Kamis, 13 Maret 2008

Windows Server 2003 - Changing group memberships

A group is a collection of users that you can use to simplify the administration of user permissions and rights. In addition, you can use a group to delegate administrative tasks, filter Group Policy settings, and create e-mail distribution lists. Users belonging to a particular group receive all the permissions and rights assigned to that group. By changing group memberships for a user, you can quickly change the resources to which that user has access, as well as the tasks delegated to the user and the Group Policy settings that apply to the user. You can change the membership of Active Directory groups to change users’ permissions and rights within a domain or forest. You can also change the membership of local groups to change users’ permissions and rights on a specific computer.

Some of the most common tasks are adding or removing members from Active Directory groups and adding or removing members from groups on a local computer. You can also use the command line to change group memberships, either in a domain or on a local computer. For more information about other tasks for managing group memberships in a domain, see Manage groups. For more information about other tasks for managing group memberships on a local computer, see Manage local groups.

To add or remove a member from an Active Directory group
1. Open 'Active Directory Users and Computers'.
2. In the console tree, double-click the domain node.
3. Click the folder that contains the group to which you want to add or remove a member.
4. In the details pane, right-click the group, and then click Properties.
5. Click the Members tab, and then do one of the following:
- To add a member to a group, click Add. In Enter the object names to select, type the name of the user, group, or computer that you want to add to the group, and then click OK.
- To remove a member from a group, click the member you want to remove, and then click Remove.

Notes
- To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- To open Active Directory Users and Computers, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Active Directory Users and Computers.
- In addition to users and computers, groups can include contacts and other groups.
- To add members to a group, you can click the members you want to add, click on the toolbar, and then type the name of the group to which they will be added. You can also drag a member object to a group, or right-click the object, and then click Add to a group from the shortcut menu.
- When you administer a domain, security principals in the parent domain or other trusted domains are not visible on the Member Of tab of a domain users properties. The only domain accounts that you can add or view are the present domain groups. Only domain groups in the present domain are shown, even if the member belongs to other trusted domain groups.

To add or remove a member from a group on a local computer
1. Open 'Computer Management'
2. In the console tree, click System Tools>Local Users and Groups>Groups.
3. Right-click the group to which you want to add or remove a member and click Properties.
4. Do one of the following:
- To add a member to a group, click Add. In Enter the object names to select, type the name of the user, group, or computer that you want to add to the group, and then click OK.
- To remove a member from a group, click the member you want to remove, and then click Remove.

Notes
- To perform this procedure, you must be a member of the Account Operators group, Domain Admins group, or the Enterprise Admins group in Active Directory, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.
- To open Computer Management, click Start, point to Settings, click Control Panel, double-click Administrative Tools, and then double-click Computer Management.
- A user who belongs to a group has all the rights and permissions granted to that group. If a user is a member of more than one group, then the user has all the rights and permissions granted to every group he or she belongs to. For more information, see Understanding local groups.
- You should not add a new user to the Administrators group unless the user will perform only administrative tasks. For more information, see Why you should not run your computer as an administrator.
- If the computer participates in a domain, you can add user accounts and global groups from that domain and from trusted domains to a local group.

From: Help and Support Center - Windows Server 2003, Standard Edition

Windows Server 2003 - Backing up and restoring data

The Backup utility helps you protect data from accidental loss if your system’s hardware or storage media fails. For example, you can use Backup to create a duplicate copy of the data on your hard disk and then archive the data on another storage device. The backup storage medium can be a logical drive such as your hard disk, a separate storage device such as a removable disk, or an entire library of disks or tapes organized and controlled by a robotic changer. If the original data on your hard disk is accidentally erased or overwritten, or becomes inaccessible because of a hard disk malfunction, you can easily restore the data from the archived copy.

Two of the most common tasks are backing up files to a file or tape and restoring files from a file or tape. You can also back up data from the command line. For more information about other tasks for backing up and restoring data.

To back up files to a file or tape
1. Open Backup.
The Backup or Restore wizard starts by default, unless it is disabled. You can use this wizard or go to the next step to work in Advanced Mode.
2. Click the Advanced Mode link on the Backup or Restore wizard.
3. Click the Backup tab, and then on the Job menu, click New.
Select the files and folders you want to back up by clicking the box to the left of a file or folder in Click to select the check box for any drive, folder, or file that you want to back up.
5. In Backup destination, do one of the following:
- Choose File if you want to back up files and folders to a file. This is selected by default.
- Choose a tape device if you want to back up files and folders to a tape.
6. In Backup media or file name, do one of the following:
- If you are backing up files and folders to a file, type a path and file name for the backup (.bkf) file, or click the Browse button to find a file.
- If you are backing up files and folders to a tape, choose the tape you want to use.
7. Select any backup options you want, such as the backup type and the log file type, by clicking the Tools menu, and then clicking Options. When you have finished selecting backup options, click OK.
8. Click Start Backup, and then make any changes to the Backup Job Information dialog box.
9. If you want to set advanced backup options such as data verification or hardware compression, click Advanced. When you have finished setting advanced backup options, click OK.
10.Click Start Backup to start the backup operation.

Caution
- You can use Backup to back up and restore data on FAT16, FAT32, or NTFS volumes. However, if you have backed up data from an NTFS volume, it is recommended that you restore the data to an NTFS volume of the same version to prevent losing data. Some file systems might not support all of the features of other file systems.

Notes
- To perform this procedure, you must be a member of the Administrators or Backup Operators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
- To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.
- If the Backup or Restore wizard does not start by default, you can still use it to back up files by clicking Wizard Mode on the Welcome tab.
- To back up and restore Microsoft SQL Server database files, it is recommended that you use the built-in backup and restore utilities that SQL has. For more information, see the Microsoft SQL Server documentation.
- Some tape drives may not support hardware compression.
- System State data contains most elements of a system’s configuration, but it might not include all of the information that you require to recover your system from a failure. Therefore, it is recommended that you back up all boot and system volumes, including the System State, when you back up your system.
- You can only back up the System State data on a local computer. You cannot back up the System State data on a remote computer.
- Backup files usually have the extension .bkf. You can use any extension you like, but it is highly recommended that you use .bkf which has file associations that will ensure that the backup file is recognizable.
- Backup operators and administrators can back up and restore encrypted files and folders without decrypting the files or folders.
- If you have Windows Media Services running on your computer, and you want to back up the files associated with these services, see "Running Backup with Windows Media Services" in the Windows Media Services online documentation. You must follow the procedures outlined in the Windows Media Services online documentation before you can back up or restore files associated with Windows Media Services.

To restore files from a file or tape
1. Open Backup.
The Backup or Restore wizard starts by default, unless it is disabled.
2. Click the Advanced Mode link on the Backup or Restore wizard.
3. Click the Restore and Manage Media tab, in Click to select the check box for any drive, folder, or file that you want to restore, select the files and folders you want to restore by clicking the box to the left of a file or folder.
4. In Restore files to, do one of the following:
- Click Original location if you want the backed up files and folders to be restored to the folder or folders they were in when they were backed up. Skip to step 6.
- Click Alternate location if you want the backed up files and folders to be restored to a folder that you designate. This option will preserve the folder structure of the backed up data; all folders and subfolders will appear in the alternate folder you designate.
- Click Single folder if you want the backed up files and folders to be restored to a folder that you designate. This option will not preserve the folder structure of the backed up data; the files will appear only in the folder that you designate.
5. If you selected Alternate location or Single folder, type a path for the folder under Alternate location, or click the Browse button to find the folder.
6. On the Tools menu, click Options, click the Restore tab, and then do one of the following:
- Click Do not replace the file on my computer if you do not want the restore operation to copy over files that are already on your hard disk.
- Click Replace the file on disk only if the file on disk is older if you want the restore operation to replace older files on your disk with newer files from your backup.
- Click Always replace the file on my computer if you want the restore operation to replace files on your disk regardless of whether the backup files are newer or older.
- Click OK to accept the restore options you have set.
7. Click Start Restore.
8. If you want to change any of the advanced restore options, such as restoring security settings and junction point data, click Advanced. When you are done setting advanced restore options click OK.
9. Click OK to start the restore operation.

Caution
- Choosing Always replace the file on my computer could cause you to lose data if a file you are working on is contained in the backup.
- You can use Backup to back up and restore data on FAT16, FAT32, or NTFS volumes. However, if you have backed up data from an NTFS volume, it is recommended that you restore the data to an NTFS volume of the same version to prevent losing data. Some file systems might not support all of the features of other file systems.

