TechTips.co.za

Useful Tech Tips, Tutorials and guides

How to remove Auto Complete cache entries

How to remove or reset the auto complete caches in Outlook 2003, 2007 and 2010 Outlook 2010 Open a new email. Type the first few characters of the cache entry that you want to remove. When the name appears in the “suggested names” list, move your mouse pointer over the name until it becomes highlighted. (But do not click the name). When the “X” icon appears next to the highlighted name, click X to remove the name from the list. Outlook 2007 or Outlook 2003 Open a new email. Type the first few characters of the cache entry that you want to remove. When the entry appears in the “suggested names” list, use the UP a

| Continue Reading the full article....

Clear the Error 99.05.56 from HP CP5525 printers

Hp_Color_Laserjet_CP_5525dn

Below are basic steps used to Clear the Error 99.05.56 from HP CP5525 printers. these are also the same steps to do a full firmware reload on a CP5525 printer. Pre-Requisites. USB Thumb drive MUST be formatted FAT32 USB Thumb drive must NOT be bootable. – this can be confirmed by doing a CLEAN using Diskpart. Run Diskpart from command prompt. List disk Select Disk X – Where X is the number of the USB Disk Clean   Step 1:Perform a clean disk from the preboot menu. Turn the printer on. When the Ready, Data, and Attention LEDs are illuminated solid, press the Stop button. Press the Down arrow button  to highlig

| Continue Reading the full article....

Enable Facebook connector within Outlook

The Microsoft Outlook Social Connector for Facebook allows you to connect your Facebook account to the Outlook Social Connector and obtain information about your friends and colleagues. You can see status updates and recently posted items from your Facebook contacts. You can also use Outlook Social Connector to display a quick view of related Outlook content when you click on an email from a contact, such as recent e-mail conversations, meetings, and shared attachments to help you easily track your communications NOTE: The Microsoft Outlook Social Connector requires Microsoft Outlook Social Connector and the related update (KB983403) to be in

| Continue Reading the full article....

PGP Drive Encryption Problem Lenovo X220

PGP Drive Encryption Problem Lenovo X220 Newer Lenovo x220 laptops come with an updated BIOS version which is not compatible with PGP 9. If you encrypt the laptop using PGP9, after reboot, the PC it tries to load the PGP GUI where you enter the password and then gives following message on a black screen: Loading stage2 PGPWDE disk data are corrupted. Please use PGP recovery disk. Cannot continue. Press any key to halt the system. If you run the PGP boot disk it gives same message.   Cause: Laptop models: x220 or any older laptops where the BIOS has been upgraded to a recent version. X220s are shipped with an updated BIOS version w

| Continue Reading the full article....

Speed up Folder loading on Windows

Speed up Folder loading on Local System If folders take a lot of time to load in Windows, especially when the folder size is quite big. There is a really simple fix to speed up folder loading that should be part of any initial troubleshooting which is done. Right-click on the folder in question and choose Properties. On the Properties window, navigate to Customize tab. Select the General Items or Documents from the drop down in “Optimise this folder for” drop down Check apply this template to all sub folders. Click Apply and Ok. Rebuild the Index The indexing of files and folders can get messy and slow over time with the add

| Continue Reading the full article....

Unable to browse network shares via VPN

Unable to browse network shares via VPN Iv been getting a few requests with help on a problem that users are unable to browse network shares while connected to VPN. Network file sharing and printing require NetBIOS name resolution. The chances are that NetBIOS over TCP IP is disabled. To resolve this issue, change the following registry values for all TCP IP interfaces from 0 to 1. [HKEY_LOCAL_MACHINESYSTEMCurrent¬ ControlSetServicesNetBTParamete¬ rsInterfacesTcpipXX}] “NameServerList”=hex(7):00,00 “NetbiosOptions”=dword:00000001 This should Fix the issue.

| Continue Reading the full article....

IT Employee Confidentiality Agreement Template

IT Support Employee Confidentiality Agreement template* The overall benefit of a confidentiality agreement is to protect proprietary information of a business by restricting an employee or client from sharing that information with anyone. As most IT employees have the administrative rights to users files, network locations and systems, it is vital that all IT staff are under some form of confidentiality or nondisclosure agreement. The confidentiality agreement is generally signed when the IT employment begins working with the company but it can also be signed at the start of a particular project or phase of work. It may be used in both em

| Continue Reading the full article....

