TechTips.co.za

Useful Tech Tips, Tutorials and guides

Fix Windows No Sound and Audio Problem

Ever had the problem when windows system does not give you sound and audio suddenly or despite sound card or audio device is present and working previously? Windows XP, 2000, NT, 2003 or even Vista computers may lose Windows audio and system sounds output due to the mess on file system or registry that created or left by third-party utilities after installation and uninstallation, or corrupted and missing codecs, (a CODEC is a component necessary to decompress and decode media files so that they can be played back by Windows). When the Windows “no sound problem occurs”, the symptoms include users do not hear any Windows system s

| Continue Reading the full article....

Unable to browse network shares via VPN

Unable to browse network shares via VPN Iv been getting a few requests with help on a problem that users are unable to browse network shares while connected to VPN. Network file sharing and printing require NetBIOS name resolution. The chances are that NetBIOS over TCP IP is disabled. To resolve this issue, change the following registry values for all TCP IP interfaces from 0 to 1. [HKEY_LOCAL_MACHINESYSTEMCurrent¬ ControlSetServicesNetBTParamete¬ rsInterfacesTcpipXX}] “NameServerList”=hex(7):00,00 “NetbiosOptions”=dword:00000001 This should Fix the issue.

| Continue Reading the full article....

IT Employee Confidentiality Agreement Template

IT Support Employee Confidentiality Agreement template* The overall benefit of a confidentiality agreement is to protect proprietary information of a business by restricting an employee or client from sharing that information with anyone. As most IT employees have the administrative rights to users files, network locations and systems, it is vital that all IT staff are under some form of confidentiality or nondisclosure agreement. The confidentiality agreement is generally signed when the IT employment begins working with the company but it can also be signed at the start of a particular project or phase of work. It may be used in both em

| Continue Reading the full article....

IT Document Template

IT Document Template (ITS Department or Desktop Support). We all know that IT engineers are not renowned for creating the most visually appealing support documentation. In order to give a good starting point Iv created a general document template. this will standardize and give a general look of structure to IT documents. The template can be used for almost any Document, Process, How to or guide. IT is not intended to be distributed to users directly however, the document would work as a formal policy document with a few minor changes. The document was designed to be used by ITS, IT, Service Desk and or Desktop Support departments, So al

| Continue Reading the full article....

BlackBerry Internet E-mail setup via your BlackBerry

To set up BlackBerry Internet E-mail via your BlackBerry, perform the following steps: Verify that your BlackBerry handheld is connected to the wireless network and is displaying uppercase GPRS in the top right corner. If your device is not displaying uppercase GPRS, go to BlackBerry Internet E-Mail Management and Troubleshooting. From the BlackBerry handheld Home screen or Tools menu, select the Set Up Internet E-mail or E-mail Setup icon. If prompted, read the Terms and Conditions, and then select Accept. Enter your e-mail address and password for the account you would like to access from your BlackBerry handheld. Confirm the password and

| Continue Reading the full article....

Top 4 Microsoft Windows Media Player Plugins.

It’s hard to find good WMP plugins. If you can’t find good plugins, despair not! Now that you’ve made your way to this article, you should have no trouble picking out some of the best WMP plugins available.   1. Now Playing Plugin The Now Playing plugin is one of the best Windows Media Player plugins. It is easy to use and the best for basic and advanced WMP enhances. It has many features, but the one I like the most is the ability to automatically update Facebook and Twitter statuses with the song that you’re listening to. The plugin lets you choose what information you want to pull from WMP, from the filename to the bi

| Continue Reading the full article....

Fully Reset Users Windows Profile

Fully Reset Users Windows Profile Sometime the only fix is to do a full reset of the user’s profile, Iv seen this mainly with Offline file and folder sync issues, random app issues or general issues where it works when logged on as another user but won’t work as the current user. Log on as local Administrator or an account with Admin rights (Must be different from the account you are trying to reset.)** Ensure that you made a backup of the users profile folder which you are recreating. Click start type regedit and hit enter. Once Regedit is open, lookup HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList. You can confirm you 

| Continue Reading the full article....

