Beruflich Dokumente
Kultur Dokumente
Reference Materials
Disclaimer: This document contains proprietary information of Wipro Ltd IAS. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Wipro Ltd. IAS. The information contained herein is confidential to Wipro Ltd. IAS and its Service Partners, shall not be distributed to any persons other than those involved in the assessment & delivery of services. Wipro Ltd. IAS reserves the right to revise and update this document as and when required. Wipro Ltd. IAS reserves the right to withdraw the document excluding customer specific information at the time of termination of services. All product names referenced herein are trademarks of their respective companies.
2010 Wipro Ltd Internal & Restricted
Topics - Overview
Hardware Basics Troubleshooting Networking N Computing Peripherals Software Antivirus Endpoint Apps. Internet/Intranet Linux Basics Mail Clients Toolkit Unistall Windows OS Process Care, Handling & Best Practices Process Basics
Standard Installation Process
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
HARDWARE BASICS
1.Intel Processor based PC - Intel & OEM based Mother Boards. Pentium & Celeron Based Processors. 2.AMD Processor Based PC (AMD based Processors.) - OEM based Mother Boards only. 3.Work Stations Thin Clients/Terminals. 4.Customised Small Form Factor PCs. Protos,Rural PC,NCOMP 5.Bundled Applications with the New PCs with Windows OS- Unistall 5 in 1 6.Super Genius Desktops(Windows Based OS) 7.IValue Desktops ( Linux Based OS)
4
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
MEMORY TYPES SDRAM DDR or DDR1 DDR2 DDR3 Power Supply(SMPS) 150 Watts 200 watts 250 watts 300 Watts 350 watts Processors Intel & AMD Processors
ADDON CARDS Network Interface Card (NIC) Video Graphics Adapter (VGA) Modem Cards.. Serial/Parallel Port card Housing ATX HOUSING MATX HOUSING SFF HOUSING Mother Boards Intel and Non-Intel M/B
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Input/Output Devices Keyboard, Mouse, Monitors Printers, Camera, Micro Phone, Head Phones/Speaker, Scanners, Printers, Plotters etc.
Power Supply: Supplies power throughout the computer. Power supplies converts potentially lethal 110-115 or 220-230 volt alternating current (AC) into a steady low-voltage direct current (DC) usable by the computer. A power supply is rated by the number of watts it generates.
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Optical Drives:
CD-ROM : A CD-ROM (Compact Disk Read Only Memory) is a drive which reads aluminum-coated round plastic discs however does not write to the discs invented in the United States 1972 OTHER CD TECHNOLOGIES: CD-R /- (CD Recordable) Drive which you are able to write to once. Once the drive is written to it cannot be erased. CD-RW - (CD ReWritable) drive which is a popular alternative to the CD-R drive. CD-RW has the capability of being written to at least one thousand times.
8
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
DVD (Digital Versatile Disc or Digital Video Disc) - Is the new future of computer CD-ROM drives. DVD drives became a new computer standard September of 1995 The DVD technology is very different from the technology used in standard CD-ROM drives. DVD uses shorter wavelength lasers to read smaller pits and lands. Discs also have two layers the first layer is semi-reflective to allow the laser to penetrate it and get to the substance beneath it. DVD drives also spin at a base speed that is about three times as fast as a single speed CD-ROM drive. DVD-ROM : DVD-RAM will be capable of holding 2.6GB per side. DVD-RW : Standard of ReWritable DVD discs being promoted by Hewlett Packard , is capable of holding 4.7 GB of data.
DIVIX: (Digital video express) - New DVD-ROM which was developed and promoted by several large companies including Disney, Dreamworks SKG, The Divix player is more expensive then a standard DVD drive
9
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Common data transfer speeds for CD-ROM drives Transfer speed 1 2 KiB/s 150 300 Mbit/s 1.23 2.46 200-500 400-1,000 RPM
4
8 10 12 20 32 36 40 48 52 56 72 1,200-3,000 1,920-4,800 2,160-5,400 2,400-6,000 2,880-7,200 3,120-7,800 3,360-8,400 6,750-10,800
600 1,200
1,500 1,800 up to 24.6 up to 39.3 up to 44.2 up to 49.2 up to 59.0 up to 63.9 up to 68.8 up to 88.5
4.92 9.83
12.3 14.7
800-2,000 1,600-4,000
2,000-5,000 2,400-6,000 4,000 (CAV) 4,800 (CAV) 7,200 (CAV) 8,000 (CAV) 9,600 (CAV) 10,400 (CAV) 11,200 (CAV) 2,000 (multi-beam
10
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
IDE HDD
11
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
13
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
15
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
16
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
17
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Processor
The processor (CPU, for Central Processing Unit) is the computer's brain. It allows the processing of numeric data, meaning information entered in binary form, and the execution of instructions stored in memory. Hyper threading is the technology used in processors which enables one processor to act as a multiple processor. In multi-core architecture, more than one processors are integrated in one physical packaging.
Current Processors:
Dual Core & Core 2 Duo Runs two independent processor cores in one physical package at the same frequency.
Quad Core: Runs 4 independent processor cores in one physical package at the same frequency.
18
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Dual Core
Clock Speed Up to 2.33 GHz speed
Core 2 Duo
Greater clock speeds of upto 3.33 GHz is available now.
Power Consumption
Cache Support
FSB Speed
Cost
These processors are priced from $40 to $140 for different versions of processors Low cost
These processors are priced from $120 to $270 for different versions of processors Higher Cost
Over-locking
They can be easily overclocked up to 4.0 GHz with suitable coolers. Even a overclocking at 6.0GHz was made possible with Liquid Nitrogen cooling.
Can be overclocked upto 20-30% of its specified clock speed without much problem.
19
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Printers: Printer is an electro-mechanical device that receives data from the PC in the form of binary coded characters and prints the characters on the paper
20
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Output Devices: Monitor, Printer Display Units: CRT: Cathode Ray Tube Color monitors have 3 electron guns that control the display of red, green and blue light. The surface of the CRT is arranged to have these dots placed adjacently in a specific pattern.
LCD: They are lighter, thinner, use less power and do not flicker like their CRT counterparts. LCD should be avoided to extreme light, heat and cold.
21
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
In information and communications technology , a standard for communication between devices (such as computers, PDAs and mobile phones) over short distances using infrared signals IrDA is a very short-range example of free space optical communication. IrDA interfaces are used in medical instrumentation, test and measurement equipment, palmtop computers, mobile phones, and laptop computers (most laptops and phones also offer Bluetooth but it is now becoming more common for Bluetooth to simply replace IrDA in new versions of products). For the devices to communicate via IrDA they must have a direct line of sight similar to a TV remote control IrDA was popular on laptops and some desktops during the late 90s through the early 2000s. However, it has been displaced by other wireless technologies such as WiFi and Bluetooth, favored because they don't need a direct line of sight, and can therefore support hardware such as mice and keyboards. It is still used in some environments where interference makes radio-based wireless technologies unusable. IrDA popularity is making a comeback with its highly efficient IrSimple protocols by providing sub 1 second transfers of pictures between cell phones, printers, and display devices. IrDA hardware is still less expensive and doesn't share the same security problems encountered with wireless technologies such as Bluetooth IrDA data communications operate in half-duplex mode because while transmitting, a devices receiver is blinded by the light of its own transmitter, and thus, full-duplex communication is not feasible. The two devices that communicate simulate full duplex communication by quickly turning the link around
23
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Performance: First and foremost, the motherboard determines what types of processors, memory, system buses, and hard disk interface speed your system can have, and these components dictate directly your system's performance. Second, the quality of the motherboard circuitry and chipset themselves have an impact on performance. Upgradability: The capabilities of your motherboard dictate to what extent you will be able to upgrade your machine. For example, there are some motherboards that will accept regular Pentiums of up to 133 MHz speed only, while others will go to 200 MHz. Obviously, the second one will give you more room to upgrade if you are starting with a P133. for a new motherboard, you need to open up your existing case and determine whether or not the power supply will be compatible. Many new motherboards require an additional 12V, 4-wire connector for the CPU, which most power supplies older than two years will lack. The newest motherboards for the Intel Socket 775 CPU's may also require a 24 pin ATXe connector, or give you the option to use a third drive connector to suppliment motherboard power.
28
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Conventionally used in mass-produced "name brand" retail systems, the LPX motherboard form factor goes into the small Slim line or "low profile" cases typically found on these sorts of desktop systems. The primary design goal behind the LPX form factor is reducing space usage (and cost). This can be seen in its most distinguishing feature: the riser card that is used to hold expansion slots. Instead of having the expansion cards go into system bus slots on the motherboard, like on the AT or ATX motherboards, LPX form factor motherboards put the system bus on a riser card that plugs into the motherboard. Then, the expansion cards plug into the riser card; usually, a maximum of just three. This means that the expansion cards are parallel to the plane of the motherboard. This allows the height of the case to be greatly reduced, since the height of the expansion cards is the main reason full-sized desktop cases are as tall as they are. The problem is that you are limited to only two or three expansion slots!
32
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
LPX form factor motherboards also often come with on board video display adapter cards built into the motherboard. If the card built in is of good quality, this can save the manufacturer money and provide the user with a good quality display However, if the user wants to upgrade to a new video card, this can cause a problem unless the integrated video can be disabled in the Bios setup. LPX motherboards also usually come with serial, parallel and mouse connectors attached to them, like ATX. While the LPX form factor can be used by a manufacturer to save money and space in the construction of a custom product, these systems suffer from non-standardization, poor expandability, poor upgradability, poor cooling and difficulty of use for the do-it-yourselfer. They are not recommended for the homebuilder, but if you are upgrading one of these systems, you may not have many alternatives.
33
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Revised design to support larger memory modules and modern DIMM memory packaging. Support for the newest processor technologies Support for AGP/PCIE video/add-on cards. Better thermal characteristics, to support modern CPUs that run hotter than old ones. More optimal location of CPU on the board to allow easier access and better cooling. More flexibility in how the motherboard can be set up and configured. Enhanced design features, such as the ability to mount the motherboard so it can slide in or out of the system case easily. Support for desktop and tower cases. The NLX form factor is, like the LPX, designed primarily for commercial PC makers mass-producing machines for the retail market. Many of the changes made to it are based on improving flexibility to allow for various PC options and flavors, and to allow easier assembly and reduced cost. For homebuilders and small PC shops, the ATX form factor is the design of choice heading into the future. Data Transfer between memory & peripherals is been controlled by DMA Controllers which will not impact any processor performance.