Top 10 Show Commands for Cisco Routers

The Absolute top 10 show Commands Everybody Needs To Know in Cisco Routers Some commands in the Cisco router configuration are just irreplaceable. The ‘show’ commands are the most widely used in Cisco routers. Here is a list of the 10 mostly used of these ‘show’ commands. 1. show running-config This command is your true best friend. It shows the complete configuration that is running currently. 2. show startup-config This command shows the configuration that is saved on the NVRAM. It is helpful in knowing the configuration that will be applied the next time the routers is reloaded. 3. show interface This command shows status and stati

| Continue Reading the full article....

IT Document Template

IT Document Template (ITS Department or Desktop Support). We all know that IT engineers are not renowned for creating the most visually appealing support documentation. In order to give a good starting point Iv created a general document template. this will standardize and give a general look of structure to IT documents. The template can be used for almost any Document, Process, How to or guide. IT is not intended to be distributed to users directly however, the document would work as a formal policy document with a few minor changes. The document was designed to be used by ITS, IT, Service Desk and or Desktop Support departments, So al

| Continue Reading the full article....

BlackBerry Internet E-mail setup via your BlackBerry

To set up BlackBerry Internet E-mail via your BlackBerry, perform the following steps: Verify that your BlackBerry handheld is connected to the wireless network and is displaying uppercase GPRS in the top right corner. If your device is not displaying uppercase GPRS, go to BlackBerry Internet E-Mail Management and Troubleshooting. From the BlackBerry handheld Home screen or Tools menu, select the Set Up Internet E-mail or E-mail Setup icon. If prompted, read the Terms and Conditions, and then select Accept. Enter your e-mail address and password for the account you would like to access from your BlackBerry handheld. Confirm the password and

| Continue Reading the full article....

Fully Reset Users Windows Profile

Fully Reset Users Windows Profile Sometime the only fix is to do a full reset of the user’s profile, Iv seen this mainly with Offline file and folder sync issues, random app issues or general issues where it works when logged on as another user but won’t work as the current user. Log on as local Administrator or an account with Admin rights (Must be different from the account you are trying to reset.)** Ensure that you made a backup of the users profile folder which you are recreating. Click start type regedit and hit enter. Once Regedit is open, lookup HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList. You can confirm you 

| Continue Reading the full article....

Enable Two-step verification for Apple ID

Two-step verification for Apple ID. The only real way to truly secure your accounts these days are by using a two-step authentication method. If you are not sure what two-step authentication or verification is, its the same thing that banks have been doing for years. What is Two-Step Verification Two-step verification is a process involving two but independent stages to confirm the identity of the person trying to access a system or service. for example banks have been doing this for years where they give you standard username/password authentication to get access to the system there is a second step added to the process where once you ha

| Continue Reading the full article....

Transfer blackberry contacts to iPhone

1- On your blackberry, go to: www.google.com/mobile/sync and download and install the application “Blackberry Sync”. you can also find this in the “blackberry apps world” 2- after installation is completed. run this application, Enter user’s gmail account, and click Sync now. 3- Wait untill all contact uploaded in gmail. note that, these contacts will be merged with any existing contact in the gmail. 4- On your computer, go to www.google.com/contacts and make sure your Blackberry contacts are all there. 5- On your iPhone, go to Settings->Mail, Contacts, Calendars->Add Account->Microsoft Exchange. Enter g

| Continue Reading the full article....

Message Tracking with Powershell

With the Exchange Management Shell you should be able to run the below command to perform message tracking with Powershell and obtain a list in .csv format which will show you any email that match your search criteria. The message tracking logs on the hub transport servers retain the information for 30 days, therefore you can only track emails that were sent or received within that timeframe Use the below as a template copying all of the bold text below only changing the specific items highlighted below depending on the scope of your request get-exchangeserver | where-object -filter {$.isHubTransportServer} | Get-Messagetrackinglog -Recipient

| Continue Reading the full article....

Cisco CCNA exam Cram Sheet

Cisco CCNA exam Cram Sheet General Networking Port Numbers Port Number Layer 4 Protocol Suite Application 20 TCP FTP Data 21 TCP FTP Program 23 TCP Telnet 25 TCP SMTP 53 TCP/UDP DNS 69 UDP TFTP 80 TCP HTTP Ping Responses ! – Reply from target address . – Timeout U – Destination unreachable C – Congestion experienced I – User interrupt ? – Unknown packet type & – Packet lifetime exceeded Ethernet 5-4-3 rule – Between any 2 nodes there can only be a maximum of 5 segments, 4 repeaters and only 3 of those segments can have hosts. Loop back address – 127.0.0.1, tests

| Continue Reading the full article....