skip to main | skip to sidebar
  • الرئيسية
  • Windows
    • windows server 2012
  • Network
    • CCNA
  • مواضيع عامة
  • مواضيع تطويرية
  • اتصل بي

WINDOWS

  • عام
  • network
  • windows server 2012
  • WINDOWS

delete the user profile from a domain joined Windows PC

مايو 06, 2016  Unknown  

Windows Registry User Profile List



To clear user local profile via registry:
  1. Press on Start > Run >Regedit
  2. Navigate to the following registry key :“HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList”
  3. Under ProfileList navigate to binary key’s like this: S-1-5-21-3656904587-1668747452-4095529-500
  4. On the right side under ProfileImagePath you’ll see the username and profile path.
  5. Chose the one with the desired user and delete the long registry key like: “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList”
  6. Windows Registry User Profile List
     


     

اقرء المزيد

Rollback from Windows 10

مايو 06, 2016  Unknown  






To roll back your Windows 10, go to your PC Settings, by typing Settings in the taskbar search bar, next to the Windows icon, and clicking on Settings. It will open the PC Settings. Select ‘Update and Security’.
Rollback from Windows 10
 
The Update and Security option opens. Here you will see options like Windows Update, Activation, Backup, Recovery and Windows Defender. Click on ‘Recovery‘.

rollback to Win 10 c
 
This will open the Recovery settings window for your PC. You will see 3 options:
  1. Reset this PC: Remove everything and reinstall Windows. This will take your PC to its original factory settings.
  2. Go back to your previous version of Windows: This will just bring your previous Windows back on your PC without affecting your documents and files. Note that you have to carry out the rollback operation, within 30 days of upgrading to Windows 10
  3. Advanced Startup: Here you can change your PC settings using a Windows image or a USB/DVD.
rollback to Win 10 d
 
Click on ‘Go back to previous version of Windows’. In this case you see Go back to Windows 8.1.
Microsoft will then ask for your feedback and the reason to uninstall Windows 10.
  
Rollback to Windows 10 ab
 
Give your feedback and move ahead. Click on Next. You will see the following screen
.
rollback to win 10 e
 
Make sure your PC is plugged in as the rollback might get interrupted due to power off. Click on the Go back to Windows 8.1 button.
 
Make sure your PC is plugged in as the rollback might get interrupted due to power off. Click on the Go back to Windows 8.1 button.
g
 
 Your system might take a while to process the roll back and read the settings of your previous Windows version. Sit back and enjoy a cup of coffee. Note the important warning – you need to know or remember your password you used to sign on into your previous Windows version.

اقرء المزيد

WORKING OFFLINE

مايو 06, 2016  Unknown  

If the status bar at the bottom of your Outlook window shows either of these status indicators, it means Outlook isn’t connected to your mail server.
 
Click Send/Receive > Work Offline to turn to reconnect.
 
Working offline option on the Send Receive tab
 
File->Info->Account Settings->Account Settings->Change->More Settings->General->Manually control connection state->Connect with network


MS Outlook 2010 set online mode on startup

اقرء المزيد

Difference Between NTFS and FAT 32 File Systems

أبريل 30, 2016  Unknown  

 Comparison-Table




 
FAT stands for File Allocation Table and FAT32 is an extension which means that data is stored in chunks of 32 bits. These is an older type of file system that isn’t commonly used these days.
 
NTFS stands for New Technology File System and this took over from FAT as the primary file system being used in Windows
 
 

Description of Features

Fault Tolerance: NTFS maintains a log of disk changes and in case of power failure or abrupt errors it repairs the files and folders automatically without the user being notified anything. FAT32 maintains two different copies of the file allocation table and uses a back up mechanism if some damage occurs.
Security: In FAT32 you will have to depend on share permissions for security. This means that they are good in the Network but locally they are vulnerable. On the other hand NTFS allows you to set permissions on local files and folders as well.
Compression: FAT32 offers no compression feature whatsoever. While NTFS lets you compress files and folders individually so that you do not have to slow down the system by depending on partition compressions.
Conversion: You may easily convert a FAT32 system to NTFS. But the reverse is not true because NTFS follows a secure protocol. So, the only option here is to backup your data and format the disk.

