English Windows FAQs

Raccolta di tutti gli e-mail ricevuti da http://email.winnetmag.com/winnetmag/winnetmag_prefctr.asp

Valid HTML 4.01!



How can I use the percent (%) sign in a batch file?
Although you can use the % sign to specify a variable in a batch file, you must type two % signs in succession. For example, you must type
for /L %%n IN (1,1,10) DO @ECHO %%n
to tell the batch file to interpret the command as
for /L %n IN (1 1 10) DO @ECHO %n
If you simply want to output the % sign from a batch file, you must also type two % sign in succession. For example, type
echo 10%%
to display
10%
The standard % signs that surround an environment variable remain the same, regardless of whether you're typing them at a command prompt or including them in a batch file. For example, type
echo %date%
to display the date.
Top

How can I create a registry link?
Similar to file shortcuts that point to an actual file, registry links create a symbolic link from a virtual path to an actual path. You might have seen these links in the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet registry subkey, which is a link to one of the ControlSets under the same parent location, and the HKEY_CURRENT_USER registry key, which points to a path under HKEY_USERS\ <SID of current user > registry subkey. Both of these registry links are of type REG_LINK, but you can't use standard registry tools to create this internal type. However, a freeware utility, Regln, available from the NTinternals Team at http://www.ntinternals.net/regln lets you create registry links. Be sure to read the instructions before you dive in, and treat this utility with care; otherwise, you might cause serious damage to your machine.
Top

What's a SYN attack?
The SYN (TCP connection request) attack is a common Denial of Service (DoS) technique characterized by the following pattern:

  1. Using a spoofed IP address not in use on the Internet, an attacker sends multiple SYN packets to the target machine.

  2. For each SYN packet received, the target machine allocates resources and sends an acknowledgement (SYN-ACK) to the source IP address.

  3. Because the target machine doesn't receive a response from the attacking machine, it attempts to resend the SYN-ACK five times, at 3-, 6-, 12-, 24-, and 48-second intervals, before unallocating the resources 96 seconds after attempting the last retry. If you add the numbers all together, you can see that the target machine allocates resources for more than 3 minutes to respond to just one SYN attack.

When an attacker uses this technique repeatedly, the target machine eventually runs out of resources and is unable to handle any more connections, thereby denying service to legitimate users. To determine whether your systems might be vulnerable to this type of attack, from the command prompt type
netstat -n -p tcp
Look at the output for entries in a state of SYN_RECEIVED. If you notice multiple entries, your system is vulnerable to attack. For information on how to protect yourself from such DoS attacks, see the next FAQ.
Top

How can I protect my system from a Denial of Service (DoS) attack?
Firewall products can protect your machines from DoS attacks, and you should use a firewall whenever possible. However, built-in Windows functionality can also help protect against DoS attacks and quickly time out SYN requests. To enable this functionality, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name SynAttackProtect, then press Enter.

  5. Double-click the new value, set it to 2, then click OK.

  6. Close the registry editor.

  7. Reboot the machine.

The SynAttackProtect default value is 0, which offers no protection. A value of 1 limits the number of SYN retries and delays the route cache entry when the maximum number of open TCP connections (i.e., the connections in the SYN_RECEIVED state known as TcpMaxHalfOpen) and retries (i.e., TcpMaxHalfOpenRetried) have been met. When SynAttackProtect has a value of 2, the effect is similar to when the value is set to 1 but includes a delayed Winsock notification until the 3-way handshake involved in the SYN process is finished. Because Windows invokes the SynAttackProtect value only after the system exceeds the TcpMaxHalfOpen and TcpMaxHalfOpenRetried values, I recommend that you also create the TcpMaxHalfOpen and TcpMaxHalfOpenRetried values under the same registry key (both DWORD values) and set them to 100 and 80, respectively.
Top

Why do I receive an error when I attempt to run the Windows .NET Server (Win.NET Server) 2003 Administration Tools under Windows XP?
Win.NET Server includes several updated XP files, including dsprop.dll. The Administration Tools require the Win.NET Server version of this file because the base XP version doesn't contain necessary functions. XP Service Pack 1 (SP1) contains the Win.NET Server version of the file, so you must install XP SP1 before you attempt to install the Win.NET Server Administration Tools under XP. You can download the Administration Tools at http://download.microsoft.com/download/5/2/b/52bbe553-bae6-41e0-a82d-30d30145c1ee/rc2-adminpak.exe .
Top

How can I install Windows 2000 on Toshiba's Portege 3110 laptop?
Because the Portege 3110 includes an external CD-ROM drive that connects to the laptop through a PC Card, you can't configure the system BIOS to boot from a CD-ROM. Also, the standard Win2K installation disks don't recognize the CD-ROM drive, which causes the OS installation to fail. If you can connect the laptop to a network, you can set up a Microsoft Remote Installation Services (RIS) server and install Win2K from the network. If working from the network isn't an option, you can perform the following steps (some of these steps are specific to the Portege 3110, but you can modify this process for any CD-ROM driver):

  1. Create an MS-DOS boot disk (you can download the necessary files from http://www.bootdisk.com ).

  2. Copy the CD-ROM driver file to the boot disk; for the Toshiba laptop, this file is arccd.sys, which you can download from the Toshiba Web site.

  3. Edit the config.sys file on the boot disk and add the line DEVICE=A:\ARCCD.SYS

  4. Edit the autoexec.bat file on the boot disk and add the line MSCDEX /D:ARCCD01 /L:E > NUL

  5. Insert the boot disk into your laptop and reboot--the CD-ROM drive should be accessible as drive E.

  6. If no partition exists on the laptop's hard disk, you must use Fdisk to create a partition, then use the FAT file system to format the partition.

  7. Insert the Win2K installation CD-ROM, then type cd i386 to navigate to the I386 folder.

  8. Start the 16-bit version of the installation procedure by typing winnt

  9. The Win2K installation will start and copy all files to the local hard disk. You might want to convert the partition to the NTFS file system during installation.

After the installation is finished, you can use third-party software such as PowerQuest's PartitionMagic to extend the NTFS partition to use more of the hard disk.
Top

What's Microsoft Print Migrator 3.0?
Microsoft Print Migrator 3.0, which is available at http://www.microsoft.com/windows2000/technologies/fileandprint/print/download.asp, lets you migrate printers between servers. The current version supports

  • migrating printers between different Windows versions (e.g., from Windows NT 4.0 to Windows 2000 or Windows .NET Server--Win.NET Server--2003)

  • Microsoft Cluster service

  • options for moving Line Print Report (LPR) ports to standard TCP/IP Port Monitor ports

Print Migrator 3.0 can back up a machine's print configuration to a .cab file for the Win.NET Server, Windows XP, Win2K Service Pack 2 (SP2), and NT 4.0 SP6a platforms. The software can also back up file-and-print shares, but not the share content. The download includes a full-command version, and you can download a separate Help file from the URL I mentioned above that explains the command version.
Top

How can I remove the hiberfil.sys file from my system?
When you hibernate your computer, Windows saves the contents of the system's memory to the hiberfil.sys file. As a result, the size of the hiberfil.sys file will always equal the amount of physical memory in your system. If you don't use the hibernate feature and want to recapture the space that Windows uses for the hiberfil.sys file, perform the following steps:

  1. Start the Control Panel Power Options applet (go to Start, Settings, Control Panel, and click Power Options).

  2. Select the Hibernate tab, clear the "Enable hibernation" check box, then click OK; although you might think otherwise, selecting Never under the "System hibernates" option on the Power Schemes tab doesn't delete the hiberfil.sys file.

