230
85
Step 4: Install
NComputing software
on Host PC directly or
via imaging software
(like Ghost)
86
87
88
NComputing L Series
Ethernet
switch
Highlights
Ideal for business and schools
Up to 30 users connected to a high-end
PC/server
Ethernet-connected, so no distance
limitation
5-6 watts per user
Windows or Linux
L200
90
91
Microphone
The L230 includes a microphone port.
Minimum System Requirements
Host Computer
For multiuser applications the host computer operating system can be
Windows Server 2003 R2 SP2 (Standard or Enterprise Edition, 32-bit),
Windows Server 2008 SP2 (Standard or Enterprise, 32-bit), or supported
Linux distributions.
92
94
Windows 7
95
Windows 7
Windows 7 Starter
Windows 7 Home Premium
Windows 7 Professional
Windows 7 Ultimate
96
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Flavors in Windows 7
97
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Windows 7
Windows 7 system requirements
98
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Windows 7
99
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
100
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
102
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
103
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
104
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
105
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
106
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
107
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Windows 7 Administration
http://windows.microsoft.com/en-IN/windows7/help/top-solutions
108
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
With Windows 7, you can lock your workstation so that no one can
access your computer if you are temporarily away from your desk.
Whether you are away from your computer for a few minutes, several
hours, or an entire day, Windows 7 provides you with an efficient method
for safeguarding your computer and the data stored on it.
109
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
110
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
111
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
You can use the search box above the Start button to quickly search for programs, settings, and files.
Searching Control
Panel
You can use the search box in the upper-right corner of Control Panel to quickly search for Control Panel settings you can
configure.
Searching Libraries
You can click the Windows Explorer icon on the taskbar and then use the search box in the upper-right corner of the Windows
Explorer window to quickly search for files stored in your libraries.
You can also open a specific library, such as Documents, in Windows Explorer and search for files stored in that library.
112
Searching document
properties and text with
hit highlighting in the
results
When you search libraries, both the properties and contents of documents are searched. The results of your search are
highlighted so you can see which documents match your search.
When searching libraries, you can use a search filter to refine your search. The filter options displayed vary depending on the
type of library being searched.
Windows maintains a list of your recent searches so that you can quickly rerun them if needed.
Saving a search
You can save a search so that you can rerun it later. Saved searches are added to your list of Favorites in Windows Explorer.
Searching again in
other locations
If your search does not return the results you hoped for, you can search again in other locations, including the Internet.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
113
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Task
Description
If your computer does not have a TPM chip, your network administrator can configure a policy
that allows the Bit Locker encryption key to be stored on a USB removable storage device,
such as a flash drive.
Enable Bit Locker on a Data
Drive
Data drives are internal disk drives that do not have an operating system installed on them. You
do not need a TPM chip on your computer to encrypt a data drive by using Bit Locker.
USB removable storage devices include external hard drives, flash drives, and other memory
devices. You do not need a TPM chip on your computer to encrypt a USB removable
storage device by using Bit Locker To Go.
115
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
116
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Click on the Network Icon in the system tray. You will see
the networks available. Open Network Sharing Centre &
Check the options available to connect. Click on Set up a
New connection on Network to set the new
connection/Sharing options as shown below.
Click on the Choose Home group & Sharing Options for
Local/Public File & Folder sharing in the Local/Public
Network.
117
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Feature
Scenario Example
What it Does?
VPN Reconnect
118
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Scenario Example
What it Does?
Mobile Broadband
DirectAccess
119
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
bcdedit is the command to edit boot loader in Win 7. The command perfmon is used to
monitor the system performance.
120
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
Advance Boot Options for Windows 7 Continued
121
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
122
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
System Restore
123
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
124
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
125
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting Windows 7
126
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting - Windows 7
To make Windows 7 Faster
1. Keeping an eye about the hard drive space. Do not save big files in primary
partition.
2. Regularly cleaning out unused files you no longer use, Remove temp files.
3. Removing the applications which are not in use.
4. Limit only necessary files in the start up.
5. Checking errors on a regular schedule.
6. Defragmenting disk regularly.
7. Turn on Automatic Updates & Make sure they are getting installed.
8. You ought to also enable the write cache of hard disk. Write caching implies
that windows 7 doesn't flush changed data to the disk before system is idle,
which improves performance.
Click "Start" and point to "Search".
Input "device" into the research box and Press "Search".
Select "Device Manager" within the research results.
Open the Disk Drives branch.
Click the hard disk for its property sheet.
Activate "Enable Write Caching" on the Device check box.
For maximum performance, activate the "Turn Off windows WriteCache Buffer Flushing on the Device" too.
Click "OK" for faster windows 7.
127
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting - Windows 7
How to connect to internet:
http://windows.microsoft.com/en-us/windows7/setting-up-a-home-network
http://windows.microsoft.com/en-us/windows-vista/Using-ICS-Internet-ConnectionSharing
128
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Windows Vista
129
System Requirements
Basic
Modern 800MHz processor
512MB RAM
DirectX 9 Graphics
Premium ready
1 GHz x86 or x64 processor
1GB RAM
DirectX 9, WDDM, 128 MB graphics RAM,
Pixel Shader 2.0, 32 bits per pixel
DVD-ROM
Audio
Internet Access
130
Windows Vista
132
Software's
IE7 comes as standard
Note no support from Oracle yet
For OSS and Financials
133
134
135
136
138
1.
2.
3.
4.
A: The likely reason for this is because your system is probably already configured to use this
device with ReadyBoost. Therefore the popup message will not be displayed. To double check
the settings try this:
Go to Start
Right click Computer
Right click the USB drive letter in question
Click the ReadyBoost tab
2010 Wipro Ltd Internal & Restricted
139
140
141
142
143
144
145
146
147
148
149
Windows XP
151
Windows XP - Basics
The following editions are available with XP
152
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
153
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
154
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Stop: 0x0000000A Error This error usually indicates that Windows attempted to access a particular memory address at too high
an internal request level (IRQL). This error usually occurs when a hardware driver uses an incorrect memory address, but can
also indicate an incompatible device driver or a general hardware problem. To troubleshoot this error, confirm that your hardware
is listed in the Windows Catalog, make sure that your BIOS is compatible with Windows XP Professional, and perform general
hardware troubleshooting. You can learn more about troubleshooting this stop error by reading Microsoft Knowledge Base article
314063, Troubleshooting a Stop 0x0000000A Error in Windows XP.
Stop: 0x0000007B Error This error normally indicates that you have an inaccessible boot device, meaning that Windows cannot
access your hard disk. The common causes for this type of error are a boot sector virus, bad or incompatible hardware, or
missing hardware drivers. You can learn more about troubleshooting this stop error by reading Microsoft Knowledge Base article
324103, How to Troubleshoot Stop 0x0000007B Errors in Windows XP.
156
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Issue: How to change the logon window and the shutdown preferences in Windows XP.
Use the classic logon screen
To temporarily use the classic logon screen, press CTRL+ALT+DEL two times on the Welcome logon screen.
To configure Windows XP to use the classic logon and shutdown screens for every logon session, follow these steps:
1. Click Start, and then click Control Panel.
2. Double-click User Accounts.
3. Click Change the way users log on or off.
4. Clear the Use the Welcome screen check box.
Note If you turn off the Welcome logon screen, you also turn off the Fast User Switching option.