اقرء المزيد

Kodi

أبريل 30, 2016  Unknown  لا يوجد تعليقات

 
 
Kodi is an award-winning free and open source (GPL) software media center for playing videos, music, pictures, games, and more. Kodi runs on Linux, OS X, Windows, iOS, and Android, featuring a 10-foot user interface for use with televisions and remote controls. It allows users to play and view most videos, music, podcasts, and other digital media files from local and network storage media and the internet.
 
visit web
 
https://kodi.tv/ 

اقرء المزيد

K9

أبريل 30, 2016  Unknown  لا يوجد تعليقات

 
 
What do you want to protect ?
 
Protect Your Children
K9 Web Protection is a free Internet filter and parental control software for your home Windows or Mac computer
 
Protect Yourself
K9 Web Protection is a free Internet filter and pornography blocker for personal use. K9 puts YOU in control of the Internet so you can protect yourself

Protect Your Computer
K9 Web Protection is a free Internet filtering and malware defense for your home computer. K9 puts YOU in control so you can protect your computer
 
Protect Your Organization
K9 Web Protection for Organizations is our Internet filtering and web security solution for your business or .........
 
Features :
  • Block web sites in more than 70 categories, including pornography, gambling, drugs, violence/hate/racism, malware/spyware, phishing
  • Force Safe Search on all major search engines
  • Set time restrictions to block web access during designated times
  • Configure custom lists for "always allow" and "always block"
  • Override a web page block with password
  • Trust the enhanced anti-tampering, even children can't break
  • View easy reports to monitor and control web activity
  • Real-time categorization of new adult and malicious sites
  • Best free parental controls software/internet filter available
  • Compatible with Windows or Mac machines

 Download free  
http://www1.k9webprotection.com/
 

 

اقرء المزيد

RAID

أبريل 30, 2016  Unknown  

is a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both .
Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. The different schemas, or data distribution layouts, are named by the word RAID followed by a number, for example RAID 0 or RAID 1. Each schema, or a RAID level, provides a different balance among the key goals: reliability, availability, performance, and capacity. RAID levels greater than RAID 0 provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives

Standard RAID levels
RAID 0: This configuration has striping but no redundancy of data. It offers the best performance but no fault-tolerance
 
RAID 0 diagram
 
RAID 1: Also known as disk mirroring, this configuration consists of at least two drives that duplicate the storage of data. There is no striping. Read performance is improved since either disk can be read at the same time. Write performance is the same as for single disk storage.
RAID 1 diagram  
 
RAID 2: This configuration uses striping across disks with some disks storing error checking and correcting (ECC) information. It has no advantage over RAID 3 and is no longer used.

RAID 2 diagram  
 
RAID 3: This technique uses striping and dedicates one drive to storing parity information. The embedded ECC information is used to detect errors. Data recovery is accomplished by calculating the exclusive OR (XOR) of the information recorded on the other drives. Since an I/O operation addresses all drives at the same time, RAID 3 cannot overlap I/O. For this reason, RAID 3 is best for single-user systems with long record applications.
RAID 3 diagram 
 
RAID 4: This level uses large stripes, which means you can read records from any single drive. This allows you to use overlapped I/O for read operations. Since all write operations have to update the parity drive, no I/O overlapping is possible. RAID 4 offers no advantage over RAID 5.
 
RAID 4 diagram  
RAID 5: This level is based on block-level striping with parity. The parity information is striped across each drive, allowing the array to function even if one drive were to fail. The array’s architecture allows read and write operations to span multiple drives. This results in performance that is usually better than that of a single drive, but not as high as that of a RAID 0 array. RAID 5 requires at least three disks, but it is often recommended to use at least five disks for performance reasons.
RAID 5 arrays are generally considered to be a poor choice for use on write-intensive systems because of the performance impact associated with writing parity information. When a disk does fail, it can take a long time to rebuild a RAID 5 array. Performance is usually degraded during the rebuild time and the array is vulnerable to an additional disk failure until the rebuild is complete.
 
