Friday, March 19, 2010
MIS
A management information system (MIS) is a subset of the overall internal controls of a business covering the application of people, documents, technologies, and procedures by management accountants to solve business problems such as costing a product, service or a business-wide strategy. Management information systems are distinct from regular information systems in that they are used to analyze other information systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management methods tied to the automation or support of human decision making, e.g. Decision Support Systems, Expert systems, and Executive information systems.It has been described as, "MIS 'lives' in the space that intersects technology and business. MIS combines tech with business to get people the information they need to do their jobs better/faster/smarter. Information is the lifeblood of all organizations - now more than ever. MIS professionals work as systems analysts, project managers, systems administrators, etc., communicating directly with staff and management across the organization."
Thursday, February 11, 2010
CON folder mystery
here’s the story:
Back in the old days, in the dark and dreary world of MS-DOS, there were many I/O devices that were referred to by reserved names in the OS. Whenever users used these words, the OS took them as references for I/O devices.
Some examples of such reserved words are CON, LPT1, LPT2, COM1, PRN, NUL. These words are still reserved even today in Windows, and that’s why you cannot create folders by these names.
So, will we *never* be able to create a folder named ‘CON’?
The answer is certainly not ‘NO’, but it isn’t very straightforward. Try the following command in the Command prompt:
md .\con\
and lo, you have your CON folder! Navigate to that folder in Windows, and you will find that its a real folder named ‘CON’.
Now try deleting that folder! Much to your dismay, you can’t! Unless you type
rd .\con\
Interesting bite, isn’t it?
Back in the old days, in the dark and dreary world of MS-DOS, there were many I/O devices that were referred to by reserved names in the OS. Whenever users used these words, the OS took them as references for I/O devices.
Some examples of such reserved words are CON, LPT1, LPT2, COM1, PRN, NUL. These words are still reserved even today in Windows, and that’s why you cannot create folders by these names.
So, will we *never* be able to create a folder named ‘CON’?
The answer is certainly not ‘NO’, but it isn’t very straightforward. Try the following command in the Command prompt:
md .\con\
and lo, you have your CON folder! Navigate to that folder in Windows, and you will find that its a real folder named ‘CON’.
Now try deleting that folder! Much to your dismay, you can’t! Unless you type
rd .\con\
Interesting bite, isn’t it?
Wednesday, February 10, 2010
HOW TO RECOVER DATA FROM SCRATCH CD
HOW TO RECOVER DATA FROM SCRATCH CD
THIS TUTORIAL WILL BE GUIDE YOU TO RECOVER DATA AND FIX YOUR SCRATH CDS
YOU WILL BE NEED THE FOLLOWING TOOLS
1- ALCHOHAL 120% SOFTWARE (OR ANY SIMILAR)
2- SOME COKING OIL
3- DRY CLEANER PAPER
4- COTTON PIECE
FIRST WET THE COTTON WITH WATER AND CLEAN YOUR SCRATCH CD FROM VERTICALY , THEN PICK THE OTHER PIECE OF COTTON WETTING WITH THE OIL AND APPLY FIRMLY TO CD SURFACE, AFTER CLEANING DRY YOUR CD
OIL WILL BE STILL IN MICROSURFACE OF SCRATH PARTS OF CD,AND IT WILL BE HELP THE LASER OF CD,DVD TO READ DATA FROM SCRATCH PARTS
IN ALCHOLOL SOFTWARE START IMAGE MAKING WIZARD AND MAKE A ISO IMAGE OF YOUR SCRATCH CD
THIS TUTORIAL WILL BE GUIDE YOU TO RECOVER DATA AND FIX YOUR SCRATH CDS
YOU WILL BE NEED THE FOLLOWING TOOLS
1- ALCHOHAL 120% SOFTWARE (OR ANY SIMILAR)
2- SOME COKING OIL
3- DRY CLEANER PAPER
4- COTTON PIECE
FIRST WET THE COTTON WITH WATER AND CLEAN YOUR SCRATCH CD FROM VERTICALY , THEN PICK THE OTHER PIECE OF COTTON WETTING WITH THE OIL AND APPLY FIRMLY TO CD SURFACE, AFTER CLEANING DRY YOUR CD
OIL WILL BE STILL IN MICROSURFACE OF SCRATH PARTS OF CD,AND IT WILL BE HELP THE LASER OF CD,DVD TO READ DATA FROM SCRATCH PARTS
IN ALCHOLOL SOFTWARE START IMAGE MAKING WIZARD AND MAKE A ISO IMAGE OF YOUR SCRATCH CD
Tuesday, February 9, 2010
free 411 call scervice suspended
It has been reported from many countries that free call service is suspended due to heavy traffic or intensive use of this service.