Windows will remove the "System hibernates" option from the Power Schemes tab and delete the hiberfil.sys file.
Top

What are the Windows .NET Server (Win.NET Server) 2003 domain and forest modes?
Windows 2000 domains have two modes: mixed (which lets Windows NT 4.0 BDCs participate in domain replication) and native (which lets only Win2K-based domain controllers--DCs--participate in domain replication). Win.NET Server introduces new functionality to both domains and forests, including new domain renaming abilities. As a result, Microsoft has added a new mode for domain functionality, as listed below.

Domain Mode            DCs Supported
-----------            ----------------------------
Win2K mixed (default)  Win.NET Server, Win2K, NT 4.0
Win2K native           Win.NET Server, Win2K
Win.NET Server         Win.NET Server

The differences between Win2K mixed and Win2K native are the same under Win.NET Server as they are under Win2K. However, the Win.NET Server domain mode adds support for

  • a DC renaming tool

  • an enhanced user logon timestamp

  • Kerberos Key Distribution Center (KDC) key version numbers

  • user password support for InetOrgPerson, which is a standard object class defined in Internet Engineering Task Force (IETF) Requests for Comments (RFC) 2798

Win.NET Server also adds a new mode for forest functionality, as listed below.

Forest Mode            DCs Supported
-----------            ----------------------------
Win2K (default)        Win.NET Server, Win2K, NT 4.0
Win.NET Server         Win.NET Server

To upgrade the forest to Win.NET Server, all domains within the forest must be in Win.NET Server mode or Win2K native mode. The Win.NET Sever forest mode adds support for

  • tuning Global Catalog (GC) replication

  • creating bidirectional transitive forest trusts

  • performing domain renaming (DNS and NetBIOS name)

  • improving replication algorithms (including the ability to replicate individual group membership changes instead of replicating information about the entire group)

  • deactivating an unneeded class or attribute

Top

How can I raise my domain to use the Windows .NET Server (Win.NET Server) 2003 domain mode?
Raising a domain is a one-way process that you can't reverse. Therefore, before you proceed, review the FAQ titled "What are the Windows .NET Server (Win.NET Server) 2003 domain and forest modes?" to ensure that you can raise your domain. To raise your domain, perform the following steps:

  1. Log on as a domain administrator to a domain controller (DC) or a machine running the Win.NET Server administration tools.

  2. Start the Microsoft Management Console (MMC) Active Directory Domains and Trusts snap-in or the MMC Active Directory Users and Computers snap-in (go to Start, Programs, and select Administrative Tools).

  3. Right-click the domain, then select the Raise Domain Functional Level option from the context menu--Windows will display the current domain mode.

  4. Select the new domain mode, then click Raise.

  5. Click OK to close the confirmation dialog box.

Windows will inform you that it's finished the change and will replicate the change to the remaining DCs.
Top

How can I raise my forest to use the Windows .NET Server (Win.NET Server) 2003 forest mode?
Raising a forest is a one-way process that you can't reverse. All domains in the forest must be in Windows 2000 native mode or later--if they aren't, the upgrade will fail and Windows will display a warning. During the upgrade, Windows will raise any Win2K native-mode domains to Win.NET Server domain level. To raise your forest, perform the following steps:

  1. Log on as a domain administrator of the root domain to a domain controller (DC) or a machine running the Win.NET Server administration tools.

  2. Start the Microsoft Management Console (MMC) Active Directory Domains and Trusts snap-in (go to Start, Programs, and select Administrative Tools).

  3. Right-click the root (i.e., Active Directory Domains and Trusts), then select the Raise Forest Functional Level option from the context menu--Windows will display the current forest mode.

  4. Select the new forest mode, then click Raise.

  5. Click OK to close the confirmation dialog box.

Windows will inform you that it's finished the change and will replicate the change to all DCs.
Top

How can I configure the amount of bandwidth that Windows reserves for Quality of Service (QoS)?
QoS provides a guaranteed level of service for media-rich applications and some mission-critical applications. By default, Windows reserves only 20 percent of the connection bandwidth for QoS. To adjust this setting in the registry, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\PSched\Parameters\Adapters\{ <Adapter ID >} registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name NonBestEffortLimit, then press Enter.

  5. Double-click the new value, set it to the new level (e.g., 50 in decimal base), then click OK.

  6. Restart the computer for the change to take effect.

Top

What's the Files and Settings Transfer Wizard?
The Files and Settings Transfer Wizard is a core component of Windows XP. Previously available as a separate component of the "Microsoft Windows 2000 Server Resource Kit" and the "Microsoft Windows 2000 Professional Resource Kit," the wizard is also known as the User State Migration Tool (USMT--you can download the tool at http://www.microsoft.com/windows2000/techinfo/reskit/tools/new/usmt-o.asp ). Before you use XP's built-in version, run Windows Update to install a fix that resolves the following problems identified in the Microsoft article "Files and Settings are Not Transferred When You Use the Files and Settings Transfer Wizard" ( http://support.microsoft.com/?kbid=307869 ):

  • The Files and Settings Transfer Wizard quits before the transfer process has been completed.

  • User settings or system settings are not transferred as expected.

  • Icons created on the desktop do not work as expected.

  • Account information in Microsoft Outlook Express is lost.

  • A new account created in Outlook Express overwrites an old mail account.

  • Outlook Express and Microsoft Outlook 2000 settings are not transferred if Outlook Express and Outlook 2000 share the same address book.

  • The Outlook Express message store becomes corrupted if the store is open while the Files and Settings Transfer Wizard is used on a Microsoft Windows 95, Microsoft Windows 98, or Microsoft Windows Millennium Edition (Me)-based computer.

Microsoft created the wizard to let an administrator move a user's files and settings from one computer to another or to back up the user's files and settings before reinstalling the OS. The wizard can use a direct cable connection, removable media, or a local store that you can back up or move. You can move any combination of the following user files and settings:

  • Files and folders (e.g., My Documents, My Pictures, select file-extension types)

  • Accessibility settings

  • Command-prompt settings

  • Display properties

  • Microsoft Internet Explorer (IE) settings

  • Mouse and keyboard settings

  • Network printer and drive settings

  • Outlook Express settings

  • Regional settings

  • Sounds and multimedia settings

  • Taskbar options

  • Application-specific settings

After you export the user's files and settings to target media separate from the source computer, you can use the wizard to import the user's files and settings onto a new computer. If you install on the new computer the same applications that exist on the old computer, the user's environment will be identical to the environment that exists on the old computer.
Top

How can I use the Files and Settings Transfer Wizard to export my files and settings?
To export your files and settings, perform the following steps:

  1. Start the Files and Settings Transfer Wizard (go to Start, All Programs, Accessories, System Tools, and click "File and Settings Transfer Wizard"; alternatively, you can type migwiz.exe from the command prompt).

