TechTips.co.za

Useful Tech Tips, Tutorials and guides

Audit users with a batch file

Audit users Logon/logoff as well as Startup/Shutdown with batch file Here are four simple Batch files you can use to audit your users logon/logoff as well as startup/shutdown activity. to install simply create the following four batch files. you can either use the startup folder in windows if you dont use Active Directory or I would suggest using Logon/Logoff shutdown/startup scripts in Group Policy. Login.bat for /f “Tokens=2 Delims=[]” %%i in (‘ping -n 1 “%computername%”‘) do set IP=%%i echo %username% logged ON %computername%, IP=%IP% @ %time% %date% >> \serveraudits$users%username%.txt Logoff.bat

| Continue Reading the full article....

Connect Remotely to Any Computer (Windows, Mac OSX)

Connect Remotely to Any Computer (Windows, Mac OSX) Over Internet Whether you are trying to access your home PC from your office, or your office workstation from home, you need to establish a remote desktop connection over Internet. Many times accessing a remote computer is not so easy. For instance there could be firewalls blocking access, or the two PCs could be on different OS not compatible with each other, and so on. In these kind of scenarios, TeamViewer comes to rescue. This free for non-commercial usage tool lets you quickly connect to a remote machine, control it completely including reboot/logoff, do audio and video chat, transfer f

| Continue Reading the full article....

Backup Facebook Profile Pictures

Simple steps to backup your Facebook profile pictures What if one day, Facebook accidently deleted or banned your account for some reason or another?  What if a new social network comes along, and Facebook got shut down?  What if you decided to close your Facebook account, but don’t want to lose all the data you’ve placed there?  These scenarios may be highly unlikely, but they are very possible indeed.  Everything you put on Facebook resides there.  All your status updates, links, photos, notes – everything.  So, just like it’s good practice to backup your hard disk, it’s also good practice to have a plan ready to backup Fac

| Continue Reading the full article....

Modify UAC (User Account Control)

Windows 7: Modify UAC (User Account Control) The User Account Control security feature was one of the most reviled additions to Windows, with good reason – its constant warning messages asking for permission to continue many operations drove the users around the bend. UAC has been improved upon a lot in Windows 8 but you can still tweak it if you like. Here’s is how to turn UAC on or off, and make it less or more intrusive than the default: Go to the Control Panel –> User Accounts and Family Safety. Click User Accounts , then click Change User Account Control Settings. If confirmation password is asked provide it and then move to c

| Continue Reading the full article....

Close All Running Applications Single Click

ever wanted to close All Running Applications Single Click If you are a pro computer user and lot many times you feel that so many applications are running on your computer. Lot many windows opened and these running applications and slowing down your PC. If you go ahead and close each of them one by one, it will involve around 15 – 20 clicks or more. Windows users can close all running applications on single click by using a very tiny application. Close All is a small utility developed by Ntwind Software which can close al running applications at one click. Close All doesn’t need any kind of installation on your computer. You just need

| Continue Reading the full article....

Cisco ACL Revision

Access Control Lists (ACL) Access Control Lists are used to: Prioritise traffic Restrict or reduce updates Provide basic security Block types of traffic Access control list placement Standard ACLs – Place as close to destination as possible. Extended ACLs – Place as close to source of traffic as possible. Only one ACL per port per direction is allowed. ACL are more efficient on outbound port. If a packet does not match the ACL statement then it will be implicitly denied. Once a packet matches an ACL statement no other checks are made, it is permitted.   ACL IOS commands Standard ACLs – Used to permit or deny an e

| Continue Reading the full article....

Changing Power plans in Windows 7

Some basic steps to change Windows 7 Power plans. Changing power plan and its related settings can be very effective in ensuring you system is running well yet still saving you money with excess power usage. Here are a few steps to help with selecting a power plan in Windows To select an appropriate power plan for your laptop or PC, Click Start, Control Panel, and then Click Hardware and Sound. Click Power Options. In the Select a power plan window, select the power plan you wish to use Close the Select a power plan window. A power plan is a collection of hardware and system settings that manage how your computer uses power. You can use po

| Continue Reading the full article....

Microsoft Hyper-V Server 2008 Installation

Microsoft Hyper-V Server (HVS) 2008 is a hypervisor solution that is based on Windows Server 2008 and Hyper-V. Unlike Windows Server 2008 which supports the installation of many different roles, Microsoft Hyper-V Server 2008 is standalone virtualization software that does not support any additional roles. The installation of Microsoft Hyper-V Server 2008 will be very familiar to those of you who have installed a Windows Server 2008 edition because it uses a similar wizard-driven installation. Here are the steps you must follow to install Microsoft Hyper-V Server 2008. Insert the Microsoft Hyper-V Server 2008 installation CD into your server

| Continue Reading the full article....

