TechTips.co.za

Useful Tech Tips, Tutorials and guides

Enable Facebook connector within Outlook

The Microsoft Outlook Social Connector for Facebook allows you to connect your Facebook account to the Outlook Social Connector and obtain information about your friends and colleagues. You can see status updates and recently posted items from your Facebook contacts. You can also use Outlook Social Connector to display a quick view of related Outlook content when you click on an email from a contact, such as recent e-mail conversations, meetings, and shared attachments to help you easily track your communications NOTE: The Microsoft Outlook Social Connector requires Microsoft Outlook Social Connector and the related update (KB983403) to be in

| Continue Reading the full article....

PGP Drive Encryption Problem Lenovo X220

PGP Drive Encryption Problem Lenovo X220 Newer Lenovo x220 laptops come with an updated BIOS version which is not compatible with PGP 9. If you encrypt the laptop using PGP9, after reboot, the PC it tries to load the PGP GUI where you enter the password and then gives following message on a black screen: Loading stage2 PGPWDE disk data are corrupted. Please use PGP recovery disk. Cannot continue. Press any key to halt the system. If you run the PGP boot disk it gives same message.   Cause: Laptop models: x220 or any older laptops where the BIOS has been upgraded to a recent version. X220s are shipped with an updated BIOS version w

| Continue Reading the full article....

Speed up Folder loading on Windows

Speed up Folder loading on Local System If folders take a lot of time to load in Windows, especially when the folder size is quite big. There is a really simple fix to speed up folder loading that should be part of any initial troubleshooting which is done. Right-click on the folder in question and choose Properties. On the Properties window, navigate to Customize tab. Select the General Items or Documents from the drop down in “Optimise this folder for” drop down Check apply this template to all sub folders. Click Apply and Ok. Rebuild the Index The indexing of files and folders can get messy and slow over time with the add

| Continue Reading the full article....

Unable to browse network shares via VPN

Unable to browse network shares via VPN Iv been getting a few requests with help on a problem that users are unable to browse network shares while connected to VPN. Network file sharing and printing require NetBIOS name resolution. The chances are that NetBIOS over TCP IP is disabled. To resolve this issue, change the following registry values for all TCP IP interfaces from 0 to 1. [HKEY_LOCAL_MACHINESYSTEMCurrent¬ ControlSetServicesNetBTParamete¬ rsInterfacesTcpipXX}] “NameServerList”=hex(7):00,00 “NetbiosOptions”=dword:00000001 This should Fix the issue.

| Continue Reading the full article....

IT Employee Confidentiality Agreement Template

IT Support Employee Confidentiality Agreement template* The overall benefit of a confidentiality agreement is to protect proprietary information of a business by restricting an employee or client from sharing that information with anyone. As most IT employees have the administrative rights to users files, network locations and systems, it is vital that all IT staff are under some form of confidentiality or nondisclosure agreement. The confidentiality agreement is generally signed when the IT employment begins working with the company but it can also be signed at the start of a particular project or phase of work. It may be used in both em

| Continue Reading the full article....

IT Document Template

IT Document Template (ITS Department or Desktop Support). We all know that IT engineers are not renowned for creating the most visually appealing support documentation. In order to give a good starting point Iv created a general document template. this will standardize and give a general look of structure to IT documents. The template can be used for almost any Document, Process, How to or guide. IT is not intended to be distributed to users directly however, the document would work as a formal policy document with a few minor changes. The document was designed to be used by ITS, IT, Service Desk and or Desktop Support departments, So al

| Continue Reading the full article....

BlackBerry Internet E-mail setup via your BlackBerry

To set up BlackBerry Internet E-mail via your BlackBerry, perform the following steps: Verify that your BlackBerry handheld is connected to the wireless network and is displaying uppercase GPRS in the top right corner. If your device is not displaying uppercase GPRS, go to BlackBerry Internet E-Mail Management and Troubleshooting. From the BlackBerry handheld Home screen or Tools menu, select the Set Up Internet E-mail or E-mail Setup icon. If prompted, read the Terms and Conditions, and then select Accept. Enter your e-mail address and password for the account you would like to access from your BlackBerry handheld. Confirm the password and

| Continue Reading the full article....