Notesx
- To perform this procedure, you must be a member of the Administrators or Backup Operators group on the local computer, or you must have been delegated the appropriate authority. If the computer is joined to a domain, members of the Domain Admins group might be able to perform this procedure. As a security best practice, consider using Run as to perform this procedure.
- To start Backup, click Start, point to Programs, point to Accessories, point to System Tools, and then click Backup.
- You can also use the Restore wizard to restore files by clicking Restore Wizard on the Tools menu.
- To back up and restore Microsoft SQL Server database files, it is recommended that you use the built-in backup and restore utilities that SQL has. For more information, see the Microsoft SQL Server documentation.
- In order to restore the System State data on a domain controller, you must first start your computer in Directory Services Restore Mode. This will allow you to restore the SYSVOL directory and the Active Directory directory service database.
- You can only restore the System State data on a local computer. You cannot restore the System State data on a remote computer.
- Backup operators and administrators can back up and restore encrypted files and folders without decrypting the files or folders.

From: Help and Support Center - Windows Server 2003, Standard Edition

Windows Server 2003 - Step-by-step guides for deployment

The Microsoft Web site provides tutorials that you can use to learn about and deploy the operating system. These technical walkthroughs provide step-by-step instructions and illustrations for installing and configuring key features.

You can access the Step-by-Step Guides at the Microsoft Web site(http://www.microsoft.com/).

The following list includes some of the topics that you can find in these guides:

Infrastructure
- Building a common network infrastructure

Active Directory
- Setting up additional domain controllers
- Delegating control of objects
- Managing Active Directory
- Managing replication topology
- Using LDAP and VBScript to manage Active Directory
- Extending Active Directory using the Schema and display specifiers

Management service
- Understanding Group Policy
- Managing remote installation of the operating system
- Managing application deployments for groups of users and computers
- Managing user data and user settings

Security services
Setting up and configuring certificates
- Setting up a certification authority
- Configuring a domain to trust an external certification authority
- Managing Certificate Services
- Obtaining and managing certificates
- Configuring automatic certificate requests

Using certificates
- Requesting certificates using Web pages
- Mapping certificates to user accounts to be used on a Web site

Additional security features
- Configuring local security policy on individual computers
- Managing security in an enterprise network
- Encrypting files
- Using Kerberos V5
- Encrypting IP network traffic using Internet Protocol security (IPSec)

File and print services
- Creating logical views of directories and files

Clustering
- Installing a typical two-node cluster on Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition

From: Help and Support Center - Windows Server 2003, Standard Edition

Rabu, 12 Maret 2008

Windows XP Symbol (C)

cable modem
A device that enables a broadband connection to the Internet by using cable television infrastructure. Access speeds vary greatly, with a maximum throughput of 10 megabits per second (Mbps).

cache
For DNS and WINS, a local information store of resource records for recently resolved names of remote hosts. Typically, the cache is built dynamically as the computer queries and resolves names. It also helps optimize the time required to resolve queried names.

cache file
A file used by the Domain Name System (DNS) server to preload its names cache when service is started. Also known as the root hints file because DNS uses resource records stored in this file to help locate root servers that provide referral to authoritative servers for remote names. For Windows DNS servers, the cache file is named Cache.dns and is located in the %SystemRoot%\System32\Dns folder.

caching
The process of temporarily storing recently used data values in a special pool in memory for quicker subsequent access. For DNS, typically the ability of the DNS server to store information learned about the DNS namespace during the resolution of DNS queries. (For example, the DNS server can cache DNS records received from other DNS servers.) Caching is also available through the DNS Client service as a way for DNS clients to keep a cache of information learned during recent queries.

caching resolver
A client-side DNS name resolution service that performs caching of recently learned DNS domain name information. The caching resolver service provides system-wide access to DNS-aware programs for resource records obtained from DNS servers during processing of name queries. Cached data is used for a limited period of time and aged according to the active Time-to-Live (TTL) value. You can set the TTL individually for each resource record (RR). Otherwise, it defaults to the minimum TTL set in the SOA RR for the zone.

callback number
The number that a remote access server uses to call back a user. This number can be preset by the administrator or specified by the user at the time of each call, depending on how the administrator configures the user's callback options. The callback number should be the number of the phone line to which the user's modem is connected.

callback security
A form of network security in which a remote access server calls a user back at a preset number after the user has made an initial connection and has been authenticated.

called subscriber ID (CSID) string
A string that specifies the called subscriber ID transmitted by the receiving fax machine when receiving an inbound fax. This string is usually a combination of the fax or telephone number and the name of the business. It is often the same as the transmitter subscriber ID.

canonical (CNAME) resource record
A resource record used to map an alternate alias name to a primary canonical DNS domain name used in the zone.

canonical name
An object's distinguished name presented with the root first and without the LDAP attribute tags (such as: CN=, DC=). The segments of the name are delimited with forward slashes (/). For example,

CN=MyDocuments,OU=MyOU,DC=Microsoft,DC=Com

is presented as

microsoft.com/MyOU/MyDocuments

in canonical form.

cartridge font
A font contained in a plug-in cartridge and used to add fonts to laser, ink-jet, or high-end dot-matrix printers. Cartridge fonts are distinguished both from internal fonts, which are contained in ROM in the printer and are always available, and from downloadable (soft) fonts, which reside on disk and which can be sent to the printer as needed.

cascading hubs
A network configuration in which hubs are connected to other hubs.

catalog
For Indexing Service, a collection of all index information and stored properties for a particular group of file system directories. By default, Indexing Service indexes the System and Web catalogs on your hard drive.

CD-R
Recordable compact disc. Data can be copied to the CD on more than one occasion; however, data cannot be erased from the CD.

CD-RW
Rewritable compact disc. Data can be copied to the CD on more than one occasion and can be erased.

certificate
A digital document that is commonly used for authentication and secure exchange of information on open networks, such as the Internet, extranets, and intranets. A certificate securely binds a public key to the entity that holds the corresponding private key. Certificates are digitally signed by the issuing certification authority and can be issued for a user, a computer, or a service. The most widely accepted format for certificates is defined by the ITU-T X.509 version 3 international standard.

certificate revocation list (CRL)
A document maintained and published by a certification authority that lists certificates that have been revoked.

certificate store
Typically, a permanent storage where certificates, certificate revocation lists, and certificate trust lists are stored.

certificate template
A Windows construct that profiles certificates (that is, it prespecifies the format and content) based on their intended usage. When requesting a certificate from a Windows enterprise certification authority (CA), certificate requestors are, depending on their access rights, able to select from a variety of certificate types that are based on certificate templates, such as User and Code Signing.

certificate trust list (CTL)
A signed list of root certification authority certificates that an administrator considers reputable for designated purposes, such as client authentication or secure e-mail.

certification authority (CA)
An entity responsible for establishing and vouching for the authenticity of public keys belonging to users (end entities) or other certification authorities. Activities of a certification authority can include binding public keys to distinguished names through signed certificates, managing certificate serial numbers, and certificate revocation.

certification hierarchy
A model of trust for certificates in which certification paths are created by means of the establishment of parent-child relationships between certification authorities.

certification path
An unbroken chain of trust, consisting of certificates from trusted certificate authorities, from a specific certificate to the root certification authority in a certification hierarchy.

Challenge Handshake Authentication Protocol (CHAP)
A challenge-response authentication protocol for PPP connections documented in RFC 1994 that uses the industry-standard Message Digest 5 (MD5) one-way encryption scheme to hash the response to a challenge issued by the remote access server.

channel
A path or link through which noncontrol information passes between two devices. A single Basic Rate Interface (BRI) connection, for example, has one physical connection but two channels for exchanging information between devices. This is often called a bearer channel, implying a channel that carries information.

On the Internet, a Web site designed to deliver content from the Internet to your computer, similar to subscribing to a favorite Web site.

CHAP (Challenge Handshake Authentication Protocol)
An authentication protocol used by Microsoft remote access and Network Connections. Using CHAP, a remote access client can send its authentication credentials to a remote access server in a secure form. Microsoft has created a Windows-specific variant of CHAP called MS-CHAP.

character mode
A display mode in which the monitor can display letters, numbers, and other text characters, but no graphical images or character formatting (italics, superscript, and so on).

checkpoints
See definition for: Restore Point
child object
An object that resides in another object. A child object implies relation. For example, a file is a child object that resides in a folder, which is the parent object.

Class A IP address
A unicast IP address that ranges from 1.0.0.1 through 126.255.255.254. The first octet indicates the network, and the last three octets indicate the host on the network.

Class B IP address
A unicast IP address that ranges from 128.0.0.1 through 191.255.255.254. The first two octets indicate the network, and the last two octets indicate the host on the network.