Require users to press CTRL+ALT+DEL before the classic logon screen appears
159
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
160
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
161
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Code 32: A driver (service) for this device has been disabled. An alternate driver may be providing this functionality. (Code 32)
Recommended resolution
The start type for this driver is set to disabled in the registry. Uninstall the driver, and then click Scan for hardware changes to
reinstall or upgrade the driver. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting
Wizard. If the driver is required, and if reinstalling or upgrading does not work, change the start type in the registry using Registry
Editor. For more information, see the Registry Reference in the Microsoft Windows 2000 Server Resource Kit at:
Code 33: Windows cannot determine which resources are required for this device. (Code 33)
Recommended resolution
The translator that determines the types of resources required by the device has failed. Contact the hardware vendor, and configure
or replace hardware. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 34: Windows cannot determine the settings for this device. Consult the documentation that came with this device and use the
Resource tab to set the configuration. (Code 34)
Recommended resolution
The device requires manual configuration. Change the hardware settings by setting jumpers or running a vendor-supplied tool, and
then use the Resources tab in Device Manager to configure the device. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.
163
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
164
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
167
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Internet Explorer
168
Internet Explorer
How to install & repair the IE?
Please refer the link:
http://support.microsoft.com/kb/318378
Other Tips:
Internet Explorer 8 is the default web browser with Windows 7 while IE 7 is the default
with Windows Vista.
After opening IE, If you click on Help -> About, You will be able to find the exact version
of Internet Explorer.
In the corporate environment, Customer may be browsing the net through proxy. Some
of the sites may be blocked in the office by customer IT Team through proxy. The proxy
settings should be done from the Tools Menu - > Internet Options - > Connections ->
Proxy Settings. The proxy server name & The default port should be mentioned clearly.
In home broadband or through Data Card, This setting should be disabled.
Too much temporary files/cookies may lead to the slow browsing or IE not working
properly. Go to Tools -> Internet Options & Click on Clear Cookies, Clear Temp Files.
Read the following topics as well to understand the Security Zone troubleshooting.
http://support.microsoft.com/kb/182569
169
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Mail Clients
170
171
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
After noting these details, Cancel all the screens. Please take the back up of mails. The easy way to
take the back up of the folder is as follows.
172
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
As shown above, Select the folder path, Right click & Copy the same.
Close the Outlook Express. Then, Go to run, Paste the same path. Delete Inbox.dbx at the end, As
shown in the next slide.
173
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
174
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
175
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
177
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
One more problem observed, The sent mails will be copied to Outbox
& Will not be removed. Every time when new mails sent, The old
mail will be sent again.
Solution: Close the Outlook Express after copying the folder path. Go
to Run & Paste the path, as illustrated above picture. The folder will
be opened. Delete the Outbox.dbx file.
Close the Folder, Open the Outlook Express & Check now. The
problem will be resolved.
178
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
179
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
180
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Your Name
Your first and last name.
E-mail Address
Your email address.
User Name
Your email address, again.
Password
Your email account password.
Incoming mail server (POP3)
POP, Pop.secureserver.net or IMAP, imap.secureserver.net.
Outgoing mail server (SMTP)
Smtpout.secureserver.net
send e-mails, you must first activate SMTP relay on your e-mail account. Log on to your
Manage Email Accounts page to set up SMTP relay. If you do not have SMTP relay set up
and your Internet Service Provider (ISP) allows it, you can use the outgoing mail server for
your Internet Service Provider. Contact your Internet Service Provider to get this setting.
181
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
182
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Go to the Advanced tab, and then change the Outgoing server (SMTP) port to 80 or 3535, As
shown in the right side picture.
Click on OK. Click next & Click on Finish. This completes the configuration.
183
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
191
Open Office
192
Open Office
In case you want to remove the borders, in the same above window, Go to the Borders tab and select None.
193
Open Office
194
Open Office
195
Open Office
8. Find & Replace
Ctrl+F is used for "Find and Replace".
9. Header and Footer
To add a header to a page, choose Insert - Header, and then select the page
style for the current page from the submenu.
To add footer to a page, choose Insert - Footer, and then select the page
style for the current page from the submenu.
You can also choose Format - Page, click the Header or Footer tab, and
then select Header on or Footer on. Clear the Same content left/right
check box if you want to define different headers and footers for even
and odd pages.
To use different headers or footers in your document, you must add them to
different Page Styles (explained below in Section 11), and then apply the
styles to the pages where you want the headers or footer to appear.
196
MS Office
To know about MS Office installation & repair, Please refer the below link:
http://support.microsoft.com/kb/924611
197
Peripherals
198
Printers
Before starting the troubleshooting, Please check the physical connectivity of the Printer
& also ensure that the device is online, No error indication from the printer. Also ensure
that the papers are in place properly.
Printer Self Test
Most printers have a way of printing a test page. This page allows you to determine if the
printer is physically working or not. This test is usually accomplished by holding down a
series of keys. If you are not sure if your printer has this feature or how to perform it
refers to your manual or visit the printer manufacturers web site. If this is not giving the
printout does mean there is a problem with the device.
If its printing properly with the key combinations, It does mean that the device is
working fine, Need to check connectivity & Driver or even the LPT/USB Port.
In addition to testing the printer using the printer self-test Microsoft Windows users can
also perform software self-test to determine if their computer is able to see the printer and
it's able to print. Follow the below steps to perform this test.
199
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Printers
Printer Self Test:
Microsoft Windows XP, 2003, and Vista users
Click Start, Settings, and open Control Panel.
Double-click the Printers or Printers and Fax Icon.
Right-click on the Printer you wish to test and click Properties. If you do not see your printer listed
your printer is not installed
In the Printers Properties window click the Print Test Page button.
If the printer is able to print a test page, you're printer is installed and setup properly. However, if
you're unable to print in other programs it's possible that the program you're attempting to print from,
has issues.
You can also test by printing Print a test page from MS DOS, If you suspect a problem in Driver
settings.
Get to a MS-DOS prompt Type cmd in run or from programs search.
Get to the root directory - Type cd\
Reroute dir to printer - Type dir >prn or dir >lpt1
If the device is printing from MS DOS & Not printing from Windows, Its the problem with the
driver. Else you can check the connectivity or the problem with the device.
In case of USB Printer, You have to check the USB port is working properly or not. Check with other
USB Ports & Even try uninstalling all the USB Ports from Device Manager & Restart the desktop.
200
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
201
202
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
TSG Toolkit CD
Manual
203
204
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Features
Features
This CD contains various tools which help you to diagnosis your hardware.
Tools Included :
CPU Stress Test
a) CPU Burn-in
Ver. 1.0
b) Stress CPU
a) Memtest86+
Ver. 2.11
Memory Test
Ver. 1.01
CPU information
a) Intel Processor Frequency ID ( P3 and below)
Ver. 7.2.20041115
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Features: Contd.
System Information Tool
ASTRA ( Limited Feature)
Ver 5.31
Ver 4.15
b)
Ver. 7.0
c)
Ver. 2.13b
Note: you have to reboot the Machine after testing of one tool. Dont continue from DOS
applications
206
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
207
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Menu
Once you Press Enter ,You will get TSG Tool Ver 2.0 CD Menu
Screenshot is showing ver 1.1 but screen will remain same in ver 2.0
Sometimes in new Machines , you are not able to see screen
given below and machines will hangs then in this case , Please
enable the AHCI Mode in BIOS.
208
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Submenu
Press Enter On Motherboard tools ( For Tool Number 1 to 5 which is
mentioned in Features paragraph. Once you press Enter you will get Menu
of different Tests
209
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
CPU Test
Select CPU Tests for checking Load test/Heat issue with CPU and
Heatsink.You can select any CPU test and This test will continue run until
you reboot the Machine. We recommended to run it for atleast 30
minutes.
