Professional Documents
Culture Documents
bench3 Inc,
[JANUARY 2010]
© 2010, bench3 Inc
bench3
CONTENT:
1. LIST OF ALL SAP TRANSACTION CODES RELATED TO ADMINISTRATION [2]
2. WHAT IS NEW IN WINDOWS 7 | DIFFERENCE BETWEEN WINDOWS VISTA AND WINDOWS 7 [8]
6. INSPIRATION FOR THE WEEK | A REAL STORY THAT HAPPENED IN JAPAN. [16]
11. CLEAN UP THE TASKBAR TRAY ICONS | TURN OFF THE TRAY ICONS COMPLETELY [28]
12. CHANGE THE ICON FOR ALL FILES OF A TYPE IN WINDOWS 7 AND VISTA [30]
13. ALL NEW KEYBOARD SHORTCUTS IN WINDOWS | FOR XP VISTA AND WINDOWS SEVEN [31]
15. LOCK YOUR FILE TYPES IN WINDOWS 7 AND WINDOWS VISTA [38]
16. SUCCESS OF ANY RELATIONSHIP STARTS WITH UNDERSTANDING | STORY ON MARRIAGE [39]
17. HOW TO CREATE REGISTRY PATCHES | EXPORT AND IMPORT REGISTRY PATCHES [41]
18. PROTECT PEN DRIVE FROM VIRUSES | FREE ANTIVIRUS FOR USB FLASH DRIVE [45]
DB2J Manage JCL jobs for OS/390 RZ06 Alerts Thresholds Maintenance
DBCO Database Connection Maintenance RZ08 SAP Alert Monitor
FILE Cross-Client File Names/Paths RZ10 Maintenance of profile parameters
NACE WFMC: Initial Customizing Screen RZ11 Profile parameter maintenance
OAA1 SAP ArchiveLink: Maint.user st.syst RZ12 Maintain RFC Server Group Assignment
OAA3 SAP ArchiveLink protocols RZ20 CCMS Monitoring
OAA4 SAP ArchiveLink applic.maintenance RZ21 Customize CCMS Alert Monitor
OAAD ArchiveLink Administration Documents SA38 ABAP/4 Reporting
OAC2 SAP ArchiveLink: Globaldoc. types SAD0 Address Management call
OAC5 SAP ArchiveLink: Bar code entry SADC Address: Maint. communication types
OACA SAP ArchiveLink workflow parameters SALE Display ALE Customizing
OAD0 SAP ArchiveLink: Objectlinks SAINT Plug-in Installation
OAD2 SAP ArchiveLink document classes SARI Archive Information System
OAD3 SAP ArchiveLink: Link tables SAR3 Customizing Archiving
OAD4 SAP ArchiveLink: Bar code types SAR4 Define Archiving Class
OAD5 SAP ArchiveLink: Customizing Wizard SAR5 Assign Archiving Class
OADR SAP ArchiveLink: Print list search SAR6 Archiving Time Generator
OAM1 SAP ArchiveLink: Monitoring SARA Archive management
OAOR SAP ArchiveLink: Storeddocuments SARL Call of ArchiveLink Monitor
OARE SAP ArchiveLink:St.syst.return codes SARP Reporting (Tree Structure): Execute
OS01 LAN check with ping SART Display Reporting Tree
OS03 O/S Parameter changes SB01 Business Navigator - Component View
OS04 Local System Configuration SB02 Business Navigator - Process flow vw
OS05 Remote System Cconfiguration SBAS Assignments to Process Model Elemts
OS06 Local Operating System Activity SC38 Start Report Immediately
OS07 Remote Operating SystemActivity SCAT Computer Aided Test Tool
OSS1 Logon to Online ServiceSystem SCC0 Client Copy
OY18 Table history SCC1 Client Copy - Special Selections
OY08 Development Class Overview SCC2 Client transport
PFCG Activity Group SCC3 Client Copy Log
PFUD Authorization Profile comparison SCC4 Client administration
RLOG Data migration logging SCC5 Client Delete
RZ01 Job Scheduling Monitor SCC6 Client Import
RZ02 Network Graphics for SAP Instances SCC7 Client Import – Post Processing
RZ03 Presentation, Control SAP Instances SCC8 Client Export
RZ04 Maintain SAP Instances SCC9 Remote Client Copy
Yeah, that’s definitely damning with faint praise. I don’t deny it. Alexander Pope would’ve been proud.
Microsoft learned many lessons during the Vista Wars. It changed a lot of features in Windows 7. But it
didn’t change the driver model — the way hardware interacts with Windows. In fact, interaction with
hardware in Windows 7 is almost indistinguishable from that in Vista Service Pack 1. So if you have
hardware that works with Windows Vista, it will almost certainly work with Windows 7. No changes
required. No new drivers, as long as you don’t do something funny, like switch from 32-bit Vista to 64-bit
Windows 7.
Better Performance
Incredibly, Microsoft tightened up Vista. Windows 7 runs faster than Vista in most circumstances. It takes
less memory. It occupies less space on your hard drive — even after you install Windows Live Essentials.
Some savings and improvements are a tad illusory: Hard drive requirements fell because of a reduction in
space reserved for shadow copies for example. But most people who try Windows 7 find it faster, less of
a hog, and more reliable than Vista. There I go with that faint praise stuff again.
Improved interface
New versions of Windows invariably bring claims of improvements to the interface — and journalists join
in on the “ooohs” and “aaaaahs” whenever Microsoft execs show off their flashy glittergrades — changes
designed to show new sizzle, without really changing the steak. TechnoBling.
In Windows 7, some changes rate as genuinely useful. The new Taskbar (many of us still call it by its
code name, Superbar) makes many daily tasks faster and easier to complete. The Aero Snap feature lets
you drag a window to an edge of the screen and have it automatically resize to half-screen size — a boon
to anyone with a wide screen.
