Archive

Archive for February, 2010

How to configure the size limit for both (.pst) and (.ost) files in Outlook 2007 and in Outlook 2003

19 February 2010 15 comments

How to configure the size limit for both (.pst) and (.ost) files in Outlook 2007 and in Outlook 2003 Microsoft
Office Outlook 2007 and Microsoft Office Outlook 2003 supports both American National Standards Institute (ANSI) and UNICODE personal folders (.pst) and offline folder (.ost) files. This article describes how to use the following four registry entries to limit the size of both the .pst and the .ost files:

  • The MaxFileSize registry entry
  • The WarnFileSize registry entry
  • The MaxLargeFileSize registry entry
  • The WarnLargeFileSize registry entry

Follow these steps to configure the size limit for both the .pst and the .ost files.
Note The settings that are discussed in this article apply to both .ost and .pst files. If you modify these registries, this can affect .ost files that are used with Cached Exchange Mode, with AutoArchive, and with .pst. files.
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:

322756 How to back up and restore the registry in Windows

  1. Click Start, and then click Run.
  2. In the Open box, type regedit, and then click OK.
  3. In the left pane, expand My Computer, and then expand HKEY_CURRENT_USER.
  4. Expand Software, and then expand Policies.
  5. Expand Microsoft, and then expand Office.
  6. Expand 11.0 for Outlook 2003 and 12.0 for Outlook 2007, and then expand Outlook.
  7. Click PST, and then right-click MaxFileSize in the right pane.
  8. Click Modify, and then type the value in the Value data box.
  9. Click OK.
  10. Right-click WarnFileSize, and repeat steps 8 through 9.
  11. Right-click MaxLargeFileSize, and repeat steps 8 through 9.
  12. Right-click WarnLargeFileSize, and repeat steps 8 through 9.

Note You may have to create the registry values if they do not exist. If the registry values do not exist, follow these steps to create them.

1. Click Start, click Run, type Regedit, and then click OK.
2. In the left pane, expand following registry key:

  • For Outlook 2007
    • HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\12.0\Outlook
  • For Outlook 2003
    • HKEY_CURRENT_USER\Software\Policies\Microsoft\Office\11.0\Outlook

3. On the Edit menu, point to New, and then click Key.
4. Type PST, and then press ENTER.
5. On the Edit menu, point to New, and then click DWORD value.
6. Type MaxFileSize, and then press ENTER two times.
7. In the Edit DWORD Value window, type the value in the Value data box, and then click OK.
8. Repeat steps 3 through 7 to create another DWORD WarnFileSize.
9. Repeat steps 3 through 7 to create another DWORD MaxLargeFileSize.
10. Repeat steps 3 through 7 to create another DWORD WarnLargeFileSize, and then close the registry.

Note For mass deployment of these registry keys on end-user machines, the ORK tool can be used.

For further information click on this URL:

http://support.microsoft.com/kb/832925

NetSetMan

NetSetMan

NetSetMan” is a network settings manager which can easily switch between 5 different, visually structured profiles.

Features:
* IP Adress
* Subnet Mask
* Default Gateway
* Preferred as well as
* Alternate DNS Server
* Somputer Name + Workgroup

It is not only useful and effective but also easy and intuitive to handle. The entry fields remind of the Windows “Internet Protocol (TCP/IP) Properties” but it´s much easier to fill in the adresses. NetSetMan network settings manager which can switch between visually structured profiles. With only 2 mouse clicks you can activate a saved profile!
All settings and changes are saved automatically in a separate file (settings.ini) so a backup, transfer or upgrade to another version is absolutely no problem.

SO: Windows 2000/XP/2003/Vista/7

License: Freeware for your non-commercial purposes.

Homepage: http://www.netsetman.com/

Download page: http://www.netsetman.com/dl/netsetman.exe

SpeedyFox

SpeedyFox
Mozilla Firefox is by far the best feature-rich and fastest browser out there, but with the passage of time it slows down considerably. It will take a lot of time to load during startup, the overall speed will be effected, and browsing Histories will be too slow. This is very common problem and it occurs largely because of fragmentation of databases.
SpeedyFox is a brand new small utility that fixes this problem with a single click! It seems unbelievable but after you optimize your Firefox with this tool, you will get a fresh newly-installed feel because the speed indeed gets considerably faster. You will get up 3 times faster startup speed, browsing history will become faster, and performing operations with cookies will be quicker than before.
Features:
  • Boost Firefox startup in up to 3 times!
  • Speed-up browsing history
  • Quicker operation with cookies
The method used in SpeedyFox is 100% safe for your profile (e.g. bookmarks, passwords, etc), it´s well documented and tested on many computers.
Full portable. No need to install.
SO: Windows 2000/XP/Vista/7
License: Freeware
Categories: Browsers

Most famous and popular Browsers

Most famous and popular Browsers

A browser is a program that allows view the contents of the pages of Web sites and interact with them, allowing the user to surf the internet. In fact, the browser is able to interpret HTML/PHP/ASP – the code with which they are written most of the websites – and display it in the form hypertext.

