Saturday, 30 January 2010

Desktop Sharing

Remote Desktop Sharing

Desktop Sharing enables the administrators to connect and control remote Windows desktops in the LAN and WAN. Accessing computers at a remote location in WAN can be either through VPN or through Internet. It is a web-based tool enabling access from anywhere in the LAN without requiring any native client. It allows almost all operations to be performed on the remote desktop.

Desktop Sharing Features

  • Access computers in LAN and WAN.
  • Web-based tool enables access from anywhere in the LAN.
  • Automatically installs the desktop-sharing agent in each desktop.
  • No individual authentication is required to gain access to a remote desktop.
  • Supports viewing/accessing remote desktops using Active X and Java Plug-ins.
  • Prompts user confirmation before providing the access to a remote desktop.
  • Supports locking the users keyboard and mouse when accessing from remote. Users screen can also be blacked out so that they are not aware of the changes you make.
  • Ability to send "Cnt+Alt+Del" command to access a locked computer.
  • Ability to switch between users' applications using "Alt+Tab" command.
Configurable screen resolution to fit the screen size.

Remote Control & Protects User's Privacy

Web-Based Remote Control

Desktop Central provides a web-based access to the remote computers. This means that a remote connection can be established from anywhere and does not require client software to be installed in order to access remote desktops. The administrators can also establish connection through a VPN to take control of a remote desktop.

Protects Users' Privacy

when connecting to remote computers using Remote Desktop Sharing, the adminstrators have an option to whether get user's permission before connecting to their desktop. Selecting this option would pop up a request window in the user's desktop seeking remote access. This is to ensure that the user's privacy is maintained.

ActiveX and Java Viewers

ActiveX and Java Viewers

Desktop Central supports accessing a remote desktop either using ActiveX or Java plug-ins. This enables accessing a remote desktop from any browser like Internet Explorer, Firefox, Flock, etc.

Desktop Sharing - Supported OS Versions

Desktop Sharing - Supported OS Versions

Desktop Sharing supports connecting to desktops running any of the following OS versions:

  • Windows 2008
  • Windows Vista
  • Windows 2003
  • Windows XP
  • Windows 2000

Free Desktop Sharing

The free edition of Desktop Central offers remote desktop sharing functionality, which can be used to manage up to 25 desktops.

For more details on Desktop Sharing, refer to the Desktop Sharing topic of the online help documentation.

Saturday, 9 January 2010

How to Filter the internet



Save our children from Adult Site !



Barracuda hardware based web and spam filters are expensive, they are definitely better but do you need such a powerful hardware? If you own a small to medium business, buying one of these hardware web filters can cost you a bomb, why waste money when OpenDNS allows you to filter out unwanted contents for free? If you’re a parent, do note that web filtering software can be cracked or patched by your kids to bypass them, however, a hardware based web filter is almost unbreakable and better, unless they reset the router.

How do set up your own ‘free’ hardware based p2p traffic and content filtering software? You’ll need a router and an OpenDNS account.
  • Step 1 – Sign up for the free OpenDNS account (Remember to verify your account, check your email)
  • Step 2 – Login to OpenDNS, go to the ‘Settings’ tab and click on the ‘Add this network’ button
  • Step 3 – When you’re done, click on the IP Link (Blue colour, underlined)



  • Step 4 – A new page will be loaded, select ‘Custom’ and choose the categories you want to block.
  • Step 5 – When you’re done, click ‘Apply’, you can add individual domains (max 25 for free accounts)



  • Step 6 – Open the preferences for your router, find the DNS server settings, put in the OpenDNS server addresses as your DNS server settings and save/apply. Please write down your current settings before entering the OpenDNS addresses, just in case.

          208.67.222.222
          208.67.220.220

  • Step 7 – Restart your computer and router



And the results:
    


There you go, why pay for an expensive hardware when OpenDNS has the ability to transform your cheap router into a powerful web filtering content system. OpenDNS has more on how to change your DNS settings for various router such as Huawei, Apple, D-Link, NetGear, 3 Com, Belkin and more.