Class C IP address
A unicast IP address that ranges from 192.0.0.1 to 223.255.255.254. The first three octets indicate the network, and the last octet indicates the host on the network. Network Load Balancing provides optional session support for Class C IP addresses (in addition to support for single IP addresses) to accommodate clients that make use of multiple proxy servers at the client site.

classical IP over ATM (CLIP)
A proposed Internet standard, described in RFC 2225, that allows IP communication directly on the ATM layer, bypassing an additional protocol (such as Ethernet or Token Ring) in the protocol stack.

clear
To turn off an option by removing the X or check mark from a check box. You clear a check box by clicking it, or by selecting it and then pressing the SPACEBAR.

client
Any computer or program connecting to, or requesting the services of, another computer or program. Client can also refer to the software that enables the computer or program to establish the connection.

For a local area network (LAN) or the Internet, a computer that uses shared network resources provided by another computer (called a server).

client application
A Windows-based application that can display and store linked or embedded objects. For distributed applications, the application that imitates a request to a server application.

client request
A service request from a client computer to a server computer or, for Network Load Balancing, a cluster of computers. Network Load Balancing forwards each client request to a specific host within the cluster according to the system administrator's load-balancing policy.

ClipBook Server
A system service that supports ClipBook Viewer, which allows pages to be seen by remote ClipBooks.

cluster
In data storage, the smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on clusters, which consist of one or more contiguous sectors. The smaller the cluster size, the more efficiently a disk stores information. If no cluster size is specified during formatting, Windows picks defaults based on the size of the volume. These defaults are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. A cluster is also called an allocation unit.

In computer networking, a group of independent computers that work together to provide a common set of services and present a single-system image to clients. The use of a cluster enhances the availability of the services and the scalability and manageability of the operating system that provides the services.

cluster adapter
The adapter that, when using multiple network adapters in each host of a Network Load Balancing cluster, handles the network traffic for cluster operations (the traffic for all hosts in the cluster). This adapter is programmed with the host's cluster IP address.

Cluster Administrator
An application that is used to configure a cluster and its nodes, groups, and resources. Cluster Administrator can run on any member of the trusted domain regardless of whether the computer is a cluster node.

Cluster Administrator extension
A software component that implements the Cluster Administrator extension application programming interface (API) for allowing Cluster Administrator to configure a new resource type.

Cluster API
A collection of functions that are implemented by the cluster software and used by a cluster-aware client or server application, a cluster management application, or a Resource DLL. The Cluster API is used to manage the cluster, cluster objects, and the cluster database.

cluster disk
A disk on a shared bus connected to the cluster nodes, which all the cluster nodes can access (though not at the same time).

Cluster service
The essential software component that controls all aspects of server cluster operation and manages the cluster database. Each node in a server cluster runs one instance of the Cluster service.

cluster-aware application
An application that can run on a cluster node and that can be managed as a cluster resource. Cluster-aware applications use the Cluster API to receive status and notification information from the server cluster.

cluster-unaware application
An application that can run on a cluster node and be managed as a cluster resource but that does not support the Cluster API.

Cluster.exe
An alternative to using Cluster Administrator to administer clusters from the command prompt. You can also call Cluster.exe from command scripts to automate many cluster administration tasks.

CMYK color space
Multidimensional color space consisting of the cyan, magenta, yellow, and black intensities that make up a given color. Commercial color printing devices generally use this system of four-color process inks.

code page
A means of providing support for character sets and keyboard layouts for different countries or regions. A code page is a table that relates the binary character codes used by a program to keys on the keyboard or to characters on the display.

codec
Hardware that can convert audio or video signals between analog and digital forms (coder/decoder); hardware or software that can compress and uncompress audio or video data (compression/decompression); or the combination of coder/decoder and compression/decompression. Generally, a codec compresses uncompressed digital data so that the data uses less memory.

color depth
The number of colors per pixel your monitor and graphics adapter support.

color gamut
The particular range of colors that a device is able to produce. A device such as a scanner, monitor, or printer can produce a unique range of colors, which is determined by the characteristics of the device itself.

color management
Process of producing accurate, consistent color among a variety of input and output devices. A color management system (CMS) maps colors between devices such as scanners, monitors, and printers; transforms colors from one color space to another (for example, RGB to CMYK); and provides accurate on-screen or print previews.

color profile
A profile that contains the data needed for translating the values of a color gamut. This data includes information about color, hue, saturation, and brightness.

color space
A set of three values that defines how a color can be represented on computer devices such as monitors, scanners, and printers. For example, in the LAB color space, the terms luminance or whiteness (L), redness-greenness (A), and yellowness-blueness (B) are used; in the HVC system, the terms are hue (H), value (V), and chroma (C). Color space refers to the three-dimensional space that is defined by the respective values, such as L, A, and B.

command prompt window
A window displayed on the desktop used to interface with the MS-DOS operating system. MS-DOS commands are typed at an entry point identified by a blinking cursor.

common groups
Groups that appear in the program list on the Start menu for all users who log on to the computer. Only administrators can create or change common groups.

communication port
A port on a computer that allows asynchronous communication of one byte at a time. A communication port is also called a serial port.

communication settings
Operating parameters, such as bits per second (bps) and modem type, that apply to serial ports on a computer.

community name
A name used to group SNMP hosts. This name is placed in SNMP messages sent between SNMP-managed devices such as Windows 2000-based server computers and SNMP management stations. Typically, all hosts belong to Public, which is the standard name for a common community of all SNMP hosts.

compatibility mode
A feature of a computer or operating system that allows it to run programs written for a different system. Programs often run slower in compatibility mode.

Complementary Metal Oxide Semiconductor (CMOS)
A specific type of semiconductor technology that requires very little power. The term has been popularized to mean a small storage area where your system keeps track of certain hardware parameters, such as the size of your hard disk, the number of serial ports your computer has, etc. CMOS is also called Setup RAM.

Compression Control Protocol (CCP)
A protocol used in the negotiation process in a PPP connection. Compression Control Protocol is one type of Network Control Protocol (NCP). NCPs are used to establish and configure different network protocol parameters for IP, IPX, and NetBEUI.

computer account
An account that is created by a domain administrator and uniquely identifies the computer on the domain. The Windows computer account matches the name of the computer joining the domain.

computer administrator
A user who manages a computer. The computer administrator makes system-wide changes to the computer, including installing programs and accessing all files on the computer, and can create, change and delete the accounts of other users.

Computer Browser service
A service that maintains an up-to-date list of computers and provides the list to applications when requested. The Computer Browser service provides the computer lists displayed in the My Network Places, Select Computer, and Select Domain dialog boxes and (for Windows 2000 Server only) in the Server Manager window.

Computer Management
A component you can use to view and control many aspects of the computer configuration. Computer Management combines several administration utilities into a single console tree, providing easy access to a local or remote computers administrative properties and tools.

computer quota
For Message Queuing, the storage size limit for messages on a computer, based on the total size of the messages. When a computer quota is reached, Message Queuing can no longer send messages to that computer until one or more messages are removed from queues. Message Queuing enforces the computer quota before it enforces the queue quota on a computer.

connect
To assign a drive letter, port, or computer name to a shared resource so that you can use it.

connected, authenticating user
A user's status when a telephone connection has been established but authentication has not yet taken place. The user may be trying to prove security clearance, or the system may be idle. If this condition occurs, followed by the Waiting for Call phase, then the user was unable to provide a correct user name or password. If this phase is repeated, followed by the Waiting for Call phase, an unauthorized attempt to access the network may be under way.

connected, user authenticated
A user's status when a telephone connection has been established and the user has entered a correct user name and password. If the user has callback permission and has requested callback, the connection is followed by the calling-back phase. If the calling-back phase is followed by a waiting-for-call phase, then the server was unable to reach the user at the specified number. The user may have supplied an inaccurate callback number (in the case of set-by-caller callback), or an unauthorized attempt to access the network may be under way (in the case of preset-to callback).

connector application
For Message Queuing, an application that enables Message Queuing computers to communicate with computers that use other messaging systems.

connector queue
For Message Queuing, a queue created on servers running a connector application. You can use the connector application to exchange messages with computers that are running other message-queuing products.

console tree
The left pane in a Microsoft Management Console (MMC) that displays the items contained in the console. By default it is the left pane of a console window, but it can be hidden. The items in the console tree and their hierarchical organization determine the capabilities of a console.

constant bit rate (CBR)
An ATM service type that supports constant bandwidth allocation. This service type is used for voice and video transmissions that require little or no cell loss and rigorous timing controls during transmission.

container object
An object that can logically contain other objects. For example, a folder is a container object.

convergence
The process of stabilizing a system after changes occur in the network. For routing, if a route becomes unavailable, routers send update messages throughout the internetwork, reestablishing information about preferred routes.

