The Cipher program can be used to remove any erased data from unused disk space. The command, Ciper /w:C is used to perform this action and can securely erase data that you once had on your computer. While this command is relatively safe, you should always have a backup of your critical data.
If you want to do this to make sure files are deleted properly you have to remember a couple of things. Only do this when the computer can set idle for several hours. Another thing you have to remember is that if you interrupt this process, the Ciper command can fill up your hard drive with temporary files. If you have to interrupt this process, you may see you have a lot of space that is suddenly missing. Use Space Sniffer to find where the temp files were written so that you can erase them.
You can securely erase other drives by replacing the C in the command above with the drive letter of your choice.
When you are networking computers, wireless access points, printers and other nodes in multiple rooms, try to avoid daisy-chaining switches or using small 4-8 port switches when you are in a hurry. Replace any hubs on your network as soon as you can.
With a hub, collisions can be >20% and utilization can stand at >50%. By replacing a hub alone, you can reduce collisions to 5% on switches in rooms and <1% in the server room. Switches help to isolate traffic, relieve congestion, separate collision domains (reduce collisions), segment and restart distance/repeater rules.
Daisy Chaining Switches -what not to do
Real world scenarios may require you to temporarily daisy chain switches. If you do, test the network and run additional backbones or replace core switches to accommodate more nodes as soon as you can. (remember, replace any hubs in your network)
One of many solutions is to run independent lines to the core switch
This is the very basics behind network switch infrastructure. Managing switches and using the IEEE standards above along with optimizing your network and managing the network infrastructure is important.
You can set a program that may use only one of your processors to use more than one. How? Open the Task Manager by right clicking on the taskbar. Next click on Details, sort the programs and right click on your program. Next select processor Affinity. Select all of the processors you want.
When you reboot, any changes you made will return to the default.
What you can do in order to always have processor affinity when a program starts-
Thank you Andrew for finding this! Many forums will tell you to re-install windows or to mess with the HAL in order to show multiple cores after changing processors. Kasey (one of our students) changed his quad-core processor to a hexacore processor. Once he booted up he only saw four cores. Andrew discovered an easy fix by using EasyBCD. Here’s what you do. Download EasyBCD
Install the Software
On the menu, Click on Advanced Settings
Limit Windows to (Change the CPUs to 0 Zero) – Yes this is correct
Once you reboot the task manager will show all of your cores.
EasyBCD is a boodloader that does so much more than fix the number of CPUs seen by your taskmanager. It allows you backup and restore your BCD settings, allows you to setup your MBR (Master Boot Record), repair boot files, helps you to diagnose boot problems, limit CPU or memory usage for older programs.
While NTFS is a reliable file system, Windows 10 can have ReFS enabled for data drives and some external drives. What exactly is ReFS?
ReFS is Resilient File System. ReFS insures data availability, supports large file systems without a performance hit and has a Scrubber that supports Acute Error Correction. It supports up to a Max. Volume size of 1 yobibyte (280 bytes) and a Max. file size of 16 exbibytes (264−1 bytes).
So how do you enable it? (Caution- Perform these steps at your own risk)
FIRST – make a backup and create a restore point. Then – right click on the menu and select run. Type regedit. Navigate to –
Next create a DWORD and name it –
RefsDisableLastAccessUpdate and set its value to 1
Next navigate to –
(Note: You may have to create this Key)
Under this key, create AllowRefsFormatOverNonmirrorVolume and set it to 1 (its value)
Unlike Fat32, you cannot use the convert command to convert to ReFS. You must backup your data first. You also cannot use it on your system drive and boot with ReFS.
The great thing about vocational and technical education is usually the cost, instructor(s) who have worked in the industry, true hands on, a quick classroom to career time and a higher than average placement rate. So once you graduate are you done with education? No.
Today education comes in every format you can think of and with Information Technology, you can’t stop learning or your career can grow stagnant. With seminars, webinars, MOCCs, supplemental college courses and more, every topic imaginable can be found at colleges and universities worldwide.
While MOCCs are sometimes controversial, many employers are taking the certificates offered by these institutions. If you have never taken one, I challenge you to do just that. They are excellent learning tools and the standards are becoming higher.