210
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Memory Test
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
212
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
213
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
CPU Information
For Checking CPU information ,Select CPU information Menu
214
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
215
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
This tool will give you full information but in a limited manner but thats
sufficient for you.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
218
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
This screen also displays information about the drives such as the Model Number and Serial
Number. Seagate model numbers begin with the letters "ST". Seagate serial numbers are
alpha numeric and eight characters long.
219
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
220
The "SHORT Test" is adequate for most situations. Consider running the "LONG Test" which
reads each sector on the drive if you need to run a more comprehensive test.
The "LONG Test" test will take a long time to complete. Because the "LONG Test" reads every
sector on the drive, the amount of time required will depend on the speed and capacity of
the disc drive. The highest capacity drives often take 2 to 3 hours to complete. At any time,
feel free to Cancel the test without harming the drive. The "LONG Test" will collect
information about possible defects. If any defect are found, a list will be offered at the end or
after aborting the scan. You will have the opportunity to attempt to repair the problem
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
221
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
222
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
TSG Utility CD
Antivirus Tools :
AVAST Antivirus Removal Tool:- This tool will help you to remove the AVAST antivirus
from your system
Avert Stinger:- It is an Antivirus scanner from Mcafee. It can be used under scenarios
when you suspect infections in your system.
AVG Antivirus Removal Tool:- This tool can be used to remove AVG Antivirus from your
system.
Avira Antivirus Removal Tool:- This tool can be used to remove Avira antivirus from your
system.
Bit Defender Removal Tool:- This tool can be used to remove Bit defender antivirus from
your system.
Brontok Removal Tool:- Brontok is a computer worm and can be removed using this
tool.
223
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Downadup Removal tool:- W32.Downadup or W32.Conficker was the most annoying worm of its
kind. This can be effectively removed using this tool.
Drive autoplay fix:- This tool is used to remove the virus, w32.fujacks.
Hijackthis:- This is a trendmicro tool that can be used to generate list of suspicious files in your
system.
Kaspersky Removal Tool:- This tool is used to Kaspersky Antivirus from your system.
224
Mcafee Antivirus Removal Tool:- This tool can be used to remove Mcafee Antivirus from your
system.
Microsoft Malicious Software removal tool:- This Tool from Microsoft is used to identify and delete
malicious software from your system.
Nonav:- This tool can be used to remove any symantec antivirus product from your system.
Nroton Antivirus removal tool:- This tol can be used to remove norton antivirus from your system.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Antivirus Tools-Contd:
225
Push Deploymet wizard:- This tool is used to remotely push SEP 11 Clients to a remote location.
Registry Cleaner:- This tool is used to clean up the registry from malicious content and broken
links.
Sylink Drop:- This tool is used to remotely Drop Sylink.XML files to Unmanaged SEP clients.
Symantec Antivirus removal tool:- This tool is used to remove symantec antivirus from your
system.
Symantec definition remover: -This tool is used to backdate corrupt definition for symantec
Antivirus.
Symantec Endpoint Protection Support Tool:- This tool is used to check the dependency if any
and to identify issues associated with symantec
endpoint protection tool.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Antivirus Tools-Contd.
Symantec Makedrop:- This tool is used to drop GRC.dat in the old version of symantec antivirus
product.
Symantec XDB down:- This tool is used to download XDB files which is the definition files for
symantec antivirus product.
Sysinternals autoruns:- This tool is used to checkup the system startup, processes, and internet
explorer BHO's in your system.
Trend Micro removal Tool: -This tool is used to uninstall trend micro Antivirus.
Unhide folder:- This tool is used to unhide the hidden folders for effective virus troubleshooting.
Virus Effect Remover:- This tool is used to remove the After effects of the virus infections.
226
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
It's a systray application which uses the smart battery support in Windows Vista, XP and 2000 to monitor
power usage, battery charge, CPU speed, CPU usage, and power events such as standby/hibernate/resume,
battery events, etc. Additionally, it's capable of monitoring CPU temperature (via Intel Core internal
sensors, or ACPI thermal sensors), hard drive temperature (if the drive supports it), and even control hard
drive APM/AAM/spindown settings, like the Hitachi PowerBooster does. The binary is about 270KB and
requires no installation, dll's, etc. It can be autorun from the registry with a checkbox.
The systray icon resembles PowerPanel rather strongly, but integrates battery capacity, AC power status,
and CPU speed in a single icon. It has a graphical display window that can be popped up on-demand, which
graphs up to 7 parameters over a several hour period, and shows instantaneous status in a window (which
is also available in a systray tooltip). It estimates runtime when discharging, and charge time when charging.
In addition to the systray and main window graph, it has a toolbar-style window that can float anywhere on
the screen which compactly integrates the systray icon, a charge meter and summary of runtime.
It has a programmable hotkey to turn off the screen, which can be used to save significant power when
running on battery if you need to turn away for a short time, it's also nice as a "privacy key" if you need to
blank your screen instantly. The program can run a program or batch file any time the system switches
power source, or resumes from standby or hibernation, something I find useful to perform certain checks
automatically to recover state that many programs blissfully ignore.
There's a detailed battery display for up to two batteries, with names, voltages, temperature, design
capacities, wear percentages, etc, as provided by the batteries themselves
227
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
- Run ImageMaker.You will see a list of hard drives and partitions on the screen. Select a drive or partition
you want to back up, and click the MakeImage button in the toolbar. Alternatively, you may right-click and
select "Make Image" in the pop-up menu.
- The "Make Image" dialog will appear. Select a file where you want to save image to (WARNING: This file
should not be located on the same partition that is being imaged!)
- Click the "Start" button on the dialog.You will see a progress indicator showing the progress of the
imaging process. The time it needs to complete depends on the size of your hard disk, the location of the
saved image (see below), and the operating system you use.
228
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
229
Used to transfer data directly to another drive when the original is faulty.
Raw Copy copies a disk as a raw image from one drive directly to another.
Raw Copy was designed for users who have faulty drive and would like to transfer the data directly to
another drive without doing a file by file copy.
This saves the need for operating system re-installs and allows drives with an unknown file system to be
copied (including from console game machines, data recorders, mac etc).
The program has a built in data recovery function which will attempt to recover data from bad sectors to
ensure all the available data is restored from the drive. This program is designed to run under NT/XP/2000
or later operating systems. It will run under windows 95/98/Me operating systems but only windows
logical drives can be copied
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
This diagnostic tool can be used for checking any HDD issues. For more details please refer the documents in
USERGUIDE folder in CD named dft32_user_guide_4.15.pdf
Seagate HDD tools :Version 1.2.0
Sea Tools for Windows is a comprehensive, easy-to-use diagnostic tool that helps you quickly determine the
condition of the disc drive in your external hard drive, desktop or notebook computer. It includes several
tests that will examine the physical media on your Seagate or Maxtor disc drive and any non-Seagate disc
drive. Sea Tools for Windows should run on both internal and external hard drives
For More details Please refer the documents in USERGUIDE Folder in CD named Seatools.pdf.
230
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
231
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Network Tool IPSCAN :Version 1.6 : Double click will run this
program
Overview
Free IP scanner is a very fast IP scanner and port scanner. It is intended for both system administrators and
general users to monitor and manage their networks. Powered with multi-thread scan technology, it can
scan hundreds computers per second. It simply pings each IP address to check if it's alive, determines
hostname, MAC address, NetBIOS information, scans ports, etc. The information obtained can be exported
into a file as plain text file.
Start Guide
Step 1: Run the program
Follow Start > All Programs > Free IP Scanner > Free IP Scanner.
Or just double click the Free IP Scanner icon on your Desktop.
Step 2: Select ip scan range and start scanning
Use two fields of IP Range to enter first and last IP addresses. The last IP address can be less than the first one there is no problem with translating your input. To begin the scan, press the 'Start Scanning' button.When
the program is scanning, this button becomes the 'Stop Scanning' button. Below at the picture there is the
main program interface.
