Showing posts with label Interview Questions. Show all posts
Showing posts with label Interview Questions. Show all posts

Sunday, May 13, 2012

Active X controls are disabled in IE

Common problem when ever open IE its giving an warning message Active X controls are disabled.

To Enable Active x controller follow the bellow steps

Open you IE -> go to Tools from the menu bar then select Internet Options 


Click on the Security tab then Select the Custom Level

Select the Enable in the Run ActiveX Controls and Plug-ins.

Now click OK and apply to change the settings.


.

Sunday, December 18, 2011

Windows Xp Boot Options(F8 options)

Following are the Windows XP advance boot Options.
Safe Mode
Safe Mode With Networking
Safe Mode With Command Prompt
Enable Boot Logging
Enable VGA Mode
Last Known Good Configuration
Directory Services Restore Mode
Debugging Mode
Disable automatic restart on system failure
Start Windows Normally
Reboot
Return to OS Choice Menu



-------------------------

Safe Mode

Starts using only basic files and drivers (mouse, except serial mice; monitor; keyboard; mass storage; base video; default system services; and no network connections). If your computer does not start successfully using safe mode, you might need to use the Recovery Console feature to repair your system.

For more information,

Safe Mode with Networking

Starts using only basic files and drivers, and network connections.

Safe Mode with Command Prompt

Starts using only basic files and drivers. After logging on, the command prompt is displayed instead of the Windows graphical interface.

For more information, see To start your computer at a command prompt

Enable Boot Logging

Starts while logging all the drivers and services that were loaded (or not loaded) by the system to a file. This file is called ntbtlog.txt and it is located in the %windir% directory. Safe Mode, Safe Mode with Networking, and Safe Mode with Command Prompt add to the boot log a list of all the drivers and services that are loaded. The boot log is useful in determining the exact cause of system startup problems.

Enable VGA Mode

Starts using the basic VGA driver. This mode is useful when you have installed a new driver for your video card that is causing Windows not to start properly. The basic video driver is always used when you start in Safe Mode (either Safe Mode, Safe Mode with Networking, or Safe Mode with Command Prompt).

Last Known Good Configuration

Starts using the registry information and drivers that Windows saved at the last shutdown. Any changes made since the last successful startup will be lost. Use Last Known Good Configuration only in cases of incorrect configuration. It does not solve problems caused by corrupted or missing drivers or files.

For more information, see To start the computer using the last known good configuration

Directory Service Restore Mode

This is for the server operating systems and is only used in restoring the SYSVOL directory and the Active Directory directory service on a domain controller.

Debugging Mode

Starts while sending debug information through a serial cable to another computer.

If you are using, or have used, Remote Installation Services to install Windows on your computer, you might see additional options related to restoring or recovering your system using Remote Install Services.

Windows 7 RAM Limits

There are the upper RAM limits for the different editions of Windows 7:

• Starter: 8GB
• Home Basic: 8GB
• Home Premium: 16GB
• Professional: 192GB
• Enterprise: 192GB
• Ultimate: 192GB

Boot Process Windows Vista

Windows Vista boot-up process:

    System is powered on
    The CMOS loads the BIOS and then runs POST
    Looks for the MBR on the bootable device
    Through the MBR the boot sector is located and the BOOTMGR is loaded
    BOOTMGR looks for active partition
    BOOTMGR reads the BCD file from the \boot directory on the active partition
    The BCD (boot configuration database) contains various configuration parameters( this information was previously stored in the boot.ini)
    When windows vista is selected, BOOTMGR transfer control to the Windows Loader (winload.exe) or winresume.exe in case the system was hibernated.
    Winloader loads drivers that are set to start at boot and then transfers the control to the windows kernel.
    There is not msgina.dll in windows vista ( the shell draws the login screen)

OK. Now that we have the two boot-up processes on the board, we should examine what is different on windows vista boot up process. As we can see the difference starts at the MBR. In windows vista, NTLDR was replaced by three new boot loader components, supposedly designed to load windows quicker and more securely. Those components are;

Windows Boot Manager (Bootmgr.exe)
Windows OS Loader (Winload.exe)
Windows Resume Loader (Winresume.exe)

Windows Boot Manager reads the boot configuration data (BCD) and display an operating system selection menu to the user

Windows OS loader is the operating system boot loader. It is invoked by the windows boot manager in order to load the operating system kernel (ntoskrnl.exe) and boot-class device drivers.

