Followers

The program can't start because msvcp100.dll is missing from your computer

Solution:


1.       Which version of Windows Operating System are you using?
2.       Which version of Microsoft Visual C++ is installed on the computer?
3.       Have you made any changes on the computer prior to the issue?

Follow the suggestions listed below for a possible fix:

Method 1: In order to fix the issue you may install the latest Microsoft Visual C++ 2010 Redistributable Package and check if it helps.

You may install the latest Microsoft Visual C++ 2010 Redistributable Package according to the Windows 7 versions you are using.

For 32bit: Microsoft Visual C++ 2010 Redistributable Package (x86)

For 64bit: Microsoft Visual C++ 2010 Redistributable Package (x64)  

Method 2: You may run System File Checker [SFC] scan on the computer which will replace the missing or corrupt files & check if the issue persists.

a.       Type ‘cmd’ in start search box. Right click on cmd in the Program list and then select the option Run as administrator.
Note: If you are prompted for an administrator password or for confirmation, type your password, or click Continue.
b.      Type the following command, and then press ENTER:
sfc /scannow 

Source:
www.microsoft.technetsupport.com

Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Error 711: Cannot load the Remote Access Connection Manager Service.




 This error message appears when a required service isn't started on your computer. You won't be able to connect to a network, and you might not be able to install network adapters.
This problem can occur if some or all of the following services aren't started:
·        Plug and Play
·        Remote Access Auto Connection Manager
·        Remote Access Connection Manager
·        Telephony
To fix this problem, follow these steps for each of the services listed above:
1.      Open Administrative Tools by clicking the Start button, and then clicking Control Panel. In the search box, type administrative tools, and then click Administrative Tools.‍ If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
2.      Double-click Services. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
3.      Right-click one of the services listed above, and then click Properties.
4.      Click the General tab, and then, next to Startup type, select Manual.
5.      Click Apply, and then click Start.

Source:
www.micorsoft.technetsupport.com

Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Terminal Services Printer Redirection

Method one

Run the printer's Setup program to install the printer driver .inf file on the terminal server.

Method two

To install the driver by using the Add Printer Driver Wizard:
  1. On the terminal server, click Start, click Run, type control printers, and then click OK.
  2. On the File menu, click Server Properties. Note:  If the File menu is not visible, right-click an empty area of the Printers dialog box, and then click Server Properties.
  3. Click the Drivers tab.
  4. Click Add, and then follow the instructions in the Add Printer Driver Wizard to install the printer driver .inf file.

Create or modify a custom printer mapping file

You can create or modify an existing custom printer mapping file to define mappings from client-side to server-side drivers on the terminal server.
To perform this procedure on the terminal server, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority.
To use a custom printer mapping file:
Caution:  Incorrectly editing the registry might severely damage your system. Before making changes to the registry, you should back up any valued data.
  1. On the terminal server, open Registry Editor. To open Registry Editor, click Start, click Run, type regedit, and then click OK.
  2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
  3. Locate the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd registry subkey.
  4. Add the following values: Name: PrinterMappingINFName
    Type: String (REG_SZ)
    Value data: Name of the .inf file to which you want to redirect lookups.
    Example: c:\windows\inf\ntprintsubs.inf
    Name: PrinterMappingINFSection
    Type: String (REG_SZ)
    Value data: Name of the section in the .inf file to which you want to redirect lookups.
    Example: Printers
After you add the new registry values, create or modify the .inf file that you specified in the PrinterMappingINFName registry entry to include the user-defined mappings from the client-side to server-side drivers. Follow the format used in the following example:
;NTPRINTSUBS.INF
;Printer mapping file for client-side to server-side drivers
[Printers]
"OEM Printer Driver Name" = "Windows Server 2008 Driver Name"
For example:
"HP DeskJet 720C Series v10.3" = "HP DeskJet 722C"
The left side of the equation is the exact name of the printer driver associated with the client-side print queue that is being redirected to the server. The exact name of the printer driver appears on the General tab, next to Model when you view the printer properties on the client computer. (You can also click the Advanced tab and view the driver name in the Driver list.) The right side of the equation is the exact name of the server-side driver equivalent that is installed on the terminal server.
Important:  You must restart the Print Spooler service on the terminal server for the changes to take effect.
To perform this procedure on the terminal server, you must have membership in the local Administrators group, or you must have been delegated the appropriate authority.
To restart the Print Spooler service:
  1. On the terminal server, open the Services snap-in. To open the Services snap-in, click Start, point to Administrative Tools, and then click Services.
  2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
  3. In the Services pane, right-click Print Spooler, and then click Restart.
  4. Confirm that the Status column for the Print Spooler service displays Started.

