Where is administrative tools in xp




















A task scheduling program, called Scheduled Tasks , is also included in Windows XP but is not part of this toolset. Windows Firewall with Advanced Security is an MMC snap-in used for advanced configuration of the software firewall included with Windows. Basic firewall management is best performed via the Windows Firewall applet in Control Panel. The firewall built-in to Windows is enabled by default, but you can always disable it and use a third-party program.

There are plenty of free firewall programs to pick from. The Windows Memory Diagnostic link starts a scheduling tool for running Windows Memory Diagnostic during the next computer restart.

It tests your computer's memory when Windows isn't running, which is why you can only schedule a memory test and not run one immediately from within Windows. This tool is also available in this folder in Windows Vista but is referred to as Memory Diagnostics Tool. There are other free memory testing applications that you can use besides Microsoft's, which we rank and review in our list of free memory test programs.

PowerShell is a powerful command-line utility and scripting language that administrators can use to control various aspects of local and remote Windows systems. It's also available in Windows 7 and Windows Vista but not via Administrative Tools—those versions of Windows do, however, have a link to a PowerShell command line. Windows PowerShell 2. Some other programs may also appear in Administrative Tools in certain situations.

For example, in Windows XP, when Microsoft. NET Framework 1. Actively scan device characteristics for identification. Use precise geolocation data. Select personalised content. Create a personalised content profile. Measure ad performance. Select basic ads. Create a personalised ads profile. Select personalised ads.

Apply market research to generate audience insights. Measure content performance. Develop and improve products. List of Partners vendors. Tim Fisher. Click the item in the console tree for example, Device Manager or Computer Management , and then click Help on the Action menu.

For more information about how to use any of the administrative tools in Computer Management, see the Help file for the individual item. In the Computer Management window, click the item in the console tree, and then click Help on the Action menu. For additional information about how to use Event Viewer, click the article number below to view the article in the Microsoft Knowledge Base:.

Need more help? Expand your skills. Get new features first. A subscription to help make the most of your time. Smart assistance features.

Ad-free email. Back up and access files across devices. Try one month free. Was this information helpful? Yes No. Thank you! Any more feedback? The more you tell us the more we can help. Play the video. The ability to post comments and take advantage of other Lounge features is available only to registered members. When I let Windows choose what to back up, it backed up my user data and then did a system image backup.

I know that when I do backups in the future it will back up only new files and those that have changed. If I want to restore a modified file, does it show only the latest file or does it keep several copies of that file? Now to your question: the size of the backup storage areas also affects how many older copies are retained.

The smaller the space, the fewer previous versions , restore points , and backups of files will be available. The larger the storage space, the more previous versions, etc. Calvin Conrey does the right thing when he installs software: he actually reads the fine print in the privacy disclosures to see what the software might do. YouTube is part of Google. Allows application to take pictures and videos with the camera.

This allows the application at any time to collect images the camera is seeing. This would be great for spying. Can this be for real? And I agree it sounds scary. But I think this is more a case of a poorly worded permissions description than anything else. Nothing in the statement suggests to me that YouTube or Google is acquiring permission to launch the app without your knowledge or to turn on your camera against your will.

This poorly worded language actually first cropped up on some platforms several months ago. When a Windows device sleeps, it holds on to whatever IP address it was using at the time. The idea is that the device can wake up and go back online immediately without having to request a new address from the router.

That usually works until the sleeping device wakes up and tries to communicate using its old and now already taken IP address. The fix is easy — and just what you suspected. Set each of your local network devices to use an IP address that never changes. There are many terms for this, including static, specified, assigned, or fixed IP addressing.

These terms mean exactly the same thing: each device gets its own, unique, unshared, and permanent IP address. These addresses usually are in the form of All Windows versions let you set a static, local IP address, and the Help files built into Windows can give you point-and-click guidance.

In all Windows versions, click Start, Help and Support; enter static ip as the search term. The next steps vary slightly, version to version. Click it and follow the instructions.

The static specified IP info is in Step 4. Once your Windows devices are set with their own unique, static IPs, you then need to do the same for your other devices. TiVo, for example, posts instructions for using a static address on a support page. Instead, I suggest you do the following.

This technique will give you a fresh, clean XP SP3 setup to work with now. And, should something terrible happen to your setup in the future, you can use your new XP SP3 gold-master backup to rapidly almost effortlessly!

You can then use Windows Update and your normal backups to bring the restored OS up to date. This technique should allow you to continue using XP SP3 for as long as you want or need to — at least until Microsoft drops support for XP on April 8, Windows 8, which seems to be on track for an October release, will usher in scores of new programs, new ways of working, and completely new methods for interacting with that old war horse we call Windows.

Previously, as Windows evolved, older programs still worked comfortably in newer Windows interfaces. But the future is Metro, and it requires applications that match its immersive experience.

Windows Live Essentials debuted in as a website — not the suite of programs now associated with the name. Then, faced with tough antitrust concerns and lousy Vista applications, Microsoft created Windows Live Mail and Windows Live Photo Gallery, which superseded similarly named programs in Vista, and turned them into independent, downloadable apps.

