SAYA Search Engine

Saturday, September 18, 2010

MS Backup Recovery Software

Recover Data for MS Backup repair, rebuilds or restores corrupt MS Backup Files (BKF) that are failes to open. Recover Data for MS Backup Software allow access to corrupt bkf files which cannot be opened or restored using the original backup software due to any kind of corruption. Software successfully repair corrupt BKF files that have been corrupt due to some common reasons as follows:
  • Backup Interruption,
  • Virus Attacks,
  • CRC Errors or
  • Backup Software Corruption

MS Backup Recovery software is a professional bkf file recovery program to repair corrupt bkf files. MS Backup Recovey software repairs BKF files quickly and easily from corrupt bkf, damaged bkf.

Recover Data for MS Backup successfully repair corrupt BKF files even after the instances of following errors:

  • "The backup file is unusable. You must erase it, or choose another file".
  • "The fixed media is full. You cannot back up all of the specified data to this disk device. The backup operation will stop".
  • "The backup file contains unrecognized data and cannot be used".
  • "An inconsistency was encountered on the requested media".

Advanced Features of MS Backup Recovery Software

  • Supports to display all files & directories in tree structure.
  • Supports to repair corrupt BKF files.
  • Recovery of corrupt BKF Archive.
  • Repair BKF files more than 300GB.
  • Open more than one corrupt BKF file at a time.
  • Option to Save recovered files in compressed format.
  • Supports unicode characters (Non English Characters also).
  • Add to Cart option to save only selective files.
  • Save Catalog & Open Catalog feature – To resume backup recovery process later & to save time.
  • Mail Settings Feature - to send recovered files as an email attachment.
  • Advance Search features - To search for particular files from the list of recovered data.

Our MS Backup Recovery Software has been awarded as Best BKF Recovery Software by many Shareware Sites and Recovery Gurus.

Windows Data Recovery Software

Recover Data for Windows is professional Windows Data Recovery Software to recover deleted or lost files, folders from Windows Partition. Recover Data for Windows software recover data from windows crashed hard disk drives. Recover Data for Windows retrieve or restore corrupt partition table, boot sector, formatted, lost or deleted data & files/folders.

Recover Data for Windows is an effective tool to recover windows data, deleted from Recycle Bin using the Shift+Delete keys. Recover Data for Windows successfully recovers data from FAT & NTFS Partitions of Windows Operating System. Data from the damaged, formatted, deleted or corrupt partitions of Windows 95, 98, ME, NT, XP, 2000, 2003, Windows Vista and Windows 7 is successfully recovered by the Recover Data for Windows Vista data recovery software.

Recover Data for Windows - Windows Data Recovery Software & Windows file recovery tool is quick, simple and easy to use Windows Vista data recovery software with attractive Graphical User Interface (GUI) & also data recovery software to restore lost or deleted partitions, files and folders. Recover Data for Windows Vista data recovery software successfully recovers data from hard disk drive or other storage media such as Pen drive, Floppy disk, Memory Card (SD card & MMC card), Flash memory, Zip drives, iPods, mobile communicators etc.

Recover Data for Windows partition recovery utility perfectly works on Windows 7 OS and recover windows 7 partition data. Try Windows 7 Data Recovery Program and scan Windows 7 hard drive and see the best Windows 7 file recovery results.

Data Recovery Tools

Recover Data is a professional data recovery company dedicated in providing advance data recovery software, email recovery tools, file recovery tools, disk recovery programs, file repair software & utilities, data safety tools and data recovery services to help you perform hard drive recovery, partition recovery, email recovery, file recovery. At Recover Data we provide complete partition recovery software solution including formatted partition recovery & deleted partition recovery tools. With hundreds of satisfied customers across the globe and years of expertise in the data recovery world, we are leader of physical data recovery and imparts crashed hard drive recovery services using our best range of data recovery software, email recovery tool, file recovery tool & data restoration services. Our proprietary data recovery software & tools and techniques has given us the leading edge in data recovery industry with a proven track record and satisfied clientele. To know more about our professional data recovery software and unique data recovery services, download the demo of our free data recovery software & file recovery software to evaluate the possibility of data recovery from corrupt or damaged storage media.