ControlGuard Agent Removal Using the MSI

ControlGuard Agent (CGAgent.exe) Removal Using the MSI Step 1 – On your ControlGuard server Generate a universal machine password (valid for 7 days) using the RemoveAgentPasswordGen.exe. (See Zip File below) open a Command Prompt Run “C:Program FilesControlGuardEAMRemoveAgentPasswordGen.exe” ComputerName Copy and Paste the Uninstall Password into a text file in a temporary location. You should then copy this into the clipboard before running the MSI package uninstall. Step 2 – Log into the computer that you want to uninstall ControlGuard from. Ensure that all applications are closed then run. Setup.exe (See Zip File

| Continue Reading the full article....

Enable Two-step verification for Apple ID

Two-step verification for Apple ID. The only real way to truly secure your accounts these days are by using a two-step authentication method. If you are not sure what two-step authentication or verification is, its the same thing that banks have been doing for years. What is Two-Step Verification Two-step verification is a process involving two but independent stages to confirm the identity of the person trying to access a system or service. for example banks have been doing this for years where they give you standard username/password authentication to get access to the system there is a second step added to the process where once you ha

| Continue Reading the full article....

Transfer blackberry contacts to iPhone

1- On your blackberry, go to: www.google.com/mobile/sync and download and install the application “Blackberry Sync”. you can also find this in the “blackberry apps world” 2- after installation is completed. run this application, Enter user’s gmail account, and click Sync now. 3- Wait untill all contact uploaded in gmail. note that, these contacts will be merged with any existing contact in the gmail. 4- On your computer, go to www.google.com/contacts and make sure your Blackberry contacts are all there. 5- On your iPhone, go to Settings->Mail, Contacts, Calendars->Add Account->Microsoft Exchange. Enter g

| Continue Reading the full article....

Message Tracking with Powershell

With the Exchange Management Shell you should be able to run the below command to perform message tracking with Powershell and obtain a list in .csv format which will show you any email that match your search criteria. The message tracking logs on the hub transport servers retain the information for 30 days, therefore you can only track emails that were sent or received within that timeframe Use the below as a template copying all of the bold text below only changing the specific items highlighted below depending on the scope of your request get-exchangeserver | where-object -filter {$.isHubTransportServer} | Get-Messagetrackinglog -Recipient

| Continue Reading the full article....

Cisco CCNA exam Cram Sheet

Cisco CCNA exam Cram Sheet General Networking Port Numbers Port Number Layer 4 Protocol Suite Application 20 TCP FTP Data 21 TCP FTP Program 23 TCP Telnet 25 TCP SMTP 53 TCP/UDP DNS 69 UDP TFTP 80 TCP HTTP Ping Responses ! – Reply from target address . – Timeout U – Destination unreachable C – Congestion experienced I – User interrupt ? – Unknown packet type & – Packet lifetime exceeded Ethernet 5-4-3 rule – Between any 2 nodes there can only be a maximum of 5 segments, 4 repeaters and only 3 of those segments can have hosts. Loop back address – 127.0.0.1, tests

| Continue Reading the full article....

Enable Send As in Active Directory

How to Grant Send As access to a user This is a quick guide to grant Send As permission to a user on a distribution list, this is so that receiver would see that the reply address is that of the ”distribution list” and not the user who sent the mail. If the recipient would then reply, the distribution list would recieve the reply. Start ”Active directory users and computers, and search for the Group that you want to grant ”send as” rights for a user. Right Click on the Selected group and click Properties Click on the security tab. Click ‘Add’ then type the User’s name you want to grant se

| Continue Reading the full article....

List of useful Blackberry Shortcut Keys

List of useful Blackberry Shortcut Keys Blackberry Message shortcuts In a message Depending on the typing input language that you are using, some shortcuts might not be available. To reply to a message, press R. To reply to all in an email message or a PIN message, press L. To forward a message, press F. To file a highlighted email message, press I. To view the email address of a contact, highlight the contact in the To or From field. Press Q. To view the display name, press Q again. To move to the last cursor position after you close and reopen a received email message or PIN message, press G. In a message list To open a highlighted m

| Continue Reading the full article....

Run command as administrator

Run command or Install a program as administrator One of the common issues faced by IT Teams is installing or completing administrative tasks either remotely, or while logged on as a user with limited rights. The easiest way to complete this is to use the runas command to run the application / file as an administrative user. Click Start Type CMD.EXE in the search box. Type RUNAS /USER:\ You can also use “COMPUTERNAME\ADMINISTRATOR”. The command will then prompt you to enter the password, which is masked from the user (it will just appear as if there is nothing typed). This is useful if installing from the user’s profile etc, bu

| Continue Reading the full article....