RAID 5 diagram  
 
RAID 6: This technique is similar to RAID 5 but includes a second parity scheme that is distributed across the drives in the array. The use of additional parity allows the array to continue to function even if two disks fail simultaneously. However, this extra protection comes at a cost. RAID 6 arrays have a higher cost per gigabyte (GB) and often have slower write performance than RAID 5 arrays.
 
RAID 6 diagram  

Nested RAID levels

Some RAID levels are referred to as nested RAID because they are based on a combination of RAID levels. Here are some examples of nested RAID levels

 

اقرء المزيد

intel compute stick

أبريل 25, 2016  Unknown  

 
 
 
 
 
 


 
 
It's not like a computer. It is a computer. Same operating system, same high quality graphics, and same wireless connectivity as a full-sized computer. Totally different dimensions
Wi-Fi
OS: Windows 10
Super portable, Plugs into any display with an HDMI port, Runs full Windows 10 Home
2GB of RAM limits multitasking, 32GB of builtin storage, Can create a mess of wires

Super small fully functional PC, 802.11ac WiFi, USB 3.0 2 ports, Expandable storage, Affordable                                                
Bad: Relatively low performance but within expectations

 

 

 
 

اقرء المزيد

WD Sentinel DX4000

أبريل 25, 2016  Unknown  لا يوجد تعليقات



Sentinel DX4000 Small Office Storage Server


SummaryFour-bay small business Intel D525 Atom based NAS running on Windows Storage Server 2008 R2 Essentials
Pros• Bundled bare-metal client backup
• Handles up to 25 users
• Provision for dual external power supplies (one supplied)
• USB 3.0 ports
Cons• No power save mode
• Fan runs full blast when system is off
• Extremely long RAID re-initialization times
• No Apple Time Machine support
• Limited backup options

اقرء المزيد

Create a local user account in Windows 10

أبريل 22, 2016  Unknown  لا يوجد تعليقات

Applies to Windows 10
Here's how to create another account on your PC for a child or someone else who doesn't have a Microsoft account.
  1. Select the Start button, and then select Settings.
  2. Select Accounts > Other users.
  3. Under Other users, select Add someone else to this PC.
  4. At the bottom of the page, select I don’t have this person’s sign-in information.
  5. At the bottom of the next page, select Add a user without a Microsoft account.
  6. Enter a name for the new account. If you want this person to sign in with a password, enter and verify the password, add a password hint, and then select Next.
  7. Select Finish.

اقرء المزيد

Install microsoft office 2016

أبريل 22, 2016  Unknown  لا يوجد تعليقات

 

 
 Download Microsoft Office 2016 from TigerWare.
  • Select Microsoft Office 2016 Professional Plus version and then download the correct bit (32 or 64) for your operating system.
screenshot of office 2016 download links on tiger ware.
 
  • Open the .iso file from your download location..
  • Then, click setup.exe from the mounted DVD location.
screenshot of office 2016 iso setup location.
 
 Accept the terms of the License Agreement by checking I accept the terms of this agreement. Click Continue.
screenshot of accepting the microsoft terms.
 
Select Upgrade. You may click Customize to keep specific Office products from upgrading or to change the download location.
screenshot of microsoft 2016 upgrade button.
 
5. Microsoft Office 2016 will begin to install. After it has finished, it will display the message below. You can now open Office 2016 from your programs folder or Start menu.
screenshot of office's install finished message.

اقرء المزيد

remote access

أبريل 22, 2016  Unknown  لا يوجد تعليقات


 

اقرء المزيد

Outlook 2016

أبريل 22, 2016  Unknown  

Step 1 -

Click File in the top-left corner.

Open Outlook 2016

Step 2 - Click Add Account


Click on add account

Step 3 - Enter your details

  • Enter your Name, your Email address and the Password for your email account with One.com.
  • Click Next.

add account details

Step 4 - Configure your account

  • Wait while Outlook completes the setup.
  • Check the box for Change account settings and click Next.

Check the box for change settings

Step 5 - Click More Settings


Add account and click more settings

Step 6 - Enter Root folder path

  • Click on the Advanced tab.
  • Enter INBOX as the Root folder path and click OK.