Verify

To verify that printer redirection is working properly, establish a remote session with the terminal server and check that the redirected printer is available and is functioning as expected.


Source:
www.technet.microsoft.com

Published by
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Windows Server 2012 R2 Gateway

Windows server 2012 R2 can be configured as a Gateway VM in a two or four node cluster on Hyper-v Host. Gateway VM or router enhance Data Center by providing them a secure router for public or private cloud. Gateway VM cluster can provide routing functionality up to 200 tenants. Each Gateway VM can provide routing functionality for up to 50 tenants.
Two different versions of the gateway router are available in Windows Server 2012 R2.
RRAS Multitenant Gateway – The RRAS Multitenant Gateway router can be used for multitenant or non-multitenant deployments, and is a full featured BGP router. To deploy an RRAS Multitenant Gateway router, you must use Windows PowerShell commands
RRAS Gateway configuration and options:
  • Configure the RRAS Multitenant Gateway for use with Hyper-V Network Virtualization
  • Configure the RRAS Multitenant Gateway for use with VLANs
  • Configure the RRAS Multitenant Gateway for Site-to-Site VPN Connections
  • Configure the RRAS Multitenant Gateway to Perform Network Address Translation for Tenant Computers
  • Configure the RRAS Multitenant Gateway for Dynamic Routing with BGP
Windows Server 2012 R2 Gateway – To deploy Windows Server Gateway, you must use System Center 2012 R2 and Virtual Machine Manager (VMM). The Windows Server Gateway router is designed for use with multitenant deployments.
Multi-tenancy is the ability of a cloud infrastructure to support the virtual machine workloads of multiple tenants, but isolate them from each other, while all of the workloads run on the same infrastructure. The multiple workloads of an individual tenant can interconnect and be managed remotely, but these systems do not interconnect with the workloads of other tenants, nor can other tenants remotely manage them.
This feature allow service provider the functionality to virtually isolate different subnets, VLANs and network traffic which resides in same physical core or distribution switch. Hyper-v network virtualization is a Network Virtualization Generic Routing Encapsulation NVGRE which allows tenant to bring their own TCP/IP and name space in cloud environment.

Systems requirements:
Option Hyper-v Host Gateway VM
CPU 2 Socket NUMA Node 8 vCPU for two VMs 4 vCPU for four VMs
CPU Core 8 1
Memory 48GB 8GB
Network Adapter Two 10GB NICs connect to Cisco Trunk Port1 4 virtual NICs
  • Operating Systems
  • Clustering heartbeat
  • External network
  • Internal network
Clustering Active-Active Active-Active or Active-Passive
1-NIC Teaming in Hyper-v Host- You can configure NIC teaming in Hyper-v Host for two 10GB NICs. Windows Server 2012 R2 Gateway VM with four vNIC that are connected to the Hyper-V Virtual Switch that is bound to the NIC Team.
Deployment Guides:
Windows Server 2012 R2 RRAS Deployment Guide
Test Lab Guide: Windows Server 2012 R2 Hyper-V Network Virtualization with System Center 2012 R2 VMM
Clustering Windows Server 2012 R2

Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator
There were a lot of good comments on my post Windows 8 productivity: Who moved my cheese? Oh, there it is. I've continued to explore ways to remove clicks from my life and shorten keystroke chains. A number of folks said they didn't like this thing or that thing because they felt something used to be 2 clicks and now it's 3 or it used to be 1 and now it's 8. It's good to be reminded that you can customize almost everything in Windows. You can make scripts and batch files to your heart's content, and most importantly, any shortcut to nearly anything can be pinned to both the Taskbar and the Start Menu. Here's some examples just to make the point.

Folders

Let's say that you want to quickly get to the folder where you download stuff. You can make the Downloads folder available on the Taskbar as well as the new Start menu.