34
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The system BIOS is what starts the computer running when you turn it on. The following are the steps that a typical boot sequence involves. Of course this will vary by the manufacturer of your hardware, BIOS, etc., and especially by what peripherals you have in the PC. Here is what generally happens when you turn on your system power: The internal power supply turns on and initializes. The power supply takes some time until it can generate reliable power for the rest of the computer, and having it turn on prematurely could potentially lead to damage. Therefore, the chipset will generate a reset signal to the processor (the same as if you held the reset button down for a while on your case) until it receives the Power Good signal from the power supply.
35
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The BIOS performs the power-on self test (POST). If there are any fatal errors, the boot process stops. The BIOS looks for the video card. In particular, it looks for the video card's built in BIOS program and runs it. This BIOS is normally found at location C000h in memory. The system BIOS executes the video card BIOS, which initializes the video card. Most modern cards will display information on the screen about the video card. (This is why on a modern PC you usually see something on the screen about the video card before you see the messages from the system BIOS itself). The BIOS then looks for other devices' ROMs to see if any of them have BIOS. Normally, the IDE/ATA hard disk BIOS will be found at C8000h and executed. If any other device BIOS are found, they are executed as well. The BIOS displays its startup screen The BIOS does more tests on the system, including the memory count-up test, which you see on the screen. The BIOS will generally display a text error message on the screen if it encounters an error at this point.
36
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The BIOS performs a "system inventory" of sorts, doing more tests to determine what sort of hardware is in the system. Modern BIOS have many automatic settings and will determine memory timing (for example) based on what kind of memory it finds. Many BIOS can also dynamically set hard drive parameters and access modes, and will determine these at roughly this time. Some will display a message on the screen for each drive they detect and configure this way. The BIOS will also now search for and label logical devices (COM and LPT ports). If the BIOS supports the Plug and Play standard, it will detect and configure Plug and Play devices at this time and display a message on the screen for each one it finds The BIOS will display a summary screen about your system's configuration. Checking this page of data can be helpful in diagnosing setup problems, although it can be hard to see because sometimes it flashes on the screen very quickly before scrolling off the top. The BIOS begins the search for a drive to boot from. Most modern BIOS contain a setting that controls if the system should first try to boot from the floppy disk (A:) or first try the hard disk (C:). Some BIOS will even let you boot from your CD-ROM drive or other devices, depending on the boot sequence BIOS setting.
37
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Power-On Self Test (POST) :The first thing that the BIOS does when it boots the PC is to perform what is called the Power-On Self-Test, or POST for short. The POST is a built-in diagnostic program that checks your hardware to ensure that everything is present and functioning properly, before the BIOS begins the actual boot. It later continues with additional tests (such as the memory test that you see printed on the screen) as the boot process is proceeding. The POST runs very quickly, and you will normally not even noticed that it is happening--unless it finds a problem. You may have encountered a PC that, when turned on, made beeping sounds and then stopped without booting up. That is the POST telling you something is wrong with the machine. The speaker is used because this test happens so early on, that the video isn't even activated yet! These beep
39
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
40
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
41
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The Intel Pentium 4 processor on 90-nanometer (nm) technology is the first Intel processor to be manufactured on 90nm semiconductor process technology. This new process offers smaller dimensions and more transistors on the same area, allowing us to double the number of transistors while reducing the chip size by over 15 percent.
Intel Pentium 4 processor on 90nm technology contains several micro architecture enhancements such as a larger 1 MB Level 2 (L2) cache, larger 16 KB Level 1 (L1) cache. The processor also has eight write-combining buffers compared to six in the previous generation.
For example, a home user can play an immersive game while encoding audio or video, compressing images or compositing special effects. The 90nm process technology reduces size by more than 15% compared to the previous 130nm process, while more than doubling the number of transistors
42
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Intel multi-core technology provides new levels of energy efficient performance, enabled by advanced parallel processing and 45nm technology. Incorporating multiple processor execution cores in a single package Intel Trusted Execution Technology (Intel TXT), is a highly versatile set of hardware extensions to Intel processors and chipsets that, with appropriate software, enhance the platform security capabilities. Trusted Execution Technology will provide a hardware-based security foundation that will help enable greater levels of protection for information stored, processed and exchanged on the PC
43
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Hyper-Threading Technology allows one physical processor to appear to the operating system as two logical processors [2]., Intel AMT allows to better discover, heal, and protect IT networked computing assets. included better asset management, reduced downtime, and minimized desk-side visits. Intel design teams determined that these issues were best addressed through platform architectural enhancements, resulting in the following features for supporting those needs. Hardware-assisted Intel Virtualization Technology (Intel VT) provides greater flexibility and maximum system utilization by consolidating multiple environments into a single server, workstation, or PC. With fewer systems required for the same tasks, Intel VT delivers Simplified resource management increasing IT efficiency. Greater systems reliability and availability reducing corporate risk and real-time losses from downtime. Lower hardware acquisition costs with increased utilization of the machines already have. Virtualization solutions enhanced by Intel VT allow a platform to run multiple operating systems (OS) and applications as independent virtual machines, allowing one computer system to function as multiple "virtual" systems. For example, IT managers can create a single build with multiple and different OS, software, and legacy applications. With support from the processor, chipset, BIOS, and enabling software, Intel VT improves traditional software-based virtualization
44
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Cycle time[2]
Module name
Peak transfer rate 1600 MB/s 2100 MB/s 2700 MB/s 3200 MB/s
DDR-200 100 MHz 10 ns DDR-266 133 MHz 7.5 ns DDR-333 166 MHz 6 ns DDR-400 200 MHz 5 ns
45
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
SDRAM SDRAM is a dynamic random access memory (DRAM) that has a synchronous interface. Traditionally, dynamic random access memory (DRAM) has an asynchronous interface.
SDRAM is widely used in very old computers; from the original SDRAM further generations of DDR (or DDR1), and then DDR2 and DDR3 have entered the mass market, with DDR4 currently being designed
46
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
DDR RAM
47
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
DDR2 SDRAM is a double data rate synchronous dynamic random access memory interface. It supersedes the original DDR SDRAM specification and the two are not compatible. In addition to double pumping the data bus as in DDR SDRAM, (transferring data on the rising and falling edges of the bus clock signal). DDR2 employs an I/O buffer between the memory and the data bus so that the data bus can be run at the twice the speed of the memory clock. The two factors combine to achieve a total of 4 data transfers per memory clock cycle. With data being transferred 64 bits at a time, DDR2 SDRAM gives a transfer rate of (memory clock rate) 2 (for bus clock multiplier) 2 (for dual rate) 64 (number of bits transferred) / 8 (number of bits/byte). Thus with a memory clock frequency of 100 MHz, DDR2 SDRAM gives a maximum transfer rate of 3200 MB/s. Since the memory clock runs at half the external data bus clock rate, DDR2 memory operating at the same external data bus clock rate as DDR will provide the same bandwidth but with higher latency, resulting in inferior performance. Alternatively, DDR2 memory operating at twice the external data bus clock rate as DDR may provide twice the bandwidth with the same latency (in nanoseconds). The best-rated DDR2 memory modules are at least twice as fast as the best-rated DDR memory modules.
Cycle time
DDR2-400 100 MHz 10 ns DDR2-533 133 MHz 7.5 ns DDR2-667 166 MHz 6 ns
Data transfers per second 400 200 MHz Million 533 266 MHz Million 667 333 MHz Million I/O Bus clock 800 400 MHz Million 1066 533 MHz Million
Module name
Timings[2][3] 3/3/3 4/4/4 3/3/3 4/4/4 4/4/4 5/5/5 4/4/4 5/5/5 6/6/6 6/6/6 7/7/7/
48
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
49
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
HARDWARE BASICS ATA's ribbon cables have had 40 wires for most of its history (44 conductors for the smaller form-factor version used for 2.5" drives - the extra four for power), but an 80-wire version appeared with the introduction of the Ultra DMA/33 (UDMA) mode. All of the additional wires in the new cable are ground wires, interleaved with the previously defined wires to reduce the effects of capacitive coupling between neighboring signal wires, reducing crosstalk. Capacitive coupling is more of a problem at higher transfer rates, and this change was necessary to enable the 66 megabytes per second (MB/s) transfer rate of UDMA4 to work reliably. The faster UDMA5 and UDMA6 modes also require 80-conductor cables.
ATA cables: `Though the number of wires doubled, the number of connector pins and the pin-out remain the same as 40-conductor cables, and the external appearance of the connectors is identical. Internally the connectors are different; the connectors for the 80-wire cable connect a larger number of ground wires to a smaller number of ground pins, while the connectors for the 40-wire cable connect ground wires to ground pins one-for-one. 80-wire cables usually come with three differently colored connectors (blue controller, gray slave drive, and black master drive) as opposed to uniformly colored 40-wire cable's connectors (all black). The gray connector on 80conductor cables has pin 28 CSEL not connected; making it the slave position for drives configured cable select
50
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
AT (Advanced technology): They are similar to the original motherboards found in the IBM AT. The microprocessor, memory and expansion slots are all in line with each other. The advancement in the field of electronics resulted in the design of smaller components that occupied less space. This configuration is known as Baby AT ATX: The ATX motherboard has the microprocessor and memory slots at right angles to the expansion slots. This puts the microprocessor and memory in the same line with the fan output of the power supply allowing the microprocessor to cool. In addition, more space was available, as the microprocessor and memory were not in line with the expansion slots.
51
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
52
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
LPT
DIN Connector
USB
53
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Fire ware:
Video:
Power Cord
Mini Jack:
54
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
56
Agenda
Basics of Networking Networking Standards Network Devices & Definitions TCP/IP Network Addressing VLAN & ARP Basic Definitions for L2 & L3 Networks
57
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Basics of Networking
What & Why is Network
Distribute pieces of computation among computers (nodes)
Coordination between processes running on different nodes Remote I/O Devices
Basics of Networking
ISO-OSI is standard of network but we commonly use TCP/IP, which has no session/presentation layer
59
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Basics of Networking
Physical Layer: o Standardized protocol dealing with electrical, mechanical and signaling interfaces. o Concerned with the transmission of bits Data Link Layer: o Logical Link Control (LLC) defines how data is transferred over the cable and provides data link service to the higher layers. o Medium Access Control (MAC) defines who can use the network when multiple computers are trying to access it simultaneously (i.e. Token passing, Ethernet [CSMA/CD], etc...). o Handles errors in the physical layer. o Groups bits into frames and ensures their correct delivery. Network: o Concerned with the transmission of packets. o Choose the best path to send a packet (routing). o It may be complex in a large network (e.g. Internet). o Shortest (distance) route vs. route with least delay. o Most popular protocol widely used is x.25 and TCP/IP
60
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Basics of Networking
Transport Layer: o Network layer does not deal with lost messages.Transport layer ensure reliable service. It breaks the message (from sessions layer) into smaller packets, assigns sequence number and sends them. o TCP/IP is widely used for network/transport layer. UDP (Universal Datagram Protocol): Internet connectionless transport protocol. Session & Presentation Layer: o Just theory! Very few applications use it. Application Layer: o Collection of miscellaneous protocols for high level applications o Electronic mail, file transfer, connecting remote terminals, etc. o E.g. SMTP, POP, IMAP, FTP, Telnet, SSH, HTTP, HTTPS, SNMP, etc...