Enter root folder path

Step 7 - Complete setup

  • Click Finish, Outlook will now test your account settings by trying to send a test message.
  • Press Close when the tests are completed.

Finish setup
Congratulations! You are now done.

اقرء المزيد

open source vs close source

أبريل 22, 2016  Unknown  

 
المصدر المفتوح :
 
هو مفهوم المنتجات و برامج السوفت وير الذي يكون الكود الخاص بها مفتوح ومتاح لجميع المطورين للاضافة و التعديل فيه دون قيود و ايضا اضافة مزايا جديدة لها كما يتيح لهم فرصة التعلم الجيد
 
المصدر المغلق :
 
و هي المنتجات التي تكون مغلقة الكود اى ان المطور او المبرمج لا يستطيع التعديل فيه

خصائص:

المصدر المفتوح :

  • يوفر حماية امنية عالية من حيث عدم قدرة اى فيروس من اصابة ملفاته او الضرر بها
  • ليس له حدود من حيث التطوير و الابداع
  • يحتوي على مركز برامج خاص
  • اي خطأ فنى يظهر تستطيع معالجته بنفسك ولا تحتاج للدعم الفنى من قبل الشركة
  • اذا حدث خطأ يمكن البحث عن الحلول في الويب
  • ليس له مقابل مادى فقط

المصدر المغلق :

  • كل منتج بثمنه ولا تستطيع الحصول عليه مجانا
  • الحفاظ على حقوق الملكية الفكرية فلن تستطيع الاستعانة بفكرة موجودة والتطوير بها نظرا لخفاء الكود الخاص بها
  • حدوث الكثير من الاخطاء نظرا لان عدد المطورين محدود على عكس المصدر المفتوح
  • كثيرا ما تغير نظام التشغيل المغلق لكثرة الاعطال به مما يضطرك الى بذل وقت وجهد
امثلة :

المصادر المفتوحة :

  • لغات برمجة (python-Java-PHP-Perl-Ruby)
  • نظم تشغيل (ubuntu-feedora-Debian-Red Hat)

المصادر المغلقة :

  • لغات برمجة (.Net”C# – ASP.NET- MySql”)
  • نظم تشغيل (Windows XP – Windows 7 – Windows 8)
 

اقرء المزيد

How to Clean, Optimize, Fix and Speed Up a Slow PC

أبريل 22, 2016  Unknown  لا يوجد تعليقات

 

Clean Up Junk Data

Junk data accumulates on a PC over time and causes performance to suffer, slowing down other programs and system services. Follow these steps to clean up junk data in Windows.
  1. Press the Windows key and the R key at the same time to open the Run prompt.
  2. Type into the Run prompt: cleanmgr.exe
 run_cleanmgr
  1. Press Enter. A new window will open.
  2.  cleanmgr1

  3. Select the drive that you want to clean from the drop down menu and click OK. The disk cleanup utility will scan for junk files. Note: Windows will only search for a limited selection
  4. of junk files. 
  5. cleanmgr2

  6. Select the categories that you wish to clean junk items for by ticking the box next to the category listing. You can see next to each category the sum amount of the size of the data.
  7.  cleanmgr3

  8. Once you’ve finished making your selections, click OK to delete the files.
Note: This built-in Windows tool does a minimal job of cleaning junk data. Download SlimCleaner Plus to automatically remove gigabytes of junk data that could be on  your PC.

اقرء المزيد

Open Data base Connectivity

أبريل 22, 2016  Unknown  

 
 

Microsoft Open Data base Connectivity (ODBC)


The Microsoft Open Database Connectivity (ODBC) interface is a C programming language interface that makes it possible for applications to access data from a variety of database management systems (DBMSs). ODBC is a low-level, high-performance interface that is designed specifically for relational data stores.
The ODBC interface allows maximum interoperability—an application can access data in diverse DBMSs through a single interface. Moreover, that application will be independent of any DBMS from which it accesses data. Users of the application can add software components called drivers, which interface between an application and a specific DBMS.