Microsoft ditched the Windows Sidebar in Windows 7. Now gadgets — the little clock and stock ticker and
the like — can float anywhere on the desktop as shown in the above figure). These gadgets could float in
Vista, too, but few Vista users ever figured that out.
Security Improvements
I’m told that Pliny the Elder once described the alarm system of ancient Rome by saying, “Even when the
dogs sleep, the goose watches.” User Account Control — the goose of Windows Vista, if you’ll forgive a
transmillennia metaphor — has undergone significant changes in Windows 7. If you don’t change the
original setting, User Account Control security prompts you with the darken-your-screen-and-pray
messages that bugged millions of Vista users. However, the prompts occur infrequently, and only when
there seems to be genuine cause for concern.
Finally, Windows 7 has a few improved security features, but the ones you can see — such as
HomeGroups and the revamped BitLocker drive encryption — bundle old Vista security concepts
differently and make them usable.
Figure: Sticky notes are easier to access and create (and still easy to lose) Paint has a few new features
Windows Media Center gets a facelift in Windows 7, along with a whole bunch of support for different
kinds of video and audio files and in-the-box capabilities to connect to CableCARD and clear QAM tuners.
Several of the tired, old (very old) Windows standbys — Calculator, Paint, WordPad — sport new
interfaces and capabilities (see Figure Above). Windows 7 has better troubleshooting support, enhanced
networking features especially for wireless networks, and hundreds of little improvements.
Several Vista programs (Windows Mail, Messenger, Movie Maker, Photo Gallery) have been moved out of
Windows, repurposed as free downloads on the Internet.
Labels: Windows 7, Windows Vista
Figure: The HomeGroup feature offers a simplified interface for sharing files, printers, and digital media
between computers running Windows 7.
The Windows 7 Network And Sharing Center (shown in Figure) gets a usability overhaul designed to
reduce clutter and make common tasks easier to find.
If your network includes computers running earlier versions of Windows, you’ll need to set up shared
access using more traditional techniques. The differences from Windows XP–based networks are
profound. You can specify different levels of security for sharing and, on individual files and folders stored
on NTFS volumes, you can specify which accounts and groups, if any, are allowed to access those files.
If you’re accustomed to networking in Windows XP, you have a lot of catching up to do. Internet
Protocol version 6 (IPv6) and Internet Protocol version 4 (IPv4) work together, the Link Layer Topology
Discovery subsystem helps you build a visual map of your network. Networking changes that are new in
Windows 7 include a much-improved interface for connecting to wireless access points.
Labels: Networking, Windows 7
Several editions of Windows Server 2008 support both 32- and 64-bit processors. In fact, these editions
will support both x64 and IA64 processors.
IA64 is based on the Itanium microchip from Intel—Itanium is a 64-bit reduced instruction set computer
(RISC) processor—and while it is in use in very large organizations, has a very small following.
Also Read:
Benefits Of Windows 7 64-bit Operating System
Differences Between 32-bit and 64-bit Versions Of Windows
x64, on the other hand, offers the most important evolution in computing since the release of 32-bit
processors. Because of the exponential nature of microchip technology, 64 bits actually offer significantly
more processing power than simply doubling the capability of 32 bits.
According to Bill Gates, the coming of 64-bit computing will break all the barriers we face today.
That may be true. One thing is certain: x64 machines provide a lot more horsepower than x86 machines.
x64 systems run a series of different processors from the two microprocessor manufacturers: from AMD,
the Opteron or the Athlon 64; and from Intel, the 64-Bit Xeon or the Pentium with EM64T. What’s
exciting about these processors is that they are a lot more affordable than the I64 systems. In addition,
you have a much larger variety of operating systems to choose from: Windows Vista 64-bit edition, as
well as Windows Server 2008 Standard, Enterprise, and Datacenter editions.
According to the Microsoft Web site (see the Windows Server Catalog of Tested Products at
www.windowsservercatalog.com), there are hundreds of applications that run in native x64 mode and
more are coming. In addition, several more can run in 32-bit compatible mode.
So how does x64 measure up? The first thing you’ll notice is that everything—yes, everything—runs
faster. That is as you would expect, but it is surprising to see that even applications that aren’t designed
for the x64 system run faster. Just like the 32-bit version of the operating system, x64 runs a special
Windows on Windows (WOW) session that lets 32-bit applications run inside the 64-bit operating system.
WOW32 sessions provide better performance than even native 32-bit systems. Why is that? Because of
the limitations that x64 finally breaks.
Previously, with a 32-bit system, you needed to use at least Windows Server 2003 Enterprise edition to
gain access to more than 4 gigabytes (GB) of random access memory (RAM), then add the /PAE (physical
address expansion switch) to the Boot.INI file that controls how the operating system is launched.
Although this gave you access to more than 4 GB of RAM, it only fools the system, because a 32-bit
machine is limited to a 4-GB address space in the first place. With x64, this limitation changes to 32 GB
for Windows Vista and the Standard edition of Window Server, but jumps to 1 terabyte (TB) when
running the more advanced editions of the Windows Server operating system. In addition, there is less
reliance on the page file for virtual memory expansion in a 64-bit system. This means less disk activity for
memory-intensive applications.
These are not the only benefits of x64. It also provides faster input and output (I/O) because it can take
advantage of larger data blocks. It provides higher data transfer rates because it can run more
concurrent processes. More client connections can be set for a given server, breaking the limits of
Transmission Control Protocol/Internet Protocol (TCP/IP) on 32-bit.
In fact, Microsoft states that it has been able to vastly reduce the number of servers running Microsoft
Update, the Web site providing patch downloads, because each 64-bit server can manage vastly more
connections per server.
But these file system changes have an impact. For example, your 32-bit third-party backup and restore
tool will not work with a 64-bit machine because the file I/O driver is completely different from the 32-bit
version.
Not everything works on x64 machines today, while some applications only run on x64 platforms. One
good example is Microsoft Exchange Server 2007; it only runs in 64-bit mode.