61
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Networking Standards
IEEE 802 IEEE 802.1 IEEE 802.2 IEEE 802.3 IEEE 802.5 IEEE 802.11 IEEE 802.15 IEEE 802.16 IEEE 802.17 : Internetworking : Bridging & Management : Logical Link Control : CSMA/CD (Ethernet) Access Method : Token Ring Access Method : Wireless : Wireless Personal Area Networks : Broadband Wireless MAN : Resilent Packet Rings
62
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
SWITCHES
BRIDGES ROUTERS
FIREWALL
63
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
64
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
65
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
66
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
67
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Class B addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 128.1.x.x to 191.254.x.x.
Class C addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 192.0.1.x to 223.255.254.x.
68
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
69
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The following table displays several common netmask values in both the dotteddecimal and the mask-length formats.
70
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
72
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
73
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer.
The best-known example of a layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, to router to router, and from egress router to destination end system.
74
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Network Cabling
Ethernet Straight Cabling: The UTP cable contains eight conductors, arranged in four twisted pairs, and is terminated with an RJ45 type connector. A normal straight-through & Cross Over UTP Ethernet cable follows the EIA568B standard wiring as described below.
Straight Through
Cross Over
Note that here on the other end of cable we are using pin 3 & 6 in replacement of 1 & 2 and vice versa
75
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
N Computing
76
Host PC (User 1)
User 2
User 3
User 4
User 5
User 6
User 7
Share the excess power of todays PCs with multiple users through Very low cost access devices
77
How it Works
NComputing Terminal Services software sets up Virtual Independent Desktops inside one Windows or Linux PC.
NComputing User eXtension Protocol (UXP) delivers an efficient secure, multimedia interface.
NComputing Virtual PCs are small, silent, energy-efficient, reliable, and very inexpensive.
78
Ncomputing X300
The X300 access terminal kit enables you to dramatically cut computing costs by sharing the untapped power of PCs. The kit includes three access terminals, one PCI card, and terminal services software that work together to efficiently harness excess computing capacity and enable multiple users to share a single PC. It is easy to manage and is compatible with standard PC applications. The terminal services software for the X300, divides the host PC's resources into independent sessions that give each user their own robust PC experience. One PC can support up to seven users. Supports multiple resolutions 1024x768, 800x600, 16-bit color Small, efficient and eco-friendly With a small footprint and no moving parts, the X300 runs completely silent and saves energy by using only 5 watts. It's design meets strict environmental guidelines and is RoHS compliant.
79
2010 Wipro Ltd Internal & Restricted
Not a PC!
No CPU No storage No software
80
Technology
Minimum System Requirements
For one X300 PCI card, a host PC with at least the following:
A 1.3 GHz processor 512 MB RAM Keyboard, mouse, and monitor required for each access terminal Speakers optional for each access terminal (amplified speakers recommended) For two X300 PCI cards, a host PC with at least the following: A 2.4 GHz processor 1 GB RAM Keyboard, mouse, and monitor required for each access terminal Speakers optional for each access terminal (amplified speakers recommended) Operating Systems Windows Linux
81
How it works
The end-user still has their own monitor, keyboard, mouse and speakers Instead of connecting directly to a PC, these peripherals connect to the small NComputing access terminal on their desk. The access terminals then connect either directly (X Series) or over Ethernet (L Series) to the host computer Generally 2D games are supported at the moment. Casual games (Java and Flash), which can be played on the Internet, are also supported. High performance 3D games, which require a high speed GPU (Graphic Processor Unit) and a hardware accelerated function, are currently not supported. Other games including single user games which require a CD for operation are not supported. A game, which is designed to be used only on the same computer by checking the IP, is not supported. Windows itself checks out those specifications and rejects more than one loading, and thus those games are not supported.
82
Advantages
The system has been designed to be highly efficient so as not to require x86-class CPUs and chipsets like traditional thin client devices. Very low power requirements (less than 5 Watts) No Obsolescence MTBF - 45 years Low cost of acquisition and Maintenance Zero foot printVESA mounting
83
Environmental Impact
Saves 95%
in electricity
84
Product Overview
X Series
PCI-based X300 Lowest Cost Ultimate multimedia performance PC in same room (10m) 1 watt per user Up to 7 users can share one Low End PC
L Series
Up to 30 users can share one Desktop PC Ethernet = no distance limits Highest # of users per PC 5-6 watts per user
Ethernet-based L230
85
Step 4: Install NComputing software on Host PC directly or via imaging software (like Ghost)
Step 3: Connect access terminal to the PCI card via standard UTP cable
2010 Wipro Ltd Internal & Restricted
86
87
88
NComputing L Series
Ethernet switch
Highlights
Ideal for business and schools Up to 30 users connected to a high-end PC/server Ethernet-connected, so no distance limitation 5-6 watts per user Windows or Linux
L200
90
91
Microphone The L230 includes a microphone port. Minimum System Requirements Host Computer For multiuser applications the host computer operating system can be Windows Server 2003 R2 SP2 (Standard or Enterprise Edition, 32-bit), Windows Server 2008 SP2 (Standard or Enterprise, 32-bit), or supported Linux distributions.
92
2010 Wipro Ltd Internal & Restricted
94
Windows 7
95
Windows 7
Windows 7 is the next version of Windows after Windows Vista. There are 4 editions of Win 7.
96
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Flavors in Windows 7
97
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Windows 7
Windows 7 system requirements If you want to run Windows 7 on your PC, here's what it takes: 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) 16 GB available hard disk space (32-bit) or 20 GB (64-bit) DirectX 9 graphics device with WDDM 1.0 or higher driver
98
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Windows 7
99
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
100
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
This menu selection will display the System screen which is displaying basic information about the computer running Windows 7. You can also open this screen by opening the Control Panel and then selecting the System and Security and later System item. Another way to open this is by typing slui.exe in the search programs window. You can see the Windows activation status at the bottom of this screen. The right side picture shows the same.
101
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
102
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
103
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
104
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
105
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
106
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
107
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Windows 7 Administration
The following link is useful for Windows 7 administrators about administrative options.
http://windows.microsoft.com/en-IN/windows7/help/top-solutions
108
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
With Windows 7, you can lock your workstation so that no one can access your computer if you are temporarily away from your desk. Whether you are away from your computer for a few minutes, several hours, or an entire day, Windows 7 provides you with an efficient method for safeguarding your computer and the data stored on it.
109
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
110
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
111
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
When you search libraries, both the properties and contents of documents are searched. The results of your search are highlighted so you can see which documents match your search. When searching libraries, you can use a search filter to refine your search. The filter options displayed vary depending on the type of library being searched. Windows maintains a list of your recent searches so that you can quickly rerun them if needed. You can save a search so that you can rerun it later. Saved searches are added to your list of Favorites in Windows Explorer. If your search does not return the results you hoped for, you can search again in other locations, including the Internet.
112
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
You can see the details after the back up about the space used in the targeted device. You can restore later in the next option, Restore which shown down in the picture.
113
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Task
Enable Bit Locker on the Operating System Drive
Description
By default, a Trusted Platform Module (TPM) version 1.2 or higher chip must be installed on your computer in order for you to use Bit Locker to encrypt the system drive. The TPM chip is used to store the Bit Locker encryption key.
If your computer does not have a TPM chip, your network administrator can configure a policy that allows the Bit Locker encryption key to be stored on a USB removable storage device, such as a flash drive. Enable Bit Locker on a Data Drive
Data drives are internal disk drives that do not have an operating system installed on them. You do not need a TPM chip on your computer to encrypt a data drive by using Bit Locker.
USB removable storage devices include external hard drives, flash drives, and other memory devices. You do not need a TPM chip on your computer to encrypt a USB removable storage device by using Bit Locker To Go.
115
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
116
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Click on the Network Icon in the system tray. You will see the networks available. Open Network Sharing Centre & Check the options available to connect. Click on Set up a New connection on Network to set the new connection/Sharing options as shown below. Click on the Choose Home group & Sharing Options for Local/Public File & Folder sharing in the Local/Public Network.
117
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Feature
What it Does?
Scenario Example
VPN Reconnect Karen is working remotely using her laptop and has a VPN connection established with the corporate network. She has a document on the corporate network open and is working on it when her Internet connection fails. She walks to a nearby coffee shop and establishes a new Internet connection there and continues to work on her open document without losing her work.
Keeps a VPN connection alive when the underlying Internet connectivity changes or is interrupted.
View Available Networks (VAN) Michael is at the airport waiting for his flight. His laptop is connected to the Internet using a wireless hotspot at the airport. He needs to connect to the corporate network to retrieve some files, so he clicks the network icon in the system notification area, clicks the VPN connection, clicks Connect, and moments later he can retrieve his files.
By clicking on the network icon in the system notification area of the taskbar, users can quickly and easily connect to wireless networks and establish VPN connections with remote networks.
118
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Scenario Example
Mobile Broadband Jacky is travelling and needs to connect to the corporate network to do some work. The hotel she is staying at does not provide Internet access, and there is no nearby public wireless hotspot. Using her Mobile Broadband ExpressCard, she establishes an Internet connection using her cellular phone service provider's network and then establishes a VPN connection to the corporate network. Tony is sitting at a coffee shop with his laptop connected to the Internet using the wireless hotspot there. His company's IT department has implemented DirectAccess. He needs to upload his sales orders to the corporate network, so he opens his sales order application as if his laptop was on the corporate LAN and uploads the orders, without the need of first establishing a VPN connection to the corporate network.
Also know as wireless wide area network (WWAN) technology, this technology provides wireless high-speed Internet access over 2G, 2.5G or 3G cellular networks using a mobile broadband data card, which can be either a PC card, USB card, ExpressCard, or embedded laptop module.
DirectAccess
Enables remote users to seamlessly and securely access the corporate network anytime they have an Internet connection, without the need of first establishing a VPN connection.
119
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
bcdedit is the command to edit boot loader in Win 7. The command perfmon is used to monitor the system performance.
120
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
Advance Boot Options for Windows 7 Continued
121
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
122
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
System Restore
Open the Start Menu.