  2. From the welcome screen, click Next.

  3. Select "Old computer", then click Next (the wizard will display only those options applicable to your user profile and installed applications).

  4. Select the transfer method to use (e.g., to output your settings to the local file system, select Other), select a location to store your files (if the entered path doesn't exist, click Yes to create it), then click Next.

  5. Select the option that corresponds to what you want the wizard to transfer--settings, files, or both--then click Next. The wizard will display a warning notifying you that if you export program-specific settings, you'll need to install those programs on the new computer.

  6. After the wizard exports the settings, click Finish.

The wizard will create two files on the target media: a status file and the .dat file that contains all the user's settings. You should then import these files and their parent folder to the target machine.
Top

How can I use the Files and Settings Transfer Wizard to import my files and settings?
To import your files and settings, perform the following steps:

  1. Start the Files and Settings Transfer Wizard (go to Start, All Programs, Accessories, System Tools, and click "File and Settings Transfer Wizard"; alternatively, you can type migwiz.exe from the command prompt).

  2. From the welcome screen, click Next.

  3. Select "New computer", then click Next.

  4. When the wizard gives you the option to create a wizard disk that you can use on the old computer to collect the files and settings, select "I don't need the wizard disk," then click Next.

  5. Select the location of your files and settings; click Next (the wizard will import the information and write over the existing configuration information).

  6. After the wizard has finished importing the information, click Finish.

  7. Log off and log on for all changes to take effect.

Top

How can I enable saving attachments in Microsoft Outlook Express 6?
By default and as a security precaution to avoid saving a virus to your computer, Outlook Express doesn't let you save files locally. To enable file saving within Outlook Express, perform the following steps:

  1. Start Outlook Express.

  2. From the Tools menu, select Options.

  3. Select the Security tab.

  4. Clear the "Do not allow attachments to be saved or opened that could potentially be a virus" check box, then click OK.

The change will take effect immediately. To use the registry to enable or disable file saving in Outlook Express, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Identities\{A5FA8995-AE1F-4D4A-8442-C51332A97476}\Software\Microsoft\Outlook Express\5.0\Mail registry subkey.

  3. Double-click Safe Attachments.

  4. Set the registry value to 0 to allow saving of attachments or to 1 to use the application's default behavior.

  5. Click OK.

  6. Close the registry editor.

Top

How can I configure Microsoft Outlook Express to perform only as a news reader and not as an email client?
To disable the email capabilities within Outlook Express, simply add /outnews to the end of the Outlook Express command. For example, from the command prompt, type
msimn /outnews
When you start the application in this mode, you'll notice the Inbox folder is missing and the Mail option under the Accounts menu is no longer available. You can also place the /outnews option outside the quotes to alter shortcuts. For example, you can change the shortcut path
"C:\Program Files\Outlook Express\msimn.exe"
to
"C:\Program Files\Outlook Express\msimn.exe" /outnews
to launch Outlook Express as a news client only.
Top

What is the FTP Folders feature?
Microsoft introduced the FTP Folders feature in Microsoft Internet Explorer (IE) 5.x and made it a core part of Windows 2000 and later. The FTP Folders feature lets you use the familiar Windows Explorer interface to browse FTP sites. The first figure at http://www.windows2000faq.com/articles/index.cfm?articleid=27453 shows the view in Windows Explorer without FTP Folders enabled. The second figure at this URL shows Windows Explorer with FTP Folders enabled. Be aware that some limitations exist when you use FTP Folders, including

  • FTP Folders doesn't work through certain firewall products.

  • You can't copy files from one FTP server to another.

  • You can't drag files from one location to another.

  • You can't right-click an FTP folder and select Copy from the context menu to paste an item locally.

  • You can't connect to a VAX or VMS FTP server.

If you experience problems using FTP Folders, try using the standard ftp.exe client to confirm connectivity.
Top

How do I enable or disable the FTP Folders feature in Microsoft Internet Explorer (IE)?
To enable or disable FTP Folders, perform the following steps:

  1. Click Start, Settings, Control Panel, then double-click Internet Options.

  2. Click the Advanced tab.

  3. Under Browsing, select the "Use Web based FTP" check box or "Enable folder view for FTP sites" check box to enable the FTP Folders feature or clear one of these check boxes to disable this feature.

  4. Click OK.

  5. Restart IE for the change to take effect.

Top

Why do I receive an error when I access some Active Directory (AD)-related Microsoft Management Console (MMC) snap-ins?
The AD tools use Lightweight Directory Access Protocol (LDAP), which by default operates on port 389, to contact the directory service servers. If you enable TCP/IP filtering, block port 389, and keep only port 80 open for Web page communication, you might encounter the following problems when you attempt to access AD MMC snap-ins:

  • When you attempt to start the MMC Active Directory Users and Computers snap-in, you receive an error message that reads "Naming Information cannot be located because: The Server is not operational. Contact your system administrator to verify that your domain is properly configured and is currently online."

  • When you attempt to start the MMC Active Directory Sites and Services snap-in, you receive an error message that reads "Naming Information cannot be located because: The server is not operational. Contact your system administrator to verify that your domain is properly configured and is currently online."

  • When you attempt to start the MMC Active Directory Domains and Trusts snap-in, you receive an error message that reads "The configuration information describing this enterprise is not available. The server is not operational."

  • Log-on processing is very slow.

To resolve these errors, perform the following steps:

  1. Open the Control Panel Network Connections applet, select the network adapter from the list, right-click the network adapter, and select Properties.

  2. From the General tab, select Internet Protocol (TCP/IP), then click Properties.

  3. Click the Advanced button.

  4. Select the Options tab.

  5. Select "TCP/IP filtering", then click Properties.

  6. For "TCP Ports", select "Permit All."

  7. Click OK to close all dialog boxes.

  8. Restart the computer for the changes to take effect.

Top

How can I hide core icons from the Windows XP desktop?
In earlier Windows versions, you could use a variety of registry hacks or Microsoft's Tweak UI utility to hide core icons such as My Computer and Network Places from the desktop. With XP, Microsoft provides an interface in the core product that lets you accomplish the same task. To hide core icons from the desktop, perform the following steps:

  1. Start the Control Panel Display applet (go to Start, Control Panel, Display).

  2. Select the Desktop tab.

  3. Click Customize Desktop.

  4. Select the General tab.

  5. Under the "Desktop icons" section, clear the check boxes next to any icons that you don't want to appear on the desktop.