This is exactly the way it was when 32-bit machines were introduced. One thing is certain:
What does work on 64-bits will always work faster. Our advice: If you need speed and you know that
your core applications are ready to run on x64, take the plunge. Costs are not that far off from 32-bit
systems, and the advantages are far-reaching. If you’re buying hardware today and you want to make it
last, buy x64 machines.
Also Read:
Benefits Of Windows 7 64-bit Operating System
Differences Between 32-bit and 64-bit Versions Of Windows
Disabling Grouping
Grouping isn't for everyone (including me). To disable grouping, do the following:
1. Right-click the Start button
2. Select „Properties‟
3. Select the „Taskbar‟ pane in the „ Taskbar And Start Menu‟
4. Uncheck the „Group Similar Taskbar Buttons‟ checkbox
In the value field, specify the minimum number of similar windows that need to be open to enable
grouping. A setting of 2 groups related items as soon as you open a second window, even if there‟s
plenty of room on the taskbar; 3 enables grouping as soon as you have three or more similar windows;
and so on. Now log off and log back in to put your new settings
into effect.
4. Check 'Auto-Hide The Taskbar' To access the taskbar, simply move your mouse to the side of the
screen the taskbar is located on and it will appear.
In order to renovate the house, someone in Japan breaks open the wall. Japanese houses normally have
a hollow space between the wooden walls. When tearing down the walls, he found that there was a lizard
stuck there because a nail from outside hammered into one of its feet.
He sees this, feels pity, and at the same time curious, as when he checked the nail, it was nailed 5 years
ago when the house was first built!!!
What happened? The lizard has survived in such position for 5 years .In a dark wall partition for 5 years
without moving, it is impossible and mind-boggling.Then he wondered how this lizard survived for 5
years! without moving a single step--since its foot was nailed!So he stopped his work and observed the
lizard, what it has been doing, and what and how it has been eating. Later, not knowing from where it
came, appears another lizard,with food in its mouth.Ah! He was stunned and touched deeply.
For the lizard that was stuck by nail, another lizard has been feeding it for the past 5 years...
Imagine? It has been doing that untiringly for 5 long years, without giving up hope on its partner.
Imagine what a small creature can do that a creature blessed with a brilliant mind can't.
Please never abandon your loved ones\
Never Say you are Busy When They Really Need You ...You May Have The Entire World At Your Feet. But
You Might Be The Only World To Them.. A Moment of negligence might break the very heart which loves
you through all odds.. Before you say something just remember.. It takes a moment to break but an
entire lifetime to make...
Labels: Moral Story
In fact, if you look closely at matters involving leadership, there are always three elements or variables:
• the leader – qualities of personality and character;
• the situation – partly constant, partly varying;
• the group – the followers: their needs and values.
In fact, work groups are always different, just as individuals are. After coming together they soon
develop a group personality, so that who works in one group may not work in another. All groups and
organizations are unique.
But that is only half of the truth. The other half is that work groups – like individuals – have certain needs
in common. There are three areas of overlapping needs that are centrally important, as illustrated in
Figure below.
Task need
Work groups and organizations come into being because there is a task to be done that is too big for one
person. You can climb a hill or small mountain by yourself, but you cannot climb Mount Everest on your
own – you need a team for that.
Why call it a need? Because pressure builds up a head of steam to accomplish the common task. People
can feel very frustrated if they are prevented from doing so.
Again, it is best to think of groups that are threatened from without by forces aimed at their
disintegration or from within by disruptive people or ideas. We can then see how they give priority to
maintaining themselves against these external or internal pressures, sometimes showing great ingenuity
in the process.
Many of the written or unwritten rules of the group are designed to promote this unity and to maintain
cohesiveness at all costs. Those who rock the boat or infringe group standards and corporate balance
may expect reactions varying from friendly indulgence to downright anger.
Instinctively a common feeling exists that ‘United we stand, divided we fall’, that good relationships,
desirable in themselves, are also an essential means towards the shared end. This need to create and
promote group cohesiveness I have called the team maintenance need. After all, everyone knows what a
team is.
Individual needs
Thirdly, individuals bring into the group their own needs – not just the physical ones for food and shelter
(which are largely catered for by the payment of wages these days) but also the psychological ones:
recognition; a sense of doing something worthwhile; status; and the deeper needs to give to and receive
from other people in a working situation. These individual needs are perhaps more profound than we
sometimes realise.
They spring from the depths of our common life as human beings. They may attract us to, or repel us
from, any given group. Underlying them all is the fact that people need one another not just to survive
but to achieve and develop personality.
This growth occurs in a whole range of social activities – friendship, marriage and neighbourhood – but
inevitably work groups are extremely important because so many people spend so much of their waking
time in them.
Your CD drive or DVD drive is missing or not recognized by Windows or other programs, so you cannot
play or access a CD or DVD. This issue might have occurred after you installed, uninstalled, or updated a
program or Windows Vista. Even if you have not installed, an automatic update might have caused this
problem.
This issue may have occurred after one of the following situations:
• You upgrade a computer to Windows Vista or install Windows Vista Service Pack 1.
• You install or uninstall CD or DVD recording programs.
• You uninstall Microsoft Digital Image.
• You may see one of the following error messages:
One of the following error messages appears when you view the CD drive or the DVD drive in Device
Manager.
Error message 1 : The device is not working properly because Windows cannot load the drivers
required for this device (Code 31).
Error message 2 : A driver for this device was not required, and has been disabled (Code 32 or Code
31).
Error message 3 : Your registry might be corrupted. (Code 19)
An "error code 39" error message.
A message that resembles the following appears in the notification area:
Windows successfully loaded the device driver for this hardware but cannot find the hardware device.
(Code 41).
Important: This article helps you fix the problem. Before you read further, try to backup your registry.
Read more on how to backup the registry.