123
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
124
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
125
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting Windows 7
126
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting - Windows 7
To make Windows 7 Faster
1. Keeping an eye about the hard drive space. Do not save big files in primary partition. 2. Regularly cleaning out unused files you no longer use, Remove temp files. 3. Removing the applications which are not in use. 4. Limit only necessary files in the start up. 5. Checking errors on a regular schedule. 6. Defragmenting disk regularly. 7. Turn on Automatic Updates & Make sure they are getting installed. 8. You ought to also enable the write cache of hard disk. Write caching implies that windows 7 doesn't flush changed data to the disk before system is idle, which improves performance. Click "Start" and point to "Search". Input "device" into the research box and Press "Search". Select "Device Manager" within the research results. Open the Disk Drives branch. Click the hard disk for its property sheet. Activate "Enable Write Caching" on the Device check box. For maximum performance, activate the "Turn Off windows WriteCache Buffer Flushing on the Device" too. Click "OK" for faster windows 7.
127
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting - Windows 7
How to connect to internet:
http://windows.microsoft.com/en-us/windows7/setting-up-a-home-network
http://windows.microsoft.com/en-us/windows-vista/Using-ICS-Internet-ConnectionSharing
128
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Windows Vista
129
System Requirements
Basic
Modern 800MHz processor 512MB RAM DirectX 9 Graphics
Premium ready
1 GHz x86 or x64 processor 1GB RAM DirectX 9, WDDM, 128 MB graphics RAM, Pixel Shader 2.0, 32 bits per pixel DVD-ROM Audio Internet Access
130
Windows Vista
132
Software's
IE7 comes as standard
Note no support from Oracle yet For OSS and Financials
Microsoft is offering Windows Live OneCare There are others including F-Secure and AVG
133
134
135
136
138
1. 2. 3. 4.
139
140
141
142
143
144
145
146
147
148
149
Ctrl+Shift+Esc hotkey opens Task Manager. Task Manager Opens. Click on File > New Task (Run) there allows to type , Type
Explorer.exe & Press enter. Now the desktop appears. Scan for Virus/Malware with the Antivirus & remove the same.
150
2010 Wipro Ltd Internal & Restricted
Internet Explorer
151
Internet Explorer
How to install & repair the IE? Please refer the link: http://support.microsoft.com/kb/318378 Other Tips:
Internet Explorer 8 is the default web browser with Windows 7 while IE 7 is the default with Windows Vista. After opening IE, If you click on Help -> About, You will be able to find the exact version of Internet Explorer. In the corporate environment, Customer may be browsing the net through proxy. Some of the sites may be blocked in the office by customer IT Team through proxy. The proxy settings should be done from the Tools Menu - > Internet Options - > Connections -> Proxy Settings. The proxy server name & The default port should be mentioned clearly. In home broadband or through Data Card, This setting should be disabled. Too much temporary files/cookies may lead to the slow browsing or IE not working properly. Go to Tools -> Internet Options & Click on Clear Cookies, Clear Temp Files. Read the following topics as well to understand the Security Zone troubleshooting. http://support.microsoft.com/kb/182569
152
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Mail Clients
153
154
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
After noting these details, Cancel all the screens. Please take the back up of mails. The easy way to take the back up of the folder is as follows.
155
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
As shown above, Select the folder path, Right click & Copy the same. Close the Outlook Express. Then, Go to run, Paste the same path. Delete Inbox.dbx at the end, As shown in the next slide.
156
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
157
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
158
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
After configuring the account successfully, Make two Folders as shown in the right side. (Please Note: Under Local Folders), Old Inbox & Old Sent Items (Case & Name should match as Renamed last time). After doing this, Please close the outlook Express.
159
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
160
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
One more problem observed, The sent mails will be copied to Outbox & Will not be removed. Every time when new mails sent, The old mail will be sent again. Solution: Close the Outlook Express after copying the folder path. Go to Run & Paste the path, as illustrated above picture. The folder will be opened. Delete the Outbox.dbx file. Close the Folder, Open the Outlook Express & Check now. The problem will be resolved.
161
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
162
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
For your server type, select POP3 or IMAP, and then click Next.
163
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
send e-mails, you must first activate SMTP relay on your e-mail account. Log on to your Manage Email Accounts page to set up SMTP relay. If you do not have SMTP relay set up and your Internet Service Provider (ISP) allows it, you can use the outgoing mail server for your Internet Service Provider. Contact your Internet Service Provider to get this setting.
164
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
165
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Go to the Advanced tab, and then change the Outgoing server (SMTP) port to 80 or 3535, As shown in the right side picture. Click on OK. Click next & Click on Finish. This completes the configuration.
166
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
How to find a .pst file If you do not know where an old or existing .pst file resides on your computer and you want to add this .pst file to your Outlook profile, this section explains how to search for the .pst file and then add it to your Outlook profile.
171
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
174
Open Office
175
Open Office
In case you want to remove the borders, in the same above window, Go to the Borders tab and select None.
176
2010 Wipro Ltd Internal & Restricted
Open Office
177
Open Office
178
Open Office
8. Find & Replace Ctrl+F is used for "Find and Replace". 9. Header and Footer To add a header to a page, choose Insert - Header, and then select the page style for the current page from the submenu. To add footer to a page, choose Insert - Footer, and then select the page style for the current page from the submenu. You can also choose Format - Page, click the Header or Footer tab, and then select Header on or Footer on. Clear the Same content left/right check box if you want to define different headers and footers for even and odd pages. To use different headers or footers in your document, you must add them to different Page Styles (explained below in Section 11), and then apply the styles to the pages where you want the headers or footer to appear.
179
MS Office
To know about MS Office installation & repair, Please refer the below link: http://support.microsoft.com/kb/924611
180
Peripherals
181
Printers
Before starting the troubleshooting, Please check the physical connectivity of the Printer & also ensure that the device is online, No error indication from the printer. Also ensure that the papers are in place properly. Printer Self Test Most printers have a way of printing a test page. This page allows you to determine if the printer is physically working or not. This test is usually accomplished by holding down a series of keys. If you are not sure if your printer has this feature or how to perform it refers to your manual or visit the printer manufacturers web site. If this is not giving the printout does mean there is a problem with the device. If its printing properly with the key combinations, It does mean that the device is working fine, Need to check connectivity & Driver or even the LPT/USB Port. In addition to testing the printer using the printer self-test Microsoft Windows users can also perform software self-test to determine if their computer is able to see the printer and it's able to print. Follow the below steps to perform this test.
182
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Printers
Printer Self Test: Microsoft Windows XP, 2003, and Vista users Click Start, Settings, and open Control Panel. Double-click the Printers or Printers and Fax Icon. Right-click on the Printer you wish to test and click Properties. If you do not see your printer listed your printer is not installed In the Printers Properties window click the Print Test Page button. If the printer is able to print a test page, you're printer is installed and setup properly. However, if you're unable to print in other programs it's possible that the program you're attempting to print from, has issues. You can also test by printing Print a test page from MS DOS, If you suspect a problem in Driver settings. Get to a MS-DOS prompt Type cmd in run or from programs search. Get to the root directory - Type cd\ Reroute dir to printer - Type dir >prn or dir >lpt1 If the device is printing from MS DOS & Not printing from Windows, Its the problem with the driver. Else you can check the connectivity or the problem with the device. In case of USB Printer, You have to check the USB port is working properly or not. Check with other USB Ports & Even try uninstalling all the USB Ports from Device Manager & Restart the desktop.
183
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
184
The below URL is having all deployment guide/Admin guide for RHEL5 32bit and 64 Bit OS. Manual will guide you steps by steps on Installing RHEL 5 on Certified Hardware.
185
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
TSG Toolkit CD
Manual
186
187
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Features
Features This CD contains various tools which help you to diagnosis your hardware.
Tools Included :
CPU Stress Test a) CPU Burn-in b) Stress CPU Memory Test a) Memtest86+ Ver. 2.11 Ver. 1.0 Build date 24Oct- 05
b) Windows Memory Diagnostic test Peripheral Test : Monitor a) CHZ monitor Test CPU information a) Intel Processor Frequency ID ( P3 and below) Ver. 7.2.20041115 Ver. 1.01
Features: Contd.
System Information Tool
ASTRA ( Limited Feature) Ver 5.31
c)
Ver. 2.13b
Note: you have to reboot the Machine after testing of one tool. Dont continue from DOS applications
189
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
190
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Menu
Once you Press Enter ,You will get TSG Tool Ver 2.0 CD Menu Screenshot is showing ver 1.1 but screen will remain same in ver 2.0 Sometimes in new Machines , you are not able to see screen given below and machines will hangs then in this case , Please enable the AHCI Mode in BIOS.
191
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Submenu
Press Enter On Motherboard tools ( For Tool Number 1 to 5 which is mentioned in Features paragraph. Once you press Enter you will get Menu of different Tests
192
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
CPU Test
Select CPU Tests for checking Load test/Heat issue with CPU and Heatsink.You can select any CPU test and This test will continue run until you reboot the Machine. We recommended to run it for atleast 30 minutes.
193
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Memory Test
Suppose you want to run Memtest86+ then Select this option and press Enter, It will start Checking RAM modules of the system. We recommended to use this tool for checking Memory modules of the System. Please run the test upto 10 cycle. We suggested you to run it for 2-3 times for better clarity. Note : for 512MB RAM it takes around 2030 minutes.
194
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Press Enter and select CHZ Monitor test and Press Enter;
195
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
196
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
CPU Information
For Checking CPU information ,Select CPU information Menu
197
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
198
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
This tool will give you full information but in a limited manner but thats sufficient for you.
Now Select the test ASTRA and press Enter This Test will take default Option, So Dont select any option during expansion of Image of Test.
199
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Once you press Enter on the Menu, you will get submenu of diagnostic tool ,Select the Menu and press enter.
200
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Suppose your HDD is Seagate or Maxtor then select Seatools and press Enter
201
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Select Drives to Test --------------------After SeaTools loads, the Drive List will show the different storage devices in your system. The first drive detected will be described as Device 0. Select the drive you would like to test. Make sure to choose the correct drive! A check mark in the Model ID column will indicate which drive is selected.
This screen also displays information about the drives such as the Model Number and Serial Number. Seagate model numbers begin with the letters "ST". Seagate serial numbers are alpha numeric and eight characters long.