Pin to a Taskbar icon

You can drag any folder to your Explorer Taskbar icon and pin it. Here the menu is visible when right-clicking on the Explorer icon. You can also pin (promote) links from the Frequent section as well.
Downloads is Pinned to the Explorer Taskbar

Pin to the Windows 8 Start Menu Screen

You can also take any icon or folder from the desktop and right-click to Pin to Start.
Pin to Start
Now my Downloads folder is on my Start and can be opened in one click/touch after pressing the Windows key.
Download is pinned to Start

Pinning other Shortcuts of all Kinds

Once you know you can pin stuff, you can make custom shortcuts and pin other stuff. Right click anywhere and make a new Shortcut. This is a generic pointer to whatever you like.
New Shortcut
You can change the properties of a shortcut like I have here. I've got a shortcut to shutdown with -t 0 added to the parameters so the system will shutdown immediately.
NOTE: You CAN make these shortcuts if it will make you happy but in the case of Shutdown, I just press the Power Button.
shutdown.exe -s -t 0
Now just right click the new shortcut and pin it to either the Taskbar or Start. If you're tidy, and I am sure you are, why not customize the icon?
Shutdown Icon customized
And now my new Shutdown icon looks like this. There you go, one-click shutdown. Happy? ;)

Pinning Custom Actions like Sleep and Restart

You can of course make more complex shortcuts to do things like Sleep your computer with other commands.
Shutdown Computer
Shutdown.exe -s -t 00
Restart Computer
Shutdown.exe -r -t 00
Lock Workstation
Rundll32.exe User32.dll,LockWorkStation
Hibernate Computer
rundll32.exe PowrProf.dll,SetSuspendState
Sleep Computer
rundll32.exe powrprof.dll,SetSuspendState 0,1,0
NOTE: You CAN make these shortcuts if it will make you happy but in the case of Sleep, I just close the lid on my laptop.

Pin Internet Explorer 10 Desktop in the Start Menu

Now that you have figured out how to make crazy shortcuts then Pin them. Hopefully this is as empowering to you as it is to me.
As a Web Developer I have a bunch of Web Browsers pinned to both Start and the Taskbar. However, the Internet Explorer icon in the Start Menu goes to the full screen IE10 and sometimes I want the Desktop IE10.
Desktop IE10
If you refer to this old old old Windows XP Knowledge Base Article you'll see that they show a number of ways you can make Internet Explorer shortcuts. Of course, the easiest one is the one you should do. ;)
NOTE: You can also make a more "real" Internet Explorer link with this "%windir%\explorer.exe shell:::{871C5380-42A0-1069-A2EA-08002B30309D}" as a new Shortcut if you like.
Go to c:\program files\internet explorer and right click on iexplore.exe and pin it. Alternatively you can Copy, then Paste Shortcut, then Rename the shortcut. I named mine "Internet Explorer (Desktop)."
Get iexplore.exe and pin it, then rename
Now I've got two choices! Just like I like it.
Both IE10 metro and IE10 Desktop are both pinned to my Start Menu

Pinning Web Sites and Customizing IE10 Pinned Site Icons

You can pin Web Sites from within IE10 using the menu in the lower right corner. That's also the same context menu that includes Jump Lists. Jump Lists can be added easily with just keys in your HTML.
Context Menu in Full Screen IE10
If your favicon.ico has a 32x32 version that is the resolution of Icon that will be used for your pinned site. The background color for the icon comes from the main color of the icon.

If you want a different icon or color, you can set those with Meta Tags as well. Hm, my giant head isn't big enough. I'll add a 144x144 PNG.

There we go. Much clearer. I can also control the background color with msapplication-TileColor if I want using a #rgb color.

I've pinned all sorts of stuff. Apps, Links, Folders, Browsers, Custom Tasks, Libraries and more. No, I didn't actually pin my face. Oh, and that days app is "Save The Date."

Have fun customizing!

Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator


Use Group Policy to enable Remote Desktop Connection on a group of PCs

This is a group policy that I use pretty often to enable Remote Desktop Connection on a group of PCs, add the proper users to the local Remote Desktop Users group, and enable RDP access on Windows Firewall. I’ve decided to post this here because there have been some slight changes in Group Policy Management on Windows 2008 R2 / SBS 2011 / Windows 7 (just for the actual enabling of RDP, the other things stay the same as they were with 2003 / XP)
Here is how I configure this when I need to enable RDP on a collection of machines:
  1. Create a new OU in Active Directory for all of the computers, or if one already exists make sure all of the computer accounts that need to be changed are in it.
  2. Open Group Policy Management Console and create and link a new GPO to this OU. I typically right click at the root of the GPO, select Properties, and disable the User Configuration Settings. (I do this to cut down on GPO processing time, if we know there will only be computer settings in this GPO, why process all of the unchanged User Policy Settings?)
  3. First we’ll need to add the firewall exception, expand Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile > enable the policy “Windows Firewall: Allow inbound Remote Desktop Exceptions”
  4. Repeat the above for the Standard Profile as well.
  5. Next we Enable Remote Desktop Connectivity, expand Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections > enable the policy “Allow Users to connect remotely using Remote Desktop Services” Note: this used to be  > Windows Components > Terminal Services > “Allow users to connect remotely using Terminal Services”
  6. Next we need to add the proper users/groups to the Remote Desktop Users group on each PC, expand Computer Configuration > Policies > Windows Settings > Security Settings > Restricted Groups
  7. Right Click on “Restricted Groups” and select “Add Group…”
  8. Enter “Remote Desktop Users” Note: don’t click the “Browse” button because you’re on a Domain Controller (well more than likely anyway) and you don’t want to choose BUILTIN\Remote Desktop Users, which is where the browse button will take you, you want to edit the membership of the local “Remote Desktop Users” group on each PC) and click OK
  9. Click the “Add…” button next to “Members of this group:”, and now click the “Browse” button, enter “Domain Users” (or whichever group you created) and then click “Check Names”, once you’ve verified that you’ve got the right group click “OK”
  10. Click “OK” twice more and close the GPO, once all of the machines have rebooted you’ll now be able to remote into any of these PCs as a member of Domain Users.
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

The security log on this system is full

From Control Panel > Administrative  tools select Computer Management
Double click Event viewer
Single-click to select Security
Action > Properties
Then select a more suitable setting (such as Overwrite events as needed)


Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Audit Policy

You commonly configure audit settings using the following:
  • Domain based group policy (via GPMC.MSC)
  • Local policy (via GPEDIT.MSC)
  • Directly (only advanced audit policy, via auditpol.exe)
But depending on how you set the policy, your reporting tools may be misleading you around effective settings. For instance, I have specified the following policies using the following techniques.
1. I have a legacy audit policy applying from domain policy that configures Object Access auditing:
image
2. I have advanced audit configuration applying from domain policy that sets AD changes, account lockouts, and logons:
image
3. I have advanced audit configuration applying from local policy for process startup and termination:
image
4. I have granular audit settings configured using auditpol.exe /set for file share access:
image
Pro tip: this is not awesome auditing technique, on a number of levels. :) Just for demo purposes, mmmkay?

Initial Results

Now I generate a resultant set of policy report. I am not using RSOP.MSC as it’s deprecated and often wrong and generally evil. I run GPRESULT /H foo.htm instead:
image
image
Looks pretty good so far. I can’t see my policy that I set through auditpol.exe though; that kinda sucks but whatevah.
So now I start generating some audit events for the areas I am tracking from my four audit points. Immediately I see some weirdness:
  • All the advanced audit configuration coming from “Local Group Policy” and “Advanced Audit DC Policy” is working great.
image
  • My event log should be flooded with Object Access events but there are zero. 
  • Accessing file shares doesn’t generate any audit events.
The lack of Object Access auditing is expected: as soon as you start applying Advanced Audit Configuration Policy, legacy policies will be completely ignored. The only way to get a Win7/R2 computer to start using legacy policy is to set the security policy “Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings” to DISABLED. That disables the use of the newer policy type. Then you must clear the existing advanced policy from the machines (auditpol.pol /clear, having a blank audit.csv file, etc). The system isn't optimal, but the intention was never for you to go back.
Not seeing the File Share events makes sense too: after all, I created domain based and local policy to set all of this; they are just blowing away my local settings, right?
Yes and no.
First, I delete my link for the “Advanced audit DC policy” and run GPUPDATE /FORCE. Now I am only getting local policy settings for process creation and termination as expected. If I then re-run my auditpol /set /subcategory:”file share” /success:enable command and access a file share, I get an event. Yay team. Except after a while, this will stop working, because the local policy setting is going to reapply when the computer restarts or every 16 hours when security policy is reapplied arbitrarily.
Here’s where things get weird.
Unlike most security settings that directly edit registry keys as preferences, advanced audit policy stores all of its local security policy values in an audit.csv file located here:
%systemroot%\system32\grouppolicy\machine\microsoft\windows nt\audit\audit.csv
Which is then copied here:
%systemroot%\security\audit\audit.csv
But the domain-based policy settings are in an audit.csv in SYSVOL and that is never stored locally to the computer. So examining any of them is rather useless. Unfortunately for you, those audit.csv files are what RSOP data is returning, not the actual applied settings. And if you use legacy tools like SECEDIT.EXE /EXPORT it won’t even mention the advanced audit configuration at all – it was never updated to include those settings.