232
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
233
Download the compressed version and go into linpack folder which is also extracted separately and
available for download. Change the permission 777 to all folders of linpack folders .Change the file input
values mentioned under lininput_xeon32/lininput_xeon64 depends upon your OS.
Once you change the input file , execute the file runme_xeon32 or runme_xeon64.Output can be seen in
lin_xeon32.txt or lin_xeon64.txt depends upon your execution file.
For More details , please refer the userguide which is given in CD.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
234
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
235
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Utility to retrieve the details of the software installed in the computers of a Windows Domain. The
Software details include Software Name,Version, Manufacturer and Usage statistics. The software details
can be exported as txt and csv formats.
To collect the Software installed in a given computer, follow the steps below:
Click the Software Inventory tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to retrieve the details of the software installed in that
computer. Please note that the user name and password specified here should have the necessary
privileges to do this operation in the given computer.
You can either specify the computer name manually or use the Browse button to select a computer to
from Domain. When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers that domain.
Select the Computer from which Software details have to be collected and click OK.
236
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Free tool to open a command prompt of a remote computer and execute a command. The remote
computer can be in the domain or a workgroup.The administrator has to specify a credential that has
necessary privileges to execute the commands.The computer can be either specified manually or selected
by speciying the Domain Controller.
To use this tool, follow the steps below:
Click the Remote Command Prompt Tool from the Launcher to invoke the tool.
Specify the Domain / Workgroup name, user name and password to access the remote computer. Please
note that the user name and password specified here should have the necessary privileges to access the
remote computer.
You can either specify the name of a remote computer name manually or if the domain setup is Active
Directory, use the Browse button to select a particular computer from the domain. When you browse to
select the remote computer, specify the following in the pop-up dialog.
237
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select a computer from the list and click OK.
The selected computer will get displayed in the Computer Name field.
Click Execute to bring the remote computer's command prompt.
You can now execute the required command.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Utility to perform a GPO Update in the computers of a Windows Domain. GPOs are used to send
configuration instructions to user and computer objects in the Windows Active Directory. By default, the
GPO updates happen periodically, every 90 minutes.This utility helps the Administrators to perform a
GPO Update on-demand on multiple domain computers simultaneously.
To update the GPOs, follow the steps below:
Click the GPO Update tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to perform a GPO update. Please note that the user
name and password specified here should have the necessary privileges to do this operation in all the
computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computers to update the GPOs. When you browse to select the computers, specify the
following in the pop-up dialog.
238
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to do a GPO update and click OK.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Utility to shutdown or restart the computers of a Windows Domain. The Administrator can specify a
common credential to perform this operation on multiple computers and can select the computers by
specifying the Domain Controller.
To shutdown/restart computers remotely, follow the steps below:
Click the Shutdown/Restart tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to shutdown or restart a computer. Please note that
the user name and password specified here should have the necessary privileges to do this operation in all
the computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computers to shutdown/restart.When you browse to select the computers, specify the
following in the pop-up dialog.
239
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers that you wish to shutdown/restart and click OK
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
240
Utility to move a computer from one domain to another or from a domian to a workgroup or from a
workgroup to a domain. It also provides the ability to restart the computer after this operation. The status
of the operation is also displayed at the bottom of the window.
Moving a computer from one domain to another
To move a computer from one domain to another, follow the steps below:
Select the Domain to Domain option.
Specify the name of the domain from which the computer is being moved.
Specify the Domain Admin user name and password of the old domain.
Specify the name of the domain to which the computer is being moved.
Specify the Domain Admin user name and password of the new domain.
Specify the name of the computer that is being moved.
Specify the IP Address of the DNS Server of the new domain
Select the "Restart the Client computer after Moving" option, if the computer has to be restarted.
Click Move.
Check the status of the operation displayed at the bottom.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Utility to retrieve the details of the users logged on to a remote computer. The Administrator can specify a
common credential to perform this operation on multiple computers and can select the computers by
specifying the Domain Controller.
To use this tool, follow the steps below:
Click the Currently Logged On User tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Leave the Domain name empty in the case of
workgroup computers. Please note that the user name and password specified here should have the
necessary privileges to do this operation in all the computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computer. When you browse to select the computers, specify the following in the pop-up dialog.
241
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to get logged on user and click OK.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Utility to retrieve the information about the Hard Disk like Partition/Drives,Volume Name, Total Size, Free
Space, and File System. The Administrator can specify a common credential to perform this operation on
multiple computers and can select the computers by specifying the Domain Controller.The results can be
exported to a CSV or Text format for a later reference.
. To use this tool, follow the steps below:
Click the Hard Disk Space Detector Tool tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Specify Workgroup name in the case of workgroup
computers. Please note that the user name and password specified here should have the necessary
privileges to do this operation in all the remote computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computer. When you browse to select the computers, specify the following in the pop-up dialog.
242
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to get the hard disk details and click OK.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Tool to get the information about local users and groups in the remote computers.The user details
include, Computer Name, User Name, Full Name, Caption, Status, etc. The group details include, Computer
Name, Group Name, Caption, Description, and Status. The Administrator can specify a common credential
to perform this operation on multiple computers and can select the computers by specifying the Domain
Controller. The results can be exported to a CSV or Text format for a later reference.
To use this tool, follow the steps below:
Click the Local Users/Groups Tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Specify Workgroup name in the case of workgroup
computers. Please note that the user name and password specified here should have the necessary
privileges to do this operation in all the computers.
You can either specify the computer names manually as comma separated or in case of Active Directory
setup use the Browse icon to select the computers.When you browse to select the computers, specify the
following in the pop-up dialog.
243
Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to get local users/groups and click OK.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
244
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
245
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
246
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
247
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
248
Make a folder( from where you have to run script ) and in that folder create servers.txtfile . In this file you
have to mentioned all IP which you want to check . Once you mentioned that IP then execute the
newping script file.
Press Ok button
It will generate the OUTPUT file in EXCEL sheet with date and time.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Scriptomatic 2.0
249
Works with all the WMI namespaces on your computer.The old version only worked with the root\cimv2
namespace. That was fine for Windows 2000 computers, but just didnt cut it with Windows XP or
Windows Server 2003 computers
For more details please refer the Userguide given in Utility CD.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
For More details Please refer the User Guide available in CD named as a Userguide\puttydoc\index.html
250
WinSCP is an open source SFTP client and FTP client for Windows. Its main function is the secure file
transfer between a local and a remote computer. Beyond this, WinSCP offers basic file manager
functionality. It uses Secure Shell (SSH) and supports, in addition to Secure FTP, also legacy SCP protocol
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Requirements
Some of the tools require that the default admin$ share be available and/or that the Remote Registry
service be active
The Windows NT and Windows 2000 Resource Kits come with a number of command line tools that help
you administer your Windows NT/2K systems. Over time, I've grown a collection of similar tools, including
some not included in the Resource Kits. What sets these tools apart is that they all allow you to manage
remote systems as well as the local one. The first tool in the suite was PsList, a tool that lets you view
detailed information about processes, and the suite is continually growing. The "Ps" prefix in PsList relates
to the fact that the standard UNIX process listing command-line tool is named "ps", so I've adopted this
prefix for all the tools in order to tie them together into a suite of tools named PsTools.
All of the utilities in the PsTools suite work on Windows NT, Windows 2000, Windows XP, and Server 2003
and none of the tools requires any special installation.You don't even need to install any client software on
the remote computers at which you target them. Run them by typing their name and any command-line
options you want. To show complete usage information, specify the "-?" command-line option.
