Videos uploaded by user “Help Desk Premier”
IMAP vs POP - wondering what the difference is and which to use? We'll help explain some key points when deciding between IMAP and POP3 protocols. For more answers to technical questions, visit us at http://www.helpdesk-blog.com or to learn more about Help Desk Premier visit us at http://www.helpdesksoftware.biz IMAP vs POP IMAP stands for Internet Message Access Protocol and POP stands for Post Office Protocol. Both of these protocols are used for email retrieval purposes -- specifically, they process the transfer of email messages from the server to an email client. The POP email Retrieval Process goes like this When you click the "receive" option in your email client, it will connect to your remote email server. It will retrieve all mail and store it locally as new mail, and it will also it will delete those emails from the server. The exception to this is if the email client is configured to "keep mail on server", in which case the client will just disconnect. The IMAP email Retrieval Process goes like this The IMAP protocol operates differently. First, when you click the "receive" option, the email will connect to the remote email server. It then pulls the user-requested content and caches it locally. Then it will process user edit processes, such marking emails as read or deleting emails and so on. Finally it disconnects from the server. IMAP vs POP -- The Differences Between Them The two protocols generally operate on different ports. Essentially, POP is a one-way communication path, whereas IMAP offers two-way synchronization between server and client. POP is sufficient if you're accessing your email using only one device such as your PC. IMAP is the protocol of choice if you need to access your email from multiple locations -- for example, both your office workstation and your notebook or tablet. IMAP vs POP -- What are the Pros and Cons? The Advantages of POP POP will download emails without leaving copies of them on the server. This keeps the space used on the email server low. The other advantage is that mails are stored locally and are always accessible even without an internet connection. A connection will only be needed when sending and receiving email. The Disadvantages of POP Since there is no remote server copy, if data is lost from the location where the email are downloaded, no email recovery option will be available and all your email will be gone. If you intend to use a single email account configured with POP, but want to use multiple email clients on multiple devices, some emails will be missed, since there is no synchronization between server and the devices/clients. The Advantages of IMAP IMAP is often preferred in many use-cases. In the IMAP protocol, emails are stored on the remote server and are therefore accessible from multiple different locations. IMAP can take a little time to download and synchronize emails from some remote servers, but it's a flexible, more reliable, and more complete email retrieval method compared to POP. If a user adds an account to Outlook or another email client. How do they decide between POP vs IMAP? Choose IMAP if you require the following: (1) Access to your emails, both old and new, at multiple locations. (2) Emails kept on the server rather than stored offline in your personal storage -- perhaps due to limited personal storage space on your device (3) Real time email synchronization across all of your devices and the server. Choose POP if you need: (1) To access your email from a single location. (2) Webmail for when you need to check new email remotely. (3) To have your own regular backups of your email messages. (4) Constant access to your email, regardless of internet availability. (5) To minimize use of storage space your server, perhaps due to a quota-based limitation. Let's look at how to change Microsoft Outlook Settings to Keep Emails on the Server While Using POP This can be done when you first configure your email client the first time, or by editing settings later. we just need to edit Account Settings to change email storage on the server. First we need to double click on the email highlighted in the E-mail tab: It is for a POP account. Click on "More Settings". Then navigate to the "Advanced" tab. In the delivery section, tick "Leave a copy of message on the server" and select your desired length of time. If you choose a large time frame, your server Inbox may fill with emails, which could push you towards your storage quota.
Views: 137083 Help Desk Premier
What is ITIL?