How to Filter the internet



Save our children from Adult Site !



Barracuda hardware based web and spam filters are expensive, they are definitely better but do you need such a powerful hardware? If you own a small to medium business, buying one of these hardware web filters can cost you a bomb, why waste money when OpenDNS allows you to filter out unwanted contents for free? If you’re a parent, do note that web filtering software can be cracked or patched by your kids to bypass them, however, a hardware based web filter is almost unbreakable and better, unless they reset the router.

How do set up your own ‘free’ hardware based p2p traffic and content filtering software? You’ll need a router and an OpenDNS account.
  • Step 1 – Sign up for the free OpenDNS account (Remember to verify your account, check your email)
  • Step 2 – Login to OpenDNS, go to the ‘Settings’ tab and click on the ‘Add this network’ button
  • Step 3 – When you’re done, click on the IP Link (Blue colour, underlined)



  • Step 4 – A new page will be loaded, select ‘Custom’ and choose the categories you want to block.
  • Step 5 – When you’re done, click ‘Apply’, you can add individual domains (max 25 for free accounts)



  • Step 6 – Open the preferences for your router, find the DNS server settings, put in the OpenDNS server addresses as your DNS server settings and save/apply. Please write down your current settings before entering the OpenDNS addresses, just in case.

          208.67.222.222
          208.67.220.220

  • Step 7 – Restart your computer and router



And the results:
    


There you go, why pay for an expensive hardware when OpenDNS has the ability to transform your cheap router into a powerful web filtering content system. OpenDNS has more on how to change your DNS settings for various router such as Huawei, Apple, D-Link, NetGear, 3 Com, Belkin and more.

Cheap and unlimited calls From Mobille Phone to Landline phone services

How to make international calls from landline to mobil? Which is the cheapest landline to mobile calls service? Which software allows call forwarding from landline to cell phone?

Jaxtr has a new feature, it is known as ‘Jaxtr On-The-Go‘, basically it allows you to make super cheap calls to your friends in over 50 countries at an affordable rate never seen before. To illustrate how this new feature of theirs work:

Traditional
You (your local number) — calls –> Friend (his/her local number)

Jaxtr
Friend (his/her local number) — calls –> You (Jaxtr local number)


Unlimited Free Landline Calls From Mobile
Get a local jaxtr number to reach your friend.
Dial that number on your phone and choose “FreeConnect” from the options.
Stay on the phone and wait for your friend to call in. Jaxtr texts your friend an SMS notifaction with a local number to call in and get connected to you while you wait.

If you are in a supported country, you can place any calls by either dialing a jaxtr number obtained online, or by using the click-to-call feature available to members only. If you are not in a supported country, the click-to-call feature will provide you with the most cost savings. You can even make international calls from landline to mobile with jaxtr or cheap cell phone to landline calls.

If calling a supported country, jaxtr will notify your friend with a local number to call in and get connected for free. If you like, bypass the call forwarding from landline to cell phone notification and get connected immediately at our cheapest landline to mobile calls. Please note that your phone company regular calling rates still apply when you dial a jaxtr number.

Cheap and unlimited calls From Mobille Phone to Landline phone services

How to make international calls from landline to mobil? Which is the cheapest landline to mobile calls service? Which software allows call forwarding from landline to cell phone?

Jaxtr has a new feature, it is known as ‘Jaxtr On-The-Go‘, basically it allows you to make super cheap calls to your friends in over 50 countries at an affordable rate never seen before. To illustrate how this new feature of theirs work:

Traditional
You (your local number) — calls –> Friend (his/her local number)

Jaxtr
Friend (his/her local number) — calls –> You (Jaxtr local number)


Unlimited Free Landline Calls From Mobile
Get a local jaxtr number to reach your friend.
Dial that number on your phone and choose “FreeConnect” from the options.
Stay on the phone and wait for your friend to call in. Jaxtr texts your friend an SMS notifaction with a local number to call in and get connected to you while you wait.