The Truth

All of this boils down to one lesson: you should not trust any of the Group Policy reporting tools when it comes to audit settings. There’s only one safe bet and it’s this command:
auditpol.exe /get /category:*
image
Only auditpol reads the actual super-top-secret-eyes-only-licensed-to-kill-shaken-not-stirred registry key that stores the current, effective set of auditing policy that LSASS.EXE consumes:
HKEY_Local_Machine\Security\Policy\PolAdtEv
image
If it’s not in that key, it’s not getting audited.
Before you get all excited and start plowing into this key, understand that this key is intended to be opaque and proprietary. We don’t really document it and you certainly cannot safely edit it with regedit. In fact, as an experiment I once renamed it in order to see if it would be automatically recreated using “default, out of box” settings. Instead, the computer refused to boot to a logon prompt anymore! I had to load that hive using regedit in WIN PE and name it back (Last Known Good Configuration boot does not apply to the Security hive). If you want to write your own version of auditpol you use the function AuditQuerySystemPolicy (part of the gigantor Advapi32 library of Authorization functions; have fun with that goo and don’t call me about it, it’s grody).
As a side note - if you want a safe way to remove auditing settings you can easily clear that registry key by running auditpol /clear and removing policy. That puts you to “nothing”. If you want to restore to “out of the box” experience you would use auditpol /backup on a nice clean unadulterated repro computer that was installed from media and never joined to a domain. That gives you the “before”. Then if you ever want to reset a computer to OOB you auditpol /restore it.

Source:
www.technetsupport.microsoft.com

Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Download Best and Top 5 Free Firewall Software for Windows

If you use Internet in your computer system, your computer is always at risk of getting virus infection. Whenever we browse on Internet, some data is downloaded on our system and some data is uploaded from our system. That's why we always need a good firewall software for our computer system.
Firewall is a security software which regularly monitors the incoming and outgoing data when you are online and it automatically blocks or prompts you whenever it detects suspicious activities.
Recently we posted about top 5 free antivirus and anti-spyware software for Windows:
Download Best and Top 5 Free Antivirus and Anti-Spyware Software for Windows
Now its turn of Firewall software for Windows because only antivirus or anti-spyware software is not enough for your computer. If you want complete security, you should also install a firewall software in your PC.
Today in this article, we are going to share top 5 free firewall software for Windows operating system. We have selected the best firewall programs available for Windows which are absolutely free to download and use.
So without wasting time, lets share the list:
1. Zone Alarm Free Firewall
Zone Alarm is one of the most popular and widely used firewall software for Windows. It blocks hackers and prevents viruses & spyware from stealing your personal data and sending it out to the Internet. It works great with almost all antivirus software. Its a 2-way firewall so it also prevents your personal information to be sent on Internet.
Its absolutely free for private use. You can download it using following link:
Download Zone Alarm Free Firewall
2. Comodo Firewall
Comodo is another popular free firewall software for Windows. Its very lightweight program which comes with simple and easy to use interface. Just like any other firewall, it defends your PC from Internet attacks and prevents malware from being installed on your PC.
You can download it using following link:
Download Comodo Firewall
3. Outpost Security Suite Free
Outpost is another popular firewall company for Windows. In past they used to release only firewall software for Windows but now they have replaced it with a complete security suite which can be downloaded absolutely free. Outpost Security Suite comes with a fully functional antivirus, anti-spyware and firewall program.
You can download it using following link:
Download Outpost Security Suite Free
4. Online Armor Free Firewall
Online Armor is another free firewall available for Windows. Its setup process is straightforward and configuration is a one-time event and part of the initial installation process. It provides complete protection from inbound threats and control of data leaving your computer for the internet.
You can download it using following link:
Download Online Armor Free Firewall
5. Windows Firewall
If you are using Windows 7 or Windows 8, you can use the built-in Windows firewall program. Windows XP and Vista firewall was not that great but Microsoft has greatly improved it in Windows 7 and Windows 8 OS. Windows Firewall is enabled by default and automatically monitors and blocks suspicious attacks. Freeware such as TinyWall and Windows Firewall Notifier can be used to enhance Windows firewall functionality. Thanks to our reader "Carbonize" for mentioning them.
So which firewall software are you using in your Windows? Did you already know about the above mentioned software? Feel free to share your feedback and experience about firewall software in your comment...
 