251
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs
on remote systems, but they can be a pain to set up and require that you install client software on the
remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute
processes on other systems, complete with full interactivity for console applications, without having to
manually install client software. PsExec's most powerful uses include launching interactive commandprompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability
to show information about remote systems.
Installation
Copy PsExec onto your executable path. Typing "psexec" displays its usage syntax.
Usage
Please refer the Userguide for getting more details on options used in Psexec
252
PsExec
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
You can enclose applications that have spaces in their name with quotation marks e.g. "psexec \\marklap
"c:\long name\app.exe". Put arguments directed at the application outside of the parenthesis. Input is only
passed to the remote system when you press the enter key, and typing Ctrl-C terminates the remote
process.
If you omit a username the remote process runs in the same account from which you execute PsExec, but
because the remote process is impersonating it will not have access to network resources on the remote
system. When you specify a username the remote process executes in the account specified, and will have
access to any network resources the account has access to. Note that the password is transmitted in clear
text to the remote system.
The following command launches an interactive command prompt on \\marklap:
psexec \\marklap cmd
This command executes IpConfig on the remote system with the /all switch, and displays the resulting
output locally:
psexec \\marklap ipconfig /all
This command copies the program test.exe to the remote system and executes it interactively:
psexec \\marklap -c test.exe
Specify the full path to a program that is already installed on a remote system if its not on the system's
path:
psexec \\marklap c:\bin\test.exe
253
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
254
PsFile
The "net file" command shows you a list of the files that other computers have opened on the system
upon which you execute the command, however it truncates long path names and doesn't let you see that
information for remote systems. PsFile is a command-line utility that shows a list of files on a system that
are opened remotely, and it also allows you to close opened files either by name or by a file identifier.
Installation
Copy PsFile onto your executable path and type "psfile".
Usage
The default behavior of PsFile is to list the files on the local system that are open by remote systems.
Typing a command followed by "-?" displays information on the syntax for the command.
usage: psfile [\\RemoteComputer [-u Username [-p Password]]] [[Id | path] [-c]]
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Have you performed a rollout and only to discover that your network might suffer from the SID
duplication problem? In order to know which systems have to be assigned a new SID (using a SID updater
like Sysinternals' own NewSID) you have to know what a computer's machine SID is. Up until now there's
been no way to tell the machine SID without knowing Regedit tricks and exactly where to look in the
Registry. PsGetSid makes reading a computer's SID easy, and works across the network so that you can
query SIDs remotely. PsGetSid also lets you see the SIDs of user accounts.
Installation
255
PsGetSid
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
PsInfo is a command-line tool that gathers key information about the local or remote system, including the
type of installation, kernel build, registered organization and owner, number of processors and their type,
memory size, the install date of the system, and if it's a trial version, the expiration date. PsInfo commandline switches also let you view installed hotfixes and software applications.
Installation
By default PsInfo shows information for the local system. Specify a remote computer name to obtain
information from the remote system. Since PsInfo relies on remote Registry access to obtain its data, the
remote system must be running the Remote Registry service and the account from which you run PsInfo
must have access to the HKLM\System portion of the remote Registry.
In order to aid in automated Service Pack updates, PsInfo returns as a value the Service Pack number of
system (e.g. 0 for no service pack, 1 for SP 1, etc).
usage: psinfo [\\computer[,computer[,...] | @file [-u username [-p password]]] [-h] [-s] [-d] [-c [-t
delimter]]
256
PsInfo
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Windows NT/2000 does not come with a command-line 'kill' utility.You can get one in the Windows NT
or Win2K Resource Kit, but the kit's utility can only terminate processes on the local computer. PsKill is a
kill utility that not only does what the Resource Kit's version does, but can also kill processes on remote
systems.You don't even have to install a client on the target computer to use PsKill to terminate a remote
process.
Installation
Copy PsKill onto your executable path and type pskill with command-line options defined below.
Usage
Running PsKill with a process ID directs it to kill the process of that ID on the local computer. If you
specify a process name PsKill will kill all processes that have that name.
usage: pskill [-t] [\\computer [-u username] [-p password]] <process name | process id>
257
PsKill
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Most UNIX operating systems ship with a command-line tool called "ps" (or something equivalent) that
administrators use to view detailed information about process CPU and memory usage. Windows NT/2K
comes with no such tool natively, but you can obtain similar tools with the Windows NT Workstation or
Server Resource Kits. The tools in the Resource Kits, pstat and pmon, show you different types of
information, and will only display data regarding the processes on the system on which you run the tools.
PsList is utility that shows you a combination of the information obtainable individually with pmon and
pstat.You can view process CPU and memory information, or thread statistics. What makes PsList more
powerful than the Resource Kit tools is that you can view process and thread statistics on a remote
computer.
Installation
The default behavior of PsList is to show CPU-oriented information for all the processes that are currently
running on the local system. The information listed for each process includes the time the process has
executed, the amount of time the process has executed in kernel and user modes, and the amount of
physical memory that the OS has assigned the process. Command-line switches allow you to view
memory-oriented process information, thread statistics, or all three types of data.
usage: pslist [-?] [-d] [-m] [-x][-t][-s [n] [-r n] [\\computer [-u username] [-p password]] [[-e] name | pid]
258
PsList
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
You can determine who is using resources on your local computer with the "net" command ("net
session"), however, there is no built-in way to determine who is using the resources of a remote computer.
In addition, NT comes with no tools to see who is logged onto a computer, either locally or remotely.
PsLoggedOn is an applet that displays both the locally logged on users and users logged on via resources for
either the local computer, or a remote one. If you specify a user name instead of a computer, PsLoggedOn
searches the computers in the network neighborhood and tells you if the user is currently logged on.
PsLoggedOn's definition of a locally logged on user is one that has their profile loaded into the Registry, so
PsLoggedOn determines who is logged on by scanning the keys under the HKEY_USERS key. For each key
that has a name that is a user SID (security Identifier), PsLoggedOn looks up the corresponding user name
and displays it. To determine who is logged onto a computer via resource shares, PsLoggedOn uses the
NetSessionEnum API. Note that PsLoggedOn will show you as logged on via resource share to remote
computers that you query because a logon is required for PsLoggedOn to access the Registry of a remote
system.
Installation
259
PsLoggedOn
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
The Resource Kit comes with a utility, elogdump, that lets you dump the contents of an Event Log on the
local or a remote computer. PsLogList is a clone of elogdump except that PsLogList lets you login to remote
systems in situations your current set of security credentials would not permit access to the Event Log,
and PsLogList retrieves message strings from the computer on which the event log you view resides.
Installation
The default behavior of PsLogList is to show the contents of the System Event Log on the local computer,
with visually-friendly formatting of Event Log records. Command line options let you view logs on different
computers, use a different account to view a log, or to have the output formatted in a string-search
friendly way.
usage: psloglist [-?] [\\computer[,computer[,...] | @file [-u username [-p password]]] [-s [-t delimiter]] [-m
#|-n #|-h #|-d #|-w][-c][-x][-r][-a mm/dd/yy][-b mm/dd/yy][-f filter] [-i ID[,ID[,...] | -e ID[,ID[,...]]] [-o
event source[,event source][,..]]] [-q event source[,event source][,..]]] [-l event log file] <eventlog>
260
PsLogList
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Systems administrators that manage local administrative accounts on multiple computers regularly need to
change the account password as part of standard security practices. PsPasswd is a tool that lets you change
an account password on the local or remote systems, enabling administrators to create batch files that run
PsPasswd against the computer's they manage in order to perform a mass change of the administrator
password.
Installation
Copy PsPasswd onto your executable path and type pspasswd with command-line options defined below.