If you are in a supported country, you can place any calls by either dialing a jaxtr number obtained online, or by using the click-to-call feature available to members only. If you are not in a supported country, the click-to-call feature will provide you with the most cost savings. You can even make international calls from landline to mobile with jaxtr or cheap cell phone to landline calls.

If calling a supported country, jaxtr will notify your friend with a local number to call in and get connected for free. If you like, bypass the call forwarding from landline to cell phone notification and get connected immediately at our cheapest landline to mobile calls. Please note that your phone company regular calling rates still apply when you dial a jaxtr number.

How to Disable Autorun of USB Drives and CD-Rom

How to disable the autorun feature in Windows? For your information, it is advisable to disable or remove the autorun autoplay feature for security reasons, this is because virus tend to spread by copying itself to your USB thumbdrive using the autorun feature.



Start Menu –> Run and type in ‘gpedit.msc’


Double click the ‘Turn off Autoplay’

A window will appear, under the ‘Turn off Autoplay Properties’, select ‘enabled’, under the drop down menu list choose ‘All drive’ and then click the ‘Apply’ button. Now you should be safe from the autoplay monster.

more click here

How to Disable Autorun of USB Drives and CD-Rom

How to disable the autorun feature in Windows? For your information, it is advisable to disable or remove the autorun autoplay feature for security reasons, this is because virus tend to spread by copying itself to your USB thumbdrive using the autorun feature.



Start Menu –> Run and type in ‘gpedit.msc’


Double click the ‘Turn off Autoplay’

A window will appear, under the ‘Turn off Autoplay Properties’, select ‘enabled’, under the drop down menu list choose ‘All drive’ and then click the ‘Apply’ button. Now you should be safe from the autoplay monster.

more click here

How to Remove Hidden tumb.db files

What are Windows Thumb.db files? How do find and delete Thumb.db files? Windows automatically creates a file known as Thumb.db for folders containing picture or images. Thumb.db file caches thumbnails of all the images in the folder, this allows Windows to display the images quicker whenever the folder is opened.

The Thumb.db is a hidden file only viewable when the ‘Show Hidden Files option is turned on in the Folder Option settings. To prevent the Thumbs.db file from being created, follow these instructions:
Open a folder, any folder in your Windows.
Go to Tools then select “Folder Options” as shown in the image below. 
(Step 1)
Select the View tab.
(Step 2)
Check the “Do not cache thumbnails option as shown in the image below 
(Step 3)
Click OK to apply the changes

let's Try...

How to Remove Hidden tumb.db files

What are Windows Thumb.db files? How do find and delete Thumb.db files? Windows automatically creates a file known as Thumb.db for folders containing picture or images. Thumb.db file caches thumbnails of all the images in the folder, this allows Windows to display the images quicker whenever the folder is opened.

The Thumb.db is a hidden file only viewable when the ‘Show Hidden Files option is turned on in the Folder Option settings. To prevent the Thumbs.db file from being created, follow these instructions:
Open a folder, any folder in your Windows.
Go to Tools then select “Folder Options” as shown in the image below. 
(Step 1)
Select the View tab.
(Step 2)
Check the “Do not cache thumbnails option as shown in the image below 
(Step 3)
Click OK to apply the changes

let's Try...