202
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Select the Tests to Run -----------------------A menu of the possible diagnostic tests is shown. Select the tests that you would like to perform. Basic Tests Advanced Features Help SHORT Test Set Capacity Contents LONG Test Erase Drive License Acoustic About When you launch the "SHORT Test" most drives will run Drive Self Test. Drive Self Test (DST) is a thorough diagnostic routine that is built in to the hard drive's firmware. Firmware is the machine language programming the controls the disc drive. DST is completely data safe
203
The "SHORT Test" is adequate for most situations. Consider running the "LONG Test" which reads each sector on the drive if you need to run a more comprehensive test. The "LONG Test" test will take a long time to complete. Because the "LONG Test" reads every sector on the drive, the amount of time required will depend on the speed and capacity of the disc drive. The highest capacity drives often take 2 to 3 hours to complete. At any time, feel free to Cancel the test without harming the drive. The "LONG Test" will collect information about possible defects. If any defect are found, a list will be offered at the end or after aborting the scan. You will have the opportunity to attempt to repair the problem
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
204
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
205
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
TSG Utility CD
Antivirus Tools :
AVAST Antivirus Removal Tool:- This tool will help you to remove the AVAST antivirus from your system
Avert Stinger:- It is an Antivirus scanner from Mcafee. It can be used under scenarios when you suspect infections in your system.
AVG Antivirus Removal Tool:- This tool can be used to remove AVG Antivirus from your system.
Avira Antivirus Removal Tool:- This tool can be used to remove Avira antivirus from your system.
Bit Defender Removal Tool:- This tool can be used to remove Bit defender antivirus from your system.
Brontok Removal Tool:- Brontok is a computer worm and can be removed using this tool.
206
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
207
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Antivirus Tools-Contd:
Push Deploymet wizard:- This tool is used to remotely push SEP 11 Clients to a remote location. Registry Cleaner:- This tool is used to clean up the registry from malicious content and broken links. Sylink Drop:- This tool is used to remotely Drop Sylink.XML files to Unmanaged SEP clients. Symantec Antivirus removal tool:- This tool is used to remove symantec antivirus from your system. Symantec definition remover: -This tool is used to backdate corrupt definition for symantec Antivirus. Symantec Endpoint Protection Support Tool:- This tool is used to check the dependency if any and to identify issues associated with symantec endpoint protection tool.
208
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Antivirus Tools-Contd.
Symantec Makedrop:- This tool is used to drop GRC.dat in the old version of symantec antivirus product. Symantec XDB down:- This tool is used to download XDB files which is the definition files for symantec antivirus product.
Sysinternals autoruns:- This tool is used to checkup the system startup, processes, and internet explorer BHO's in your system.
Trend Micro removal Tool: -This tool is used to uninstall trend micro Antivirus. Unhide folder:- This tool is used to unhide the hidden folders for effective virus troubleshooting. Virus Effect Remover:- This tool is used to remove the After effects of the virus infections.
209
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The systray icon resembles PowerPanel rather strongly, but integrates battery capacity, AC power status, and CPU speed in a single icon. It has a graphical display window that can be popped up on-demand, which graphs up to 7 parameters over a several hour period, and shows instantaneous status in a window (which is also available in a systray tooltip). It estimates runtime when discharging, and charge time when charging.
In addition to the systray and main window graph, it has a toolbar-style window that can float anywhere on the screen which compactly integrates the systray icon, a charge meter and summary of runtime. It has a programmable hotkey to turn off the screen, which can be used to save significant power when running on battery if you need to turn away for a short time, it's also nice as a "privacy key" if you need to blank your screen instantly. The program can run a program or batch file any time the system switches power source, or resumes from standby or hibernation, something I find useful to perform certain checks automatically to recover state that many programs blissfully ignore. There's a detailed battery display for up to two batteries, with names, voltages, temperature, design capacities, wear percentages, etc, as provided by the batteries themselves
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
210
ImgMaker : version of this tool is 1.1 Create backup images of your Hard drive Using ImageMaker To make an image of a disk and save it to a file: - Log on as an Administrator, or another user with administrative privileges. ImageMaker will produce a warning screen if it was started with no administrative privileges.
- Run ImageMaker.You will see a list of hard drives and partitions on the screen. Select a drive or partition you want to back up, and click the MakeImage button in the toolbar. Alternatively, you may right-click and select "Make Image" in the pop-up menu.
- The "Make Image" dialog will appear. Select a file where you want to save image to (WARNING: This file should not be located on the same partition that is being imaged!) - Click the "Start" button on the dialog.You will see a progress indicator showing the progress of the imaging process. The time it needs to complete depends on the size of your hard disk, the location of the saved image (see below), and the operating system you use.
211
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Raw Copy copies a disk as a raw image from one drive directly to another.
Raw Copy was designed for users who have faulty drive and would like to transfer the data directly to another drive without doing a file by file copy.
This saves the need for operating system re-installs and allows drives with an unknown file system to be copied (including from console game machines, data recorders, mac etc).
The program has a built in data recovery function which will attempt to recover data from bad sectors to ensure all the available data is restored from the drive. This program is designed to run under NT/XP/2000 or later operating systems. It will run under windows 95/98/Me operating systems but only windows logical drives can be copied
212
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
This diagnostic tool can be used for checking any HDD issues. For more details please refer the documents in USERGUIDE folder in CD named dft32_user_guide_4.15.pdf
Seagate HDD tools :Version 1.2.0 Sea Tools for Windows is a comprehensive, easy-to-use diagnostic tool that helps you quickly determine the condition of the disc drive in your external hard drive, desktop or notebook computer. It includes several tests that will examine the physical media on your Seagate or Maxtor disc drive and any non-Seagate disc drive. Sea Tools for Windows should run on both internal and external hard drives For More details Please refer the documents in USERGUIDE Folder in CD named Seatools.pdf.
213
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
CPU Identification Utility: Version 1.6 : Double click will run this program
Purpose of this Utility The Intel(R) Processor Identification Utility is provided by Intel Corporation to enable customers to identify the brand, features, package, intended frequencies and actual operating frequencies of their Intel microprocessor. Customers can also use the utility to discern whether or not an Intel processor is being operated above its Intel rated frequency. The main features of the utility are available via the menu items at the top of the screen: The Frequency Test section of the utility provides information regarding the operating status of the selected processor. The CPU Technologies section of the utility displays the Intel processor technologies and features present in the selected processor. The CPUID Data section of the utility identifies the Intel processor(s) in the system. The Save feature enables the processor information to be saved into a text file. The Web Update feature enables updating to the latest version of the Intel Processor Identification Utility. The Intel Processor Identification Utility is not intended to identify microprocessors manufactured by companies other than Intel.
214
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Network Tool IPSCAN :Version 1.6 : Double click will run this program
Overview Free IP scanner is a very fast IP scanner and port scanner. It is intended for both system administrators and general users to monitor and manage their networks. Powered with multi-thread scan technology, it can scan hundreds computers per second. It simply pings each IP address to check if it's alive, determines hostname, MAC address, NetBIOS information, scans ports, etc. The information obtained can be exported into a file as plain text file. Start Guide Step 1: Run the program
Follow Start > All Programs > Free IP Scanner > Free IP Scanner. Or just double click the Free IP Scanner icon on your Desktop.
Step 2: Select ip scan range and start scanning Use two fields of IP Range to enter first and last IP addresses. The last IP address can be less than the first one there is no problem with translating your input. To begin the scan, press the 'Start Scanning' button.When the program is scanning, this button becomes the 'Stop Scanning' button. Below at the picture there is the main program interface.
215
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Tool is available in Compressed and uncompressed Version. Download the compressed version and go into linpack folder which is also extracted separately and available for download. Change the permission 777 to all folders of linpack folders .Change the file input values mentioned under lininput_xeon32/lininput_xeon64 depends upon your OS. Once you change the input file , execute the file runme_xeon32 or runme_xeon64.Output can be seen in lin_xeon32.txt or lin_xeon64.txt depends upon your execution file.
For More details , please refer the userguide which is given in CD.
216
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
217
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
218
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computer will be displayed in the Computer field. Click Get Details button to get the Software details. The Total number of Software and Software names, versions, manufacturers and usage statistics will be shown in the result. The results can be exported in text or CSV format by clicking on the respective icons in result
219
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computer will get displayed in the Computer Name field. Click Execute to bring the remote computer's command prompt. You can now execute the required command.
220
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computers will get added to the Computers field. Click Do GPO Update to update the GPOs in the selected computers.
221
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computers will get added to the Computers field. Click Shutdown or Restart to shutdown or restart the selected computers respectively.
222
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
223
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computers will get added to the Computers field. Click Get Users to get the currently logged on users on the selected computers.
224
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computers will get added to the Computers field. Click Get Details to get the hard disk details in selected computers.
225
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The selected computers will get added to the Computers field. Click Get Details to get the local users and groups present in selected computers. To fetch the domain users present in the computers, Domain Users check box should be selected
226
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
227
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
228
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
229
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
230
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Press Ok button
It will generate the OUTPUT file in EXCEL sheet with date and time.
231
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Scriptomatic 2.0
Works with all the WMI namespaces on your computer.The old version only worked with the root\cimv2 namespace. That was fine for Windows 2000 computers, but just didnt cut it with Windows XP or Windows Server 2003 computers
For more details please refer the Userguide given in Utility CD.
232
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
For More details Please refer the User Guide available in CD named as a Userguide\puttydoc\index.html
WinSCP is an open source SFTP client and FTP client for Windows. Its main function is the secure file transfer between a local and a remote computer. Beyond this, WinSCP offers basic file manager functionality. It uses Secure Shell (SSH) and supports, in addition to Secure FTP, also legacy SCP protocol
233
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
234
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Utilities like Telnet and remote control programs like Symantec's PC Anywhere let you execute programs on remote systems, but they can be a pain to set up and require that you install client software on the remote systems that you wish to access. PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive commandprompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems. Installation Copy PsExec onto your executable path. Typing "psexec" displays its usage syntax. Usage usage: [\\computer[,computer[,...] | @file][-u user [-p psswd]][-n s][-l][-s|-e][-i [session]][-c [-f|-v]][-d][-w directory][-<priority>][-a n,n,...>] cmd [arguments]
Please refer the Userguide for getting more details on options used in Psexec
235
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
This command executes IpConfig on the remote system with the /all switch, and displays the resulting output locally: psexec \\marklap ipconfig /all This command copies the program test.exe to the remote system and executes it interactively: psexec \\marklap -c test.exe Specify the full path to a program that is already installed on a remote system if its not on the system's path: psexec \\marklap c:\bin\test.exe
236
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The "net file" command shows you a list of the files that other computers have opened on the system upon which you execute the command, however it truncates long path names and doesn't let you see that information for remote systems. PsFile is a command-line utility that shows a list of files on a system that are opened remotely, and it also allows you to close opened files either by name or by a file identifier. Installation Copy PsFile onto your executable path and type "psfile". Usage The default behavior of PsFile is to list the files on the local system that are open by remote systems. Typing a command followed by "-?" displays information on the syntax for the command. usage: psfile [\\RemoteComputer [-u Username [-p Password]]] [[Id | path] [-c]]
237
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Have you performed a rollout and only to discover that your network might suffer from the SID duplication problem? In order to know which systems have to be assigned a new SID (using a SID updater like Sysinternals' own NewSID) you have to know what a computer's machine SID is. Up until now there's been no way to tell the machine SID without knowing Regedit tricks and exactly where to look in the Registry. PsGetSid makes reading a computer's SID easy, and works across the network so that you can query SIDs remotely. PsGetSid also lets you see the SIDs of user accounts.
