You are on page 1of 347

Wipro - IAS

Desktop Certification
Reference Materials

Disclaimer: This document contains proprietary information of Wipro Ltd IAS. No part of this publication may be reproduced,
stored in a retrieval system or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording
or otherwise, without the prior written permission of Wipro Ltd. IAS. The information contained herein is confidential to Wipro
Ltd. IAS and its Service Partners, shall not be distributed to any persons other than those involved in the assessment &
delivery of services. Wipro Ltd. IAS reserves the right to revise and update this document as and when required. Wipro Ltd.
IAS reserves the right to withdraw the document excluding customer specific information at the time of termination of services.
All product names referenced herein are trademarks of their respective companies.
2010 Wipro Ltd Internal & Restricted

Topics - Overview
Hardware

Basics
Troubleshooting
Networking
N Computing
Peripherals

Software

Process

Antivirus
Endpoint Apps.
Internet/Intranet
Linux Basics
Mail Clients
Toolkit
Unistall
Windows OS

Care, Handling &


Best Practices
Process Basics

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Standard Installation
Process

HARDWARE BASICS

2010 Wipro Ltd Internal & Restricted

HARDWARE BASICS DESKTOP TYPES

1.Intel Processor based PC - Intel & OEM based Mother Boards.


Pentium & Celeron Based Processors.
2.AMD Processor Based PC (AMD based Processors.) - OEM based
Mother Boards only.
3.Work Stations Thin Clients/Terminals.
4.Customised Small Form Factor PCs.
Protos,Rural PC,NCOMP
5.Bundled Applications with the New PCs with Windows OS- Unistall 5
in 1
6.Super Genius Desktops(Windows Based OS)
7.IValue Desktops ( Linux Based OS)
4

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS

MEMORY TYPES

ADDON CARDS

SDRAM
DDR
or DDR1
DDR2
DDR3

Network Interface Card (NIC)


Video Graphics Adapter (VGA)
Modem Cards..
Serial/Parallel Port card

Power Supply(SMPS)
150 Watts
200 watts
250 watts
300 Watts
350 watts

Housing
ATX HOUSING
MATX HOUSING
SFF HOUSING

Processors
Intel & AMD Processors

CD-ROM /DVD ROM /CD-RW/DVDRW


IDE and SATA Drive types

Mother Boards
Intel and Non-Intel M/B

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS


Processor: The microprocessor, or central processing unit (CPU) as it is
known, is the brain and heart of any Microcomputer system. Intel makes most
CPUs. In fact, Intel is the company that came up with the name Pentium.
Pentium 2, Pentium 3, Pentium 4, Dual Core & Core 2 Duo.
Intel actually makes a less expensive version of the Pentium as well, which it
calls the Celeron.
AMD and VIA Technologies are the two other well-known CPU manufacturers.
Their CPUs are less expensive and use a different naming system such as
the AMD Athlon : AMD ATHLON PROCESSOR Speed : 850 MHz to 3 GHz
+ It is equivalent to Pentium processors but less expensive.
AMD Duron : AMD Duron Processor Speed 700 MHz to 800MHz Similar to
Intels Celeron Processor. It has lesser built-in memory

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS

Housing/Chassis
AT Housing
ATX Housing
SFF Housing

Input/Output Devices
Keyboard, Mouse, Monitors
Printers, Camera, Micro Phone, Head
Phones/Speaker, Scanners, Printers, Plotters etc.

Power Supply:
Supplies power throughout the computer. Power supplies converts
potentially lethal 110-115 or 220-230 volt alternating current (AC) into a steady
low-voltage direct current (DC) usable by the computer. A power supply is
rated by the number of watts it generates.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS


Floppy Disk Drive:
Originally created in 1967 by IBM . The floppy reference is
derived from the floppy media that is encased within the
protective casing.

Optical Drives:
CD-ROM :
A CD-ROM (Compact Disk Read Only Memory) is a drive which reads
aluminum-coated round plastic discs however does not write to the discs
invented in the United States 1972
OTHER CD TECHNOLOGIES:
CD-R /- (CD Recordable) Drive which you are able to write to once. Once the
drive is written to it cannot be erased.
CD-RW - (CD ReWritable) drive which is a popular alternative to the CD-R
drive. CD-RW has the capability of being written to at least one thousand times.
8

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS

DVD (Digital Versatile Disc or Digital Video Disc) - Is the new future of computer
CD-ROM drives. DVD drives became a new computer standard September of 1995
The DVD technology is very different from the technology used in standard
CD-ROM drives. DVD uses shorter wavelength lasers to read smaller pits and
lands. Discs also have two layers the first layer is semi-reflective to allow the laser
to penetrate it and get to the substance beneath it.
DVD drives also spin at a base speed that is about three times as fast as a single
speed CD-ROM drive.
DVD-ROM : DVD-RAM will be capable of holding 2.6GB per side.
DVD-RW : Standard of ReWritable DVD discs being promoted by Hewlett
Packard , is capable of holding 4.7 GB of data.

DIVIX: (Digital video express) - New DVD-ROM which was developed and
promoted by several large companies including Disney, Dreamworks SKG, The
Divix player is more expensive then a standard DVD drive
9

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS Data Transfer Speeds CD-ROM

Common data transfer speeds for CD-ROM drives


Transfer speed

Mbit/s

RPM

150

1.23

200-500

300

2.46

400-1,000

600

4.92

800-2,000

1,200

9.83

1,600-4,000

10

1,500

12.3

2,000-5,000

12

1,800

14.7

2,400-6,000

20

1,200-3,000

up to 24.6

4,000 (CAV)

32

1,920-4,800

up to 39.3

4,800 (CAV)

36

2,160-5,400

up to 44.2

7,200 (CAV)

40

2,400-6,000

up to 49.2

8,000 (CAV)

48

2,880-7,200

up to 59.0

9,600 (CAV)

52

3,120-7,800

up to 63.9

10,400 (CAV)

56

3,360-8,400

up to 68.8

11,200 (CAV)

6,750-10,800

up to 88.5

2,000 (multi-beam

72

10

KiB/s

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS


SATA HDD

IDE HDD

11

SATA DATA CABLE

SATA POWER CABLE

IDE DATA CABLE

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS DESKTOP COMPONENTS


Desktop Computer Housing
Desktop computer cases are the home to all the computer components.
Everything including the motherboard, the hard drive, the cd drive, the
floppy drive and the power supply go inside a computer case. Computer
cases can be different colors and in recent years some have become fancy.
Extras, such as front USB have become popular as well. Computer Memory
RAM (Random Access Memory) or Computer Memory is another very
important component to a computer. Computer Memory is a volatile storage
device meaning that when the computer is switched off everything stored on
this temporary storage device will be lost. The more computer memory, the
better the computer will run and the better it will handle programs and
software. RAM is now generally measured in Mhz, and most commonly seen
in the types of SDRAM, DDRRAM, DDR2 & DDR3
Hard Drive
The hard drive is a permanent storage device. Without a Hard Disk Drive no
operating system and would be of very little use. All the information on your
computer including the operating system (eg. windows XP), programs and
files will be stored on the Hard Drive. Hard Drives Capacity is measured in
Gigabytes (one billion bytes).
12

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - DESKTOP COMPONENTS


CD/DVD Drives
CD/DVD Drives are another storage device in a computer. CD Drives are
used to read CD's with information on them such as an operating
system, programs or data files. Recently CD-RW and DVD-RW have
been included in computers meaning that it is possible to write data to
blank disks. CD Drives are measured by their read and write speeds.
Video Cards
A video card is another compulsory component in a computer. The
information goes into the video card and then is transmitted to the
monitor where the information is displayed. Motherboards have the
graphics card built in, but to get higher resolutions need a seperate
card that plugs into the motherboard.
Sound Card
A sound card translates signals into sounds that can be played back
through speakers. Many motherboards have a sound card incorporated
in the motherboard.

13

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - DESKTOP COMPONENTS


Monitors
Computer monitors are another compulsory unit of a computer system. It is
possible for the computer to function correctly without a monitor but there
would be very little point as you cannot see anything. The computer monitor
connects to the graphics card and it displays a picture on the screen.
Computer monitors come in two types: CRT (Cathode Ray Tube) which are
block monitors and LCD (Liquid Crystal Display) which are very thin.
Network Card
A Computer Network Card or a LAN (Local Area Network) card is increasingly
becoming more and more necessary in world of broadband internet and home
networking. LAN ports are often incorporated on the motherboard and it is
used for networking computers together or for connecting through a router to
the World Wide Web.
Other Components
There are many other computer hardware components that can be placed onto
the motherboard in the PCI-slots. These include, firewire cards, USB cards, TV
tuners, and many other components that are specific to their personal needs.
14

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS OLDER MOTHERBOARD

15

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS INTEL CORE2 DUO BOARDS


LABEL COMPONENTS
1.LGA775 socket for Intel Kensfield/
Yorkfield/Wolfdale/Core 2 Duo CPUs
2. CPU_FAN CPU cooling fan connector
3. DIMM1~4 240-pin DDR2 SDRAM slots
4. JP4 Reserve header
5. FDD Floppy disk drive connector
6. ATX_POWER1 Standard 24-pin ATX power connector
7. SATA1~6 Serial ATA connectors
8. PANEL1 Front panel switch/LED header
9. MFG UNLOCK ME BIOS protect header
10. USB2~4 Front panel USB headers
11. CHS1 Chassis detect header
12. CLR_CMOS Clear CMOS jumper
13. COM2 Onboard Serial port header
14. SPDIFO SPDIF out header
15. SPK Speaker header
16. AUDIO1 Front panel audio header
17. PCI1~2 32-bit add-on card slots
18. PCIEX1 PCI Express x1 slot
19. PCIEX16 PCI Express slot for graphics interface
20. ATX12V1 Auxiliary 4-pin power connector
21. SYS_FAN System cooling fan connector

16

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS INTEL P3 BOARDS

17

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Processor
The processor (CPU, for Central Processing Unit) is the computer's brain. It allows the
processing of numeric data, meaning information entered in binary form, and the
execution of instructions stored in memory.
Hyper threading is the technology used in processors which enables one processor to act as
a multiple processor. In multi-core architecture, more than one processors are integrated
in one physical packaging.
Current Processors:
Dual Core & Core 2 Duo

Runs two independent processor cores in one physical package at the same frequency.

Quad Core:

Runs 4 independent processor cores in one physical package at the same frequency.

18

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Dual Core v/s Core 2 Duo

Dual Core

19

Core 2 Duo

Clock Speed

Up to 2.33 GHz speed

Greater clock speeds of upto 3.33 GHz is available now.

Power Consumption

Extremely power efficient with max TDP of 15Watts.

Power efficient processor with max TDP of 65Watts.

Cache Support

Max 2MB L2 cache is available.

Can get a max of 6MB L2 cache for Core 2 Duo.

FSB Speed

Max of 667 MHz speed is available.

It is available with front side bus speeds of upto 1333 MHz.

Cost

These processors are priced from $40 to $140 for


different versions of processors Low cost

These processors are priced from $120 to $270 for different versions of
processors Higher Cost

Over-locking

They can be easily overclocked up to 4.0 GHz with


suitable coolers. Even a overclocking at 6.0GHz was
made possible with Liquid Nitrogen cooling.

Can be overclocked upto 20-30% of its specified clock speed without


much problem.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS INPUT/OUTPUT DEVICES

Printers: Printer is an electro-mechanical device that receives data


from the PC in the form of binary coded characters and prints the
characters on the paper

20

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS INPUT/OUTPUT DEVICES

Output Devices: Monitor, Printer


Display Units: CRT: Cathode Ray Tube
Color monitors have 3 electron guns that control
the display of red, green and blue light. The
surface of the CRT is arranged to have these dots
placed adjacently in a specific pattern.

LCD: They are lighter, thinner, use less power and


do not flicker like their CRT counterparts.
LCD should be avoided to extreme light, heat and cold.

21

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS SATA VS IDE


The SATA cable or Serial ATA cables are only 7 pins wide compared to the IDE
Ribbon Cable which is 40 pins. The SATA cables are also longer then the ribbon
cables (some up to 1m) which make them more useful in large cases. The PATA or
IDE cables are only 45cm long and can connect two hard drives to the M/B while
the SATA cable connects only one hard drive to the motherboard.
Speed
IDE (PATA) transfers data from the speeds of 5MB/sec up to 133MB/Sec
(ATA100/133). SATA however data transfer speeds range from 150MB/sec to SATA
II which doubles it to 300MB/sec.
Jumpers
With the IDE cable you need to always mess around with the jumpers since their
may be two hard drives or two CD drives or one of each on the one cable. With
SATA there is only the one cable so there are no jumpers to mess around with.
Summary
In summary of SATA vs IDE, the SATA cable is smaller, faster and therefore better.
It can reach further than a IDE cable and will also reduce the obstruction to air
cooling which IDE cables can contribute to. The cables also transfer data much
faster ( if you have two or more hard drives) and are easier to install since their
are no jumpers. The only LIMITATION of the SATA is that they easily fall out of
their positions and that you can only have one drive per cable.
22

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS IRDA

In information and communications technology , a standard for communication between


devices (such as computers, PDAs and mobile phones) over short distances using infrared
signals
IrDA is a very short-range example of free space optical communication. IrDA interfaces are
used in medical instrumentation, test and measurement equipment, palmtop computers,
mobile phones, and laptop computers (most laptops and phones also offer Bluetooth but it is
now becoming more common for Bluetooth to simply replace IrDA in new versions of
products).
For the devices to communicate via IrDA they must have a direct line of sight similar to a TV
remote control
IrDA was popular on laptops and some desktops during the late 90s through the early 2000s.
However, it has been displaced by other wireless technologies such as WiFi and Bluetooth,
favored because they don't need a direct line of sight, and can therefore support hardware
such as mice and keyboards. It is still used in some environments where interference makes
radio-based wireless technologies unusable. IrDA popularity is making a comeback with its
highly efficient IrSimple protocols by providing sub 1 second transfers of pictures between cell
phones, printers, and display devices. IrDA hardware is still less expensive and doesn't share
the same security problems encountered with wireless technologies such as Bluetooth IrDA
data communications operate in half-duplex mode because while transmitting, a devices
receiver is blinded by the light of its own transmitter, and thus, full-duplex communication is not
feasible. The two devices that communicate simulate full duplex communication by quickly
turning the link around
23

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS USB


The Universal Serial Bus (USB) is a standard for peripheral devices. USB
was intended to make it fundamentally easier to connect external devices
to PCs by replacing the multitude of connectors at the back of PCs, Of
Late Can be connected in the Front side of the Housing. Simple
Connections as well as permitting greater bandwidths for external
devices.
The first silicon for USB was made available by Intel in 1995.[5]
The USB 1.0 specification was introduced in January 1996. The original
USB 1.0 specification had a data transfer rate of 12 Mbit/s.[5] The first
widely used version of USB was 1.1, which was released in September
1998. It allowed for a 12 Mbps data rate for higher-speed devices such
as disk drives, and a lower 1.5 Mbps rate for low bandwidth devices such
as joysticks.[6]
The USB 2.0 specification was released in April 2000 and was
standardized by the USB-IF at the end of 2001. Hewlett-Packard, Intel,
Lucent Technologies (now Alcatel-Lucent following its merger with Alcatel
in 2006), NEC and Philips jointly led the initiative to develop a higher data
transfer rate, with the resulting specification achieving 480 Mbit/s, a
fortyfold increase over 12 Mbit/s for the original USB 1.0. data.
24

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS USB


Bluetooth is an open wireless technology standard for exchanging data
over short distances (using short length radio waves) from fixed and mobile devices,
creating personal area networks (PANs) with high levels of security.
SERIAL PORT is a serial communication physical interface through which information
transfers in or out one bit at a time. serial port" usually identifies hardware more or
less compliant to the RS-232 standard, intended to interface with a modem or with a
similar communication device.
PARALLEL PORT is a type of interface found on computers (personal and otherwise)
for connecting various peripherals. In computing, a parallel port is a parallel
communication physical interface. It is also known as a printer port or Centronics port.
The IEEE 1394 interface is a serial bus interface standard for high-speed
communications (400 Mbps) and real-time data transfer, frequently used by personal
computers, as well as in digital audio/l video, automotive, and aeronautics
applications. The interface is also known by the brand names of FireWire (Apple),
i.LINK (Sony), and Lynx (Texas Instruments). IEEE 1394 replaced parallel SCSI in
many applications, because of lower implementation costs and a simplified, more
adaptable cabling system
25

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD


Motherboard or main board is at the center of the PC computer system.
Effectively it is a board containing the central processing unit (CPU) and the
memory modules (SIMMs/ DIMMs). It allows the CPU to interfaces with other
parts of the computer via a 'BUS' system, into which sockets /connectors are
fitted, for connection of various 'expansion' boards. Also on the motherboard is the
RAM memory, normally in the form of SIMM, or DIMM modules in the modern PC
computer, and cache memory in the form of integrated circuits (chips)..
Modern boards utilize a CPU with two PCI and three, PCIE expansion slots. Most
of the features like Video,Audio,LAN etc are on onboard itself. This free's up a
couple of expansion slots for other devices
Motherboard and System Devices
The motherboard is, in many ways, the most important component in the computer
If the processor is the brain of the computer, then the motherboard and its major
components (the chipset, BIOS, cache, etc.) are the major systems that this brain
uses to control the rest of the computer.
Direct memory access (DMA) is a feature that allows certain hardware
subsystems within the computer to access system memory for reading and/or
writing independently of the central processing unit. Many hardware systems use
DMA including disk drive controllers, graphics cards, network cards and sound
cards..
26

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD


Control: The motherboard contains the chipset and BIOS program, which
controls most of the data flow within the computer.
Communication: Almost all communication between the PC and its
peripherals, other PCs, and you, the user, goes through the motherboard.
Processor Support: Choice of processor for use in the system is based on
the Motherboard.. Second, the quality of the motherboard circuitry and
chipset themselves have an impact on performance.
Peripheral Support: The motherboard determines, in large part, what types
of peripherals you can use in your PC. For example, the type of video
card your system will use (ISA, VLB, PCI.PCIE) is dependent on what
system buses your motherboard uses.
Northbridge typically handles communications among the CPU, RAM, BIOS
ROM, and PCI Express (or AGP) video cards, and the south bridge.
Some north bridges also contain integrated video controllers, also known
as a Graphics and Memory Controller Hub (GMCH) in Intel systems.
Southbridge also known as an I/O controller hub (ICH) in Intel systems
(AMD, VIA, SiS and others usually use 'south bridge'), is a chip that
implements the "slower" capabilities of the motherboard in a Northbridge /
Southbridge chipset computer architecture.
27

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

Performance: First and foremost, the motherboard determines what types of


processors, memory, system buses, and hard disk interface speed your
system can have, and these components dictate directly your system's
performance. Second, the quality of the motherboard circuitry and chipset
themselves have an impact on performance.
Upgradability: The capabilities of your motherboard dictate to what extent
you will be able to upgrade your machine. For example, there are some
motherboards that will accept regular Pentiums of up to 133 MHz speed
only, while others will go to 200 MHz. Obviously, the second one will give
you more room to upgrade if you are starting with a P133.
for a new motherboard, you need to open up your existing case and
determine whether or not the power supply will be compatible. Many new
motherboards require an additional 12V, 4-wire connector for the CPU,
which most power supplies older than two years will lack. The newest
motherboards for the Intel Socket 775 CPU's may also require a 24 pin
ATXe connector, or give you the option to use a third drive connector to
suppliment motherboard power.

28

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD


Motherboard Form Factors
The form factor of the motherboard describes its general shape, what sorts of
cases and power supplies it can use, and its physical organization. For
example, a company can make two motherboards that have basically the
same functionality but that use a different form factor, and the only real
differences will be the physical layout of the board, the position of the
components, etc.
Form Factors Type:AT &BABY AT ATX & Mini ATX NLX & LPX AT and Baby AT
Up until recently, the AT and baby AT form factors were the most common form
factor in the motherboard world. These two variants differ primarily in width:
the older full AT board is 12" wide. This means it won't typically fit into the
commonly used "mini" desktop or minitower cases. There are very few new
motherboards on the market that use the full AT size. It is fairly common in
older machines, 386 class or earlier. One of the major problems with the width
of this board (aside from limiting its use in smaller cases) is that a good
percentage of the board "overlaps" with the drive bays. This makes
installation, troubleshooting and upgrading more difficult.
29

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD


Integrated PS/2 Mouse Connector: On most retail baby AT style
motherboards, there is either no PS/2 mouse port, or to get one you need to
use a cable from the PS/2 header on the motherboard, just like the serial
and parallel ports. (Of course most large OEMs have PS/2 ports built in to
their machines, since their boards are custom built in large quantities). ATX
motherboards have the PS/2 port built into the motherboard.
Reduced Drive Bay Interference: Since the board is essentially "rotated" 90
degrees from the baby AT style, there is much less "overlap" between where
the board is and where the drives are. This means easier access to the
board, and fewer cooling problems.
Reduced Expansion Card Interference: The processor socket/slot and
memory sockets are moved from the front of the board to the back right
side, near the power supply. This eliminates the clearance problem with
baby AT style motherboards and allows full length cards to be used in most
(if not all) of the system bus slots.
Better Power Supply Connector: The ATX motherboard uses a single 20-pin
connector instead of the confusing pair of near-identical 6-pin connectors on
the baby AT form factor. You don't have the same risk of blowing up your
motherboard by connecting the power cables backwards that most PC
homebuilders are familiar with.
30

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD


"Soft Power" Support: The ATX power supply is turned on and off using
signaling from the motherboard, not a physical toggle switch. This allows
the PC to be turned on and off under software control, allowing much
improved power management. For example, with an ATX system you can
configure Windows 95 so that it will actually turn the PC off when you tell it
to shut down.
3.3V Power Support: The ATX style motherboard has support for 3.3V power
from the ATX power supply. This voltage (or lower) is used on almost allnewer processors, and this saves cost because the need for voltage
regulation to go from 5V to 3.3V is removed.
Better Air Flow: The ATX power supply is intended to blow air into the case
instead of out of it. This means that air is pushed out of all the small cracks
in the PC case instead of being drawn in through them, cutting down on
dust accumulation. Further, since the processor socket or slot is on the
motherboard right next to the power supply, the power supply fan can be
used to cool the processor's heat sink. In many cases, this eliminates the
need to use (notoriously unreliable) CPU fans, though the ATX
specification now allows for the fan to blow either into or out of the case.
Improved Design for Upgradability: Its design makes upgrading easier
because of more efficient access to the components on the motherboard.
31

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

Conventionally used in mass-produced "name brand" retail systems, the LPX


motherboard form factor goes into the small Slim line or "low profile" cases typically
found on these sorts of desktop systems. The primary design goal behind the LPX form
factor is reducing space usage (and cost). This can be seen in its most distinguishing
feature: the riser card that is used to hold expansion slots. Instead of having the
expansion cards go into system bus slots on the motherboard, like on the AT or ATX
motherboards, LPX form factor motherboards put the system bus on a riser card that
plugs into the motherboard. Then, the expansion cards plug into the riser card; usually, a
maximum of just three. This means that the expansion cards are parallel to the plane of
the motherboard. This allows the height of the case to be greatly reduced, since the
height of the expansion cards is the main reason full-sized desktop cases are as tall as
they are. The problem is that you are limited to only two or three expansion slots!
32

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

LPX form factor motherboards also often come with on board video
display adapter cards built into the motherboard. If the card built in is of
good quality, this can save the manufacturer money and provide the
user with a good quality display However, if the user wants to upgrade to
a new video card, this can cause a problem unless the integrated video
can be disabled in the Bios setup. LPX motherboards also usually come
with serial, parallel and mouse connectors attached to them, like ATX.
While the LPX form factor can be used by a manufacturer to save
money and space in the construction of a custom product, these
systems suffer from non-standardization, poor expandability, poor
upgradability, poor cooling and difficulty of use for the do-it-yourselfer.
They are not recommended for the homebuilder, but if you are upgrading
one of these systems, you may not have many alternatives.
33

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

Revised design to support larger memory modules and modern DIMM


memory packaging.
Support for the newest processor technologies
Support for AGP/PCIE video/add-on cards.
Better thermal characteristics, to support modern CPUs that run hotter than
old ones.
More optimal location of CPU on the board to allow easier access and better
cooling.
More flexibility in how the motherboard can be set up and configured.
Enhanced design features, such as the ability to mount the motherboard so it
can slide in or out of the system case easily.
Support for desktop and tower cases. The NLX form factor is, like the LPX,
designed primarily for commercial PC makers mass-producing machines for
the retail market. Many of the changes made to it are based on improving
flexibility to allow for various PC options and flavors, and to allow easier
assembly and reduced cost. For homebuilders and small PC shops, the ATX
form factor is the design of choice heading into the future.
Data Transfer between memory & peripherals is been controlled by DMA
Controllers which will not impact any processor performance.
34

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

System Boot Sequence

The system BIOS is what starts the computer running when you turn it on. The
following are the steps that a typical boot sequence involves. Of course this will vary
by the manufacturer of your hardware, BIOS, etc., and especially by what
peripherals you have in the PC. Here is what generally happens when you turn on
your system power:
The internal power supply turns on and initializes. The power supply takes some
time until it can generate reliable power for the rest of the computer, and having it
turn on prematurely could potentially lead to damage. Therefore, the chipset will
generate a reset signal to the processor (the same as if you held the reset button
down for a while on your case) until it receives the Power Good signal from the
power supply.