For Network Load Balancing, a process by which hosts exchange messages to determine a new, consistent state of the cluster and to elect the host with the highest host priority, known as the default host. During convergence, a new load distribution is determined for hosts that share the handling of network traffic for specific TCP or UDP ports.

copy backup
A backup that copies all selected files but does not mark each file as having been backed up (in other words, the archive attribute is not cleared). Copying is useful if you want to back up files between normal and incremental backups because copying does not affect these other backup operations.

count limit
For Process Control, the maximum number of active processes in a process group. You can configure this in the Process Control snap-in.

CPU Time
In Task Manager, the total processor time, in seconds, used by a process since it started.

CPU Usage
In Task Manager, the percentage of time that a process used the CPU since the last update. On the Task Manager Process tab, the column heading is CPU.

crash consistency
A feature of shadow copy backups that ensures all files are backed up, regardless of their state.

CRC errors
Errors caused by the failure of a cyclic redundancy check. A CRC error indicates that one or more characters in the data packet received were found garbled on arrival.

credentials
A set of information that includes identification and proof of identification that is used to gain access to local and network resources. Examples of credentials are user names and passwords, smart cards, and certificates.

CRL distribution point
An optional extension in an X.509v3 certificate that identifies how information is obtained. Also, a directory entry or other distribution source for certificate revocation lists.

cross-reference object
Objects in which Active Directory stores information about directory partitions and external directory services. An example of an external directory service is another LDAP-compliant directory.

CryptoAPI
An application programming interface (API) that is provided as part of Microsoft Windows. CryptoAPI provides a set of functions that allow applications to encrypt or digitally sign data in a flexible manner while providing protection for the user's sensitive private key data. Actual cryptographic operations are performed by independent modules known as cryptographic service providers (CSPs).

(CSP); private key
cryptographic service provider (CSP)
The code that performs authentication, encoding, and encryption services that Windows-based applications access through the CryptoAPI. A CSP is responsible for creating keys, destroying them, and using them to perform a variety of cryptographic operations. Each CSP provides a different implementation of the CryptoAPI. Some provide stronger cryptographic algorithms, while others contain hardware components, such as smart cards.

cryptography
The processes, art, and science of keeping messages and data secure. Cryptography is used to enable and ensure confidentiality, data integrity, authentication (entity and data origin), and nonrepudiation.

custom file type
Typically, files with extensions that have been created for special kinds of files. Custom file types are not tracked by the system registry.

From: Help and Support Center Win XP

Windows XP Symbol (B)

B-channel
A single channel of an ISDN line that is used to carry either voice or data information. ISDN Basic Rate Interface (BRI) has 2 B-channels. ISDN Primary Rate Interface (PRI) in North America has 23 B-channels. ISDN Primary Rate Interface (PRI) in Europe has 30 B-channels. B-channel is also called bearer channel.

background
The screen background image used on a graphical user interface such as Windows. Any pattern or picture that can be stored as a bitmap (.bmp) file can be set as a screen background.

background program
A program that runs while the user is working on another task. The computer's microprocessor assigns fewer resources to background programs than foreground programs.

backup domain controller (BDC)
In Windows NT Server 4.0 or earlier, a computer running Windows NT Server that receives a copy of the domain's directory database (which contains all account and security policy information for the domain).

The copy is synchronized periodically and automatically with the master copy on the primary domain controller (PDC). BDCs also authenticate user logon information and can be promoted to function as PDCs as needed. Multiple BDCs can exist in a domain. Windows NT 3.51 and 4.0 BDCs can participate in a Windows 2000 domain when the domain is configured in mixed mode.


backup media pool
A logical collection of data-storage media that has been reserved for use by Microsoft Windows Backup. Backup uses Removable Storage to control access to specific media within a library.

backup operator
A type of local or global group that contains the user rights you need to back up and restore files and folders. Members of the Backup Operators group can back up and restore files and folders regardless of ownership, permissions, encryption, or auditing settings.

backup set
A collection of files, folders, and other data that has been backed up and stored in a file or on one or more tapes.

backup set catalog
A summary of the files and folders that have been saved in a backup set.

backup types
A type that determines which data is backed up and how it is backed up. There are five backup types: copy, daily, differential, incremental, and normal.

bandwidth
In analog communications, the difference between the highest and lowest frequencies in a given range. For example, an analog telephone line accommodates a bandwidth of 3,000 hertz (Hz), the difference between the lowest (300 Hz) and highest (3,300 Hz) frequencies it can carry. In digital communications, bandwidth is expressed in bits per second (bps).

Bandwidth Allocation Protocol (BAP)
A PPP control protocol that is used on a multiprocessing connection to dynamically add and remove links.

base priority
A precedence ranking that determines the order in which the threads of a process are scheduled for the processor. Use Task Manager to view and change base priorities.

For Message Queuing, a property that specifies the queue's priority in a public queue. You can set the base priority from -32,768 to 32,767; the default priority is 0. Private queues do not support base priority. Message Queuing routes and delivers messages first by base priority, then by message priority.

basic disk
A physical disk that can be accessed by MS-DOS and all Windows-based operating systems. Basic disks can contain up to four primary partitions, or three primary partitions and an extended partition with multiple logical drives. If you want to create partitions that span multiple disks, you must first convert the basic disk to a dynamic disk using Disk Management or the Diskpart.exe command-line utility.

basic input/output system (BIOS)
On x86-based computers, the set of essential software routines that test hardware at startup, start the operating system, and support the transfer of data among hardware devices. The BIOS is stored in read-only memory (ROM) so that it can be executed when you turn on the computer. Although critical to performance, the BIOS is usually invisible to computer users.

basic storage
A storage method in MS-DOS, Windows, Windows NT, and Windows 2000 for primary partitions, extended partitions, and logical drives.

basic volume
A primary partition or logical drive that resides on a basic disk.

batch program
An ASCII (unformatted text) file that contains one or more operating system commands. A batch program's file name has a .cmd or .bat extension. When you type the file name at the command prompt, or when the batch program is run from another program, its commands are processed sequentially. Batch programs are also called batch files.

baud rate
The speed at which a modem communicates. Baud rate refers to the number of times the condition of the line changes. This is equal to bits per second only if each signal corresponds to one bit of transmitted data.

Modems must operate at the same baud rate in order to communicate with each other. If the baud rate of one modem is set higher than that of the other, the faster modem usually alters its baud rate to match that of the slower modem.

Berkeley Internet Name Domain (BIND)
An implementation of DNS written and ported to most available versions of the UNIX operating system. The Internet Software Consortium maintains the BIND software.

binary
A base-2 number system in which values are expressed as combinations of two digits, 0 and 1.

BIND boot file
Configuration file used by Domain Name System (DNS) servers running under versions of the Berkeley Internet Name Domain (BIND) software implementation. The BIND boot file is a text file, Named.boot, where individual lines in the file list boot directives used to start a service when the DNS server is started. By default, Microsoft DNS servers use DNS service parameters stored in the registry, but they allow the use of a BIND boot file as an alternative for reading boot configuration settings.

bindery
A database in Novell NetWare 3.x that contains organizational and security information about users and groups.

bit (binary digit)
The smallest unit of information handled by a computer. One bit expresses a 1 or a 0 in a binary numeral, or a true or false logical condition. A group of 8 bits makes up a byte, which can represent many types of information, such as a letter of the alphabet, a decimal digit, or other character. Bit is also called binary digit.

bits per second (bps)
The number of bits transmitted every second, used as a measure of the speed at which a device, such as a modem, can transfer data.

boot
The process of starting or resetting a computer. When first turned on (cold boot) or reset (warm boot), the computer runs the software that loads and starts the computer's operating system, which prepares it for use.

boot files
The system files needed to start Windows. The boot files include Ntldr and Ntdetect.com.

Boot Logging
A process in which a computer that is starting (booting) creates a log file that records the loading of each device and service. The log file is called Ntbtlog.txt, and it is saved in the system root directory.

boot partition
The partition that contains the Windows operating system and its support files. The boot partition can be, but does not have to be, the same as the system partition.

boot volume
The volume that contains the Windows operating system and its support files. The boot volume can be, but does not have to be, the same as the system volume.