Several months ago I took a course at Coursera from the Royal Holloway: University of London – Malicious Software…
Since the mid 90’s I’ve worked in a full-time class and I’ve taught a night class in information technology. It’s an arduous job working 70 hours a week. But there’s something I can always count on. I can always count on a visit from one of our best students.
Several years ago a graduate, Avondale Hutson-Fowler, was in our class. She worked a full-time job and went to school while being a mom. Avondale is an Air Force veteran who now works in information technology.
Avondale graduated in the spring of 2011. Since her graduation, she’s worked help desk and was promoted quickly into her current position as a IT Security Account Administrator with a major contractor near Nashville, Tennessee. Avondale has unconditionally supported our program. She’s been a cornerstone in the promotion of technology and IT news while promoting the CIT program through social media. She’s one of the…
That’s right, you’ve earned your way through technical school or college only to land at a help desk job. Take a second and look at the logic behind this. IT professionals over the years have landed at help desk and the successful ones deliver quality service to the end users. IT Managers, Directors or CIOs just can’t put someone in their server room without adequate experience troubleshooting computers. An understanding of the operations of your organization starts by being exposed to all of the software and inner workings of the company. Can you land that job in the server room or as a network admin? Sure. Reality is that it is rare. It takes time, trust and experience.
When surveyed, IT professionals have a deeper respect for that manager that has done their time at help desk. Many professionals do their time in this role and elect it as a career. If you do your time and continue your education by getting more certifications, going to seminars and electe to attend a higher educational institution, you can work your way up the IT ladder.
The stress of help desk is different than any other stress. While you have to put on your happy face and deliver quality service to your clients, it all starts at this level. The redundancy of calls, end-users who are frequent callers and the general grind of problems coming at you that appears to never end causes this stress.
IT managers and upper management in this field take notice of the people who excel at customer service. IT is a service based career and help desk is your starting point for your career. Ironically problems in this field go up to the higher level IT professional and solutions have to be pushed down in order to keep everyone happy.
Being positive and upbeat while you do your time in the trenches will bring that recognition to you. It also allows you to place this experience on a resume for future jobs and positions in your organization or with different companies.
After decades in this career, I can point out hundreds of students who kept this attitude and later in their careers became more successful in IT. There seems to be a sense of entitlement going through the IT field. See help desk as a starting point to move up. What about an example of someone who worked their way up?
One such example is Eric Canneer. Eric started his career in IT as level I help desk and performed well while keeping a positive outlook. During his career he never stopped learning and later was hired by one of the world’s largest logistics company and now manages their wireless globally. While Eric is one example, hundreds of more examples come to mind. I’ve had students who 95% of the time start help desk and over a period of one or two years worked their way to higher level positions in some of the country’s Fortune 500 companies and in every type of business and industry you can think of.
Are you truly ever out of a help desk position? No. You may not have that grind of answering phones daily but you are trying to please the end user and the problems never go away. With a society that thrives on technology, you have to accept that innovation and new technology brings on new problems and headaches.
Handling the stress of help desk and continuing your career in IT-
Accept the fact that you are in customer service regardless of your position
Obtain higher level certifications
Continue your education with a higher-ed institution – Don’t take an IT job too soon and don’t leave school before getting your diplomas and certifications.
Realize that the customer is venting at the situation and not you
Help other IT personnel and work as a team
Ignore any negative personnel who bring you down
IT is in the top ten growing industries and the opportunities are greater than any other career
Find ways after hours to relax and get away
Information Technology will continue to grow and positions will continually be added in this field. Less than five years ago, we didn’t truly have mobile computing experts that took care of a field that is growing at an unprecedented rate. Become an expert in several fields and prove yourself not only to your managers and company but prove yourself to you.
Windows has scanned the file system and found no problems.
No further action is required.
210265706 KB total disk space.
85477192 KB in 194156 files.
164792 KB in 45090 indexes.
4 KB in bad sectors.
628894 KB in use by the system.
65536 KB occupied by the log file.
123994824 KB available on disk.
4096 bytes in each allocation unit.
52566426 total allocation units on disk.
30998706 allocation units available on disk.