35

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

The BIOS performs the power-on self test (POST). If there are any fatal
errors, the boot process stops.
The BIOS looks for the video card. In particular, it looks for the video card's
built in BIOS program and runs it. This BIOS is normally found at location
C000h in memory. The system BIOS executes the video card BIOS, which
initializes the video card. Most modern cards will display information on the
screen about the video card. (This is why on a modern PC you usually see
something on the screen about the video card before you see the messages
from the system BIOS itself). The BIOS then looks for other devices' ROMs to
see if any of them have BIOS. Normally, the IDE/ATA hard disk BIOS will be
found at C8000h and executed. If any other device BIOS are found, they are
executed as well. The BIOS displays its startup screen The BIOS does more
tests on the system, including the memory count-up test, which you see on
the screen. The BIOS will generally display a text error message on the
screen if it encounters an error at this point.

36

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

The BIOS performs a "system inventory" of sorts, doing more tests to


determine what sort of hardware is in the system. Modern BIOS have many
automatic settings and will determine memory timing (for example) based on
what kind of memory it finds. Many BIOS can also dynamically set hard drive
parameters and access modes, and will determine these at roughly this time.
Some will display a message on the screen for each drive they detect and
configure this way. The BIOS will also now search for and label logical
devices (COM and LPT ports). If the BIOS supports the Plug and Play
standard, it will detect and configure Plug and Play devices at this time and
display a message on the screen for each one it finds The BIOS will display a
summary screen about your system's configuration. Checking this page of
data can be helpful in diagnosing setup problems, although it can be hard to
see because sometimes it flashes on the screen very quickly before scrolling
off the top.
The BIOS begins the search for a drive to boot from. Most modern BIOS
contain a setting that controls if the system should first try to boot from the
floppy disk (A:) or first try the hard disk (C:). Some BIOS will even let you boot
from your CD-ROM drive or other devices, depending on the boot sequence
BIOS setting.
37

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD


BIOS looks for boot information to start the operating system boot
process. If it is searching a hard disk, it looks for a master boot record
at cylinder 0, head 0, sector 1 (the first sector on the disk); if it is
searching a floppy disk, it looks at the same address on the floppy disk
for a volume boot sector. If it finds what it is looking for, the BIOS starts
the process of booting the operating system, using the information in
the boot sector. At this point, the code in the boot sector takes over
from the BIOS. If the first device that the system tries (floppy, hard disk,
etc.) is not found, the BIOS will then try the next device in the boot
sequence, and continue until it finds a bootable device. If no boot device
at all can be found, the system will normally display an error message
and then freeze up the system with the error "No boot device available"
This will also happen if you have a bootable hard disk partition but
forget to set it active.
This process is called a "cold boot" (since the machine was off, or cold,
when it started). A "warm boot" is the same thing except it occurs when
the machine is rebooted using Ctrl+Alt+Delete or similar. In this case the
POST is skipped and the boot process continues roughly at step 8
above
38

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MOTHERBOARD

Power-On Self Test (POST) :The first thing that the BIOS does when it boots the PC is to perform
what is called the Power-On Self-Test, or POST for short. The POST is a
built-in diagnostic program that checks your hardware to ensure that
everything is present and functioning properly, before the BIOS begins
the actual boot. It later continues with additional tests (such as the
memory test that you see printed on the screen) as the boot process is
proceeding.
The POST runs very quickly, and you will normally not even noticed that
it is happening--unless it finds a problem. You may have encountered a
PC that, when turned on, made beeping sounds and then stopped
without booting up. That is the POST telling you something is wrong with
the machine. The speaker is used because this test happens so early on,
that the video isn't even activated yet! These beep

39

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - Processors


Core 2 Quad 1333 FSB ( Q9XXX)
Core 2 Duo 1333 FSB ( E8XXX)
Core 2 Duo 1066FSB ( E7XXX)
Core 2 Quad 1066 FSB ( Q6XXX)
Core 2 Duo 1333 FSB ( E6X50)
Core 2 Duo 800 FSB

( E4XXX)

Pentium Dual Core E5XXX

Pentium Dual Core E2XXX


Celeron Dual Core E14XX
Celeron Conroe-L (4XX)
Pentium D Support ( 8XX & 9XX )
Pentium 4
Celeron D (3XX)Support

40

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS Operating Systems

41

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS PROCESSOR TECHNOLOGIES

The Intel Pentium 4 processor on 90-nanometer (nm) technology


is the first Intel processor to be manufactured on 90nm
semiconductor process technology. This new process offers
smaller dimensions and more transistors on the same area,
allowing us to double the number of transistors
while reducing the chip size by over 15 percent.

Intel Pentium 4 processor on 90nm technology contains several


micro architecture enhancements such as a larger 1 MB Level 2
(L2) cache, larger 16 KB Level 1 (L1) cache. The processor also
has eight write-combining buffers compared to six in the previous
generation.
For example, a home user can play an immersive game while
encoding audio or video, compressing images or compositing
special effects. The 90nm process technology reduces size by
more than 15% compared to the previous 130nm process, while
more than doubling the number of transistors

42

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS PROCESSOR TECHNOLOGIES

Intel multi-core technology provides new levels of energy efficient


performance, enabled by advanced parallel processing and 45nm
technology. Incorporating multiple processor execution cores in a single
package
Intel Trusted Execution Technology (Intel TXT), is a highly versatile
set of hardware extensions to Intel processors and chipsets that, with
appropriate software, enhance the platform security capabilities. Trusted
Execution Technology will provide a hardware-based security foundation
that will help enable greater levels of protection for information stored,
processed and exchanged on the PC

43

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PROCESSOR TECHNOLOGIES HYPER THREADING & VIRTUALISATION

Hyper-Threading Technology allows one physical processor to appear to the operating


system as two logical processors [2]., Intel AMT allows to better discover, heal, and
protect IT networked computing assets. included better asset management, reduced
downtime, and minimized desk-side visits.
Intel design teams determined that these issues were best addressed through
platform architectural enhancements, resulting in the following features for supporting
those needs. Hardware-assisted Intel Virtualization Technology (Intel VT) provides
greater flexibility and maximum system utilization by consolidating multiple
environments into a single server, workstation, or PC. With fewer systems
required for the same tasks, Intel VT delivers Simplified resource
management increasing IT efficiency. Greater systems reliability and
availability reducing corporate risk and real-time losses from downtime. Lower
hardware acquisition costs with increased utilization of the machines already have.
Virtualization solutions enhanced by Intel VT allow a platform to run multiple operating
systems (OS) and applications as independent virtual machines, allowing one
computer system to function as multiple "virtual" systems. For example, IT managers
can create a single build with multiple and different OS, software, and legacy
applications. With support from the processor, chipset, BIOS, and enabling software,
Intel VT improves traditional software-based virtualization
44

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MEMORY

Standard Memory
name
clock

45

Cycle
time[2]

I/O bus
clock

DDR-200 100 MHz 10 ns

100 MHz

DDR-266 133 MHz 7.5 ns

133 MHz

DDR-333 166 MHz 6 ns

166 MHz

DDR-400 200 MHz 5 ns

200 MHz

Data
transfers
per
second
200
Million
266
Million
333
Million
400
Million

JEDEC
standard
VDDQ
voltage

Module
name

2.50.2 V PC-1600
2.50.2 V PC-2100
2.50.2 V PC-2700
2.60.1 V PC-3200

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Peak
transfer
rate
1600
MB/s
2100
MB/s
2700
MB/s
3200
MB/s

HARDWARE BASICS MEMORY

SDRAM
SDRAM is a dynamic random access memory (DRAM) that
has a synchronous interface. Traditionally, dynamic random
access memory (DRAM) has an asynchronous interface.

SDRAM is widely used in very old computers; from the original SDRAM further
generations of DDR (or DDR1), and then DDR2 and DDR3 have entered the mass
market, with DDR4 currently being designed

46

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MEMORY

DDR RAM

47

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS - MEMORY

DDR2 SDRAM is a double data rate synchronous dynamic random


access memory interface. It supersedes the original DDR SDRAM
specification and the two are not compatible.
In addition to double pumping the data bus as in DDR SDRAM, (transferring
data on the rising and falling edges of the bus clock signal).
DDR2 employs an I/O buffer between the memory and the data bus so that
the data bus can be run at the twice the speed of the memory clock.
The two factors combine to achieve a total of 4 data transfers per
memory clock cycle.
With data being transferred 64 bits at a time, DDR2 SDRAM gives a transfer
rate of (memory clock rate) 2 (for bus clock multiplier) 2 (for dual rate)
64 (number of bits transferred) / 8 (number of bits/byte). Thus with a
memory clock frequency of 100 MHz, DDR2 SDRAM gives a maximum
transfer rate of 3200 MB/s.

PC2-3200
PC2-4200
PC2-43001
PC2-5300
PC2-54001

3200 MB/s

DDR2-667 166 MHz 6 ns

Data
transfers
per
second
400
200 MHz Million
533
266 MHz Million
667
333 MHz Million

DDR2-800 200 MHz 5 ns


DDR21066
266 MHz 3.75 ns

800
400 MHz Million
1066
533 MHz Million

PC2-6400
PC2-8500
PC2-86001

6400 MB/s

Standard Memory
name
clock

DDR2-400 100 MHz 10 ns


DDR2-533 133 MHz 7.5 ns

Since the memory clock runs at half the external data bus clock rate, DDR2
memory operating at the same external data bus clock rate as DDR will
provide the same bandwidth but with higher latency, resulting in inferior
performance. Alternatively, DDR2 memory operating at twice the external
data bus clock rate as DDR may provide twice the bandwidth with the same
latency (in nanoseconds). The best-rated DDR2 memory modules are at least
twice as fast as the best-rated DDR memory modules.

48

Cycle
time

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

I/O Bus
clock

Module
name

Peak
transfer
rate

4266 MB/s
5333 MB/s

8533 MB/s

Timings[2][3]
3/3/3
4/4/4
3/3/3
4/4/4
4/4/4
5/5/5
4/4/4
5/5/5
6/6/6
6/6/6
7/7/7/

HARDWARE BASICS PORT DETAILS


Parallel ATA (PATA) is an interface standard for the connection of
storage devices such as hard disks, solid-state drives, and CD-ROM
drives in computers.
ATA/ATAPI is an evolution of the AT Attachment Interface, which was
itself evolved in several stages from Western Digital's original Integrated
Drive Electronics (IDE) interface. As a result, many near-synonyms for
ATA/ATAPI and its previous incarnations exist, including abbreviations
such as IDE which are still in common informal use. After the market
introduction of Serial ATA in 2003, the original ATA was retroactively
renamed Parallel ATA.
Parallel ATA only allows cable lengths up to 18 in (460 mm). Because of
this length limit the technology normally appears as an internal computer
storage interface. For many years ATA provided the most common and
the least expensive interface for this application. By the beginning of
2007, it had largely been replaced by Serial ATA (SATA) in new systems.

49

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS ATA's ribbon cables have had 40 wires for most of its history (44 conductors
for the smaller form-factor version used for 2.5" drives - the extra four for
power), but an 80-wire version appeared with the introduction of the Ultra
DMA/33 (UDMA) mode. All of the additional wires in the new cable are
ground wires, interleaved with the previously defined wires to reduce the
effects of capacitive coupling between neighboring signal wires, reducing
crosstalk. Capacitive coupling is more of a problem at higher transfer rates,
and this change was necessary to enable the 66 megabytes per second
(MB/s) transfer rate of UDMA4 to work reliably. The faster UDMA5 and
UDMA6 modes also require 80-conductor cables.

ATA cables:
`Though the number of wires doubled, the number of connector pins and the pin-out
remain the same as 40-conductor cables, and the external appearance of the
connectors is identical. Internally the connectors are different; the connectors for the
80-wire cable connect a larger number of ground wires to a smaller number of ground
pins, while the connectors for the 40-wire cable connect ground wires to ground pins
one-for-one. 80-wire cables usually come with three differently colored connectors
(blue controller, gray slave drive, and black master drive) as opposed to
uniformly colored 40-wire cable's connectors (all black). The gray connector on 80conductor cables has pin 28 CSEL not connected; making it the slave position for
drives configured cable select
50

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Port Connector Types

AT (Advanced technology):
They are similar to the original motherboards found in the IBM AT. The
microprocessor, memory and expansion slots are all in line with each other.
The advancement in the field of electronics resulted in the design of
smaller components that occupied less space. This configuration is known as
Baby AT
ATX:
The ATX motherboard has the microprocessor and memory slots at right
angles to the expansion slots. This puts the microprocessor and memory in
the same line with the fan output of the power supply allowing the
microprocessor to cool. In addition, more space was available, as the
microprocessor and memory were not in line with the expansion slots.

51

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HARDWARE BASICS PORTS &


CONNECTORS

SATA POWER CABLE


SATA DATA CABLE

52

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

A 6-circuit FireWire
400 (IEEE) alpha
connector

Various Port Connector Types


IEEE PORT

Serial Port
Parallel Port

LPT

DIN Connector

USB
53

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Various Port Connector Types


PS/2 Connector:

Fire ware:

Video:

Power Cord

Mini Jack:

54

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Various Slots and Card Types Used in PC


An expansion card is a circuit board that lets you add new feature to a
computers. It is also called an expansion board.
Types of Slots:
Industry Standard Architecture (ISA)
Enhanced Industry Standard Architecture (EISA)
Micro Channel Architecture (MCA)
Video Electronics Standard Association (VESA)
Peripheral Component Interconnect (PCI)
Personal Computer Memory Card International Association
(PCMCIA)
Advanced Graphics Port (AGP)
Commonly used Expansion Cards:
Video Card
Sound Card
Modem
NIC
55

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basic Concepts of Network

56

2010 Wipro Ltd Internal & Restricted

Agenda
Basics of Networking
Networking Standards
Network Devices & Definitions
TCP/IP Network Addressing
VLAN & ARP
Basic Definitions for L2 & L3 Networks

57

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basics of Networking
What & Why is Network
Distribute pieces of computation among computers (nodes)
Coordination between processes running on different nodes
Remote I/O Devices

Remote Data/File Access


Personal communications (email, chat, audio/video conference,
messaging)
World Wide Web
58

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basics of Networking

ISO-OSI is standard of network but we commonly use TCP/IP, which has no


session/presentation layer
59

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basics of Networking
Physical Layer:
o Standardized protocol dealing with electrical, mechanical and signaling interfaces.
o Concerned with the transmission of bits
Data Link Layer:
o Logical Link Control (LLC) defines how data is transferred over the cable and
provides data link service to the higher layers.
o Medium Access Control (MAC) defines who can use the network when multiple
computers are trying to access it simultaneously (i.e. Token passing, Ethernet
[CSMA/CD], etc...).
o Handles errors in the physical layer.
o Groups bits into frames and ensures their correct delivery.
Network:
o Concerned with the transmission of packets.
o Choose the best path to send a packet (routing).
o It may be complex in a large network (e.g. Internet).
o Shortest (distance) route vs. route with least delay.
o Most popular protocol widely used is x.25 and TCP/IP
60

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basics of Networking
Transport Layer:
o Network layer does not deal with lost messages.Transport layer ensure reliable
service. It breaks the message (from sessions layer) into smaller packets, assigns
sequence number and sends them.
o TCP/IP is widely used for network/transport layer. UDP (Universal Datagram
Protocol): Internet connectionless transport protocol.
Session & Presentation Layer:
o Just theory! Very few applications use it.
Application Layer:
o Collection of miscellaneous protocols for high level applications
o Electronic mail, file transfer, connecting remote terminals, etc.
o E.g. SMTP, POP, IMAP, FTP, Telnet, SSH, HTTP, HTTPS, SNMP, etc...

61

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Networking Standards

62

IEEE 802
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.5
IEEE 802.11
IEEE 802.15
IEEE 802.16
IEEE 802.17

: Internetworking
: Bridging & Management
: Logical Link Control
: CSMA/CD (Ethernet) Access Method
: Token Ring Access Method
: Wireless
: Wireless Personal Area Networks
: Broadband Wireless MAN
: Resilent Packet Rings

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Devices & Definitions


REPEATORS
HUBS

SWITCHES
BRIDGES
ROUTERS

FIREWALL

63

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Devices & Definitions


Repeater:
o A repeater connects two segments of your network cable. It retimes and
regenerates the signals to proper amplitudes and sends them to the other
segments.
Hub:
o A type of repeater used on several network architectures which usually connects
several stations.
Switch:
o A network switch is a computer networking device that connects network
segments.
o The term commonly refers to a network bridge that processes and routes data at
the data link layer (layer 2) of the OSI model. Switches that additionally process
data at the network layer (layer 3 and above) are often referred to as Layer 3
switches or multilayer switches.
o The term network switch does not generally encompass unintelligent or passive
network devices such as hubs and repeaters.

64

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Devices & Definitions


Bridge:
o A bridge reads the outermost section of data on the data packet, to tell where
the message is going. It reduces the traffic on other network segments, since
it does not send all packets. Bridges can be programmed to reject packets
from particular networks. Bridging occurs at the data link layer of the OSI
model, which means the bridge cannot read IP addresses, but only the
outermost hardware address of the packet. In our case the bridge can read
the Ethernet data which gives the hardware address of the destination
address, not the IP address. Bridges forward all broadcast messages. bridges
use one of:
Transparent Bridging - They build a table of addresses (bridging table) as
they receive packets. If the address is not in the bridging table, the packet
is forwarded to all segments other than the one it came from. This type
of bridge is used on Ethernet networks.
Source route bridging - The source computer provides path information
inside the packet.

65

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Devices & Definitions


Router:
o A router is used to route data packets between two networks. It reads the
information in each packet to tell where it is going. If it is destined for an
immediate network it has access to, it will strip the outer packet, readdress
the packet to the proper Ethernet address, and transmit it on that network.
If it is destined for another network and must be sent to another router, it
will re-package the outer packet to be received by the next router and send
it to the next router. The section on routing explains the theory behind this
and how routing tables are used to help determine packet destinations.
Routing occurs at the network layer of the OSI model. They can connect
networks with different architectures such as Token Ring and Ethernet.
Although they can transform information at the data link level, routers
cannot transform information from one data format such as TCP/IP to
another such as IPX/SPX. Routers do not send broadcast packets or
corrupted packets. If the routing table does not indicate the proper address
of a packet, the packet is discarded.

66

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Devices & Definitions


Firewall:
o A router is used to route data packets between two networks. It reads the
information in each packet to tell where it is going. If it is destined for an
immediate network it has access to, it will strip the outer packet, readdress
the packet to the proper Ethernet address, and transmit it on that network.
If it is destined for another network and must be sent to another router, it
will re-package the outer packet to be received by the next router and send
it to the next router. The section on routing explains the theory behind this
and how routing tables are used to help determine packet destinations.
Routing occurs at the network layer of the OSI model. They can connect
networks with different architectures such as Token Ring and Ethernet.
Although they can transform information at the data link level, routers
cannot transform information from one data format such as TCP/IP to
another such as IPX/SPX. Routers do not send broadcast packets or
corrupted packets. If the routing table does not indicate the proper address
of a packet, the packet is discarded.

67

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TCP/IP Network Addressing


Internet Protocol
Because TCP/IP networks are interconnected across the world, each computer
on the Internet must have a unique address (called an IP address) to make sure
that transmitted data reaches the correct destination. (e.g. 192.168.1.1)
Classes of IP
Class A addresses can have up to 16,777,214 hosts
on a single network. Class A addresses are in this
range: 1.x.x.x to 126.x.x.x.

Class B addresses can have up to 65,354 hosts on a


single network. Class B addresses are in this range:
128.1.x.x to 191.254.x.x.

Class C addresses can have up to 65,354 hosts on a


single network. Class B addresses are in this range:
192.0.1.x to 223.255.254.x.

68

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TCP/IP Network Addressing


Netmask
In each of the address classes previously described, the size of the two
parts (network address and host address) is implied by the class. This
partitioning scheme can also be expressed by a netmask associated with
the IP address. A netmask is a 32-bit quantity that, when logically
combined (using an AND operator) with an IP address, yields the
network address. For instance, the netmasks for Class A, B, and C
addresses are 255.0.0.0, 255.255.0.0, and 255.255.255.0, respectively.
By looking at the addressing structures, you can see that even with a
Class C address, there are a large number of hosts per network. Such a
structure is an inefficient use of addresses if each end of a routed link
requires a different network number. It is unlikely that the smaller office
LANs would have that many devices. You can resolve this problem by
using a technique known as subnet addressing.

69

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TCP/IP Network Addressing


Netmask Contd
The following table lists the additional subnet mask bits in dotted-decimal
notation. To use the table, write down the original class netmask and replace the
0-value octets with the dotted-decimal value of the additional subnet bits. For
example, to partition your Class C network with subnet mask 255.255.255.0 into
16 subnets (four bits), the new subnet mask becomes 255.255.255.240.

The following table displays several common netmask values in both the dotteddecimal and the mask-length formats.

70

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

VLAN & ARP


VLAN & Its Usage
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of
requirements that communicate as if they were attached to the same broadcast
domain, regardless of their physical location. A VLAN has the same attributes as a
physical LAN, but it allows for end stations to be grouped together even if they are
not located on the same network switch. Network reconfiguration can be done
through software instead of physically relocating devices.
VLANs are created to provide the segmentation services traditionally provided by
routers in LAN configurations. VLANs address issues such as scalability, security, and
network management. Routers in VLAN topologies provide broadcast filtering,
security, address summarization, and traffic flow management. By definition,
switches may not bridge IP traffic between VLANs as it would violate the integrity of
the VLAN broadcast domain.
This is also useful if someone wants to create multiple Layer 3 networks on the same
Layer 2 switch. For example, if a DHCP server (which will broadcast its presence) was
plugged into a switch it will serve any host on that switch that was configured to get
its IP from a DHCP server. By using VLANs you can easily split the network up so some
hosts won't use that DHCP server and will obtain link-local addresses, or obtain an
address from a different DHCP server
71

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

VLAN & ARP


ARP
ARP (Address Resolution Protocol) is used to resolve the ethernet address of a
NIC from an IP address in order to construct an ethernet packet around an IP
data packet. This must happen in order to send any data across the network.
An IP address alone cannot be used to deliver data from one LAN device to
another. To send data between LAN devices, you must convert the IP address of
the destination device to its MAC address. Each device on an Ethernet network
has a unique MAC address, which is a 48-bit number assigned to each device by
the manufacturer. The technique that associates the IP address with a MAC
address is known as address resolution. Internet Protocol uses the Address
Resolution Protocol (ARP) to resolve MAC addresses. If a device sends data to
another station on the network and the destination MAC address is not yet
recorded, ARP is used. An ARP request is broadcast onto the network. All
stations (computers, for example) on the network receive and read the request.
The destination IP address for the chosen station is included as part of the
message so that only the station with this IP address responds to the ARP
request. All other stations discard the request.

72

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basic Definitions for L2 & L3 Networks


Layer 2 Networks:
Basically a layer 2 switch operates utilizing Mac addresses in it's
caching table to quickly pass information from port to port. A
layer 3 switch utilizes IP addresses to do the same.
A layer 2 switch is essentially a multiport bridge. A layer 2 switch
will learn about MAC addresses connected to each port and
passes frames marked for those ports. It also knows that if a
frame is sent out a port but is looking for the MAC address of
the port it is connected to and drop that frame. Whereas a
single CPU Bridge runs in serial, today's hardware based
switches run in parallel, translating to extremely fast switching.
It includes terms like, VLAN, Spanning Tree etc.

73

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Basic Definitions for L2 & L3 Networks


Layer 3 Networks:

The network layer provides the functional and procedural means of


transferring variable length data sequences from a source to a
destination via one or more networks, while maintaining the quality of
service requested by the Transport layer. The Network layer performs
network routing functions, and might also perform fragmentation and
reassembly, and report delivery errors. Routers operate at this layer
sending data throughout the extended network and making the
Internet possible. This is a logical addressing scheme values are
chosen by the network engineer.
The best-known example of a layer 3 protocol is the Internet Protocol
(IP). It manages the connectionless transfer of data one hop at a time,
from end system to ingress router, to router to router, and from egress
router to destination end system.
74

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Cabling
Ethernet Straight Cabling:
The UTP cable contains eight conductors, arranged in four twisted pairs, and is
terminated with an RJ45 type connector. A normal straight-through & Cross
Over UTP Ethernet cable follows the EIA568B standard wiring as described
below.

Straight Through

Cross Over

Note that here on the other end of


cable we are using pin 3 & 6 in
replacement of 1 & 2 and vice versa
75

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

N Computing

76

2010 Wipro Ltd Internal & Restricted

The NComputing Approach

Host PC
(User 1)

User 2

User 3

User 4

User 5

User 6

User 7

Share the excess power of todays PCs


with multiple users through
Very low cost access devices

77

2010 Wipro Ltd Internal & Restricted

How it Works

NComputing Terminal
Services software sets
up Virtual Independent
Desktops inside one
Windows or Linux PC.