Friday, 8 January 2010

Remote Access Support Guides

Using Remote Desktop with No-IP
OverviewThe use of Microsoft's Remote Desktop Connection to access another computer over the internet has been growing in popularity. One major obstacle to overcome is that most locations that you want to connect to will only have a Dynamic IP address instead of a Static IP address. With No-IP.com's services this problem can be overcome.Typically, when you want to access your remote computer over the internet, you enter the IP address of that computer into the remote access software. With a Dynamic IP address, the IP will be constantly changing and getting into your remote computer from off site will be impossible. No-IP.com can assign a fully qualified domain name to your Dynamic IP address so you will not have to worry about remembering the numeric address each time. With our software client running somewhere on the same network as the remote computer, anytime your IP address changes we will know about it and be able to direct you to that remote machine regardless of what IP address it's currently assigned.
ExampleLets say you signed up and configured your No-IP account to use one of our free domains. Next, install our No-IP.com DUC (Dynamic Update Client) client on any machine at the location you will want to access. You then give the DUC software your No-IP login information so it will list your available host names and then select the one you want to use for that machine. Now, whenever you want to access this remote computer over the internet, you just type in that host name, i.e., "myhome.myvnc.com" into your remote access client and you'll be connected to your remote machine.In the event you have more than one location that you need to access, you can just create another host name on our site and install the client at that location as well. On a side note, if you will be using our service to connect to more than one location, we highly recommend you implement the Sub-Account feature that is included with the Enhanced service and No-IP Plus Managed DNS service. You can read about it here
Step 1: Create an account
To create an account with No-IP.com simply click the "Sign-up Free!" link at the top of the page, or click here. Fill in the required fields on the new account form and click the "Sign Up Now!" button on the top of the page.
Step 2: Confirm your account
Once you have entered your account information into the new user form, and have submitted it, you will receive an email to the address you provided. You will need to check that account and look for the email from No-IP.com. Inside the email you will see a link to confirm your account, click this link. (Yahoo and Hotmail customers click here)
Step 3: Login to your account
Now that you have confirmed your account, you can login to No-IP.com. On the top of the page just below the No-IP logo you will see an area to enter your email address and password. Enter the information that you signed up with, and click "Login".
Step 4: Add a domain to your account
Note: If you're using our free service, you can skip to step 5 below.
You should now be logged into the No-IP.com members section. Here you can add a domain to your account by either going to "Plus Managed DNS" or to "Domain Registration" if you are buying a new domain name. Just follow the activation steps to the checkout area.
Step 5: Add a host to your domain
After checking out, you can log back into your account and add a host to your newly added domain name. Click on "Hosts/Redirects" on the left hand side and then click on "Add". Type in a host name, and select your domain from the drop down menu. Then click "Create Host" at the bottom of the page.
Step 6: Making it dynamic
Now that you have a host in your account, you will want to install the our Dynamic Update Client at the location that has the Dynamic Address. This is a free download from our downloads tab at the top of the site.
After installing the Dynamic Update Client, be sure to configure it with your Email address and password that you used to login to this site.Note: If you are using Sub-Accounts you will want to enter the sub account name with a colon then the email address for the username and the sub-account password.The client will run in the Tray on windows machines. Be sure to open it and click on the options button and check the box "Run on startup".
Step 7: Configure your computer to accept remote connections
Click Start, point to Settings, click Control Panel, and then double-click the System icon.On the Remote tab, select the Allow users to connect remotely to this computer check box, as shown in the image below.Ensure that you have the proper permissions to connect to your computer remotely, and click OK.Leave your computer running and connected to the Internet.It should now be ready to accept connections from the outside.
Step 8: Configure your router
If you can already reach your remote desktop system by IP address, then you can skip this step. Also, if your computer is directly attached to the ISP's cable/DSL modem you can skip this step because you do not have a router. If this is a new setup you will have to open some ports up on your router or firewall. You will need to open port 3389 (tcp) to allow the Remote Desktop Protocol (RDP) to operate normally. Most router vendors refer to this as "Port Forwarding" or "Virtual Services". You will want to forward port 3389 to the internal IP address of the windows machine you are trying to access. The internal IP address will be something similar to 192.168.x.x. For more information and some guidance on forwarding ports in your router, see our guide: A Primer on Opening and Forwarding Ports on your Router. To verify that your router is setup correctly, visit www.canyouseeme.org and enter in port 3389 into the port area. If the site reports a failure, check your router settings and retry. If you are running a software firewall, personal firewall or anti-virus internet protection you may have to configure it to allow port 3389 traffic.
Step 9: Run your Remote Desktop client
With the above configuration in place you can now run your remote access services using the host and domain name to access them. You will no longer have to remember the IP address of the machine you are trying to get to.Simply open your remote access client (we're using Remote Desktop Connection in this example), fill in your host name and your username and password for your account on the remote computer. Note that any computer systems accessible from the Internet should be configured to use a username/password to authenticate users.
more info click here