Saturday, September 4, 2010

How Configer DHCP Service

Installing the DHCP Service

You can install DHCP either during or after the initial installation of Windows 2000 Server or Advanced Server, although there must be a working DNS in the environment. To validate your DNS server, click Start, click Run, type cmd, press ENTER, type ping friendly name of an existing DNS server in your environment, and then press ENTER. An unsuccessful reply generates an "Unknown Host My DNS server name" message.

To install the DHCP Service on an existing Windows 2000 Server:
  1. Click Start, click Settings, and then click Control Panel.
  2. Double-click Add/Remove Programs, and then click Add/Remove Windows Components.
  3. In the Windows Component Wizard, click Networking Services in the Components box, and then click Details.
  4. Click to select the Dynamic Host Configuration Protocol (DHCP) check box if it is not already selected, and then click OK.
  5. In the Windows Components Wizard, click Next to start Windows 2000 Setup. Insert the Windows 2000 Advanced Server CD-ROM into the CD-ROM drive if you are prompted to do so. Setup copies the DHCP server and tool files to your computer.
  6. When Setup is complete, click Finish.

Configuring the DHCP Service

After you install and start the DHCP service, you must create a scope (a range of valid IP addresses that are available for lease to the DHCP clients). Each DHCP server in your environment should have at least one scope that does not overlap with any other DHCP server scope in your environment. In Windows 2000, DHCP servers within an Active Directory domain environment must be authorized to prevent rogue DHCP servers from coming online and authorizing a DHCP Server.

When you install and configure the DHCP service on a domain controller, the server is typically authorized the first time that you add the server to the DHCP console. However, when you install and configure the DHCP service on a member server, you need to authorize the DHCP server.

Note A stand-alone DHCP server cannot be authorized against an existing Windows Active Directory.

To authorize a DHCP server:
  1. Click Start, click Programs, click Administrative Tools, and then click DHCP.

    Note You must be logged on to the server with an account that is a member of the Enterprise Administrators group.
  2. In the console tree of the DHCP snap-in, select the new DHCP server. If there is a red arrow in the bottom-right corner of the server object, the server has not yet been authorized.
  3. Right-click the server, and then click Authorize.
  4. After a few moments, right-click the server again and then click Refresh. The server should display a green arrow in the bottom-right corner to indicate that the server has been authorized.
To create a new scope:
  1. Click Start, click Programs, point to Administrative Tools, and then click DHCP.

    Note In the console tree, select the DHCP server on which you want to create the new DHCP scope.
  2. Right-click the server, and then click New Scope. In the New Scope Wizard, click Next, and then type a name and description for the scope. This can be any name that you choose, but it should be descriptive enough to identify the purpose of the scope on your network. For example, you might use Administration Building Client Addresses.
  3. Type the range of addresses that can be leased as part of this scope, for example, a starting IP address of 192.168.100.1 to an ending address of 192.168.100.100. Because these addresses are given to clients, they should all be valid addresses for your network and not currently in use. If you want to use a different subnet mask, type the new subnet mask. Click Next.
  4. Type any IP addresses that you want to exclude from the range you entered. This includes any addresses that may have already been statically assigned to various computers in your organization. Click Next.
  5. Type the number of days, hours, and minutes before an IP address lease from this scope expires. This determines the length of time that a client can hold a leased address without renewing it. Click Next to select Yes, I want to configure these options now, and then extend the wizard to include settings for the most common DHCP options. Click Next.
  6. Type the IP address for the default gateway that should be used by clients that obtain an IP address from this scope. Click Add to place the default gateway address into the list, and then click Next.

    Note When DNS servers already exist on your network, type your organization's domain name in Parent domain. Type the name of your DNS server, and then click Resolve to ensure that your DHCP server can contact the DNS server and determine its address. Then click Add to include that server in the list of DNS servers that are assigned to the DHCP clients. Click Next.
  7. Click Yes, I want to activate this scope now, to activate the scope and allow clients to obtain leases from it, and then click Next. Click Finish.