78

NComputing User
eXtension Protocol
(UXP) delivers an
efficient secure,
multimedia interface.

2010 Wipro Ltd Internal & Restricted

NComputing Virtual
PCs are small, silent,
energy-efficient,
reliable, and very
inexpensive.

Ncomputing X300

The X300 access terminal kit enables you to dramatically cut computing
costs by sharing the untapped power of PCs.
The kit includes three access terminals, one PCI card, and terminal
services software that work together to efficiently harness excess
computing capacity and enable multiple users to share a single PC. It is
easy to manage and is compatible with standard PC applications.
The terminal services software for the X300, divides the host PC's
resources into independent sessions that give each user their own
robust PC experience. One PC can support up to seven users.
Supports multiple resolutions
1024x768, 800x600, 16-bit color
Small, efficient and eco-friendly
With a small footprint and no moving parts, the X300 runs completely
silent and saves energy by using
only 5 watts. It's design meets strict environmental guidelines and is
RoHS compliant.
79

2010 Wipro Ltd Internal & Restricted

How We Get the Cost So Low & the Performance So High

Sophisticated Software
Desktop Virtualization

Simple Hardware
Virtual PC (access terminal)

Highly optimized memory performance


Windows and Linux versions
VMware and Parallels compatible

Not a PC!

80

2010 Wipro Ltd Internal & Restricted

No CPU
No storage
No software

Technology
Minimum System Requirements
For one X300 PCI card, a host PC with at least the following:
A 1.3 GHz processor
512 MB RAM
Keyboard, mouse, and monitor required for each access terminal
Speakers optional for each access terminal (amplified speakers recommended)
For two X300 PCI cards, a host PC with at least the following:
A 2.4 GHz processor
1 GB RAM
Keyboard, mouse, and monitor required for each access terminal
Speakers optional for each access terminal (amplified speakers recommended)
Operating Systems
Windows
Linux

81

2010 Wipro Ltd Internal & Restricted

How it works

82

The end-user still has their own monitor, keyboard, mouse and speakers
Instead of connecting directly to a PC, these peripherals connect to the
small NComputing access terminal on their desk.
The access terminals then connect either directly (X Series) or over
Ethernet (L Series) to the host computer Generally 2D games are
supported at the moment. Casual games (Java and Flash), which can be
played on the Internet, are also supported.
High performance 3D games, which require a high speed GPU (Graphic
Processor Unit) and a hardware accelerated function, are currently not
supported. Other games including single user games which require a CD
for operation are not supported.
A game, which is designed to be used only on the same computer by
checking the IP, is not supported. Windows itself checks out those
specifications and rejects more than one loading, and thus those games are
not supported.

2010 Wipro Ltd Internal & Restricted

Advantages
The system has been designed to be highly efficient so as
not to require x86-class CPUs and chipsets like traditional
thin client devices.
Very low power requirements (less than 5 Watts)
No Obsolescence
MTBF - 45 years
Low cost of acquisition and Maintenance
Zero foot printVESA mounting

83

2010 Wipro Ltd Internal & Restricted

Environmental Impact
Saves 95%

in electricity

No heat and moving parts


Needs Smaller inverters/UPS
90% less eWaste
Ultra-low product

failures
UL, RoHS, ISO 9001 certified

84

2010 Wipro Ltd Internal & Restricted

Product Overview
X Series

Lowest Cost
Ultimate multimedia performance
PC in same room (10m)
1 watt per user
Up to 7 users can share one Low End PC

PCI-based X300

L Series

Up to 30 users can share one Desktop PC


Ethernet = no distance limits
Highest # of users per PC
5-6 watts per user

Ethernet-based L230

85

2010 Wipro Ltd Internal & Restricted

X Series Installs in Just 4 Easy Steps


Step 1: Install PCI card into the Host PC

Step 4: Install
NComputing software
on Host PC directly or
via imaging software
(like Ghost)

86

Step 2: Connect access terminal


to the students monitor and
peripherals

Step 3: Connect access


terminal to the PCI card via
standard UTP cable
2010 Wipro Ltd Internal & Restricted

X Series Installs in Just 4 Easy Steps


Connect each access terminal to a port on the PCI card using the
included Ethernet cables. You can also use any standard Ethernet
cable. Do not exceed the length limit of 15 feet. Also, do not use
any Ethernet equipment, such as a hub or a switch, between the
access terminal and the PCI card.
Connect peripheral devices to each X300 access terminal.
Note: Please use amplified speakers.
Note: A LAN cable between the X300 PCI card and the access
terminal as long as 33 feet (10 meters) is allowed if the cable is
high quality. Category 6 (Cat6) cables are recommended. Lower
quality cables can be a maximum of 16 feet (5 meters) long.

87

2010 Wipro Ltd Internal & Restricted

Why NComputing X Series Along Wipro PCs


Bring innovative and proven solution to customers
Upto 7 Active Terminals.
Affordable computing solution that is unmatched in cost, energy use and
maintenance
DGS&D certified (almost)
Wipro already Supplied NComputing on several large educational
Institutions & other customer locations.

88

2010 Wipro Ltd Internal & Restricted

NComputing L Series
Ethernet
switch

Highlights
Ideal for business and schools
Up to 30 users connected to a high-end
PC/server
Ethernet-connected, so no distance
limitation
5-6 watts per user
Windows or Linux

L200

New! L230: Compact


size + Monitor Mount
89

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs

90

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


The L-series access devices do not have a CPU, hard drive or CD-ROM,
yet most users find it indistinguishable from a full PC environment since it
runs a normal User Account assigned by the hosts OS. The L-series
exclusive technology allows you to add up to 30 access devices to your
existing PC. Each access device offers a full and independent computing
experience.
Simultaneous desktop operation
Each access device connects to a workspace created by vSpace on the
host PC OS and can run its virtual desktop concurrently and
independently through Ethernet.
Minimal Maintenance Required
You only have to maintain and upgrade the host PC since the access
devices have no CPU, hard drive, or CD-ROM.

91

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


Supports multiple resolutions
640x480, 800x600, 1024x768 and 1280x1024, by 16-bit colors.
Additionally, the L130 supports 1440x900 by 16-bit colors and the L230
supports 1440x900 by 24-bit colors.

Microphone
The L230 includes a microphone port.
Minimum System Requirements
Host Computer
For multiuser applications the host computer operating system can be
Windows Server 2003 R2 SP2 (Standard or Enterprise Edition, 32-bit),
Windows Server 2008 SP2 (Standard or Enterprise, 32-bit), or supported
Linux distributions.
92

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


Microsoft Windows Licenses. You are licensed by NComputing to use the
vSpace software under the terms of the End-User License Agreement (EULA).
You must also acquire the appropriate number of Windows Server licenses
and Client Access Licenses for each device or user accessing Windows Server
software.You cannot use the vSpace software with Windows Client software
(i.e., Windows Vista, Windows 7) unless a single user and no other user
accesses the same Windows Client software at any one time, or you are
authorized to do so under an applicable license from Microsoft or as
expressly set forth in the Microsoft Windows Server to Windows XP
License Rights section of the NComputing EULA.1 In all cases, your rights
and obligations with respect to the use of vSpace software with Windows
Server software and Windows Client software are defined by both the
NComputing vSpace software EULA and the applicable Microsoft Software
License Agreement or EULA. For more information on licensing
with Microsoft operating systems see:
www.ncomputing.com/mslicensing
93

2010 Wipro Ltd Internal & Restricted

Why NComputing L Series Along Wipro PCs


The host PC must have at least:
A 2.4 GHz single core processor or any dual core processor
1 GB RAM (Configurations vary by the number of users; for more info, please
see Product Selection Guide at:
http://ncomputing.com/Portals/0/docs/guides/en/guide_productselection.pdf)
60 GB hard disk drive
Ethernet port
Do not use a notebook PC as the host. Notebooks use power-saving features
and technologies different than a typical desktop PC. This causes power
management and memory incompatibilities.
Product does not support 10Mbps or 1Gbps, 100Mbps only supported.
Note: Go to http://www.ncomputing.com/support.aspx to see the latest FAQs.

94

2010 Wipro Ltd Internal & Restricted

Windows 7

95

2010 Wipro Ltd Internal & Restricted

Windows 7

Windows 7 is the next version of Windows after Windows Vista.


There are 4 editions of Win 7.

Windows 7 Starter
Windows 7 Home Premium
Windows 7 Professional
Windows 7 Ultimate

96

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Flavors in Windows 7

97

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows 7
Windows 7 system requirements

98

If you want to run Windows 7 on your PC, here's what it takes:


1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
16 GB available hard disk space (32-bit) or 20 GB (64-bit)
DirectX 9 graphics device with WDDM 1.0 or higher driver

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows 7

How to install Windows Operating Systems


Please refer the below link:
http://windows.microsoft.com/en-IN/windows/help/install-reinstall-uninstall

99

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Up-gradation & Migration


Up-gradation & Migration
Please refer the below links:
XP to 7
http://windows.microsoft.com/en-IN/windows7/help/upgrading-fromwindows-xp-to-windows-7
Vista to 7
http://windows.microsoft.com/en-IN/windows7/help/upgrading-fromwindows-vista-to-windows-7

100

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7

This menu selection will display the System screen


which is displaying basic information about the
computer running Windows 7. You can also open this
screen by opening the Control Panel and then selecting
the System and Security and later System item. Another
way to open this is by typing slui.exe in the search
programs window.
You can see the Windows activation status at the bottom
of this screen. The right side picture shows the same.
101

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7


Since you have not activated the Windows 7 setup yet, in the Windows
activation section you can see the message "n days to activate. Activate Windows
now.
To activate Windows 7 by phone if you are not online or by automatic activation
if you are online on the internet, click on the "Activate Windows now" message.
As mentioned in this screen, you must activate Windows 7 within the left period
to continue using all Windows features.
If your installed Windows 7 computer can connect to internet, you can continue
activating Windows 7 by selecting the first item in the list. "Activate Windows
online now.
You will get the below screen, Type the product key which is on right side of the
Desktop or which is provided by customer.
Click next, The windows will automatically
get activated.

102

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7


To activate the windows over phone, you can select "Show me other
ways to activate" item in order to activate Windows 7 by phone. Its
better first to change the product ID. Click on Change product ID in the
2nd screen, Which is already shown. You will get the below screen,
Type the product key which is on right side of the Desktop or which is
provided by customer.
Click next, afterwards.

103

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7?


To activate over Phone Select the Show me other options. In the next screen, Click
on Use the Automated Phone System.

104

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7?


After this activation screen is displayed you can change the location for your location in
order to make a suitable phone call.
Each location automated phone numbers differs from other locations.

105

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7?


When you click Next button, the Windows 7 activation wizard will display the 3 steps
you should do in order to complete your Windows 7 setup activation.
In the first step, you are listed with available phone numbers. If available a toll-free
number, an other toll number again if available and an SMS yet available.
You will call given phone number to get a confirmation ID. When you call the toll or
toll-free number by phone, you will ask for which Microsoft product group activation you
are calling, for Windows Vista, for Windows 7, for Microsoft Office, etc.
After you select Windows 7, you are requested to enter the Installation Id by typing on
the phone.
This is the second step. Installation Id is given on Step 2 section and is about 54 digit long
number grouped in 6 digit long 9 items (Shown in the picture in the next slide).
After you enter your system installation id, you will given a corresponding 54 digit long
Confirmation ID by the activation phone system.
Please note this confirmation id on a peace of paper or on your computer use the Notepad
application. Since you might type it wrong for the first time. On the phone you can listen
the confirmation id again and again and I can suggest you to select the listen again option
until your Windows 7 activation is completed.

106

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How to activate Windows 7?

107

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows 7 Administration

The following link is useful for Windows 7 administrators about


administrative options.

http://windows.microsoft.com/en-IN/windows7/help/top-solutions

108

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Managing Users


To begin working with Windows 7, you need a user account.
Using this user account, you can log on to Windows 7 and run programs,
open files, and personalize your desktop.
In an office environment, your administrator can create a user account for
you. If you work at home, you are prompted to create a user account the
first time you start your new Windows 7 computer.
If more than one user uses the computer, you can use Fast User
Switching to switch between the desktops of two or more logged-on
users.

With Windows 7, you can lock your workstation so that no one can
access your computer if you are temporarily away from your desk.
Whether you are away from your computer for a few minutes, several
hours, or an entire day, Windows 7 provides you with an efficient method
for safeguarding your computer and the data stored on it.

109

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Managing Users

110

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Managing Users

111

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Searching Programs & Data


Search Capability
Description
Using the Start menu
search

You can use the search box above the Start button to quickly search for programs, settings, and files.

Searching Control
Panel

You can use the search box in the upper-right corner of Control Panel to quickly search for Control Panel settings you can
configure.

Searching Libraries

You can click the Windows Explorer icon on the taskbar and then use the search box in the upper-right corner of the Windows
Explorer window to quickly search for files stored in your libraries.
You can also open a specific library, such as Documents, in Windows Explorer and search for files stored in that library.

112

Searching document
properties and text with
hit highlighting in the
results

When you search libraries, both the properties and contents of documents are searched. The results of your search are
highlighted so you can see which documents match your search.

Searching with filters

When searching libraries, you can use a search filter to refine your search. The filter options displayed vary depending on the
type of library being searched.

Saving recent searches

Windows maintains a list of your recent searches so that you can quickly rerun them if needed.

Saving a search

You can save a search so that you can rerun it later. Saved searches are added to your list of Favorites in Windows Explorer.

Searching again in
other locations

If your search does not return the results you hoped for, you can search again in other locations, including the Internet.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Back up in Action Centre


You can select let the Windows to choose the back up or You can
chose the things which needs to be taken back up.

You can see the details after the back


up about the space used in the targeted
device. You can restore later in the next
option, Restore which shown down in
the picture.

113

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Bit Locker


In Windows 7, you can use Bit Locker to encrypt the operating system drive and
any internal data drives on your computer. If Bit Locker detects that your
computer has been tampered with, it will lock the operating system and
require a special Bit Locker recovery key to start it. To unlock data drives that
have been encrypted by using Bit Locker, you need to provide a password or
smart card. You can also configure encrypted data drives to automatically
unlock when you log on to your computer.
Windows 7 includes a new feature called Bit Locker To Go, which extends Bit
Locker capability to removable storage devices, such as USB flash drives.
Like data drives, removable storage devices that are encrypted by using Bit
Locker To Go can be unlocked by providing a password or smart card.
Removable storage devices can also be configured to automatically unlock
when you connect them to your computer.
To configure Bit Locker and Bit Locker To Go, follow these steps:
Click Start, and then click Control Panel.
In Control Panel, click System and Security, and then click Bit Locker Drive
Encryption.
In the Help protect your files and folders by encrypting your drives pane,
perform one of the tasks described in the following table.
114

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Bit Locker

Task

Description

Enable Bit Locker on the


Operating System Drive
By default, a Trusted Platform Module (TPM) version 1.2 or higher chip must be installed on your
computer in order for you to use Bit Locker to encrypt the system drive. The TPM chip is used to
store the Bit Locker encryption key.

If your computer does not have a TPM chip, your network administrator can configure a policy
that allows the Bit Locker encryption key to be stored on a USB removable storage device,
such as a flash drive.
Enable Bit Locker on a Data
Drive

Enable Bit Locker To Go on a


USB Removable storage.

Data drives are internal disk drives that do not have an operating system installed on them. You
do not need a TPM chip on your computer to encrypt a data drive by using Bit Locker.

USB removable storage devices include external hard drives, flash drives, and other memory
devices. You do not need a TPM chip on your computer to encrypt a USB removable
storage device by using Bit Locker To Go.

Manage the TPM chip


You can use the TPM Management console to initialize the TPM chip, turn the TPM chip on or off,
change the owner password, clear the TPM chip, and perform other actions. You must have
administrative credentials on your computer to perform these actions.

115

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Configuring UAC

116

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Networking & Remote Connectivity

Click on the Network Icon in the system tray. You will see
the networks available. Open Network Sharing Centre &
Check the options available to connect. Click on Set up a
New connection on Network to set the new
connection/Sharing options as shown below.
Click on the Choose Home group & Sharing Options for
Local/Public File & Folder sharing in the Local/Public
Network.

117

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Remote Connectivity

Feature

Scenario Example
What it Does?

VPN Reconnect

Keeps a VPN connection alive when the underlying


Internet connectivity changes or is interrupted.

Karen is working remotely using her laptop and


has a VPN connection established with the
corporate network. She has a document on the
corporate network open and is working on it
when her Internet connection fails. She walks
to a nearby coffee shop and establishes a new
Internet connection there and continues to
work on her open document without losing her
work.

By clicking on the network icon in the system


notification area of the taskbar, users can quickly and
easily connect to wireless networks and establish VPN
connections with remote networks.

Michael is at the airport waiting for his flight.


His laptop is connected to the Internet using a
wireless hotspot at the airport. He needs to
connect to the corporate network to retrieve
some files, so he clicks the network icon in the
system notification area, clicks the VPN
connection, clicks Connect, and moments later
he can retrieve his files.

View Available Networks


(VAN)

118

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features - Remote Connectivity


Feature

Scenario Example
What it Does?

Mobile Broadband

Also know as wireless wide area network (WWAN)


technology, this technology provides wireless
high-speed Internet access over 2G, 2.5G or 3G
cellular networks using a mobile broadband data
card, which can be either a PC card, USB card,
ExpressCard, or embedded laptop module.

Jacky is travelling and needs to connect to the


corporate network to do some work. The
hotel she is staying at does not provide
Internet access, and there is no nearby
public wireless hotspot. Using her Mobile
Broadband ExpressCard, she establishes
an Internet connection using her cellular
phone service provider's network and
then establishes a VPN connection to the
corporate network.

Enables remote users to seamlessly and securely


access the corporate network anytime they have
an Internet connection, without the need of first
establishing a VPN connection.

Tony is sitting at a coffee shop with his laptop


connected to the Internet using the
wireless hotspot there. His company's IT
department has implemented
DirectAccess. He needs to upload his sales
orders to the corporate network, so he
opens his sales order application as if his
laptop was on the corporate LAN and
uploads the orders, without the need of
first establishing a VPN connection to the
corporate network.

DirectAccess

119

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7
bcdedit is the command to edit boot loader in Win 7. The command perfmon is used to
monitor the system performance.

Advance Boot Options for Windows 7

120

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7
Advance Boot Options for Windows 7 Continued

121

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7

122

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7
System Restore

Open the Start Menu.

Click on All Programs, Accessories, System Tools, and


System Restore.

123

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7

124

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7

125

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows 7

126

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting - Windows 7
To make Windows 7 Faster
1. Keeping an eye about the hard drive space. Do not save big files in primary
partition.
2. Regularly cleaning out unused files you no longer use, Remove temp files.
3. Removing the applications which are not in use.
4. Limit only necessary files in the start up.
5. Checking errors on a regular schedule.
6. Defragmenting disk regularly.
7. Turn on Automatic Updates & Make sure they are getting installed.
8. You ought to also enable the write cache of hard disk. Write caching implies
that windows 7 doesn't flush changed data to the disk before system is idle,
which improves performance.
Click "Start" and point to "Search".
Input "device" into the research box and Press "Search".
Select "Device Manager" within the research results.
Open the Disk Drives branch.
Click the hard disk for its property sheet.
Activate "Enable Write Caching" on the Device check box.
For maximum performance, activate the "Turn Off windows WriteCache Buffer Flushing on the Device" too.
Click "OK" for faster windows 7.
127

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting - Windows 7
How to connect to internet:

http://windows.microsoft.com/en-us/windows7/setting-up-a-home-network

How to share the Internet Connections

http://windows.microsoft.com/en-us/windows-vista/Using-ICS-Internet-ConnectionSharing

To troubleshoot Windows 7 Network related issues


http://windows.microsoft.com/en-us/windows-vista/Troubleshoot-network-connectionproblems

128

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows Vista

129

2010 Wipro Ltd Internal & Restricted

System Requirements

Basic
Modern 800MHz processor
512MB RAM
DirectX 9 Graphics

Premium ready
1 GHz x86 or x64 processor
1GB RAM
DirectX 9, WDDM, 128 MB graphics RAM,
Pixel Shader 2.0, 32 bits per pixel
DVD-ROM
Audio
Internet Access

130

2010 Wipro Ltd Internal & Restricted

Product Line up - Versions


Vista Business
Vista Enterprise
more security and hardware encryption
UNIX subsystem for UNIX apps (SUA)

Vista Home Basic

Doesnt include Aero


Less searching
No DVD burning
No Tablet Support

Vista Home Premium


Vista Ultimate
Has everything in all the others
Top of the range

All available in 32- or 64-bit editions


131

2010 Wipro Ltd Internal & Restricted

Windows Vista

How to install Windows Operating Systems


Please refer the below link:
http://windows.microsoft.com/en-IN/windows/help/install-reinstall-uninstall

132

2010 Wipro Ltd Internal & Restricted

Software's
IE7 comes as standard
Note no support from Oracle yet
For OSS and Financials

Firefox 2.0 appears to be OK


No TSM backup client support yet
There is a beta client scheduled for November
OUCS will test it
Client is scheduled GA for end of January 2007.

Only some AV products currently available for Vista


http://go.microsoft.com/fwlink/?LinkId=69433

Microsoft is offering Windows Live OneCare


There are others including F-Secure and AVG

133

2010 Wipro Ltd Internal & Restricted

Features - Major Changes


Taskbar /Start Menu
No huge changes but look and feel a bit
different
Similar customisations
Adds window previews
Run has moved into accessories
Program Explorer is used to see/uninstall
the unwanted Applications

134

2010 Wipro Ltd Internal & Restricted

Features - Parental Controls


Control of
Websites
Use times
Game ratings
Specific Programs

135

2010 Wipro Ltd Internal & Restricted

Features - Windows Aero


3D effects
Transparent Windows
Easy Windows key + Tab app
switching
Eg: Windows + Tab for Flip 3D
feature
Requires a reasonable spec
machine
Spec measured by Windows
Experience Index
Minimum 128 MB dedicated
Video RAM required.

136

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: At random time, Windows Vista throws an error:
"Site Advisor Has Stopped Working! A problem caused the program to stop working correctly.
Windows will close the program and notify you if a solution is available."
A: The error that you are receiving is from your McAfee security suite. You can try to repair the
installation or you can just go ahead and uninstall this product and re-install.
Q: When trying to update Windows Defender, I receive the following error message:

"Error found: Code 0x80240029"


Is there a way to fix this problem?
A: Yes, the error you are receiving is caused by a corrupt SoftwareDistribution folder. To fix the
issue, follow the instructions outlined below:
Restart your computer. Once the computer starts to boot, press the F8 key on your keyboard repeatedly until you
are taken to the Advanced Boot Options screen.
Using your arrow keys on your keyboard, navigate to the "Safe Mode" option and press Enter.
Once Windows Vista enters Safe Mode; Click the Start button.
Type the following in to the Search textbox above the Start button, then press Enter when finished:
%windir%
This will take you to the Windows system folder. Open the folder and locate the SoftwareDistribution folder.
Right click the SoftwareDistribution folder and select "Rename" from the resulting menu.
Type SoftwareDistribution.old and then press Enter.
Restart your computer.
Once Windows Vista reboots, it will create a fresh SoftwareDistribution folder. Problem is solved.
137

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: In XP I could run two commands "fixboot" and "fixmbr" how can I restore Vista's boot loader?
A: You can do this by booting to the Vista DVD. Then select the "Repair" option. Follow the
on-screen prompts from there. This will replace the boot loader in Vista.
Q: Windows Host Process (rundll32) has stopped working
A: Please do the following
1. Go to Start.
2. In the Search box, type in: cmd.exe
3. Right click CMD and select Run as administrator from the resulting menu.
4. Type the following command in the command prompt and then press Enter on your
keyboard:
5. regsvr32 /u lmpgd10.ax
6. You should receive confirmation that the un-registration was successful.
Q: A vista-compatible flash drive from Microsoft. The user instructions tell me that there will be a
message when the flash drive is inserted that displays an option to use the drive with the
ReadyBoost feature. When I insert the flash drive, nothing is displayed.

138

1.
2.
3.
4.

A: The likely reason for this is because your system is probably already configured to use this
device with ReadyBoost. Therefore the popup message will not be displayed. To double check
the settings try this:
Go to Start
Right click Computer
Right click the USB drive letter in question
Click the ReadyBoost tab
2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: When we insert DVD/CD in to DVD drive, it is not recognized. It was working fine before,
how can this fixed?
A: This issue happens for both CD and DVD drives if you have Windows Media Player already
running or if you have disable the audio device.
To make Vista recognize your CD/DVD drive, make sure that you exit Windows Media Player.
Then, insert the disk. Or, to re-enable your audio device follow the instructions below:
Go to Start
Select Control Panel
Double click the Sound entry
Select the Playback tab
Right click a blank area below the entry titled: Select a playback device below to modify its
settings
Select "Show Disabled Devices"
Right click the disabled device entry
Select "Enable
This will solve the problem.