We'll provide you an overview of ITIL and show it can help your service desk or help desk be more efficient. http://www.helpdesksoftware.biz What is ITIL? ITIL stands for the Information Technology Infrastructure Library. Staff in IT departments use ITIL to better serve their customers and users. But what is ITIL? By using the guidelines set out in the ITIL framework, IT departments can develop best practices and improve the way different teams interact and manage the IT infrastructure within their business. In doing so, end users get a better level of service and the business saves money. Teams are also able to allocate resources more intelligently and efficiently by using ITIL. ITIL isn't just about the IT service desk or help desk: it encompasses all kinds of different areas, from designing the infrastructure of an IT department, right through to dealing with problems and improving the service. In real terms: what is ITIL in practice? Let's take a very basic look at what ITIL covers by breaking it down. What is an ITIL Process? A Process is essentially a type of work that's typically carried out by an IT department. In ITIL v3 (released in 2011), there are five different Processes: • Service Strategy -- Assessing the current situation, and the customer needs, and forming a strategy to align the IT department with the core business. • Service Design -- Planning and designing the services provided by IT that support the business. • Service Transition -- Assuring the smooth transition of new and revised services from a development phase into an operational phase. This includes, among other elements, Change Management. • Service Operation -- Managing operations to ensure that services are delivered within the agreed service levels. This includes, among other elements, Problem Management, Incident Management, and Access Management. • Continual Service Improvement -- The process identifying opportunities to continually improve services, and implementing those improvements with the goal of constantly providing better service to the business and customers. These five Processes represent different parts of the IT department. For example, Service Design would cover improvements to existing IT services or the implementation of new services. Service Operation covers the day-to-day management of the IT department - typically, this is the job of the service desk or help desk. ITIL produces an ITIL Process Map that describes how different Processes fit together. The person in charge of a Process is called a Process Owner. What is an ITIL Function? Typically, an ITIL Function is a group of people. It could be a team, a sub-team or a department. The Function is responsible for carrying out the work described in the ITIL process. Examples of Functions in ITIL include software testers and programmers. However, in the overall ITIL process, many other teams can be included: for example, facilities management teams are Functions too. Within Functions, staff are assigned specific Roles; within Service Operation, for example, you'll find roles such as 1st Level Support, Facilities Manager and IT Operations Manager. These are all people you'd expect to find working on, or alongside, a help desk or service desk team. What is a KPI? ITIL uses KPIs (key performance indicators) to measure the IT department's performance. KPIs are generally used to monitor progress, flag up bottlenecks and problems in the IT department, and continually improve service. KPIs can be considered an input and an output. KPIs are measured, evaluated and used in Continual Service Improvement. KPIs are also helpful within a help desk in order to track response times, ticket resolution rates and other important statistics. Summing up It's impossible to cover ITIL in a short blog post, but if you want to learn more, remember that ITIL is a framework. It isn't a fixed rule book. The idea of ITIL is that it's a structure different organizations can apply to their own individual circumstances. That makes ITIL very flexible, scalable and versatile, since almost any IT department can implement its principles.
Views: 310077 Help Desk Premier
This video provides an overview of dcpromo and how to install Active Directory. It covers the basic installation techniques that you'll need to know in order to effectively create a domain controller on a Windows Server. Visit us at http://www.helpdesksoftware.biz or to get more answers to your technical questions, visit our blog at http://www.helpdesk-blog.com DCPromo is the Active Directory Domain Services Installation Wizard, and it is an executable file which resides in the System32 folder in Windows. Lets install Active Directory on Microsoft Windows server 2008 R2, using the DcPromo executable. First, locate and run DcPromo. You can search for DcPromo in the Start Menu, or you can directly run DcPromo in the Windows "run" box. Here we use Windows "run" to open DcPromo.exe. Simply press the Windows key and R key together, type "dcpromo", and hit enter. DcPromo will begin to install Active Directory Domain Services and other required components. Then the Wizard will appear. Just click "Next" to proceed. You'll be informed about enhanced security features and operating system compatibility. Just click "Next". In our example, we're installing Active Directory services on the first domain controller in the environment. There is no existing forest in this network. We choose the "Create a new domain in a new