This gave Microsoft the opportunity to fix, update, and improve both programs without disturbing Vista. By late , Microsoft was deep into its Windows 7 development. The OS went gold in July It gave MS developers an additional two months or more to whittle away at the Windows Live apps, which could be released and updated after Windows went gold.

It included these apps:. During its lifespan, Windows Live and Windows Live Essentials encompassed more than a hundred programs and websites. You can still download and run some of them — including all of Windows Live Essentials download site. Three questions come to mind concerning features lost in the transition from Windows Live Essentials to Metro apps. For example, Mesh lets you sync files and folders between PCs, where SkyDrive forces you to sync through the cloud.

Mesh also lets you sync arbitrary files and folders on or accessible to your PC. You can map out how the synched folders on one machine get moved around on another. SkyDrive does its work through a single folder — very cumbersome. Many typical hardware problemssuch as conflicting protocols, network card conflicts, and IRQ conflictsare reported in the system log.

The Event Viewer can help you sleuth out possible entries explaining the problem. One way of seeing several similar events you're interested in for example, to see how many times the same event occurred is to click the relevant column head in the Event Viewer. Clicking the head sorts the listing according to the column's data. As in Windows Explorer and other Windows programs, the column sorter toggles between ascending and descending order.

A more powerful approach for culling out the items you're interested in is to use filtering. When logs get quite large or if you have a server that supports a high density of workstation activity, this approach might be the most effective technique for ferreting out what you need to examine.

The System Properties dialog box you use for filtering is shown in Figure On the Filter tab of the System Properties dialog box, you can limit the listing to specific conditions. After you set up a filter, don't be alarmed if all your entries suddenly seem to have disappeared; they're probably just being filtered.

Check the View menu, and you'll see the Filter option selected. Choose it again to eliminate the filter. You can stipulate a few settings that affect how log entries are recorded. These settings are most useful in managing the size of your logs so that they don't eat up too much disk space.

There are potentially so many loggable events that even a typical day on a busy network server could produce far larger log files than you would want to wade through, or that you would want to devote disk space to.

To view or change options for a log file, right-click the log file in question, and choose Properties. Then click the General tab to see the dialog box shown in Figure Setting a log's options. If you don't archive the log see the next section , then you should probably have the log "wrap" around after it reaches the maximum log size. The Overwrite Events as Needed option ensures that, when the log fills up, a new event takes the place of the oldest preexisting log entry.

If you really want to ensure that you get to see the log entries, choose the Do Not Overwrite Events option. After the maximum size is reached, subsequent events are not written, and thus lost.

If so, you have to use the Action, Clear All Events command to make room for new entries. A final option in the Event Viewer lets you create archives of log files and to reload those files for later examination.

As a rule, archiving log files isn't of much use unless you're running a very secure operation in which extensive background records of system or network usage are mandated by the government or the corporation where you work.

Most likely, in such a secure operation, you'll be doing regular tape or other forms of backup, which might include backups of the log files anyway. In this case, this regimen might meet your security requirements, depending on your tape rotation scheme.

If it doesn't, you can archive your event logs. Archiving is a relatively simple process. You can store archives as text files, comma-delimited files text files with a comma between each field for use in database or spreadsheet programs that can import this format , or binary files with the. EVT extension. Only the. EVT files retain all the property information for each event. If you want to reload the file for later use, save it as an.

EVT file. One case to be made for archiving is this: Logs can be useful in isolating network or machine failures. By keeping copies of past logs, you have something to compare with current versions that list new failures.

By comparing logs, you can perhaps notice how and when the errors began to accumulate. Generally speaking, a network failure starts simple and then increases in frequency until a catastrophic failure occurs.

Old logs can help here. Note that the file created by the archiving process isn't affected by any filtering active at the time. That is, all events in the log are written into the archive file. TXT, or. CSV file. The Action, Export List command can save into. TXT or. CSV as plain text or Unicode text. After you save, the log is archived, but the current log isn't cleared.

Its contents are unaffected. If your log is full, you have to clear it manually. To recall an archived log for later examination, open it using the Open Log File command from the Action menu. If your security log file is empty, see "No Events in Security Log" in the "Troubleshooting" section. As you learned in Chapters 1 and 2, Windows XP is highly modular. Many of the inner housekeeping chores of the operating system are broken down into services that can be added, removed, started, and stopped at any time, without requiring a reboot.

A typical Windows XP system has 80 or more services running at any one time. You can view which services are running by using the Services tool. Use this tool to start and stop services. To start, stop, pause, or restart a service, you can use the context menu or the VCR-like buttons on the toolbar. For deeper control of a service, such as to declare what automatic recovery steps should be taken in the case of the service crashing, which hardware profiles it should run in, and more, open its Properties dialog box.

While you're checking the status of services, you can start, stop, and pause system services from this screen. You also can set the account under which the service is executed Log On tab , define how a service recovers from failures for example, restart, run a program, or reboot the system Recovery tab , and view a list of service, program, and driver dependencies Dependencies tab.

Previous page.



0コメント

  • 1000 / 1000