Troubleshooting

  • Clients are unable to obtain an IP address
    If a DHCP client does not have a configured IP address, it generally means that the client has not been able to contact a DHCP server. This is either because of a network problem or because the DHCP server is unavailable. If the DHCP server has started and other clients have been able to obtain a valid address, verify that the client has a valid network connection and that all related client hardware devices (including cables and network adapters) are working properly.
  • The DHCP server is unavailable
    When a DHCP server does not provide leased addresses to clients, it is often because the DHCP service has failed to start. If this is the case, the server may not have been authorized to operate on the network. If you were previously able to start the DHCP service, but it has since stopped, use Event Viewer to check the system log for any entries that may explain the cause.

    Note To restart the DHCP service, click Start, click Run, type cmd, and then press ENTER. Type net start dhcpserver, and then press ENTER.

Dell Printer Plotter Driver

DELL PRINTER PLOTTER MULTIFUNCTION Devices

0050D0A1 AE32 11DB BE7F 00000432FEFA DELL LASER PRINTER 1100
0050D0A6 AE32 11DB BE7F 00000432FEFA DELL LASER PRINTER 1110
DELL 1130 LASER PRINTER DELL LASER PRINTER 1700
DELL 1133 LASER MFP DELL LASER PRINTER 1700 XL V
DELL 1135N LASER MFP DELL LASER PRINTER 1700N
DELL 1230C COLOR LASER PRINTER DELL LASER PRINTER 1700N PS3
DELL 1235CN COLOR LASER MFP DELL LASER PRINTER 1700N XL V
DELL 2130CN COLOR LASER PCL6 DELL LASER PRINTER 1710
DELL 2135CN MFP PCL6 DELL LASER PRINTER 1710N
DELL 2145CN COLOR LASER MFP DELL LASER PRINTER 1710N PS3
DELL 2145CN COLOR LASER MFP PS DELL LASER PRINTER 1720
DELL 2230D LASER PRINTER DELL LASER PRINTER 1720 XL
DELL 2230D LASER PRINTER PS3 DELL LASER PRINTER 1720DN
DELL 2230D LASER PRINTER XL DELL LASER PRINTER 1720DN PS3
DELL 2230D LASER PRINTER XPS DELL LASER PRINTER 1720DN XL
DELL 2330D LASER PRINTER DELL LASER PRINTER 3000CN PCL6
DELL 2330DN LASER PRINTER DELL LASER PRINTER 3100CN PCL6
DELL 2335DN MFP DELL LASER PRINTER 5210N
DELL 3130CN COLOR LASER PCL6 DELL LASER PRINTER 5210N PS
DELL 3333DN LASER MFP DELL LASER PRINTER 5210N PS3
DELL 3333DN LASER MFP PS3 DELL LASER PRINTER 5210N XL
DELL 3333DN LASER MFP XL DELL LASER PRINTER 5310N
DELL 3335DN LASER MFP DELL LASER PRINTER 5310N PS
DELL 3335DN LASER MFP PS3 DELL LASER PRINTER 5310N PS3
DELL 3335DN LASER MFP XL DELL LASER PRINTER 5310N XL
DELL 5130CDN COLOR LASER PCL6 DELL LASER PRINTER M5200
DELL 5230N LASER PRINTER DELL LASER PRINTER M5200 PS3
DELL 5230N LASER PRINTER PS3 DELL LASER PRINTER M5200N XL V
DELL 5330DN MONO LASER PRINTER PS DELL LASER PRINTER P1500 PS3
DELL 5350DN LASER PRINTER DELL LASER PRINTER S2500 PS3
DELL 5350DN LASER PRINTER PS3 DELL LASER PRINTER W5300N XL V
DELL 5530DN LASER PRINTER DELL MFP 1125 PRINTER
DELL 5530DN LASER PRINTER PS3 DELL MFP 1125 SCANNER
DELL 5530DN LASER PRINTER XPS DELL MFP LASER 3115CN PS
DELL 7130CDN PS DELL MFP LASER 3115CN SCANNER
DELL 7130CN PS DELL P513W
DELL 7330DN PS DELL P713W
DELL 7330N PS DELL PHOTO AIO 928
DELL 968 AIO PRINTER DELL PHOTO AIO PRINTER 922
DELL AIO 810 DELL PHOTO AIO PRINTER 924
DELL AIO PRINTER 946 DELL PHOTO AIO PRINTER 926
DELL AIO PRINTER 948 DELL PHOTO AIO PRINTER 942
DELL AIO PRINTER A920 DELL PHOTO AIO PRINTER 944
DELL AIO PRINTER A940 DELL PHOTO AIO PRINTER 962
DELL AIO PRINTER A960 DELL PHOTO AIO PRINTER 964
DELL COLOR LASER 1320C DELL PHOTO AIO PRINTER 966
DELL COLOR LASER 3010CN DELL PHOTO PRINTER 720
DELL COLOR LASER 3110CN PS DELL PRINTER 5100CN PS
DELL COLOR LASER 5110CN PS DELL USB DEVICE
DELL COLOR PRINTER 725 DELL V105
DELL INKJET PRINTER J740 DELL V305
DELL LASER MFP 1600N DELL V310 V510 SERIES
DELL LASER MFP 1600N PCL 6 DELL V505
DELL LASER MFP 1815 DELL V715W