forest" option. Next, you're asked to provide a name for this new root domain. This will be the fully qualified domain. Then you need to set the forest functional level. The Wizard will display a description for each functional level, and this will help you to determine the correct level for your requirement. The higher the forest functional level, the more features available - So set it according to your network environment requirements. For example, if you select Windows 2000 Native as the forest functional level, all your domains must be Windows 2000 or above. In this demonstration, we select the Windows Server 2008 R2 functional level, and go ahead. Click Next. It's a good idea to have the DNS on the same server where the domain controller will be installed. The Wizard does this for you while completing this Active Directory Installation. Click Next. If there is no Static IP already set up for the domain controller, you will be prompted to configure one. If necessary, you can ignore this request for now by selecting the option to gain an IP address from the DHCP server. Otherwise, go ahead with the recommended action and set an IP for the computer and click "Next". Delegation for the DNS server will be setup later while setting up DNS -- so don't worry about the following message. Just click Yes, and then click Next. The next Wizard screen will prompt you to select the locations in which to save your Active Directory Database and Log files. In order to increase performance and recoverability, Microsoft recommends storing log files in a volume separate from where the database is stored. You'll now be prompted for a password. This password is for Directory Service Restore - it is not the Domain Administrator password. This password will be required should you need to remove Active Directory from a server using DcPromo. Next you will be shown a summary of the Active Directory installation, and if needed you can export the settings to an answer file which can be used for command line Active Directory installation It will take some time to create a new Active Directory database and install the DNS server. Tick "Reboot on completion" to automatically reboot the PC after the Active Directory installation. When it's complete, you'll receive the Active Directory Installation confirmation message -- now click "Finish". If you didn't tick "Reboot on completion", you'll be prompted to restart to complete the Active Directory Installation. That completes the installation. Active Directory Domain services are installed on the new server and ready for use.
Views: 4589 Help Desk Premier
Merge PST Files
If you have multiple PST files that you wish to combine, we'll show you how to do that, both with Outlook and with a paid solution. http://www.helpdesksoftware.biz http://www.helpdesk-blog.com How To Merge PST Files If you have multiple Email accounts configured to Microsoft Outlook, it will generate multiple PST (Personal Storage Table) Files. Outlook uses PST files to store all the data associated with an email account - messages, contacts, appointments and notes. However, more than one account means multiple PST files, which creates mulitple "Inbox" and "Sent items" folders. This can complicate your email unnecessarily. There are situations where it can be desirable to merge PST files. For example, if you previously had two active email accounts and now use only one, but still refer to emails in both, it makes good sense to merge these PST Files to obtain a single Inbox. Another instance where multiple folders are generated is if you need to set up your old email account on a new computer. If you migrate your old PST via Outlook account settings, you'll be left with redundant PST files that might be better if merged. Thankfully, merging PST Files isn't too complicated. It can be done in Microsoft Outlook, and also via other third party PST merging utilities such as SysTools PST Merge. Merging PST Files Using Microsoft Outlook We'll first look at the case where you're setting up your old email account on your new computer. It's fairly straightforward - you really just need to set up your email on the new computer, and then use the Outlook "Import" option to merge the PST files. This method has been tested on and verified as working for Microsoft Office Outlook 2007, 2010 and for Outlook 2013. The illustrations below were taken from Microsoft Office Outlook 2013, but we'll point out any parts of the process where the method differs for older versions. First - open Outlook, and open the "File" ribbon menu. Click "Open & Export" and then click "Import/Export". In Outlook 2010: click "Open" and then click "Import/Export". In Outlook 2007: click on the "File" menu and then click "Import and Export". Next, the Import and Export Wizard will appear. Select "Import from another program or file", and click Next. In this Wizard screen, select the "Outlook Data File (.pst)" option, and click next. Then browse for the PST File you want to merge with existing PST File. You can choose whether to keep duplicates, replace duplicates or to not import duplicates. Select as you wish, and click Next. (Duplicates can be removed after completing the import process using the "Cleanup Folder" option in Outlook) The option selected in the screen below will import email to the specified account. You may want to choose this if you have multiple accounts configured in Outlook. Select the folder to import from, and click Finish. After