Browsers are mainly used on personal computers, but on other devices that allow surfing the Internet, as PDAs and smartphones.

The most famous and popular are Microsoft Internet Explorer, Mozilla Firefox, Opera, Google Chrome and Safari.

Categories: Browsers

Hiren’s BootCD

Hiren’s BootCD is a wonderful live CD containing various programs such as:

  • Hard drive recovery
  • Hard Drive Partition
  • Hard Drive Backup
  • Hard Drive Testing
  • RAM (Memory) Testing
  • System Information
  • MBR (Master BootRecord)
  • BIOS
  • MultiMedia
  • Password
  • NTFS (FileSystems)
  • Antivirus
  • AntiSpy
  • Process
  • Windows Startup
  • Registry tools
  • Windows Cleaners
  • Optimizers
  • Tweakers
  • and many others…

As it is a bootable CD, it can be useful even if the primary operating system cannot be booted. We may call it as an emergency cd which every computer technician or home user must have.

Homepage: http://www.hiren.info/pages/bootcd

System Explorer

System Explorer

Major Features:

  • Detailed informations about Tasks, Processes, Modules, Startups, IE Addons, Uninstallers, Windows, Services, Drivers, Connections and Opened Files.
  • Easy check of suspicious files via VirusTotal or Jotti service.
  • Easy search details about file/process via online databases.
  • Launcher (“New Task…” dialog) with integrated AutoSearch and AutoCompletion.
  • Action History for monitoring processes activities.
  • Performance graphs for monitoring usage of system resources in time.
  • System Snapshots for easy finding of system changes.
  • System Report builds rich text report containing major informations about your System.
  • Multilanguage and Plugins Support.
  • Version 2.0 brings brand new user interface and Windows 7 support.
  • **NEW** Security feature with online File Reviews.

OS: Windows XP,Windows Vista or Windows 7
License: SystemExplorer is FREE for personal and commercial use!
Downloadftp://majorgeeks.mirror.internode.on.net/systeminfo/SystemExplorerSetup.exe

UNIX – Lesson 024 – Job and Job Scheduling – ps and kill commands

In Unix, every program running on system is called process.

Each application can fork more than one process.

Each process has an identification number called :

  • PID (Process ID)

and the forking process ID is called

  • PPID (parent PID).

It is possible to run time consuming programs in background.

==================================================================================

ps

The “ps” command is used to get a list of process running

Syntax :
ps [options]

Key argument:

  • -e lists information about every process now running
  • -f generates a full listing
  • -u uidlist lists only process data whose effective user ID number or login
    name is given in “uidlist”. Normally used with “f”
    option

Example :
$ ps

PID TTY TIME COMMAND
12569 ttyp9 0:00 ps
12554 ttyp9 0:00 sh

$ ps –ef

UID PID PPID C STIME TTY TIME COMMAND
root 1 0 0 Sep 3 ? 0:54 init
root 2 0 0 Sep 3 ? 84:41 sh

$ ps –fu xarabas

UID PID PPID C STIME TTY TIME COMMAND
xarabas 1 0 0 Sep 3 ? 1:54 init
xarabas 2 0 0 Sep 3 ? 54:41 xclock

==================================================================================
kill
The “kill” command sends a terminate signal to a process

Syntax:
kill [-s signal_name [signal_number]] PID [PID …]

The kill table signal (usually used)

Signal Name Signal Number Description
HUP 1 Hang up signal
KILL 9 Kill (cannot be ignored)

Use the command
kill –l
to get a complete list of all signal

Example :
$kill 995 #by default kill send TERM signal

$kill –9 995 #send –KILL signal

Categories: Unix

UNIX – Lesson 023 – Printers and printer spooler – lp, lpstat and cancel commands

Printers and printer spooler
In this lesson we will speal about the most used command to use to print/check/cancel a submitted print.

