Get all information about Computer Repair Services in Canada. You can find here tips and trick for pc repair canada,pc support Canada,home pc repair,computer help canada, Technical Support, Tech Support for troubleshoot your PC.

Remote Desktop Connection Manager

| Tuesday, June 30, 2009
This post provide computer support for how to work Remote Desktop connection Manager,
In Windows 2008 R2, we added a new MMC snap-in called Remote Desktop Connection Manager (SBMGR.msc on the Connection Broker machine). This Remote Desktop Connection Manager UI tool is available on a Remote Desktop Connection Broker server. It allows the administrator to easily configure and organize RemoteApp and Desktop Connections (RADC) resources. The end users can then access these resources with familiar methods such as Web Access and RADC. These resources include RemoteApp programs and virtual desktops. Virtual desktops include virtual machines in virtual desktop pools and personal virtual desktops.

Here’s a screenshot of Remote Desktop Connection Manager:The tree view is located in the left pane. The tree view lists all the resources grouped by type (RemoteApp programs and virtual desktops).

The results pane is located in the center. The results pane shows additional information/links, based on the currently selected items in the tree view.

The action pane is located on the right. The action pane lists the actions that are available to users, based on the currently selected items in the tree view or the results pane.

When the RD Virtualization Host Servers node is selected in tree view, the results pane lists all the RD Virtualization Host Servers added to the Connection Broker as below:

When a Pool node is selected in tree view, the results pane lists all the virtual desktops added to the pool as below:
With this useful, easy-to-use UI tool, an administrator can:

  • Configure settings for virtual desktops, such as redirection settings, Remote Desktop Gateway settings, common/custom RDP settings, etc.)
  • Create a virtual desktop pool
  • Assign a personal virtual desktop to a user
  • Easily diagnose configuration issues - The snap-in provides a report of your latest deployment status. It will flag misconfigurations with a red cross or warning sign, and also provide appropriate links to the documents/properties pages/wizards to correct the misconfigurations
  • Make RemoteApp programs from a RemoteApp source available to users
  • Create a client configuration file for RemoteApp and Desktop Connections to distribute to users
The following documents provide details on how to deploy RemoteApp programs and virtual desktops. You'll also find lots of examples on how to use the Remote Desktop Connection Manager UI tool:

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide
Deploying Virtual Desktop Pools by Using RemoteApp and Desktop Connection Step-by-Step Guide

Fix Authentication Tab is Missing in the Properties Dialog Box

| Thursday, June 18, 2009
This Post provide technical tips to fix Authentication tab is missing in the properties dialog box of the wired network adapter after you install Windows XP Service Pack 3After you install Windows XP Service Pack 3 (SP3), the Authentication tab is missing in the properties dialog box of the computer's wired network adapter. For example, when you open the Local Area Connection Properties dialog box of a wired network adapter, you see only the General tab.

In Windows XP Service Pack 2 (SP2), both the wired and wireless connections are handled by the Wireless Zero Configuration service (WZCSVC), and this service is always running. As part of Network Access Protection (NAP) integration in Windows XP SP3, this WZCSVC functionality is divided into two separate services:

  • The WZCSVC
  • The Wired AutoConfig service (DOT3SVC)

The WZCSVC in Windows XP SP3 manages only the wireless connections. The DOT3SVC manages the wired connections, and it displays the Authentication tab in the properties dialog box of the wired network adapter. However, in Windows XP SP3, the startup type of the DOT3SVC is configured as manual. Therefore, the Authentication tab is missing until you manually start the DOT3SVC.

To resolve this issue, manually start the Wired AutoConfig service (DOT3SVC). To do this, follow these steps:

1. Click Start, and then click Run.
2. Type services.msc in the Open box, and then press ENTER.
3. Locate the Wired AutoConfig service, right-click it, and then click Start.

Primary IPsec Troubleshooting in Windows 2000

| Friday, June 12, 2009
To troubleshoot IPsec, first enable Audit policy, and then verify the results of phase one and phase two exchanges. When you enable Audit policy, security events are logged in the Security log. By examining the Security log, you can determine whether IKE security association negotiation is successful. To enable Audit policy,
Follow these steps:
1. In Group Policy, expand Local Computer Policy.
2. Locate and then click Computer Configuration/Windows Settings/Security Settings/Local Policies/Audit Policy.
3. In the details pane, right-click Audit logon events, and then click Security.
4. Click to select Success, click to select Failure, and then click OK.
5. In the details pane, right-click Audit object access, and then click Security.
6. Click to select Success, click to select Failure, and then click OK.

Note If you are using a domain policy for auditing, the domain policy overwrites your local policy.

Next, type the following command to use the Netdiag.exe command-line tool:
netdiag /test:ipsec /debug
This command displays debugging information about phase two.

Note To use Netdiag.exe, the Windows 2000 Support Tools package must be installed on your computer. To install the Windows 2000 Support Tools, follow these steps:

1. Start Windows 2000.

Note You must log on as a member of the administrator group to install these tools.
2. Insert the Windows 2000 CD into your CD drive.
3. Click Browse this CD, and then open the Support\Tools folder.
4. Double-click Setup.exe, and then follow the instructions that appear on the screen.