completing this process, you'll be left with a single merged PST file. Merging PST Files Using SysTools PST Merge Without using Microsoft Outlook, you can use third party PST Files merging utilities like "SysTools PST Merge" to merge PST Files. The official Site and URL to download the SysTools PST Merge tool is here: http://www.systoolsgroup.com/pst-merge.html It's premium software, but you can download the demo version for free. The demo only allows merging of the initial three folders of each PST File. In the demonstration below, I use the full version with no such restrictions. First, download and install the software, and open the SysTools PST Merge tool. The menu is fairly user friendly, and the tool offers good functionality. Unlike the Outlook PST File merging process, you can merge unlimited PST Files in a single run-through of SysTools. You can add all the PST Files that you need to merge together by clicking on "Add Files" button in the area marked as (1), or you can add a folder full of PST files by clicking "Add Folder". Next, select the merging option that suits you in the area marked as (2). Here we select "Merge" which creates one "Inbox" folder and one "Sent Items" folder in one PST File. If you use the "Join" option, it will create multiple "Inbox" folders and multiple "Sent Items" folders. The third option merges only your contacts. Additionally, you can choose to have the PST file created without duplicates or deleted items by checking the appropriate tick-box. In the area marked as (3), choose the path for saving the PST file. Finally, click "Merge PST Files" to begin. It will take some time to merge your selected PST Files, depending on their size. When you see the following screen, it's done - your PST Files have been successfully merged to a single file.
Views: 54235 Help Desk Premier
SQL Server Error 18456
Explains the common sql server error 18456 and possible solutions. http://www.helpdesk-blog.com http://www.helpdesksoftware.biz The "Login Failed" error 18456 can occur due to a variety of reasons. The 18456 error is displayed when the server name you entered was correct, but the connection cannot be granted due to one of a number of reasons. The 18456 error message does not provide much information on the cause login failure. This is because it is intended to hide details from unauthorized users, in case someone tries to enter the SQL server by guessing information. What are the Main Causes of SQL Server Error 18456? (1) Error 18456 commonly occurs when mixed mode authentication is enabled. You may be trying to log in using Windows authentication with a user that the SQL server does not recognize as a SQL user login. (2) Error 18456 will occur If you are using SQL server authentication and the login or password is incorrect. (3) This error can also occur in the event of disabling or locking the username in the server, and also in the case of password expiration. How can a SQL Server Error 18456 be Resolved? Before proceeding with troubleshooting, take the time to verify that your credentials are correct. If you are using Windows 7 or Windows Vista, you should try opening the SQL Server using the "Run as Admin" option and see whether that resolves the problem. If you are trying to log in using Windows Authentication and you receive Error 18456, you should login using SQL SA credentials and go to Security and verify that your Active Directory Windows account is associated with your SQL login If you try to log in using SQL server authentication, you should log in using SQL SA credentials, go to Security and check to ensure that the user name passwords are not expired or locked. Go to Logins, select the user you want to check, and go to properties. You can check whether password expiration is enabled by navigating to the "General" tab. Next, go to the Status tab and check whether your account is locked or not. Here in this illustration, the "Login is locked out" option is not activated and it is grayed out which means the account is not locked. The other possible reason for Error 18456 is that Windows Authentication or Mix Mode Authentication is not enabled on the database itself. You can check this by navigating to the properties of the database. Select the database instance and go to Properties. Click on the Security tab and go to the server authentication area to check this. If you change Server authentication to "SQL Server and Windows Authentication" mode or vice versa, you must restart the SQL Server service. You can use the Microsoft Service console to restart the SQL Server if needed - just right-click and choose the Restart option. Usually, if Error 18456 occurs, it will have an error state number that can help determine the cause. Obtaining information on the error state can make troubleshooting significantly easier. Windows Event Viewer holds details of the error. In the Event Viewer, this error is associated with the event ID 18456. The Error state descriptions are as follows: 2 and 5 indicate that an Invalid USERID was used to log in. 6 indicates that user has attempted to use a Windows login name with SQL Authentication. 7 indicates that login is disabled and password could be mismatched. 8 indicates that password mismatch has occurred. 9 indicates an invalid password. 11 and 12 indicate that a valid login was used but server access failure has occurred. 13 indicates that the SQL Server service is paused. 18 indicates that a change of password is required.