  6. Click OK.

To delete other icons from the desktop that you can't remove using this method, you can use the Desktop component of Tweak UI, which ships as part of Microsoft PowerToys for XP. However, remember that Microsoft doesn't support any of the PowerToys applications.
Top

What is Virtual Network Computing (VNC)?
With Windows XP, Microsoft introduced a feature called Remote Desktop that lets you take control of a remote XP machine from any Windows desktop running the Remote Desktop Connection software. A freeware alternative known as VNC has cross-platform capability and is available at http://www.uk.research.att.com/vnc . The Web site provides information and clients for the following platforms:

  • Linux

  • Sun Microsystems' Solaris

  • Windows

  • Apple Computer's Macintosh

  • Dec Alpha OSF1

  • Windows CE

The software uses very few resources and consists of a server process that you install to run as a service in Windows. After the process is running, you can use the VNC client from any platform to take control of your machine.
Top

How can I configure Windows XP and later to automatically reopen folders when I restart the OS?
You can configure XP and later to automatically reopen any folders that were open before you shut down the machine. To automatically reopen these folders, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced registry subkey.

  3. Double-click the PersistBrowsers value, or create this value of type DWORD if it doesn't exist.

  4. Set the value data to 1 to automatically reopen folders or set the value data to 0 to not automatically reopen folders, then click OK.

  5. Close the registry editor.

Top

How can I change the location where Microsoft Outlook temporarily stores mail attachments for viewing?
When you view an attachment in Outlook, the software saves the attachment to the local file system. To control the location that Outlook uses to extract these attachments for viewing, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Outlook\Security registry subkey for Microsoft Office XP (navigate to the HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Security registry subkey for Office 2000 or to the HKEY_CURRENT_USER\Software\Microsoft\Office\8.0\Outlook\Security registry subkey for Office 97).

  3. Double-click OutlookSecureTempFolder to view the location Outlook uses to store attachments for viewing.

  4. Change the OutlookSecureTempFolder value data to the location you prefer, then click OK.

  5. Close the registry editor.

  6. Log off and log on for the change to take effect.

Top

How can I clear Windows XP's Search Companion cache of previous searches?
XP's Search Companion feature, which you can access by clicking the Search button in Windows Explorer, lets you locate files, folders, computers, and media. When you start to type the search criteria, Search Companion will list all previous search criteria that match the current search. To clear the search cache, perform the following steps:

  1. Stop all Windows Explorer sessions.

  2. Start a registry editor (e.g., regedit.exe).

  3. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Search Assistant\ACMru registry subkey.

  4. Select and delete each subkey under ACMru, or simply delete the entire ACMru subkey.

  5. Close the registry editor.

  6. Log off and log on before performing new searches; otherwise, XP will recreate the search cache and store the recreated cache in memory.

Top

When I click Scan on my computer, why does the OS launch Microsoft Imaging instead of my preferred scanning package?
Windows might automatically launch Microsoft Imaging if you've upgraded your computer from Windows NT 4.0 or Windows 9x to Windows 2000. Because the upgrade doesn't register your imaging software correctly as a scanning target, the OS defaults to using the built-in Microsoft Imaging software. To resolve this problem, reinstall your preferred imaging software.
Top

Under what conditions is Fast User Switching available in Windows XP?
Fast User Switching is an XP feature that lets more than one user simultaneously log on, although only one user account can be active at any time. For example, say user John is currently logged on and Kevin needs to print a document from his desktop. Without logging off John, Kevin can log on, print his document, then make John's user account active again without logging off to perform the switch. Several factors determine whether Fast User Switching is available:

  • You must not be using a third-party Microsoft Graphical Identification and Authentication (msgina.dll) file.

  • The computer must not be a member of a domain (this factor applies to XP Professional Edition only).

  • You must enable the Fast User Switching feature (go to Start, Settings, Control Panel, User Accounts, and select "Change the way users log on or off"). If the computer has more than 64MB of RAM, XP enables Fast User Switching by default.

  • The computer has sufficient free resources to create an additional Winlogon service thread (when multiple users are logged on, all the accounts--even those not currently in use--use resources).

  • If your computer video card uses shared video memory (i.e., the computer uses a portion of the system's RAM for video display memory), the shared memory will minimize the amount of free RAM and can cause XP to disable Fast User Switching.

Top

Why do I receive event ID 256 in the System log?
The full event ID is
Event Source: PlugPlayManager
Event ID: 256
Description: Timed out sending notification of device interface change to window of <program or service name and/or GUID. >

This event ID is a warning message that you can safely ignore. The warning basically means that an application registered to receive Plug and Play (PnP) device interface notifications but didn't respond to a notification within 30 seconds.
Top

Why can't I manually stop the Fax service in Windows 2000?
Win2K's built-in FAX service doesn't run constantly. Instead, the service starts when an application requires the service. As a result, when you attempt to manually start and stop the service, you receive the following error:
NET STOP FAX
The Microsoft Fax Service service is not started. More help is available by typing NET HELPMSG 3521.
Top

Why does the Magnifier utility start automatically whenever I boot my Windows 2000 or later machine?
If you don't stop the Magnifier utility before you shut down your computer, Windows assumes that you want to use the utility the next time you start your computer and automatically runs it (the OS does this by adding the utility value to the
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
registry subkey). To stop the Magnifier utility, press Ctrl+Alt+Delete to open the Windows Task Manager, select the magnify.exe task from the Task tab, then click End Task.
Top

Why do I receive the error message "Setup can not uninstall Windows XP because the necessary registration information is missing" when I try to uninstall XP?
You might encounter this error message when you attempt to use the c:\windows\system32\osuninst.exe command and either of the following conditions exists on your computer:

  • The Undo folder isn't present on the system.

  • The Win9xundodirpath and Win9xundointegrityinfo registry values are not present in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup registry subkey.

The Undo folder is typically at the root of the C drive and contains hidden and system attributes. To view the folder from the recovery console or command prompt, you need to type
dir /ahs
or set the folder permissions by typing
attrib -sh c:\undo
If the folder is missing, you can't uninstall the OS. If the registry information is missing, try restoring a previous registry backup. Again, if this information is missing, you won't be able to uninstall the OS.
Top

What is Windows XP's Automatic Metric feature?
XP introduced the TCP/IP Automatic Metric feature. The OS uses metrics to assign costs to IP routes that let the IP component select the "cheapest" cost route when sending packets. Traditionally, you could manually assign a cost to a route--XP lets you automatically assign a route cost according to the link's connection speed, as shown below:

Link Speed                                                     Metric
-------------------------------------------------------------  -------
Greater than 200Mbps                                           10
Greater than 20Mbps, and less than or equal to 200Mbps         20
Greater than 4Mbps, and less than or equal to 20Mbps           30
Greater than 500Kbps, and less than or equal to 4Mbps          40
Less than or equal to 500Kbps                                  50

Assigning route costs is useful when you have multiple network connections to one destination. In such a scenario, XP will use the fastest link connection because it will have the lowest cost. To see the end result, from the command prompt type
route print
The following sample shows metric values assigned for multiple IP routes:

