Posts

Showing posts from January, 2013

Frequently Asked Questions- SCCM FAQ

What is the purpose of extended AD schema? What are MP, SLP and DP? Why we are using BITS? If client is not reporting data/info then which point is falls under? If we want to advertisement a package in a single client then how do to that? How to create collections? What is feature of SCCM 2k7? – Internet based client, OSD and Wake on LAN. Where the SMS server and client log file will be store? What is the direct collection membership? What is the wake on LAN? What is the pre-requisites of SCCM 2k7? What is Wake on LAN and how it’s works? What is OSD? And what are the options available? What is diff. between WSUS & ITMU? If pkg is not reaching the secondary server then what could be a issue? What is NAP? What are the issue faced while distribute the package from primary server to secondary server? Which tool are you using to monitor SMS server? What kind of major issues face on the client side? What is the different between pkg refresh and update, where the chan

A Short notes on ' SCCM 2007 Basics'

Image
I've been looking for short notes that facilitate quick understanding knowledge on SCCM 2007. I finally put my efforts to bring a short notes on SCCM 2007 to help those who are already familiar with Systems Management Server (SMS) 2003 and who wish to quickly develop understanding knowledge on 'Microsoft System Center Configuration Manager 2007'. Microsoft SCCM -2007 (ConfigMgr) provides a comprehensive solution for change and configuration management for the Microsoft platform, enabling organizations to provide relevant software and updates to users quickly and cost-effectively, Allows IT staff to monitor and manage the hardware & software in a modern distributed environment. SCCM 2007 Features HW/SW Inventory Software Distribution Software Update Software Metering Operating System Deployment (Image capture/deployment, User State Migration, Task sequence) Manage site accounts tool (MSAC) Asset Intelligence Remote tools NAP Works with Windows Server

Activation Issue seen with Windows 8

Image
Error Message - Run the Command Prompt with  RUN-AS Administrator  using  ELEVATED RIGHTS Right click on the start-button -> select Command Prompt (admin)  à  Or: Windows+Q->cmd->right click onto CMD -> Appbar “Run as admin” slmgr.vbs –ipk  Where  “VVVVV-VVVVV-VVVVV-VVVVV-VVVVV”  is your downloaded product key. End result -

Java Control Panel Icon "Application Not Found"

Image
Howto: Fix the "Application not found" error in the Java Control Panel icon. These same steps may be useful for other malfunctioning Windows Control Panel icons. In Windows 7, the Java Control Panel icon may be damaged / corrupted. Attempting to launch the icon results in "Explorer.exe : Application not found". Note the generic icon: When working properly, the circled icon should look like this: This problem appears to be an artifact from previous JRE installations and Sun's installation routines were flawed. Re-installing JRE (the Java Runtime Environment) does not resolve the problem. Immediate workaround: If needed, the Java Control Panel can be manually launched using this location: C:\Program Files (x86)\Java\JRE6\bin\Javacpl.exe As a side note, when launching, other-mouse-click the .exe and choose "Run as Administrator".  Running as Administrator resolves a bug where changes in the Control Panel (especially Auto-update changes) do not stic

The antivirus industry dirty little secret revealed

Image
The antivirus industry has a dirty little secret: its products are often not very good at stopping viruses. Enlarge This Image Symantec Security experts at the Symantec Security Operation Center in Alexandria, Va. The word “antivirus” is less used on its products. Consumers and businesses spend billions of dollars every year on antivirus software. But these programs rarely, if ever, block freshly minted computer viruses, experts say, because the virus creators move too quickly. That is prompting start-ups and other companies to get creative about new approaches to computer security. “The bad guys are always trying to be a step ahead,” said Matthew D. Howard, a venture capitalist at Norwest Venture Partners who previously set up the security strategy at Cisco Systems. “And it doesn’t take a lot to be a step ahead.” Computer viruses used to be the domain of digital mischief makers. But in the mid-2000s, when criminals discovered that malicious software could be prof