BOOTP extensions
A set of optional information types defined originally in RFC 1497 for use with BOOTP service and later supported by DHCP. In DHCP, these extensions form the legacy core set of client parameters available and supported by most standard DHCP and BOOTP servers.

bootstrap protocol (BOOTP)
A protocol used primarily on TCP/IP networks to configure diskless workstations. RFCs 951 and 1542 define this protocol. DHCP is a later boot configuration protocol that uses this protocol. The Microsoft DHCP service provides limited support for BOOTP service.

broadband
Of or relating to communications systems in which the medium of transmission (such as a wire or fiber-optic cable) carries multiple messages at a time, each message modulated on its own carrier frequency by a modem.

broadband connection
A high-speed connection. Broadband connections are typically 256 kilobytes per second (KBps) or faster. Broadband includes DSL and cable modem service.

broadband integrated services digital network (B-ISDN)
An ITU-T communication standard for high-speed networking that provides new services, including voice, video, and data on the same network.

broadcast
An address that is destined for all hosts on a particular network segment.

browser
Software that interprets the markup of files in HTML, formats them into Web pages, and displays them to the end user. Some browsers also permit end users to send and receive e-mail, read newsgroups, and play sound or video files embedded in Web documents.

buffer
A region of RAM reserved for use with data that is temporarily held while waiting to be transferred between two locations, such as between an application's data area and an input/output device.

built-in groups
The default security groups installed with the operating system. Built-in groups have been granted useful collections of rights and built-in abilities.

In most cases, built-in groups provide all the capabilities needed by a particular user. For example, if a domain user account belongs to the built-in Administrators group, logging on with that account gives a user administrative capabilities over the domain and the domain servers. To provide a needed set of capabilities to a user account, assign it to the appropriate built-in group.

bus
A communication line used for data transfer among the components of a computer system. A bus essentially allows different parts of the system to share data. For example, a bus connects the disk-drive controller, memory, and input/output ports to the microprocessor.

bytes
A unit of data that typically holds a single character, such as a letter, a digit, or a punctuation mark. Some single characters can take up more than one byte.

From: Help and Support Center Win XP

Selasa, 11 Maret 2008

Windows XP Symbol (A)

AA (address) resource record
A resource record used to map a DNS domain name to a host IP address on the network.

access control
A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry key, or directory service object.

access control entry (ACE)
An entry in an object's discretionary access control list (DACL) that grants permissions to a user or group. An ACE is also an entry in an object's system access control list (SACL) that specifies the security events to be audited for a user or group.

account lockout
A Windows security feature that locks a user account if a number of failed logon attempts occur within a specified amount of time, based on security policy lockout settings. Locked accounts cannot log on.

acknowledgment message
For Message Queuing, a message class that indicates that a message arrived or was retrieved by the target application (a positive acknowledgment), or that an error occurred before the original message could be retrieved (a negative acknowledgment). These messages are sent to administration queues on the source computer.

active
Describes the window or icon that you are currently using or that is currently selected. The operating system always applies the next keystroke or command you choose to the active window. Windows or icons on the desktop that are not selected are inactive.

active content
Dynamic content, such as a stock ticker, a weather map, or news, that is usually updated from the World Wide Web or a channel.

Active Directory
The directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.

Active Directory data model
A model derived from the LDAP data model. The directory holds objects that represent entities of various sorts, described by attributes. The objects and classes of objects that can be stored in the directory are defined in the schema. For each class of objects, the schema defines the attributes an instance of the class must have, the additional attributes it can have, and the class that can be its parent.

Active Directory Users and Computers
An administrative tool designed to perform day-to-day Active Directory administration tasks. These tasks include creating, deleting, modifying, moving, and setting permissions on objects stored in the directory. These objects include organizational units, users, contacts, groups, computers, printers, and shared file objects.

active partition
A partition from which an x86-based computer starts up. The active partition must be a primary partition on a basic disk. If you use Windows exclusively, the active partition can be the same as the system volume.

active volume
The volume from which the computer starts up. The active volume must be a simple volume on a dynamic disk. You cannot mark an existing dynamic volume as the active volume, but you can upgrade a basic disk containing the active partition to a dynamic disk. Once the disk is upgraded to dynamic, the partition becomes a simple volume that is active.

ActiveX
A set of technologies that allows software components to interact with one another in a networked environment, regardless of the language in which the components were created.

address (A) resource record
A resource record used to map a DNS domain name to a host IP address on the network.

address classes
Predefined groupings of Internet addresses with each class defining networks of a certain size. The range of numbers that can be assigned for the first octet in the IP address is based on the address class. Class A networks (values 1 to 126) are the largest, with more than 16 million hosts per network. Class B networks (128 to 191) have up to 65,534 hosts per network, and Class C networks (192 to 223) can have up to 254 hosts per network.

Address Resolution Protocol (ARP)
In TCP/IP, a protocol that uses broadcast traffic on the local network to resolve a logically assigned IP address to its physical hardware or media access control layer address.

In ATM, ARP is used two different ways. For classical IP over ATM, ARP is used to resolve addresses to ATM hardware addresses. For ATM LAN emulation, ARP is used to resolve Ethernet/802.3 or Token Ring addresses to ATM hardware addresses.

administration queue
For Message Queuing, a queue that stores acknowledgment messages.

administrative alerts
Alerts that relate to server and resource use. They notify users about problems in areas such as security and access, user sessions, server shutdown due to power loss (when an uninterruptible power supply is available), directory replication, and printing. When a computer generates an administrative alert, a message is sent to a predefined list of users and computers.

administrator
For Windows XP Professional, a person responsible for setting up and managing domain controllers or local computers and their user and group accounts, assigning passwords and permissions, and helping users with networking problems. Administrators are members of the Administrators group and have full control over the domain or computer.

For Windows XP Home Edition, a person who can make system-wide changes to the computer, install software, and who has access to all files on the computer. A person with a computer administrator account has full access to other user accounts on the computer.

Advanced Configuration and Power Interface (ACPI)
An open industry specification that defines power management on a wide range of mobile, desktop, and server computers and peripherals. ACPI is the foundation for the OnNow industry initiative that allows system manufacturers to deliver computers that will start at the touch of a keyboard. ACPI design is essential to take full advantage of power management and Plug and Play.

affinity
For Network Load Balancing, the method used to associate client requests to cluster hosts. When no affinity is specified, all network requests are load balanced across the cluster without respect to their source. Affinity is implemented by directing all client requests from the same IP address to the same cluster host.

agent
An application that runs on a Simple Network Management Protocol (SNMP) managed device. The agent application is the object of management activities. A computer running SNMP agent software is also sometimes referred to as an agent.

Alerter service
A service used by the server and other services to notify selected users and computers of administrative alerts that occur on a computer. The Alerter service requires the Messenger service.

allocation unit
The smallest amount of disk space that can be allocated to hold a file. All file systems used by Windows organize hard disks based on allocation units. The smaller the allocation unit size, the more efficiently a disk stores information. If you do not specify an allocation unit size when formatting the disk, Windows picks default sizes based on the size of the volume. These default sizes are selected to reduce the amount of space that is lost and the amount of fragmentation on the volume. An allocation unit is also called a cluster.

American Standard Code for Information Interchange (ASCII)
A standard single-byte character encoding scheme used for text-based data. ASCII uses designated 7-bit or 8-bit number combinations to represent either 128 or 256 possible characters. Standard ASCII uses 7 bits to represent all uppercase and lowercase letters, the numbers 0 through 9, punctuation marks, and special control characters used in U.S. English. Most current x86-based systems support the use of extended (or "high") ASCII. Extended ASCII allows the eighth bit of each character to identify an additional 128 special symbol characters, foreign-language letters, and graphic symbols.

AppleTalk
The Apple Computer network architecture and network protocols. A network that has Macintosh clients and a computer running Windows 2000 Server or Windows NT Server with Services for Macintosh functions as an AppleTalk network.

AppleTalk Phase 2
The extended AppleTalk Internet model designed by Apple Computer that supports multiple zones within a network and extended addressing capacity.

application programming interface (API)
A set of routines that an application uses to request and carry out lower-level services performed by a computer's operating system. These routines usually carry out maintenance tasks such as managing files and displaying information.

Asymmetric Digital Subscriber Line (ADSL)
A high-bandwidth digital transmission technology that uses existing phone lines and also allows voice transmissions over the same lines. Most of the traffic is transmitted downstream to the user, generally at rates of 512 Kbps to about 6 Mbps.

asynchronous communication
A form of data transmission in which information is sent and received at irregular intervals, one character at a time. Because data is received at irregular intervals, the receiving modem must be signaled to let it know when the data bits of a character begin and end. This is done by means of start and stop bits.

Asynchronous Transfer Mode (ATM)
A high-speed connection-oriented protocol used to transport many different types of network traffic. ATM packages data in a 53-byte, fixed-length cell that can be switched quickly between logical connections on a network.