Publsihed By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

How to Restrict Windows Users from Accessing Shutdown Options at Login Screen?

Editing a system file is not an easy task for a normal Windows user. Also the method might not work in newer versions of Windows.
So today in this tutorial, we are going to share another easy way to remove/hide or disable Shutdown button from login screen. This tutorial will work in almost all Windows versions including Windows XP, Vista, 7, 8 and 8.1.
Win_7_Login_Screen_wo_Branding.png
You'll not need to modify any system file in this tutorial, you just need to follow a few simple steps and it'll remove the shutdown button from login screen.
Thanks to our reader "Profess0r1011000" for sharing this excellent trick with us...
So without wasting time lets start the tutorial. There are 2 methods to remove the Shutdown button from login screen:
  • METHOD 1: Using Group Policy Editor (gpedit.msc)
  • METHOD 2: Using Registry Editor (regedit.exe)
METHOD 1: Using Group Policy Editor (gpedit.msc)
1. Type gpedit.msc in RUN or Start search box and press Enter. It'll open Group Policy Editor.
2. Now go to:
Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options
3. In right-side pane, look for "Shutdown: Allow system to be shut down without having to log on" option.
The option would be set to Enabled. Double-click on it and set it to Disabled.
Disable_Shutdown_without_Logon_Feature.png
Apply the changes and it'll immediately remove Shutdown button from login screen.
4. To restore shutdown button, again set the "Shutdown: Allow system to be shut down without having to log on" option to Enabled.
METHOD 2: Using Registry Editor (regedit.exe)
If you don't want to use or can't use Group Policy Editor, you can take help of Registry Editor for the same task. Just follow these simple steps:
1. Type regedit in RUN or Start search box and press Enter. It'll open Registry Editor.
2. Now go to following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
3. In right-side pane, look for a DWORD shutdownwithoutlogon. Double-click on it and set its value to 0 as shown in following screenshot:
Remove_Shutdown_Button_Login_Screen.png
Restart or log off your system and shutdown button will get removed from login screen.
4. To restore shutdown button, change value of shutdownwithoutlogon to 1.
 
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

Different Ways to Open Command Prompt as Administrator in Windows

Many times we need to open Command Prompt window as Administrator in Windows which is also called as "Elevated Command Prompt" window. By default when you launch a Command Prompt window, it opens in a restricted mode i.e. some advanced commands can't be executed in this mode. It happens to prevent accidental execution of some advanced commands which can interact with Windows boot loader, etc.
But there are situations when you might need to open Command Prompt window as Administrator so that you can execute those restricted commands such as enabling hidden Administrator account in Windows, fixing Windows 7 boot screen, etc.
Today in this tutorial, we are going to share some easy ways to quickly launch Command Prompt window as Administrator. There are methods available for almost all Windows versions including Windows XP, Vista, Windows 7, Windows 8 and later.
So without wasting time lets start the tutorial:
1. Open Command Prompt as Administrator from Start Menu
This method will work in all Windows versions except Windows 8 and later as Microsoft has removed Start Menu from Windows 8.
1. Click on Start button or Start ORB and go to All programs -> Accessories.
2. Now right-click on Command Prompt shortcut and select "Run as Administrator" option.
Open_Command_Prompt_as_Administrator_Using_Start_Menu.png
 