Installation Copy PsPsGetSid onto your executable path and type "psgetsid". Usage Usage: psgetsid [\\computer[,computer[,...] | @file [-u username [-p password]]] [account] If you want to see a computer's SID just pass the computer's name as a command-line argument. If you want to see a user's SID, name the account (e.g. "administrator") on the command-line and an optional computer name. Specify a user name if the account you are running from doesn't have administrative privileges on the computer you want to query. If you don't specify a password as an option PsGetSid will prompt you for one so that you can type it in without having it echoed to the display.
238
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
PsInfo is a command-line tool that gathers key information about the local or remote system, including the type of installation, kernel build, registered organization and owner, number of processors and their type, memory size, the install date of the system, and if it's a trial version, the expiration date. PsInfo commandline switches also let you view installed hotfixes and software applications. Installation Copy PsInfo onto your executable path and type psinfo. Usage By default PsInfo shows information for the local system. Specify a remote computer name to obtain information from the remote system. Since PsInfo relies on remote Registry access to obtain its data, the remote system must be running the Remote Registry service and the account from which you run PsInfo must have access to the HKLM\System portion of the remote Registry. In order to aid in automated Service Pack updates, PsInfo returns as a value the Service Pack number of system (e.g. 0 for no service pack, 1 for SP 1, etc). usage: psinfo [\\computer[,computer[,...] | @file [-u username [-p password]]] [-h] [-s] [-d] [-c [-t delimter]]
239
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Windows NT/2000 does not come with a command-line 'kill' utility.You can get one in the Windows NT or Win2K Resource Kit, but the kit's utility can only terminate processes on the local computer. PsKill is a kill utility that not only does what the Resource Kit's version does, but can also kill processes on remote systems.You don't even have to install a client on the target computer to use PsKill to terminate a remote process. Installation
Copy PsKill onto your executable path and type pskill with command-line options defined below. Usage Running PsKill with a process ID directs it to kill the process of that ID on the local computer. If you specify a process name PsKill will kill all processes that have that name. usage: pskill [-t] [\\computer [-u username] [-p password]] <process name | process id>
240
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Most UNIX operating systems ship with a command-line tool called "ps" (or something equivalent) that administrators use to view detailed information about process CPU and memory usage. Windows NT/2K comes with no such tool natively, but you can obtain similar tools with the Windows NT Workstation or Server Resource Kits. The tools in the Resource Kits, pstat and pmon, show you different types of information, and will only display data regarding the processes on the system on which you run the tools. PsList is utility that shows you a combination of the information obtainable individually with pmon and pstat.You can view process CPU and memory information, or thread statistics. What makes PsList more powerful than the Resource Kit tools is that you can view process and thread statistics on a remote computer. Installation Copy PsList onto your executable path and type "pslist". Usage The default behavior of PsList is to show CPU-oriented information for all the processes that are currently running on the local system. The information listed for each process includes the time the process has executed, the amount of time the process has executed in kernel and user modes, and the amount of physical memory that the OS has assigned the process. Command-line switches allow you to view memory-oriented process information, thread statistics, or all three types of data. usage: pslist [-?] [-d] [-m] [-x][-t][-s [n] [-r n] [\\computer [-u username] [-p password]] [[-e] name | pid]
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
241
You can determine who is using resources on your local computer with the "net" command ("net session"), however, there is no built-in way to determine who is using the resources of a remote computer. In addition, NT comes with no tools to see who is logged onto a computer, either locally or remotely. PsLoggedOn is an applet that displays both the locally logged on users and users logged on via resources for either the local computer, or a remote one. If you specify a user name instead of a computer, PsLoggedOn searches the computers in the network neighborhood and tells you if the user is currently logged on. PsLoggedOn's definition of a locally logged on user is one that has their profile loaded into the Registry, so PsLoggedOn determines who is logged on by scanning the keys under the HKEY_USERS key. For each key that has a name that is a user SID (security Identifier), PsLoggedOn looks up the corresponding user name and displays it. To determine who is logged onto a computer via resource shares, PsLoggedOn uses the NetSessionEnum API. Note that PsLoggedOn will show you as logged on via resource share to remote computers that you query because a logon is required for PsLoggedOn to access the Registry of a remote system. Installation Copy PsLoggedOn onto your executable path and type "psloggedon". Usage usage: psloggedon [-?] [-l] [-x] [\\computername | username]
242
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
The Resource Kit comes with a utility, elogdump, that lets you dump the contents of an Event Log on the local or a remote computer. PsLogList is a clone of elogdump except that PsLogList lets you login to remote systems in situations your current set of security credentials would not permit access to the Event Log, and PsLogList retrieves message strings from the computer on which the event log you view resides. Installation Copy PsLogList onto your executable path and type "psloglist". Usage The default behavior of PsLogList is to show the contents of the System Event Log on the local computer, with visually-friendly formatting of Event Log records. Command line options let you view logs on different computers, use a different account to view a log, or to have the output formatted in a string-search friendly way. usage: psloglist [-?] [\\computer[,computer[,...] | @file [-u username [-p password]]] [-s [-t delimiter]] [-m #|-n #|-h #|-d #|-w][-c][-x][-r][-a mm/dd/yy][-b mm/dd/yy][-f filter] [-i ID[,ID[,...] | -e ID[,ID[,...]]] [-o event source[,event source][,..]]] [-q event source[,event source][,..]]] [-l event log file] <eventlog>
243
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Systems administrators that manage local administrative accounts on multiple computers regularly need to change the account password as part of standard security practices. PsPasswd is a tool that lets you change an account password on the local or remote systems, enabling administrators to create batch files that run PsPasswd against the computer's they manage in order to perform a mass change of the administrator password. Installation Copy PsPasswd onto your executable path and type pspasswd with command-line options defined below. Usage You can use PsPasswd to change the password of a local or domain account on the local or a remote computer.
244
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
PsService is a service viewer and controller for Windows NT/2K. Like the SC utility that's included in the Windows NT and Windows 2000 Resource Kits and Windows XP, PsService displays the status, configuration, and dependencies of a service, and allows you to start, stop, pause, resume and restart them. Unlike the SC utility, PsService enables you to logon to a remote system using a different account, for cases when the account from which you run it doesn't have required permissions on the remote system. PsService includes a unique service-search capability, which identifies active instances of a service on your network.You would use the search feature if you wanted to locate systems running DHCP servers, for instance. Finally, PsService works on both NT 4 and Windows 2000, whereas the Windows 2000 Resource Kit version of SC requires Windows 2000, and PsService doesn't require you to manually enter a "resume index" in order to obtain a complete listing of service information. Installation
Copy PsService onto your executable path and type "psservice". Usage
245
The default behavior of PsService is to display the configured services (both running and stopped) on the local system. Entering a command on the command-line invokes a particular feature, and some commands accept options. Typing a command followed by "-?" displays information on the syntax for the command. usage: psservice [\\computer [-u username] [-p password]] <command> <options>
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
PsShutdown is a similar to the Resource Kit and Windows XP shutdown tools, providing you the same options and ability to shutdown, and optionally reboot, local and remote Windows NT/2K/XP/2003 systems. It also provided additional options that make it more powerful and flexible. Installation Copy PsShutdown onto your executable path and type "psshutdown" with command-line options defined below. Usage
You can use PsShutdown to initiate a shutdown of the local or a remote computer, abort an imminent shutdown, logoff a console user, or lock the desktop. usage: psshutdown [\\computer[,computer[,...] | @file [-u username [-p password]]] -s|-r|-h|-d|-k|-a|-l|-o [f] [-c] [-n s] [-t nn|h:m] [-e [u|p]:xx:yy] [-m "message"]
246
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
PsSuspend lets you suspend processes on the local or a remote system, which is desirable in cases where a process is consuming a resource (e.g. network, CPU or disk) that you want to allow different processes to use. Rather than kill the process that's consuming the resource, suspending permits you to let it continue operation at some later point in time. Installation
Copy PsSuspend onto your executable path and type "pssuspend" with command-line options defined below. Usage Running PsSuspend with a process ID directs it to suspend the process of that ID on the local computer. If you specify a process name PsSuspend will suspend all processes that have that name. Specify the -r switch to resume suspended processes. usage: pssuspend [-r] [\\computer [-u
process id>
247
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
248
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
CPUZ :Ver 1.50 Double click cpuz.exe can run this program.
CPU-Z is a freeware that gathers information on some of the main devices of your system
ASTRAWIN32 :Version 2.0.3 ( Limited edition) double click on Astra32.exe file to execute it. ASTRA32 is an ideal solution for providing comprehensive information about your computer hardware and software. Not only does ASTRA32 provide a detailed analysis of your system, it also offers diagnostics and comes with some powerful features such as Drivers Troubleshooter and quick HDD Health Status checker. It obtains data directly from hardware so it is very accurate. SpeedFAN :Version 4.39 SpeedFan is a freeware program that monitors voltages, fan speeds and temperatures in computers with hardware monitor chips. SpeedFan can even access S.M.A.R.T. info for those hard disks that support this feature and show hard disk temperatures too, if supported. SpeedFan supports SCSI disks too. SpeedFan can even change the FSB on some hardware (but this should be considered a bonus feature SpeedFan works fine with Win9x, WinME, WinNT, Win2k and WinXP. SpeedFan can be minimized to the tray and does its best to be compatible with other hardware monitoring softwares. Supported MB is given in URL : http://www.almico.com/forummotherboards.php
249
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Easy Cleaner : version 2.0.5 Ability to clear IE temporary files, history and cookies Ability to clear the most recently used list Lots of more options in unnecessary file finder (IE cookies, history and temp files, temp dirs, MS Office CC Cleaner :Version 2.22 Program Summary: CCleaner is a freeware PC optimization tool. It combines a system cleaner that removes unused and temporary files from your system and also a fully featured registry cleaner!