-----------------------------------------------------------------


Open Database Connectivity (ODBC) is a standard application programming interface (API) for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems. An application written using ODBC can be ported to other platforms, both on the client and server side, with few changes to the data access code.
ODBC accomplishes DBMS independence by using an ODBC driver as a translation layer between the application and the DBMS. The application uses ODBC functions through an ODBC driver manager with which it is linked, and the driver passes the query to the DBMS. An ODBC driver can be thought of as analogous to a printer driver or other driver, providing a standard set of functions for the application to use, and implementing DBMS-specific functionality. An application that can use ODBC is referred to as "ODBC-compliant". Any ODBC-compliant application can access any DBMS for which a driver is installed. Drivers exist for all major DBMSs, many other data sources like address book systems and Microsoft Excel, and even for text or comma-separated values (CSV) files.

اقرء المزيد

windows event viewer

أبريل 22, 2016  Unknown  لا يوجد تعليقات

Event Viewer is a tool that displays detailed information about significant events (for example, programs that don't start as expected or updates that are downloaded automatically) on your computer. Event Viewer can be helpful when troubleshooting problems and errors with Windows and other programs. For more information about Event Viewer
  • Open Event Viewer by clicking the Start button Picture of the Start button, clicking Control Panel, clicking System and Security, clicking Administrative Tools, and then double-clicking Event Viewer.‌ Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation
  • OR Run - evevntvwr - Windows log - system

اقرء المزيد

HeavyLoad

أبريل 22, 2016  Unknown  لا يوجد تعليقات

HeavyLoad
 
Bring your PC to its limits with the freeware stress test tool HeavyLoad. HeavyLoad puts your workstation or server PC under a heavy load and lets you test whether they will still run reliably
The individual test methods employed by HeavyLoad can be customized to fit your needs. On a system featuring multiple processor cores, for example, you can select how many of the available cores shall be used or set the speed in which the test file is to be written on your hard disk

اقرء المزيد

Sysprep

أبريل 22, 2016  Unknown  لا يوجد تعليقات


The System Preparation (Sysprep) tool prepares an installation of Windows for duplication, auditing, and customer delivery. Duplication, also called imaging, enables you to capture a customized Windows image that you can reuse throughout an organization. Audit mode enables you to add additional device drivers or applications to a Windows installation. After you install the additional drivers and applications, you can test the integrity of the Windows installation. Sysprep also enables you to prepare an image to be delivered to a customer. When the customer boots Windows, Windows Welcome starts.
Sysprep must be used only to configure new installations of Windows. You can run Sysprep as many times as required to build and to configure your installation of Windows. However, you can reset Windows activation only up to three times. You must not use Sysprep to reconfigure an existing installation of Windows that has already been deployed. Use Sysprep only to configure new installations of Windows.
If you intend to transfer a Windows image to a different computer, you must run sysprep /generalize, even if the computer has the same hardware configuration. The sysprep /generalize command removes unique information from your Windows installation, which enables you to reuse that image on different computers. The next time you boot the Windows image, the specialize configuration pass runs. During this configuration pass, many components have actions that must be processed when you boot a Windows image on a new computer. Any method of moving a Windows image to a new computer, either through imaging, hard disk duplication, or other method, must be prepared with the sysprep /generalize command. Moving or copying a Windows image to a different computer without running sysprep /generalize is not supported.

اقرء المزيد

Differences between a 32-bit and 64-bit CPU

أبريل 22, 2016  Unknown  

A big difference between 32-bit processors and 64-bit processors is the number of calculations per second they can perform, which affects the speed at which they can complete tasks. 64-bit processors can come in dual core, quad core, six core, and eight core versions for home computing. Multiple cores allow for an increased number of calculations per second that can be performed, which can increase the processing power and help make a computer run faster. Software programs that require many calculations to function smoothly can operate faster and more efficiently on the multi-core 64-bit processors, for the most part.
Another big difference between 32-bit processors and 64-bit processors is the maximum amount of memory (RAM) that is supported. 32-bit computers support a maximum of 3-4GB of memory, whereas a 64-bit computer can support memory amounts over 4 GB. This feature is important for software programs used in graphic design, engineering, and video editing as these programs have to perform many calculations to render their images.
One thing to note is that 3D graphic programs and games do not benefit much, if at all, from switching to a 64-bit computer, unless the program is a 64-bit program. A 32-bit processor is adequate for any program written for a 32-bit processor. In the case of computer games, you'll get a lot more performance by upgrading the video card instead of getting a 64-bit processor.
In the end, 64-bit processors are becoming more and more commonplace in home computers. Most manufacturers build computers with 64-bit processors due to cheaper prices and because more users are now using 64-bit operating systems and programs. Computer parts retailers are offering fewer and fewer 32-bit processors and soon may not offer any at all.