ATM adaptation layer (AAL)
The layer of the ATM protocol stack that parses data into the payload portion of the ATM cell for transport across an ATM network.

attribute
For files, information that indicates whether a file is read-only, hidden, ready for archiving (backing up), compressed, or encrypted, and whether the file contents should be indexed for fast file searching.

In Active Directory, characteristics of an object and the type of information an object can hold. For each object class, the schema defines what attributes an instance of the class must have and what additional attributes it might have.

audio input device
An audio input device records music and voice input into your computer. Examples of audio input devices are CD-ROM players and microphones.

audit policy
A policy that determines the security events to be reported to the network administrator.

auditing
The process that tracks the activities of users by recording selected types of events in the security log of a server or a workstation.

authentication
The process for verifying that an entity or object is who or what it claims to be. Examples include confirming the source and integrity of information, such as verifying a digital signature or verifying the identity of a user or computer.

authoritative
For DNS, describes a DNS server hosting a zone, or a zone containing a name or record. When a DNS server is configured to host a zone, it is said to be authoritative for names that do exist or could exist within that zone. A DNS server is allowed to respond authoritatively to queries for domain names for which it is authoritative. A zone is said to be authoritative for a name if the name exists or could exist within a zone, and it is said to be authoritiative for a record if the owner name of the record exists or could exist within a zone.

authoritative restore
In Backup, a type of restore operation performed on an Active Directory domain controller in which the objects in the restored directory are treated as authoritative, replacing (through replication) all existing copies of those objects. Authoritative restore is applicable only to replicated system state data such as Active Directory data and File Replication service data. Use the Ntdsutil.exe utility to perform an authoritative restore.

authorization
The process that determines what a user is permitted to do on a computer system or network.

Automatic Private IP Addressing (APIPA)
A feature of Windows XP TCP/IP that automatically configures a unique IP address from the range 169.254.0.1 through 169.254.255.254 and a subnet mask of 255.255.0.0 when the TCP/IP protocol is configured for dynamic addressing and a Dynamic Host Configuration Protocol (DHCP) is not available.

availability
A measure of the fault tolerance of a computer and its programs. A highly available computer runs 24 hours a day, 7 days a week.

From: Help and Support Center Win XP

To adjust the speed of your mouse pointer - Windows XP

1. Open Mouse in Control Panel.
2. On the Pointer Options tab, under Motion, drag the slider.

Notes

- To open Mouse, click Start, point to Settings, click Control Panel, and then double-click Mouse.
- Adjusting the speed of your mouse pointer causes the pointer to respond more quickly or slowly to the movements of the mouse itself.
- Select the Enhance pointer precision check box to provide finer control of your pointer at short distances without losing the ability to move the pointer quickly across the screen. Clear the check box to turn off this feature.
- You can have the mouse snap to default buttons (such as OK or Apply) in dialog boxes by selecting Automatically move pointer to the default button in a dialog box under Snap To.

From: Help and Support Center Win XP

What is DirectX? (Windows XP)

Windows supports DirectX 8.1, which enhances the multimedia capabilities of your computer. DirectX provides access to the capabilities of your display and audio cards, which enables programs to provide realistic three-dimensional (3-D) graphics and immersive music and audio effects. DirectX is a set of low-level Application Programming Interfaces (APIs) that provides Windows programs with high-performance hardware-accelerated multimedia support.

DirectX enables the program to easily determine the hardware capabilities of your computer, and then sets the program parameters to match. This allows multimedia software programs to run on any Windows-based computer with DirectX compatible hardware and drivers and ensures that the multimedia programs take full advantage of high-performance hardware.

DirectX contains a set of APIs that provide access to the advanced features of high-performance hardware, such as 3-D graphics acceleration chips and sound cards. These APIs control low-level functions, including two-dimensional (2-D) graphics acceleration; support for input devices such as joysticks, keyboards, and mice; and control of sound mixing and sound output. The low-level functions are supported by these components that make up DirectX:

Microsoft DirectDraw

The Microsoft DirectDraw API supports extremely fast access to the accelerated hardware capabilities of a computer's video adapter. It supports standard methods of displaying graphics on all video adapters, and faster, more direct access when using accelerated drivers. DirectDraw provides a device-independent way for programs, such as games and 2-D graphics packages, and Windows system components, such as digital video codecs, to gain access to the features of specific display devices without requiring any additional information from the user about the device's capabilities.

Microsoft Direct3D

The Microsoft Direct3D API (Direct3D) provides an interface to the 3-D rendering functions built into most new video adapters. Direct3D is a low-level 3-D API that provides a device-independent way for software programs to communicate with accelerator hardware efficiently and powerfully. Direct3D includes support for specialized CPU instructions sets, providing additional acceleration on newer computers.

Microsoft DirectSound

The Microsoft DirectSound API provides a link between programs and an audio adapter's sound mixing, sound playback, and sound capture capabilities. DirectSound provides multimedia software programs with low-latency mixing, hardware acceleration, and access to the sound device. It provides this feature while maintaining compatibility with existing device drivers.

Microsoft DirectMusic

The Microsoft DirectMusic API is the interactive audio component of DirectX. Unlike the DirectSound API, which captures and plays digital sound samples, DirectMusic works with digital audio, as well as message-based musical data that is converted to digital audio either by your sound card or by its built-in software synthesizer. The DirectMusic API supports input in Musical Instrument Digital Interface (MIDI) format, and supports both compressed and uncompressed digital audio formats. DirectMusic provides software developers with the ability to create immersive, dynamic soundtracks that respond to a variety of changes in the software environment, not the least of which is direct user input.

Microsoft DirectInput

The Microsoft DirectInput API provides advanced input for games and processes input from joysticks as well as other related devices including the mouse, keyboard, and force-feedback game controllers.

Microsoft DirectPlay

The Microsoft DirectPlay API supports game connections over a modem, the Internet, or LAN. DirectPlay simplifies access to communication services and provides a way for games to communicate with each other, independent of the protocol, or online service. DirectPlay provides lobbying services that simplify the initialization of a multiplayer game, and supports reliable communication protocols to ensure that important game data is not lost on the network. New in DirectPlay 8.0 is support for voice communication over the network, which will significantly improve the playability of multiplayer team-based games, and add a new dimension to social games by providing the capability to talk to other people playing the game.

Microsoft DirectShow
The Microsoft DirectShow API provides high-quality capture and playback of multimedia files located on your computer and on Internet servers. DirectShow supports a wide variety of audio and video formats, including Advanced Streaming Format (ASF), Audio-Video Interleaved (AVI), Digital Video (DV), Motion Picture Experts Group (MPEG), MPEG Audio Layer-3 (MP3), Windows Media Audio/Video (WMA/WMV), and WAV files. DirectShow enables video capture, DVD playback, video editing and mixing, hardware accelerated video decoding, and tuning of broadcast analog and digital television signals.

From: Help and Support Center Win XP

To change Windows visual effects - Windows XP

You can turn specific Windows visual effects on or off. For example, you can display shadows under menus to give a three-dimensional (3-D) effect, indicate folder types with watermarks, and increase the size of icons.

You can change some visual effects in Display Properties and others in System Properties in Control Panel.

Change visual effects in Display

1. Open Display in Control Panel.
2. On the Appearance tab, click Effects.
3. In the Effects dialog box, select the check box for those items you want to turn on.

Notes:
To open Display, click Start, point to Settings, click Control Panel, and then double-click Display.
For information about a specific item, right-click the item and then click What's This?.

Change visual effects in System

1.Open System in Control Panel.
2. On the Advanced tab, under Performance, click Settings.
3. On the Visual Effects tab, click Custom.
4. Select the check box for those items you want to turn on. Clear the check box for the items you want to turn off.

Note:
To open System, click Start, point to Settings, click Control Panel, and then double-click System.

From: Help and Support Center Win XP

To switch your display to 256 colors - Windows XP

Some games and other software programs require that your monitor be set to 256 colors, or they run better in 256 colors. Many of those programs will switch your monitor to 256 colors automatically when you start the program. For those that don't, follow the steps below if you want to switch the display temporarily while the game or program is running.

1. On your desktop or on the Start menu, right-click the game or other program that you want to run in 256 colors, and then click Properties.
2. Click the Compatibility tab.
3. Select the Run in 256 colors check box.

Notes

- The screen will revert to your default color quality when you close the program.
- Try switching to 256 colors if your software program shows the wrong color or the graphics redraw slowly.
- If your software program appears in a small window in the center of your screen, you can increase its size by changing your screen resolution temporarily. Follow the procedure above, but in step 3 select the Run in 640x480 screen resolution check box. Your screen resolution will revert to its previous resolution when you close the program.
- The Compatibility tab is available only for programs or games located on your computer's hard disk. It is not available if the program is stored on a floppy disk, compact disk, or a network.

