Wednesday, July 29, 2009

Windows Xp – Commands – Cpl list

Windows Xp – Commands – Cpl list
command is very useful, but sometimes it is forgotten. Use it sometimes and you will find how powerful is run command.












Accessibility Controls – access.cpl
Accessibility Wizard – accwiz
Add Hardware Wizard – hdwwiz.cpl
Add/Remove Programs – appwiz.cpl
Administrative Tools – control admintools
Automatic Updates – wuaucpl.cpl
Bluetooth Transfer Wizard – fsquirt

Calculator – calc
Certificate Manager – certmgr.msc
Character Map – charmap
Check Disk Utility – chkdsk
Clipboard Viewer – clipbrd
Command Prompt – cmd
Component Services – dcomcnfg
Computer Management – compmgmt.msc
Control Panel – control
Date and Time Properties – timedate.cpl
DDE Shares – ddeshare
Device Manager – devmgmt.msc
Direct X Troubleshooter – dxdiag
Disk Cleanup Utility – cleanmgr
Disk Defragment – dfrg.msc
Disk Management – diskmgmt.msc
Disk Partition Manager – diskpart
Display Properties – control desktop
Display Properties – desk.cpl
Dr. Watson System Troubleshooting Utility – drwtsn32
Driver Verifier Utility – verifier
Event Viewer – eventvwr.msc
Files and Settings Transfer Tool – migwiz
File Signature Verification Tool – sigverif
Findfast – findfast.cpl
Firefox – firefox
Folders Properties – control folders
Fonts – control fonts
Fonts Folder – fonts
Free Cell Card Game – freecell
Game Controllers – joy.cpl
Group Policy Editor (for xp professional) – gpedit.msc
Hearts Card Game – mshearts
Help and Support – helpctr
HyperTerminal – hypertrm
Iexpress Wizard – iexpress
Indexing Service – ciadv.msc
Internet Connection Wizard – icwconn1
Internet Explorer – iexplore
Internet Properties – inetcpl.cpl
Keyboard Properties – control keyboard
Local Security Settings – secpol.msc
Local Users and Groups – lusrmgr.msc
Logs You Out Of Windows – logoff
Malicious Software Removal Tool – mrt
Microsoft Chat – winchat
Microsoft Movie Maker – moviemk
Microsoft Paint – mspaint
Microsoft Syncronization Tool – mobsync
Minesweeper Game – winmine
Mouse Properties – control mouse
Mouse Properties – main.cpl
Netmeeting – conf
Network Connections – control netconnections
Network Connections – ncpa.cpl
Network Setup Wizard – netsetup.cpl
Notepad notepad
Object Packager – packager
ODBC Data Source Administrator – odbccp32.cpl
On Screen Keyboard – osk
Outlook Express – msimn
Paint – pbrush
Password Properties – password.cpl
Performance Monitor – perfmon.msc
Performance Monitor – perfmon
Phone and Modem Options – telephon.cpl
Phone Dialer – dialer
Pinball Game – pinball
Power Configuration – powercfg.cpl
Printers and Faxes – control printers
Printers Folder – printers
Regional Settings – intl.cpl
Registry Editor – regedit
Registry Editor – regedit32
Remote Access Phonebook – rasphone
Remote Desktop – mstsc
Removable Storage – ntmsmgr.msc
Removable Storage Operator Requests – ntmsoprq.msc
Resultant Set of Policy (for xp professional) – rsop.msc
Scanners and Cameras – sticpl.cpl
Scheduled Tasks – control schedtasks
Security Center – wscui.cpl
Services – services.msc
Shared Folders – fsmgmt.msc
Shuts Down Windows – shutdown
Sounds and Audio – mmsys.cpl
Spider Solitare Card Game – spider
SQL Client Configuration – cliconfg
System Configuration Editor – sysedit
System Configuration Utility – msconfig
System Information – msinfo32
System Properties – sysdm.cpl
Task Manager – taskmgr
TCP Tester – tcptest
Telnet Client – telnet
User Account Management – nusrmgr.cpl
Utility Manager – utilman
Windows Address Book – wab
Windows Address Book Import Utility – wabmig
Windows Explorer – explorer
Windows Firewall – firewall.cpl
Windows Magnifier – magnify
Windows Management Infrastructure – wmimgmt.msc
Windows Media Player – wmplayer
Windows Messenger – msmsgs
Windows System Security Tool – syskey
Windows Update Launches – wupdmgr
Windows Version – winver
Windows XP Tour Wizard – tourstart
Wordpad – write