اقرء المزيد

power options

أبريل 22, 2016  Unknown  لا يوجد تعليقات

 
 
 
 
 
 
 
A power plan is a collection of hardware and system settings that manages how your computer uses power. Power plans can help you save energy, maximize system performance, or achieve a balance between the two.

All users (standard and administrator) will be able to make changes to any power plan settings except for the grayed out options. The grayed out options (ex: "require password on wakeup") can only be changed by an administrator using the "Change settings that are currently unavailable" option.

Changes made to a power plan will affect all users that have chosen the same power plan as their default active power scheme.
 
 

اقرء المزيد
رسائل أحدث رسائل أقدم الصفحة الرئيسية
  • الجديد
  • الاقسام
  • كافة المواضيع

المشاركات الشائعة

  • Using IPAM to Manage IP Addressing
    IP address space management allows administrators to manage, track, audit, and report on an organization’s IPv4 and IPv6 address spaces...
  • Finding, Allocating, and Reclaiming IP Addresses
    There are two operations that can be performed on an IP Address Range: You can Find and Allocate Available IP Address or Reclaim IP Add...
  • شبكة الاتصال المحلية
    • شبكة الاتصال المحلية (LAN) – عبارة عن مجموعة من أجهزة الكمبيوتر الموجودة ضمن منطقة جغرافية صغيرة، وعادة مبنى واحد. • تتطلب شبكة الاتص...
  • How to Configure DNS Reverse Lookup Zone in Windows Server 2012
      1. The first thing we have to do is to open the "Server Manager" and than click "DNS" under "Tools" . ...
  • Repairing Your IP Address
      Using the Graphical User Interface (GUI) to repair your IP address Locate the Search Bar at the bottom left of the Taskbar. ...
  • What Is DHCP Name Protection/ Failover ?
    What Is DHCP Name Protection? You should protect the names that DHCP registers in DNS on behalf of other computers or systems fro...
  • Physical Network Topologies
    أنواع الشبكات حسب التصميم الهندسي Physical Network Topologies Bus Topology ...
  • العادات واثرها
  • Protocols البروتوكولات
    Protocols البروتوكولات هام : كل بروتوكول يأخذ منفذ Port يعمل عليه وتبدأ هذه المنافذ من 0 حتى 65535 منفذ وبعض المن...
  • Options for locating iSCSI targets
    iSCSI initiators can discover iSCSI targets using four different methods, as outlined in the following table:   Disc...

التسميات

  • عام
  • مواضيع تطويرية
  • CCNA
  • network
  • Windows
  • windows server 2012

أرشيف المدونة الإلكترونية

  • ◄  2017 (58)
    • ◄  سبتمبر (58)
  • ▼  2016 (35)
    • ▼  مايو (3)
      • delete the user profile from a domain joined Windo...
      • Rollback from Windows 10
      • WORKING OFFLINE
    • ◄  أبريل (32)
      • Difference Between NTFS and FAT 32 File Systems
      • Kodi
      • K9
      • RAID
      • intel compute stick
      • WD Sentinel DX4000
      • Create a local user account in Windows 10
      • Install microsoft office 2016
      • remote access
      • Outlook 2016
      • open source vs close source
      • How to Clean, Optimize, Fix and Speed Up a Slow PC
      • Open Data base Connectivity
      • windows event viewer
      • HeavyLoad
      • Sysprep
      • Differences between a 32-bit and 64-bit CPU
      • power options

ما رأيك في الموقع ؟

 
  • مواقع التواصل
  • TwitterFacebookGoogle PlusRSS FeedInstagramSkypeSnapchatYoutube