You can also use Netdiag.exe to view the policy without an active connection. To do this, type the following command at a command prompt, and then press ENTER:
netdiag /test:ipsec /v
This command displays the current policy and IPsec statistics with regard to phase one.

If the logged events indicate that phase one Main Mode exchange fails, verify the IKE settings and the IKE authentication methods in your IPsec policy properties. To do this,

Follow these steps:
1. Click Start, click Run, type secpol.msc, and then click OK.
2. Click the IPsec rule that you want to click, right-click IPsec rules and then click Properties.
3. Click the General tab, and then verify that the settings are correct.
4. Click Advanced, examine the settings, click Methods, and then examine the settings.
5. Click OK two times.
6. Click Rules tab, click Edit, and then click the Authentication Methods tab.
7. Examine the settings on this tab.

If the logged events indicate that phase two Quick Mode fails, verify the IPsec security methods in the IPsec rules and in your IPsec policy properties. To do this, follow these steps:

1. Click the IPsec rule that you want to verify, click Edit, and then click the Filter Action tab.
2. Click the filter action that is enabled, click Edit, and examine the settings.

Google Chrome: First security flaws corrected

| Tuesday, June 9, 2009
Google has made an automatic update of its browser, Chrome, correcting some critical security vulnerabilities. The editor provides details and creates a blog to inform users of changes to the software.A week after the launch of Chrome, Google has given few details on two critical security holes sealed three days ago.The first hole (called SaveAs) was in the handling of files with very long names, can we read in the security bulletin released by Google. The second was that of Web site addresses displayed in the shaded box that appears at the bottom left of the browser window when the user positions the mouse pointer over a link.The vulnerabilities could be exploited to launch attacks, leading to the blocking of machines victims overflow the buffer. In this type of attack, once paralyzed machines, hackers take control.Google is opening a dedicated blogAlongside these two critical flaws, Google has plugged other, less serious. One plant was equipped with a computer when the Chrome user typing "about:%" in the address bar. A web page containing this text into a hyperlink and can block the browser from the simple overview of the pointer over the link.After having remained silent at first on these faults, the editor of search engine finally opts for the opening. To promote its browser, it creates a blog dedicated Google Releases Chrome, which is a preferred source of information for users, as its author says Mark Larson, Chrome program manager.It will present all kinds of announcements and technical details on the automatic updates of the software. Google shows meet the demand of the public who wishes to know the exact nature of the changes gradually introduced for the purpose of improvement.

Fix Low Disk Space Notification in Windows XP

|
When a Windows XP-based computer is running low on disk space, you receive a "Low Disk Space" message that, when clicked, starts the Disk Cleanup Wizard. This post describes the conditions in which you receive the "Low Disk Space" message. This post provide Technical support to fix Low Disk Space Notification.

When free disk space reaches 200 megabytes (MB), you receive the following message for 10 seconds, once per session:

You are running out of disk space on [drive]. To free space on this drive by deleting old or unnecessary files, click here.


When free disk space reaches 80 MB, you receive the following message for 30 seconds, every four hours, twice per session:

You are running very low on disk space on [drive]. To free space on this drive by deleting old or unnecessary files, click here.

When free disk reaches 50 MB, you receive the following message for 30 seconds, every five minutes, until free space is above 50 MB:

You are running very low on disk space on [drive]. To free space on this drive by deleting old or unnecessary files, click here.

Resolution
Note There is a registry value you can set to disable this feature. To disable low disk space checks, follow these steps, log off, and then log on again:

Follow these steps, and then quit Registry Editor:
1. Click Start, click Run, type regedit, and then click OK.
2. Locate and then click the following key in the registry:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
3. On the Edit menu, point to New, and then click DWORD Value.
4. Type NoLowDiskSpaceChecks, and then press ENTER.
5. On the Edit menu, click Modify.
6. Type 1, and then click OK.

Living with the limits of Windows 7 Starter Edition

| Monday, June 1, 2009
Microsoft has decided to release a cheap edition of the windows 7 for netbook users , the name of that edition is " Windows 7 starter edition " .As it is a cheap edition of windows 7 , so it of limited use .
Starter Edition's only runs three applications at once. Microsoft confirms that it is lifting the three-app limit "based on the feedback we’ve received from partners and customers asking us to enable a richer small notebook PC experience."

Restrictions of the Windows 7 Starter edition .
> No personalization options (changing background images/wallpapers or sounds)
> No Aero
> No DVD playback
> No Media Center features at all
> No domain support
> No XP virtualization mode
> No multi-monitor support

To understand this three applications restriction more clearly consider a senireo .Imagine you were running Starter Edition; you have your messenger running, you’re browsing on the net, and you’re listening to music. You have Skype running as a background process but when someone attempts to call you, you’re unable to receive the call because then you’d be running four simultaneous applications.

According to the microsoft official “ We believe these changes will make Windows 7 Starter an even more attractive option for customers who want a small notebook PC for very basic tasks, like browsing the web, checking email and personal productivity.”


But according to a research , this limit does not mean that we can only open three windows at a time , one of the senior researcher , he opened 16 seprated windows at a time , having paint , internet explorer ( with many tabs ) , goolge chrome .( http://blogs.zdnet.com/Bott/?p=844 )
So to know the , truth we need to wait till the release of the windows 7 starter edition .and after that we can able to de