From: Help and Support Center Win XP

To change the number of colors displayed on a monitor - Windows XP

1. Open Display in Control Panel.
2. On the Settings tab, in the Color quality list, click a different color setting.

Notes

- To open Display, click Start, point to Settings, click Control Panel, and then double-click Display.
- Choose Medium to display over 65,000 colors, High to display over 16 million colors, and Highest to display over 4 billion colors. Choosing more colors provides better color quality on your screen.
- Settings that display a larger number of colors normally require more computer memory and might affect performance on older computers.
- You can switch your color quality temporarily to 256 colors if you have games or other programs that perform better or must run at that level. To switch to 256 colors, right-click the game or program (on the desktop or on the Start menu), and then click Properties. Click the Compatibility tab, and then select the Run in 256 colors check box. Your display reverts to its default color quality when you close the program.
- Your monitor and video adapter determine the color settings that are available for your screen.
- Changes to the color settings affect all users that log on to the computer.
- Only the recommended color settings are listed. For additional settings, click the Advanced button on the Settings tab, click the Adapter tab, and then click List all Modes. Select the resolution, color level, and refresh rate you want.
- If you are using multiple monitors, you can specify the color settings for each installed monitor. If you click the icon for a secondary monitor, the Extend my Windows desktop onto this monitor check box must be selected to change the settings for that monitor.

From: Help and Support Center Win XP

To change the way your computer displays the time - Windows XP

1. Open Regional and Language Options in Control Panel.
2. On the Regional Options tab, under Standards and formats, click Customize.
3. On the Time tab, specify any changes you want to make.

If you do not see the format you want in Time format, follow these guidelines:


Display time in a 24-hour: format Type uppercase H or HH for the hour
Display time in a 12-hour: format Type lowercase h or hh for the hour
Display leading zeros in single-digit hours: Type two characters, HH or hh
Suppress the display of leading zeros in single-digit hours, minutes, or seconds: Type a single uppercase H, or lowercase letter, such as h, m, or s
Display a single letter to indicate AM or PM: Type lowercase t
Display two letters to indicate AM or PM: Type lowercase tt
Display text: Type single quotation marks (') around text

Note

To open Regional and Language Options, click Start, point to Settings, click Control Panel, and then double-click Regional and Language Options.

From: Help and Support Center Win XP

Select a font that contains multiple character sets - Windows XP

Programs that support multiple languages will automatically use a font that contains multiple character sets. If you are using a program that does not support multiple languages, such as Notepad, the fonts might appear as black boxes or lines. To make the text appear correctly, manually select a font that contains multiple character sets. Both Tahoma and Microsoft Sans Serif fonts support multiple character sets.

Note

In some programs, you can select a font specific to the language, such as Tahoma (Language Name). In other programs, you select only the font.

From: Help and Support Center Win XP

Install the language in which your document was composed - Windows XP

You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure.

To read a document composed in another language, you must have that language installed on your computer. Many languages are already installed with Windows XP. However, if you have a document that contains:

- A complex script or right-to-left language: Arabic, Armenian, Georgian, Hebrew, Indic, Thai, or Vietnamese
- An East Asian language: Chinese, Japanese, or Korean

Follow these steps to install the language you need:

1. Open Regional and Language Options in Control Panel.
2. On the Languages tab, under Supplemental language support, select the check box next to the language group
you want to install.

Notes

- To open Regional and Language Options, click Start, point to Settings, click Control Panel, and then double-click Regional and Language Options.
- To complete the installation of language groups, Windows will restart the computer.
- With multiple languages installed on your computer, you can compose documents that contain more than one language. Recipients of these documents must have the same languages installed on their computer to read or edit the documents.

From: Help and Support Center Win XP

Using wildcard characters - Windows XP

A wildcard character is a keyboard character such as an asterisk (*) or a question mark (?) that is used to represent one or more characters when you are searching for files, folders, printers, computers, or people. Wildcard characters are often used in place of one or more characters when you do not know what the real character is or you do not want to type the entire name.

Asterisk (*)

Use the asterisk as a substitute for zero or more characters. If you are looking for a file that you know starts with "gloss" but you cannot remember the rest of the file name, type the following:

gloss*

This locates all files of any file type that begin with "gloss" including Glossary.txt, Glossary.doc, and Glossy.doc. To narrow the search to a specific type of file, type:

gloss*.doc

This locates all files that begin with "gloss" but have the file name extension .doc, such as Glossary.doc and Glossy.doc


Question mark (?)

Use the question mark as a substitute for a single character in a name. For example, if you type gloss?.doc, you will locate the file Glossy.doc or Gloss1.doc but not Glossary.doc.

From: Help and Support Center Win XP

What is Microsoft Excel?

Microsoft Excel is an electronic spreadsheet program.

You might of heard the terms "spreadsheet" and "worksheet". People generally use them interchangebly. To remain consistent with Microsoft and other publishers the term worksheet refers to the row-and-column matrix sheet on which you work upon and the term spreadsheet refers to this type of computer application. In addition, the term workbook will refer to the book of pages that is the standard Excel document.The workbook can contain worksheets,chart sheets, or macro modules.
The Spreadsheet Concept

The Workbook

Most of the Excel screen is devoted to the display of the workbook. The workbook consists of grids and columns. The intersection of a row and column is a rectangular area called a cell.

Cells

The workbook is made up of cells.There is a cell at the intersection of each row and column.A cell can contain a value, a formula, or a text entry. A text entry is used to label or explain the contents of the workbook. A value entry can either be a constant or the value of a formula. The value of a formula will change when the components (arguments) of the formula change. The appeal of spreadsheet programs is the ability to change one value and watch all other values that depend on that first value automatically change when the spreadsheet is recalculated.

Rows, Columns, and Sheets

The Excel worksheet contains 16,384 rows that extend down the worksheet, numbered 1 through 16384.

The Excel worksheet contains 256 columns that extend across the worksheet, lettered A through Z, AA through AZ, BA through BZ, and continuing to IA through IZ.

The Excel worksheet can contain as many as 256 sheets, labeled Sheet1 through Sheet256. The initial number of sheets in a workbook,which can be changed by the user is 16.

Cell References

Cell references are the combination of column letter and row number. For example, the upper-left cell of a worksheet is A1.

Source: http://einstein.cs.uri.edu

Google Adsense – Quick Introduction

What is it?
Google Adsense is a very clever ad system for webmasters that take minimum work for you to setup and use. Basically, you get text ads and sometimes graphic ads to display on your website that makes you money when your visitors click on them.

Well, what’s the clever thing about this?
Automatically you get ads targeted to the content you display on your website.
You don't need to search for good reliable affiliate programs that might not convert
You only get payed from one source, a reliable one :-)

Why use it?
As I mentioned before, you get ads that match your content almost perfect. Google checks your website and find out what it’s all about, and display ads very similar to your content. The big difference with this is very easy to discover if you think of how much you hate normal banner ads ("free smiles" or "you are the 1.000.000th visitor"). Adsense ads really are interesting for your visitors, so they don’t see them as intrusive. Sometimes I get emails from my visitors thanking me for websites they found through my ads ? So it makes me money and my visitors happy, and they keep coming back to the site.

On one of my sites, I use classic banner/popunder ads. One year ago I also added adsense, and now I make 50% of the sites revenue from adsense.

Good to know is that different areas pay different amount of money. Poker and gambling is traditionally paying pretty good (but the competition for gambling sites is pretty high…). Even though some areas pay much less than others, it’s almost always good to use adsense.

How to use it?
I will tell you one of the reasons adsense is as good as it is...
... You can blend it really good into your normal content. Let's say for example you have an article site about guitars. Then you can insert an adsense in the same colors as the rest of the text have and also put it in the middle of the content. You can put it directly under your first paragraph, then it looks like it’s a part of the article and your click through rate (CTR) will be much higher than if you put it before or after the article. The ads will be about “buy new guitars”, “learn to play the guitar”, “buy sheet music to play the guitar” and your visitors will absolutely be interested in them.

Use your imagination and try to blend in the ads with your ordinary content, and don’t forget to adjust the colors to your normal text color. Many people have discussed the choice of color, but the best way to go with colors is to blend them with your normal text color. You want to make the ads look like they are apart of the article or your other content.

Different ad sizes and placements can make drastic differences for your CTR, so play around with the ads to find the best ways for Your site. If your site has many returning visitors, it can also be good to move around the ads after a month or so because people get used to where the ads are and ignore them.