Notice the Boot Configuration Data ( BCD) This new data store serves essentially the same purpose as boot.ini. However, BCD abstracts the underlying firmware and provides a common programming interface to manipulate the boot environment for all Windows-supported computer platforms) Boot Configuration Data allows for third party integration so anyone can implement tools like diagnostics or recovery options

Windows Resume loader replaces the Hiberfil.sys.

Another change that is worth noting is the msgina.dll file, I guess Microsoft sensed that was being abused too much and integrated the logon screen into the shell. Msgina.dll was used on windows XP to change custom login screens.

Boot Process For XP

Windows XP boot up process:

    System is powered on
    The CMOS loads the BIOS and then runs POST
    Looks for the MBR on the bootable device, and loads NTLDR
    The BIOS/CMOS transfers control to the NTLDR
    NTLDR first looks for Hiberfil.sys ( if present, the system resumes from where it was hibernated)
    if the hiberfil.sys is not present, NTLDR looks for boot.ini
    If you have more than one operating system installed on your computer, Boot.ini will give you the option to choose the operating system to boot from.
    The selected operating system then boots, in windows XP involves the loading of the kernel
    After system services and user required DLLs are loaded, finally msgina.dll brings up the login screen.
    When the user logs on, the system checks for the user’s credentials in the SAM, if the credentials are correct, the user profile is loaded from documents and settings folder.
    This brings up the desktop and at that point, the ControlSets are copied to the CurrentControlSet in the registry. Now, the system is considered booted.

Temporary Internet file

 A file located on a user's hard disk in which a browser stores the Web site data for every Web page or URL address that a user visits. When the Web server sends the Web page files to the browser, they are stored in a file so that the next time the user visits the same Web site the browser takes the data from the temporary Internet file. With this method, the page quickly displays in the browser instead of having to wait for response from the Web site's server all over again. Basically, the browser is opening the Web page from the user??s hard drive instead of downloading the files from the Internet.
A buildup of data in the temporary Internet file will eventually slow a processor down as it takes up valuable resource space. Browsers that use a temporary Internet file also have methods for deleting the file.

Importent Port Numbers


Well known port numbers

 21     FTP -- Control
 22     SSH Remote Login Protocol
 23     Telnet
 25     Simple Mail Transfer Protocol (SMTP)
 53     Domain Name System (DNS)
 67        DHCP Clint
 68        DHCP SERVER
 80     HTTP
110     POP3
143     Interim Mail Access Protocol (IMAP)
389     Lightweight Directory Access Protocol (LDAP)
443     HTTPS
546     DHCP Client
547     DHCP Server

FSMO Roles

FSMO ROLES
Schema master (forest wide):
The Schema Master controls all updates to the Schema within the forest.

Domain Naming Master (forest wide):
The Domain Naming Master role is responsible for the creation and deletion of domains in the forest.

PDC Emulator (domain wide):
The PDC emulator role provides backwards compatability for Windows NT backup domain controllers (BDCs), the PDC emulator advertises itself as the primary domain controller for the domain. It also acts as the domain master browser and maintains the latest password for all users within the domain.

Infrastructure Master (domain wide):                               
The Infrastructure Manager role is responsible for updating references from objects within its domain with objects in other domains.

RID Master (domain wide):
The RID Master manages the Security Identifier (SID) for every object within the domain.