139

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Q: Error Message: "STOP: C0000221 unknown hard error" or "STOP: C0000221
STATUS_IMAGE_CHECKSUM_MISMATCH
A: You are receiving this error because a file has gone corrupt. A probable
cause for the error could be:
An improper hardware driver has been installed.
You have an Iomega Zip Drive installed on the same IDE cable as your hard
disk.
You will need to either obtain a good copy of the file in question and replace
the corrupt file or reinstall your operating system using your installation
media.

140

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


Adding Network Printer in Win Vista

141

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

142

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

143

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

144

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

145

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

146

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

147

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

148

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista

149

2010 Wipro Ltd Internal & Restricted

Troubleshooting Windows Vista


To make the Windows Vista faster, Please refer the below link:
http://windows.microsoft.com/en-us/windows-vista/optimize-windows-vista-for-betterperformance#section_4
How to connect to Internet:
http://windows.microsoft.com/en-us/windows-vista/setting-up-a-home-network
How to share the Internet:
http://support.microsoft.com/kb/306126
How to set a Wireless Network
http://www.microsoft.com/athome/organization/wirelesssetup.aspx
For Blank Desktop, Please do the following.

Ctrl+Shift+Esc hotkey opens Task Manager.


Task Manager Opens. Click on File > New Task (Run) there allows to type , Type
Explorer.exe & Press enter.
Now the desktop appears. Scan for Virus/Malware with the Antivirus & remove the same.
150

2010 Wipro Ltd Internal & Restricted

Windows XP

151

2010 Wipro Ltd Internal & Restricted

Windows XP - Basics
The following editions are available with XP

152

Windows XP Professional Edition


Windows XP Home Edition
Windows XP Media Center Edition
Windows XP Tablet PC Edition
Windows XP 64-Bit Edition

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows Security Dialog Box

The Windows Security Dialog Box Options:


1. Lock Computer Allows users to secure the computer without logging off. All programs remain running. Users should lock their
computers when they leave for a short time. The user who locks the computer can unlock it by pressing CTRL+ALT+DELETE
and entering the valid password. An administrator can also unlock a locked computer. This process logs off the current user.
You can also press WINDOWS KEY+L to immediately lock the computer.
2. Log Off Allows a user to log off as the current user and close all running programs, but leaves Windows XP Professional
running. You can also log off Windows by choosing Log Off from the Start menu.
3. Shut Down Allows a user to close all files, save all operating system data, and prepare the computer so that it can be safely
turned off. You can also log off Windows by choosing Turn Off Computer from the Start menu.
4. Change Password Allows a user to change his or her user account password. The user must know the current password to
create a new one. This is the only way users can change their own passwords. Administrators can also change the password.
5. Task Manager Provides a list of the programs that are running and a summary of overall central processing unit (CPU) and
memory usage, as well as a quick view of how each program, program component, or system process is using the CPU and
memory resources. Users can also use Task Manager to switch between programs and to stop a program that is not
responding. You can also access Task Manager by right-clicking any open space on the taskbar and clicking Task Manager.
6. Cancel Closes the Windows Security dialog box.

153

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows XP Professional Setup


The best way to avoid problems when installing Windows XP Professional is to fully prepare a computer for installation, choose
the right kind of installation for your needs, and make sure that the hardware in the computer is compatible with Windows XP
Professional prior to beginning the installation. Although installations of Windows XP Professional complete without any problems
most of the time, this lesson introduces you to some common reasons why an installation might fail and what you can to do solve
the problem.
Media errors occur. If you are installing from a CD-ROM, use a different CD-ROM. To request a replacement CD-ROM,
contact Microsoft or your vendor. Try using a different computer and CD-ROM drive. If you can read the CD-ROM on a different
computer, you can perform an over-the network installation. If one of your Setup disks is not working, try using a different set of
Setup disks.
CD-ROM drive is not supported. Replace the CD-ROM drive with a supported drive. If replacement is impossible, try another
installation method such as installing over the network. After you complete the installation, install the driver for the adapter card
driver for the CD-ROM drive if it is available.
Computer cannot copy files from the CD-ROM. Test the CD-ROM on another computer. If you can copy the files using a
different CD-ROM drive on a different computer, use the CDROM to copy the files to a network share or to the hard drive of the
computer on which you want to install Windows XP Professional. Sometimes, when you get an error stating that Setup cannot
copy a particular file, the problem can actually be a failed RAM module. If you test the CD and CD-ROM drive successfully,
testing your memory should be the next step.
Insufficient disk space. Do one of the following: A) Use the Setup program to create a partition by using existing
free space on the hard disk. B) Delete and create partitions as needed to create a partition that is large enough for installation.
C) Reformat an existing partition to create more space.
Setup failure during early text mode portion of Setup. Verify that Windows XP supports the mass storage devices on the
computer. If not, press F6 when prompted and supply the necessary drivers for these devices from floppy disk.

154

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Windows XP Professional Setup


Dependency service fails to start. In the Windows XP Professional Setup Wizard, return to the Network Settings page and
verify that you installed the correct protocol and network adapter. Verify that the network adapter has the proper configuration
settings, such as transceiver type, and that the local computer name is unique on the network.
During Setup, the computers BIOS-based virus scanner gives an error. When Setup attempts to write to the boot
sector to make the hard disk Windows XP-bootable, BIOS-based virus scanners might interpret the action as an attempt by a
virus to infect the system. Disable the virus protection in the BIOS and enable it again after Windows XP is fully installed.
Setup cannot connect to the domain controller. Verify the following: A) The domain name is correct. B) The server
running the DNS service and the domain controller are both running and online. If you cannot locate a domain controller,
install Windows XP Professional into a workgroup and then join the domain after installation. C) The network adapter card
and protocol settings are set correctly. If you are reinstalling Windows XP Professional and are using the same computer
name, delete the computer account and re-create it.
Windows XP Professional fails to install or start. Verify the following: A) Windows XP Professional is detecting all the
hardware. B) All the hardware is in the Windows Catalog. Try running Winnt32 /check upgrade only to verify that the
hardware is compatible with Windows XP Professional. Remove unsupported devices in an attempt to get past the error. If
you are unsure about which devices are unsupported, consider removing all devices during the installation (except those
necessary to run the system, such as the motherboard, display adapter, memory, and so on) and then reconnecting them
after Windows is installed.
Action Log: The action log records the actions that the Setup program performs in chronological order. It includes actions such as
copying files and creating Registry entries. It also contains entries that are written to the Setup error log. The action log is named
Setupact.log. If an installation fails, you can often pinpoint what was going on (for example, what file was being copied) when the
installation failed. Searching the Microsoft Knowledge Base using the description of the action as a keyword often yields solutions
to the problem at hand.
Error Log: The error log describes errors (and their severity) that occur during Setup. Because the contents of this log are also
included in the action log, you can think of the error log as a subset of the action log. The error log is named Setuperr.log. If errors
occur, the log viewer displays the error log at the end of Setup. If no errors occurred during installation, this file is empty.
155

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Stop Errors


Stop errors, also referred to as blue screen errors, occur when the system detects a condition from which it cannot recover. The
system stops responding and displays a screen of information on a blue background. The most likely time during installation
that you might experience stop errors is when the text mode stage of setup has finished, your computer restarts, and the Setup
Wizard stage begins. During this transition, Windows XP loads the newly installed operating system kernel for the first time
and initializes new hardware drivers. Stop errors are identified by a 10-digit hexadecimal number. The two most common stop
errors you will encounter during Windows XP installation are described as follows:

Stop: 0x0000000A Error This error usually indicates that Windows attempted to access a particular memory address at too high
an internal request level (IRQL). This error usually occurs when a hardware driver uses an incorrect memory address, but can
also indicate an incompatible device driver or a general hardware problem. To troubleshoot this error, confirm that your hardware
is listed in the Windows Catalog, make sure that your BIOS is compatible with Windows XP Professional, and perform general
hardware troubleshooting. You can learn more about troubleshooting this stop error by reading Microsoft Knowledge Base article
314063, Troubleshooting a Stop 0x0000000A Error in Windows XP.

Stop: 0x0000007B Error This error normally indicates that you have an inaccessible boot device, meaning that Windows cannot
access your hard disk. The common causes for this type of error are a boot sector virus, bad or incompatible hardware, or
missing hardware drivers. You can learn more about troubleshooting this stop error by reading Microsoft Knowledge Base article
324103, How to Troubleshoot Stop 0x0000007B Errors in Windows XP.

156

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Common Errors in XP


Issue: After you upgrade your computer to Windows XP, and you try to install a device (such as a printer), you may receive the
following error message: Cannot install hardware An error occurred during the installation of the device. The Data is invalid.
CAUSE
This issue may occur if the driver that is included with the device is incompatible with Windows XP.
RESOLUTION
To resolve this issue, follow these steps:
1. Restart the computer in Safe Mode.
2. Rename the Driver.cab file that is in the following folder:
C:\Windows\Driver cache\i386
For example, rename the Driver.cab file as Driver.old.
3. Insert the Windows XP CD-ROM into the CD-ROM or DVD-ROM drive.
4. When the Welcome screen appears, click Perform additional tasks.
5. Click Browse this CD, and then double-click the I386 folder.
6. Click the Driver.cab file, and then on the Edit menu, click Copy.
7. In Windows Explorer, open the following folder:
C:\Windows\Driver cache\I386
8. On the Edit menu, click Paste to paste the Driver.cab file in the C:\Windows\Driver cache\I386 folder.
9. Remove the device that you tried to install.
For example, if you received the error when you tried to install a printer, follow these steps to remove the printer:
a. Click Start, click Control Panel, and then click Printers and Other Hardware.
b. Click Printers and Faxes (or the icon representing the type of device that you want to remove).
c. Right-click the printer that you want to remove, click on Delete, and then click Yes to confirm deletion of that printer.
-or- Use Device Manager to remove the device. For example, if you received the error when you tried to install a modem, follow
these steps to remove the modem:
a. Click Start, right-click My Computer, click Manage, and then click Device Manager.
b. Expand Modems, select your modem, and then press DELETE. Click Yes to confirm.
10. Restart the computer. Your new device should be detected and automatically installed.
157

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Common Errors in XP


Issue: Whenever you restart your computer, the Found New Hardware Wizard may detect your previously installed printer, even
though it is not a newly installed printer.
CAUSE
This problem may occur if one of the following conditions is true:
The printer driver does not use Plug and Play for its installation.
The following registry key has become damaged: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\LPTENUM
To work around this problem, complete all the steps in the New Hardware Wizard, even the wizard cannot detect a new printer.
RESOLUTION
To use Registry Editor to remove the damaged registry key, follow these steps:
1. Log on to your computer by using an administrator account.
2. Click Start, and then click Run
3. In the Open box, type regedit, and then click OK
4. Locate and click the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\LPTENUM
5. Right-click the registry key, and then click Delete
6. Under Confirm Key Delete, click Yes
7. Close Registry Editor, and then restart your computer
When Windows XP restarts, it will detect the printer and install support for it. After the printer is installed, it will no longer be
detected each time you start Windows XP.
Issue: Explorer.exe Process Uses Many CPU Cycles When Windows Is Idle.
SYMPTOMS: Under certain circumstances, the Explorer.exe process uses an excessive number of CPU cycles when Windows
is idle, and as a result, Windows performance is degraded.
NOTE: To view the CPU cycles that the Explorer.exe process uses, right-click a blank area on the taskbar, click Task Manager
on the shortcut menu that appears, and then click the Processes tab.
RESOLUTION
To resolve this problem, obtain the latest service pack for Windows XP.
STATUS
Microsoft has confirmed that this problem was first corrected in Windows XP Service Pack 1.
158

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Common Errors in XP


Issue: The Computer Reboots in the "Installing Devices" Section during a Windows XP Upgrade
SYMPTOMS: When you are upgrading from Microsoft Windows 2000 Professional to Windows XP Professional, your computer
may reboot during the "Installing Devices" section of Setup.
CAUSE
This issue can occur if your computer contains the NLynx PCI Twinax adapter (this is an AS/400 emulator adapter). When
Windows loads the driver (Nltwinax.sys) for this adapter, the driver causes an error and the computer reboots.
RESOLUTION
To work around this issue:
1. Boot your computer by using an MS-DOS or Windows boot floppy disk.
2. Rename the Nltwinax.sys file in the %SystemRoot%\System32\Drivers folder.
3. Reboot the computer and continue installing Windows XP.
4. Click Cancel in any dialog box that prompts you for the location of the Nltwinax.sys driver.
Now restart you system again and start the setup again.

Issue: How to change the logon window and the shutdown preferences in Windows XP.
Use the classic logon screen
To temporarily use the classic logon screen, press CTRL+ALT+DEL two times on the Welcome logon screen.
To configure Windows XP to use the classic logon and shutdown screens for every logon session, follow these steps:
1. Click Start, and then click Control Panel.
2. Double-click User Accounts.
3. Click Change the way users log on or off.
4. Clear the Use the Welcome screen check box.
Note If you turn off the Welcome logon screen, you also turn off the Fast User Switching option.
Require users to press CTRL+ALT+DEL before the classic logon screen appears

159

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


To view the error codes, follow these steps:
1. Click Start, click Run, and in the Open box, type control panel.
2. In Control Panel, double-click System, click the Hardware tab, and then click Device Manager.
3. Double-click a device type. For example, double-click Modems to see the devices in that category.
4. Double-click a device to view its properties. If an error code has been generated, the code appears in the Device Status box that
is on the General tab.
Code 1: This device is not configured correctly.
Recommended resolution
This device has no drivers installed or is incorrectly configured. Update the driver(s) by clicking Update Driver. This starts the
Hardware Update wizard. If updating the driver does not work, see your hardware documentation for more information.
Code 3: The driver for this device might be corrupted, or your system may be running low on memory or other resources.
Recommended resolution
If the driver is corrupted, uninstall the driver and scan for new hardware to install the driver again. To scan for new hardware, click the
Action menu in Device Manager, and then select Scan for hardware changes. If the computer has insufficient memory to run the
device, you can close some applications to make memory available. To check memory and system resources, right click My
Computer, click Properties, click the Advanced tab, and then click Settings in Performance field. You may have to install
additional random access memory (RAM). On the General Properties tab of the device, click Troubleshoot to start the
Troubleshooting Wizard.
Code 10: If the device has a FailReasonString value in its hardware key, that string appears as the error message. The driver or
enumerator puts this registry string value there. If there is no FailReasonString in the hardware key, you receive the following error
message: This device cannot start. (Code 10)
Recommended resolution
Device failed to start. Click Update Driver to update the drivers for this device. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.

160

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 12: This device cannot find enough free resources that it can use. If you want to use this device, you will need to disable one
of the other devices on this system.
Recommended resolution
Two devices have been assigned the same I/O ports, the same interrupt, or the same Direct Memory Access channel (either by the
BIOS, the operating system, or a combination of the two). This error message can also appear if the BIOS did not allocate enough
resources to the device (for example, if a universal serial bus (USB) controller is not an interrupt from the BIOS because of a
corrupted Multiprocessor System (MPS) table). You can use Device Manager to determine where the conflict is and disable the
conflicting device. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 14: This device cannot work properly until you restart your computer. (Code 14)
Recommended resolution
Click Start on the desktop, click Shut Down, and then select Restart in the Shut Down Windows to restart the computer.
Code 16: Windows cannot identify all the resources this device uses. (Code 16)
Recommended resolution
The device is only partially configured. To specify additional resources for this device, click the Resources tab in Device Manager. If
there is a resource with a question mark next to it in the list of resources assigned to the device, select that resource to assign it to
the device. If the resource cannot be changed, click Change Settings. If Change Settings is unavailable, try clearing the Use
automatic settings check box to make it available. If this is not a Plug and Play device, examine the hardware documentation for
more information. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 18: Reinstall the drivers for this device. (Code 18) The drivers for this device must be reinstalled.
Recommended resolution
Click Update Driver to start the Hardware Update Wizard. Alternately, you can uninstall the driver, and then click Scan for
hardware changes to reload the drivers.

161

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 19: Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or
damaged. To fix this problem you can first try running a Troubleshooting Wizard. If that does not work, you should uninstall and
then reinstall the hardware device. (Code 19)
Recommended resolution
A registry problem was detected. This can occur when more than one service is defined for a device, if there is a failure opening the
service subkey, or if the driver name cannot be obtained from the service subkey. Try these options:
On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard. Click Uninstall, and then
click Scan for hardware changes to load a usable driver. Restart the computer in Safe Mode, and then select Last Known Good
Configuration. This rolls back to the most recent successful registry configuration.
Code 21: Windows is removing this device. (Code 21)
Recommended resolution
Wait several seconds, and then refresh the Device Manager view. If the device appears, restart the computer.
Code 22: This device is disabled. (Code 22)
Recommended resolution
The device is disabled because a user disabled it by using Device Manager. Click Enable Device to start the Enable Device wizard.
Code 24: This device is not present, is not working properly, or does not have all its drivers installed. (Code 24)
Recommended resolution
The device does not appear to be present. The problem could be bad hardware, or a new driver might be needed. Devices stay in
this state if they have been prepared for removal. After you remove the device, this error disappears. On the General Properties
tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 28: The drivers for this device are not installed. (Code 28)
Recommended resolution
To install the drivers for this device, click Update Driver. This starts the Hardware Update Wizard.
of the device, click Troubleshoot to start the Troubleshooting Wizard.
162

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 29: This device is disabled because the firmware of the device did not give it the required resources. (Code 29)
Recommended resolution
Enable the device in the BIOS of the device. For information about how to make this change, see the hardware documentation or
contact the hardware vendor. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting
Wizard.
Code 31: This device is not working properly because Windows cannot load the drivers required for this device. (Code 31)
Recommended resolution
Windows cannot load the driver. Try updating the driver for this device. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.

Code 32: A driver (service) for this device has been disabled. An alternate driver may be providing this functionality. (Code 32)
Recommended resolution
The start type for this driver is set to disabled in the registry. Uninstall the driver, and then click Scan for hardware changes to
reinstall or upgrade the driver. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting
Wizard. If the driver is required, and if reinstalling or upgrading does not work, change the start type in the registry using Registry
Editor. For more information, see the Registry Reference in the Microsoft Windows 2000 Server Resource Kit at:
Code 33: Windows cannot determine which resources are required for this device. (Code 33)
Recommended resolution
The translator that determines the types of resources required by the device has failed. Contact the hardware vendor, and configure
or replace hardware. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 34: Windows cannot determine the settings for this device. Consult the documentation that came with this device and use the
Resource tab to set the configuration. (Code 34)
Recommended resolution
The device requires manual configuration. Change the hardware settings by setting jumpers or running a vendor-supplied tool, and
then use the Resources tab in Device Manager to configure the device. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.
163

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 35: Your computer's system firmware does not include enough information to properly configure and use this device. To use
this device, contact your computer manufacturer to obtain a firmware or BIOS update. (Code 35)
Recommended resolution
The Multiprocessor System (MPS) table, which stores the resource assignments for the BIOS, is missing an entry for your device
and has to be updated. Obtain a new BIOS from the system vendor. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.
Code 36: This device is requesting a PCI interrupt but is configured for an ISA interrupt (or vice versa). Please use the computer's
system setup program to reconfigure the interrupt for this device. (Code 36)
Recommended resolution
Interrupt request (IRQ) translation failed. Try using the BIOS setup tool to change settings for IRQ reservations (if such options
exist). The BIOS might have options to reserve certain IRQs for peripheral component interconnect (PCI) or ISA devices. For more
information about how to change BIOS settings, see the hardware documentation. On the General Properties tab of the device,
click Troubleshoot to start the Troubleshooting Wizard.
Code 37: Windows cannot initialize the device driver for this hardware. (Code 37)
Recommended resolution
The driver returned failure from its DriverEntry routine. Uninstall the driver, and then click Scan for hardware changes to reinstall
or upgrade the driver. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 38: Windows cannot load the device driver for this hardware because a previous instance of the device driver is still in
memory. (Code 38)
Recommended resolution
The driver could not be loaded because a previous instance is still loaded. Restart the computer. On the General Properties tab of
the device, click Troubleshoot to start the Troubleshooting Wizard.

164

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 39: Windows cannot load the device driver for this hardware. The driver may be corrupted or missing.
Recommended resolution
Reasons for this error include a driver that is not present; a binary file that is corrupted; a file I/O problem, or a driver that references
an entry point in another binary file that could not be loaded. Uninstall the driver, and then click Scan for hardware changes to
reinstall or upgrade the driver. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting
Wizard.
Code 40: Windows cannot access this hardware because its service key information in the registry is missing or recorded
incorrectly. (Code 40)
Recommended resolution
Information in the registry's service subkey for the driver is invalid. Uninstall the driver, and then click Scan for hardware changes
to load the driver again. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 41:
Windows successfully loaded the device driver for this hardware but cannot find the hardware device. (Code 41)
Recommended resolution
A driver was loaded but Windows cannot find the device. This error occurs when Windows does not detect a non-Plug and Play
device. If the device was removed, uninstall the driver, install the device, and then click Scan for hardware changes to reinstall the
driver. If the hardware was not removed, obtain a new or updated driver for the device. If the device is a non-Plug and Play device, a
newer version of the driver might be needed. To install non-Plug and Play devices, use the Add Hardware wizard. Click
Performance and Maintenance on Control Panel, click System, and on the Hardware tab, click Add Hardware Wizard.
On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 42: Windows cannot load the device driver for this hardware because there is a duplicate device already running in the
system. (Code 42)
Recommended resolution
A duplicate device was detected. This error occurs when a bus driver incorrectly creates two identically named children (bus driver
error), or when a device with a serial number is discovered in a new location before it is removed from the old location. Restart the
computer. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
165

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 43: Windows has stopped this device because it has reported problems. (Code 43)
Recommended resolution
One of the drivers controlling the device notified the operating system that the device failed in some manner. For more information
about how to diagnose the problem, see the hardware documentation. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.
Code 44: An application or service has shut down this hardware device. (Code 44)
Recommended resolution
Restart the computer. On the General Properties tab of the device, click Troubleshoot to start the Troubleshooting Wizard.
Code 45: Currently, this hardware device is not connected to the computer. (Code 45)
Recommended resolution
To fix this problem, reconnect this hardware device to the computer. The device is not present or was previously attached to the
computer. If Device Manager is started with the environment variable DEVMGR_SHOW_NONPRESENT_DEVICES set to 1 (which
means show these devices), any previously attached (NONPRESENT) devices are displayed in the device list and assigned this
error code. No resolution is necessary.
Code 46: Windows cannot gain access to this hardware device because the operating system is in the process of shutting down.
Recommended resolution
The hardware device should work correctly next time that you start the computer. The device is not available because the system is
shutting down. This error code is only set when Driver Verifier is enabled and all applications have already been shut down.
Code 47: Windows cannot use this hardware device because it has been prepared for safe removal, but it has not been removed
from the computer. (Code 47)
Recommended resolution
To fix this problem, unplug this device from the computer and then plug it in again. The device has been prepared for ejection. This
error code occurs only if the user used the Safe Removal application to prepare the device for removal, or pressed a physical eject
button. Restarting the computer brings the device online if the user does not want to eject from the dock. Unplug the device, and
then plug it in again. Alternately, restart the computer to make the device available. On the General Properties tab of the device,
click Troubleshoot to start the Troubleshooting Wizard.
166

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Device Mgr. error codes in XP


Code 48: The software for this device has been blocked from starting because it is known to have problems with Windows. Contact
the hardware vendor for a new driver. (Code 48)
Recommended resolution
Obtain and install a new or updated driver from the hardware vendor. On the General Properties tab of the device, click
Troubleshoot to start the Troubleshooting Wizard.
Code 49: Windows cannot start new hardware devices because the system hive is too large (exceeds the Registry Size Limit).
Recommended resolution
To fix this problem, you should first try uninstalling any hardware devices that you are no longer using. If that does not solve the
problem, you will have to reinstall Windows.
The system hive has exceeded its maximum size and new devices cannot work until the size is reduced. The system hive is a
permanent part of the registry associated with a set of files that contains information related to the configuration of the computer on
which the operating system is installed. Configured items include applications, user preferences, devices, and so on. The problem
might be specific devices that are no longer attached to the computer but are still listed in the system hive.
The solution is as stated in the Device Manager error code text. To view devices that are no longer attached to the computer, set the
environment variable DEVMGR_SHOW_NONPRESENT_DEVICES to 1. Then run Device Manager to view, uninstall, and reinstall
these devices.

167

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Internet Explorer

168

2010 Wipro Ltd Internal & Restricted

Internet Explorer
How to install & repair the IE?
Please refer the link:
http://support.microsoft.com/kb/318378
Other Tips:
Internet Explorer 8 is the default web browser with Windows 7 while IE 7 is the default
with Windows Vista.
After opening IE, If you click on Help -> About, You will be able to find the exact version
of Internet Explorer.
In the corporate environment, Customer may be browsing the net through proxy. Some
of the sites may be blocked in the office by customer IT Team through proxy. The proxy
settings should be done from the Tools Menu - > Internet Options - > Connections ->
Proxy Settings. The proxy server name & The default port should be mentioned clearly.
In home broadband or through Data Card, This setting should be disabled.
Too much temporary files/cookies may lead to the slow browsing or IE not working
properly. Go to Tools -> Internet Options & Click on Clear Cookies, Clear Temp Files.
Read the following topics as well to understand the Security Zone troubleshooting.
http://support.microsoft.com/kb/182569
169

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Mail Clients

170

2010 Wipro Ltd Internal & Restricted

Configuring & Troubleshooting Outlook Express

171

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express


Note down the following information

After noting these details, Cancel all the screens. Please take the back up of mails. The easy way to
take the back up of the folder is as follows.
172

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express


Right Click on the Inbox, Click on Properties. You will get the below screen.