Saturday, February 6, 2010
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.
Registry Structure [font_body]Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:
* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.
Each registry value is stored as one of five main data types:
* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.
Other data types not available through the standard registry editors include:
* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.
Registry Structure [font_body]Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.
There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:
* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.
Each registry value is stored as one of five main data types:
* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.
Other data types not available through the standard registry editors include:
* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.
Change the Driver Signing Options (Windows 2000/XP)
This tweak determines how the system responds when a user tries to install a device driver that is not digitally signed and has not passed the Windows Logo testing.
This tweak can be easily applied using WinGuides Tweak Manager.
Download a free trial now!
Open your registry and find or create the key below.
Create a new DWORD value, or modify the existing value, called "BehaviorOnFailedVerify" and set it according to the value data below.
Exit your registry; you may need to restart or log out of Windows for the change to take effect.
Registry Editor Example
| Name Type Data |
| (Default) REG_SZ (value not set) |
| BehaviorOnFailedVerify REG_DWORD 0x00000000 (0) |
-
| HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Dri... |
-
Registry Settings
User Key: [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Driver Signing]
Value Name: BehaviorOnFailedVerify
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = Ignore, 1 = Warn, 2 = Block)
This tweak determines how the system responds when a user tries to install a device driver that is not digitally signed and has not passed the Windows Logo testing.
This tweak can be easily applied using WinGuides Tweak Manager.
Download a free trial now!
Open your registry and find or create the key below.
Create a new DWORD value, or modify the existing value, called "BehaviorOnFailedVerify" and set it according to the value data below.
Exit your registry; you may need to restart or log out of Windows for the change to take effect.
Registry Editor Example
| Name Type Data |
| (Default) REG_SZ (value not set) |
| BehaviorOnFailedVerify REG_DWORD 0x00000000 (0) |
-
| HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Dri... |
-
Registry Settings
User Key: [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Driver Signing]
Value Name: BehaviorOnFailedVerify
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = Ignore, 1 = Warn, 2 = Block)
Change the Driver Signing Options (Windows 2000/XP)
This tweak determines how the system responds when a user tries to install a device driver that is not digitally signed and has not passed the Windows Logo testing.
This tweak can be easily applied using WinGuides Tweak Manager.
Download a free trial now!
Open your registry and find or create the key below.
Create a new DWORD value, or modify the existing value, called "BehaviorOnFailedVerify" and set it according to the value data below.
Exit your registry; you may need to restart or log out of Windows for the change to take effect.
Registry Editor Example
| Name Type Data |
| (Default) REG_SZ (value not set) |
| BehaviorOnFailedVerify REG_DWORD 0x00000000 (0) |
-
| HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Dri... |
-
Registry Settings
User Key: [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Driver Signing]
Value Name: BehaviorOnFailedVerify
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = Ignore, 1 = Warn, 2 = Block)
This tweak determines how the system responds when a user tries to install a device driver that is not digitally signed and has not passed the Windows Logo testing.
This tweak can be easily applied using WinGuides Tweak Manager.
Download a free trial now!
Open your registry and find or create the key below.
Create a new DWORD value, or modify the existing value, called "BehaviorOnFailedVerify" and set it according to the value data below.
Exit your registry; you may need to restart or log out of Windows for the change to take effect.
Registry Editor Example
| Name Type Data |
| (Default) REG_SZ (value not set) |
| BehaviorOnFailedVerify REG_DWORD 0x00000000 (0) |
-
| HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Dri... |
-
Registry Settings
User Key: [HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Driver Signing]
Value Name: BehaviorOnFailedVerify
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = Ignore, 1 = Warn, 2 = Block)
Subscribe to:
Posts (Atom)