Remote Access Support Guides

Using Remote Desktop with No-IP
OverviewThe use of Microsoft's Remote Desktop Connection to access another computer over the internet has been growing in popularity. One major obstacle to overcome is that most locations that you want to connect to will only have a Dynamic IP address instead of a Static IP address. With No-IP.com's services this problem can be overcome.Typically, when you want to access your remote computer over the internet, you enter the IP address of that computer into the remote access software. With a Dynamic IP address, the IP will be constantly changing and getting into your remote computer from off site will be impossible. No-IP.com can assign a fully qualified domain name to your Dynamic IP address so you will not have to worry about remembering the numeric address each time. With our software client running somewhere on the same network as the remote computer, anytime your IP address changes we will know about it and be able to direct you to that remote machine regardless of what IP address it's currently assigned.
ExampleLets say you signed up and configured your No-IP account to use one of our free domains. Next, install our No-IP.com DUC (Dynamic Update Client) client on any machine at the location you will want to access. You then give the DUC software your No-IP login information so it will list your available host names and then select the one you want to use for that machine. Now, whenever you want to access this remote computer over the internet, you just type in that host name, i.e., "myhome.myvnc.com" into your remote access client and you'll be connected to your remote machine.In the event you have more than one location that you need to access, you can just create another host name on our site and install the client at that location as well. On a side note, if you will be using our service to connect to more than one location, we highly recommend you implement the Sub-Account feature that is included with the Enhanced service and No-IP Plus Managed DNS service. You can read about it here
Step 1: Create an account
To create an account with No-IP.com simply click the "Sign-up Free!" link at the top of the page, or click here. Fill in the required fields on the new account form and click the "Sign Up Now!" button on the top of the page.
Step 2: Confirm your account
Once you have entered your account information into the new user form, and have submitted it, you will receive an email to the address you provided. You will need to check that account and look for the email from No-IP.com. Inside the email you will see a link to confirm your account, click this link. (Yahoo and Hotmail customers click here)
Step 3: Login to your account
Now that you have confirmed your account, you can login to No-IP.com. On the top of the page just below the No-IP logo you will see an area to enter your email address and password. Enter the information that you signed up with, and click "Login".
Step 4: Add a domain to your account
Note: If you're using our free service, you can skip to step 5 below.
You should now be logged into the No-IP.com members section. Here you can add a domain to your account by either going to "Plus Managed DNS" or to "Domain Registration" if you are buying a new domain name. Just follow the activation steps to the checkout area.
Step 5: Add a host to your domain
After checking out, you can log back into your account and add a host to your newly added domain name. Click on "Hosts/Redirects" on the left hand side and then click on "Add". Type in a host name, and select your domain from the drop down menu. Then click "Create Host" at the bottom of the page.
Step 6: Making it dynamic
Now that you have a host in your account, you will want to install the our Dynamic Update Client at the location that has the Dynamic Address. This is a free download from our downloads tab at the top of the site.
After installing the Dynamic Update Client, be sure to configure it with your Email address and password that you used to login to this site.Note: If you are using Sub-Accounts you will want to enter the sub account name with a colon then the email address for the username and the sub-account password.The client will run in the Tray on windows machines. Be sure to open it and click on the options button and check the box "Run on startup".
Step 7: Configure your computer to accept remote connections
Click Start, point to Settings, click Control Panel, and then double-click the System icon.On the Remote tab, select the Allow users to connect remotely to this computer check box, as shown in the image below.Ensure that you have the proper permissions to connect to your computer remotely, and click OK.Leave your computer running and connected to the Internet.It should now be ready to accept connections from the outside.
Step 8: Configure your router
If you can already reach your remote desktop system by IP address, then you can skip this step. Also, if your computer is directly attached to the ISP's cable/DSL modem you can skip this step because you do not have a router. If this is a new setup you will have to open some ports up on your router or firewall. You will need to open port 3389 (tcp) to allow the Remote Desktop Protocol (RDP) to operate normally. Most router vendors refer to this as "Port Forwarding" or "Virtual Services". You will want to forward port 3389 to the internal IP address of the windows machine you are trying to access. The internal IP address will be something similar to 192.168.x.x. For more information and some guidance on forwarding ports in your router, see our guide: A Primer on Opening and Forwarding Ports on your Router. To verify that your router is setup correctly, visit www.canyouseeme.org and enter in port 3389 into the port area. If the site reports a failure, check your router settings and retry. If you are running a software firewall, personal firewall or anti-virus internet protection you may have to configure it to allow port 3389 traffic.
Step 9: Run your Remote Desktop client
With the above configuration in place you can now run your remote access services using the host and domain name to access them. You will no longer have to remember the IP address of the machine you are trying to get to.Simply open your remote access client (we're using Remote Desktop Connection in this example), fill in your host name and your username and password for your account on the remote computer. Note that any computer systems accessible from the Internet should be configured to use a username/password to authenticate users.
more info click here