This section, method, or task contains steps that tell you how to modify the registry. However, serious
problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these
steps carefully. For added protection, back up the registry before you modify it. Then, you can restore
the registry if a problem occurs. For more information about how to back up and restore the registry,
read my eariler article "How to back up and restore the registry in Windows".
This problem might have caused by two Windows registry entries that have become corrupted. To fix the
problem, you have to use Registry Editor to delete the corrupted Registry entries. To use this method,
you must be logged on to Windows as an administrator.
4. In the right pane, click UpperFilters. Note: You may also see an UpperFilters.bak registry entry.
You do not have to remove that entry. Click UpperFilters only. If you do not see the UpperFilters
registry entry, you still might have to remove the LowerFilters registry entry. To do this, go to
step 7.
5. On the Edit menu, click Delete.
6. When you are prompted to confirm the deletion, click Yes.
7. In the right pane, click LowerFilters. Note: If you do not see the LowerFilters registry entry,
unfortunately this content cannot help you any further. Find more solutions or more help on the
Microsoft Web site.
8. On the Edit menu, click Delete.
9. When you are prompted to confirm the deletion, click Yes.
10. Exit Registry Editor.
11. Restart the computer.
If you cannot play or access a CD or DVD, you may have to reinstall some programs. Some programs
might not be able to use your CD or DVD drive until you reinstall those programs. If the problem occurs
again when you install or uninstall those programs, contact the manufacturer of the program to see if an
update is available that solves the problem. Some examples of programs that might be affected are:
• iTunes software by Apple
• Nero software by Nero Inc
• Roxio Creator software by Sonic Solutions
• Zune software by Microsoft
After reinstalling your programs, if you can play or access a CD or DVD, you are finished with this article.
If you still cannot play or access a CD or DVD, please see the "Next steps" section.
If the drive is not listed, remove and reinstall the existing drivers.
If the drive is not listed, remove and reinstall the existing drivers. To do this, follow these steps:
Microsoft Windows Vista
1. Click Start, and then click Control Panel.
2. Click System and Maintenance, click System, and then click Device Manager. Note: If Control
Panel is in Classic View, double-click System, and then click Device Manager. If you are prompted
for an administrator password or for a confirmation, type the password, or click Allow.
3. In Device Manager, expland DVD/CD-ROM drives, right-click the CD and DVD devices, and then
click Uninstall.
4. When you are prompted to confirm that you want to remove the device, click OK.
5. Restart the computer.
After the computer restarts, the drivers will be automatically installed.
Microsoft Windows XP
If you can play or access a CD or DVD, you are finished with this article.
If you cannot play or access a CD or DVD, you may have to reinstall some programs. Some programs
might not be able to use your CD or DVD drive until you reinstall those programs. If the problem occurs
again when you install or uninstall those programs, contact the manufacturer of the program to see if an
update is available that solves the problem. Some examples of programs that might be affected are:
After reinstalling your programs, if you can play or access a CD or DVD, you are finished with this article.
If you continue to have questions or if you cannot find a solution here, Click the following link to contact
Microsoft Support: http://support.microsoft.com/contactus (http://support.microsoft.com/contactus)
Labels: Hardware, Troubleshoot, Windows Tips
Microsoft Office Live Workspace is now offering free online documents sharing and storage facility to it’s
users. You should never upload your important documents on to some free file sharing websites where
your file can get deleted anytime and there is no certainty of file protection also. Microsoft allows users to
use it’s free online file storage and sharing service to keep their documents safe, even with password
protection.
• It’s easy with Microsoft Office Live Workspace
• Store up to 5GB online
• Works with Microsoft Office Word, Excel and PowerPoint
• View, edit, share documents with password-protection
“Office Live Workspace lets you upload a large file and lets you easily share it with your group members,
so that they can make changes and send it back to you. You don’t have to worry about emailing
anymore, it eliminates the mess.
My advice to other students not using Office Live Workspace, would be: Get one.” says, Marty
Henningsgard, a college student.
Benefits of Microsoft Office Live Workspace
Robert W, a teacher quoted, “I have created workspace to let debate team members post documents,
take notes and meet online rather than during school hours. I can monitor their progress and coach them
more efficiently during my free time, rather than taking class time to do this. I’ve been waiting for this for
a long time.”
Microsoft Office Live Workspace eliminates the need of using a flash drive since all your documents can
be accessed and managed online. This is free, convenient and secure.
Access Anywhere
• View documents from almost any computer
• Eliminate flash drives
A shutdown simply powers down the machine almost entirely and does not attempt to start the operating
system again until you press the power button. A restart simply ends your session, shuts the operating
system down, and then re-loads the operating system again.
Well, the answer is not that much confusing at all. When we shutdown our system (by pressing the
power button or from the OS menu), our computer starts saving all data and then it starts dumping all
RAM (Random Access Memory). Once the RAM gets dumped completely, SMPS cuts off power to the
motherboard and that’s how a computer shuts down.
Now when we click the “Restart” button on our computer, the operating system starts shutting down all
active and running programs to make the RAM free. Once the OS regains all RAM resources, it will issue a
command to the CPU to warm boot where BIOS system takes over and controls the whole booting
process. In this process, BIOS loads first 512 bytes of detected boot device, jumps to boot loader code
and restarts the computer.
Few might have the misconception that shutdown process is safer while system restart might harm the
computer. Well, if you have read the above explanation, you can conclude with the fact the computer
restart makes our job more easier... But, is it safer?
Shutting down will prevent theft and data loss issues among other things. Re-starting will leave your
computers available or open to many other risks.
I guess it will depend on the kind of lab and the purpose of each machine. Each machine may have a
different purpose and that will dictate weather it needs to be shut down completely or not.
And to be even Short, there is no effective difference between shutdown and restart. And technically
speaking, A restart (at least in a Unix environment, which the Mac is), dumps EVERYTHING, and boots
fully from a zeroed state. ALL processes are released and reinitiated from scratch. Even if there were
anything residual in any cache, it would be overwritten anyway when the system was being restored.