Friday, July 24, 2009

Guidelines to be followed by the Systems Administrators / Operators of Computerised Offices:

Guidelines to be followed by the Systems Administrators / Operators of Computerised Offices:

. The server should be kept securely away from users to ensure security of data. The system administrator of MSSQL server has full rights on the operation of RDBMS. It is therefore, necessary that only the system administrator authorised performs the administrative functions and does not give the password to other operators. He should also change the password at regular intervals to ensure better security.

. Officials at each of the computerised SB offices have been trained as System administrators and they have been given administrative access to the Server at their respective offices. They have also been provided with the Superuser password in Sanchay post software. Even if more than one system Administrator as been trained in an office only one system administrator should be appointed for the Sanchay Post / Meghdoot application. He should be asked not to give the password of SQL Server to any other person but to keep it to himself: The System Administrators should also be instructed strictly not to use SQL Server Management tools such as Query Analyzer, Enterprise manager etc. but to use the front end application only. They should also ensure that no one else has access to SQL Server Tools, which can be used to tamper with databases.

. Day to day functioning, backup operations to tape and to harddisks in nodes & addition, deletion, modification of Users in Sanchay post software has been taught to the System Administrators. During visits it was noticed that backups are not being taken regularly. In case of any doubt they may contact the Project Officer (SB), Technology Section, Circle Office for clarification.

System Administrators to ensure:

_ That the clients connecting to the server should have only the client connectivity component of SQL server installed on them. Any other administrative tools such as the Query Analyzer, Enterprise Manager etc., if found installed in the clients, should be uninstalled

_ Removal of data entry modules for schemes which have been made online on all the nodes.

_ User rights allotted in Sanchay post should be post specific and a person should not be allotted both counter and supervisor rights. Group and Form access in online mode should be as per work distributions to counter users an, supervisors. They should not be assigned groups or forms which are no' handled by them to prevent misuse. The users should be given access to only the functions they perform and they should set their own password

_ Passwords should be official specific and not post specific. If there are five people who are likely to handle an operation over a period of time, individual user id should be created for each of them and under no circumstances should one individual log in with another's id

_ In the event of one's password becoming known to others one should reset h password immediately. If an individual makes his password public the risk lie with him. Full responsibility for misuse of his password would fall on him. All the entries and changes made in the application package are recorded along with the login name in a log.

_Enforce password change at regular intervals and minimum password length to ensure better security..

_ Supervisor's id should be at an appropriate level If more than one supervisor was to work owing to leave or training etc more ids can be created for each of the supervisors in the office.

_ Delete old or inactive accounts
People who have moved out of the computerised operation set up in a specific office should be removed from the user group without any loss of time.

_ Periodic backup should be taken without fall. The daily, weekly monthly backup copies should be kept in different places. (System administrator, Head of the office, Divisional office etc)

_ At least one copy of the backup should be kept in a building away from the office (offsite) to provide protection against location-specific catastrophes. Rotate tapes used for backup & replace tapes when its suspect.

_ For most computer activity, log on as a member of the Users or Power Users group. If you need to perform an administrator-only task, or configuring system parameters log on as an administrator, perform the task, and then log off

_ Server or any node connected to the Meghdoot/SB network should not be connected to the internet. Whenever Internet connection is needed, it should be given to a standalone node or an exclusive server meant for specific purpose like SPCC or track and trace.

_ Floppy drives in all the nodes have to be disconnected or disabled.

_ Antivirus software has to be installed in all the nodes.

_ When the service personnel makes a visit ensure he cleans the system interiors especially the CPU fans and SMPS fans.