Bitlocker Recovery Key via AD

Usage requirements To view recovery passwords, you must be a domain administrator, or you must have been delegated permissions by a domain administrator. In addition, to use the BitLocker Recovery Password Viewer, the following requirements must be met: The domain must be configured to store BitLocker recovery information. The computers protected by BitLocker must be joined to the domain. BitLocker Drive Encryption must have been enabled on the computers. Bitlocker Recovery Password viewer for Active Directory Retrieving a BitLocker key from Active Directory involves using the BitLocker Recovery Password Viewer for Active Directory Users a

| Continue Reading the full article....

EIGRP tunnel template Cisco

Cisco tunnel template – EIGRP Below is a tunnel template used to provide a single site failover between two remote locations. interface Tunnel[SITE TUNNEL KEY] description —- [SITE] & [REMOTE SITE] —- ip address [SITE TUNNEL IP] 255.255.255.252 ip flow ingress tunnel source [LOCAL PROVIDER INTERFACE IP] tunnel destination [SITE PROVIDER IP] tunnel key [TUNNEL KEY] interface Tunnel[SITE2 TUNNEL KEY] description —- [SITE] & [REMOTE SITE2] —- ip address [SITE2 TUNNEL IP] 255.255.255.252 ip flow ingress tunnel source [LOCAL PROVIDER INTERFACE IP] tunnel destination [SITE2 PROVIDER IP] tunnel key [SITE2 TUNNE

| Continue Reading the full article....

HP M6040 CM6030 CM4730 Control Panel Calibration

Int the past we had a few printers (HP M6040 & CM6030) that started showing strange symptoms where the touch screen is either unresponsive or only a section of the screen (Most of the time has been the left hand side) is unresponsive, it may simply need calibration. The calibration procedure is really simple and electronically aligns the buttons on the touch screen with their correct action. Key point to note is that the calibration will not affect the screen sensitivity it just lines it all up again. Procedure: CAUTION: When performing this procedure it is very important to use something blunt (like the eraser end of a pencil) and to

| Continue Reading the full article....

Top 4 Microsoft Windows Media Player Plugins.

It’s hard to find good WMP plugins. If you can’t find good plugins, despair not! Now that you’ve made your way to this article, you should have no trouble picking out some of the best WMP plugins available.   1. Now Playing Plugin The Now Playing plugin is one of the best Windows Media Player plugins. It is easy to use and the best for basic and advanced WMP enhances. It has many features, but the one I like the most is the ability to automatically update Facebook and Twitter statuses with the song that you’re listening to. The plugin lets you choose what information you want to pull from WMP, from the filename to the bi

| Continue Reading the full article....

4 ways to speed up your PC

4 ways to speed up your PC By following a few simple guidelines, you can maintain your computer, help increase your PC speed, and help keep it running smoothly. This article discusses how to use the tools available in Windows 7, Windows Vista, and Windows XP Service Pack 3 to help make your computer faster, maintain your computer efficiently, and help safeguard your privacy when you’re online. Note: Some of the tools mentioned in this article require you to be logged on as an administrator. If you aren’t logged on as an administrator, you can only change settings that apply to your user account. Remove spyware, and help protect

| Continue Reading the full article....

Really reset a blackberry to factory defaults

How to do a real Factory Defaults Reset on a Blackberry Probably the only tool you will ever need to reset your blackberry to factory defaults is JL_Cmder, This handy little tool is a Java based app which allows you to do the low-level reset required in order to remove IT policies. You can even remove the devices OS all together, really handy for some Corrupt OS after failed update scenarios (507 Error) To do a full factory defaults reset on a blackberry: Download JL_Cmder v1.9.3 Here Connect your blackberry with the USB cable to your computer Extract the JL_Cmder to a directory Run the JL_Cmder.cmd Press Any key to continue. You will then

| Continue Reading the full article....

Out of Office Template Email IT Department

Out of Office Template (Email) – IT Department I cannot tell you how many times iv seem these long-winded Out of office messages. Giving details on fault logging process, where the person is going, etc. or The out of office is a cut and paste from an out of office they received somewhere along the line and its full of errors. Iv even seen in a cut and paste where the engineer has a signature from another employee. This Out of Office template was designed because clearly something as simple as an Out of Office message is something that is often overlooked by a lot of engineers. As an IT Department it is critical that all our communic

| Continue Reading the full article....