I think the theory being put forward is that since some of the caps haven't fully bled off, there may be
residual data in some of the registers. Unless they can state absolutely the decay rate of those, then "ten
seconds", or any other SWAG'd delay, is basically bollocks.
This is more ancient technology concept, and since most Windows users have NEVER seen what actually
goes on, process-wise, in detail, it's become more computer urban legend/dogma than anything else.
You could posit that a restart is easier on the microelectronics as they don't have time to suffer from
thermal expansion because of short-cycle cooling and reheating. That, as well, is debatable, but certainly
a stronger theoretical argument than any nebulous "data left in cache" claim.
Labels: Restart, Shutdown, Windows Tips
CLEAN UP THE TASKBAR TRAY ICONS IN WINDOWS | TURN OFF THE TRAY
ICONS COMPLETELY
The notification area as Microsoft calls it—or more commonly, the tray—is the box full of tiny icons on the
far right side of your taskbar, next to the clock. It made its first appearance in Windows 95, but it didn’t
take long for most trays to get cluttered with junk from every program installed on your PC.
Also Read:
Add An Address Bar In Your Windows Taskbar
All New Keyboard Shortcuts In Windows
Fix Missing Task Bar Icons In Windows XP
Easy Ways To Get To Your Desktop In Windows
Disable Extra Startup Programs In Windows
And since Microsoft wasn’t too careful about establishing standards for the icons put there, applications
weren’t too careful about giving their customers control over those icons. As a result, many applications
won’t let you remove their icons, and of those that do, the process is different for each one.
Microsoft snapped into action to solve the problem, and five years later came up with the Hide inactive
icons feature. To clean up your tray, rightclick an empty area of the taskbar, select Properties, and
choose the Notification Area tab. Turn on the Hide inactive icons option, and then click Customize to open
the Customize Notification Icons window shown in Figure.
Figure: If you don’t want to hide the tray completely, use this window to bury
unwanted clutter under a collapsible panel.
The active icons in your tray appear under Current Items, while those that have come and gone show up
further down, under Past Items. To hide an icon, highlight it in the list, and then select Hide in the
Behavior column.
Click OK when you’re done; the change takes effect right away. If you’ve hidden at least one icon, a little
white arrow appears to the left of the tray (meaning that you won’t save any space if you hide only one
icon).
Just click the arrow to temporarily show hidden tray icons; move the mouse away, and the arrow hides
them again.
Tired of dealing with tray icons on a one-by-one basis? If you’re using the Vista Business or Ultimate
edition, you can turn off the tray completely.
Open the Group Policy Object Editor (gpedit.msc, which is not present on the Vista Home editions), and
expand the branches to User Configuration\Administrative Templates\Start Menu and Taskbar. Double-
click Hide the notification area, select Enabled, and click OK. You’ll have to log out and then log back in
for this change to take effect.
Labels: Icon, Taskbar, Windows Tips
CHANGE THE ICON FOR ALL FILES OF A TYPE IN WINDOWS 7 AND VISTA
Every file type has a default icon, the icon shown for all files with filename extensions linked to that type.
Yet Windows Vista And Windows 7 offers no way to choose your own icons—apart from editing the
Registry directly—despite the fact that you could do this right in Windows Explorer in previous versions of
Windows.
The (Default) value in the DefaultIcon key contains the full path and filename of the file containing the
default icon. Often it points right to the application executable that uses the file (e.g., excel.exe for .xls
files), but sometimes it references a .dll or .ico file containing a bunch of icons. The filename is then
followed by a comma and then a number (called the index) that indicates which icon to use.
For example:
C:\Program Files\Photoshop\Photoshop.exe, 15
points to the file Photoshop.exe, located in the C:\Program Files\Photoshop folder, and references the
16th icon in that file (0 or no number indicating the first icon, 1 indicating the second, and so on).
Occasionally, you may see something like this in the DefaultIcon key:
%SystemRoot%\system32\wmploc.dll,-731
Here, %SystemRoot% is a variable that represents the Windows folder (usually C:\Windows). When the
(Default) value in which this information is stored is an expandable string value, Windows converts the
filename to C:\Windows\System32\wmploc.dll before retrieving the icon. You may also sometimes notice
a negative value following the filename (-731, in this case) which represents the resource ID of the icon
to use—as opposed to a positive value indicating the index (position) of the icon as described above.
In most cases, you can specify your own icon for a given file type by placing the full path to an .exe, .dll,
.ico, or .bmp file in the DefaultIcon key’s (Default) value. (Hint: there are some nice icons in
\Windows\System32\shell32.dll.)
Include a number to indicate which icon to use, or leave out the number to use the first icon in the file.
In some cases, Windows Explorer will recognize the change right away, although due to the way
Windows Vista or Windows Seven caches icons, you may need to restart Windows for your change to
fully take effect.
The easiest way to change an icon for a file type is with a third-party tool like File Type Doctor. (available
at http://www.creativelement.com/powertools/)
Labels: FileTypes, Icon, Windows Tips
Navigating files and folders Properties, Hold the Alt key while double-clicking on a file or folder to view
the Properties sheet for that object. Or, press Alt-Enter to open the Properties window for the selected
item without using the mouse at all.
History
Press Backspace in an open folder window to go back one step in the window’s history to the last folder
you looked at, which is not necessarily the parent folder.
You can also press the left or right arrow keys while holding Alt to go back and forth through the folder
history; these work just like the two round arrow buttons in the upper left of any Explorer window.
Refresh/Reload
Press F5 in almost any window (including web browsers and even Device Manager) to refresh the current
view.
Folder tree
With the focus on Explorer’s folder tree, press Enter to view the contents of the highlighted folder in the
right pane. Also, use the left and right arrow keys (or + and –) to collapse and expand folders,
respectively, or press the asterisk key (*) to expand all the folders and their subfolders in the current
branch.