Views: 72812 Help Desk Premier
What is LDAP?
LDAP stands for Lightweight Directory Access Protocol. It is an application protocol used over an IP network to manage and access the distributed directory information service. This video gives you a high level overview of LDAP and some examples of software that utilize LDAP, such as Active Directory. For more help with technical or help desk related topics, visit us at: http://www.helpdesk-blog.com to learn more about Help Desk Premier, please visit us at: http://www.helpdesksoftware.biz What is LDAP? LDAP stands for Lightweight Directory Access Protocol. It is an application protocol used over an IP network to manage and access the distributed directory information service. The primary purpose of a directory service is to provide a systematic set of records, usually organized in a hierarchical structure. It's similar to a telephone directory that contains a list of subscribers with their contact number and address. Overview of LDAP and Role of a Specialized Server In order to commence an LDAP session, a client needs to connect to the server known as the Directory System Agent, which is set by default to use TCP port 389. After the connection is established, the client and server exchange packets of data. Basic encoding rules are used to transfer information between the server and client. Structure of LDAP Although the structure of LDAP seems relatively complex, it is fairly simple to understand. The basic structure is as follows: • A set of attributes is contained in any entry. • Each attribute accommodates one or more values, and has a name. • Each entry in the directory is assigned a unique identifier that consists of a Relative Distinguished Name. The server is capable of holding a sub-tree and it's children, beginning from a particular entry. In addition, they may also hold brief references to other remote servers. A client has the option of contacting other servers too. Operations on LDAP There are a plethora of operations that can be performed on the Lightweight Directory Access Protocol. Here are some of the most prominent ones: • Add -- This is used to insert a new entry into the directory-to-server database. If the name entered by a user already exists, the server fails to add a duplicate entry and instead shows an "entryAlreadyExists" message. • Bind -- On connection with the LDAP server, the default authentication state of the session is anonymous. There are basically two types of LDAP authentication methods - the simple authentication method and the SASL authentication method. • Delete -- As the name suggests, this operation is used to delete an entry from the directory. In order to do this, the LDAP client has to transmit a perfectly composed delete request to the server. • Compare and search -- Various parameters such as baseObject, filter, scope, attributes, typesOnly, derefAliasis, timeLimit and sizeLimit are used to perform both search and read operations, in addition to performing comparison functions. • Modify -- This operation is used by LDAP clients to make a request for making changes to the already existing database. The change to be made must be one of the following operations 1. Add (including a new value). 2. Delete (deleting an already existing value). 3. Replace (Overwriting an existing value with a new one). • Unbind -- This is the inverse of the bind operation. Unbind aborts any existing operations and terminates the connection, leaving no response in the end. Real-time applications of LDAP Email clients such as Microsoft Outlook employ some form of the LDAP database, although LDAP isn't used in its original form. Infospace and ICANN are the most popular search-related services built on the LDAP platform.