Information Of Dell Company

One of the more prominent names in personal computers worldwide is Dell Inc. Dell is a multinational company that employs more than 76,500 employees worldwide as of 2009 and ranks third in total worldwide sales of personal computers, notebooks, netbooks, servers, data storage devices, network switches and other computer peripherals.

Fortune Magazine ranked Dell as the 34th largest company in 2007 Fortune 500 list. The publication also listed Dell as the 8th most admired companies in the United States which has consistently performed excellently in the past 15 years and continuous to do so until today.

Corporate Milestones and History

Founder Michael Dell had only $1000 in capital when he started what soon to be called Dell Inc. Working in an off-campus dormitory room, Michael started the company by building IBM PC-compatible computers using only stock components then sell these directly to customers. The rest, as people say, is history.

1984 to 1989

Michael Dell started PC’s Limited as a startup company in 1984 when he was still a student at the University of Texas in Austin. Sales of his personal computer systems peaked up as customers find their computing needs provided by solutions offered by PC’s Limited. Michael eventually left school to focus on this business, now beefed-up by a $300,000 expansion capital he got from his family, and came up with his own Turbo PC design in 1985.

Selling the computers directly to costumers accounted for the lower price than other retail brand which contributed directly to the success of PC’s Limited. Eventually, the company changed its name to Dell Computer Corporation in 1988. Capitalization grew to $80 million during its first initial public offering in 1988 which catapulted the business to its international operations.

1990 to 1999

By 1990, Dell continued to focus on its direct-to-consumer marketing strategies as attempts to sell the personal computer products at warehouse clubs and PC superstores proved unsuccessful . In line with this strategy, Dell started selling its computers directly to customers via its web site in 1996.

2000 to 2008

Dell Computer Corporation changed its name to Dell Inc. in line with its plans for expansion into the multimedia and computer peripheral business with the introduction of printers, handhelds and digital audio players. In 2007, Dell announced it will start distribution of computers with pre-loaded systems such as Linux as an alternative to the Microsoft Windows environment.

2009 and Beyond

Keeping up with the worldwide demand for the latest technologies, Dell introduced a new line of notebook and netbook computers that feature top-of-the-line multimedia elements and 3G capabilities, including better mobility, security, communications and performance.

Products and Technologies

Dell Inc. is a leading designer, developer and manufacturer of high quality computer systems and products that are marketed and sold worldwide. These products include innovative computing, networking and storage solutions for home, office and personal applications. Dell also offers professional computer solutions, workstations and servers for high-performance business applications.

Such a variety of products require users to get the most up-to-date applications, utilities and device drivers in order to get the most out of their system’s performance. Although Dell provides 24/7 support and downloadable drivers and utilities, doing these tasks manually and on your own could consume a significant investment in your time and might result in errors or wrong installations.

To remedy this, Driver Detective offers top-of-the-line scan technologies that will check a system for outdated device drivers. Once identified, Driver Detective can then select the most accurate and up-to-date drivers from its database containing millions of device driver updates. This includes drivers for the following Dell products:

  • Computer Systems -- Dell offers desktop computers, workstations, and servers for business and corporate applications. Notebooks, desktop, and netbooks for commercial consumer applications are also available, from its budget computer lines to the high-end computer products.
  • Computer Peripherals -- These includes USB drives, printers, LCD monitors and displays
  • Multimedia -- Dell also offers LCD projectors for high-definition or standard applications. Dell also has PDA’s and MP3 players but has ceased distribution during the past few years.