Jump to an item
With the focus on the right pane, press a letter key to quickly jump to the first file or folder starting with
that letter. Continue typing to jump further. For example, pressing the T key in your \Windows folder will
jump to the Tasks folder. Press T again to jump to the next object that starts with T. Or, press T and
then quickly press A to skip all the Ts and jump to taskman.exe. If there’s enough of a delay between the
T and the A keys, Explorer will forget about the T, and you’ll jump to the first entry that starts with A.
If you’d rather, you can have Windows Explorer begin a formal search as soon as you start typing. Open
the Organize drop-down, select Folder and Search Options, and then choose the View tab. Scroll to the
bottom of the Advanced settings list, and under the When typing into list view branch, click Automatically
type into the Search Box.
In Windows Explorer or on the desktop, press Ctrl-F or F3 to open a separate search window so you can
search without losing the current view. Or, press Winkey+F to open a search window no matter where
you are.
Address bar
Press F4 to jump to the address bar so you can type or flip through recently visited folders. While you’re
there, press Esc twice to revert to the new-style path box so you can navigate parent folders without
typing.
Cycle through all the controls Press the Tab or F6 keys to jump among the file pane, the file pane column
headers, the address bar, the Search box, the Favorites pane (if it’s visible), the folder tree divider, and
then finally the folder tree itself.
Select all
Press Ctrl-A to quickly select all of the contents of a folder, both files and folders.
Select range
Select one icon, then hold the Shift key while clicking on another icon in the same folder to select it and
all the items in between.
You can also use the Ctrl key to modify your selection. For example, if you’ve used the Shift key or a
rubber band to select the first five objects in a folder, you can hold Ctrl while dragging a second rubber
band to highlight additional files without losing your original selection.
You can also use the Ctrl + A to select all the files in the rectangle box.
Delete files
Select a file or folder and press Del to delete it. Or, press Shift-Del to delete it permanently without
sending it to the Recycle Bin.
Rename
Press F2 to rename the currently selected item. Starting and switching programs
Start menu
Press the Windows logo key (Winkey) to open the Start menu, and then navigate with your arrow keys.
You can also open the Start menu by pressing Ctrl-Esc. See the upcoming “Hack the Windows Logo Key”
sidebar if you don’t have a Windows logo key.
If you’re using an application with more than one document, press Ctrl- Tab to switch among the open
documents. Or, press Ctrl-Tab to cycle through tabs in a tabbed window.
Windows Explorer
Press Winkey+E to open a new Windows Explorer window.
Task Manager
Press Ctrl-Shift-Esc to open Task Manager for Windows Vista and Windows Seven. For Windows XP Press
Ctrl+Alt+Del.
Task bar
Press Winkey+T to send the keyboard focus to the taskbar, or press Winkey+B to send the focus to the
notification area (tray).
Undo
Press Ctrl-Z to undo the last text edit, file operation, deletion, etc.
Menus
Press Alt or F10 to jump to the menu bar (or show the menu if it’s hidden).
Drop-down listboxes
Use the up and down arrow keys to flip through items in a drop-down box, or press Alt-down arrow to
open the listbox.
Accessibility tools
Press Winkey+U to open the Ease of Access Center page in Control Panel. Press Shift five times to toggle
StickyKeys on and off. Hold Shift for eight seconds to toggle FilterKeys on and off. Hold Num Lock for five
seconds to toggle ToggleKeys on and off. Press Alt-LeftShift-Num Lock to toggle MouseKeys on and off.
Press Alt+LeftShift+Print Screen to toggle high contrast mode on and off.
Log off
Press Winkey+L to log off Windows.
Some qualities are situation-related, but others – such as enthusiasm, moral courage and stamina – are
found in leaders in widely different situations.
To my mind, the main contribution of this situational approach is that it emphasises the importance of
knowledge in working life; and knowledge is linked to authority. There are four forms of authority among
people:
• The authority of position and rank – ‘Do this because I am the boss!’
• The authority of knowledge – ‘Authority flows to the one who knows.’
• The authority of personality – in its extreme form, charisma.
• Moral authority – personal authority to ask others to make sacrifices.
Nelson Mandela, for example, has dignity, integrity and charm. Because he endured years of
imprisonment he has acquired the moral authority to ask his fellow countrymen and -women to accept
difficulties and hardships on the long road to national unity and prosperity.
Why do sailors do what the captain orders when the ship is tossed to and fro in a storm? Because they
sense that the captain has the knowledge of the sea and navigation, deepened by experience of many
other storms, to know what to do.
The same principle holds good for you. But don’t imagine that having the appropriate technical or
professional knowledge in itself qualifies you for leadership. Again, it is necessary but not sufficient.
All the main strands of authority – position, knowledge and personality – are important. In order to get
free and equal people to cooperate and produce great results, you need to rely upon the second and
third forms of authority as well as the first. It is like a three-stranded rope. Don’t entrust all your weight
to one strand only.
In the first phase of your career as a leader you will probably be working in a fairly well-defined field of
work, and you will have acquired the necessary professional and technical knowledge.
But, within your field, situations are changing all the time. How flexible are you? Can you cope, for
example, with both growth and retraction? The following checklist will help you to confirm both that you
are in the right field and also that you are developing the flexibility to stay in charge in a variety of
different situations – including some that cannot be foreseen.
Labels: Education, Leadership, Management
Tech companies used to spend millions trying to get you to buy their products (OK, they still do), but
now the race is on to be “the default.” Microsoft wants its Live Search web site to be the default search
engine in IE, and Google sued Microsoft to try to prevent this before Windows Vista shipped.
Companies pay PC manufacturers to preinstall trial versions of their software on all their machines so
their products can be the default. And when you install an application on your PC, the installer invariably
makes the new program the default for all the file types it supports.
Why is being the default so important? Because people don’t change the defaults. As a result, software
companies—Microsoft included—make a habit out of steamrolling over your preferences to promote their
own products. Luckily, you have a defense, and it takes place in the Registry.