Views: 458127 Help Desk Premier
Help Desk Software - Help Desk Premier Overview
Help Desk Premier is affordable yet powerful help desk software for all types and sizes of organizations. This video gives you an overview of the features and benefits of this web based solution to make your help desk or service desk run more efficiently. Learn more at http://www.helpdesksoftware.biz
Views: 2231 Help Desk Premier
Tales from the Help Desk: Disk Tray ep.1
Help Desk Premier presents Tales from the Help Desk This is the 1st episode of a series of Help Desk inspired comedy sketches. Featuring: Emily Hart http://www.youtube.com/user/emilyhart (10 reasons why...) Paula Gilbert (2girls1movie) Simon Thompson Subscribe to get updates of the new episodes: http://www.youtube.com/user/HelpDeskPremier More about us: http://www.help-desk-software.com/ Subscribe to get the latest update. http://www.youtube.com/user/HelpDeskPremier Produced by: http://thinktallfilms.com
Views: 1887 Help Desk Premier
PDF to Word
We'll explain a few options for converting your PDF documents to Word format, including some free and some paid solutions. http://www.helpdesksoftware.biz http://www.helpdesk-blog.com Free PDF to Word Conversion for Windows and Mac It's easy to convert a PDF file to Word format using Adobe Acrobat Pro, but not everyone will pay such a high price tag for occasional conversion tasks. Thankfully, there are some free conversion tools available, although there are some issues to consider with each. While the team at BrightBox Solutions and Help Desk Premier are not affiliated with or specifically endorsing the tools mentioned below, we do find them to be effective choices for the task at hand. Keep in mind that not all PDF's are created equal, and any conversion tool may have difficulty converting a PDF that was created by a scanner or contains intricate form data. Likewise, security restrictions on your form must be considered when attempting to convert a PDF. With that said, here are some options we found to be effective in our tests: 1. PDF Online -- PDF to Word Converter http://www.pdfonline.com/pdf-to-word-converter/ This tool is very easy to use and allows you to select a PDF from your local system, click the "Convert" button, and in a short period of time you are given a link to download your Word document. Our tests found it to be very accurate and relatively quick. One key advantage to this tool is no email address is required for the Word document to be emailed to you, as is the case with other tools. However, we do recommend that you read their clearly posted Terms & Privacy statement. In addition to this free tool, PDF Online offers a variety of PDF-related paid applications, such as batch conversion of PDF's to Word, server applications for batch creation of PDF's from Word documents or other formats, and a host of other products. 2. PDFtoWord.com (Online) The website PDFtoWord.com is a completely free web-based PDF to Word converter. It is provided free as a promotional tool for the paid PDF converter from Nitro software. To use PDFtoWord.com, simply upload your PDF file and type in your email address. Behind the scenes, the website automatically converts your PDF document to Microsoft Word format and sends it to you via email within half an hour. Conversion is limited to PDF files that are 10MB or smaller, and you can only upload one file at a time. There are a couple of privacy issues to take into account with this method. Firstly, some people are understandably nervous about giving away their email address. However, it seems that PDFtoWord.com takes privacy seriously. There is an email mailing list option on the form, but this is unchecked by default, and the company also displays its privacy policy. If you're concerned about giving the company your email address, you could try using a throwaway email address from GuerillaMail.com or a similar service. The second privacy issue concerns the processing of the PDF document. Once uploaded, your PDF will be stored on Nitro's servers for "a short time". If your PDF file contains confidential material, you might want to give this method a miss. 3. Adobe ExportPDF (Windows/ Mac) There's hardly any truly free desktop PDF to Word conversion applications for Mac, which is surprising given that PDF printing is built-in to Mac OS X. Most of the applications you'll find are only free for a limited time. Some imprint a watermark on the document or only partially convert the PDF. Although not quite free, one of the most reliable and affordable options for converting PDF's comes directly from the source -- Adobe. The Adobe Online suite includes a module called Adobe ExportPDF. For $20 per year, you can convert unlimited documents from PDF to Word format. ExportPDF also offers unlimited conversions from PDF to Microsoft Excel, and RTF formats. Unlike most free tools, it can also recognize scanned text and make it editable with its OCR capabilities, making it a worthy investment for those needing a more comprehensive PDF to Word conversion tool. Adobe ExportPDF tool can be found here: https://www.acrobat.com/exportpdf/en/home.html If you've found a great free PDF to Word converter for the Mac, we'd love to hear about it. Let us know your feedback in the comments below.