Usage
You can use PsPasswd to change the password of a local or domain account on the local or a remote
computer.
261
PsPasswd
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
PsService is a service viewer and controller for Windows NT/2K. Like the SC utility that's included in the
Windows NT and Windows 2000 Resource Kits and Windows XP, PsService displays the status,
configuration, and dependencies of a service, and allows you to start, stop, pause, resume and restart them.
Unlike the SC utility, PsService enables you to logon to a remote system using a different account, for cases
when the account from which you run it doesn't have required permissions on the remote system.
PsService includes a unique service-search capability, which identifies active instances of a service on your
network.You would use the search feature if you wanted to locate systems running DHCP servers, for
instance.
Finally, PsService works on both NT 4 and Windows 2000, whereas the Windows 2000 Resource Kit
version of SC requires Windows 2000, and PsService doesn't require you to manually enter a "resume
index" in order to obtain a complete listing of service information.
Installation
The default behavior of PsService is to display the configured services (both running and stopped) on the
local system. Entering a command on the command-line invokes a particular feature, and some commands
accept options. Typing a command followed by "-?" displays information on the syntax for the command.
usage: psservice [\\computer [-u username] [-p password]] <command> <options>
262
PsService
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
263
PsShutdown
PsShutdown is a similar to the Resource Kit and Windows XP shutdown tools, providing you the same
options and ability to shutdown, and optionally reboot, local and remote Windows NT/2K/XP/2003
systems. It also provided additional options that make it more powerful and flexible.
Installation
Copy PsShutdown onto your executable path and type "psshutdown" with command-line options defined
below.
Usage
You can use PsShutdown to initiate a shutdown of the local or a remote computer, abort an imminent
shutdown, logoff a console user, or lock the desktop.
usage: psshutdown [\\computer[,computer[,...] | @file [-u username [-p password]]] -s|-r|-h|-d|-k|-a|-l|-o [f] [-c] [-n s] [-t nn|h:m] [-e [u|p]:xx:yy] [-m "message"]
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
PsSuspend
PsSuspend lets you suspend processes on the local or a remote system, which is desirable in cases where a
process is consuming a resource (e.g. network, CPU or disk) that you want to allow different processes to
use. Rather than kill the process that's consuming the resource, suspending permits you to let it continue
operation at some later point in time.
Installation
Copy PsSuspend onto your executable path and type "pssuspend" with command-line options defined
below.
Usage
Running PsSuspend with a process ID directs it to suspend the process of that ID on the local computer. If
you specify a process name PsSuspend will suspend all processes that have that name. Specify the -r switch
to resume suspended processes.
process id>
264
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
What is ManagePC?
ManagePC is an open source application for PC management and inventory in Windows environments.
Using ManagePC you can inventory all aspects of PCs on your domain including:
Hardware
Services
Software
Hot-Fixes
Processes
Local Users and Groups
Manage PC also lets you take control of PCs through familiar interfaces. Use remote desktop,VNC, reboot,
start/stop services, uninstall software and more directly from the ManagePC interface.
Requirements : .NET 2.0 Framework
Administrative Privilidges on the PC(s) being queried
No expensive database is required. Data is stored in XML
265
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
CPUZ :Ver 1.50 Double click cpuz.exe can run this program.
CPU-Z is a freeware that gathers information on some of the main devices of your system
ASTRAWIN32 :Version 2.0.3 ( Limited edition) double click on Astra32.exe file to execute it.
ASTRA32 is an ideal solution for providing comprehensive information about your computer hardware
and software. Not only does ASTRA32 provide a detailed analysis of your system, it also offers diagnostics
and comes with some powerful features such as Drivers Troubleshooter and quick HDD Health Status
checker. It obtains data directly from hardware so it is very accurate.
SpeedFAN :Version 4.39
SpeedFan is a freeware program that monitors voltages, fan speeds and temperatures in computers with
hardware monitor chips. SpeedFan can even access S.M.A.R.T. info for those hard disks that support this
feature and show hard disk temperatures too, if supported. SpeedFan supports SCSI disks too. SpeedFan
can even change the FSB on some hardware (but this should be considered a bonus feature
SpeedFan works fine with Win9x, WinME, WinNT, Win2k and WinXP.
SpeedFan can be minimized to the tray and does its best to be compatible with other hardware
monitoring softwares.
Supported MB is given in URL : http://www.almico.com/forummotherboards.php
266
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
267
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
TightVNC is:
Free, GPL-licensed, with full source code available;
Useful in remote administration, remote customer support, education, and for many other purposes;
cross-platform, available for Windows and Unix, compatible with other VNC software.
Double Click on the .exe file and start using VNC software
268
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
269
This benchmark should not be used to report LINPACK 100 performance, as that is a compiled-code only
benchmark. This is a shared memory (SMP) implementation which runs on a single platform and should not
be confused with MP LINPACK, which is a distributed memory version of the same benchmark. This
benchmark should not be confused with LINPACK, the library, which has been expanded upon by the
LAPACK library.
Intel is providing optimized versions of the LINPACK benchmarks to make it easier than using HPL for you
to obtain high LINPACK benchmark results on your systems based on genuine Intel processors. Use this
package to benchmark your SMP machine.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
270
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
UNISTALL - 5 IN 1
271
BIT DEFENDER
CRASH PROOF
PC REPORTER
PORT LOCKER
DATA WIPER
272
UNISTALL- CRASHPROOF
Crash Proof is data loss prevention software, which once installed in the system,
prevents data loss against logical crashes. At the time of installation, Crash Proof
calculates the system parameters and stores them in the same hard disk in a
protected area.In the event of a disk crash or data loss, Crash Proof revives the
data /disk. Crash Proof recovers data even if the computer does not start-up (due
to partition corruption, boot corruption etc), if the folders show junk or if files are
deleted accidentally or by certain virus etc.
Causes of Data Loss:
The main causes of data loss are viruses, accidental format or deletion, wrong file
transfer, faulty software, incorrect operation of certain disk management utilities,
voltage glitches, incorrect shutdown or switch off etc. Every disk crash is unique in
itself because, the disk capacities are different, so are their partitioning methods,
volumes creation, virus attacks, file management or application utilities etc. Data is
stored on the disk but is linked to the operating system using the system area that
contains Directory Structures, File Allocation Tables, Data Runs, Boot Record and
Partition Table.when these areas get corrupted - data is assumed lost, whereas
data is physically present in the disk! And the Operating System is unable to
locate it and present it since the file links are lost.Any slight difference in values or
bytes in system area will render data inaccessible! also note that data is present
physically. Data will be available for recovery until it is overwritten.
274
UNISTALL 5 IN 1 PC REPORTER
PC Reporter - is a utility that acts as an Asset Tagging, Tracking & Early
Warning System for pending hard disk problems. The system is based on SelfMonitoring Analysis and Reporting Technology (S.M.A.R.T). The hard disk's
integrated controller works with various aspects or parameters to monitor
various aspects of the drive's / disk's performance and determines from this
information if the disk is behaving normally or not
PC Reporter Software Offers Asset Tracking Option to track software activities
that are installed in the hard disks. Runs constantly in the background. Hence,
provides real information. Provides standard hard disk information such as
Serial/Model Number, Number of cylinders, and so on.
Provides information on various hard disks attributes and also displays their
fitness level. Able to scan and display bad sectors on hard disk(s).
Scheduler to configure software parameters such as Temperature Warning,
Temperature Update, and Log Scheduling. Maintains log reports of disk scans,
disk status and so on. Can clone hard disks (that is, it can paste the contents of
a potentially fatal diskonto a healthy disk). Provides graphical comparison of
temperature fluctuations in relation to warning /shutdown levels.