There are basically two approaches to protecting your file types: you can back them up so they can be
restored in case they’re ever overwritten, and you can “lock” them, preventing such changes in the first
place.
There’s actually a third way to protect your file types, by way of Vista’s UserChoice feature . It’s not a
great solution, but it may be effective in some circumstances.
The easiest way to back up your file types is to create Registry patches as explained in “Create Export
and Import Data With Registry Patches”. To make the backup effective, you have to include all the keys.
For instance, if you’re backing up the file type for plain-text (.txt) files, your Registry patch should include
all of these keys:
HKEY_CLASSES_ROOT\.txt
HKEY_CLASSES_ROOT\txtfile
HKEY_CLASSES_ROOT\SystemFileAssociations\text
And if you want to include other related filename extensions, such as .log, .ini, and .csv (to name a few),
you’ll want to include those keys as well.
So, if your file type associations for text files ever get wiped out, just doubleclick your Registry patch
backup to restore them. But you can lock your file types by setting restrictive permissions on the
aforementioned keys. That way, no application, no installer, and not even Windows itself can change
them unless you unlock them first.
Warning: Most programs and installers won’t have a problem with locked file types; they’ll likely just
ignore the error and move on. But it’s not beyond the realm of possibility that an application may crash
or refuse to continue until it has all the Registry access it needs. In this case, you may need to unlock the
affected file types first, so you’ll want to Back Up The Registry In Windows as described in my earlier
post.
To remove the lock, just select a locked file type (you can click the leftmost column header to group all
locked file types together) and click the Unlock button.
Labels: FileTypes, Windows Registry, Windows Tips
Mother: 'Priya, take this passbook. Keep it as a record of your marriage life. When there's something
happy and memorable happened in your new life, put some money in. Write down what it's about next to
the line. The more memorable the event is, the more money you can put in. I've done the first one for
you today. Do the others with Hitesh.When you look back after years, you can know how much
happiness you've had.' Priya shared this with Hitesh when getting home. They both thought it was a
great idea and were anxious to know when the second deposit can be made.
This was what they did after certain time:- 7 Feb: Rs.100, first birthday celebration for Hitesh after
marriage- 20 Mar: Rs.200, vacation trip to Bali- 15 Apr: Rs.2000, Priya got pregnant- 1 Jun: Rs.1000,
Hitesh got promoted..... and so on...
However, after years, they started fighting and arguing for trivial things. They didn't talk much. They
regretted that they had married the most nasty people in the world.... no more love...
One day Priya talked to her Mother: 'Mom, we can't stand it anymore. We agree to divorce. I can't
imagine how I decided to marry this guy!!!' Mother: 'Sure, girl, that's no big deal. Just do whatever you
want if you really can't stand it. But before that, do one thing first. Remember the saving passbook I
gave you on your wedding day? Take out all money and spend it first. You shouldn't keep any record of
such a poor marriage.'
Priya thought it was true. So she went to the bank, waiting at the queue and planning to cancel the
account. While she was waiting, she took a look at the passbook record. She looked, and looked, and
looked. Then the memory of all the previous joy and happiness just came up her mind. Her eyes were
then filled with tears. She left and went home.
When she was home, she handed the passbook to Hitesh, asked him to spend the money before getting
divorce. The next day, Hitesh gave the passbook back to Priya. She found a new deposit of Rs.5000. And
a line next to the record: 'This is the day I notice how much I've loved you thru out all these years. How
much happiness you've brought me.' They hugged and cried, putting the passbook back to the safe.
"When you fall, in any way, Don't see the place where you fell, Instead see the place from where you
slipped. Life is about correcting mistakes."
Well “A pessimist says, Erasers are for people who make mistakes. But an optimist says, Erasers are for
people who are willing to correct their mistakes.This story is worth reading. Sometimes we spend time in
asking who is responsible or whom to blame, whether in a relationship, in a job or with the people we
know. By this way we miss out some warmth in relationships.
It is better to understand a little, than to misunderstand a lot. Learn to understand first, and to be
understood second. The roof of peace rests upon the walls of understanding. Have a sense of humour as
you meet life’s challenges.
Two people cannot walk by holding the same right hand in the same direction. Love your spouse the way
he or she is, and not the way you want him or her to be. Just as the five fingers of a hand are different,
so are people around us. Everyone is different in habits, in behavior, and in so many other different
ways.
"Success in marriage does not come merely through finding the right mate, but through being the right
mate. "A journey of a thousand miles begins with a single step." Take off all your envies, jealousies,
unforgiveness, selfishness, and fears. And you will find things are actually not as difficult as you think.
A Registry patch is a plain-text file with the .reg filename extension that contains one or more Registry
keys or values. Double-click on a .reg file, and Windows runs the Registry Editor, which “applies” the
patch to the Registry, meaning that its contents are merged with the contents of the Registry.
Patch files are especially handy for backing up small portions of the Registry, distributing Registry
settings to other PCs, and duplicating keys. For example, say you spend an hour or so customizing the
toolbars in a particular application used by many employees in your office. Since most programs store
their toolbar settings in the Registry, you can use a Registry patch to not only back up the completed
toolbar setup—and thus save an hour of reconfiguring should your PC subsequently burst into flames—
but to quickly copy the toolbar to all the other PCs in your office.
Or, perhaps you’ve spent the last six months gradually customizing your file types, only to find that a
newly installed application or a Windows upgrade erased all your hard work and reset all your context
menus. All you need to do is to make a Registry patch containing all your saved file types, and then
reapply it should the need arise.
2. From the File menu, select Export, type a filename and choose a destination folder, and click OK. All of
the values and subkeys in the selected branch will then be stored in the patch file. Make sure the
filename of the new Registry patch has the .reg extension. Clearly, there’s not much to making Registry
patches with the Registry Editor. But it gets a little more interesting when you modify them, or even
create them from scratch to automate Registry changes.
