Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts tagged with Windows
Showing posts in English
PRASANNA KUMAR RAJA | 15 Apr 2008 | 1 comment

REG_BINARY - This type stores the value as raw binary data.Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.

REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.

REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32).

REG_MULTI_SZ - This type is...

PRASANNA KUMAR RAJA | 14 Apr 2008 | 1 comment

Run keys cause programs to automatically run each time that a user logs on. The Windows XP registry includes the following four Run keys:


Each of these keys has a series of values. The values allow multiple entries to exist without overwriting one another. The data value for a value is a command line.

There are some special considerations for the third and fourth keys in the list, the RunOnce keys:

  1. By default, Run keys are ignored when the computer starts in Safe mode. Under the RunOnce keys, you can prefix a value name with an asterisk (*)...
CondorMan | 29 Feb 2008 | 5 comments

If you plan on installing Vista Service Pack 1 when it is released (highly recommended), you might want to run the cleanup command afterward.

To do this, open the run dialog (Win-R) and type "vsp1cln.exe" (without quotes) and press enter.

This will remove the ability to uninstall the service pack (so make sure to test everything before running the cleanup), and it will cleanup 1GB worth of data off of your hard drive.

scottwed | 22 Feb 2008 | 1 comment

This one was driving me up a wall. There's tons of hits on Google, but nobody had an actual answer.

To reproduce the problem, copy some files from another computer to the network file share on your Vista box. This could come up frequently during a Vista migration.

In my situation, I transfered a directory to d:\vmdisks\vmName1

Next, attempt to modify one of the files with notepad. You can tell the file is protected, as notepad will claim the file is no longer present when you attempt to save it. (This is supposed to happen for any files under \Program files and \Program Files (x86))

Also, if you attempt to remove the read-only attribute from one of the copied files, you will be prompted by UAC to approve, and Vista will report the operation was successfull. Closing the properties window and reopening it will show the...

R-Vijay | 20 Nov 2007 | 0 comments

Hi all,

Check out this Symantec White Paper to get details on the Best Practices for Windows Vista Migration Planning and Management.

Note: You will need to register for this library site. Though it takes some time for registering....This paper is worth it!


Admin | 22 Oct 2007 | 4 comments

Realtime Publishers is proud to present the complete (Altiris-sponsored) eBook entitled The Definitive Guide to Vista Migration as a single PDF download!

This eBook includes the following chapters:

Chapter 1: To Migrate or not to Migrate?
Chapter 2: Planning the Migration
Chapter 3: Creating the Migration Test Bed
Chapter 4: Building the Migration Toolkit
Chapter 5: Security and Infrastructure Considerations
Chapter 6: Preparing Applications
Chapter 7: Kernel Image Management
Chapter 8: Working with Personality Captures
Chapter 9: Putting it all Together
Chapter 10: Running the Pilot Project, Final Deployment and Project Post Mortem


Admin | 04 Oct 2007 | 1 comment

The final chapter of the The Altiris-sponsored e-book, "The Definitive Guide to Vista Migration" is now availalble for download. Get the details here.

Download Chapter 10 here.

Here's What's Covered:

The project is almost complete. Two phases of the QUOTE System are left. The Transfer phase will focus on the manufacturing activities of the project, running through the pilot project, and then migrating all systems to Vista. The Evaluate phase will focus on project closure, running through the hand off to internal support teams, performing the project post-mortem, and preparing for system evolution.

In order to complete these phases, you need to run through a series of activities which include:

  • Oversee administrative activities to...
Admin | 24 Sep 2007 | 0 comments

This podcast supports the Altiris-sponsored The Definitive Guide® to Vista Migration eBook.

Get the latest information about:
- How to wrap up your migration to Microsoft Vista
- Results you should expect at the end of your migration project
- Thoughts about what technologies and practices to consider moving forward

Podcast 5: Completing the Project, by Danielle and Nelson Ruest is available here.

Admin | 12 Sep 2007 | 1 comment

The ninth installment of the Altiris-sponsored book, "The Definitive Guide to Vista Migration" is now available for download. This chapter starts to pull everything covered in the earler chapters together and focuses on operational flows during the rollout.

Download this chapter here.

Chapter Nine: Putting it all Together

Here's an overview of chapter 9 provided by the publisher:

So far, each technically-focused team has been working on their own as they prepare their portion of the technical solution. By now, you should be in the middle of the Organize phase of the QUOTE System with each team progressing towards completion of their engineering activities. It is now time to first, review the status of each solution...

Admin | 27 Aug 2007 | 0 comments

Personality protection is probably the most important aspect of any operating system (OS) deployment project; not, of course, from the technicians point of view, but rather, from the end users point of view. And personalities -- the collection of data, favorites, desktop settings, application customizations and more -- are the most important aspect of any OS migration for them.


You can download Chapter 8 here.

Chapter 8 Excerpt

That's because users perceive their computers personality as part of their workspace and many of them will spend considerable time optimizing it for the work they do. If computer personalities are not preserved in the course of a migration project, users lose productivity as they take time to either...