Troubleshooting

Searching for:
Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair, maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers

Troubleshooting is a form of problem solving most often applied to repair of failed products or processes. It is a logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again. Troubleshooting is needed to develop and maintain complex systems where the symptoms of a problem can have many possible causes. Troubleshooting is used in many fields such as engineering, system administration, electronics, automotive repair, and diagnostic medicine. Troubleshooting requires identification of the malfunction(s) or symptoms within a system. Then, experience is commonly used to generate possible causes of the symptoms. Determining which cause is most likely is often a process of elimination - eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.

In general, troubleshooting is the identification of, or diagnosis of "trouble" in a [system] caused by a failure of some kind. The problem is initially described as symptoms of malfunction, and troubleshooting is the process of determining the causes of these symptoms.

A system can be described in terms of its expected, desired or intended behavior (usually, for artificial systems, its purpose). Events or inputs to the system are expected to generate specific results or outputs. (For example selecting the "print" option from various computer applications is intended to result in a hardcopy emerging from some specific device). Any unexpected or undesirable behavior is a symptom. Troubleshooting is the process of isolating the specific cause or causes of the symptom. Frequently the symptom is a failure of the product or process to produce any results. (Nothing was printed, for example).

The methods of forensic engineering are especially useful in tracing problems in products or processes, and a wide range of analytical techniques are available to determine the cause or causes of specific failures. Corrective action can then be taken to prevent further failures of a similar kind. Preventative action is possible using FMEA and FTA before full scale production, and these methods can also be used for failure analysis.
Aspects