Diffrence Between Xp professional and Home

Difference between xp home and professional

Bellow options not available in Home addition

•    Folder Redirection
•    Group Policy settings
•    Local Policy settings
•    System Policy settings (Poledit.exe)
•    Roaming User Profiles
•    Offline Files and Folders
•    Software Installation and Maintenance
•    Remote Installation Services (RIS)
•  Encrypting File System (EFS)
•  Computer domain account support
•  Access Control List (ACL) Editor
•  Administrative shares (available only when joined to a domain)
•  Security-related Group Policy settings
•  Remote Desktop Service
•  Multiprocessor support
•  Multilanguage user interface
•  Start menu option to show administrative tools
•  Internet Information Services (IIS)

Diffrence Between .ost and .pst

.pst files are all the emails (and files attatched to those emails), calendar, contacts, tasks, etc. stored locallyon your machine.

.pst are created when using Outlook  to manage your email (Gmail, hotmail, yahoo, aol,etc.)  they can also be created within an Exchange environment, however, Microsoft doesn't recomment this due to the .pst being very unstable and if your pc were to crash you would loose all of your emails.  In an Exchange environment, using .pst removes the emails from the Exchange server and stores them locally.

.ost files are simply a copy of your mailbox that is stored on the Exchange server.  Think of this as a type of email cache file.  This leaves the emails on the server, but also stores a copy of emails since your last sync on the local machine.

Diffrence Between .MSI and .EXE file

MSI Stand for Microsoft Installer (file extension) 1.EXE stand for Executable File

The same file that installs the program and also uninstalls 2.Two different EXE available to do install and

program . uninstall.

EXE files are the preferred method for installing our software, as they are able to detect an existing version of the software and offer the user the option of uninstalling the existing product. MSI files do not have this ability and will instruct the user to use the Add/Remove Programs on the Control Panel to remove the existing product first.

In many situations, the EXE packaging combined with pre-configured command-line options would be sufficiently error-proof, especially if /qb is used. The /qb option has the often-desirable effect of eliminating dialogs from the GUI that enable the user to override how the product is installed.

The only problem with using the EXE arises when you need to deploy an unattended installation/upgrade. There is no way to instruct the EXE to uninstall the existing version without first prompting the user

what are Cookies

Some Web sites store information in a small text file on your computer. This file is called a cookie.

A cookie is a file created by an Internet site to store information on your computer, such as your preferences when visiting that site. For example, if you inquire about a flight schedule at an airline's Web site, the site might create a cookie that contains your itinerary. Or it might only contain a record of the pages you looked at within the site you visited, to help the site customize the view for you the next time you visit.

Cookies can also store personally identifiable information. Personally identifiable information is information that can be used to identify or contact you, such as your name, e-mail address, home or work address, or telephone number. However, a Web site only has access to the personally identifiable information that you provide. For example, a Web site cannot determine your e-mail name unless you provide it. Also, a Web site cannot gain access to other information on your computer.

Once a cookie is saved on your computer, only the Web site that created the cookie can read it.

Blue Screen Error


BLUE SCREEN ERROR
If you’ve run Windows for some amount of time, then it’s very likely you’ve encountered the Windows XP blue screen error. There are a lot of likely causes, considering how prone Windows can be to force itself into a Blue Screen of Death.
Every time Windows encounters a critical error that it can’t recover from, it’ll post a blue screen. Often, a simple reboot can solve the problem. However, if a reboot doesn’t fix it, it can be a more serious error.
Blue Screen Error Causes
Blue screen errors are usually caused by these 4 problems:
  • Missing or outdated drivers. Device driver errors are the common cause for blue screens.
  • Temperature / overheating problems.
  • Damaged or faulty hardware.
  • Viruses and other malicious programs.
In order to more efficiently troubleshoot the error, you’ll want to download the code that the blue screen message gives to you.
If you’re having trouble writing down the code before the system restarts, you can disable the reboot by doing the following:
  • Go to your Control Panel (Start > Setting > Control Panel)
  • Select System and Maintenance > System
  • Choose Advanced System Settings
  • Under Startup and Recovery, select Settings
  • Disable the Automatic Restart under System Failure setting
Fixes for Blue Screen Causes
  • Drivers: Update your drivers and make sure you have all necessary drivers for any new hardware. It’s also a good idea to download any Windows updates, if there are any.
  • Temperature: Your system temp should be about 33 degrees Celsius when idle. You can check your temp in the BIOS. If you are having temperature problems, make sure all your equipment is clean and that there is a decent current flowing through your tower.
  • Damaged hardware: You’ll need to troubleshoot each device to see which one is causing the error. If possible, switch them in and out to a known working machine.
  • Viruses: Boot into Windows under Safe Mode and run a trusty antivirus (do a deep scan, including archived files).

