77 Windows tips

Technet has a list of 77 Windows tips, don’t close the tips out too soon, you’ll find things you may not know how to do.   Although most of these are old if you have discovered Windows 7, many people still don’t know about many of these tips.

Know what Robocopy is?  How about a search connector?  perfmon /report or permon /rel?   Link

Vista SP1 Cleanup Tool – Yes, someone is still using Vista

Vista’s SP1 uses a ton of space after its initial install.  The Vista Service Pack removal tool (Hey, I didn’t hear about it either) removes archived files returning a ton of space.  Remember, you cannot uninstall SP1 after this.  Hopefully you tested SP1 for a couple of weeks.

  1. Click the on the Vista Orb (start button), All Programs, Accessories, and click Command Prompt.  (or click on run if you have made this option seen and run the tool below.)
  2. Type vsp1cln.exe and then press Enter on your keyboard.
  3. Another command prompt box will open with a warning about running the SP1 disk clean-up tool. (Warning tools scare me too.)
  4. Type y to start the clean-up.
  5. There will be a wait as the uninstall of your archive files are being removed.
  6. Command prompt window will close when the process completes.
  7. Defrag

 

The life of a file

The life of a file…

8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data.

8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The document is truly on a domain server in her profile folder.   There is one copy of the file.

8:17 a.m.   The secretary opens her email and attaches the file.   The secretary emails the document to ten recipients.

8:17:30 a.m.  The file goes to ten different email servers.

8:18: a.m.  The file now sits on eleven computers- ten email servers and on the company’s domain server.

8:19 a.m. The file gets downloaded onto three tablets and one notebook.   The file is now on 16 devices.

8:19 a.m. The file received by two of the email recipients above is synchronized to a cloud backup service.  The file is now on 19 devices.

8:20 a.m. The file is received by the above tablet and is synchronized onto a cloud backup service and synchronizes with the end-user’s phone and their home desktop computer.  The file is now on 22 devices.

8:20:45 a.m. The file on the above recipient is copied to a third party storage solution from their phone.  The file is now on 23 devices.

8:21 a.m.  The file now synchronizes from the one of the above tablets above and is forwarded to a private email.  The file is downloaded to their phone.  The file is now on 25 devices.

8:29 a.m.  The file is received by the remaining six recipients and is synchronized to five cloud servers, lands on four laptops and three smartphones.   The file is now on 43 devices.

8:30 a.m.  The corporate server synchronizes to a backup drive and shots the secretary’s file to an offsite backup.  The file is now on 45 devices.

8:35 a.m.  The secretary copies the file to a USB drive and prepares for a business meeting at another location.  The file is now on 46 devices.

9:05 a.m. One of the email recipients copies the file to a flashdrive and gives the file to an associate.  The file is now on 47 devices.

9:07 a.m. The secretary arrives at the off-site location and gives the flashdrive to a co-worker.  The co-worker prepares for a presentation and copies the file to a presentation laptop.  The file is now on 48 devices.

9:08 a.m.  The flash drive is placed into the pocket of the co-worker.   One of the email recipients copies the file onto a server and shares the file to 8 co-workers.   Six of the co-workers download the file to their tablets.  The file is now on 55 devices.

9:10 a.m.  The presenter at the offsite location  jogs to an out building to get supplies for the meeting.  The flashdrive falls through a hole in his pocket.

9:12 a.m.   An archiving program on the second server copies the file into a data warehouse server.  The data warehouse server makes a copy of the file and backs up the file.  There is now 57 devices.

9:15 a.m.  One of the email recipients cannot open the file on his tablet.   The email recipient copies the file to a flash drive and moves the file to a company laptop.   The file is now on 58 devices.

9:20 a.m.  An email recipient forwards the email to a wrong address and to three correct addresses.   The file goes to four email servers and is downloaded to three laptops and onto a desktop of one user.   The file is now on 67 devices.

9:21 a.m. The email is synchronized to other devices for the last group of recipients.   The file lands on an addition nine devices.   The file is now on 76 devices.

9:30 a.m. The email servers backup the files for the recipients.  The file is now on now on 90+ devices.

9:31 a.m.  The meeting starts at the offsite location.

9:32 a.m.  A stranger finds the flashdrive that was dropped outside of the building.   Another stranger downloads the email that was wrongfully sent to them.

In today’s world, your one file grows as though it were a microorganism.   It is held by many corporations and can be seen by many individuals…in the first hour.

ncsam10_bnr3

Vista, 7 and 8 Networking Woes – Fixed

These tips work on Snap Servers and NAS devices that say they are NOT Vista, 7 and 8 capable and XP workstations that will not connect.

Option 1

When connecting Vista, 7  or 8 to XP, if you have problems, make sure the time is correct on both machines

Option 2

On the Vista, 7 or 8 Computer
select Administrative Tools->Local Security Policy.
Select Local Policies->Security Options->Network security->LAN Manager authentication level.
Select this and use the drop down to change it to:
Use the setting “Send LM & NTLM – use NTLM v.2 if negotiated”

If you go to the UNC Path \\yourcomputer, you will have to use the username:

thecomputeryouareconnectingtoname\usernameonthatcomputer  then enter your password.

Vista, 7 or 8 has great networking features, you just have to know how to use them. Click on Images to Enlarge.
        

You have to be versatile in Information Technology

Back in 2007 we published an article on ‘The Challenge of Teaching Information Technology‘.  Recently we were also asked to write and article for TricomTS’s blog The Right fIT (Their Corporate Website is here) on Educating Tomorrow’s IT Professional Today.

So why do I write these articles?  Because Information Technology is growing.   Boot camps are only or should be only for seasoned IT Professionals.  It takes time.  With technology growing, to educate a student and to transfer the amount of information from every resource available – it is not only challenging for the instructor, it is a challenge even to the best students.   IT Professionals cannot take four years to start a career, technology will change so much within a year and the curriculum (accredited) has to be dynamic and change as technology changes.  IT personnel wanting to move up the corporate ladder should go to college later in order to advance.   Many IT pros are specialized career field but a majority of them have to be versatile and their skills have to be diversified.

And with a global economy, IT Professionals have to be lean and they have to learn quicker than ever.

We recently were interviewed by ComputerWorld and provided our look at how the economy and how a global economy changes the way IT thinks, works and reacts to this.  So truly we offer all of this advice to those who want to become an IT professional.  Be ready for change…everyday.  In today’s world, employers do expect a lot out of young IT personnel.  Remember it is the best career in the world to those who have a heart and passion for the industry.

The article from ComputerWorld was picked up by several other magazines and webpages.
CIO Magazine
NetworkWorld Magazine(ARRA)
NetworkWorld Magazine(Leaner Lifestyle)
LinuxWorld Magazine

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for vulnerabilities that may affect your device.

 

CNN’s Money on “Hacking anything connected to the internet