Most discussion of troubleshooting, and especially training in formal troubleshooting procedures, tends to be domain specific, even though the basic principles are universally applicable.
Usually troubleshooting is applied to something that has suddenly stopped working, since its previously working state forms the expectations about its continued behavior. So the initial focus is often on recent changes to the system or to the environment in which it exists. (For example a printer that "was working when it was plugged in over there"). However, there is a well known principle that correlation does not imply causality. (For example the failure of a device shortly after it's been plugged into a different outlet doesn't necessarily mean that the events were related. The failure could have been a matter of coincidence.) Therefore troubleshooting demands critical thinking rather than magical thinking.
It's useful to consider the common experiences we have with light bulbs. Light bulbs "burn out" more or less at random; eventually the repeated heating and cooling of its filament, and fluctuations in the power supplied to it cause the filament to crack or vaporize. The same principle applies to most other electronic devices and similar principles apply to mechanical devices. Some failures are part of the normal wear-and-tear of components in a system.
A basic principle in troubleshooting is to start from the simplest and most probable possible problems first. This is illustrated by the old saying "When you see hoof prints, look for horses, not zebras", or to use another maxim, use the KISS principle. This principle results in the common complaint about help desks or manuals, that they sometimes first ask: "Is it plugged in and does that receptacle have power?", but this should not be taken as an affront, rather it should serve as a reminder or conditioning to always check the simple things first before calling for help.
A troubleshooter could check each component in a system one by one, substituting known good components for each potentially suspect one. However, this process of "serial substitution" can be considered degenerate when components are substituted without regards to a hypothesis concerning how their failure could result in the symptoms being diagnosed.
Efficient methodical troubleshooting starts with a clear understanding of the expected behavior of the system and the symptoms being observed. From there the troubleshooter forms hypotheses on potential causes, and devises (or perhaps references a standardized checklist of) tests to eliminate these prospective causes. Two common strategies used by troubleshooters are to check for frequently encountered or easily tested conditions first (for example, checking to ensure that a printer's light is on and that its cable is firmly seated at both ends), and to "bisect" the system (for example in a network printing system, checking to see if the job reached the server to determine whether a problem exists in the subsystems "towards" the user's end or "towards" the device).
This latter technique can be particularly efficient in systems with long chains of serialized dependencies or interactions among its components. It's simply the application of a binary search across the range of dependences.
Simple and intermediate systems are characterized by lists or trees of dependencies among their components or subsystems. More complex systems contain cyclical dependencies or interactions (feedback loops). Such systems are less amenable to "bisection" troubleshooting techniques.
It also helps to start from a known good state, the best example being a computer reboot. A cognitive walkthrough is also a good thing to try. Comprehensive documentation produced by proficient technical writers is very helpful, especially if it provides a theory of operation for the subject device or system.
A common cause of problems is bad design, for example bad human factors design, where a device could be inserted backward or upside down due to the lack of an appropriate forcing function (behavior-shaping constraint), or a lack of error-tolerant design. This is especially bad if accompanied by habituation, where the user just doesn't notice the incorrect usage, for instance if two parts have different functions but share a common case so that it isn't apparent on a casual inspection which part is being used.
Troubleshooting can also take the form of a systematic checklist, troubleshooting procedure, flowchart or table that is made before a problem occurs. Developing troubleshooting procedures in advance allows sufficient thought about the steps to take in troubleshooting and organizing the troubleshooting into the most efficient troubleshooting process. Troubleshooting tables can be computerized to make them more efficient for users.

Searching for:
Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers

Troubleshooting

Searching for:
Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair, maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers

Troubleshooting is a form of problem solving most often applied to repair of failed products or processes. It is a logical, systematic search for the source of a problem so that it can be solved, and so the product or process can be made operational again. Troubleshooting is needed to develop and maintain complex systems where the symptoms of a problem can have many possible causes. Troubleshooting is used in many fields such as engineering, system administration, electronics, automotive repair, and diagnostic medicine. Troubleshooting requires identification of the malfunction(s) or symptoms within a system. Then, experience is commonly used to generate possible causes of the symptoms. Determining which cause is most likely is often a process of elimination - eliminating potential causes of a problem. Finally, troubleshooting requires confirmation that the solution restores the product or process to its working state.

In general, troubleshooting is the identification of, or diagnosis of "trouble" in a [system] caused by a failure of some kind. The problem is initially described as symptoms of malfunction, and troubleshooting is the process of determining the causes of these symptoms.

A system can be described in terms of its expected, desired or intended behavior (usually, for artificial systems, its purpose). Events or inputs to the system are expected to generate specific results or outputs. (For example selecting the "print" option from various computer applications is intended to result in a hardcopy emerging from some specific device). Any unexpected or undesirable behavior is a symptom. Troubleshooting is the process of isolating the specific cause or causes of the symptom. Frequently the symptom is a failure of the product or process to produce any results. (Nothing was printed, for example).