You can do the same for any Command Prompt shortcut whether its pinned to Start Menu, Taskbar or placed at Desktop.
2. Open Command Prompt as Administrator using Start Menu Search
This method will only work in Windows Vista and Windows 7 as these are the only Windows versions which come with Start Menu search functionality.
1. Click on Start ORB and type cmd. It'll show cmd.exe in search results.
Open_Command_Prompt_as_Administrator_Using_Start_Menu_Search.png
2. Don't click on the shortcut. Press and hold Ctrl and Shift keys and then press Enter. It'll open Command Prompt with Administrator privileges.
3. Open Command Prompt as Administrator using Windows 8 "Win+X" Menu
Both above mentioned methods will not work in Windows 8 but Windows 8 comes with some other easier methods to launch Command Prompt window as Administrator. One of them is using the new "Win+X" menu which can be accessed either by right-clicking on bottom-left corner of screen or by pressing Win+X keys together.
Open_Command_Prompt_as_Administrator_Using_Win_X_Menu.png
This menu contains a direct shortcut to launch Command Prompt as Administrator.
4. Open Command Prompt as Administrator using Windows 8 Start Screen
This is another method to open Command Prompt as Administrator in Windows 8. We all know that Microsoft has replaced Start Menu with new Start Screen in Windows 8. We can launch Command Prompt as Administrator using this new Start Screen as well.
1. Go to Start Screen in Windows 8 by pressing Win key and then type cmd.
2. Windows will show Command Prompt in search results page. Right-click on the shortcut and select "Run as administrator" option given at the bottom.
Run_Command_Prompt_As_Administrator_Windows_8.png
5. Open Command Prompt as Administrator using Windows 8 Explorer
Windows 8 Explorer comes with Office 2010 style Ribbon UI and Microsoft has added an option to launch Command Prompt in this ribbon.
1. Open Windows Explorer and go to a drive or folder.
2. Now click on File menu present in the ribbon and select "Open command prompt -> Open command prompt as administrator" option.
Windows_8_Explorer_Ribbon_File_Menu.png
6. Open Command Prompt as Administrator using Secret Task Manager Trick
This method works in all Windows versions. Its a hidden feature of Windows which allows you to launch Command Prompt with Administrator privileges using Task Manager.
Check out following tutorial to learn more about this secret feature:
Hidden Secret Trick to Open "Command Prompt" Window Using Task Manager
7. Always Open Command Prompt as Administrator
If you want to always open Command Prompt window as Administrator, you can follow these simple steps:
1. Right-click on Command Prompt shortcut and select Properties.
2. Now click on "Advanced" button present in "Shortcut" tab.
3. Enable "Run as administrator" option and apply the changes.
Open_Command_Prompt_as_Administrator.png
4. That's it. Now Command Prompt window will always open with Administrator privileges.
PS: If you want, you can enable hidden built-in Administrator account in Windows and then you'll always have Administrator privileges for all tasks:
 
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator

How to Disable / Restrict Use of USB Storage Devices in Windows?

Many times we want to restrict users from using USB drives in our systems. Suppose you have some important data and a friend comes and takes the data in his USB drive. This tutorial will help you in completely disable the use of USB drives in system.
After applying this tutorial, users will not be able to use USB drives. Windows will not detect it.
The tutorial is divided into 2 parts:
  • If the USB storage device is not installed in system
  • If the USB storage device is already installed in system
So lets start this tutorial:
If the USB storage device is not installed in system:
1. Type %windir%\inf in Explorer addressbar or RUN dialog box and press Enter. It'll open "inf" folder.
2. Now look for following 2 files:
  • usbstor.inf
  • usbstor.pnf
3. Now you have to change their user permissions setting. Do as following for each file:
Right-click on the file and select "Properties". Go to "Security" tab and select the desired user or group in "Group or user names" list which you want to restrict from using USB drives. Now in "Permissions for Users" list, click on "Deny" checkbox next to "Full control" option and then click on OK.
Change_Permissions_for_usbstor_file.jpg
 
NOTE: In Windows Vista, you'll have to click on "Edit" button after selecting the user or group in "Group or user names" list and then again select the same user or group in new dialog box. Now you can click on "Deny" checkbox.
4. That's it. Now users will not be able to install any USB storage device in system.
If the USB storage device is already installed in system:
1. Type regedit in RUN dialog box and press Enter. Now go to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
2. In right-side pane, change value of "Start" to 4
Change_Start_Value_for_USBStor_in_R.jpg
3. Now whenever a user will attach a USB storage device which is already installed in system, Windows will not detect it and it'll not be shown in My Computer.
NOTE: If you want to revert it back to default, then change the value of "Start" to 3
 
Published By
S.G.Godwin Dinesh.MCA
Sr.System Administrator