Dell Inc. continues to produce high quality computer products and peripherals geared towards home, personal as well as small/medium business enterprises and offers these through direct marketing publications, print and internet media.

Wednesday, September 1, 2010

Repair PST File Step By Step

This article provides a step-by-step tutorial on how to use the included Outlook Inbox Repair Tool, also known as Scanpst.exe

From time to time, the .pst or Personal Folders file used for everything (email, calendar, contacts, tasks & more) in Outlook gets corrupted, damaged, or otherwise negatively affected on a seemingly regular basis.

Petri's Recommended PST File Repair Download

Depending on the level of file corruption affecting the Outlook .pst data file, we highly recommend you try a .pst file scan with the Stellar Phoenix Outlook PST Repair. In addition to email, this app recovers calendar entries, contacts, notes, nicknames, and other Outlook data file elements.

You can grab the direct download here.

Luckily there's the fortuitously included "Inbox Repair Tool" from Microsoft. The bad news is it's buried in the bowels of your hard drive's Program Files folder.

The Outlook ScanPst.exe .PST Recovery Tool

To get at it, you'll need to navigate to this path using Windows Explorer:

For Outlook XP & 2003: Hard Drive Letter:\Program Files\Common Files\System\MSMAPI\LocaleID (which is 1033 for the USA or similar)

For Outlook 2007: Hard Drive Letter:\Program Files\Microsoft Office\OFFICE12Now, inside this folder, you're looking for this particular setup file: "Scanpst.exe" When you run the .exe, you'll need to Browse... to your current .pst file and hit Start:

Scanpst.exe file selection

The Inbox Repair Tool will now scan the corrupted .PST file for errors:

Scanpst.exe file selection

If your PST file is recoverable, you'll see the repairable errors show up in the scan results. To fix them, select Repair.:

Scanpst.exe file repair

Transferring Recovered PST File Data to New PST File

Once the repair finishes, Outlook creates a "Recovered" version of your .pst file, and you need to tell Outlook to use it rather than the old, damaged or corrupted .pst file.Next, you'll need to point Outlook in the right direction, namely at the recovered .PST file: Start Outlook Normally Special Note: If Scanpst.exe wasn't able to repair the .pst data file, you may need a stronger repair tool. Try scanning it with the Stellar Phoenix PST repair utility. Select Go from the top menu, choose Folder List:

Scanpst.exe file selection

With the Folder List open, you should see a Recovered Personal Folders folder with the usual Outlook Personal Folders, or a Lost and Found option.If the Lost and Found folder has a file that the Inbox Repair Tool successfully fixed, it will show up here. If it's empty, the Repair Tool was unsuccessful.If you do see a fixed .pst file in the Lost and Found box, you'll need to create a new .pst file to move the repaired file(s) to. After you've simply dragged the files over from the "Recovered" .pst file to the newly created .pst file , you can turf the Recovered Personal Folders contents.

Windows Server 2008 Installion Step Last

If you're installing on a hard disk that's connected to a SCSI controller, click Load Driver and insert the media provided by the controller's manufacturer.

If you're installing in a Virtual Machine environment, make sure you read the "Installing the Virtual SCSI Controller Driver for Virtual Server 2005 on Windows Server 2008"

If you must, you can also click Drive Options and manually create a partition on the destination hard disk.

11. The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard drive only takes about one minute. However, extracting and uncompressing the files takes a good deal longer. After 20 minutes, the operating system is installed. The exact time it takes to install server core depends upon your hardware specifications. Faster disks will perform much faster installs… Windows Server 2008 takes up approximately 10 GB of hard drive space.

The installation process will reboot your computer, so, if in step #10 you inserted a floppy disk (either real or virtual), make sure you remove it before going to lunch, as you'll find the server hanged without the ability to boot (you can bypass this by configuring the server to boot from a CD/DVD and then from the hard disk in the booting order on the server's BIOS)

12. Then the server reboots you'll be prompted with the new Windows Server 2008 type of login screen. Press CTRL+ALT+DEL to log in.