The methods of forensic engineering are especially useful in tracing problems in products or processes, and a wide range of analytical techniques are available to determine the cause or causes of specific failures. Corrective action can then be taken to prevent further failures of a similar kind. Preventative action is possible using FMEA and FTA before full scale production, and these methods can also be used for failure analysis.
Aspects

Most discussion of troubleshooting, and especially training in formal troubleshooting procedures, tends to be domain specific, even though the basic principles are universally applicable.
Usually troubleshooting is applied to something that has suddenly stopped working, since its previously working state forms the expectations about its continued behavior. So the initial focus is often on recent changes to the system or to the environment in which it exists. (For example a printer that "was working when it was plugged in over there"). However, there is a well known principle that correlation does not imply causality. (For example the failure of a device shortly after it's been plugged into a different outlet doesn't necessarily mean that the events were related. The failure could have been a matter of coincidence.) Therefore troubleshooting demands critical thinking rather than magical thinking.
It's useful to consider the common experiences we have with light bulbs. Light bulbs "burn out" more or less at random; eventually the repeated heating and cooling of its filament, and fluctuations in the power supplied to it cause the filament to crack or vaporize. The same principle applies to most other electronic devices and similar principles apply to mechanical devices. Some failures are part of the normal wear-and-tear of components in a system.
A basic principle in troubleshooting is to start from the simplest and most probable possible problems first. This is illustrated by the old saying "When you see hoof prints, look for horses, not zebras", or to use another maxim, use the KISS principle. This principle results in the common complaint about help desks or manuals, that they sometimes first ask: "Is it plugged in and does that receptacle have power?", but this should not be taken as an affront, rather it should serve as a reminder or conditioning to always check the simple things first before calling for help.
A troubleshooter could check each component in a system one by one, substituting known good components for each potentially suspect one. However, this process of "serial substitution" can be considered degenerate when components are substituted without regards to a hypothesis concerning how their failure could result in the symptoms being diagnosed.
Efficient methodical troubleshooting starts with a clear understanding of the expected behavior of the system and the symptoms being observed. From there the troubleshooter forms hypotheses on potential causes, and devises (or perhaps references a standardized checklist of) tests to eliminate these prospective causes. Two common strategies used by troubleshooters are to check for frequently encountered or easily tested conditions first (for example, checking to ensure that a printer's light is on and that its cable is firmly seated at both ends), and to "bisect" the system (for example in a network printing system, checking to see if the job reached the server to determine whether a problem exists in the subsystems "towards" the user's end or "towards" the device).
This latter technique can be particularly efficient in systems with long chains of serialized dependencies or interactions among its components. It's simply the application of a binary search across the range of dependences.
Simple and intermediate systems are characterized by lists or trees of dependencies among their components or subsystems. More complex systems contain cyclical dependencies or interactions (feedback loops). Such systems are less amenable to "bisection" troubleshooting techniques.
It also helps to start from a known good state, the best example being a computer reboot. A cognitive walkthrough is also a good thing to try. Comprehensive documentation produced by proficient technical writers is very helpful, especially if it provides a theory of operation for the subject device or system.
A common cause of problems is bad design, for example bad human factors design, where a device could be inserted backward or upside down due to the lack of an appropriate forcing function (behavior-shaping constraint), or a lack of error-tolerant design. This is especially bad if accompanied by habituation, where the user just doesn't notice the incorrect usage, for instance if two parts have different functions but share a common case so that it isn't apparent on a casual inspection which part is being used.
Troubleshooting can also take the form of a systematic checklist, troubleshooting procedure, flowchart or table that is made before a problem occurs. Developing troubleshooting procedures in advance allows sufficient thought about the steps to take in troubleshooting and organizing the troubleshooting into the most efficient troubleshooting process. Troubleshooting tables can be computerized to make them more efficient for users.

Searching for:
Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers, Troubleshooting, Error Troubleshooting, Problem solving, Problems solution, repair,maintenance, Helps support, Help Error Computers

Thursday, 7 January 2010

Zip Code Error (Invalid Zip code)

Searching for:


My computer was shutdown incorrectly when the breaker in my apartment went off. Now, when I run a weather widget, I get an invalid zip code error. I uninstalled and reinstalled Desktop X, but it didn't help. I cleared the widget cache, but I still get the same error. usually in windows XP with setting vista or vista combine.
it must be delete sidebar desktop and it will be disappears. because it appear ever and ever when computer conected to the internet.