As shown above, Select the folder path, Right click & Copy the same.
Close the Outlook Express. Then, Go to run, Paste the same path. Delete Inbox.dbx at the end, As
shown in the next slide.

173

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express

174

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express

175

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express

After configuring the account successfully,


Make two Folders as shown in the right side.
(Please Note: Under Local Folders), Old
Inbox & Old Sent Items (Case & Name
should match as Renamed last time).
After doing this, Please close the outlook
Express.
176

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express


Now, Copy the Old Inbox.dbx & Old Sent Items.dbx from
the saved folder. Open the Outlook Express path.

177

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Configuring & Troubleshooting Outlook Express

One more problem observed, The sent mails will be copied to Outbox
& Will not be removed. Every time when new mails sent, The old
mail will be sent again.
Solution: Close the Outlook Express after copying the folder path. Go
to Run & Paste the path, as illustrated above picture. The folder will
be opened. Delete the Outbox.dbx file.
Close the Folder, Open the Outlook Express & Check now. The
problem will be resolved.

178

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


To Set Up Your E-mail Account in Microsoft Outlook
In Microsoft Outlook, from the E-mail Accounts menu, select Tools.

179

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


On the E-mail Accounts wizard window, select Add a new e-mail account, and then click
Next.

For your server type, select POP3 or


IMAP, and then click Next.

180

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


On the Internet E-mail Settings (POP3/IMAP) window, enter your
information as follows:

Your Name
Your first and last name.
E-mail Address
Your email address.
User Name
Your email address, again.
Password
Your email account password.
Incoming mail server (POP3)
POP, Pop.secureserver.net or IMAP, imap.secureserver.net.
Outgoing mail server (SMTP)
Smtpout.secureserver.net

Click More Settings.

NOTE: "smtpout.secureserver.net" is an SMTP relay server. In order to use this server to

send e-mails, you must first activate SMTP relay on your e-mail account. Log on to your
Manage Email Accounts page to set up SMTP relay. If you do not have SMTP relay set up
and your Internet Service Provider (ISP) allows it, you can use the outgoing mail server for
your Internet Service Provider. Contact your Internet Service Provider to get this setting.

181

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


On the Internet E-mail Settings window, go to the Outgoing Server
tab.
Select My outgoing server (SMTP) requires authentication.
If you did not change the SMTP relay section, select Use same settings
as my incoming mail server. If you changed the user name and
password in the SMTP relay section of your Manage Email Accounts page,
select Log on using and enter the user name and password. The following
example assumes you did not change your SMTP relay section in your
Manage Email Accounts page.

182

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook

Go to the Advanced tab, and then change the Outgoing server (SMTP) port to 80 or 3535, As
shown in the right side picture.
Click on OK. Click next & Click on Finish. This completes the configuration.
183

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


Storing mails and managing .pst files.
Microsoft Outlook automatically stores messages, contacts, appointments, tasks, notes,
and journal
entries in one of the following two locations:
In a personal storage folder, also known as a .pst file, on your hard disk drive.
In a mailbox that is located on the server. Your mailbox is located on a server if you use
Outlook
with Microsoft Exchange Server.
You can use a backup of your .pst file to restore or move your Outlook data if you
experience a
hardware failure, lose data unexpectedly, have to transfer data from one computer to
another
computer, or have to transfer data from one hard disk drive to another hard disk drive.
How to make a backup copy of a .pst file
If you do not use Outlook with Microsoft Exchange Server, Outlook stores all its data in
a .pst file. You
can use the backup copy to restore your Outlook data if the original .pst file is damaged
or lost. This
section explains how to create a copy of your whole .pst file, with all the default items in
the file.
184

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


If you have no Personal Folders Services in your profile and you can store
information such as messages, contacts, or appointments in Outlook, your
information is probably being stored in a mailbox on an Exchange Server. Try using
the instructions in the "How to back up .pst file data that is located on a Microsoft
Exchange Server" section.
8. Click Settings, and then note the path and file name that appears.
Note Because the .pst file contains all data that is stored in the MAPI folders that
Outlook uses, the file can be very large. To reduce the size of the .pst file, click
Compact Now in the Settings window.
9. Close all the Properties windows.
10. Use Windows Explorer or My Computer to copy the file that you noted in step 8.
You can copy the file to another location on the hard disk drive or to any kind of
removable storage media, such as a floppy disk, a CD-ROM, a portable hard disk
drive, a magnetic tape.
How to export .pst file data
If you want to back up only some of your Outlook data, you can create a new backup
.pst file of only the data that you want to save. This is also known as exporting .pst
file data. For example, you might want to use this section if you have important
information in only some folders and you have other, less important items in much
larger folders. You can export only the important folders or contacts and omit folders
like Sent Mail.
185

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


Follow these steps to export a specific folder:
1. Open Outlook.
2. On the File menu, click Import And Export. If the menu item is not available, hover your pointer
over the chevrons at the bottom of the menu, and then click Import and Export.
3. Click Export To File, and then click Next.
4. Click Personal Folder File (.pst) , and then click Next.
5. Click the folder that you want to export the .pst file to, and then click Next.
6. Click Browse, and then select the location where you want the new .pst file to be saved.
7. In the File Name box, , type the name that you want to use for the new .pst file, and then click
OK.
8. Click Finish.
Note Folder design properties include permissions, filters, description, forms, and views. If you
export items from one .pst file to another, no folder design properties are maintained.
How to import .pst file data into Outlook
You can use the backup copy of your .pst file to restore your Outlook data if the original .pst file is
damaged or lost. Everything that is saved in the .pst file is returned to Outlook.
Follow these steps to restore, or import, your data into Outlook:
1. If the .pst file that you want to import is stored on a removable device, such as a floppy disk, a
portable hard disk drive, a CD-ROM, a magnetic tape cassette, or any other storage medium,
insert or connect the storage device, and then copy the .pst file to the hard disk drive of the
computer.
186

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


When you copy the .pst file, make sure that the Read-Only attribute is not selected. If this
attribute is selected, you might receive the following error message:
The specified device, file, or path could not be accessed. It may have been deleted, it may be in
use, you may be experiencing network problems, or you may not have sufficient permission to
access it. Close any application using this file and try again.
If you receive this error message, clear the Read-Only attribute, and then copy the file again.
2. Open Outlook.
3. On the File menu, click Import And Export. If the command is not available, rest the pointer
over the chevrons at the bottom of the menu, and then click Import and Export.
4. Click Import from another program or file, and then click Next.
5. Click Personal Folder File (.pst), and then click Next.
6. Type the path and the name of the .pst file that you want to import, and then click Next.
7. Select the folder that you want to import. To import everything in the .pst file, select the top of
the hierarchy.
8. Click Finish.
How to transfer Outlook data from one computer to another computer
You cannot share or synchronize .pst files between one computer and another computer.
However, you can still transfer Outlook data from one computer to another computer.
Use the instructions in the "How to make a backup copy of a .pst file" section to copy the .pst
file to a CD or DVD-ROM or other portable media, or copy the file to another computer over a
LAN/WAN link.
187

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


Note Connecting to .pst files over LAN/WAN links is not supported and problems connecting to
.pst files over such links can occur.
You might also want to create a new, secondary .pst file that is intended for transferring data
only. Save the data that you want to transfer in this new .pst file and omit any data that you do
not want to transfer. If you need to make a secondary .pst file to store data for transfer between
two different computers, or for backup purposes, use the following steps:
1. On the File menu, point to New, and then click Outlook Data File.
2. Type a unique name for the new .pst file, for example, type Transfer.pst, and then click OK.
3. Type a display name for the Personal Folders file, and then click OK.
4. Close Outlook.
Follow these steps to copy an existing .pst file:
1. Use the instructions in the "How to make a backup copy of a .pst file" section to make a
backup copy of the .pst file that you want to transfer. Make sure that you copy the backup .pst
file to a CD-ROM or other kind of removable media.
2. Copy the backup .pst file from the removable media to the second computer.
3. Follow the steps in the "How to import .pst file data into Outlook" section to import the .pst
file data into Outlook on the second computer.

How to find a .pst file


If you do not know where an old or existing .pst file resides on your computer and you want to
add this .pst file to your Outlook profile, this section explains how to search for the .pst file and
then add it to your Outlook profile.
188

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


To search for the .pst file, follow these steps:
1. To search for the .pst files:
o If you are running Windows Vista: Click Start, and then Computer. Locate the search
window in the top right corner.
o If you are running Windows XP: Click Start , and then click Search .
o If you are running Microsoft Windows 95 or Microsoft Windows 98: Click Start , point to
Find , and then click Files or Folders .
o If you are running Microsoft Windows 2000 or Microsoft Windows Millennium Edition
(Me): Click Start, point to Search, and then click For Files or Folders .
2. Type *.pst, and then press ENTER or click Find Now. Locate the desired .pst file you want to
add to Outlook. Record the location of the .pst file.
3. Close the search window and start Outlook. Click on the File menu, and then select Data File
Management.
4. Click on the Add button, and then choose the correct type of .pst file to add: If your .pst file
was created in Outlook 2007, then choose Office Outlook Personal Folders File (.pst). If your
.pst file was created in an older version of Outlook, such as Outlook 97, 2000, or XP, then
choose Outlook 97-2002 Personal Folders File (.pst).
5. Navigate to the location of the desired .pst file that you found during your search above.
Select the .pst file and click OK.
6. Either type a custom name for the .pst file or accept the default name. Click OK. Click Close
to exit the current window.
189

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Working with Microsoft Outlook


Inbox Repair tool:
The Inbox Repair tool is automatically installed with all English-language Microsoft Outlook
installation options depending on your operating system. This can be used to scan and repair pst
file errors.
For Microsoft Windows NT and Microsoft Windows 2000:
C:\Program Files\Common Files\System\Mapi\1033\NT
For Microsoft Windows 95 and Microsoft Windows 98:
C:\Program Files\Common Files\System\Mapi\1033\95
The Inbox Repair Tool installs automatically during Microsoft Outlook 2002 and Microsoft Office
Outlook 2003 setup. Unlike the Microsoft Office 97 version of the tool, Microsoft Office 2000 does not place the
Inbox Repair tool on a menu. To use the Inbox Repair tool, locate one of the folders by using Microsoft
Windows Explorer, and then double-click the Scanpst.exe file.
The Scanpst.exe file is typically located in one of the following folders:
<disk drive>:\Program Files\Common Files\System\Mapi\1033\
<disk drive>:\Program Files\Common Files\System\MSMAPI\1033
The Scanpst.exe file for Outlook 2007 is is typically located in the following folder:
<disk drive>:\Program Files\Microsoft Office\Office12

To run the Inbox Repair Tool, follow these steps:


1. Click Start, and then point to Find or to Search, depending upon your operating system.
2. In the Search for files or folders named box, type scanpst.exe
3. Double click the Scanpst.exe file to open the Inbox Repair Tool.
4. Type the path and the file name of the personal folders (.pst) file or click Browse to locate the
file by using the Windows file system.
5. Click Start. It will run the set up & Complete the work
190

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

End User Applications

191

2010 Wipro Ltd Internal & Restricted

Open Office

192

2010 Wipro Ltd Internal & Restricted

Open Office

In case you want to remove the borders, in the same above window, Go to the Borders tab and select None.
193

2010 Wipro Ltd Internal & Restricted

Open Office

194

2010 Wipro Ltd Internal & Restricted

Open Office

195

2010 Wipro Ltd Internal & Restricted

Open Office
8. Find & Replace
Ctrl+F is used for "Find and Replace".
9. Header and Footer
To add a header to a page, choose Insert - Header, and then select the page
style for the current page from the submenu.
To add footer to a page, choose Insert - Footer, and then select the page
style for the current page from the submenu.
You can also choose Format - Page, click the Header or Footer tab, and
then select Header on or Footer on. Clear the Same content left/right
check box if you want to define different headers and footers for even
and odd pages.
To use different headers or footers in your document, you must add them to
different Page Styles (explained below in Section 11), and then apply the
styles to the pages where you want the headers or footer to appear.

196

2010 Wipro Ltd Internal & Restricted

MS Office

To know about MS Office installation & repair, Please refer the below link:
http://support.microsoft.com/kb/924611

197

2010 Wipro Ltd Internal & Restricted

Peripherals

198

2010 Wipro Ltd Internal & Restricted

Printers

Before starting the troubleshooting, Please check the physical connectivity of the Printer
& also ensure that the device is online, No error indication from the printer. Also ensure
that the papers are in place properly.
Printer Self Test
Most printers have a way of printing a test page. This page allows you to determine if the
printer is physically working or not. This test is usually accomplished by holding down a
series of keys. If you are not sure if your printer has this feature or how to perform it
refers to your manual or visit the printer manufacturers web site. If this is not giving the
printout does mean there is a problem with the device.
If its printing properly with the key combinations, It does mean that the device is
working fine, Need to check connectivity & Driver or even the LPT/USB Port.
In addition to testing the printer using the printer self-test Microsoft Windows users can
also perform software self-test to determine if their computer is able to see the printer and
it's able to print. Follow the below steps to perform this test.

199

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Printers
Printer Self Test:
Microsoft Windows XP, 2003, and Vista users
Click Start, Settings, and open Control Panel.
Double-click the Printers or Printers and Fax Icon.
Right-click on the Printer you wish to test and click Properties. If you do not see your printer listed
your printer is not installed
In the Printers Properties window click the Print Test Page button.
If the printer is able to print a test page, you're printer is installed and setup properly. However, if
you're unable to print in other programs it's possible that the program you're attempting to print from,
has issues.
You can also test by printing Print a test page from MS DOS, If you suspect a problem in Driver
settings.
Get to a MS-DOS prompt Type cmd in run or from programs search.
Get to the root directory - Type cd\
Reroute dir to printer - Type dir >prn or dir >lpt1
If the device is printing from MS DOS & Not printing from Windows, Its the problem with the
driver. Else you can check the connectivity or the problem with the device.
In case of USB Printer, You have to check the USB port is working properly or not. Check with other
USB Ports & Even try uninstalling all the USB Ports from Device Manager & Restart the desktop.
200

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Linux Basic Installation


RHEL 5 Installation

201

2010 Wipro Ltd Internal & Restricted

Installation Guide for RHEL 5

The below URL is having all deployment guide/Admin guide for


RHEL5 32bit and 64 Bit OS.
Manual will guide you steps by steps on Installing RHEL 5 on
Certified Hardware.

URL for downloading Manuals:


http://www.redhat.com/docs/manuals/enterprise/RHEL-5manual/index.html

202

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TSG Toolkit CD
Manual

203

2010 Wipro Ltd Internal & Restricted

TSG Boot CD Version 2.0


Overview
TSG Tool CD runs independently of any operating system. It will boot from any
machine, regardless of whether DOS/Windows/Linux/Unix OS is installed on the
machine.
This tool is mainly designed for Checking the hardware of Desktop and Laptop.
You can also run this tool on the server Platform for checking CPU/Memory. If
your HDD is able to detect through this CD then you can use this utility for
checking Drive Fitness in your server.

204

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features
Features
This CD contains various tools which help you to diagnosis your hardware.

Tools Included :
CPU Stress Test
a) CPU Burn-in

Ver. 1.0

b) Stress CPU

Build date 24Oct- 05

a) Memtest86+

Ver. 2.11

Memory Test

b) Windows Memory Diagnostic test


Peripheral Test : Monitor
a) CHZ monitor Test

Ver. 1.01

CPU information
a) Intel Processor Frequency ID ( P3 and below)

Ver. 7.2.20041115

b) Intel Processor Identification Utility ( P4 and above) Ver. 4.1


205

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Features: Contd.
System Information Tool
ASTRA ( Limited Feature)

Ver 5.31

HDD Diagnostic Tools


a)

Drive Fitness Test ( IBM/Hitachi/WD)

Ver 4.15

b)

Diagnostic Tool ( Fujistu)

Ver. 7.0

c)

Seatools for DOS ( Seagate/Maxtor) GUI based

Ver. 2.13b

Note: you have to reboot the Machine after testing of one tool. Dont continue from DOS
applications
206

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

How TSG Tool CD will work


Boot From CD ,You will get Screen mentioned Below : Press Enter

207

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Menu
Once you Press Enter ,You will get TSG Tool Ver 2.0 CD Menu
Screenshot is showing ver 1.1 but screen will remain same in ver 2.0
Sometimes in new Machines , you are not able to see screen
given below and machines will hangs then in this case , Please
enable the AHCI Mode in BIOS.

208

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Submenu
Press Enter On Motherboard tools ( For Tool Number 1 to 5 which is
mentioned in Features paragraph. Once you press Enter you will get Menu
of different Tests

209

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

CPU Test
Select CPU Tests for checking Load test/Heat issue with CPU and
Heatsink.You can select any CPU test and This test will continue run until
you reboot the Machine. We recommended to run it for atleast 30
minutes.

210

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Memory Test

Suppose you want to run Memtest86+ then


Select this option and press Enter, It will
start Checking RAM modules of the
system. We recommended to use this tool
for checking Memory modules of the
System. Please run the test upto 10 cycle.
We suggested you to run it for 2-3 times for
better clarity.
Note : for 512MB RAM it takes around 2030 minutes.
211

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

For Checking Monitor , Please Select Peripheral Menu.

Press Enter and select


CHZ Monitor test and Press Enter;

212

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Monitor Test : Contd.


Test will check Monitor by displaying different colours and for displaying
you have to press each time after display of one colour.
Please check for any Black Spot on Monitor if Monitor is faulty.

213

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

CPU Information
For Checking CPU information ,Select CPU information Menu

214

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

CPU Information Contd.


Once you select , Press Enter , It will run and give you the Specifications
of your CPU.
Dont select anything , it will take default options and continue .

215

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

For System Information , Please select System Information menu

This tool will give you full information but in a limited manner but thats
sufficient for you.

Now Select the test ASTRA and press Enter


This Test will take default Option, So Dont select any
option during expansion of Image of Test.
216

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Hard disk Diagnostic tool


Select hard disk tool for HDD diagnostic tool

Once you press Enter on the


Menu, you will get submenu of
diagnostic tool ,Select the Menu
and press enter.
217

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Hard disk Diagnostic tool-Contd.


When you Press Enter then you will get Three options and on basis of
your HDD model, Select the test and Press Enter,

Suppose your HDD is Seagate or


Maxtor then select Seatools and press
Enter

218

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Hard disk Diagnostic tool-Contd.


Dont Select Any other Test without Knowledge as it may destroy the Data of HDD.

Select Drives to Test


--------------------After SeaTools loads, the Drive List will show the different storage devices in your system.
The first drive detected will be described as Device 0. Select the drive you would like to test.
Make sure to choose the correct drive! A check mark in the Model ID column will
indicate which drive is selected.

This screen also displays information about the drives such as the Model Number and Serial
Number. Seagate model numbers begin with the letters "ST". Seagate serial numbers are
alpha numeric and eight characters long.

219

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Hard disk Diagnostic tool-Contd.

Select the Tests to Run


-----------------------A menu of the possible diagnostic tests is shown. Select the tests that you would like to perform.
Basic Tests Advanced Features Help SHORT Test Set Capacity Contents
LONG Test Erase Drive License Acoustic About When you launch the "SHORT Test" most drives
will run Drive Self Test. Drive Self Test (DST) is a thorough diagnostic routine that is built in
to the hard drive's firmware. Firmware is the machine language programming the controls
the disc drive. DST is completely data safe

220

The "SHORT Test" is adequate for most situations. Consider running the "LONG Test" which
reads each sector on the drive if you need to run a more comprehensive test.
The "LONG Test" test will take a long time to complete. Because the "LONG Test" reads every
sector on the drive, the amount of time required will depend on the speed and capacity of
the disc drive. The highest capacity drives often take 2 to 3 hours to complete. At any time,
feel free to Cancel the test without harming the drive. The "LONG Test" will collect
information about possible defects. If any defect are found, a list will be offered at the end or
after aborting the scan. You will have the opportunity to attempt to repair the problem
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Hard disk Diagnostic tool-Contd.


Running of the Diagnostics
-------------------------The SeaTools performs a data-safe test of the selected hard disc drive or device for possible malfunctions.
Long tests may be aborted at any time. Press the ESC (escape key) from the keyboard. During the "LONG
Test" only, bad sectors (LBAs) may be detected. They could be part of a data file or even part of the
operating system directory structure. Sometimes, problem sectors are empty or not in use. It is important
to know that when the sector is bad and unreadable then any data in it is already lost.

221

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Hard disk Diagnostic tool-Contd.


Test Information and Results
---------------------------Upon completion of running the diagnostics, the test results will be given. A log for each drive is saved to the
RAM drive.
The following conditions may apply:
- Passed
- Passed after Repair (Seagate and Maxtor only)
- Failed
- User Skipped Repairs
- Aborted
"Passed after Repair" is a special condition where bad sectors were detected as unreadable and the user gave
permission to SeaTools to attempt to reallocate blank replacement sectors which was successful. The drive
is now considered a good drive. A few defects are usually not a cause for concern. For example, there are
nearly four hundred million sectors on a 200GB drive. Nonetheless, you should run the LONG Test more
often to see if there is a trend of growing defects

222

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TSG Utility CD
Antivirus Tools :

AVAST Antivirus Removal Tool:- This tool will help you to remove the AVAST antivirus
from your system
Avert Stinger:- It is an Antivirus scanner from Mcafee. It can be used under scenarios
when you suspect infections in your system.

AVG Antivirus Removal Tool:- This tool can be used to remove AVG Antivirus from your
system.
Avira Antivirus Removal Tool:- This tool can be used to remove Avira antivirus from your
system.

Bit Defender Removal Tool:- This tool can be used to remove Bit defender antivirus from
your system.
Brontok Removal Tool:- Brontok is a computer worm and can be removed using this
tool.

223

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Antivirus Tools Contd:

Downadup Removal tool:- W32.Downadup or W32.Conficker was the most annoying worm of its
kind. This can be effectively removed using this tool.

Drive autoplay fix:- This tool is used to remove the virus, w32.fujacks.

Hijackthis:- This is a trendmicro tool that can be used to generate list of suspicious files in your
system.
Kaspersky Removal Tool:- This tool is used to Kaspersky Antivirus from your system.

224

Mcafee Antivirus Removal Tool:- This tool can be used to remove Mcafee Antivirus from your
system.

Microsoft Malicious Software removal tool:- This Tool from Microsoft is used to identify and delete
malicious software from your system.

Nonav:- This tool can be used to remove any symantec antivirus product from your system.

Nroton Antivirus removal tool:- This tol can be used to remove norton antivirus from your system.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Antivirus Tools-Contd:

225

Push Deploymet wizard:- This tool is used to remotely push SEP 11 Clients to a remote location.

Registry Cleaner:- This tool is used to clean up the registry from malicious content and broken
links.

Sylink Drop:- This tool is used to remotely Drop Sylink.XML files to Unmanaged SEP clients.

Symantec Antivirus removal tool:- This tool is used to remove symantec antivirus from your
system.

Symantec definition remover: -This tool is used to backdate corrupt definition for symantec
Antivirus.

Symantec Endpoint Protection Support Tool:- This tool is used to check the dependency if any
and to identify issues associated with symantec
endpoint protection tool.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Antivirus Tools-Contd.
Symantec Makedrop:- This tool is used to drop GRC.dat in the old version of symantec antivirus
product.
Symantec XDB down:- This tool is used to download XDB files which is the definition files for
symantec antivirus product.

Sysinternals autoruns:- This tool is used to checkup the system startup, processes, and internet
explorer BHO's in your system.

Trend Micro removal Tool: -This tool is used to uninstall trend micro Antivirus.
Unhide folder:- This tool is used to unhide the hidden folders for effective virus troubleshooting.
Virus Effect Remover:- This tool is used to remove the After effects of the virus infections.

226

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Battery Status Tool

It's a systray application which uses the smart battery support in Windows Vista, XP and 2000 to monitor
power usage, battery charge, CPU speed, CPU usage, and power events such as standby/hibernate/resume,
battery events, etc. Additionally, it's capable of monitoring CPU temperature (via Intel Core internal
sensors, or ACPI thermal sensors), hard drive temperature (if the drive supports it), and even control hard
drive APM/AAM/spindown settings, like the Hitachi PowerBooster does. The binary is about 270KB and
requires no installation, dll's, etc. It can be autorun from the registry with a checkbox.

The systray icon resembles PowerPanel rather strongly, but integrates battery capacity, AC power status,
and CPU speed in a single icon. It has a graphical display window that can be popped up on-demand, which
graphs up to 7 parameters over a several hour period, and shows instantaneous status in a window (which
is also available in a systray tooltip). It estimates runtime when discharging, and charge time when charging.