13. Click on Other User.

14. The default Administrator is blank, so just type Administrator and press Enter.

15. You will be prompted to change the user's password. You have no choice but to press Ok.

16. In the password changing dialog box, leave the default password blank (duh, read step #15…), and enter a new, complex, at-least-7-characters-long new password twice. A password like "topsecret" is not valid (it's not complex), but one like "T0pSecreT!" sure is. Make sure you remember it.

17. Someone thought it would be cool to nag you once more, so now you'll be prompted to accept the fact that the password had been changed. Press Ok.

18. Finally, the desktop appears and that's it, you're logged on and can begin working. You will be greeted by an assistant for the initial server configuration, and after performing some initial configuration tasks, you will be able to start working.

Next, for the initial configuration tasks please follow my other Windows Server 2008 articles found on the Related Windows Server 2008 Articles section below.

Step Next

10. In the "Where do you want to install Windows?", if you're installing the server on a regular IDE hard disk, click to select the first disk, usually Disk 0, and click Next.

If you're installing on a hard disk that's connected to a SCSI controller, click Load Driver and insert the media provided by the controller's manufacturer.

If you're installing in a Virtual Machine environment, make sure you read the "Installing the Virtual SCSI Controller Driver for Virtual Server 2005 on Windows Server 2008"

If you must, you can also click Drive Options and manually create a partition on the destination hard disk.

11. The installation now begins, and you can go and have lunch. Copying the setup files from the DVD to the hard drive only takes about one minute. However, extracting and uncompressing the files takes a good deal longer. After 20 minutes, the operating system is installed. The exact time it takes to install server core depends upon your hardware specifications. Faster disks will perform much faster installs… Windows Server 2008 takes up approximately 10 GB of hard drive space.

The installation process will reboot your computer, so, if in step #10 you inserted a floppy disk (either real or virtual), make sure you remove it before going to lunch, as you'll find the server hanged without the ability to boot (you can bypass this by configuring the server to boot from a CD/DVD and then from the hard disk in the booting order on the server's BIOS)

12. Then the server reboots you'll be prompted with the new Windows Server 2008 type of login screen. Press CTRL+ALT+DEL to log in.

Server 2008 installion Step

6. Because you did not provide the correct ID, the installation process cannot determine what kind of Windows Server 2008 license you own, and therefore you will be prompted to select your correct version in the next screen, assuming you are telling the truth and will provide the correct ID to prove your selection later on.

7. If you did provide the right Product ID, select the Full version of the right Windows version you're prompted, and click Next.

8. Read and accept the license terms by clicking to select the checkbox and pressing Next.

9. In the "Which type of installation do you want?" window, click the only available option – Custom (Advanced).

10. In the "Where do you want to install Windows?", if you're installing the server on a regular IDE hard disk, click to select the first disk, usually Disk 0, and click Next.

How To Install Server 2008

Note: Windows Server 2008 can also be installed as a Server Core installation, which is a cut-down version of Windows without the Windows Explorer GUI. Because you don’t have the Windows Explorer to provide the GUI interface that you are used to, you configure everything through the command line interface or remotely using a Microsoft Management Console (MMC). The Server Core can be used for dedicated machines with basic roles such as Domain controller/Active Directory Domain Services, DNS Server, DHCP Server, file server, print server, Windows Media Server, IIS 7 web server and Windows Server Virtualization virtual server. For Server Core installations please see my "Installing Windows Server 2008 Core" article.

To use Windows Server 2008 you need to meet the following hardware requirements:

Component Requirement
Processor • Minimum: 1GHz (x86 processor) or 1.4GHz (x64 processor) • Recommended: 2GHz or faster Note: An Intel Itanium 2 processor is required for Windows Server 2008 for Itanium-based Systems
Memory • Minimum: 512MB RAM • Recommended: 2GB RAM or greater • Maximum (32-bit systems): 4GB (Standard) or 64GB (Enterprise and Datacenter) • Maximum (64-bit systems): 32GB (Standard) or 2TB (Enterprise, Datacenter and Itanium-based Systems)
Available Disk Space • Minimum: 10GB • Recommended: 40GB or greater Note: Computers with more than 16GB of RAM will require more disk space for paging, hibernation, and dump files
Drive DVD-ROM drive
Display and Peripherals • Super VGA (800 x 600) or higher-resolution monitor • Keyboard • Microsoft Mouse or compatible pointing device