Displays real time 'Benchmark' graph showing the Hard Disk data transfer rate
and CPU usage. Can test any IDE/SATA disk. Simple and easy to use, with no
loss in system performance.
275
276
277
278
TROUBLE SHOOTING-POST
Symptom:
Computer beeps irregularly when the computer is turned on.
Computer turns on but does not boot.
Turn on the computer but doesn't do anything.
Cause:
New hardware conflicting with old hardware.
Bad or failing hardware device.
Connections not connected.
Recent electrical storm that caused a surge that damaged computer.
Other hardware issue
Diagnose / Probe:
Make sure your computer is turning on, if you press the power button and
nothing happens (no lights, no sound, no fans, etc.) then this issue is not a
NO POST but is an power related issue.
279
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
TROUBLE SHOOTING-POST
Resolution:
1. Remove /Refix, CD's, DVD's, HDDs, RAM,SMPS that are in the computer and
if any USB devices (iPods, drives, phones, etc) are connected disconnect all of
them as well. Reboot the computer and see if anything changes.
2. If any new hardware has been recently added to the computer, remove that
hardware to make sure it is not the cause of your issue. If after removing the
new hardware your computer works it's likely the computer is either not
compatible with the new hardware or a system setting needs to be changed
to work with the new hardware device.
3. Remove All the connections from the back of the computer except the power
cable. Turn on the computer and see if it beeps normally. If the computer has
never beeped keep the monitor or display connected to see if any change
occurs.
4. Check for beep codes to identifying what computer component is failing or
bad.
280
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
TROUBLE SHOOTING-POST
4. Make sure all fans are running in the computer. If a fan has failed (especially
the heat sink fan for the CPU) your computer could be overheating
and/or detecting the fan failure causing the computer not to boot.Verify
that all the cables are properly connected at that there are no loose
cables by firmly pressing in each cable. All disk drives should have a data
cable and power cable connected to them.
5. Your power supply should have at least one cable going to the
motherboard. Many motherboards may also have additional cables
connected to them to supply power to the fans
6. If the above recommendations still have not resolved the irregular POST
attempt to disconnect the Riser board (if applicable) and/or each of the
expansion cards. If this resolves the issue or allows the computer to POST
connect one card at a time until you determine what card is causing the
issue.
281
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
TROUBLE SHOOTING-POST
7.
If you were unable to determine by the beep code what is failing or do not
have a beep code disconnect the IDE, SATA, SCSI, or other data cables from
the CD-ROM, hard drive, and floppy drive from the Motherboard.
8.
If this resolves your irregular post or you now get an error message attempt
to re-connect each device one at a time to determine which device and or
cable is causing the issue.
9.
Re-insert the memory into the same slot. If you have more than one stick of
memory remove all but one stick of memory, try rotating through each stick.
Try one stick of memory in each slot.
10. If after doing all of the above recommendations you continue to have the
same issue unfortunately it is likely that you have bad Motherboard, PSU, CPU
and/or RAM. The next step would be either to replace these components
and/or have the computer serviced.
282
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Software issue:
1. Errors generated by software programs can cause a computer to reboot
unexpectedly or without warning.
2. If you are not running Windows XP or following the below steps still cause
your computer to reboot without warning. Boot your computer into Safe
Mode, and let the computer run in Safe Mode. Additional information and
help with getting into Safe Mode.
3. If the computer is still rebooting in Safe Mode the issue is likely not with
the software but something else, It is recommended to run the basic
troubleshooting section for your operating system.
285
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
287
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
288
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Bad Hardware:
1. Verify that there is at least 200-500MB of free hard disk drive space. This
available space allows the computer to have room for the swap file to
increase in size as well as room for temporary files.
2. Run Scandisk or something equivalent to help ensure that there is
nothing physically wrong with the computer hard disk drive.
3. Run Defrag to ensure that data is arranged in the best possible order
289
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
290
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
291
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Solution:
1. Note: If the computer is turning on but is not posting (beeping) or giving
any type of picture on the display,.pls check the processor is properly
connected and Fan is rotating.
2. If you are uncertain if the computer is turning on or not, this can be easily
checked by seeing fans in the computer or visible from the outside of the
computer. If these fans are spinning and the computer is receiving power.
292
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
6. This will help verify that the strip or switch is not bad.Verify that the outlet
works by connecting a different component to that switch
293
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
NO DISPLAY ON MONITOR
Cause:
.
This
issue can be caused by any of the below possibilities.
Monitor is not on
Computer is asleep
Connections not connected properly.
Monitor settings are not correct.
No Post.
Hardware issue.
Monitor is On/OFF:
Make sure the monitor is on. If no power light (green or orange light) is
seen on the monitor display try pressing the power button until it comes
on. If no light comes on after several attempts check the Power
connections are connected properly.
Computer Sleep:
If your computer monitor was on and you stepped away from the
computer and upon returning it was black it's likely that the computer is
asleep. Try moving your mouse, clicking the mouse buttons, and/or
pressing any key (space bar) on the keyboard to wake it up.
294
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
NO DISPLAY ON MONITOR
Connections
not connected properly: Make sure that you are connecting
.
the monitor to the back of the computer in the 15-pin connector as shown
to the right or older computer 9-pin connection.
If the computer is properly plugged in, make sure it's getting getting
power.
If you are not receiving power from a wall outlet replace it with another
one or exchange the computer and monitor Cable. If the monitor still does
not get power, would need repair.
295
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Solution:
1. Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable,
ensure that the LEDs on the network are properly illuminated. For
example, a network card with a solid green LED or light usually indicates
that the card is either connected or receiving a signal. Note: generally,
when the green light is flashing, this is an indication of data being sent or
received.
If, however, the card does not have any lights or has orange or red lights, it is
possible that either the card is bad, the card is not connected properly, or
signal
from
the network.
296 that the card is not receiving a
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
299
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Solution:
1. First verify you see a small speaker icon in the Systray (generally at the bottom
right hand corner of your screen). If this icon is missing follow the below section.
Windows XP
2. Open the Control panel Open the "Sounds and Audio Devices" icon. Verify the
"Place volume icon in the taskbar" checkbox is checked. If this option is not
available or is grayed out, skip to the next section of this document. If you were
able to check this box, click ok and close out of this window and the Control Panel.
Double-click the sound icon in the Systray and verify that all the sound volumes
are mid-way or higher. If other devices are listed, it is possible that these other
devices could be the sound card or other devices conflicting with the sound card. If
any other devices are listed it is recommended you remove those devices, reboot
the computer and let Windows redetect the devices. If this does not work, attempt
to determine which device is not being detected and resolve that issue first.
300
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
301
302
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
303
Always keep your Windows up-to-date with the latest Microsoft patches
Keep less files on Desktop, always keep files in folders.
Keep only minimal programs which are required to you only in your
computer.
Keep your antivirus definitions updated Regularly.
While opening E-Mail attachments, ensure the attachment is scanned
before opening.
Periodically clean your temporary folders/internet files/Cache and
cookies.
Use the Start Button on the Windows Taskbar to shutdown your computer.
It is also necessary to save files & Close all application which are running
in the taskbar.
Keep CD's in a cover and handle them by the edges. Try to keep floppy
disks in proper storage box and perform a full format on the disk
before copying important data
304
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Do not download freeware and also Dont use software that isnt certified and
legally not licensed. Downloading software from a unauthorised site, or
accepting a shared copy, is not legal and may take valuable information
from your system over a period of time.
Do Not move your computer, even a few centimeters when system is on,
always shutdown the computer before any movements. This applies to the
Monitor and other Peripherals attached to the system. Unnecessary shock
can cause fatal breakdown of sensitive parts or reduce the expected lifetime
of the computer and its spares.