In addition to the systray and main window graph, it has a toolbar-style window that can float anywhere on
the screen which compactly integrates the systray icon, a charge meter and summary of runtime.

It has a programmable hotkey to turn off the screen, which can be used to save significant power when
running on battery if you need to turn away for a short time, it's also nice as a "privacy key" if you need to
blank your screen instantly. The program can run a program or batch file any time the system switches
power source, or resumes from standby or hibernation, something I find useful to perform certain checks
automatically to recover state that many programs blissfully ignore.
There's a detailed battery display for up to two batteries, with names, voltages, temperature, design
capacities, wear percentages, etc, as provided by the batteries themselves

227

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Disk Image Tool


DiskImg : version of this tool is 1.4.5
Creates and restores images of disks to files

ImgMaker : version of this tool is 1.1


Create backup images of your Hard drive
Using ImageMaker
To make an image of a disk and save it to a file:
- Log on as an Administrator, or another user with administrative privileges. ImageMaker will produce a
warning screen if it was started with no administrative privileges.

- Run ImageMaker.You will see a list of hard drives and partitions on the screen. Select a drive or partition
you want to back up, and click the MakeImage button in the toolbar. Alternatively, you may right-click and
select "Make Image" in the pop-up menu.
- The "Make Image" dialog will appear. Select a file where you want to save image to (WARNING: This file
should not be located on the same partition that is being imaged!)
- Click the "Start" button on the dialog.You will see a progress indicator showing the progress of the
imaging process. The time it needs to complete depends on the size of your hard disk, the location of the
saved image (see below), and the operating system you use.
228

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Disk Image Tool-Contd.

229

Rawcopy :Version of this tool is 1.0

Used to transfer data directly to another drive when the original is faulty.

Performs sector by sector disk transfer with data recovery.

Raw Copy copies a disk as a raw image from one drive directly to another.

Raw Copy was designed for users who have faulty drive and would like to transfer the data directly to
another drive without doing a file by file copy.

This saves the need for operating system re-installs and allows drives with an unknown file system to be
copied (including from console game machines, data recorders, mac etc).

The program has a built in data recovery function which will attempt to recover data from bad sectors to
ensure all the available data is restored from the drive. This program is designed to run under NT/XP/2000
or later operating systems. It will run under windows 95/98/Me operating systems but only windows
logical drives can be copied

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

HDD Health Checkup Tools


Fijustu HDD tools : Version 1.12 only double click need to run this program
This diagnostic tool is available for them who feel their Fujitsu hard drive may operating normally. It is only
designed for use with Fujitsu ATA/IDE hard drives. There are diagnostic modes:
a). Quick Test
About 3 minutes, does random seek/read tests.
b)
Comprehensive Test
About 30 to 100 minutes, also performs surface scan.
Hitachi HDD tools :Version 4.15

This diagnostic tool can be used for checking any HDD issues. For more details please refer the documents in
USERGUIDE folder in CD named dft32_user_guide_4.15.pdf
Seagate HDD tools :Version 1.2.0
Sea Tools for Windows is a comprehensive, easy-to-use diagnostic tool that helps you quickly determine the
condition of the disc drive in your external hard drive, desktop or notebook computer. It includes several
tests that will examine the physical media on your Seagate or Maxtor disc drive and any non-Seagate disc
drive. Sea Tools for Windows should run on both internal and external hard drives
For More details Please refer the documents in USERGUIDE Folder in CD named Seatools.pdf.

230

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

CPU Identification Utility: Version 1.6 :


Double click will run this program

231

Purpose of this Utility


The Intel(R) Processor Identification Utility is provided by Intel Corporation to enable customers to
identify the brand, features, package, intended frequencies and actual operating frequencies of their Intel
microprocessor. Customers can also use the utility to discern whether or not an Intel processor is being
operated above its Intel rated frequency.
The main features of the utility are available via the menu items at the top of the screen:
The Frequency Test section of the utility provides information regarding the operating status of the
selected processor.
The CPU Technologies section of the utility displays the Intel processor technologies and features
present in the selected processor.
The CPUID Data section of the utility identifies the Intel processor(s) in the system.
The Save feature enables the processor information to be saved into a text file.
The Web Update feature enables updating to the latest version of the Intel Processor Identification
Utility.
The Intel Processor Identification Utility is not intended to identify microprocessors manufactured by
companies other than Intel.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Network Tool IPSCAN :Version 1.6 : Double click will run this
program

Overview
Free IP scanner is a very fast IP scanner and port scanner. It is intended for both system administrators and
general users to monitor and manage their networks. Powered with multi-thread scan technology, it can
scan hundreds computers per second. It simply pings each IP address to check if it's alive, determines
hostname, MAC address, NetBIOS information, scans ports, etc. The information obtained can be exported
into a file as plain text file.
Start Guide
Step 1: Run the program

Follow Start > All Programs > Free IP Scanner > Free IP Scanner.
Or just double click the Free IP Scanner icon on your Desktop.
Step 2: Select ip scan range and start scanning
Use two fields of IP Range to enter first and last IP addresses. The last IP address can be less than the first one there is no problem with translating your input. To begin the scan, press the 'Start Scanning' button.When
the program is scanning, this button becomes the 'Stop Scanning' button. Below at the picture there is the
main program interface.

232

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

CPU Load Testing Tool Linux OS : version 10.0.4

233

Tool is available in Compressed and uncompressed Version.

Download the compressed version and go into linpack folder which is also extracted separately and
available for download. Change the permission 777 to all folders of linpack folders .Change the file input
values mentioned under lininput_xeon32/lininput_xeon64 depends upon your OS.

Once you change the input file , execute the file runme_xeon32 or runme_xeon64.Output can be seen in
lin_xeon32.txt or lin_xeon64.txt depends upon your execution file.

For More details , please refer the userguide which is given in CD.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools

234

Desktop Central - Free Windows Tools 2


Desktop Central provides a set of free Windows tools that Windows Administrators might require on a
day-to-day basis. It has a set of 12 tools, viz: Remote Task Manager Tool, Wake on LAN, Software Inventory
Tool, Remote Command Prompt Tool, GPO Update, Shutdown/Restart Tool, Join/Unjoin Computer Tool, ,
Currently Logged On User, Hard Disk Space Detector Tool, Local Users/Groups List Tool, Network Share
Browser Tool, and Laptop Battery Power Monitor Tool. This is very handy as it can be performed on
multiple computers simultaneously.These tools are made available from the Desktop Central family and is
provided as a separate download, which is absolutely free to use.
Remote Task Manager Tool
Utility to view the processes running in a remote computer along with its details like, Process ID, Memory
Usage, Session ID, Priority, etc. It also provides an option to select the parameters to view. Apart from just
viewing the processes, the administrators can also terminate a process.
. To use this tool, follow the steps below:
Click the Remote Task Manager tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to connect with the remote computer. Please note
that the user name and password specified here should have the necessary privileges to do this operation
in the remote computers.
Specify the Computer name from which currently running programs and processes should be retrieved.
Click Get Processes to retrieve the currently running programs and processes from the remote
computer.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Wake on LAN Tool
Utility to boot computers in the network (LAN) from remote. It allows the administrators to boot multiple
computers simultaneously.The Administrator has to just specify the IP Address, MAC Address and the
Subnet Mask of the computers to wake them up.
The free Wake on LAN tool can be used to boot machines in the LAN from remote. It allows you to boot
multiple machines simultaneously.To wake-up a machine from remote, follow the steps below:
Click the Wake on LAN tool from the Launcher to start the tool.
Click the Add Computers button and specify the following:
Specify the IP Addresses of the machines that you wish to wake-up. You can add multiple IP Addresses here as comma separated values.
Specify the MAC Addresses of the machines. If you are adding more than one machine, ensure that the order of the MAC Addresses specified is same as the IP
Addresses specified above.
Specify the Subnet Mask and click OK.

The specified machines will get added to the list.


Select the machines that you wish to wake-up and click Wake Up. To select all the machines from the list, click
Select All.

235

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Software Inventory Tool

Utility to retrieve the details of the software installed in the computers of a Windows Domain. The
Software details include Software Name,Version, Manufacturer and Usage statistics. The software details
can be exported as txt and csv formats.
To collect the Software installed in a given computer, follow the steps below:
Click the Software Inventory tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to retrieve the details of the software installed in that
computer. Please note that the user name and password specified here should have the necessary
privileges to do this operation in the given computer.
You can either specify the computer name manually or use the Browse button to select a computer to
from Domain. When you browse to select the computers, specify the following in the pop-up dialog.
Specify the name of the Domain Controller and click Get Computers. It will list all the computers that domain.
Select the Computer from which Software details have to be collected and click OK.

The selected computer will be displayed in the Computer field.


Click Get Details button to get the Software details.
The Total number of Software and Software names, versions, manufacturers and usage statistics will be shown in
the result.
The results can be exported in text or CSV format by clicking on the respective icons in result

236

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Remote Command Prompt Tool

Free tool to open a command prompt of a remote computer and execute a command. The remote
computer can be in the domain or a workgroup.The administrator has to specify a credential that has
necessary privileges to execute the commands.The computer can be either specified manually or selected
by speciying the Domain Controller.
To use this tool, follow the steps below:
Click the Remote Command Prompt Tool from the Launcher to invoke the tool.
Specify the Domain / Workgroup name, user name and password to access the remote computer. Please
note that the user name and password specified here should have the necessary privileges to access the
remote computer.
You can either specify the name of a remote computer name manually or if the domain setup is Active
Directory, use the Browse button to select a particular computer from the domain. When you browse to
select the remote computer, specify the following in the pop-up dialog.

237

Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select a computer from the list and click OK.

The selected computer will get displayed in the Computer Name field.
Click Execute to bring the remote computer's command prompt.
You can now execute the required command.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


GPO Update Tool

Utility to perform a GPO Update in the computers of a Windows Domain. GPOs are used to send
configuration instructions to user and computer objects in the Windows Active Directory. By default, the
GPO updates happen periodically, every 90 minutes.This utility helps the Administrators to perform a
GPO Update on-demand on multiple domain computers simultaneously.
To update the GPOs, follow the steps below:
Click the GPO Update tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to perform a GPO update. Please note that the user
name and password specified here should have the necessary privileges to do this operation in all the
computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computers to update the GPOs. When you browse to select the computers, specify the
following in the pop-up dialog.

238

Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to do a GPO update and click OK.

The selected computers will get added to the Computers field.


Click Do GPO Update to update the GPOs in the selected computers.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Shutdown / Restart Tool

Utility to shutdown or restart the computers of a Windows Domain. The Administrator can specify a
common credential to perform this operation on multiple computers and can select the computers by
specifying the Domain Controller.
To shutdown/restart computers remotely, follow the steps below:
Click the Shutdown/Restart tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password to shutdown or restart a computer. Please note that
the user name and password specified here should have the necessary privileges to do this operation in all
the computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computers to shutdown/restart.When you browse to select the computers, specify the
following in the pop-up dialog.

239

Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers that you wish to shutdown/restart and click OK

The selected computers will get added to the Computers field.


Click Shutdown or Restart to shutdown or restart the selected computers respectively.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Join/Unjoin Computer Tool

240

Utility to move a computer from one domain to another or from a domian to a workgroup or from a
workgroup to a domain. It also provides the ability to restart the computer after this operation. The status
of the operation is also displayed at the bottom of the window.
Moving a computer from one domain to another
To move a computer from one domain to another, follow the steps below:
Select the Domain to Domain option.
Specify the name of the domain from which the computer is being moved.
Specify the Domain Admin user name and password of the old domain.
Specify the name of the domain to which the computer is being moved.
Specify the Domain Admin user name and password of the new domain.
Specify the name of the computer that is being moved.
Specify the IP Address of the DNS Server of the new domain
Select the "Restart the Client computer after Moving" option, if the computer has to be restarted.
Click Move.
Check the status of the operation displayed at the bottom.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Currently Logged On User

Utility to retrieve the details of the users logged on to a remote computer. The Administrator can specify a
common credential to perform this operation on multiple computers and can select the computers by
specifying the Domain Controller.
To use this tool, follow the steps below:
Click the Currently Logged On User tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Leave the Domain name empty in the case of
workgroup computers. Please note that the user name and password specified here should have the
necessary privileges to do this operation in all the computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computer. When you browse to select the computers, specify the following in the pop-up dialog.

241

Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to get logged on user and click OK.

The selected computers will get added to the Computers field.


Click Get Users to get the currently logged on users on the selected computers.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Hard Disk Space Monitor Tool

Utility to retrieve the information about the Hard Disk like Partition/Drives,Volume Name, Total Size, Free
Space, and File System. The Administrator can specify a common credential to perform this operation on
multiple computers and can select the computers by specifying the Domain Controller.The results can be
exported to a CSV or Text format for a later reference.
. To use this tool, follow the steps below:
Click the Hard Disk Space Detector Tool tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Specify Workgroup name in the case of workgroup
computers. Please note that the user name and password specified here should have the necessary
privileges to do this operation in all the remote computers.
You can either specify the computer names manually as comma separated or use the Browse icon to
select the computer. When you browse to select the computers, specify the following in the pop-up dialog.

242

Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to get the hard disk details and click OK.

The selected computers will get added to the Computers field.


Click Get Details to get the hard disk details in selected computers.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.


Local Users/Groups Tool

Tool to get the information about local users and groups in the remote computers.The user details
include, Computer Name, User Name, Full Name, Caption, Status, etc. The group details include, Computer
Name, Group Name, Caption, Description, and Status. The Administrator can specify a common credential
to perform this operation on multiple computers and can select the computers by specifying the Domain
Controller. The results can be exported to a CSV or Text format for a later reference.
To use this tool, follow the steps below:
Click the Local Users/Groups Tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Specify Workgroup name in the case of workgroup
computers. Please note that the user name and password specified here should have the necessary
privileges to do this operation in all the computers.
You can either specify the computer names manually as comma separated or in case of Active Directory
setup use the Browse icon to select the computers.When you browse to select the computers, specify the
following in the pop-up dialog.

243

Specify the name of the Domain Controller and click Get Computers. It will list all the computers of that domain.
Select the Computers for which you wish to get local users/groups and click OK.

The selected computers will get added to the Computers field.


Click Get Details to get the local users and groups present in selected computers.
To fetch the domain users present in the computers, Domain Users check box should be selected

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.

244

Network Share Browser Tool


Tool to get the information about the files, folders and Active Sessions of the shares in a remote computer.
The results can be exported to a CSV or Text format for a later reference.
To use this tool, follow the steps below:
Click the Network Share Browser tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Please note that the user name and password
specified here should have the necessary privileges to do this operation in all the computers.
NOTE: In case of Workgroup Computers either give the Workgroup name or the Remote Computer
name in the Domain Name field.
Specify the remote computer's name in Computer Name field
Click Get Details button to get the files and folders that are shared in the remote computer.
Shared Folders tab displays the remote computer shares and their attributes. Double click each share to
view the Share Permissions, Active sessions and Accessed files details.
Active Session tab displays the sessions that are established to the computer to access the shares.
Accessed Files tab displays the path and permissions of the files that are currently accessed in shares.
Show Hidden Shares option can be enabled / disabled to view the hidden shares along with normal shares.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ManageEngine Free Tools Contd.

245

Laptop Battery Power Monitor Tool


Tool to monitor the battery power of the portable computers in the network periodically and alert by
playing a sound when the power falls below a specified percentage. The Administrator can specify a
common credential to perform this operation on multiple computers and can select the computers by
specifying the Domain Controller. The results can be exported to a CSV or Text format for a later
reference
To use this tool, follow the steps below:
Click the Laptop Battery Power Monitor Tool tool from the Launcher to invoke the tool.
Specify the Domain name, user name and password. Please note that the user name and password
specified here should have the necessary privileges to do this operation in all the computers.
NOTE: In case of Workgroup Computers specify the Workgroup name in the Domain Name field.
Click Add Computers button and give the remote computer names in comma separated format. Click
Add to add the computers that are to be monitored.
Once the computers are added, the battery performance and common battery information of the added
computers are monitored.
Battery performance interval, in minutes, can configured through the Refresh interval component.
To Alert low battery performance, Beep component should be configured.
To remove unwanted computers being monitored, select the computers and click Remove Computers.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Monitor Tool : Dead Pixel Test Ver. 2.50


Double click will run this test.
Usage

* Left mouse click : Quick color selector

* Middle mouse click : Moves to next color (Cycle is


White/Black/Red/Blue/Green)

* Right mouse click : Closes application

246

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PDF Reader Tool : Version 3.0


Double click will run the program
Start reading PDF files without installing Acrobat Reader.

247

User Guide is available in CD in USERGUIDE folder named


Foxitreader30_manual.pdf

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Scripts : Newping scripts and Scriptomatic2.0


is available

248

Ping Scipt Documents

Make a folder( from where you have to run script ) and in that folder create servers.txtfile . In this file you
have to mentioned all IP which you want to check . Once you mentioned that IP then execute the
newping script file.

Press Ok button

It will generate the OUTPUT file in EXCEL sheet with date and time.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Scriptomatic 2.0

249

Works with all the WMI namespaces on your computer.The old version only worked with the root\cimv2
namespace. That was fine for Windows 2000 computers, but just didnt cut it with Windows XP or
Windows Server 2003 computers

For more details please refer the Userguide given in Utility CD.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Putty and WinSCP :


Putty Ver. 0.53b : Double click can run this program
Putty is a free (MIT-licensed) Win32 Telnet and SSH client. This manual
documents Putty, and its companion utilities PSCP, PSFTP, Plink, Pageant
and Puttygen.

For More details Please refer the User Guide available in CD named as a Userguide\puttydoc\index.html

WinSCP :Ver. 4.0.2 : Double click can run this program.

250

WinSCP is an open source SFTP client and FTP client for Windows. Its main function is the secure file
transfer between a local and a remote computer. Beyond this, WinSCP offers basic file manager
functionality. It uses Secure Shell (SSH) and supports, in addition to Secure FTP, also legacy SCP protocol

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools :Version 2.44

Requirements
Some of the tools require that the default admin$ share be available and/or that the Remote Registry
service be active

The Windows NT and Windows 2000 Resource Kits come with a number of command line tools that help
you administer your Windows NT/2K systems. Over time, I've grown a collection of similar tools, including
some not included in the Resource Kits. What sets these tools apart is that they all allow you to manage
remote systems as well as the local one. The first tool in the suite was PsList, a tool that lets you view
detailed information about processes, and the suite is continually growing. The "Ps" prefix in PsList relates
to the fact that the standard UNIX process listing command-line tool is named "ps", so I've adopted this
prefix for all the tools in order to tie them together into a suite of tools named PsTools.
All of the utilities in the PsTools suite work on Windows NT, Windows 2000, Windows XP, and Server 2003
and none of the tools requires any special installation.You don't even need to install any client software on
the remote computers at which you target them. Run them by typing their name and any command-line
options you want. To show complete usage information, specify the "-?" command-line option.

251

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

The tools included in the PsTools suite are:


PsExec - execute processes remotely

Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs
on remote systems, but they can be a pain to set up and require that you install client software on the
remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute
processes on other systems, complete with full interactivity for console applications, without having to
manually install client software. PsExec's most powerful uses include launching interactive commandprompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability
to show information about remote systems.
Installation

Copy PsExec onto your executable path. Typing "psexec" displays its usage syntax.
Usage

usage: [\\computer[,computer[,...] | @file][-u user [-p psswd]][-n s][-l][-s|-e][-i [session]][-c [-f|-v]][-d][-w


directory][-<priority>][-a n,n,...>] cmd [arguments]

Please refer the Userguide for getting more details on options used in Psexec

252

PsExec

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

You can enclose applications that have spaces in their name with quotation marks e.g. "psexec \\marklap
"c:\long name\app.exe". Put arguments directed at the application outside of the parenthesis. Input is only
passed to the remote system when you press the enter key, and typing Ctrl-C terminates the remote
process.
If you omit a username the remote process runs in the same account from which you execute PsExec, but
because the remote process is impersonating it will not have access to network resources on the remote
system. When you specify a username the remote process executes in the account specified, and will have
access to any network resources the account has access to. Note that the password is transmitted in clear
text to the remote system.
The following command launches an interactive command prompt on \\marklap:
psexec \\marklap cmd

This command executes IpConfig on the remote system with the /all switch, and displays the resulting
output locally:
psexec \\marklap ipconfig /all
This command copies the program test.exe to the remote system and executes it interactively:
psexec \\marklap -c test.exe
Specify the full path to a program that is already installed on a remote system if its not on the system's
path:
psexec \\marklap c:\bin\test.exe

253

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:


PsFile - shows files opened remotely

254

PsFile

The "net file" command shows you a list of the files that other computers have opened on the system
upon which you execute the command, however it truncates long path names and doesn't let you see that
information for remote systems. PsFile is a command-line utility that shows a list of files on a system that
are opened remotely, and it also allows you to close opened files either by name or by a file identifier.
Installation
Copy PsFile onto your executable path and type "psfile".
Usage
The default behavior of PsFile is to list the files on the local system that are open by remote systems.
Typing a command followed by "-?" displays information on the syntax for the command.
usage: psfile [\\RemoteComputer [-u Username [-p Password]]] [[Id | path] [-c]]

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

PsGetSid - display the SID of a computer or a user

Have you performed a rollout and only to discover that your network might suffer from the SID
duplication problem? In order to know which systems have to be assigned a new SID (using a SID updater
like Sysinternals' own NewSID) you have to know what a computer's machine SID is. Up until now there's
been no way to tell the machine SID without knowing Regedit tricks and exactly where to look in the
Registry. PsGetSid makes reading a computer's SID easy, and works across the network so that you can
query SIDs remotely. PsGetSid also lets you see the SIDs of user accounts.

Installation

Copy PsPsGetSid onto your executable path and type "psgetsid".


Usage
Usage: psgetsid [\\computer[,computer[,...] | @file [-u username [-p password]]] [account]
If you want to see a computer's SID just pass the computer's name as a command-line argument. If you
want to see a user's SID, name the account (e.g. "administrator") on the command-line and an optional
computer name.
Specify a user name if the account you are running from doesn't have administrative privileges on the
computer you want to query. If you don't specify a password as an option PsGetSid will prompt you for one
so that you can type it in without having it echoed to the display.

255

PsGetSid

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:


PsInfo - list information about a system

PsInfo is a command-line tool that gathers key information about the local or remote system, including the
type of installation, kernel build, registered organization and owner, number of processors and their type,
memory size, the install date of the system, and if it's a trial version, the expiration date. PsInfo commandline switches also let you view installed hotfixes and software applications.
Installation

Copy PsInfo onto your executable path and type psinfo.


Usage

By default PsInfo shows information for the local system. Specify a remote computer name to obtain
information from the remote system. Since PsInfo relies on remote Registry access to obtain its data, the
remote system must be running the Remote Registry service and the account from which you run PsInfo
must have access to the HKLM\System portion of the remote Registry.
In order to aid in automated Service Pack updates, PsInfo returns as a value the Service Pack number of
system (e.g. 0 for no service pack, 1 for SP 1, etc).
usage: psinfo [\\computer[,computer[,...] | @file [-u username [-p password]]] [-h] [-s] [-d] [-c [-t
delimter]]

256

PsInfo

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

PsKill - kill processes by name or process ID

Windows NT/2000 does not come with a command-line 'kill' utility.You can get one in the Windows NT
or Win2K Resource Kit, but the kit's utility can only terminate processes on the local computer. PsKill is a
kill utility that not only does what the Resource Kit's version does, but can also kill processes on remote
systems.You don't even have to install a client on the target computer to use PsKill to terminate a remote
process.
Installation

Copy PsKill onto your executable path and type pskill with command-line options defined below.
Usage

Running PsKill with a process ID directs it to kill the process of that ID on the local computer. If you
specify a process name PsKill will kill all processes that have that name.
usage: pskill [-t] [\\computer [-u username] [-p password]] <process name | process id>

257

PsKill

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:


PsList - list detailed information about processes

Most UNIX operating systems ship with a command-line tool called "ps" (or something equivalent) that
administrators use to view detailed information about process CPU and memory usage. Windows NT/2K
comes with no such tool natively, but you can obtain similar tools with the Windows NT Workstation or
Server Resource Kits. The tools in the Resource Kits, pstat and pmon, show you different types of
information, and will only display data regarding the processes on the system on which you run the tools.
PsList is utility that shows you a combination of the information obtainable individually with pmon and
pstat.You can view process CPU and memory information, or thread statistics. What makes PsList more
powerful than the Resource Kit tools is that you can view process and thread statistics on a remote
computer.
Installation

Copy PsList onto your executable path and type "pslist".