_ During the initial installation of the server keep the following points in mind.

Separating the boot and system volumes
Put the Windows 2000 Server system and boot volumes and the data volumes on separate drives/or partitions. This greatly simplifies recovery if a disk is damaged.

Saving the disk configuration
Save the disk configuration data each time you change the configuration using Disk Management.

Keeping a written record
Keep a written record of disk volumes and their sizes to have during disk recovery. Attach this information to the front of each disk drive.

Make an Emergency Repair Disk

. Win2000 server - click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup. On the Welcome tab, click Emergency Repair Disk. Follow the instructions that appear on your screen.
. Winnt4.0 Server - Click start, click run and type rdisk to create Emergency Repair Disk.
Fault- Tolerance/Redundancy
Mirroring in server provides fault - tolerance at the disk drive physical level and limits unacceptable unscheduled downtime.

A list of Do's and Don'ts are enclosed for the benefit of LAN users.

Do's & Don'ts for Officials working on LAN

Do's

1. Use easily remembered passwords with sufficient complexity, which should be changed at frequent intervals.
To Chan2e password
Log on to the online module. Go to 'SetUp' menu. Select 'Set personal password', then type "current personal password'. Type new personal password and retype new password. Click on OK.

2. Backup your data every day. Keep three copies of the media (Tape/CD). Keep at least one copy offsite. A register has to be maintained for recording the following information. Date Name of the person taking backup, Type of Media (CD, Tape or Node) Counter Signature of the Postmaster.

3. Enforce logging out when the workstation is unattended for a significant period of time. All changes done to the database is recorded against your name. Use "lock screen" in setup menu when leaving workstation for a short while.

4. In case of problem follow the checklist given below for connecting to the server before
sending SOS. Follow the sequence of switching on
(a) UPS
(b) Hub
(c) Server (Wait for "Begin log on" screen with a message press Ctrl- Alt -Del to log on) (d) switch on nodes.

5. If when you double click on Sanchay Post icon, you get a message "Unable to connect to server. Do you want to correct." Click on "Yes". You will then be prompted for the server name. Type the server name and click" SAVE". You will obtain a message "Rerun Application" Now double click on the Online or data entry icon to enter Sanchay Post application package.

6. If there is some kind of 'system message' read it first, it solves most of the problems. If you have to report a problem, record the messages you get Telling someone that the message was something about a hardware error does not help the problem solver.

7. Request your system administrator or the system support personnel identified in your office to run a ) Scandisk b) Disk defragmenter utilities on the NODES once a month. This helps to make your files open quickly.. Both these utilities can be found in Start -Programs ¬Accessories -System Utilities - Scandisk or Disk defragmenter.

8. Keep the system and the table clean. Do not keep drink/water etc near keyboard or the system. Use dust covers to cover systems and printers after use. Clean system before use daily.

9. Make sure the computer table is stable and is not shaky.

Don'ts

10. Don't run any other application other than departmental Software on your systems.

11. Don't allow a third party to log in with your name & password. All the entries and changes made in the application package are entered in a log against your user name.

12. Even though an anti-virus program is installed and running on the systems, the anti-virus software installed will not catch latest viruses as there are new ones coming out. Hence floppies should not be used on the LAN systems.

13. Do not simply turn off your computer; instead use the correct shutdown process given
below.
Shut down Process in Nodes:
i) Exit the application software [Sanchay Post] in the nodes by clicking on quit.
ii) Go to Start button, Click on Shut down. You will get a screen "Shut down
windows". Select shut down from optiOP8 available and click on "OK".
ill) Wait till you get the message " It is now safe to shut down the computer" before
switching the computer of{

Shut down Process in Server:
Log on to the server and then follow step ii & iii as stated above.

14. Do not clutter computer work place with unnecessary things.

15. Do not keep stamping pads on computer table. The impact during stamping will cause irreversible harm to the delicate parts in the computer and printers. Always use a side table or stool for it.

16. Do not manually push-in the CD tray. Always use the open/close buttons of the CD-ROM drive to push CD's inside to prevent damage.