==================================================================================
lp

The “lp” (line printer spooler) command is used to submits print requests to a destination, assigning a unique ID number.
Syntax :
lp [-d printer] [-options] filename …

Key argument :

  • -d Prints file on a specific destination.
  • -n # Prints a specific number of copies of file.
  • -q # Assigns a priority in the print queue. Specify priority-level as an integer between from 0 and 39. Use 0 to indicate the highest priority.

Example :
$ lp report # print to default printer
Request id is IT-HP405-114 (1 file)

$ lp –n2 memo1 memo2 # print two copies for every files
Request id is IT-HP405-115 (2 files)

$ ls –l | lp –d IT-HP405 # print from standard input
Request id is IT-HP405-116 (std. input)

==================================================================================
lpstat
The “lpstat” command displays information about the current status of the LP print service
Syntax :
lpstat [-tosrR]

Key argument :

  • -a lists all available printers
  • -t prints all information about the status of all printers
  • -o [printer] print the status of output requests
  • -s print a status summary, (status of the LP scheduler, default destination, list of printers etc.)
  • -r print the status of the LP request scheduler.
  • -R print a number showing the position of each request in the print queue.

Example :
$ lpstat –o
IT-HP5100-4 xarabas@itctnss0111 31781 Mar 10 18:10
IT-HP5100-5 root@itctnss0161 31823 Mar 10 18:10
IT-HP5101-856 ernescpp@itctnss0145 249752 Mar 10 18:10

$ lpstat –t
scheduler is running
no system default destination
system for IT-HP5101-l7: itctnss0145  (as printer raptor)
IT-HP5101-l7 accepting requests since Mar 10 18:17 2005
printer IT-HP5101-l7 is idle. enabled since Mar 10 18:18 2005.

$ lpstat –s
scheduler is running
system default destination: itctnss0145
system for IT-HP5101: itctnss0145 (as printer raptor)
system for IT-HP5102: itctnss0145 (as printer vtcds)

==================================================================================
cancel
The “cancel” command is used to remove the requests from the print queue

Syntax :
cancel id [id …]

Key argument :

  • -u username   Cancels jobs owned by username.

Example :
$ cancel IT-HP5100-128
Remove jobID 128 from printer IT-HP5100

$ cancel IT-HP5100
Remove current job on IT-HP5100

$ cancel -u xarabas
Remove all jobs owned by xarabas

N.B.:
The user can remove only his own request, only “root” can remove the request of other users.

Categories: Unix

“NTFSInfo tool” and “NtfsMftZoneReservation” registry setting

NTFSInfo and NtfsMftZoneReservation

NTFSInfo” is a little applet that shows you information about NTFS volumes.
Its dump includes the size of a drive’s allocation units, where key NTFS files are located, and the sizes of the NTFS metadata files on the volume. This information is typically of little more than curiosity value, but NTFSInfo does show some interesting things.

Installation and Use
NTFSInfo works on all versions of NTFS, but NTFS for Windows NT 5.0 has different meta-data files that NTFSInfohas not been programmed for yet. In order for NTFSInfo to work you must have administrative privilege.
To use it, type “NTFSInfo x”, where ‘x’ is the drive letter of the NTFS volume that you want to examine.

To Download click here.

==================================================================================

Probably the most important of the key system (metadata) files that define an NTFS volume, the Master File Table or MFT is the place where information about every file and directory on an NTFS volume is stored
If you have problem with the free space, the system become slow, you can add/increase “NtfsMftZoneReservation” value, perform the following steps:

  • Run Registry Editor (Regedt32.exe), and go to the following subkey:
  • HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem
  • From the Edit menu, click Add Value.
  • Type the following information in the dialog box:
    • Value Name: NtfsMftZoneReservation
    • Data Type : REG_DWORD
    • Data : (valid range is 1-4)

N.B.:
If the range is equal to “1” then you will allocate for MFT 200MB, if the range is “2” then 400Mb … and so on.
For further information click on http://support.microsoft.com/kb/961095.

UNIX – Lesson 022 – .rhost file

.rhost

.rhosts” file  is used to control which machines trust other machines for access to your account. If a machine trusts another machines then it will allow a specified user (usually yourself) to access your account without having to enter a password.
If the system administrator has configured the system to use remsh, you can use rcp/rlogin without any additional configuration.
To use rcp, require the following:
  • Read permission on the files you want to copy; read and search permission on all directories.
  • An account (login) on the remote system.
  • A “.rhosts” file in the home directory of the remote system containing the names of the local system and loginame.
Example :
hpabc leslie
Where hpabc is the name of workstation and leaslie is the local loginame.
This setting allows leslie on hpabc to copy files on the remote system containing the ”.rhosts” file.
Categories: Unix