Usage

The default behavior of PsList is to show CPU-oriented information for all the processes that are currently
running on the local system. The information listed for each process includes the time the process has
executed, the amount of time the process has executed in kernel and user modes, and the amount of
physical memory that the OS has assigned the process. Command-line switches allow you to view
memory-oriented process information, thread statistics, or all three types of data.
usage: pslist [-?] [-d] [-m] [-x][-t][-s [n] [-r n] [\\computer [-u username] [-p password]] [[-e] name | pid]

258

PsList

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:


PsLoggedOn - see who's logged on locally and via resource sharing

You can determine who is using resources on your local computer with the "net" command ("net
session"), however, there is no built-in way to determine who is using the resources of a remote computer.
In addition, NT comes with no tools to see who is logged onto a computer, either locally or remotely.
PsLoggedOn is an applet that displays both the locally logged on users and users logged on via resources for
either the local computer, or a remote one. If you specify a user name instead of a computer, PsLoggedOn
searches the computers in the network neighborhood and tells you if the user is currently logged on.
PsLoggedOn's definition of a locally logged on user is one that has their profile loaded into the Registry, so
PsLoggedOn determines who is logged on by scanning the keys under the HKEY_USERS key. For each key
that has a name that is a user SID (security Identifier), PsLoggedOn looks up the corresponding user name
and displays it. To determine who is logged onto a computer via resource shares, PsLoggedOn uses the
NetSessionEnum API. Note that PsLoggedOn will show you as logged on via resource share to remote
computers that you query because a logon is required for PsLoggedOn to access the Registry of a remote
system.
Installation

Copy PsLoggedOn onto your executable path and type "psloggedon".


Usage

usage: psloggedon [-?] [-l] [-x] [\\computername | username]

259

PsLoggedOn

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:


PsLogList - dump event log records

The Resource Kit comes with a utility, elogdump, that lets you dump the contents of an Event Log on the
local or a remote computer. PsLogList is a clone of elogdump except that PsLogList lets you login to remote
systems in situations your current set of security credentials would not permit access to the Event Log,
and PsLogList retrieves message strings from the computer on which the event log you view resides.
Installation

Copy PsLogList onto your executable path and type "psloglist".


Usage

The default behavior of PsLogList is to show the contents of the System Event Log on the local computer,
with visually-friendly formatting of Event Log records. Command line options let you view logs on different
computers, use a different account to view a log, or to have the output formatted in a string-search
friendly way.
usage: psloglist [-?] [\\computer[,computer[,...] | @file [-u username [-p password]]] [-s [-t delimiter]] [-m
#|-n #|-h #|-d #|-w][-c][-x][-r][-a mm/dd/yy][-b mm/dd/yy][-f filter] [-i ID[,ID[,...] | -e ID[,ID[,...]]] [-o
event source[,event source][,..]]] [-q event source[,event source][,..]]] [-l event log file] <eventlog>

260

PsLogList

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

PsPasswd - changes account passwords

Systems administrators that manage local administrative accounts on multiple computers regularly need to
change the account password as part of standard security practices. PsPasswd is a tool that lets you change
an account password on the local or remote systems, enabling administrators to create batch files that run
PsPasswd against the computer's they manage in order to perform a mass change of the administrator
password.
Installation

Copy PsPasswd onto your executable path and type pspasswd with command-line options defined below.
Usage

You can use PsPasswd to change the password of a local or domain account on the local or a remote
computer.

261

PsPasswd

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

PsService - view and control services

PsService is a service viewer and controller for Windows NT/2K. Like the SC utility that's included in the
Windows NT and Windows 2000 Resource Kits and Windows XP, PsService displays the status,
configuration, and dependencies of a service, and allows you to start, stop, pause, resume and restart them.
Unlike the SC utility, PsService enables you to logon to a remote system using a different account, for cases
when the account from which you run it doesn't have required permissions on the remote system.
PsService includes a unique service-search capability, which identifies active instances of a service on your
network.You would use the search feature if you wanted to locate systems running DHCP servers, for
instance.
Finally, PsService works on both NT 4 and Windows 2000, whereas the Windows 2000 Resource Kit
version of SC requires Windows 2000, and PsService doesn't require you to manually enter a "resume
index" in order to obtain a complete listing of service information.
Installation

Copy PsService onto your executable path and type "psservice".


Usage

The default behavior of PsService is to display the configured services (both running and stopped) on the
local system. Entering a command on the command-line invokes a particular feature, and some commands
accept options. Typing a command followed by "-?" displays information on the syntax for the command.
usage: psservice [\\computer [-u username] [-p password]] <command> <options>

262

PsService

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

PsShutdown - shuts down and optionally reboots a computer

263

PsShutdown

PsShutdown is a similar to the Resource Kit and Windows XP shutdown tools, providing you the same
options and ability to shutdown, and optionally reboot, local and remote Windows NT/2K/XP/2003
systems. It also provided additional options that make it more powerful and flexible.
Installation
Copy PsShutdown onto your executable path and type "psshutdown" with command-line options defined
below.
Usage
You can use PsShutdown to initiate a shutdown of the local or a remote computer, abort an imminent
shutdown, logoff a console user, or lock the desktop.
usage: psshutdown [\\computer[,computer[,...] | @file [-u username [-p password]]] -s|-r|-h|-d|-k|-a|-l|-o [f] [-c] [-n s] [-t nn|h:m] [-e [u|p]:xx:yy] [-m "message"]

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

PsTools : System Internal tools Contd:

PsSuspend - suspend and resume processes

PsSuspend

PsSuspend lets you suspend processes on the local or a remote system, which is desirable in cases where a
process is consuming a resource (e.g. network, CPU or disk) that you want to allow different processes to
use. Rather than kill the process that's consuming the resource, suspending permits you to let it continue
operation at some later point in time.
Installation
Copy PsSuspend onto your executable path and type "pssuspend" with command-line options defined
below.
Usage
Running PsSuspend with a process ID directs it to suspend the process of that ID on the local computer. If
you specify a process name PsSuspend will suspend all processes that have that name. Specify the -r switch
to resume suspended processes.

usage: pssuspend [-r] [\\computer [-u

username] [-p password]] <process name |

process id>

264

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Information tool :


ManagePC version 2.5.018

What is ManagePC?
ManagePC is an open source application for PC management and inventory in Windows environments.
Using ManagePC you can inventory all aspects of PCs on your domain including:
Hardware
Services
Software
Hot-Fixes
Processes
Local Users and Groups
Manage PC also lets you take control of PCs through familiar interfaces. Use remote desktop,VNC, reboot,
start/stop services, uninstall software and more directly from the ManagePC interface.
Requirements : .NET 2.0 Framework
Administrative Privilidges on the PC(s) being queried
No expensive database is required. Data is stored in XML

265

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Information tool : Contd.

CPUZ :Ver 1.50 Double click cpuz.exe can run this program.
CPU-Z is a freeware that gathers information on some of the main devices of your system

ASTRAWIN32 :Version 2.0.3 ( Limited edition) double click on Astra32.exe file to execute it.

ASTRA32 is an ideal solution for providing comprehensive information about your computer hardware
and software. Not only does ASTRA32 provide a detailed analysis of your system, it also offers diagnostics
and comes with some powerful features such as Drivers Troubleshooter and quick HDD Health Status
checker. It obtains data directly from hardware so it is very accurate.
SpeedFAN :Version 4.39
SpeedFan is a freeware program that monitors voltages, fan speeds and temperatures in computers with
hardware monitor chips. SpeedFan can even access S.M.A.R.T. info for those hard disks that support this
feature and show hard disk temperatures too, if supported. SpeedFan supports SCSI disks too. SpeedFan
can even change the FSB on some hardware (but this should be considered a bonus feature
SpeedFan works fine with Win9x, WinME, WinNT, Win2k and WinXP.
SpeedFan can be minimized to the tray and does its best to be compatible with other hardware
monitoring softwares.
Supported MB is given in URL : http://www.almico.com/forummotherboards.php
266

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Temp. File Clean tools


CleanTemp.exe : version 1.0 : Double click can run this program

Easy Cleaner : version 2.0.5


Ability to clear IE temporary files, history and cookies
Ability to clear the most recently used list
Lots of more options in unnecessary file finder (IE cookies, history and temp files, temp dirs, MS Office
CC Cleaner :Version 2.22
Program Summary:
CCleaner is a freeware PC optimization tool.
It combines a system cleaner that removes unused and temporary files from your system and also a fully
featured registry cleaner!

267

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

VNC-Viewer : Tight VNC Version 1.3.9.0


TightVNC is a free remote control software package. With TightVNC, you can see the desktop of a remote
machine and control it with your local mouse and keyboard, just like you would do it sitting in the front
of that computer.

TightVNC is:
Free, GPL-licensed, with full source code available;
Useful in remote administration, remote customer support, education, and for many other purposes;
cross-platform, available for Windows and Unix, compatible with other VNC software.
Double Click on the .exe file and start using VNC software

268

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows based Load testing Tool

269

Windows Linpack :Version 10.0.4

Intel Optimized LINPACK Benchmark for Windows*


Intel Optimized LINPACK Benchmark is a generalization of the LINPACK 1000 benchmark. It solves a
dense (real*8) system of linear equations (Ax=b), measures the amount of time it takes to factor and solve
the system, converts that time into a performance rate, and tests the results for accuracy. The
generalization is in the number of equations (N) it can solve, which is not limited to 1000. It uses partial
pivoting to assure the accuracy of the results.

This benchmark should not be used to report LINPACK 100 performance, as that is a compiled-code only
benchmark. This is a shared memory (SMP) implementation which runs on a single platform and should not
be confused with MP LINPACK, which is a distributed memory version of the same benchmark. This
benchmark should not be confused with LINPACK, the library, which has been expanded upon by the
LAPACK library.

Intel is providing optimized versions of the LINPACK benchmarks to make it easier than using HPL for you
to obtain high LINPACK benchmark results on your systems based on genuine Intel processors. Use this
package to benchmark your SMP machine.

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows based Load testing Tool :Contd.

HPCREATE Data :Version 1.2.3


Utility program used to generate different file sizes with different data contents (up to 3:1 compression
ratio) as a means of "controlling" the data to be backed up by an ISV or other backup application, or to
generate load on a disk sub-system. Only double clicking will run this tool.

HPReadDATA :Version 1.2.4


Allowing the simulation of multiple stream access to data. This tool is checking for any IO related problem
in HDD. Only double-clicking will run this tool.

270

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

UNISTALL - 5 IN 1

271

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 BUNDLED PACKAGES

BIT DEFENDER
CRASH PROOF
PC REPORTER
PORT LOCKER
DATA WIPER

272

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 BIT DEFENDER


System Requirements
You may install Bit Defender Antivirus 2009 only on computers running the
following operating systems:
Windows XP with Service Pack 2 (32/64 bit) or higher
Windows Vista (32/64 bit) or Windows Vista with Service Pack 1
Windows Home Server
Before installation, make sure that your computer meets the minimum hardware
and software requirements.
Note
To find out the Windows operating system your computer is running and
hardware information, right-click My Computer on the desktop and then select
Properties from the menu.
1.1. Hardware Requirements
For Windows XP
800 MHz or higher processor
256 MB of RAM Memory (1GB recommended)
170 MB available hard disk space (200 MB recommended)
For Windows Vista
800 MHz or higher processor
512 MB of RAM Memory (1 GB recommended)
273 170 MB available hard disk space
recommen
2010(200
Wipro Ltd MB
Internal &
Restricted

UNISTALL- CRASHPROOF
Crash Proof is data loss prevention software, which once installed in the system,
prevents data loss against logical crashes. At the time of installation, Crash Proof
calculates the system parameters and stores them in the same hard disk in a
protected area.In the event of a disk crash or data loss, Crash Proof revives the
data /disk. Crash Proof recovers data even if the computer does not start-up (due
to partition corruption, boot corruption etc), if the folders show junk or if files are
deleted accidentally or by certain virus etc.
Causes of Data Loss:
The main causes of data loss are viruses, accidental format or deletion, wrong file
transfer, faulty software, incorrect operation of certain disk management utilities,
voltage glitches, incorrect shutdown or switch off etc. Every disk crash is unique in
itself because, the disk capacities are different, so are their partitioning methods,
volumes creation, virus attacks, file management or application utilities etc. Data is
stored on the disk but is linked to the operating system using the system area that
contains Directory Structures, File Allocation Tables, Data Runs, Boot Record and
Partition Table.when these areas get corrupted - data is assumed lost, whereas
data is physically present in the disk! And the Operating System is unable to
locate it and present it since the file links are lost.Any slight difference in values or
bytes in system area will render data inaccessible! also note that data is present
physically. Data will be available for recovery until it is overwritten.
274

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 PC REPORTER
PC Reporter - is a utility that acts as an Asset Tagging, Tracking & Early
Warning System for pending hard disk problems. The system is based on SelfMonitoring Analysis and Reporting Technology (S.M.A.R.T). The hard disk's
integrated controller works with various aspects or parameters to monitor
various aspects of the drive's / disk's performance and determines from this
information if the disk is behaving normally or not
PC Reporter Software Offers Asset Tracking Option to track software activities
that are installed in the hard disks. Runs constantly in the background. Hence,
provides real information. Provides standard hard disk information such as
Serial/Model Number, Number of cylinders, and so on.
Provides information on various hard disks attributes and also displays their
fitness level. Able to scan and display bad sectors on hard disk(s).
Scheduler to configure software parameters such as Temperature Warning,
Temperature Update, and Log Scheduling. Maintains log reports of disk scans,
disk status and so on. Can clone hard disks (that is, it can paste the contents of
a potentially fatal diskonto a healthy disk). Provides graphical comparison of
temperature fluctuations in relation to warning /shutdown levels.
Displays real time 'Benchmark' graph showing the Hard Disk data transfer rate
and CPU usage. Can test any IDE/SATA disk. Simple and easy to use, with no
loss in system performance.
275

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 PORT LOCKER


Port Locker prevents vital & important data to be transferred from one PC to
another using Flash drive, DVD/CD writers, PCMCIA ports and Ethernet
ports (Network ports).
Features:
Lock USB, Network, WiFi, Infrared etc ports.
Options to open single or multiple ports with authorized password.
Block ports to prevent unauthorized access.
Block ports when PC is idle.
Block ports in scheduled duration.
Port Locker - System Requirements
Microsoft Windows operating system (i.e. Windows NT/2000/XP/2003
Server/Vista)
Hardware Requirements
Minimum 64 MB of RAM
At least 25 MB of Disk Space

276

2010 Wipro Ltd Internal & Restricted

UNISTALL 5 IN 1 DATA WIPE


To Erase Magnetic Media, we need to overwrite it many times with
alternating patterns in order to expose it to a magnetic field oscillating fast
enough that it does the desired flipping of the magnetic domains in a
reasonable amount of time. Data Wipe is designed with tested algorithms
that erase data from the media to make it impossible to retrieve. The file
or portion of media selected by user will be accessed by Data Wipe
physically and then each and every byte of this portion is overwritten
multiple times by special and random characters. The process makes it
impossible to recover this overwritten data using special tools or even
equipments.

277

2010 Wipro Ltd Internal & Restricted

HARDWARE TROUBLE SHOOTING

278

2010 Wipro Ltd Internal & Restricted

TROUBLE SHOOTING-POST
Symptom:
Computer beeps irregularly when the computer is turned on.
Computer turns on but does not boot.
Turn on the computer but doesn't do anything.
Cause:
New hardware conflicting with old hardware.
Bad or failing hardware device.
Connections not connected.
Recent electrical storm that caused a surge that damaged computer.
Other hardware issue
Diagnose / Probe:
Make sure your computer is turning on, if you press the power button and
nothing happens (no lights, no sound, no fans, etc.) then this issue is not a
NO POST but is an power related issue.
279

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TROUBLE SHOOTING-POST
Resolution:
1. Remove /Refix, CD's, DVD's, HDDs, RAM,SMPS that are in the computer and
if any USB devices (iPods, drives, phones, etc) are connected disconnect all of
them as well. Reboot the computer and see if anything changes.
2. If any new hardware has been recently added to the computer, remove that
hardware to make sure it is not the cause of your issue. If after removing the
new hardware your computer works it's likely the computer is either not
compatible with the new hardware or a system setting needs to be changed
to work with the new hardware device.
3. Remove All the connections from the back of the computer except the power
cable. Turn on the computer and see if it beeps normally. If the computer has
never beeped keep the monitor or display connected to see if any change
occurs.
4. Check for beep codes to identifying what computer component is failing or
bad.
280

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TROUBLE SHOOTING-POST
4. Make sure all fans are running in the computer. If a fan has failed (especially
the heat sink fan for the CPU) your computer could be overheating
and/or detecting the fan failure causing the computer not to boot.Verify
that all the cables are properly connected at that there are no loose
cables by firmly pressing in each cable. All disk drives should have a data
cable and power cable connected to them.
5. Your power supply should have at least one cable going to the
motherboard. Many motherboards may also have additional cables
connected to them to supply power to the fans
6. If the above recommendations still have not resolved the irregular POST
attempt to disconnect the Riser board (if applicable) and/or each of the
expansion cards. If this resolves the issue or allows the computer to POST
connect one card at a time until you determine what card is causing the
issue.

281

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

TROUBLE SHOOTING-POST
7.

If you were unable to determine by the beep code what is failing or do not
have a beep code disconnect the IDE, SATA, SCSI, or other data cables from
the CD-ROM, hard drive, and floppy drive from the Motherboard.

8.

If this resolves your irregular post or you now get an error message attempt
to re-connect each device one at a time to determine which device and or
cable is causing the issue.

9.

Re-insert the memory into the same slot. If you have more than one stick of
memory remove all but one stick of memory, try rotating through each stick.
Try one stick of memory in each slot.

10. If after doing all of the above recommendations you continue to have the
same issue unfortunately it is likely that you have bad Motherboard, PSU, CPU
and/or RAM. The next step would be either to replace these components
and/or have the computer serviced.
282

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

SYSTEM FREEZES OR STOPS RESPONDING FREQUENTLY


Symptom:

Windows freezes while working / Stops responding frequently


Cause:

Driver related issue/Operating system related issue/Software related issue.

Heat related issue/Hardware issue/Windows related Issues/Hardware failure.


Probing:
Check by pressing Num Lock //CAPS Lock button on the keyboard and watch
Num Lock/CAPS Lock LED is turns off and /or on.
Resolution:
1. If you're able to get the light to turn off and on, press CTRL + ALT + DEL and
attempt to end task the unwanted program. If Light is not going on/off, then
restart the machine with Selective Startup and also try in safe mode.
2. If you're encountering lockups when the computer is opening a particular
program, make sure you have all the latest updates for that program and ensure
the program is not corrupted, If corrupted Re-install the Program.You can find
the latest updates for your software through the software developer or
publisher.
283

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

SYSTEM FREEZES OR STOPS RESPONDING FREQUENTLY


3. If there is an issue that exists with your video drivers a computer could lock up while
. playing a game or displaying any other type of video. Make sure you have the latest drivers
for all major devices in your computer (video, sound, modem, and network.)
4. Make sure your operating system has all of the latest updates installed on it.
5. If the computer processor is getting too hot it can cause the computer to freeze. Need to
check the heat sink compound availability and Processor FAN is functioning properly. If
you heard any abnormal noises coming from your computer recently such as a high
squealing, this could indicate a fan may be failing in your computer.
6. If you have recently added any new hardware into the computer, try temporarily removing
it to make sure it is not the cause of your issue. Before attempting to remove any
hardware, make sure you are not encountering this issue because of hardware conflicts by
viewing Device Manager for errors. Its possible that Windows may be seriously corrupt.
We suggest you backup all information and reinstall Windows on your computer.
7. If after reinstalling your Operating system or during the installation of your operating
system, your computer turns off abnormally, it is very likely that other hardware is failing in
the computer. Often this could be RAM, CPU, Motherboard, and/or Power Supply.
284

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Windows restarts without warning


Cause:
This issue could be caused by any of the below possibilities.
Software issue
Hardware issue or error.
Heat related issue.
Computer virus.
Issue with operating system.

Software issue:
1. Errors generated by software programs can cause a computer to reboot
unexpectedly or without warning.
2. If you are not running Windows XP or following the below steps still cause
your computer to reboot without warning. Boot your computer into Safe
Mode, and let the computer run in Safe Mode. Additional information and
help with getting into Safe Mode.
3. If the computer is still rebooting in Safe Mode the issue is likely not with
the software but something else, It is recommended to run the basic
troubleshooting section for your operating system.

285

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

WINDOWS RESTARTS WITHOUT WARNING


Hardware issue or error
4. . Any failing hardware component in your computer could cause your
computer to unexpectedly generate
5. an error and/or reboot without warning. If you have recently Installed a
new hardware device, remove that device to make sure it is not causing
your issues.
6. Make sure you are not encountering any hardware conflicts by viewing
Device Manager New drivers can also cause this issue, if you have
recently performed any hardware driver updates you may wish to try an
earlier version of the drivers. Additional information and help with
computer drivers can be found on our drivers page.
7. If you have updated drivers and removed any hardware that could be
causing this issue and continue to experience random reboots, it's possible
that the memory is bad in the computer. hardware devices that are not
installed properly in the computer can also cause random reboots. Make
sure all the cables and expansion cards are connected properly to the
computer. To determine this is to disconnect and reconnect all cables and
expansion cards.
286
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

WINDOWS RESTARTS WITHOUT WARNING


8. Computer viruses such as the blaster virus are written to reboot your
computer without warning. Usually these viruses will make the
computer reboot every 5, 10, 15 or 30 minutes.
9. If you believe your computer may be infected with a virus or are
uncertain if your computer is infected with a virus make sure your
virus scanner definitions are up to date.. Many computer today are
designed to turn off or automatically reboot if the computer, processor,
or other device in your computer gets to hot. If you have heard any
abnormal noises coming from your computer recently such as a high
squealing this could indicate a fan may be failing in your computer.
10. You can first start by verifying the fan on the power supply is working
For all other fans in the computer you will need to either open the
computer and make sure the fan are working (processor fan and case
fan) and/or if your BIOS monitors the RPM of the fans enter BIOS and
make sure the BIOS does not report any errors.

287

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

WINDOWS RESTARTS WITHOUT WARNING


11. If after following each of the above recommendations your computer still
continues
to reboot it is likely that you are experiencing a Microsoft Windows
.
operating system related issue that cannot be explained.
To help make sure this is the case please try the below steps.
12. Reboot the computer and enter CMOS setup as the computer is booting. If you
are not familiar with how to enter CMOS After you have loaded the computer
in CMOS setup let the computer be running in CMOS mode.
13. If the computer does not reboot in CMOS mode it is likely that you are in fact
experiencing an issue with Microsoft Windows and it is recommend that if you
have followed all of the above recommendations that you reinstall your version
of Microsoft Windows.

288

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

SYSTEM RUNNING SLOW


Cause:
This
. issue can be caused by any of the below possibilities.

Hard disk space not available:

Several software programs have been installed/uninstalled leaving


behind bad files and/or confusing the software.
Data Corruption.
Missing Windows updates / Outdated drivers.
Computer is overheating.
Corrupt OS.

Bad Hardware:
1. Verify that there is at least 200-500MB of free hard disk drive space. This
available space allows the computer to have room for the swap file to
increase in size as well as room for temporary files.
2. Run Scandisk or something equivalent to help ensure that there is
nothing physically wrong with the computer hard disk drive.
3. Run Defrag to ensure that data is arranged in the best possible order

289

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

SYSTEM RUNNING SLOW


1. If you've got an anti-virus scanner on the computer, spyware protection program or
other security utility make sure it's not running in the background as you're trying to
work. Often when these programs begin to scan the computer it can decrease the
overall performance of your computer.
2. Verify that the Device Manager has no conflicts. If any exist resolve these issues as they
could be the cause of your problem. Make sure you have all the latest Windows updates
installed in the computer.
3. Make sure you've got the latest drivers for your computer. Especially the latest
video drivers. Having out-of-date drivers can cause an assortment of issues.
4. Make sure your computer and processor is not overheating,

290

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

SYSTEM RUNNING SLOW


5. Excessive heat can cause a significant decrease in computer performance
some
processors will even lower the speed of the processor automatically
.
to help compensate for the heat related issuesIf you've had your computer
for more than one year it's likely you're computer is not meeting the memory
requirements for today. We suggest at a minimum the computer have 1GB
of memory. Additional information about determining how much RAM is
installed in your computer.
6. Finally, if none of the above solutions resolve your issues, it is
recommended that you either reinstall Windows.
7. Still after re-installing Windows, system is slow, it could be due to
malfunction of a hardware.

291

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

No power or computer does not turn on.


.Cause:
No power from the computer can be caused by any of the below
possibilities.
Connections not connected properly.
Third-party hardware.
Bad power cable.
Incorrect power supply.
Bad battery.
Bad power supply, power button, Bad MBD

Solution:
1. Note: If the computer is turning on but is not posting (beeping) or giving
any type of picture on the display,.pls check the processor is properly
connected and Fan is rotating.
2. If you are uncertain if the computer is turning on or not, this can be easily
checked by seeing fans in the computer or visible from the outside of the
computer. If these fans are spinning and the computer is receiving power.
292

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

No power or computer does not turn on.


3. Verify that the power connection is connected properly to the wall and the back
. of the computer.
4. If the connections appear to be connected properly, attempt to disconnect and
reconnect both ends of the cable.
5. If you have a power strip (surge protector) or switch used to turn everything on
at once, temporarily disconnect the computer from that switch and connect
that cable directly to the wall.