"ItemName"="@%SystemRoot%\\system32\\notepad.exe,-470"
"NullFile"=""
The first line, Windows Registry Editor Version 5.00, tells Windows that this file is a valid Registry patch;
don’t remove this line. The rest of the Registry patch is a series of key names and values.
The key names appear in brackets ([...]) and specify the full path of the key, thus indicating where the
values that follow are to be stored. On each subsequent line until the next key section begins, the name
of a value is given first (in quotation marks), followed by an equals sign, and then the data stored in the
value (also in quotation marks). A value name of @ tells the Registry Editor to place the value data in
the (Default) value (as shown in the fourth line of the example).
You can go ahead and make changes to anything in the Registry patch file as long as you keep the
format intact. Of course, those changes won’t take effect in the Registry until the Registry patch is
merged back into the Registry.
So, why would you want to edit a Registry patch file? Modifying a large number of Registry values often
turns out to be much easier with a text editor than with the Registry Editor, since you don’t have to
open—and then close—each individual value.
It may be tempting to perform a quick search and replace in the text editor, and then apply your changes
back to the Registry. But be careful, as the effect may not be what you expected. If you replace any text
in the name of a value (to the left of the equals sign) or even the name of a key (the lines in brackets),
Registry Editor will create new values and keys with those names when you apply the patch, leaving the
old values and keys intact. A better choice is to use a tool like Registry Agent (see “Search and Replace
Registry Data,” earlier in this chapter).
There’s no requirement that the keys in a Registry patch file need to have lived next to one another in
the Registry, or that they be in any particular order. This means you can combine several separate patch
files into one, and use it to restore any number of keys in one step. All it takes is a little copy and paste
between side-by-side Notepad windows. The only thing you need to do, besides making sure all the keys
and values remain intact, is to remove any extraneous Windows Registry Editor Version 5.00 header
lines.
If you’re creating a Registry patch to be used on other PCs, make sure you fix any references to absolute
pathnames before you distribute the file. If, for example, your patch file references
D:\Windows\notepad.exe, it’ll cause a problem on any PC where notepad.exe is located in C:\Windows\.
The best solution is to use expandable string values, as described earlier in this chapter, along with the
appropriate system variables, like this: %SystemRoot%\notepad.exe. Now, since expandable string
values are stored like Binary values in Registry patch files, such an entry would look like this:
"Open"=hex (2):26,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,\
00,74,00,25,00,5c,00,6e,00,6f,00,74,00,65,00,70,00,61,00,64,00,2e,00,65,00,\
78,00,65,00,00,00
Now, as you may’ve guessed, it’s considerably easier to edit expandable string (and binary) values in the
Registry Editor than in any text editor, so you’ll probably want to make such corrections before you
export the key to a patch file. If you need to add a binary or expandable string value to a Registry patch
file you’ve already started editing, though, all you have to do is return to the Registry Editor, create a
temporary key somewhere, and then create your new value. When you’re done, just export the key to a
new file, delete the key from the Registry, and then copy and paste the value to your other Registry
patch file.
Delete keys and values from a Registry patch Although the Registry Editor won’t ever create a patch that
deletes Registry keys or values, it’s easy enough to make one by hand. To delete a key with a Registry
Patch, place a minus sign before the key name, like this:
-[HKEY_CURRENT_USER\ Control P anel\ don't load]
This patch, when applied, deletes the specified key and all of its values, as well as any subkeys. To delete
a single value from a key, place a minus sign after the equals sign, like this:
[HK EY_CURRENT_USER\ Control P anel\ don't load]
"desk .cpl"=-
Of course, these tricks only work if you have sufficient permission to delete those keys. See “Prevent
Changes to a Registry Key,” later in this chapter, for more information.
To apply a Registry patch without any other warning messages (except for the UAC prompt), you need to
use the command line. Either from an open Command Prompt window or from Start ➝ Run, type the
following:
regedit /s c:\folder\mypatch.reg
where c:\folder\mypatch.reg is the full path and filename of the patch file to import. Or, if you want to
get rid of the confirmation messages when you double-click a .reg file, add the /s switch (as shown here)
to the .reg file type.
If the Registry Editor is already open and one of the keys modified by a patch that was just applied is
currently open, RegEdit should refresh the display automatically to reflect the changes. If it doesn’t, press
the F5 key or go to View ➝ Refresh.
When you apply a Registry patch, you merge the keys and values stored in a patch file with those in the
Registry. Any keys and values in the applied patch that don’t already exist will be created. If a key or
value already exists, only its contents will be changed. It’s important to understand that if a key you’re
updating already contains one or more values, those values will be left intact if they’re not explicitly
modified or deleted by the patch. See Chapter 9 for another way to automate changes to the Registry
from files.
Labels: Shortcuts, Windows Registry, Windows Tips
PROTECT PEN DRIVE FROM VIRUSES | FREE ANTIVIRUS FOR USB FLASH
DRIVE
USB flash drives are very helpful as far as carrying data from one place to another is concerned. It really
made data transfer job so easy and affordable. But the only problem arising with USB flash drives is that
it can easily get infected with malicious virus, malwares, spywares and can affect any computer, it’s
connected with.
The flash drive is a smart invention and provides good assistance for users. You can just bring along your
compact flash drive around for any data/file transferring – fast, easy and convenient. Having said that,
users must also be aware that the flash drive is a potential breeding ground for viruses. - My Digital Life
Since it gets connected with the computer hard drive directly, virus and other malicious codes can attack
the related computer’s efficiency and performance.
Mx One Antivirus
You can install Mx One antivirus directly on your removable media or you can also install on both PC and
USB flash drive for enhanced security and protection. It’s compatible with any other PC antivirus and it
does not create any problem when you install this with Nod 32, Kaspersky, BitDefender, AVG, Norton,
Panda, Avast, Avira etc.
Download Mx One Antivirus 4.0
Similar Software's:
You can also try usb protect, the better to protect your pendrive.
http://www.laesoft.com.ar/descargas/usbprotect.php