¬Security

Although we read more about security breaches coming from outside the network, most security attacks come from people inside the organization. Good security means that systems and user data is protected from attacks originating from inside as well as from outside. The points given below are to help you secure your network.

i)Physical Security

The danger posed by people physically entering your offices and tampering with computers is often overlooked. Unauthorised persons should not have physical access to a computer. To be safe servers should be placed in rooms that can be locked and then make sure to lock them during non-office hours. The server should be kept securely to ensure security of data.

if)Set appropriate access levels

a)Officials at each of the computerised offices have been trained as System administrators and they have been given administrative access to the Server at their respective offices. Even if more than one system Administrator has been trained in an office only one system administrator should be appointed for the Sanchay Post I Meghdoot application. System Administrator should be instructed not to give the password of SQL Server to any other person.

b)The system administrator has full rights on the operation of MSSQL Server and NT Server. It is therefore, necessary that only the system administrator authorised performs the administrative functions

c)Supervisor's id should be at an appropriate level. If more than one supervisor is to work owing to leave or training etc more ids can be created for each of the supervisors in the office.

d)User rights allotted in Sanchay post should be post specific and a person need not be allotted both counter and supervisor rights .

e)In respect of 'Point of Sale' there are 3 levels of users viz., counter, supervisor and system administrator. The users should have access to only the functions they perform and they can/should set their own password.

f)Maintaining Operating system and Database in a NTFS partition provides
the ability to limit network access based on user accounts and network¬ defined groups.

g)The nodes connected to the server should have only the client connectivity component of SQL server installed on them. Any other administrative tools such as the Query Analyzer, Enterprise Manager Etc., should not be installed.

h)Data entry modules for schemes which have been made online should be removed from all the nodes.

iii)Strictly enforce password policy
Passwords should be official specific and not post specific. If there are five people who are likely to handle an operation over a period of time, individual user id should be created for each of them and under no

a)circumstances should one individual log in with another's id. All the entries and changes made in the application package are recorded along with the login name in a log.

b)In the event of one's password becoming known to others one should be given a new id and password immediately. If an individual makes his password public the risk lies with him. Full responsibility for misuse of his password would fall on him.

c)Enforce password change at regular intervals and minimum password length to ensure better security.

d)Enforce 10ggir:Jg out when the workstation is unattended for a significant period of time. All changes done to the database is recorded against your name. Use "lock screen" in setup menu when leaving server for a short while.

iv)Fault - Tolerance / Redundancy

a)Mirroring in server provides fault - tolerance at the disk drive physical level and limits unacceptable unscheduled downtime.

b)Backup server. A spare machine in each of the LAN offices may be loaded with Windows NT 12000 and SQL Server 6.517.012000 as the case may be. In case of non availability of a spare system, a working node with win98 may be installed with WIN NT 12000 thereby enabling dual boot. In case of Server failure the above mentioned system can be utilized as a server with minimum downtime.

BackUp

Backup your data every day. Periodic backup is very essential. The daily, weekly monthly backup copies (Tapes\CD) should be kept in different places. Backup taken should be checked before being stored.

At least one copy of the backup should be kept in a building away from the office (off site) to provide protection against location-specific catastrophes. Rotate tapes used for backup & replace tapes when it is suspect.

Delete old or inactive accounts

People who have moved out of the computerised operation set up in a specific office should be removed from the user group without any loss of time.

Keep superuser access to a minimum

For most computer activity, log on as a member of the Users or Power Users group. If you need to perform an administrator-only task, or configuring system parameters log on as an administrator, perform the task, and then log off.

As we do not have a firewall & Intrusion Detection Systems installed in our networks, any node connected to the Meghdoot/SB network should not be connected to the internet. Whenever Internet access is essential, it should be given to a standalone node or an exclusive server meant for specific purpose like Speed Post or track and trace.

Antivirus software should be installed in all the nodes. Even though an anti-virus program is installed and running on the systems, the anti-virus software installed will not catch latest viruses as there are new ones coming out and hence, floppy drives in all the nodes should be disconnected or disabled.