250
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
TightVNC is: Free, GPL-licensed, with full source code available; Useful in remote administration, remote customer support, education, and for many other purposes; cross-platform, available for Windows and Unix, compatible with other VNC software. Double Click on the .exe file and start using VNC software
251
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
252
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
HPReadDATA :Version 1.2.4 Allowing the simulation of multiple stream access to data. This tool is checking for any IO related problem in HDD. Only double-clicking will run this tool.
253
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
UNISTALL - 5 IN 1
254
BIT DEFENDER
CRASH PROOF PC REPORTER PORT LOCKER DATA WIPER
255
UNISTALL- CRASHPROOF
Crash Proof is data loss prevention software, which once installed in the system, prevents data loss against logical crashes. At the time of installation, Crash Proof calculates the system parameters and stores them in the same hard disk in a protected area.In the event of a disk crash or data loss, Crash Proof revives the data /disk. Crash Proof recovers data even if the computer does not start-up (due to partition corruption, boot corruption etc), if the folders show junk or if files are deleted accidentally or by certain virus etc. Causes of Data Loss: The main causes of data loss are viruses, accidental format or deletion, wrong file transfer, faulty software, incorrect operation of certain disk management utilities, voltage glitches, incorrect shutdown or switch off etc. Every disk crash is unique in itself because, the disk capacities are different, so are their partitioning methods, volumes creation, virus attacks, file management or application utilities etc. Data is stored on the disk but is linked to the operating system using the system area that contains Directory Structures, File Allocation Tables, Data Runs, Boot Record and Partition Table.when these areas get corrupted - data is assumed lost, whereas data is physically present in the disk! And the Operating System is unable to locate it and present it since the file links are lost.Any slight difference in values or bytes in system area will render data inaccessible! also note that data is present physically. Data will be available for recovery until it is overwritten.
257
2010 Wipro Ltd Internal & Restricted
UNISTALL 5 IN 1 PC REPORTER
PC Reporter - is a utility that acts as an Asset Tagging, Tracking & Early Warning System for pending hard disk problems. The system is based on SelfMonitoring Analysis and Reporting Technology (S.M.A.R.T). The hard disk's integrated controller works with various aspects or parameters to monitor various aspects of the drive's / disk's performance and determines from this information if the disk is behaving normally or not PC Reporter Software Offers Asset Tracking Option to track software activities that are installed in the hard disks. Runs constantly in the background. Hence, provides real information. Provides standard hard disk information such as Serial/Model Number, Number of cylinders, and so on. Provides information on various hard disks attributes and also displays their fitness level. Able to scan and display bad sectors on hard disk(s). Scheduler to configure software parameters such as Temperature Warning, Temperature Update, and Log Scheduling. Maintains log reports of disk scans, disk status and so on. Can clone hard disks (that is, it can paste the contents of a potentially fatal diskonto a healthy disk). Provides graphical comparison of temperature fluctuations in relation to warning /shutdown levels. Displays real time 'Benchmark' graph showing the Hard Disk data transfer rate and CPU usage. Can test any IDE/SATA disk. Simple and easy to use, with no loss in system performance.
258
2010 Wipro Ltd Internal & Restricted
259
260
261
TROUBLE SHOOTING-POST
Symptom: Computer beeps irregularly when the computer is turned on. Computer turns on but does not boot. Turn on the computer but doesn't do anything. Cause: New hardware conflicting with old hardware. Bad or failing hardware device. Connections not connected. Recent electrical storm that caused a surge that damaged computer. Other hardware issue Diagnose / Probe: Make sure your computer is turning on, if you press the power button and nothing happens (no lights, no sound, no fans, etc.) then this issue is not a NO POST but is an power related issue.
262
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
TROUBLE SHOOTING-POST
Resolution: 1. Remove /Refix, CD's, DVD's, HDDs, RAM,SMPS that are in the computer and if any USB devices (iPods, drives, phones, etc) are connected disconnect all of them as well. Reboot the computer and see if anything changes. 2. If any new hardware has been recently added to the computer, remove that hardware to make sure it is not the cause of your issue. If after removing the new hardware your computer works it's likely the computer is either not compatible with the new hardware or a system setting needs to be changed to work with the new hardware device. 3. Remove All the connections from the back of the computer except the power cable. Turn on the computer and see if it beeps normally. If the computer has never beeped keep the monitor or display connected to see if any change occurs. 4. Check for beep codes to identifying what computer component is failing or bad.
263
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
TROUBLE SHOOTING-POST
4. Make sure all fans are running in the computer. If a fan has failed (especially the heat sink fan for the CPU) your computer could be overheating and/or detecting the fan failure causing the computer not to boot.Verify that all the cables are properly connected at that there are no loose cables by firmly pressing in each cable. All disk drives should have a data cable and power cable connected to them. 5. Your power supply should have at least one cable going to the motherboard. Many motherboards may also have additional cables connected to them to supply power to the fans 6. If the above recommendations still have not resolved the irregular POST attempt to disconnect the Riser board (if applicable) and/or each of the expansion cards. If this resolves the issue or allows the computer to POST connect one card at a time until you determine what card is causing the issue.
264
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
TROUBLE SHOOTING-POST
7. If you were unable to determine by the beep code what is failing or do not have a beep code disconnect the IDE, SATA, SCSI, or other data cables from the CD-ROM, hard drive, and floppy drive from the Motherboard. If this resolves your irregular post or you now get an error message attempt to re-connect each device one at a time to determine which device and or cable is causing the issue. Re-insert the memory into the same slot. If you have more than one stick of memory remove all but one stick of memory, try rotating through each stick. Try one stick of memory in each slot.
8.
9.
10. If after doing all of the above recommendations you continue to have the same issue unfortunately it is likely that you have bad Motherboard, PSU, CPU and/or RAM. The next step would be either to replace these components and/or have the computer serviced.
265
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
SYSTEM FREEZES OR STOPS RESPONDING FREQUENTLY 3. If there is an issue that exists with your video drivers a computer could lock up while . playing a game or displaying any other type of video. Make sure you have the latest drivers for all major devices in your computer (video, sound, modem, and network.) 4. Make sure your operating system has all of the latest updates installed on it. 5. If the computer processor is getting too hot it can cause the computer to freeze. Need to check the heat sink compound availability and Processor FAN is functioning properly. If you heard any abnormal noises coming from your computer recently such as a high squealing, this could indicate a fan may be failing in your computer. 6. If you have recently added any new hardware into the computer, try temporarily removing it to make sure it is not the cause of your issue. Before attempting to remove any hardware, make sure you are not encountering this issue because of hardware conflicts by viewing Device Manager for errors. Its possible that Windows may be seriously corrupt. We suggest you backup all information and reinstall Windows on your computer. 7. If after reinstalling your Operating system or during the installation of your operating system, your computer turns off abnormally, it is very likely that other hardware is failing in the computer. Often this could be RAM, CPU, Motherboard, and/or Power Supply.
267
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Software issue:
1. Errors generated by software programs can cause a computer to reboot unexpectedly or without warning. 2. If you are not running Windows XP or following the below steps still cause your computer to reboot without warning. Boot your computer into Safe Mode, and let the computer run in Safe Mode. Additional information and help with getting into Safe Mode. 3. If the computer is still rebooting in Safe Mode the issue is likely not with the software but something else, It is recommended to run the basic troubleshooting section for your operating system.
268
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
270
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
271
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Bad Hardware:
1. Verify that there is at least 200-500MB of free hard disk drive space. This available space allows the computer to have room for the swap file to increase in size as well as room for temporary files. 2. Run Scandisk or something equivalent to help ensure that there is nothing physically wrong with the computer hard disk drive.
272
3. Run Defrag to ensure that data is arranged in the best possible order
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
273
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
274
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Solution:
1. Note: If the computer is turning on but is not posting (beeping) or giving any type of picture on the display,.pls check the processor is properly connected and Fan is rotating. 2. If you are uncertain if the computer is turning on or not, this can be easily checked by seeing fans in the computer or visible from the outside of the computer. If these fans are spinning and the computer is receiving power.
275
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
6. This will help verify that the strip or switch is not bad.Verify that the outlet works by connecting a different component to that switch
276
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
NO DISPLAY ON MONITOR
Cause:
. This issue can be caused by any of the below possibilities. Monitor is not on Computer is asleep Connections not connected properly. Monitor settings are not correct. No Post. Hardware issue.
Monitor is On/OFF:
Make sure the monitor is on. If no power light (green or orange light) is seen on the monitor display try pressing the power button until it comes on. If no light comes on after several attempts check the Power connections are connected properly.
Computer Sleep:
If your computer monitor was on and you stepped away from the computer and upon returning it was black it's likely that the computer is asleep. Try moving your mouse, clicking the mouse buttons, and/or pressing any key (space bar) on the keyboard to wake it up.
277
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
NO DISPLAY ON MONITOR
Connections not connected properly: Make sure that you are connecting .
the monitor to the back of the computer in the 15-pin connector as shown to the right or older computer 9-pin connection. If the computer is properly plugged in, make sure it's getting getting power.
If you are not receiving power from a wall outlet replace it with another one or exchange the computer and monitor Cable. If the monitor still does not get power, would need repair.
278
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Solution:
1. Verify that the network cable is properly connected to the back of the computer. In addition, when checking the connection of the network cable, ensure that the LEDs on the network are properly illuminated. For example, a network card with a solid green LED or light usually indicates that the card is either connected or receiving a signal. Note: generally, when the green light is flashing, this is an indication of data being sent or received. If, however, the card does not have any lights or has orange or red lights, it is possible that either the card is bad, the card is not connected properly, or signal from the 279 that the card is not receiving a2010 Wipro Ltd Internal & Restricted network. 2009 Wipro Ltd - Confidential
282
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Solution:
1. First verify you see a small speaker icon in the Systray (generally at the bottom right hand corner of your screen). If this icon is missing follow the below section.