Views: 168678 Help Desk Premier
Running Windows on Mac
Looking for a way to run Windows on a Mac? This video covers some of the major options available to you. For answers to more technical questions, visit us at http://www.helpdesk-blog.com, or to learn more about Help Desk Premier visit us at http://www.help-desk-software.com The Mac is an excellent machine, especially for those doing work that is heavy in multimedia processing. However, some tasks are more easily completed in a Windows environment. There are also programs that only run in a Windows environment and if you don't have the ability to run Windows on a Mac, you're going to have more trouble accomplishing those tasks. We'e going to take a look at a few programs that will help you get into a Windows environment while using a Mac machine. Apple's Boot Camp Mac lets you run Windows on Mac in a native Windows environment. This native environment is built by booting directly into it. Boot Camp actually runs a scaled-down version of Microsoft's Windows operating system. Boot Camp for Mac comes free with Mac OSX 10.5/Leopard/Lion/Mountain Lion and later. You actually install Windows on your Mac computer when you use Boot Camp, creating a 'hidden` Windows partition that only Windows can access. The main drawback of using Boot Camp for Mac to run Windows is that Apple provides only very limited technical support for it and the Windows installation process. Another drawback is that you have to reboot to switch between operating systems. Let's take a look at Parallels for mac Well, if you have Parallels Mac, also known as Parallels Desktop 8 for Mac, you simply open the program, and get to work, without worrying about having to reboot your Mac and losing the work you've spent all morning accomplishing. Parallels bills their Parallels Mac product as the most tested, talked-about, and trusted product that allows you run Windows on a Mac. Parallels for Mac also lets you run Windows and Mac applications concurrently. This is especially helpful if you're working on a project that requires you to move data, or multimedia projects between platforms. In the real world, Windows and Mac don't get along very well, but with Parallels for Mac, they actually collaborate quite well together. There's also a Mobile Parallels app that lets you create a Windows environment on your mobile Apple device. Say you're on the go with your iPad, and your boss tells you he needs some annotations to a Word document immediately. You don't have time to get back to your office. No problem, just launch Parallels Mobile on your iPad, and then Word, and make your annotations of the fly. Now we'll move to VMWare Fusion According to the makers of VMWare Fusion, it's the best product on the market for running Windows on Mac. Although most of the advertising for the VMWare Fusion products seems to be aimed at the home market, the product is also quite helpful for business users. As an example, their webpage touts the VMWare Fusion PC migration assistant. This is a tool that helps home users move their data and programs from their PC to their Mac. However, those in IT also know how helpful a migration tool is. Most IT pros use migration tools when they upgrade systems from one Windows version to the next. VMWare Fusion lets you run Windows programs and your Mac applications side-by-side, letting you drag and drop and copy-paste between applications seamlessly. You'll also be able to launch your Windows application exactly as you would Mac applications. Launch them from the Launchpad, Spotlight, or the Dock, just like a Mac application. You can also view them from Spaces, Mission Control, and Exposé, again, just like a Mac application. For those that have gotten used to Mac-only shortcuts and gestures, VMWare Fusion doesn't make you have to forget them when you run Windows on Mac. With VMWare Fusion, you can run Windows on your Mac in full screen Unity View, or in a single window view. For those users that have devices that only work on Windows machines (GPS devices, some cameras, joysticks, media players, etc), VMWare lets you "trick" them into thinking they're being plugged in to a Windows machine. As stated above, Apple's Boot Camp makes you decide what operating system you want to boot into at the time of boot, but gives the added security of a separate partition for your Windows applications and their data. VMWare Fusion lets you work with that hidden Windows partition, without having to reboot every time you want or need to switch operating systems.