Do not run any other application other than departmental Software on your systems.

Monday, July 20, 2009

Commands in Windows Vista

Windows Vista Command Line List and Reference

The list of commands available in the command line shell for Windows Vista is similar to that for Windows XP but with some additions. The commands and a brief explanation of their functions are given. Some tips for their use are given on another page.
Commands in Windows Vista

Originally, Microsoft intended to incorporate a new command shell in Vista but then decided to make the new shell a stand-alone application. The new application is called Powershell and is described on another page. Thus, the old command interpreter cmd.exe has been continued although in a slightly newer version. (The Vista version is 6.0 whereas the XP version is 5.1.) Several commands are now in the standard list that were formerly available only in Support Tools or the Server 2003 Tools. For example, Robocopy from Server 2003 is now included. There are also some new commands and they are indicated with an asterisk in the list below. Note that some commands may require administrator privileges. Running a command prompt as administrator is described on this page. Some commands involving specialized system or network administration have been omitted.

ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
*BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
*CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
*CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
*CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files.
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.
DEL Deletes one or more files.
DIR Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
DISKCOPY Copies the contents of one floppy disk to another.
DISKPART Displays or configures Disk Partition properties.
DOSKEY Edits command lines, recalls Windows commands, and creates macros.
DRIVERQUERY Displays current device driver status and properties.
ECHO Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE Deletes one or more files.
EXIT Quits and closes the command shell.
EXPAND Expands one or more compressed files.
FC Compares two files or sets of files, and displays the differences between them.
FIND Searches for a text string in a file or files.
FINDSTR Searches for strings in files.
FOR Runs a specified command for each item in a set.
*FORFILES Selects files in a folder for batch processing.
FORMAT Formats a disk for use with Windows.
FSUTIL Displays or configures the file system properties.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Directs the Windows command interpreter to a labeled line in a batch program.
GPRESULT Displays Group Policy information for machine or user.
GRAFTABL Enables Windows to display an extended character set in graphics mode.
HELP Provides Help information for Windows commands.
*ICACLS Display, modify, backup, or restore ACLs for files and directories (more here).
IF Performs conditional processing in batch programs.
LABEL Creates, changes, or deletes the volume label of a disk.
MD Creates a directory.
MKDIR Creates a directory.
*MKLINK Creates Symbolic Links and Hard Links
MODE Configures a system device.
MORE Displays output one screen at a time.
MOVE Moves one or more files from one directory to another directory.
OPENFILES Queries, displays, or disconnects open files or files opened by network users.
PATH Displays or sets a search path for executable files.
PAUSE Suspends processing of a batch file and displays a message.
POPD Restores the previous value of the current directory saved by PUSHD.
PRINT Prints a text file.
PROMPT Changes the Windows command prompt.
PUSHD Saves the current directory then changes it.
RD Removes a directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Designates comments (remarks) in batch files
REN Renames a file or files.
RENAME Renames a file or files.
REPLACE Replaces files.
RMDIR Removes a directory.
ROBOCOPY Advanced utility to copy files and directory trees
SET Displays, sets, or removes environment variables for current session.
SETLOCAL Begins localization of environment changes in a batch file.
SETX Sets environment variables.
SC Displays or configures services (background processes).
SCHTASKS Schedules commands and programs to run on a computer.
SHIFT Shifts the position of replaceable parameters in batch files.
SHUTDOWN Allows proper local or remote shutdown of machine.
SORT Sorts input.
START Starts a separate window to run a specified program or command.
SUBST Associates a path with a drive letter.
SYSTEMINFO Displays machine specific properties and configuration.
*TAKEOWN Allows an administrator to take ownership of a file (more here).
TASKLIST Displays all currently running tasks including services.
TASKKILL Kill or stop a running process or application.
TIME Displays or sets the system time.
*TIMEOUT Pauses the command processor for the specified number of seconds.More here.
TITLE Sets the window title for a CMD.EXE session.
TREE Graphically displays the directory structure of a drive or path.
TYPE Displays the contents of a text file.
VER Displays the Windows version.
VERIFY Tells Windows whether to verify that your files are written correctly to a disk.
VOL Displays a disk volume label and serial number.
*VSSADMIN Volume Shadow Copy Service administration tool
*WHERE Displays the location of files that match a search pattern.
XCOPY Copies files and directory trees.
WMIC Displays WMI information inside interactive command shell