That’s all for this time. Good luck with adsense and hope it will make your sites as profitable as mine :-)

Later I will publish a practical tutorial about how to make your adsense blend into the content. And this is one of the most important things to increase your revenue from adsense...

How to start?
Register for free by clicking the image below and get started right away!!

Source: www.999tutorials.com

Steps to earn money from Google Adsense program

1. Obtain and Activate Google Adsense Account for your web site.
Obtaining the Goolge Adsense Account for your website is the first step towards earning money from Google Adsense. Before applying for the Google Adsense make sure that your site is working properly and there in no dead links. To apply for Google Adsense account visit http://www.google.com/adsense and fill out the application form and confirm an email that Google will send you. If you own several sites you need to apply only once. After this Google will evaluate your site and follow-up with you email within 2-3 days. If your application is accepted you will be able to login to your ad sense account.

2. Placing Google Adsense Ads on your web site
The next step is to place adds on your website. Logon to your Adsense account and select the appropriate ads for your web site. Then copy the ads code and paste on your web pages. Once you pasted the code on your web pages, next step is to upload your web pages. Now you upload the web pages and then browse your web site. You will notice that Google ads appears on you web site.

Placing the Ads correctly is very import for good earnings. The best placement for Google Adsense ads varies from page to page, depending on the content. The best place to place Google Adsense Ads is wherever the web site visitor will be looking.

Ads on the Top of the Page
Advertisements at the top of the page perform well. Chose the ads format which mixes with your page color and style. For example if your web page has a white background color and default color of your links is blue, then you remove the border from Adsense, make the ads background color white.

Ads on the bottom of the Page
Ads on the bottom of page does not perform well. So, don't concentrate on the bottom page ads

Ads on the right bar
Usually the right bar is for web site navigation, usually right side ads performs best.

Ads on the left bar
The left bar ads performance is also good.

You can learn about this from https://www.google.com/support/adsense/bin/static.py?page=tips.html&gsessionid=HyRs2QlabOI.

3. Monitor You Earning
Now your web site is earning for you. Your web site will earn while you are sleeping. You can logon to the Google Adsense account and check your earnings.

Source: www.roseindia.net

Options for Sending Your Word 2007 Documents

As in previous versions of Word, Word 2007 lets you send documents electronically without opening Outlook. However, Word 2007 provides new options for sending your documents.

To send a document electronically, follow these steps:
1. Click the Office Button
2. Select Send
3. Choose the appropriate option for sending your document

Most people will choose the first option, sending the document in Word format as an email attachment. Some people will be interested in the other options. You can opt to send your document as a PDF attachment or an XPS attachment.

In order to send your document in PDF or XPS format, you’ll need the Save as PDF add-in for Word.
Finally, there is one last option you can select. You can send the document as an Internet fax. In order to use this option, you must be registered for an Internet fax service.

From James Marshall
Source: http://wordprocessing.about.com

Tagging Your Word 2007 Documents

Microsoft Vista lets you add tags to your documents and files. You can later use these tags to organize and search for your documents. For example, you may want to add a tag that signifies that a document is still in progress.

You can add the tags in windows Explorer. But, if you want to make the processing of tagging documents easier, add tags directly in Microsoft Word 2007.

To tag your documents, follow these steps:
1. Click the Office button
2. Select Save
3. Click in the box labeled Tags
4. Enter a tag
5. Click Save

You can add multiple tags to a document. If you add more than one, separate them with a semicolon.

To edit your tags, you will need to use Windows Explorer. Select your document and look at the properties at the bottom of the window.

Click in the Tags section to delete or edit your tags. Click Save in the bottom right corner to save the changes.

From James Marshall
Source: http://wordprocessing.about.com

Changing ScreenTips Settings in Word 2007

Like previous versions of Word, Word 2007 features ScreenTips. When you hold your mouse over a button, the name of the button appears. Additionally, Word displays a brief description of the button.

ScreenTips are designed to make your work in Word easier. They’re especially helpful to those who are new to Word. But, advanced users may find ScreenTips annoying.

If you don’t like the ScreenTips feature, you can disable it. Or, you can opt to have Word simply display a buttons name without a description. To change ScreenTips settings in Word, follow these steps:
1. Click the Office button
2. Select Word Options
3. Open the Popular section
4. Locate the drop-down box labeled ScreenTip style
5. To disable Screen Tips entirely, select Don’t show Screen Tips
6. To disable button descriptions only, select Don’t show feature descriptions in ScreenTips

If you later decide you would like to see ScreenTips, repeat the above steps and select Show feature descriptions in ScreenTips.

From James Marshall
Source: http://wordprocessing.about.com

Inserting and Formatting Footnotes and Endnotes in Word 2007

Footnotes and endnotes are essential parts of academic papers. They can also be difficult to format and align. Fortunately, Word 2007 automates the process of working with footnotes and endnotes.

To insert a footnote or endnote, follow these steps:
1. Position the cursor where you would like to insert the reference number
2. Open the References ribbon
3. Click Insert Footnote or Insert Endnote

If you add or remove footnotes or endnotes in earlier portions of the document, the numbering will update automatically.

To change the formatting of footnotes and endnotes, follow these steps:
1. Open the References ribbon
2. Click the box in the bottom right corner of the Footnotes section

Specify your options in the dialog box that opens.

From James Marshall
Source: http://wordprocessing.about.com

Kamis, 06 Maret 2008

Acne Causes, Myths and Treatments

At some point in your life you probably suffered from acne. Perhaps you still do. Acne affects over 80% of the population. Although the exact cause of acne is not known, there are several treatments that can control or reduce the number of acne outbreaks. Finding a product that works can be a daunting task.

The production of excessive oil secretions combined with the natural occurrence of dead skin cells leads can lead to the blockage of the hair follicles. When the follicle becomes blocked the oil builds up, and it isn’t long before we have a pimple.

Myths about the Causes of Acne

There are many myths about what causes acne. Chocolate and greasy foods are often blamed, but research has shown that foods seem to have little effect on the development and course of acne in most people. Another common myth is that dirty skin causes acne; however, blackheads and other acne lesions are not caused by dirt.

Cosmetics

Most cosmetic and skin care products are not pore-clogging ("comedogenic.") Of the many available brands, those which are listed as "water-based" or "oil-free" are generally a better choice.

Hormones

When you begin puberty, certain hormones, called androgens, increase in both males and females. These hormones trigger oil ducts on the face, back and upper chest to begin producing oil. This can cause acne in some people.

What Factors May Aggravate Acne?

Occlusive Factors

When the skin surface and its pores are blocked, the pores are described as being occluded. Factors that may cause occlusion include certain cosmetics, oils, greases, and hairsprays. Hats, helmets and pads used in sports may also contribute to this problem as can humidity, sweating and the prolonged effect of contact with damp clothing.

Too much refined foods

Eating too much refined foods also develop acne, several studies reveal. Why it happens so, is easily answered that our body can not identify too much refined substances and our immune system stimulates. It produces anti bodies against these substances resulting in a severity and development of acne. Thus, it may be referred to as allergic effect. Avoid too much refined food such as diary products, juices and cooking oil.

Sunlight

Many people consider exposure to sunlight helps cure acne, but its ultra violet rays have reverse effects. Exposure to direct sunlight is a major cause of skin cancer and acne complications. Avoid direct exposure to sunlight.

Inflammation

The most common things that can aggravate your acne are: cleansing your skin too much, squeezing, picking, or popping zits. Excessive cleansing, particularly with the overzealous use of abrasive facial scrubs can irritate your skin, and worsen inflammation.

Acne Complications

Possible complications include:

• cysts
• permanent facial scars
• changes in skin color
• damage to self-esteem, confidence, personality, and social life
• side effects of conventional medications (but homeopathic medicines don't have any side effects)

Acne Treatments

Antibiotics. For moderate to severe acne, prescription oral antibiotics may be needed to reduce bacteria and fight inflammation. You may need to take these antibiotics for months, and you may need to use them in combination with topical products.

Oral contraceptives. Oral contraceptives, including a combination of norgestimate and ethinyl estradiol (Ortho-Cyclen, Ortho Tri-Cyclen), have been shown to improve acne in women. However, oral contraceptives may cause other side effects that you'll want to discuss with your doctor.

Read more about Blood Purifier - Acne Cure, Skin Allergies - Herbal treatment for Acne, Eczema and Skin Problems with no side effects! Get Ebooks on Acne Cure and Treatments.

By Dr John Anne
Published: 3/4/2008

Article from: www.buzzle.com