Views: 3299 Help Desk Premier
403 Forbidden
A 403 Forbidden error is a particular type of error that occurs when trying to access a URL. There are a couple of possible causes to an HTTP 403 error, and we'll take a look at those along with the possible resolutions. Get more answers to technical questions at http://www.helpdesk-blog.com If you'd like to learn more about Help Desk Premier, please visit us at http://www.help-desk-software.com 403 Forbidden Errors -- Finding and Fixing the Source A 403 Forbidden error is a particular type of error that occurs when trying to access a URL. If you're seeing a 403 Forbidden error, there are two possible causes. It could be due to a removal of file permission, or restriction of access based on the IP address of the user. The second possible cause is accidental misconfiguration of the webserver. As mentioned, a lack of proper permission access to the file or resource can cause 403 forbidden error. This will result in a 403 error, sometimes combined with a 404 file not found error stating the following message: "Forbidden You don't have permission to access /asd.html on this server. Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request." However, the title of the web page will display a 403 Forbidden error. To fix a http 403 error, you should set proper permissions for a folder or a file. Normal file permission is 644 and folder permission is 755. File/folder permissions can be set using variety of ways. In Windows Web Hosting, it's simply set using IIS. Open Internet Information Service Manager: Select the relevant website or folder, and set the necessary permissions via "Edit Permissions". However, if you are using shared hosting, you may not be able to access the IIS Manager or the Apache configuration file to set file/folder permissions. In this case, permissions can be easily set using FileZilla FTP client, or through the cPanel interface f or the particular web resource. You can download the FileZilla FTP client from the URL below: http://filezilla-project.org/download.php?type=client Install it and run. Then access the web resource using your FTP details in the area marked as (1). Right click and select the file or folder for which you intend to change permission, and select the "File Permissions ..." option in the area marked as (2). Next let's look at how to fix the permission of a folder which generates a 403 error. The rectified permission value will be 755. If you are having an issue with file permission, you should set the file's permission value to 644 instead of 755. If the cause of the 403 error is restricted access based on IP address, you will see a message somewhat similar this: "Forbidden You don't have permission to access / on this server. Additionally, a 403 Forbidden error was encountered while typing an ErrorDocument to handle the request. " If you have cPanel access, check whether you have properly configured the IP Deny Manager. It may be that you have added your own IP range accidentally. If so, click on IP Deny Manager and remove any unnecessary IP deny lists. If it is an Apache server, you can do this by editing ".htaccess" file. To edit the .htaccess file you must have direct access to files in the hosting space, or you may use FTP or SSH. You can download and edit ".htaccess" file using a text editor such as Notepad. In the ".htaccess" file you may see something similar to these lines. Edit or remove deny lists as you wish: Sometimes the ".htaccess" file is not visible in the hosting space, and as such can't be found for viewing or download. If so, you need to enable viewing of hidden files by clicking the "Server" tab and ticking the "force showing hidden files" box in your FileZilla FTP client. To Remove IP restrictions Using IIS 7.5 in Microsoft Windows Server 2008 R2 Select the website or directory in the Internet Information Services Manager and click on "IP Address and Domain Restrictions": Remove unnecessary IP addresses or ranges 403 Forbidden errors can occur if there's no default index page present when directory browsing is denied. For example if you are using IIS 7.5 in Microsoft Windows Server 2008 R2, you will receive something similar to the 403 Forbidden error below, if directory browsing is denied. This error will be 403.14 - directory listing denied. Fix the 403.14 error by either creating an index.html /index.php file, or enabling the directory browsing. To Enable directory browsing Open IIS Manager and select the appropriate web folder/web site , and click on "Directory Browsing": Then click on enable ... Other than above causes, there's one other possible source of a 403 Forbidden error if you are using Apache. It's possible that the error stems from your mod_security rules if directory listings have been disabled in the server using the mod_proxy extension. It may be worth checking those settings if you are using an Apache server.
Views: 457864 Help Desk Premier
500 Internal Server Error
Help-Desk-Software and BrightBox Solutions - http://www.helpdesksoftware.biz The 500 Internal Server Error is a common web error, also seen as http error 500 and http 500 error. This video will discuss possible causes and solutions from the server management position, especially when running Windows and IIS. Visit our blog at http://www.helpdesk-blog.com for more technical solutions.
Views: 86415 Help Desk Premier
Help Desk Premier Installation
This video covers installing Help Desk Premier, including installing SQL Server Express to use with your evaluation, and importing a new license. http://www.helpdesksoftware.biz
Views: 1244 Help Desk Premier