Saturday, July 18, 2009

Full Screen Command Prompt in Vista

Full Screen Command Prompt in Vista

Q: Is there any way I can get DOS applications to run with full screen under Windows Vista? I am a retired consultant from way back. I wrote many applications under DOS since that was the only operating system available. Although I am retired, to this day, I still maintain these systems with the people I developed them for. I have been able to get my DOS applications to run fine (with full screen) through Windows 3.1, Windows 95, Windows 98, and Windows XP. I now have a new laptop I purchased with Windows Vista. I have not been able to get my DOS applications to run with full screen on my systems. I have tried whatever was suggested, such as installing DOSBOX and Virtual PC, without any success. I hope you can help me as Microsoft doesn't deem this an important enough problem. - Anthony Lombardo.

A: Here's one technique for opening Command Prompt in full-screen mode. It's rather odd but I've verified that it works.

Click Start and type CMD, but don't hit enter or click on cmd.exe.
Right-click cmd.exe above and choose Run as administrator.
Respond to the UAC prompt.
In the command prompt enter WMIC--you'll get a different prompt for Windows Management Instrumentation Control (but you're not going to actually DO anything with WMI).
Click the normal maximize button at top right. The Command Prompt window will fill the screen.
Enter EXIT to exit WMIC.
Right-click the Command Prompt's title bar, choose Properties, click OK.
Enter EXIT to exit the Command Prompt.
From now on Command Prompt will open at a size that fills the screen. It accomplishes this by as many rows and columns of characters as necessary to fill the screen. If that's not the kind of full-screen you wanted, you can put Command Prompt back to normal thus:

Right-click its and choose Properties.
Click the Layout tab
Set Screen Buffer Size's Width to 80
Set Window Size Width to 80
Set Window Size Height to 25
Click OK
I'm guessing that what you really want is to have the command prompt literally fill the screen without changing its 80x25 layout. In XP you can toggle this mode by pressing Alt+Enter. Doing that in Vista just gets you a message "This system does not support full-screen mode". And it's true; the Windows Vista Display Driver Model (WDDM) precludes support of the necessary video mode.

There is a kind of solution, and it's even recommended by Microsoft. They suggest replacing the driver for your graphics card with the equivalent XP video driver. You'll lose the ability to run Vista's spiffy Aero interface if you do so, but you'll gain back the ability to run full-screen DOS programs.

Tuesday, July 14, 2009

SANCHAYPOST PASSBOOK PRINTER INSTALLATION & CONFIGURATION

PassBook - Printer Settings
1. Press station 1 + local +station2 & ON the printer (30sec)& insert the paper.
2. it shows station1=continue,station2=skip,local=config
3. Press local, it shows Menu : config
4.. Press station1 to continue until the printer name display as OLEVETTI
5. Press station2, the display changes to IBM
6. continue press station1 button until it displays save changes to Y
7. switch off the printer and swith on
Add New PASSBOOK PRINTER(It is for COM1 / Serial Port)
Start -> Setting -> printer -> Add Priner -> next -> Local Printer -> Next -> Select COM1 - Serial port -> Manufacturer ( IBM) -> Printers ( IBM Pro Printer 1 or 2) Give Name as ( PASSBOOK PRINTER) -> Next -> Next -> Finsih
* for Vista OS : Select Gereric -> 9 Pin Compatible Wide
Papper Settings:
Printer and Fax (Inside the Window) Right Click in the Blank space -> Server Properties -> Tick on the Create New Form -> Form Name ( give name as "PASSBOOK" ) -> Measurement ( in Inch)Width: 8.20 Left : 0.20 Top : 0.70Hight : 5.80 Right: 0.00 Bottom : 0.20
Save
Right Click Installed PASSBOOK PRINTER-> Properties -> 1. Devise Setting -> Select PASSBOOK and Apply2. Devise Setting -> Printing Preferences -> Advanced -> Select Paper size PASSBOOK3. Right Click -> properties -> Ports -> COM1 -> configure port -> Flow Control -> Xon / Xoff -> Apply -> OK
Set as " PASSBOOK PRINTER " as DefaultTry to Print SB Passbook Best

Thursday, July 2, 2009

How to Enable Or Disable Redistry Editor ?