6. This will help verify that the strip or switch is not bad.Verify that the outlet
works by connecting a different component to that switch

293

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

NO DISPLAY ON MONITOR
Cause:
.
This
issue can be caused by any of the below possibilities.
Monitor is not on
Computer is asleep
Connections not connected properly.
Monitor settings are not correct.
No Post.
Hardware issue.

Monitor is On/OFF:
Make sure the monitor is on. If no power light (green or orange light) is
seen on the monitor display try pressing the power button until it comes
on. If no light comes on after several attempts check the Power
connections are connected properly.

Computer Sleep:
If your computer monitor was on and you stepped away from the
computer and upon returning it was black it's likely that the computer is
asleep. Try moving your mouse, clicking the mouse buttons, and/or
pressing any key (space bar) on the keyboard to wake it up.
294

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

NO DISPLAY ON MONITOR
Connections
not connected properly: Make sure that you are connecting
.
the monitor to the back of the computer in the 15-pin connector as shown
to the right or older computer 9-pin connection.
If the computer is properly plugged in, make sure it's getting getting
power.

If you are not receiving power from a wall outlet replace it with another
one or exchange the computer and monitor Cable. If the monitor still does
not get power, would need repair.

295

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

BASIC NETWORK TROUBLESHOOTING


Cause:
If a computer is unable to connect to a network or see other computers on a
. network, it may be necessary to troubleshoot the network.
A network may not work because of any of the below reasons.

Network card not connected properly.

Bad network card drivers or software settings.

Firewall preventing computers from seeing each other.

Connection related issues.

Bad network hardware.

Solution:
1. Verify that the network cable is properly connected to the back of the
computer. In addition, when checking the connection of the network cable,
ensure that the LEDs on the network are properly illuminated. For
example, a network card with a solid green LED or light usually indicates
that the card is either connected or receiving a signal. Note: generally,
when the green light is flashing, this is an indication of data being sent or
received.
If, however, the card does not have any lights or has orange or red lights, it is
possible that either the card is bad, the card is not connected properly, or
signal
from
the network.
296 that the card is not receiving a
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

BASIC NETWORK TROUBLESHOOTING


2. If you are on a small or local network and have the capability of checking
a hub or switch, verify that the cables are properly connected and that the
. hub or switch has power.
3. Ensure that if this is a new network card being installed into the computer
that the card's resources are properly set and/or are not conflicting with
any hardware in the computer. Users who are using Windows 95, 98, ME,
2000 or XP, verify that Device Manager has no conflicts or errors
4. Verify that the network card is capable of pinging or seeing itself by using
the ping command. Windows / MS-DOS users ping the computer from a
MS-DOS prompt. Unix / Linux variant users ping the computer from the
shell.
To ping the card or the local host, type either ping 127.0.0.1 or ping local host
This should show a listing of replies from the network card. If you receive
an error or if the transmission failed, it is likely that either the network card
is not physically installed into the computer correctly, or that the card is
bad.
5. Verify that the correct protocols are installed on the computer. Most
networks today will utilize TCP/IP, but may also utilize or require IPX/SPX
297 and NetBEUI.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

BASIC NETWORK TROUBLESHOOTING


6. If your computer network utilizes a firewall, ensure that all ports
required are open. If possible, close the firewall software program
. or disconnect the computer from the firewall to ensure it is not
causing the problem.
7. In some cases it may take a computer some additional time to
detect or see the network. If after booting the computer you are
unable to see the network, give the computer 2-3 minutes to
detect the network. Windows users may also want to try pressing
the F5 (refresh) key when in Network Neighborhood to refresh
the network connections and possibly detect the network.
8. If after following or verifying the above recommendations you are
still unable to connect or see the network, attempt one or more of
the below recommendations. If you have installed or are using
TCP/IP as your protocol you can attempt to ping another
computer's IP address to verify if the computer is able to send
and receive data. To do this, Windows or MS-DOS users must be
at a prompt and Linux / Unix variant users must open or be at a
shell.
298

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

BASIC NETWORK TROUBLESHOOTING


9. If you receive a response back from this address (and it is a different
computer), this demonstrates that the computer is communicating over the
network
10. Another method of determining network issues is to use the tracert
command if you are a MS-DOS or Windows user or use the traceroute
command, if you are a Linux / Unix variant user. To use this command you
must be at the command prompt or shell This should begin listing the hops
between the computer and network devices. When the connection fails,
determine which device is causing the issue by reviewing the traceroute
listing
Eg: tracert 102.55.92.2(IP NO) or traceroute 102.55.92.2(IP NO)

299

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

MISSING OR LOST SOUND IN WINDOWS


Cause:
This issue could be caused by any of the below possibilities.

Bad software settings.

Corrupt or missing sound drivers.

Compatibility issues with the operating system and/or other hardware.

Speaker related issues.

Bad or missing sound card.

Solution:
1. First verify you see a small speaker icon in the Systray (generally at the bottom
right hand corner of your screen). If this icon is missing follow the below section.

Windows XP
2. Open the Control panel Open the "Sounds and Audio Devices" icon. Verify the
"Place volume icon in the taskbar" checkbox is checked. If this option is not
available or is grayed out, skip to the next section of this document. If you were
able to check this box, click ok and close out of this window and the Control Panel.
Double-click the sound icon in the Systray and verify that all the sound volumes
are mid-way or higher. If other devices are listed, it is possible that these other
devices could be the sound card or other devices conflicting with the sound card. If
any other devices are listed it is recommended you remove those devices, reboot
the computer and let Windows redetect the devices. If this does not work, attempt
to determine which device is not being detected and resolve that issue first.
300
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

MISSING OR LOST SOUND IN WINDOWS


3. If you are missing the "Sound, video and game controllers" category in
Device Manager, it is likely that the sound card drivers are not installed
properly, sound card has been disabled, sound card is bad, or no sound
card is available in the computer. First, verify no conflicts or other
devices are present in the Device Manager; if these are present it is
likely they are the sound card and/or devices causing the sound card not
to be detected.
4. Second, verify that the computer has a sound card and/or that the sound
card is enabled on the computer.If this is an on-board sound card you
can verify that it is enabled in BIOS setup
5. If you have no adapters and/or cannot click the down arrow to select the
correct adapter, close out of this Window. In Control Panel double-click
the System icon / click the Device Manager tab within Device Manager
and ensure there are no yellow ! or red X.
6. If you have either of these on any of your sound devices, attempt to
remove everything under Sound Video game controllers and reboot the
computer.
7. Verify the speakers settings and
speakers
are not at fault
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

301

MISSING OR LOST SOUND IN WINDOWS


8. If you have followed the above recommendations and you are still
unable to get the sound card to work, in Device Manager remove all
sound video and game controllers and reboot the computer. This
should cause Windows to reinstall all missing drivers and often can
correct corrupt drivers. If this does not work after rebooting the
computer download and install the latest sound card drivers from the
computer or sound card manufacturer

9. Finally, if all of the above recommendations do not resolve your issue it


is likely that either the sound card is physically bad or that the
operating system is severely corrupt

302

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling:


Best Practices

303

2010 Wipro Ltd Internal & Restricted

System Care and Handling: Best Practices.

Always keep your Windows up-to-date with the latest Microsoft patches
Keep less files on Desktop, always keep files in folders.
Keep only minimal programs which are required to you only in your
computer.
Keep your antivirus definitions updated Regularly.
While opening E-Mail attachments, ensure the attachment is scanned
before opening.
Periodically clean your temporary folders/internet files/Cache and
cookies.
Use the Start Button on the Windows Taskbar to shutdown your computer.
It is also necessary to save files & Close all application which are running
in the taskbar.
Keep CD's in a cover and handle them by the edges. Try to keep floppy
disks in proper storage box and perform a full format on the disk
before copying important data

304

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: Best Practices.

Do not download freeware and also Dont use software that isnt certified and
legally not licensed. Downloading software from a unauthorised site, or
accepting a shared copy, is not legal and may take valuable information
from your system over a period of time.
Do Not move your computer, even a few centimeters when system is on,
always shutdown the computer before any movements. This applies to the
Monitor and other Peripherals attached to the system. Unnecessary shock
can cause fatal breakdown of sensitive parts or reduce the expected lifetime
of the computer and its spares.
Do Not Place any equipments or other objects on top of a Desktop or the
peripherals attached to the Desktops.
Do Not Operate the computer on a fully closed enclosures preventing the
airflow to the cooling vents on the sides or back, which will cause the system
to overheat and can lead to failure

305

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: Best Practices.


Moving the System or pulling the AC adapter cord while the it is plugged in, may
cause the plug to break off /or damage the socket and even can lead to personal
injury.
Hard-mounting the system in a vehicle or surface that it is subject to strong
vibration can result in data corruption and disk failures.

Inserting a floppy disk into a drive at an angle or upside down, may cause the drive
to jam and make it unreadable. Placing more than one label on a floppy disk, which
also causes the jam in the drive.
Touching the CD-ROM tray and the media which may contaminate the lens and/or
throw it out of alignment
Avoid Placing the system closer than about 5 inches (13cm) from any electrical
device that generates a strong magnetic field, such as electric motors, TVs,
refrigerators, and large audio speakers.
Avoid Placing your computer on the floor. The fans in the computer that pull air
through the case to cool processor & SMPS will pull all the stuff that settles out of
the air, and onto the floor, into your computer.
306

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: Best Practices.


Avoid bringing liquids near to system, which can accidentally fall and
may contaminate the internal components and/or cause a malfunction or
even short circuit
When transporting a computer, we recommend you to consider the
following guidelines in order to protect the system:

Remove all floppy disk and/or CD/DVD disc media from all the
drives.
Make sure all covers of the computer are in position and are
Properly closed.
Also ensure appropriate carton box and packing materials are used If
original packing material which has comw with the computers are
available, it is better to use them..
Following the above simple guidelines during transportation or
shipping the system will help in ensuring the machine reaching the
destination in safe and working condition.
307

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: Best Practices.


Delete Cookies, Delete Files, Clear History. Internet Explorer creates
temporary internet files. It is best to clear them out regularly. Load Internet
Explorer. Select Internet Options from the Tools menu. On the General
tab, choose Delete Cookies, Delete Files, and Clear History. If you have
cookies or passwords that you like to keep, It will make this cleanup
easier.
Take out the trash. Empty your Recycle Bin daily.
Reboot your computer once a day. Use Start/Shut Down/Restart. Not all
programs you run release memory and resources fully when you quit
them. Restarting once a day will fix this.

308

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: ESD AND EOS


ESD/EOS
Electrostatic Discharge (ESD)
Electrostatic discharge (ESD) costs the electronics industry millions of dollars
each year in damaged components, non-functional circuit boards and
scrambled or missing information. ESD can occur in the manufacturing,
shipping, receiving, and field handling of integrated circuits or computer
boards with no visible signs of damage. A malfunction in these components
or boards can occur immediately or the apparatus may perform for weeks,
months, or even years before an unpredictable and premature breakdown
causes a field failure.
Why Should we Care About Electrostatic Discharge?
When we incorporate electronic components or boards into the products,
ESD damage can have a direct impact on your companys reputation and
profits. That is because electrostatic damage directly affects the quality and
reliability of our products. However, for a small investment in time,
manpower, and equipment, you can virtually eliminate ESD-caused
problems. The tangible benefits to you include:

309

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: ESD


Higher manufacturing yields
Less rework and inventory
Reduced overall costs
Fewer field failures and warranty calls
Increased product reliability
More repeat business resulting in greater profits
Eliminate ESD Damage
Manufactures and uses electronic components, and has implemented a
comprehensive ESD prevention program to ensure that our products are
delivered to customers with the highest possible reliability. Using this
information, we can implement similar preventive practices in our facilities and
warehouses. As a result, component failures can be minimized. What is ESD?
ESD is the transfer of electrical charge between two bodies at different
potentials, either through direct contact or through an induced electrical field. It
gives you a mild shock when you walk across a carpeted floor and then touch a
doorknob. While this discharge gives a harmless shock to humans, it is lethal to
sensitive electronics. For example, the simple act of walking across a vinyl floor
can generate up to 12,000 V of static electricity.. Several technical failure
mechanisms are due to ESD which causes huge damages.
310

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: ESD


ESD Occurs at All Levels of Integration
Electrostatic discharge is not selective when affecting your products. It
can strike components directly or indirectly by passing to the component
via connectors and cables. Components mounted on circuit boards are
also susceptible.

ESD never kills, but Injures

311

What Can we Do To Prevent ESD?


Fortunately, preventing ESD can be relatively easy and inexpensive. Two areas of
focus are:
Eliminating static charges from the workplace.
Properly shielding components and assemblies from static fields.
Eliminating static electricity in the workplace is accomplished by grounding
operators, equipment, and devices (components and computer boards).
Grounding prevents static charge buildup and electrostatic potential differences.
Electrical field damage is averted by transporting products in
Special electrostatic shielding packages.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

System Care and Handling: ESD


Electronic Component ESD Sensitivity (ESDS
ESD Class 0: Damage we cant feel : 0 to 199 Volts
ESD Class 1: Damage we cant feel : 200 to 1,999 Volts
ESD Class 2: Damage we might feel : 2,000 to 3,999 Volts
ESD Class 3: Damage we can probably : 4,000 to 15,999 Volts
Detect as spark with our
own body:
The following table shows some typical situations. Please note that humidity
has a significant effect on the induced charge. It is not recommended to have
relative humidity (RH) that is too low, say, below 30%. ESD control becomes
especially challenging at low RH levels. A relative humidity between 40% to
60% is recommended for the typical assembly area
Means of static generation

RH 1020%

RH 6590%

Walking across a carpet

35,000 V

1,500 V

12,000

V 250 V

Vinyl envelopes for work instructions

7000

V 600 V

Worker at bench

6,000

V 100

Walking on a vinyl tile floor

312

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ESD GROUNDING METHODS

Ground ESD floor mats via ground cord


to equipment ground

Foot Grounders
313

test wrist strap daily


2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Test foot grounder daily

ESD - PREVENTION
Test Wrist Straps & ESD Footwear daily Keep wrist band snug,
foot grounder grounding tab in shoe, & ESD Smocks buttoned
Up Only trained or escorted people to be allowed in ESD Protected Area

An Effective Workplace:
An effective workplace should be outfitted with the following items:
1.ESD protective clothing/smocks. Street clothing must not come in contact
with components or computer boards since the various materials in clothing can
generate high static charges. ESD protective smocks, manufactured with
conductive fibers, are recommended.
2.Electrostatic shielding containers or totes. These containers (bags,boxes,
etc.) are made of specially formulated materials which protect sensitive devices
during transport and storageAntistatic or dissipative carriers. These provide
ESD protection during component movement in the manufacturing process. It
must be noted that antistatic materials alone will not provide complete
protection. They must be used in conjunction with other methods such as totes
or electrostatic shielding bags.
4.Dissipative table mat. The mat should provide a controlled discharge of
static voltages and must be grounded. The surface resistance is designed such
that sliding a computer board or component across its surface will not generate
more than 100 V.
314
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

ESD - PREVENTION
5.Personal grounding. A wrist strap or ESD cuff is kept in constant
contact with bare skin and has a cable for attaching it to the ESD ground.
The purpose of the wrist strap is to drain off the operators static charge.
The wrist strap cord has a current-limiting resistor for personnel safety.
Wrist straps must be tested frequently to ensure that they are undamaged
and operating correctly. When a wrist strap is impractical, special heel
straps or shoes can be used. These items are effective only when used in
conjunction with a dissipative floor.

Heel Straps

315

Wrist Straps

Floor Mats

6.ESD protective floor or mat. The mat must be grounded through a currentlimiting
resistor. The floor or mat dissipates the static charge of personnel approaching the
work bench. Special conductive tile or floor treatment can be used when mats are not
practical or cause a safety hazard. Chairs should be conductive or grounded with a
drag chain to the flooring, if we touch or handle the components by sitting on that.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Antivirus

316

2010 Wipro Ltd Internal & Restricted

Different types of threats

317

Virus
Trojan Horse
Worm
Blended attack
Expanded threat
False Positives

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

What is a virus?
A program written to alter the way a computer operates.
It will self execute its own code and place itself in the path of execution of
another program.
It must replicate itself
For example, it can replace other executables with a copy of the virus
infected file.
It can infect desktops and network servers alike.

318

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Types of viruses
File infectors :They infect any program files, they come in through .exe and .com files.
Examples are Jerusalem and cascade.
Boot sector viruses:It infects the system are of a disk, basically the boot record a floppy
disk or a hard disk. Examples are Michelangelo and disk killer.
Master boot record viruses:They are almost same as the boot sector viruses, the only
difference between them is that where they load themselves. Such
infectors saves a copy of the MBR in a different location. The Pcs
infected with boot sector viruses and MBR viruses will not boot.
Example:-Unashamed, NYB, Antiexe .

319

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Types of viruses
Multipartite Viruses:These are infections that infect both the program files and boot
records. These are difficult to remove, the infections from both the
locations should be removed or else they might re-infect any one of the
locations back again. Example:-One_Half,Emperor.
Macro viruses:These type of Viruses infect data files. They Have cost
Corporations millions. The Evolution Of Visual Basic in 97,a macro
Virus can be written that can infect data files. It infects MS Word,
Excel, Power point. They are circulating good numbers across the
world because of the ease with which they can be created. Ex:W97M.Mellisa,W97M.NiceDay.

320

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

What is a Trojan Horse?


Trojan horses are impostors- files that claim to be something
desirable but, in fact, are malicious.
A major distinction between a Trojan and a virus is that the
former do not replicate themselves.
Trojans contain malicious code that when
triggered causes loss of data and even theft.
To get infected by a Trojan you must invite
such programs to your computer. Example :By downloading an E-mail attachment.
Trojan.Vundoo is one of the Trojans that
once infected becomes difficult to clean or
delete.

321

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

What is a Worm?
Worms replicate from system to system without use of a host file.
Worms Usually reside inside word or excel documents & the worm
will release a document that has the worm macro inside it. The
document will now move from computer to computer.

322

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Virus Infection


Case I: - Unknown Infection
Suspicious activity observed and no files detected
Activities such as pop ups, file creation, URL redirection, network congestion are
observed.

Troubleshoot/Locate the files responsible


Check netstat output for connections made to any unknown IP addresses.
View files based on their modified dates to check for recent changes made on
the system ,typically in folders like /Windows/System32 ,
/Windows/System32/drivers
Check the registry
HKeyLocalMachine\SOFTWARE\Microsoft\Windows\CurrentVersion\Runfor any
startup entries made by the virus
Check the task manager for any unknown, random name processes running
Enable view for hidden files and folders

323

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Virus Infection


Case II: - Unable to clean
Virus detected but unable to clean/delete/quarantine
As seen in the virus logs files are detected but not cleaned/removed from the
affected machines.

Troubleshooting
If files are in the temporary internet folder then would be in use and may not get
deleted. We recommend you to delete the contents of the temporary internet
files folder.
Boot machine in safe mode and run a manual scan
Use tools from recognized AV vendors like Symantec, Mcafee and Trend Micro
like:Mcafee Avert Stinger.
Trend Micro House call 7.1
Norton Security Scanner from Symantec.
324

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Troubleshooting Virus Infection


Case III: - Re-infection
Virus detected but reinfection occurring in the network.
As seen in the virus logs files are detected and cleaned/removed from the
affected machines but reinfection occurring through shared folders/mapped
drives or infected USB drives.
Troubleshooting
Since malware are detected and taken care of in such a way that you may
need to check the sources of reinfection and security holes in the network
responsible for them.
Check virus logs to look for the infection source of the malware.
Infection level in the network will not reduce until infection sources are
eliminated.

325

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices
Ensure the latest Virus Pattern and Scan Engine versions are loaded in
the Antivirus used.
Disable system restore Option on windows XP/Vista.
Apply latest Microsoft Patches on all windows machines.
Enable mapped drive scanning especially during outbreaks of malware
that Spread using Shared/mapped Folders.

Use a firewall that will prevent incoming and outgoing malicious traffic.
Enable schedule scanning daily in case of huge network outbreaks.

Keep Temp, temporary internet files, prefetch and startup clean.

326

Use a password on shares if the shares are commonly used or else


remove the shares because this will reduce the spread of infections.
2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation

327

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


2. Open the IIS Manager as below:

3. Expand Local computer as below:

328

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


4. Expand to default website as below:

5. Right click on default website, click browse:

329

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


6. On clicking browse, the following screen will appear.
You shall proceed to install SEPM now

7. Click setup to start the SEPM installation:

330

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


8. Select the install location and proceed:

9. Select the custom website option


and ensure TCP port is set to 8014:

331

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


10. Click Install to proceed with SEPM Installation & Complete it by clicking Finish:

332

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


10. Management server config. window will pop-up next, select Advanced and click next:

11. Select number of users based on site requirement:

333

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


12. Select Install my first site and click next:

13. Prefer keeping the default details & click next:

334

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


14. Give the Site name and click next:

15. Give an Encryption password and store it


somewhere as its used for Disaster recovery purpose:

335

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation


16. Select the Database, based on the clients size and proceed:

17. Enter the SEPM console Admin password & click next:

336

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEPM Installation

18. Select No for Migration deployment


wizard & Finish the SEPM Installation:

337

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEP client Installation


1. Go to SEPM & click on Migration and Deployment wizard & click next :

2. Select Deploy the client & click next:

338

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEP client Installation


3. Specify the group name for which the SEP client has to be installed:

4. Prefer leaving the default options and click next:

339

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEP client Installation


5. Specify the Install package options & click next:

6. Click No to proceed with creating Install package:

340

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEP client Installation


7.You can push out the software from the push deployment wizard., thru the following exe file:
C:\Program Files\Symantec\Symantec Endpoint protection Manager\Tomcat\Bin\clientremote.exe

8. Click Next on the


Push deployment wizard:

341

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEP client Installation


9. Browse the created package, specify the concurrent deployments and click next:

10. Select the machine(s) for SEP


client deploymentt and click Add:

342

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Best Practices on SEP client Installation


11. Enter the remote client authentication and click Finish:

12. SEP Software will start rolling


out to the selected client(s):

343

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Desktop Standard Installation Process

344

2010 Wipro Ltd Internal & Restricted

UPS / Voltage Regulator Availability

Should be available with the reqd power rating

Line - Neutral Voltage


Neutral - Ground Voltage

between 200V to230V


More than 0V but less than or 3V

Line - Ground Voltage

Sum of Line-Neutral and Neutral Ground Voltage

AC Main is ON
AC Main is OFF and UPS is providing power. - Suggested Action , Not
mandatory if not possible
Voltages Should be Checked when

Consealed wiring and High Voltage lines should pass near to the
system Installation Place

Site Inspection

Generator is ON and providing power - Suggested Action , Not


mandatory if not possible
Ambient Temperature

Ambient temperature at peak time should not be more that 32 degree

Dust Level

Should ensure low dust level

Air Flow

Proper Space required to ensure the hot air is blowing out properly

Systems Placement

Ensure table / rack is good enough to bear the System load.

Before Unpacking ensure the package is not


damaged - Check for Physical damages

Any damaged packets should be informed to Installation team before


opening the same

Ensure the sealed tape is intact and the tapes are


with Wipro Logo

Any changes on this to be brought to Installation team before opening


the Box

Unpack the Box

Unpack as per the guide lines in the Box

Physical Damage

Check the Physical damages on system chasis, monitor and other


components. If any Inform Installation team.

Check for LOD in the Box

Box will contain a List of Devices sheet available in the box - Take the
same for ref.

LOD verification

Verify LOD with the contents in the BOX - Any deviation raise short
shipment or wrong shipment

PIR / BOM Verification

Verify the Boxes / Items is available as per PIR / Invoice / Bill of


Material - Any deviation raise Short Shipment or wrong shipment

Unpacking and Inspection

345

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Install the Hardware


Basic Power On Test
Check correct Configuration
Install Add on if available
Install External devices if available
Configure RAID if available as per customer sign off and requirment
Install basic OS with customer approved partition scheme
Install Service packs and updates
Assign IP for Network, If Applicable
Check the network connectivity by pinging gateway
Check the connectivity to all Ports. Eg Front sound prot, USB Port etc
Basic Installation

Check all the Drivers & Inf is installed and the latest available as per supplied driver cd. Check in device manager
for errors
Check Unistall and default AV installed and working properly. If customer provide AV software, uninstall the default
one and install the customer specific and enusre it is activated.
Enusre the AV Client has thebest possible update mechanism is configured and latest AV signature is loaded.
Take the configuration using OS Utility confirm the complinace. Eg. System Info - for Windows XP.
Ensure OS Activation has to be check before final Sign Off. For Windows XP "Go To RUN---Type oobe/msoobe
/a and press Enter" and for Windows Vista "Go to RUNType SLUI and press Enter Key"

Additional Installation
As per the Sign off and communicated
Task
Demonstrate the system startup and shutdown to customer
Demo and Sign off

Share the call logging process and escalation matrix with the customer
Sign off the ATP or PIR

346

2010
Wipro
Ltd Ltd
Internal
& Restricted
2009
Wipro
- Confidential

Thank You

2010 Wipro Ltd Internal & Restricted

You might also like