Active Routes:
Network Destination         Netmask       Gateway     Interface Metric
            0.0.0.0         0.0.0.0   192.168.1.1 192.168.1.102     30
            0.0.0.0         0.0.0.0   192.168.1.1 192.168.1.101     20
          127.0.0.0       255.0.0.0     127.0.0.1     127.0.0.1      1
        192.168.1.0   255.255.255.0 192.168.1.101 192.168.1.101     20
        192.168.1.0   255.255.255.0 192.168.1.102 192.168.1.102     30
      192.168.1.101 255.255.255.255     127.0.0.1     127.0.0.1     20
      192.168.1.102 255.255.255.255     127.0.0.1     127.0.0.1     30
      192.168.1.255 255.255.255.255 192.168.1.101 192.168.1.101     20
      192.168.1.255 255.255.255.255 192.168.1.102 192.168.1.102     30
          224.0.0.0       240.0.0.0 192.168.1.101 192.168.1.101     20
          224.0.0.0       240.0.0.0 192.168.1.102 192.168.1.102     30
    255.255.255.255 255.255.255.255 192.168.1.101 192.168.1.101      1
  255.255.255.255   255.255.255.255 192.168.1.101             4      1
  255.255.255.255   255.255.255.255 192.168.1.102 192.168.1.102      1
Default Gateway:        192.168.1.1

In this sample, you can see two interfaces: 192.168.1.101 and 192.168.1.102. The first interface has a metric value of 20, and the second interface has a metric value of 30. The first interface, 192.168.1.101, is a 100Mbps LAN link and the second interface, 192.168.1.102, is an 11Mbps wireless network that connects to my 1Mbps broadband link. Where both interfaces are available, XP would use the lowest metric (i.e., 20), which corresponds to the 100Mbps link.
Top

How can I disable Windows XP's Automatic Metric feature?
To disable XP's Automatic Metric feature, perform the following steps:

  1. Open the Network Connections dialog box (go to Start, Settings, Control Panel, and select the Network Connections applet).

  2. Right-click the desired link, then select Properties.

  3. Select "Internet Protocol (TCP/IP)", then click Properties.

  4. Click the Advanced button.

  5. Clear "Automatic metric", then enter a metric value between 1 and 9999.

  6. Click OK to all dialog boxes.

  7. Ensure that the change has taken effect by typing route print at the command prompt.

Top

How can I change the Windows Messenger initial warning?
When you start a new Windows Messenger session, the warning "Never give out your password or credit card number in an instant message conversation" appears in the top of the window by default. To modify this message text, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MessengerService\Policies registry subkey.

  3. From the Edit menu, select New, String Value.

  4. Enter the name IMWarning, then press Enter.

  5. Double-click the new value, enter a new string of text that you want to appear in place of the warning message, then click OK.

  6. Close the registry editor.

The change takes effect immediately.
Top

How can I hide the Set Program Access and Defaults tool from all users of a particular machine?
Windows XP Service Pack 1 (SP1) and Windows 2000 SP3 include a new GUI tool that lets you configure default program access for some OS components, including the Web browser, email client, Instant Messaging (IM) client, and media player. To hide this tool from all users, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Uninstall registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name NoChooseProgramsPage, then press Enter.

  5. Double-click the new value, set it to 1, then click OK.

  6. Close the registry editor.

  7. Restart Windows for the change to take effect.

You can configure the same setting for an individual user by changing the path in Step 2 to navigate to the
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
registry subkey.
Top

How can I check a system's availability?
Microsoft's Uptime tool, which you can download at
http://www.microsoft.com/ntserver/nts/downloads/management/uptime/default.asp
, displays basic system-uptime information. This tool can also list all startup and shutdown events, and you can use the /s switch to show the total percent time that your machine has been available. For example, when I type
D:\temp>uptime /s
on my machine, the Uptime tool displays the following information:
Uptime Report for: \\EAGLE01
Current OS: Microsoft Windows XP, Service Pack 1, Multiprocessor Free. Time Zone: GMT Standard Time
System Events as of 07/11/2002 15:03:30:

Date:         Time:     Event:             Comment:
----------    -------   -----------------  ---------------------------
27/09/2002    10:54:46  Shutdown
27/09/2002    10:56:42  Boot               Prior downtime:0d 0h:1m:56s
27/09/2002    13:21:54  Shutdown           Prior uptime:0d 2h:25m:12s
27/09/2002    13:23:36  Boot               Prior downtime:0d 0h:1m:42s
30/09/2002    08:46:37  Service Pack       Service Pack 1 installed
30/09/2002    08:47:50  Shutdown           Prior uptime:2d 19h:24m:14s
30/09/2002    08:52:57  Boot               Prior downtime:0d 0h:5m:7s
01/10/2002    08:45:22  Shutdown           Prior uptime:0d 23h:52m:25s
01/10/2002    08:50:30  Boot               Prior downtime:0d 0h:5m:8s
02/10/2002    10:46:07  Shutdown           Prior uptime:1d 1h:55m:37s
02/10/2002    10:48:38  Boot               Prior downtime:0d 0h:2m:31s
03/10/2002    08:52:48  Shutdown           Prior uptime:0d 22h:4m:10s
03/10/2002    08:58:31  Boot               Prior downtime:0d 0h:5m:43s
04/10/2002    15:56:58  Shutdown           Prior uptime:1d 6h:58m:27s
04/10/2002    16:02:47  Boot               Prior downtime:0d 0h:5m:49s
07/10/2002    13:23:54  Shutdown           Prior uptime:2d 21h:21m:7s
07/10/2002    13:25:46  Boot               Prior downtime:0d 0h:1m:52s
10/10/2002    14:55:03  Shutdown           Prior uptime:3d 1h:29m:17s
10/10/2002    15:01:13  Boot               Prior downtime:0d 0h:6m:10s
11/10/2002    09:19:20  Shutdown           Prior uptime:0d 18h:18m:7s
11/10/2002    09:21:08  Boot               Prior downtime:0d 0h:1m:48s
28/10/2002    09:24:07  Shutdown           Prior uptime:17d 1h:2m:59s
28/10/2002    09:26:48  Boot               Prior downtime:0d 0h:2m:41s
07/11/2002    08:22:25  Shutdown           Prior uptime:9d 22h:55m:37s
07/11/2002    08:24:18  Boot               Prior downtime:0d 0h:1m:53s

Current System Uptime: 0 day(s), 6 hour(s), 39 minute(s), 12 second(s)

Estimate based on last boot record in the event log.
See UPTIME /help for more detail.

-----------------------------------------------------------------------

Since 27/09/2002:

           System Availability: 99.9287%
                  Total Uptime: 41d 4h:26m:24s
                Total Downtime: 0d 0h:42m:20s
                 Total Reboots: 12
     Mean Time Between Reboots: 3.43 days
             Total Bluescreens: 0

Notice the final summary, which displays useful information such as the number of total reboots and the mean time between reboots. You can use the /d: switch to generate statistics from a certain date or use the /p: switch to generate the statistics for a certain number of days. The /help switch provides a description of all available options.
Top

Why doesn't Windows 2000 Service Pack 3 (SP3) install the Set Program Access and Defaults tool when I apply the service pack to my Win2K server?
The Set Program Access and Defaults tool is available only for Win2K Professional--the tool isn't available for any of the Win2K server versions.
Top

Why can't I use a dial-up connection to access Web pages after I upgrade my system to Windows XP?
You might experience a problem if you use Microsoft Internet Explorer (IE) and a dial-up connection to view Web pages if all of the following conditions are true:

  • You upgraded your system from Windows Me or Windows 98.

  • Before the upgrade, you configured on the computer a LAN connection that used a proxy server.

  • Before the upgrade, one or more of the dial-up connections didn't use a proxy server.

If you meet all conditions, after you upgrade to XP, the OS installation software incorrectly copies the LAN proxy settings to the dial-up connections. To resolve this error, you must manually remove these settings from each dial-up connection by performing the following steps:

  1. Start IE.

  2. From the Tools menu, select Internet Options.

  3. Select the Connections tab.

  4. Select a dial-up networking entry, then click Settings.

  5. Clear the "Use a proxy server" check box.

  6. Repeat Steps 2 through 5 for each dial-up networking entry.

  7. Click OK to close the Internet Options dialog box.

Top

Why can't I use My Computer to format a removable disk larger than 2GB as FAT in Windows XP?
XP's My Computer interface lets you format a disk as FAT, FAT32, or NTFS. The maximum FAT partition size that you can create in XP is 4GB; however, a limitation in the My Computer interface prevents you from creating a FAT partition larger than 2GB. To work around this limitation, open a command prompt and type
format <drive >: /fs:fat /v:<label>

Top

What are the maximum volume sizes and maximum file sizes for the various Windows file systems?
Windows 2000 and later support FAT, FAT32, and NTFS file systems. (The next version of Windows--code-named Longhorn--will support a new file system known as WinFS). The table at
http://www.windows2000faq.com/articles/index.cfm?articleid=27253
lists the maximum volume sizes and maximum file sizes for FAT, FAT32, and NTFS.
Top

What are the system and boot partitions?
Windows uses a system partition and a boot partition during start-up. The system partition contains core files (i.e., Windows NT Loader--NTLDR--boot.ini, ntdetect.com) that the OS requires for the first stage of system start-up. The system partition is always partition 0 (active), which is typically the C drive. The boot partition contains the OS files, which are typically located in the \winnt folder, the \windows folder, and the \system32 subfolder. On a dynamic disk, the system and boot partitions are known as the system and boot volumes.
The system and boot partitions or volumes can be the same partition, but they don't have to be. There can be only one system partition. However, you can have multiple boot partitions in a multiboot environment--one boot partition for each OS you install on the system.
Top

When I add a static IP route, what value do I use for the interface?
The Windows IP subsystem uses IP configuration information (e.g., subnets, gateways) to automatically create a routing table that dictates how the OS will send IP packets to other host systems. To view the routing table on your system, open a command prompt and type
route print
You'll see a routing table similar to the following sample table:

=======================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 10 a4 8b 4b 8e ...... Intel(R) PRO/100+ MiniPCI - Packet
   Scheduler Miniport
0x4 ...44 45 53 54 42 00 ...... Nortel IPSECSHM Adapter - Packet
   Scheduler Miniport
0x20003 ...00 04 5a 0c 96 db ...... Instant Wireless - Network PC CARD
   #2 - Packet Scheduler Miniport
========================================================================
========================================================================
Active Routes:
Network Destination      Netmask        Gateway      Interface    Metric
          0.0.0.0          0.0.0.0    192.168.1.1  192.168.1.100      30
        127.0.0.0        255.0.0.0      127.0.0.1      127.0.0.1       1
      192.168.1.0    255.255.255.0  192.168.1.100  192.168.1.100      30
    192.168.1.100  255.255.255.255      127.0.0.1      127.0.0.1      30
    192.168.1.255  255.255.255.255  192.168.1.100  192.168.1.100      30
        224.0.0.0        240.0.0.0  192.168.1.100  192.168.1.100      30
  255.255.255.255  255.255.255.255  192.168.1.100              2       1
  255.255.255.255  255.255.255.255  192.168.1.100  192.168.1.100       1
  255.255.255.255  255.255.255.255  192.168.1.100              4       1
Default Gateway:       192.168.1.1
=======================================================================
Persistent Routes:
None

Occasionally, the automatically generated routing table will be inaccurate and you might want to use the Route Add command to force a particular route for some IP traffic. You can obtain information about this command by typing
route /?
at the command prompt, but the basic syntax is
route [-p] add <destination> mask <subnet mask> <gateway> metric <lowest number wins> if <interface>
For example,
route -p add 0.0.0.0 mask 0.0.0.0 192.168.1.1 metric 1 if 0x20003
This sample command uses the -p option to add a persistent route (i.e., 0.0.0.0) that will still be in place, even after a reboot, to all destinations. This persistent route will use the 192.168.1.1 gateway with the highest priority (i.e., metric 1) on interface 0x20003 (i.e., wireless network). The last piece of this information is the interface. Determining which value to use for the interface can sometimes be confusing. Basically, you use the Interface List value that appears in the first part of the routing table. In the sample table above, the valid values are 0x1, 0x2, 0x4, and 0x20003. Although this information is easy to obtain, the first part of the routing table often scrolls off screen, leaving users unsure of what value to use.
Top

How can I set the state of the Function Lock key on my new Microsoft keyboard?
The new Microsoft keyboards assign actions such as Save or Open to the function keys. To enable the default functionality of a function key without performing the action that Microsoft has assigned to the key, you must press the Function Lock key before you press the function key. Unfortunately, the new keyboards don't contain a programmatic way to set the state of the Function Lock key. Therefore, you can't configure the keyboard to enable the Function Lock key by default; you must press Function Lock every time you start your machine.
Top

How can I use Windows 2000's Disk Cleanup Wizard?
Win2K introduced the Disk Cleanup Wizard, which checks a specified volume and estimates the amount of disk space you might be able to recover and use. The wizard can identify space savings in several areas, including

  • program files that you've downloaded and installed

  • temporary Internet files

  • temporary files

  • temporary offline files (Win2K only)

  • offline files (Win2K only)

  • Recycle Bin content

  • offline Web pages (Windows XP only)

  • setup log files (XP only)

  • compressed files that you haven't accessed recently

  • catalog files for the content indexer that the OS used during a previous indexing operation

To run the Disk Cleanup Wizard, perform the following steps:

  1. Start Disk Cleanup (go to Start, Programs, Accessories, System Tools, and click Disk Cleanup).

  2. Select the name from the displayed list of the disk volume that you want to check for available free space, then click OK.(The wizard displays the status as it checks the various elements--the wizard spends most of its time checking for files that it can compress.

  3. After the analysis is complete, the wizard presents a summary with options you can select for freeing up space. Select the options you want to use and clear those options you don't want to use.

  4. Under the More Options tab, you can take additional steps to free disk space, such as removing installed programs and Windows components as well as deleting all but the most recent system restore point. After you've made your selections, click OK.

  5. Click Yes to the action confirmation.

Depending on the volume you select, the wizard will display different elements. For example, a nonboot partition or volume will exhibit options related to the Recycle Bin, compressed files that you haven't accessed recently, and the content-indexer intermediary catalog files. After you click Yes on the action confirmation, a dialog box will appear that displays the progress of the disk cleanup. The wizard will exit after it finishes the cleanup.
Top

How can I start Windows 2000's Disk Cleanup Wizard from the command line?
To start the GUI version of the Disk Cleanup Wizard, open a command prompt and type
cleanmgr
You can also create a configuration set to run the wizard without any user interaction at a future time. To create a configuration set, open a command prompt and type
cleanmgr [/d <drive >:] /sageset: <numeric between 0 and 65535>
The /d option specifies the drive you want the wizard to clean up. If you don't specify a drive, the wizard will act on all volumes. If the volume you specify isn't the system partition or volume, the wizard will check for space that it can recover by performing actions only on the Recycle Bin and content-indexer intermediary catalog files. The /sageset argument dictates which parameters appear in the dialog box in which you select the cleanup options that you want to perform. The different numeric values associated with the /sageset argument correspond to different sets of parameters. Make your selections in this dialog box, then click OK.
Windows will save your configuration in the
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches
registry subkey. To run the Disk Cleanup Wizard without user interaction, use the command
cleanmgr /sagerun: <numeric from 0 to 65535 defined by /sageset>
The only visible indicator that the wizard is running will be a dialog box that shows the disk-cleanup progress and gives the user the opportunity to cancel the task. However, the user can ignore this dialog box and the wizard will perform the cleanup without requiring user confirmation. You can define up to 65536 sets of parameters; however, I don't think that many combinations actually exist.
Top

How can I configure the number of customized folders that Windows XP remembers?
XP lets you customize different appearance settings for different folders (e.g., some folders might display details while others display thumbnail images). XP remembers these settings for as many as 400 customized folders and stores this information under the
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags
registry subkey. However, you can increase or decrease the number of customized folders that XP remembers by performing the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name BagMRU Size, then press Enter.

  5. Double-click the new value, set it to the number of folders that you want XP to remember, then click OK.

  6. Repeat Steps 3 through 5 under the HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam registry subkey as well.

  7. Close the registry editor, then reboot the system for the change to take effect.

Top

How can I clear my customized folder settings in Windows XP?
To clear any customized folder settings, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell registry subkey.

  3. Delete the Bags and BagMRU subkeys.

  4. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Windows\ShellNoRoam registry subkey.

  5. Delete the Bags and BagMRU subkeys.

  6. Close the registry editor, then reboot the machine for the changes to take effect.

Top

Why does text appear in the bottom left of my screen after I install Windows Media Player (WMP) 9 beta on Windows 2000?
In the beta-test version of Win2K and later Windows versions, text appeared on screen to indicate that the user was running a beta version. This text typically stated "Microsoft Windows 2000 Professional, For Testpurpose only, Build 2195." To stop the text from appearing, you needed to set the
HKEY_CURRENT_USER\Control Panel\Desktop\PaintDesktopVersion
registry value to 0. However, after you install WMP 9, this text can reappear. To prevent this text from displaying on screen after you install WMP 9, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates\ registry subkey.

  3. Delete the FEE449EE0E3965A5246F000E87FDE2A065FD89D4 subkey.

  4. Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates registry subkey.

  5. Delete the 2BD63D28D7BCD0E251195AEB519243C13142EBC3 subkey.

  6. Close the registry editor.

Top

How can I remove the Windows XP notification area i.e., (system tray) from the task bar?
To hide the notification area, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer registry subkey to hide the notification area for the current user, or navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer registry subkey to hide the notification area for all users.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name NoTrayItemsDisplay, then press Enter.

  5. Double-click the new value, set it to 1, then click OK.

  6. Close the registry editor and log off or restart the machine for the change to take effect.

Top

How can I stop Windows from caching a .dll file after I close the program that was accessing it?
Windows caches .dll files to speed disk I/O. However, even after you close the calling program, the .dll file remains cached. To stop Windows from caching .dll files after you've closed the calling program, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name AlwaysUnloadDLL, then press Enter.

  5. Double-click the new value, set it to 1, then click OK.

  6. Close the registry editor, then reboot the machine for the change to take effect.

Top

How do I use the Windows XP alternative TCP/IP configuration?
Laptop users often experience problems when moving between networks in which DHCP servers aren't consistently used (e.g., moving between an office that uses DHCP to assign IP addresses and a home network that uses static IP addresses). If you configure your computer to use DHCP and no DHCP server is available, the machine will typically use an IP address in the range 169.254.0.1 to 169.254.255.254 with a subnet mask of 255.255.0.0. The actual IP address will depend on what IP addresses other machines on the local subnet have selected (XP will perform a limited test to ensure the Windows TCP/IP component doesn't use an address already in use). Because the local TCP/IP stack assigns no WINS, DHCP, or gateway information, all IP communication is limited to machines in the local subnet.
XP lets you create an alternative IP configuration that you can use when your system can't find a DHCP server. This alternative configuration lets you specify an IP address, subnet, gateway, and the other typical network settings. To create this alternative IP configuration, perform the following steps:

  1. Open the Control Panel Network Connections applet (go to Start, Programs, Accessories, Communications and click Network Connections).

  2. Right-click the network adapter for which you want to specify an alternate IP configuration, then click Properties.

  3. Select Internet Protocol (TCP/IP), then click Properties.

  4. Under the General tab, ensure that you've configured the connection to use DHCP.

  5. Select the Alternate Configuration tab, select "User configured", then fill in the static IP address details you want the connection to use when the system can't find a DHCP server.

  6. Click OK.

  7. Click OK again to close all remaining windows.

XP stores the custom connection configuration settings under the
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces
registry subkey.
Top

How can I stop Windows 2000 from using an encrypted format when I copy encrypted files to a server?
By default, when you copy locally encrypted files to a server, Win2K retains the encryption format. However, you might not want server-based files to be encrypted. For example, a laptop user might want to encrypt files locally for security reasons but want the server-based files to be unencrypted so that other users can view the files.
To stop Win2K from copying files to a server in an encrypted format, perform the following steps on the destination server:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem registry subkey.

  3. Select the NtfsEncryptionService value, then select Edit, Delete from the menu bar.

  4. Close the registry editor.

  5. Reboot the server for the change to take effect.

After you make this change, you'll no longer be able to encrypt files on the server and Win2K will decrypt any encrypted files that users copy to the server.
Top

How can I upgrade an IEEE 1394 (FireWire)-connected disk to a dynamic disk under Windows XP?
By default, XP doesn't let you convert a FireWire-connected disk to a dynamic disk. However, you can make a simple registry change to accomplish such an upgrade. To convert a FireWire-connected disk to a dynamic disk, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\dmadmin\Parameters registry subkey.