Enable Registry Editor - First Method:
Click Start -> Run. Type this commands in Run box and press Ok.
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0
Then a prompt will come up with this question: Value DisableRegistryTools exists, overwrite (Y/N)? Type yes and hit Enter.

Enable Registry Editor - Second Method:
Click Start -> Run -> gpedit.msc -> User Configuration -> Administrative Templates -> System -> Prevent access to registry editing tools -> Right Click Properties -> Set it to Not Configured


Disable Registry Editor - First Method:
Click Start -> Run. Type this commands in Run box and press Ok.
REG add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1
Then it will also come up with the question: Value DisableRegistryTools exists, overwrite (Y/N)? Type yes and hit Enter.

Disable Registry Editor - Second Method:
Click Start -> Run -> gpedit.msc -> User Configuration -> Administrative Templates -> System -> Prevent access to registry editing tools -> Right Click Properties -> Set it to Not Configured
Alasan Memilih Bergabung di Pulsagram Allowances Announcements APLIKASI HP APLIKASI PC Banking bisnis internet BISNIS ONLINE BOLA BSNL Business Cara Buat Akun Liberty Reserve (LR) Cara Daftar Di Neobux Cara kerja Copy Paste Cara mendapatkan uang dari duitbux Cara Mendapatkan Uang dari Facebook Melalui Like To Cash Cara Mudah Cari Dollar Via Donkeymails Cara mudah dapat uang melalui internet dengan Dollarsincome CEA CGHS Computer Guidelines Customer Care dapat dollar gratis Dollar Dari Clicksense Dollar Dari Neobux dollar gratis DOP News DOP Orders DOPT Orders DOWNLOAD Education Employees News Employment News Entertainments Events Exam / Result Exam / Syllabus FACEBOOK FAQ For System Administrators Forms GDS General Informations General Knowledge GOVT Orders Guidelines Hardwares Health Tips Holiday Home Honorarium / Incentives Income Tax INFO KITA Info Lowongan Kerja Internet Tips IPO JOB COPAS Jual KERJA COPY PASTE Kerja Sampingan Kode Bank Indonesia Latest Software Updates Leave Rules Lowongan kerja aman Lowongan kerja copy paste LOWONGAN KERJA ONLINE LTC MACP Mails MASTER BURUNG Membuat Account PayPal Menaikkan atau menurunkan berat badan dengan Herbalife Menghasilkan Uang dari PTC Lokal Wisbux Mobile Tips National Pension System (NPS) Network Trouble shooting News Obat Pemutih Gigi Membuat Gigi Putih Berseri Pay Commission Pension Persmin Pie Susu Bali Paling Enak dan Asli Yah Merek Kami... PLI and RPLI PointOfSale Postal Informations Postal Savings Schemes Printer Trouble shooting Printing Tips Project Arrow ptc terpercaya Questions / Answers Railway Recovery Tips Registry Tips Registry Tools Reimbursement rental mobil di surabaya RMS Rulings SanchayPost Savings Scheme SB Orders SBCO Security Guidelines Security Tips sewa mobil di surabaya Software Tips Softwares SQL Staffs and Welfare Tanya - Jawab Technology TEMPLATE Testimoni Tips and Tricks TN - தமிழ்நாடு Tools Training Transfer / Postings Trouble shooting UnCategorized Union News Useful Softwares Utilities Verifikasi PayPal tanpa Credit Card Virus Solutions Websites windows 7 Windows Server Windows Tips Windows Vista wootekh biolo slimming capsule wsc biolo world slimming capsule biolo