Upgrade notes:

I will not discuss the upgrade process in this article, but for your general knowledge, the upgrade paths available for Windows Server 2008 shown in the table below:

If you are currently running: You can upgrade to:
Windows Server 2003 Standard Edition (R2, Service Pack 1 or Service Pack 2) Full Installation of Windows Server 2008 Standard Edition

Full Installation of Windows Server 2008 Enterprise Edition

Windows Server 2003 Enterprise Edition (R2, Service Pack 1 or Service Pack 2) Full Installation of Windows Server 2008 Enterprise Edition
Windows Server 2003 Datacenter Edition (R2, Service Pack 1 or Service Pack 2) Full Installation of Windows Server 2008 Datacenter Edition

Follow this procedure to install Windows Server 2008:

1. Insert the appropriate Windows Server 2008 installation media into your DVD drive. If you don't have an installation DVD for Windows Server 2008, you can download one for free from Microsoft's Windows 2008 Server Trial website.

2. Reboot the computer.

3. When prompted for an installation language and other regional options, make your selection and press Next.

4. Next, press Install Now to begin the installation process.

5. Product activation is now also identical with that found in Windows Vista. Enter your Product ID in the next window, and if you want to automatically activate Windows the moment the installation finishes, click Next.

If you do not have the Product ID available right now, you can leave the box empty, and click Next. You will need to provide the Product ID later, after the server installation is over. Press No.

cyber crime

INTRODUCTION:

The term ‘cyber crime’ is a misnomer. This term has nowhere been defined in any statute /Act passed or enacted by the Indian Parliament. The concept of cyber crime is not radically different from the concept of conventional crime. Both include conduct whether act or omission, which cause breach of rules of law and counterbalanced by the sanction of the state.

Before evaluating the concept of cyber crime it is obvious that the concept of conventional crime be discussed and the points of similarity and deviance between both these forms may be discussed.

CONVENTIONAL CRIME-

Crime is a social and economic phenomenon and is as old as the human society. Crime is a legal concept and has the sanction of the law. Crime or an offence is “a legal wrong that can be followed by criminal proceedings which may result into punishment.”(1) The hallmark of criminality is that, it is breach of the criminal law. Per Lord Atkin “the criminal quality of an act cannot be discovered by reference to any standard but one: is the act prohibited with penal consequences”. (2)

A crime may be said to be any conduct accompanied by act or omission prohibited by law and consequential breach of which is visited by penal consequences.

CYBER CRIME

Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime” (13).Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12)

A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”(3) The computer may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber defamation, cyber stalking. The computer may however be target for unlawful acts in the following cases- unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system.

DISTINCTION BETWEEN CONVENTIONAL AND CYBER CRIME-

There is apparently no distinction between cyber and conventional crime. However on a deep introspection we may say that there exists a fine line of demarcation between the conventional and cyber crime, which is appreciable. The demarcation lies in the involvement of the medium in cases of cyber crime. The sine qua non for cyber crime is that there should be an involvement, at any stage, of the virtual cyber medium.

REASONS FOR CYBER CRIME:

Hart in his work “ The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be:

  1. Capacity to store data in comparatively small space-

The computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much more easier.

  1. Easy to access-

The problem encountered in guarding a computer system from unauthorised access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system.

3.Complex-

The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system.

4.Negligence-

Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system.

5. Loss of evidence-

Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.

Experts in Cisco Certification Training




IPsolutions provides high quality training boot camps that leads to certifications from leading companies in the industry like Cisco, Microsoft, CheckPoint and others.

It ensures a very high quality level by employing only the best faculties (trainers) and investing heavily in modern equipment & in constantly updating each trainer to ensure that participants are taught the latest technologies and nothing is left out due to lack of resources. Our trainers are subject matter experts & have extensive industry and teaching experience. We have multiple CCIE certified trainers apart from several trainers who are certified in the associate & professional level certifications in Cisco track, MCSE, CCSA, etc.

Students from many different countries (United States of America [USA], Great Britan [UK], Australia, Nigeria, Kenya, Israel, Kuwait, Dubai, Saudi Arabia, etc.) have come to IPsolutions for their Cisco training needs.