If BlackBerry not synchronizing emails

Firstly, we can create a backup on a pc and wipe out device contents,
Security Options - General Settings - Menu - Wipe Handheld, and type password as "blackberry". The device will then restart. Now we need to reactivate BB,
Options - Advanced Options - Enterprise Activation,
You need a username and password to proceed. Username is your email address and re-activation password  can be generated through BlackBerry server by searching the user and right click and set Activation password . This should fix the issue.

Backup Types


Backup Types

Full / Normal Backup: Take the backup of everything in the system.
Incremental Backup : Take backup of only those files which are previously changed since Last Backup. That Last Backup is any type of backup either Full Backup or incremental or Differential Backup.
Differential Backup : Take Backup of Files which are modify since last Full backup. After take the full backup if incremental backup will done but differential backup take Change made from Last Full Backup.   

Diffrence Between 32Bit and 64 Bit

Advantages when you install a 64-bit version of Windows Vista

• Increased memory support beyond that of the 4-GB addressable memory space that is available in a 32-bit operating system
• Increased program performance for programs that are written to take advantage of a 64-bit operating system
• Enhanced security features

At 8gb of ram, how much of a page file is needed

You should always have some pagefile. Even if its only a couple of hundred MB as some apps will specifically want to page to disk

Part of the O/S Kernel is still paged onto the hard disk, the above registry edit DisablePagingExecutive' prevents windows doing that.

Wednesday, November 16, 2011

Ms Outlook PST File Size Limit

Outlook 97, Outlook 98, Outlook 2000, Outlook 2002 Size 2Gb
outlook 2007- 20Gb
Outlook 2010 - 50 Gb

Monday, November 14, 2011

Diffrence Between winxp and win7

New fetuews in windows 7
1.IPV6
2.IE 8.0
3.Bitdefender is built in in win7 to protect pc from instant attack of adware malware
4.windows firewall is separated as public and private.
5.windows powershell V2 is inbuild.
6.credential manager: you can backup all usernames and passwords.
7. Auro snap: In task bar you can view all minimizes windows snap.
8.windows xp mode: visually use winxp, because some xp applications cannot run on win 7.
9.win7 installation is 32 Bit, xp is 16 bit. so compare to xp win7 installation is fast.
10.win 7 has automatic driver detect option such as like VGA and audio etc.
11.Speech recognition feature to win 7. You can handle and run pc by speaking in mic
12. DirectX 11
Windows XP only supports up to DirectX 9.0c version only. If you’re a gamer and always update to the new game, so it’s good to be change windows 7 because the game more new games using DirectX 10 and DirectX
13.Aero Desktop
Aero desktop is a collection for display desktop windows 7 to look more attractive, as also mentioned aero glass that gives a transparent effect of the display windows.


Saturday, November 12, 2011

diffrence between .msi and .exe file

MSI Stand for Microsoft Installer (file extension) 1.EXE stand for Executable File

The same file that installs the program and also uninstalls 2.Two different EXE available to do install and
program . uninstall. 

EXE files are the preferred method for installing our software, as they are able to detect an existing version of the software and offer the user the option of uninstalling the existing product. MSI files do not have this ability and will instruct the user to use the Add/Remove Programs on the Control Panel to remove the existing product first.

In many situations, the EXE packaging combined with pre-configured command-line options would be sufficiently error-proof, especially if /qb is used. The /qb option has the often-desirable effect of eliminating dialogs from the GUI that enable the user to override how the product is installed.

The only problem with using the EXE arises when you need to deploy an unattended installation/upgrade. There is no way to instruct the EXE to uninstall the existing version without first prompting the user