Windows XP
2. Open the Control panel Open the "Sounds and Audio Devices" icon. Verify the "Place volume icon in the taskbar" checkbox is checked. If this option is not available or is grayed out, skip to the next section of this document. If you were able to check this box, click ok and close out of this window and the Control Panel. Double-click the sound icon in the Systray and verify that all the sound volumes are mid-way or higher. If other devices are listed, it is possible that these other devices could be the sound card or other devices conflicting with the sound card. If any other devices are listed it is recommended you remove those devices, reboot the computer and let Windows redetect the devices. If this does not work, attempt to determine which device is not being detected and resolve that issue first. 283
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
7. Verify the speakers settings and 2009 Wipro Ltd - Confidential not at fault speakers are 2010 Wipro Ltd Internal & Restricted
9. Finally, if all of the above recommendations do not resolve your issue it is likely that either the sound card is physically bad or that the operating system is severely corrupt
285
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
286
Always keep your Windows up-to-date with the latest Microsoft patches Keep less files on Desktop, always keep files in folders. Keep only minimal programs which are required to you only in your computer. Keep your antivirus definitions updated Regularly. While opening E-Mail attachments, ensure the attachment is scanned before opening. Periodically clean your temporary folders/internet files/Cache and cookies. Use the Start Button on the Windows Taskbar to shutdown your computer. It is also necessary to save files & Close all application which are running in the taskbar. Keep CD's in a cover and handle them by the edges. Try to keep floppy disks in proper storage box and perform a full format on the disk before copying important data
287
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Do not download freeware and also Dont use software that isnt certified and legally not licensed. Downloading software from a unauthorised site, or accepting a shared copy, is not legal and may take valuable information from your system over a period of time. Do Not move your computer, even a few centimeters when system is on, always shutdown the computer before any movements. This applies to the Monitor and other Peripherals attached to the system. Unnecessary shock can cause fatal breakdown of sensitive parts or reduce the expected lifetime of the computer and its spares. Do Not Place any equipments or other objects on top of a Desktop or the peripherals attached to the Desktops. Do Not Operate the computer on a fully closed enclosures preventing the airflow to the cooling vents on the sides or back, which will cause the system to overheat and can lead to failure
288
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Inserting a floppy disk into a drive at an angle or upside down, may cause the drive to jam and make it unreadable. Placing more than one label on a floppy disk, which also causes the jam in the drive.
Touching the CD-ROM tray and the media which may contaminate the lens and/or throw it out of alignment Avoid Placing the system closer than about 5 inches (13cm) from any electrical device that generates a strong magnetic field, such as electric motors, TVs, refrigerators, and large audio speakers. Avoid Placing your computer on the floor. The fans in the computer that pull air through the case to cool processor & SMPS will pull all the stuff that settles out of the air, and onto the floor, into your computer.
289
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Remove all floppy disk and/or CD/DVD disc media from all the drives.
Make sure all covers of the computer are in position and are Properly closed. Also ensure appropriate carton box and packing materials are used If original packing material which has comw with the computers are available, it is better to use them.. Following the above simple guidelines during transportation or shipping the system will help in ensuring the machine reaching the destination in safe and working condition.
290
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
291
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
292
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
ESD never kills, but Injures What Can we Do To Prevent ESD? Fortunately, preventing ESD can be relatively easy and inexpensive. Two areas of focus are: Eliminating static charges from the workplace. Properly shielding components and assemblies from static fields. Eliminating static electricity in the workplace is accomplished by grounding operators, equipment, and devices (components and computer boards). Grounding prevents static charge buildup and electrostatic potential differences. Electrical field damage is averted by transporting products in Special electrostatic shielding packages.
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
294
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Foot Grounders
296
ESD - PREVENTION
Test Wrist Straps & ESD Footwear daily Keep wrist band snug, foot grounder grounding tab in shoe, & ESD Smocks buttoned Up Only trained or escorted people to be allowed in ESD Protected Area
An Effective Workplace:
An effective workplace should be outfitted with the following items: 1.ESD protective clothing/smocks. Street clothing must not come in contact with components or computer boards since the various materials in clothing can generate high static charges. ESD protective smocks, manufactured with conductive fibers, are recommended. 2.Electrostatic shielding containers or totes. These containers (bags,boxes, etc.) are made of specially formulated materials which protect sensitive devices during transport and storageAntistatic or dissipative carriers. These provide ESD protection during component movement in the manufacturing process. It must be noted that antistatic materials alone will not provide complete protection. They must be used in conjunction with other methods such as totes or electrostatic shielding bags. 4.Dissipative table mat. The mat should provide a controlled discharge of static voltages and must be grounded. The surface resistance is designed such that sliding a computer board or component across its surface will not generate more than 100 V. 297 2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
ESD - PREVENTION
5.Personal grounding. A wrist strap or ESD cuff is kept in constant contact with bare skin and has a cable for attaching it to the ESD ground. The purpose of the wrist strap is to drain off the operators static charge. The wrist strap cord has a current-limiting resistor for personnel safety. Wrist straps must be tested frequently to ensure that they are undamaged and operating correctly. When a wrist strap is impractical, special heel straps or shoes can be used. These items are effective only when used in conjunction with a dissipative floor.
Heel Straps
Wrist Straps
Floor Mats
298
6.ESD protective floor or mat. The mat must be grounded through a currentlimiting resistor. The floor or mat dissipates the static charge of personnel approaching the work bench. Special conductive tile or floor treatment can be used when mats are not practical or cause a safety hazard. Chairs should be conductive or grounded with a drag chain to the flooring, if we touch or handle the components by sitting on that.
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Antivirus
299
300
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
What is a virus?
A program written to alter the way a computer operates. It will self execute its own code and place itself in the path of execution of another program. It must replicate itself For example, it can replace other executables with a copy of the virus infected file. It can infect desktops and network servers alike.
301
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Types of viruses
File infectors :They infect any program files, they come in through .exe and .com files. Examples are Jerusalem and cascade. Boot sector viruses:It infects the system are of a disk, basically the boot record a floppy disk or a hard disk. Examples are Michelangelo and disk killer. Master boot record viruses:They are almost same as the boot sector viruses, the only difference between them is that where they load themselves. Such infectors saves a copy of the MBR in a different location. The Pcs infected with boot sector viruses and MBR viruses will not boot. Example:-Unashamed, NYB, Antiexe .
302
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Types of viruses
Multipartite Viruses:These are infections that infect both the program files and boot records. These are difficult to remove, the infections from both the locations should be removed or else they might re-infect any one of the locations back again. Example:-One_Half,Emperor. Macro viruses:These type of Viruses infect data files. They Have cost Corporations millions. The Evolution Of Visual Basic in 97,a macro Virus can be written that can infect data files. It infects MS Word, Excel, Power point. They are circulating good numbers across the world because of the ease with which they can be created. Ex:W97M.Mellisa,W97M.NiceDay.
303
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
304
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
What is a Worm?
Worms replicate from system to system without use of a host file. Worms Usually reside inside word or excel documents & the worm will release a document that has the worm macro inside it. The document will now move from computer to computer.
305
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshoot/Locate the files responsible Check netstat output for connections made to any unknown IP addresses. View files based on their modified dates to check for recent changes made on the system ,typically in folders like /Windows/System32 , /Windows/System32/drivers Check the registry HKeyLocalMachine\SOFTWARE\Microsoft\Windows\CurrentVersion\Runfor any startup entries made by the virus Check the task manager for any unknown, random name processes running Enable view for hidden files and folders
306
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Troubleshooting If files are in the temporary internet folder then would be in use and may not get deleted. We recommend you to delete the contents of the temporary internet files folder. Boot machine in safe mode and run a manual scan Use tools from recognized AV vendors like Symantec, Mcafee and Trend Micro like:Mcafee Avert Stinger. Trend Micro House call 7.1 Norton Security Scanner from Symantec.
307
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
308
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Best Practices
Ensure the latest Virus Pattern and Scan Engine versions are loaded in the Antivirus used. Disable system restore Option on windows XP/Vista. Apply latest Microsoft Patches on all windows machines. Enable mapped drive scanning especially during outbreaks of malware that Spread using Shared/mapped Folders.
Use a firewall that will prevent incoming and outgoing malicious traffic.
Enable schedule scanning daily in case of huge network outbreaks.
309
310
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
311
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
312
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
313
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
9. Select the custom website option and ensure TCP port is set to 8014:
314
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
315
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
316
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
317
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
15. Give an Encryption password and store it somewhere as its used for Disaster recovery purpose:
318
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
17. Enter the SEPM console Admin password & click next:
319
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
18. Select No for Migration deployment wizard & Finish the SEPM Installation:
320
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
321
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
322
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
323
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
324
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
10. Select the machine(s) for SEP client deploymentt and click Add:
325
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
12. SEP Software will start rolling out to the selected client(s):
326
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
327
UPS / Voltage Regulator Availability Line - Neutral Voltage Neutral - Ground Voltage Line - Ground Voltage
Should be available with the reqd power rating between 200V to230V More than 0V but less than or 3V Sum of Line-Neutral and Neutral Ground Voltage
AC Main is ON
AC Main is OFF and UPS is providing power. - Suggested Action , Not mandatory if not possible Voltages Should be Checked when
Site Inspection
Consealed wiring and High Voltage lines should pass near to the system Installation Place Generator is ON and providing power - Suggested Action , Not mandatory if not possible
Ambient temperature at peak time should not be more that 32 degree Should ensure low dust level Proper Space required to ensure the hot air is blowing out properly Ensure table / rack is good enough to bear the System load.
Before Unpacking ensure the package is not damaged - Check for Physical damages
Ensure the sealed tape is intact and the tapes are with Wipro Logo Unpack the Box Physical Damage
Unpacking and Inspection
Any damaged packets should be informed to Installation team before opening the same
Any changes on this to be brought to Installation team before opening the Box Unpack as per the guide lines in the Box Check the Physical damages on system chasis, monitor and other components. If any Inform Installation team. Box will contain a List of Devices sheet available in the box - Take the same for ref. Verify LOD with the contents in the BOX - Any deviation raise short shipment or wrong shipment Verify the Boxes / Items is available as per PIR / Invoice / Bill of Material - Any deviation raise Short Shipment or wrong shipment
328
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Install the Hardware Basic Power On Test Check correct Configuration Install Add on if available Install External devices if available Configure RAID if available as per customer sign off and requirment Install basic OS with customer approved partition scheme Install Service packs and updates Assign IP for Network, If Applicable Check the network connectivity by pinging gateway Check the connectivity to all Ports. Eg Front sound prot, USB Port etc Basic Installation Check all the Drivers & Inf is installed and the latest available as per supplied driver cd. Check in device manager for errors Check Unistall and default AV installed and working properly. If customer provide AV software, uninstall the default one and install the customer specific and enusre it is activated. Enusre the AV Client has thebest possible update mechanism is configured and latest AV signature is loaded. Take the configuration using OS Utility confirm the complinace. Eg. System Info - for Windows XP. Ensure OS Activation has to be check before final Sign Off. For Windows XP "Go To RUN---Type oobe/msoobe /a and press Enter" and for Windows Vista "Go to RUNType SLUI and press Enter Key" Additional Installation As per the Sign off and communicated Task Demonstrate the system startup and shutdown to customer Demo and Sign off Share the call logging process and escalation matrix with the customer Sign off the ATP or PIR
329
2010 Wipro Ltd Ltd - Confidential 2009 Wipro Internal & Restricted
Thank You