Files can’t be opened error in windows

Below the document shows  how to reset IE security settings while getting these error.



How to get citrix receiver in ubuntu

Below is a small document help to install citrix receiver.


Offline method for Java installing

1. Go to the Manual download page
2. Click on Windows Offline.

3. The File Download dialog box appears prompting you to run or save the download file

4.Click the Install  button to accept the license terms and to continue with the installation.

How to configure cluster quorum using as a share Windows 2008-12

Here is a document described,how to configure a cluster which quorum from a file share from a third server.

Windows 2008-12 cluster quorum using as file share

How to increase Terminal connections

Below the document show how to allow more connections using some registry tweaks

Terminal connections increase


Overview of TS Licensing

Configuring License Settings on a Terminal Server


How to reset RDC client license on Windows 7?

How to reset the 90 temporary license with Terminal Server/Win2k

How to Reset a 120-Day Terminal Server Timeout

Reset Terminal license on Windows 2008, 2008 R2 and 2012

Microsoft Baseline Security Analyzer (MBSA)

Microsoft Baseline Security Analyzer (MBSA) is a software tool released by Microsoft to determine security state by assessing missing security updates and less-secure security settings within Microsoft Windows, Windows components such as Internet Explorer, IIS web server, and products Microsoft SQL Server, and Microsoft Office macro settings. Security updates are determined by the current version of MBSA using the Windows Update Agent present on Windows computers since Windows 2000 Service Pack 3.


Resize a Windows Azure VM’s Root/C Drive

Using this method you can work entirely with the disks in Azure.

Configure Network Level Authentication for Remote Desktop Services Connections

Network Level Authentication is an authentication method that can be used to enhance RD Session Host server security by requiring that the user be authenticated to the RD Session Host server before a session is created.
Network Level Authentication completes user authentication before you establish a remote desktop connection and the logon screen appears. This is a more secure authentication method that can help protect the remote computer from malicious users and malicious software. The advantages of Network Level Authentication are:
 It requires fewer remote computer resources initially. The remote computer uses a limited number of resources before authenticating the user, rather than starting a full remote desktop connection as in previous versions.
 It can help provide better security by reducing the risk of denial-of-service attacks.
To use Network Level Authentication, you must meet the following requirements:
 The client computer must be using at least Remote Desktop Connection 6.0.
 The client computer must be using an operating system, such as Windows 7, Windows Vista, or Windows XP with Service Pack 3, that supports the Credential Security Support Provider (CredSSP) protocol.
 The RD Session Host server must be running Windows Server 2008 R2 or Windows Server 2008.
Use the following procedure to configure Network Level Authentication for a connection.

Configure Network Level Authentication for Remote Desktop Services Connections

How to Activate or Renew Symate License

After your Symantec  trial expired what need to be do.Below the document shows how will activate or renew license.

How to Activate Symate License

License Types and Policy

SEP EE Licensing guide



Ping request and response messages

Ping “Packet InterNet Groper” (operates by sending Internet Control

Message Protocol (ICMP) echo request packets) is a network

administration software utility used to test the reachability of a

host on an Internet Protocol (IP) network and to measure the round-

trip time for messages sent from the originating host to a destination

computer and back.

Destination host unreachable: The device you are trying to PING is

down or is not operating on the network. This could also mean you will

have to recheck the settings on your device to make sure the host is

correctly configured and also check that the routing is working

properly because a route to the destination system could not be found.

If you are trying to PING something outside of your local network,

check if gateway address is correct.

Bad IP address: An invalid IP address was entered on the command

prompt line. The IP address must be written in a dotted decimal

format, for example Check that the IP address is correct.

Destination net unreachable: The targeted gateway to the IP

address written in the command prompt window could not be reached.

Check your computer gateway to be correct and routing table to the IP


Destination specified is invalid: An invalid address has been

written in the command prompt window. Make sure the format of the

address is correct and then try again.

Request timed out: The ping command has timed out because there

was no reply from the targeted device. First check if your TCP/IP

stack is functioning correctly by pinging . This doesn’t

mean that your network card is working properly. Now ping your default

gateway and make sure you have connectivity. Ping the next hop after

the gateway or a device before our faulty device, like a router

interface. If you have connectivity this could mean our faulty device,

the one we get replies with “request timed out” from has a problem or

may be down and not the network channel to the device. If you get

reply from another device on the way, but not from the host we are

troubleshooting, this could also mean there is no route back to your

device. Note: Destination Net Unreachable will show the IP address of

the router that tried to route a packet but couldn’t find a valid


TTL expired during reassembly: The TTL value defines the number of

maximum hops a packet may live inside a network without reaching its

destination, before being discarded. It’s actually the number of

routers a packet may pass through network to destination, before being

dropped. This means the TTL value was too small and it failed to

reassembly either at the destination or on the local machine. Use -i

parameter for PING command to increase TTL value.

TTL expired in transit: The TTL value defines the number of

maximum hops a packet may live inside a network without reaching its

destination, before being discarded. It’s actually the number of

routers a packet may pass through network to destination, before being

dropped. This means the TTL value was too small to reach the target

and it failed on the way by being dropped. Use -i parameter for PING

command to increase TTL value.

Hardware error: Ping your loop-back address to verify

that your TCP stack is working properly. If you can ping this, check

the cable. Else you will have to troubleshoot the TCP stack and

network interface card.

 No resources: Means exactly what it says but it targets RAM memory

most of times. Close some applications like the ones you don’t need

right now and try again. If this fails, reboot your computer. Will

work after.

%d bloggers like this: