Perform a clean installation of Windows Vista
A couple of weeks ago I released an article entitled ,"9 Tips To Keep Windows XP Running Smooth".
After that I published a lengthy (by necessity) article covering, "Upgrading To Microsoft Windows Vista Tips". I have since received several e-mail requests for pointers on clean Vista installs so I have compiled those conversations and am disseminating them for wider use. This will be much shorter and easier.
There are no secrets here. Everything I cover is published in the windows help files or scattered across the Microsoft website. Perhaps it is compiled in a somewhat more usable form here. At least it will keep you from having to do the searches, from sifting out the chaff, and from sorting the usable data.
Do you remember the PC and MAC ads? You might want to watch this one again http://www.youtube.com/watch?v=ci2D1ig4df4&mode=related&search=
Don't let it scare you off. Just know there are often major changes in what a computer will have and what Vista requires.
Another warning to run the windows Vista Upgrade Advisor before doing anything else is in order. It is located at http://www.microsoft.com/windows/products/windowsvista/buyorupgrade/upgradeadvisor.mspx
First, Please understand that this information pertains to a clean install....It will not work for an upgrade!
If you need upgrade help please refer to my article on upgrading to Vista at http://remotehelpdesk1.com/articles.htm
Second, APPLIES TO THE FOLLOWING VISTA EDITIONS (YOU WILL FIND VERSION COMPARISONS AT http://www.microsoft.com/windows/products/windowsvista/editions/choose.mspx )
• Windows Vista Home Basic
• Windows Vista Home Premium
• Windows Vista Ultimate
• Windows Vista Business
• Windows Vista Enterprise
• Windows Vista Starter
Warning:
In a clean installation, existing data is removed - that includes documents, pictures, movies, music, downloads, etc. This data includes personal data and settings. Please back up or make copies of any and all data you wish to keep to another hard drive or computer before proceeding any further.
After you install the Vista operating system, you must also reinstall all programs and restore any data you moved in the previous step. AGAIN!!...Make sure that you back up your personal and business data before you perform a clean installation.
To perform a clean installation of Windows Vista, use one of the following methods only after (I can't say it enough) running the upgrade advisor, it is located at http://www.microsoft.com/windows/products/windowsvista/buyorupgrade/upgradeadvisor.mspx
Most people don't read the fine print: There are 23 (count them 23) warnings and exceptions hid behind this little ditty (Some product features are only available in certain editions of Windows Vista and may require advanced or additional hardware) hid at the end of Microsoft's 100 Reasons why you should upgrade to Vista.
RUN THE UPGRADE ADVISOR FIRST !!!!!!!!!!!!!!!
O.K....Cleared that hurdle?
Lets get started:
Method 1:
Run the Setup program after you start the computer by using the current operating system
1. Start the computer by using the current operating system.
2. Insert the Windows Vista DVD in the computer's DVD drive.
3. Use one of the following procedures, as appropriate:
• If Windows automatically detects the DVD, the Install now screen appears. Click Install now.
• If Windows does not automatically detect the DVD, follow these steps:
a. Click Start, click Run, type Drive:\setup.exe, and then click OK.
Note Drive is the drive letter of the computer's DVD drive.
b. Click Install now.
4. When you reach the Which type of installation do you want? screen, click Custom (advanced), and then follow the instructions that are displayed on the screen to install Windows Vista.
Method 2:
Run the Setup program after you start the computer by using the Windows Vista DVD
1. Start the computer by using the Windows Vista DVD. To do this, insert the Windows Vista DVD in the computer's DVD drive, and then restart the computer.
Note To start the computer from the Windows Vista DVD, the computer must be configured to start from the DVD drive.
For more information about how to configure the computer to start from the DVD drive, see the documentation that is included with the computer, or contact the computer manufacturer.
2. When the "Press any key to boot from CD" message is displayed on the screen, press a key.
3. Follow the instructions that are displayed on the screen to install Windows Vista.
Windows Vista - Clean Install Tips
System Restore Process in Windows Xp
The System Restore feature of Microsoft® Windows® XP (the operating system previously known as Microsoft® Whistler) enables administrators to restore their PCs, in the event of a problem, to a previous state without losing personal data files (such as Word documents, drawings, or e-mail). System Restore actively monitors system file changes and some application file changes to record or store previous versions before the changes occurred. With System Restore, users never have to think about taking system snapshots as it automatically creates easily identifiable restore points, which allow users to revert the system back to a previous time. Restore points are created at the time of significant system events (such as application or driver install) and periodically (every day). Additionally, users can create and name their own restore points at any time. System Restore has an automatic restore point space-management feature that purges the oldest restore points to make room for new ones, so that a rolling safety net is always kept under the user, enabling the user to recover from recent undesirable changes.
If users experience system failure or another significant problem, they can use System Restore from SafeMode or Normal Mode to go back to a previous system state, restoring optimal system functionality. System Restore will not revert user data or document files, so restoring will not cause users to lose their work, mail, or even browsing history and favorites
Detail
System Restore is enabled by default and will run upon the successful completion of either the Windows XP Professional or Home version installation. System Restore uses 400mb or 12% of the Hard Drive (whichever is greater) by default. It requires a minimum of 200 MB of space available on the system partition. If there are not 200 MBs available, System Restore will install disabled and will enable itself automatically once the required disk space is created.
Design Overview
System Restore monitors a core set of system and application files, recording and sometimes copying states of these files before changes are made. Monitored files include those that are not in excluded directories (My Documents) and that do not have known data file extensions (such as .doc). System Restore automatically creates restore points; no user intervention is required. To create a restore point, System Restore takes a full snapshot of the registry and some dynamic system files. For a list of file extension types, which are included (monitored and restored), refer to the Monitored File Extensions list in the System Restore section of the Platform SDK.
To restore a system, System Restore reverts file changes done to mo
The New Office Communications Server 2007
Microsoft’s Office Communications Server 2007 is a new communications manager for the PC. It is designed to combine all communications that are coming into and leaving your computer network.
When consumers use OCS 2007, they can take advantage of group instant messaging, audio and video features, web conferencing, Enterprise Voice, the archival and communications system, client applications, a simplified deployment and management system, federation enhancements and an enhanced presence. Basically users of Microsoft’s Office Communications Server 2007 can talk to each other inside the enterprise and use the PC and the telephone as well.
Microsoft’s Office Communications Server 2007 is made up of the following components: VoIP call flow, VoIP configuration, VoIP components, protocols, conference data storage, perimeter network configuration, Enterprise Pool configurations, conference protocols, conferencing components, front end servers, perimeter network topology and call flows among conference components.
In order to use Microsoft Office Communications Server 2007, users must be running Windows 2000, Windows XP or Windows Vista as their operating system. OCS 2007 is compatible with a variety of Microsoft Office applications that includes: Microsoft Office Word 2007, Microsoft Office Word 2003 and Microsoft Office Word 2002.
Microsoft Office Communications Server 2007 has been anxiously awaited by technology fans. It has been billed as the “new era” of IP communications. This application is supposed to make unified communications possible, and it is anticipated to have quite an impact on the VoIP market. OCS 2007 has the support of NEC and Unisys who are partnering with Microsoft to develop new “forward-thinking” UC strategies. That should tell users just what kind of system they will be downloading. Unfortunately the public beta testing of Microsoft Office Communications Server 2007 has ended. Right now Microsoft is working on collecting the evaluations of the trial and compiling the data from those evaluations.
Microsoft likes to boast that “Office Communications Server 2007 combines enterprise-ready instant messaging, presence, conferencing, and Voice over IP telephony in a fully integrated unified communications solution.” This is an enterprise that could streamline communications quite a bit. Instead of relying solely on communicating via the telephone or through email, OCS 2007 will help users connect with the person they most need to connect with via whatever means possible—by instant messaging, phone or through the network. It truly is a marvel and will do wonders for online and VoIP communication.
Windows Server Virtualization Allows More Efficient Use of Server Hardware
Windows Server Virtualization is a means for running virtual 64-bit versions of Windows Virtual Server. By running a virtualized version of a server, WSV 2008 and similar programs make it simple to run multiple versions of an operating system on a single machine. Essentially, an administrator running a virtual server creates multiple sections on the machine and runs a copy of the operating system of their choice within in each piece.
Each section, or partition, is an emulated copy of the entire machine, duplicating the effect of devices attached to the computer. As far as the virtualized server can tell, it is the only operating system running on the machine. This is extraordinarily useful to network administrators who want multiple, dedicated-like servers for their customers, but not at the cost of an entirely new machine. It’s also far more economical for the consumer, as well, since multiple people are sharing the cost of upkeep for a single machine. Virtual machines can also be used for trying changes to a website before going live; WSV 2008 and similar programs allow for testing a new version in a safe environment to ensure it is running correctly before actually putting the site online.
There are a several options when choosing a virtual server program, but Windows Server Virtualization is one that stands out. Unlike many other virtual servers, WSV 2008 allows the virtualization of both 32 and 64-bit systems, allowing it to run and simulate a broader range of software. Windows Server Virtualization also allows the migration of a virtualized server over to a dedicated machine; when surges in traffic occur, network administrators can quickly move the affected site to a machine with more capability.
There are other features as well. WSV 2008 offers support not only for Windows Server, but for a variety of other operating systems and platforms, allowing customization according to a customers needs. Some customers prefer a Linux based server, and with Windows Server Virtualization it is easy to provide it. All that needs to be added is a new partition, and the customer’s preferences can be fulfilled with the hardware you already have. There is no need to purchase new machines, and all of the hardware is more flexible.
Two more features make Windows Server Virtualization a good choice. The new 2008 version offers the ability for running snapshots, allowing network administrators the power to copy the server exactly as it is while it is still running. Downtime is minimized, since backing up the server no longer requires that the server be taken offline, and it is simple to bring it back up if there is a problem. WSV 2008 is also incredibly scalable. It now offers support for multiple processors and cores, among other things, allowing a single powerful machine to host a large number of virtual servers.
Whatever your specific needs Windows Server Virtualization is an excellent choice. It allows increased scalability, supports multiple operating systems, allows running snapshots, and enhances the value of your hardware. WSV 2008 allows virtualization of an entire server, enabling you to run multiple copies on a single machine. You save money and get more value from your hardware. The new 64-bit support only enhances this, offering the possibility of ever more powerful machines, and even more virtualization.
User Accounts in Windows
Local user accounts allow users to log on at and gain access to resources on only the computer where the local user account was created.
When you create a local user account, Windows XP creates the account only in that computer's security database, which is called the local security database. Windows XP does not replicate local user account information to domain controllers. After the local user account exists, the computer uses its local security database to authenticate the local user account, which allows the user to log on to that computer.
Do not create local user accounts on computers running Windows XP that are part of a domain, because the domain does not recognize local user accounts. Therefore, the user is unable to gain access to resources in the domain and the domain administrator is unable to administer the local user account properties or assign access permissions for domain resources.
Built-In user Accounts:
Windows XP automatically creates accounts called built-in accounts. Two commonly used built-in accounts are Administrator and Guest.
1. Administrator
Use the built-in Administrator account to manage the overall computer and domain configuration, such as creating and modifying user accounts and groups, managing security policies, creating printers, and assigning permissions and rights to user accounts to gain access to resources.
If you are the administrator, you should create a user account that you use to perform non-administrative tasks.
Note: You can rename the Administrator account, but you cannot delete it. As a best practice, you should always rename the built-in Administrator account to provide a greater degree of security. Use a name that does not identify it as the Administrator account because they do not know which user account it is.
2. Guest
Use the built-in Guest account to give occasional users the ability to log on and gain access to resources. For example, an employee who needs access to resources for a short time can use the Guest account. This account is disabled by default. Note: The Guest account is disabled by default. Enable the Guest account only in low-security networks and always assign it a password. You can rename the Guest account, but you cannot delete it.
Can you Find a Deleted File Even if Windows Can't?
It happens all the time all around the word on business machines and personal computers, a file you may think you don't need any more or one you accidentally delete without looking too closely and then you empty the recycling bin and ... that's it; the file is gone ... Or is it? Can you find a deleted file or is it totally lost? The answer is yes.
To understand why we must understand how windows and other operating systems find and display files on your computer. Every file and program and bit of data that your operating system can access has what is called a reference or pointer to where that file is stored on your hard disk. This file may not even be stored sequentially on your disk it may be stored in bits and pieces if it is large and the file itself has pointers referencing where the next pieces is and so on. These pointers are absolutely essential for windows to be able to see if a file exists, if there is no pointer to that file then as far as the operating system is concerned it does not exist.
Data on a hard drive when deleted is not lost, the same sequence of 1's and 0's that make up all parts of data and software are still there sitting on the disk it just cannot be found as there is no reference, it is lost not deleted. To truly delete a file the locations where the file is stored must be scrambled so that it does not make any sense to any system, only then is a file unreadable and effectively destroyed.
However when you delete a file it does not scramble and destroy the file it simply removes the pointers that reference it. This means that while windows cannot find your file and never will be able to the file exists and will continue to exist until such a time when that space on the hard disk is used to store other data.
So if you cannot find a deleted file at the moment you will not be able to get it back without some outside help from third party programs that can scan your hard disk and find your files for you. While annoying (or possible job security threatening!) losing a file does not have to be the end of things as it still exists!