Monday, August 24, 2009

Installing Windows in Unattended Mode...

By Admin   Posted at  6:37 PM   No comments




  • Installing Windows in Unattended Mode...

Formating your System and Reinstalling Windows is a pretty boring and long work.

Now how to make it working. You can format your Hard Drive in a matter of minutes but Installation of Windows is long and boring, Especially when you have to sit in front of computer as setup is running and a window comes up, asking for the information.Well to overcome this a method called Unattended Installation was provided by Microsoft as in case to get rid of it.

Now, How to do this Unattended Installation?

Here is the solution,


Lets see it How.
Follow these steps before Formating your computer or onto another computer.
1.Insert your Windows Xp/2K3 disk into your computer and open the CD drive.
2.Open the Support folder, then tools. And then open the deploy(archive) file, you might need Winzip to open that file.
3.Now in that folder, run file “setupmgr.exe”. It will display Wizard.
4.Click next and select “Create New”. Select “unattended installation”, click next, then select the OS, click next. Select “fully automated”, click next.
5.After that wizard will now ask you all the questions that are asked by setup during installation.
Make sure you answer all the information correctly, for e.g. :- if in case you enter the wrong product key then, setup will not continue further, it will ask you the key again at the time of installation, so make sure you type in all the information correctly. After that very important step of saving the file. You need to save the file in a Floppy disk, and make sure that you name it as “winnt.sif” only.
In floppy disk you should see 2 files, winnt.sif and winnt.bat, if not go through the whole process again. Your Files are now ready1. When you will start the installation it will automatically take all the files from the file. Now you can install Windows Xp/2k3 into any computer.
So, next time you Install Windows,

Do use this to save your time...



What is Network Security?

Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system.
Appropriate network security is achieved when a user has to go through several layers of security before being able to access the desired network. The more layers the system has, the more secure it is.
The systems administrator is often in charge of network security since he has administrator privileges on the system. In fact, only the systems administrator and his assistants should have administrative access to the mainframe server and related computer terminals. This will help keep unauthorized people in the company from changing any data on the servers.
A systems administrator will also build a secure firewall for the network, which may include an encryption layer and sentinel software that automatically repels an unauthorized program from gaining access. The administrator may also place restrictions on employees' computers to prevent them from accessing websites that may have malicious coding or malware that will install itself on a user's computer. Anti-adware and malware programs are available for individual computers, as well as for networks.
One problem that generally arises when network security is implemented is that of flexibility. Management must balance security issues against employees' ability to access websites for their work. Communication among management, the systems administrator and employees is critical for network security to operate and for the employees to be able to work with it.
As evidenced in dealing with past e-mail and network viruses, security breaches are costly and detrimental to production and efficiency. U.S. companies spend millions of dollars each year in network security measures. A company's best defense against network security breaches is a multi-pronged attack. Firewalls with no single point of access, sharp systems administrators, frequent security updates, and early installation of anti-adware will all help keep a network safe.
Top 100 Network Security Tools
visit....
http://sectools.org/



Make windows vista genuine..

make vista genuineMake Vista Genuine Crack - (Paradox)
This one is the latest version of PARADOX crack!Works perfectly for all brand name machines as well!!All steps are included in readme.txt in the zip file!!
http://rapidshare.com/files/21119641/G4RMVGCPG4R.rar
OR
http://rapidshare.com/files/21119657/MirrorG4RMVGCPG4R.rar

About the Author

Harshal B Kolambe [aka] " HBK || XyberLord || Harschell " Bachelor of Engineering in Computers, Game Developer, Android Application Developer and Security Analyst, ( Certified Ethical Hacker ).
View all posts by: HBK

0 Your Comments:

Back to top ↑
Connect with Us

WhatsApp Share

What they says

one of the best mobile technology blog
one of the best mobile technology blog
one of the best mobile technology blog
one of the best mobile technology blog

Licencing

© 2013 Andropedia : The Android Fulcrum ™. Distributed By Blogger Themes | WP Mythemeshop Converted by Bloggertheme9
Blogger templates. Proudly Powered by Blogger.