Do Not Place any equipments or other objects on top of a Desktop or the
peripherals attached to the Desktops.
Do Not Operate the computer on a fully closed enclosures preventing the
airflow to the cooling vents on the sides or back, which will cause the system
to overheat and can lead to failure
305
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Inserting a floppy disk into a drive at an angle or upside down, may cause the drive
to jam and make it unreadable. Placing more than one label on a floppy disk, which
also causes the jam in the drive.
Touching the CD-ROM tray and the media which may contaminate the lens and/or
throw it out of alignment
Avoid Placing the system closer than about 5 inches (13cm) from any electrical
device that generates a strong magnetic field, such as electric motors, TVs,
refrigerators, and large audio speakers.
Avoid Placing your computer on the floor. The fans in the computer that pull air
through the case to cool processor & SMPS will pull all the stuff that settles out of
the air, and onto the floor, into your computer.
306
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Remove all floppy disk and/or CD/DVD disc media from all the
drives.
Make sure all covers of the computer are in position and are
Properly closed.
Also ensure appropriate carton box and packing materials are used If
original packing material which has comw with the computers are
available, it is better to use them..
Following the above simple guidelines during transportation or
shipping the system will help in ensuring the machine reaching the
destination in safe and working condition.
307
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
308
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
309
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
311
RH 1020%
RH 6590%
35,000 V
1,500 V
12,000
V 250 V
7000
V 600 V
Worker at bench
6,000
V 100
312
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Foot Grounders
313
ESD - PREVENTION
Test Wrist Straps & ESD Footwear daily Keep wrist band snug,
foot grounder grounding tab in shoe, & ESD Smocks buttoned
Up Only trained or escorted people to be allowed in ESD Protected Area
An Effective Workplace:
An effective workplace should be outfitted with the following items:
1.ESD protective clothing/smocks. Street clothing must not come in contact
with components or computer boards since the various materials in clothing can
generate high static charges. ESD protective smocks, manufactured with
conductive fibers, are recommended.
2.Electrostatic shielding containers or totes. These containers (bags,boxes,
etc.) are made of specially formulated materials which protect sensitive devices
during transport and storageAntistatic or dissipative carriers. These provide
ESD protection during component movement in the manufacturing process. It
must be noted that antistatic materials alone will not provide complete
protection. They must be used in conjunction with other methods such as totes
or electrostatic shielding bags.
4.Dissipative table mat. The mat should provide a controlled discharge of
static voltages and must be grounded. The surface resistance is designed such
that sliding a computer board or component across its surface will not generate
more than 100 V.
314
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
ESD - PREVENTION
5.Personal grounding. A wrist strap or ESD cuff is kept in constant
contact with bare skin and has a cable for attaching it to the ESD ground.
The purpose of the wrist strap is to drain off the operators static charge.
The wrist strap cord has a current-limiting resistor for personnel safety.
Wrist straps must be tested frequently to ensure that they are undamaged
and operating correctly. When a wrist strap is impractical, special heel
straps or shoes can be used. These items are effective only when used in
conjunction with a dissipative floor.
Heel Straps
315
Wrist Straps
Floor Mats
6.ESD protective floor or mat. The mat must be grounded through a currentlimiting
resistor. The floor or mat dissipates the static charge of personnel approaching the
work bench. Special conductive tile or floor treatment can be used when mats are not
practical or cause a safety hazard. Chairs should be conductive or grounded with a
drag chain to the flooring, if we touch or handle the components by sitting on that.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Antivirus
316
317
Virus
Trojan Horse
Worm
Blended attack
Expanded threat
False Positives
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
What is a virus?
A program written to alter the way a computer operates.
It will self execute its own code and place itself in the path of execution of
another program.
It must replicate itself
For example, it can replace other executables with a copy of the virus
infected file.
It can infect desktops and network servers alike.
318
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Types of viruses
File infectors :They infect any program files, they come in through .exe and .com files.
Examples are Jerusalem and cascade.
Boot sector viruses:It infects the system are of a disk, basically the boot record a floppy
disk or a hard disk. Examples are Michelangelo and disk killer.
Master boot record viruses:They are almost same as the boot sector viruses, the only
difference between them is that where they load themselves. Such
infectors saves a copy of the MBR in a different location. The Pcs
infected with boot sector viruses and MBR viruses will not boot.
Example:-Unashamed, NYB, Antiexe .
319
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Types of viruses
Multipartite Viruses:These are infections that infect both the program files and boot
records. These are difficult to remove, the infections from both the
locations should be removed or else they might re-infect any one of the
locations back again. Example:-One_Half,Emperor.
Macro viruses:These type of Viruses infect data files. They Have cost
Corporations millions. The Evolution Of Visual Basic in 97,a macro
Virus can be written that can infect data files. It infects MS Word,
Excel, Power point. They are circulating good numbers across the
world because of the ease with which they can be created. Ex:W97M.Mellisa,W97M.NiceDay.
320
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
321
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
What is a Worm?
Worms replicate from system to system without use of a host file.
Worms Usually reside inside word or excel documents & the worm
will release a document that has the worm macro inside it. The
document will now move from computer to computer.
322
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
323
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Troubleshooting
If files are in the temporary internet folder then would be in use and may not get
deleted. We recommend you to delete the contents of the temporary internet
files folder.
Boot machine in safe mode and run a manual scan
Use tools from recognized AV vendors like Symantec, Mcafee and Trend Micro
like:Mcafee Avert Stinger.
Trend Micro House call 7.1
Norton Security Scanner from Symantec.
324
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
325
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Best Practices
Ensure the latest Virus Pattern and Scan Engine versions are loaded in
the Antivirus used.
Disable system restore Option on windows XP/Vista.
Apply latest Microsoft Patches on all windows machines.
Enable mapped drive scanning especially during outbreaks of malware
that Spread using Shared/mapped Folders.
Use a firewall that will prevent incoming and outgoing malicious traffic.
Enable schedule scanning daily in case of huge network outbreaks.
326
327
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
328
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
329
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
330
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
331
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
332
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
333
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
334
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
335
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
17. Enter the SEPM console Admin password & click next:
336
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
337
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
338
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
339
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
340
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
341
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
342
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
343
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
344
AC Main is ON
AC Main is OFF and UPS is providing power. - Suggested Action , Not
mandatory if not possible
Voltages Should be Checked when
Consealed wiring and High Voltage lines should pass near to the
system Installation Place
Site Inspection
Dust Level
Air Flow
Proper Space required to ensure the hot air is blowing out properly
Systems Placement
Physical Damage
Box will contain a List of Devices sheet available in the box - Take the
same for ref.
LOD verification
Verify LOD with the contents in the BOX - Any deviation raise short
shipment or wrong shipment
345
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Check all the Drivers & Inf is installed and the latest available as per supplied driver cd. Check in device manager
for errors
Check Unistall and default AV installed and working properly. If customer provide AV software, uninstall the default
one and install the customer specific and enusre it is activated.
Enusre the AV Client has thebest possible update mechanism is configured and latest AV signature is loaded.
Take the configuration using OS Utility confirm the complinace. Eg. System Info - for Windows XP.
Ensure OS Activation has to be check before final Sign Off. For Windows XP "Go To RUN---Type oobe/msoobe
/a and press Enter" and for Windows Vista "Go to RUNType SLUI and press Enter Key"
Additional Installation
As per the Sign off and communicated
Task
Demonstrate the system startup and shutdown to customer
Demo and Sign off
Share the call logging process and escalation matrix with the customer
Sign off the ATP or PIR
346
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential
Thank You