Fully Reset Users Windows Profile

Fully Reset Users Windows Profile Sometime the only fix is to do a full reset of the user’s profile, Iv seen this mainly with Offline file and folder sync issues, random app issues or general issues where it works when logged on as another user but won’t work as the current user. Log on as local Administrator or an account with Admin rights (Must be different from the account you are trying to reset.)** Ensure that you made a backup of the users profile folder which you are recreating. Click start type regedit and hit enter. Once Regedit is open, lookup HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList. You can confirm you 

| Continue Reading the full article....

Enable Two-step verification for Apple ID

Two-step verification for Apple ID. The only real way to truly secure your accounts these days are by using a two-step authentication method. If you are not sure what two-step authentication or verification is, its the same thing that banks have been doing for years. What is Two-Step Verification Two-step verification is a process involving two but independent stages to confirm the identity of the person trying to access a system or service. for example banks have been doing this for years where they give you standard username/password authentication to get access to the system there is a second step added to the process where once you ha

| Continue Reading the full article....

Transfer blackberry contacts to iPhone

1- On your blackberry, go to: www.google.com/mobile/sync and download and install the application “Blackberry Sync”. you can also find this in the “blackberry apps world” 2- after installation is completed. run this application, Enter user’s gmail account, and click Sync now. 3- Wait untill all contact uploaded in gmail. note that, these contacts will be merged with any existing contact in the gmail. 4- On your computer, go to www.google.com/contacts and make sure your Blackberry contacts are all there. 5- On your iPhone, go to Settings->Mail, Contacts, Calendars->Add Account->Microsoft Exchange. Enter g

| Continue Reading the full article....

Message Tracking with Powershell

With the Exchange Management Shell you should be able to run the below command to perform message tracking with Powershell and obtain a list in .csv format which will show you any email that match your search criteria. The message tracking logs on the hub transport servers retain the information for 30 days, therefore you can only track emails that were sent or received within that timeframe Use the below as a template copying all of the bold text below only changing the specific items highlighted below depending on the scope of your request get-exchangeserver | where-object -filter {$.isHubTransportServer} | Get-Messagetrackinglog -Recipient

| Continue Reading the full article....

Cisco CCNA exam Cram Sheet

Cisco CCNA exam Cram Sheet General Networking Port Numbers Port Number Layer 4 Protocol Suite Application 20 TCP FTP Data 21 TCP FTP Program 23 TCP Telnet 25 TCP SMTP 53 TCP/UDP DNS 69 UDP TFTP 80 TCP HTTP Ping Responses ! – Reply from target address . – Timeout U – Destination unreachable C – Congestion experienced I – User interrupt ? – Unknown packet type & – Packet lifetime exceeded Ethernet 5-4-3 rule – Between any 2 nodes there can only be a maximum of 5 segments, 4 repeaters and only 3 of those segments can have hosts. Loop back address – 127.0.0.1, tests

| Continue Reading the full article....

Enable Send As in Active Directory

How to Grant Send As access to a user This is a quick guide to grant Send As permission to a user on a distribution list, this is so that receiver would see that the reply address is that of the ”distribution list” and not the user who sent the mail. If the recipient would then reply, the distribution list would recieve the reply. Start ”Active directory users and computers, and search for the Group that you want to grant ”send as” rights for a user. Right Click on the Selected group and click Properties Click on the security tab. Click ‘Add’ then type the User’s name you want to grant se

| Continue Reading the full article....

Run command as administrator

Run command or Install a program as administrator One of the common issues faced by IT Teams is installing or completing administrative tasks either remotely, or while logged on as a user with limited rights. The easiest way to complete this is to use the runas command to run the application / file as an administrative user. Click Start Type CMD.EXE in the search box. Type RUNAS /USER:\ You can also use “COMPUTERNAME\ADMINISTRATOR”. The command will then prompt you to enter the password, which is masked from the user (it will just appear as if there is nothing typed). This is useful if installing from the user’s profile etc, bu

| Continue Reading the full article....

Add the My Computer Icon to the Windows 10 Desktop

Add My Computer - Check Boxes

If you want to add the My Computer Icon to the Windows 10 Desktop, or any of the standard User folder icon to the desktop in Windows 10 (Computer, Recycle Bin, Control Panel). Step1: Right-click on the desktop and choose Personalize. Step 2: Select Themes on the left-hand menu, and then once you are there, you can select Desktop icon settings under the “Related Settings” section. Step 3: You will now be able to click the checkboxes for the icons that you want back. once done click apply and Ok.

| Continue Reading the full article....