  3. Double-click EnableDynamicConversionFor1394, set this value to 1, then click OK.

  4. Close the registry editor.

  5. Reboot the machine for the change to take effect.

Top

How can I view and clear my DNS cache content?
When a Windows XP or Windows 2000 machine queries a DNS server, the response is either positive (a match was found) or negative (no match was found). The OS stores these results in a local DNS cache so that local clients don't repeatedly query the DNS server for the same address. These DNS cache entries are known as DNS Resource Records (RR), and the DNS resolver always checks the local cache before it queries the DNS server.
To view the current DNS resolver cache content and the entries preloaded from the Hosts fie, go to the command prompt and type
C:\> ipconfig /displaydns
Each entry shows the remaining Time to Live (TTL) in seconds. To clear the cache, go to the command prompt and type
C:\> ipconfig /flushdns
Flushing the DNS cache clears all entries and reloads the entries from the Hosts file.
Top

How can I configure the amount of time the DNS cache stores positive and negative responses?
By default, Windows stores positive responses in the DNS cache for 86,400 seconds (i.e., 24 hours) and stores negative responses for 300 seconds (i.e., 5 minutes). To modify these values, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. avigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name MaxCacheEntryTtlLimit to change the positive cache period or the name NegativeCacheTime to change the negative cache period, then press Enter.

  5. Double-click the new value, set it to the desired number of seconds (e.g., if you entered the name NegativeCacheTime, you could set the value to 0 to stop Windows from caching any negative responses), then click OK.

  6. Repeat Step 5 for the other value, if required.

  7. Close the registry editor.

  8. Reboot the computer for the changes to take effect.

Top

What's DNS round robin and subnet prioritization?
The most common type of DNS record is a Resource Record (RR) type A, which is a record that provides the IP address for a specified host name. In certain instances, a host name might resolve to multiple IP addresses, each with its own A record. For example, if three servers host the http://www.savilltech.com Web site, the DNS server might contain the following three address records:

www.savilltech.com.IN    A200.200.10.1
www.savilltech.com.IN    A200.200.11.1
www.savilltech.com.IN    A200.200.12.1

When a client queries a DNS server for this host, the server returns all three address records. To avoid sending every client to the first address record (and, hence, the first host) every time, the DNS server uses a round-robin algorithm, which Internet Engineering Task Force (IETF) Request for Comments (RFC) 1794 describes. With each request, the algorithm rotates the order in which the DNS server returns the address records to more evenly distribute the load across all hosts. For example, the first time a client queries the DNS server, the server might return

200.200.10.1   200.200.11.1   200.200.12.1

to the client. The second time, the DNS server would return

200.200.11.1   200.200.12.1   200.200.10.1

The third time, the DNS server would return

200.200.12.1   200.200.10.1   200.200.11.1

and so on.
If the client making the request connects directly to a subnet that contains one of the returned host addresses, having the client communicate directly with the host that corresponds to that address would reduce response time and network traffic. Subnet prioritization is a feature that recognizes when a host is on the same subnet as the client and returns the local host's address first. (Microsoft introduced subnet prioritization in Windows NT 4.0 Service Pack 4--SP4--and later.) When a client uses subnet prioritization, the client resolver receives address record results and sorts them according to the order of direct subnet connectivity.
So, for example, if a client has address 200.200.11.5 (which is part of subnet 200.200.11) and the DNS server would typically return address record results of

200.200.10.1   200.200.11.1   200.200.12.1

the local DNS resolver will use subnet prioritization to re-sort the results according to the local subnet priority and return results of

200.200.11.1   200.200.10.1   200.200.12.1

to the client. Consequently, the local DNS resolver's subnet prioritization takes priority over the DNS server round robin when a resolved address is on the local subnet. Although this approach reduces network traffic, it doesn't balance the load across hosts.
Top

How can I enable or disable subnet prioritization on a client machine?
In the FAQ titled "What's DNS round robin and subnet prioritization?," I explained how subnet prioritization cuts down on network traffic but defeats the load-balancing effect of the DNS server round robin. If balancing the load across the hosts is more important than traffic management, you might want to disable subnet prioritization. To do so, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe) on each client machine.

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name PrioritizeRecordData, then press Enter.

  5. Double-click the new value, set it to 0, then click OK.

  6. Close the registry editor.

  7. Reboot the machine for the change to take effect.

To reenable subnet prioritization, either delete the PrioritizeRecordData registry value or set this value to 1.
Top

How can I enable or disable subnet prioritization on the DNS server?
The DNS server can check the IP address of a client that's requesting name resolution and sort the results the DNS server returns to the client according to the proximity of the host address to the querying IP address. To enable or disable this functionality, perform the following steps on the DNS server:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters\ registry subkey.

  3. Double-click LocalNetPriority, or create this value of type DWORD if it doesn't exist.

  4. Set the value to 1 to enable subnet prioritization or 0 to disable subnet prioritization, then click OK.

  5. Restart the server for the change to take effect.

Under Windows 2000 and later, you can also use the DNS Management Console to set this functionality. To use this tool to change the setting, go to Start, Programs, Administrative Tools, then click DNS Management Console; right-click the server and select Properties; select the Advanced tab; then clear or select the "Enable Netmask Ordering" check box. You can also control the round-robin functionality by opening the DNS Management Console Advanced tab and clearing or selecting "Enable round robin". The following list describes the expected functionality, depending on the values you set:

  • Subnet prioritization disabled, round robin disabled--The DNS server returns records in the order they were added to the database.

  • Subnet prioritization enabled, round robin disabled--The DNS server returns records in the order of the local subnet priority.

  • Subnet prioritization disabled, round robin enabled--The DNS server returns records in rotation according to the order they were added to the database.

  • Subnet prioritization enabled, round robin enabled--The DNS server returns records in rotation according to the local net priority.

Top

How can I ensure that the DNS resolver uses only results from queried DNS servers?
By default, if a client requests name resolution, the client will accept any response with the correct query ID, regardless of where the response is from. This behavior could lead to security problems if a rogue process that deliberately returns incorrect information exists on a system. To force the DNS resolver to match the source IP address of the response with the DNS servers that the DNS resolver queried, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe) on each client machine.

  2. Navigate to the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters registry subkey.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name QueryIpMatching, then press Enter.

  5. Double-click the new value, set it to 1, then click OK.

  6. Close the registry editor.

  7. Reboot the machine for the change to take effect.

Top

How can I stop Windows XP from displaying the time in the notification area?
To stop XP from displaying the time on the desktop in the notification area, perform the following steps:

  1. Start a registry editor (e.g., regedit.exe).

  2. Navigate to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer registry subkey to hide the time for the current user or to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer registry subkey to hide the time for all users.

  3. From the Edit menu, select New, DWORD Value.

  4. Enter the name HideClock, then press Enter.

  5. Double-click the new value, set it to 1, then click OK.

  6. Close the registry editor.

  7. Log off or restart the machine for the change to take effect.

Top

Valid HTML 4.01!