[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Windows XP

118K

Solutions

78K

Contributors

Microsoft Windows XP is the sixth release of the NT series of operating systems, and was the first to be marketed in a variety of editions: XP Home and XP Professional, designed for business and power users. The advanced features in XP Professional are generally disabled in Home Edition, but are there and can be activated. There were two 64-bit editions, an embedded edition and a tablet edition.

Share tech news, updates, or what's on your mind.

Sign up to Post

While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.
1
IT Pros Agree: AI and Machine Learning Key
LVL 1
IT Pros Agree: AI and Machine Learning Key

We’d all like to think our company’s data is well protected, but when you ask IT professionals they admit the data probably is not as safe as it could be.

Outlook Express to Outlook 2016
How to convert Outlook Express DBX to Outlook 2016, 2013, 2010, 2007. The article explains a quick manual trick to easily migrate from Outlook Express to Microsoft Outlook with attachments. It also suggests a professional solution to convert DBX to PST in quick time without loss of email formatting.
0
PaperPort XP Compatibility Mode
Nuance's PaperPort may display this error message: PaperPort appears to be running Windows XP Compatibility Mode which may result in errors. We recommend disabling Compatibility Mode for the PaprPort.exe program, see Technote 6629. This article provides a possible solution to the problem.
4
LVL 62

Author Comment

by:Joe Winograd, Fellow&MVE
Comment Utility
Hi Christophe,
You're very welcome...and thanks to you for joining Experts Exchange today, reading my article, and letting me know that it worked for you...I'm glad to hear that! If you take a moment to endorse the article by clicking the thumbs-up icon at the bottom of the article (not the one under this comment), I'll be grateful. Welcome aboard to EE! Regards, Joe
0
LVL 62

Author Comment

by:Joe Winograd, Fellow&MVE
Comment Utility
Thanks for endorsing the article, Christophe — much appreciated! Regards, Joe
0
Speaker unmuted and muted
In a question here at Experts Exchange, a member was looking for "a little app that would allow sound to be turned OFF and ON by simply clicking on an icon in the system tray". This article shows how to achieve that, as well as providing the same OFF/ON audio muting toggle via a single keystroke.
3
LVL 108

Expert Comment

by:John
Comment Utility
Thanks for posting this, Joe.  My own ThinkPad has a mute button and I use it so much my finger is trained to it.
0
LVL 62

Author Comment

by:Joe Winograd, Fellow&MVE
Comment Utility
You're welcome, John, and thanks to you for the feedback and the article endorsement — both very much appreciated! Regards, Joe
0
Patch Pic
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP, Windows Server 2003 and 2008 - Both 32 and 64 Bit installs.
1
Windows 10
When you start your Windows 10 PC and got an "Operating system not found" error or just saw "Auto repair for startup" or a blinking cursor with black screen. A loop for Auto repair will start but fix nothing. You will be panic as there are no backup of your document. How can you fix the problem?
1
LVL 1

Expert Comment

by:harry for
Comment Utility
well addressed !
0
LVL 1

Expert Comment

by:Littleman
Comment Utility
In addition, the first thing that you should do is chkdsk c: /r
and let that scan. Usually the damage is from windows shutting down incorrectly and corrupting the hard drive or files on the drive. The rest if that may not be necessary. If that fails, then proceed to the mbr repair.
0
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
1
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you should read this article.
3
Operating system developers such as Microsoft and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a firewall. Is this built in protection enough to keep threats at bay?
 
Many people do not realize modern day virus threats come in many forms. The viruses themselves haven't changed much, but the methods by which they infect computers are constantly evolving. Virus developers spend most of their time discovering new ways to infect computers with viruses rather than developing new types of viruses.
 

So what is a computer virus?

computerVirus-TrueIT.jpgA virus is essentially a self replicating file stored on a computer system that was not authorized by the user to be there. The behavior of the file may have varying characteristics. It may be used to collect, destroy or manipulate user data without their consent.
 
Fairly often the news discusses some new hacking attempt on a major computer system. Hackers can often break into these systems by planting viruses on machines that are connected to them. These viruses can collect data or give them access to files necessary to get deeper into the systems.
 

Are these threats real?


Companies such as Kaspersky, Norton and McAfee regularly publish virus infections as they are discovered. Norton actually has a threat security…
3
LVL 1

Author Comment

by:Tom Price
Comment Utility
Hello there Jim,

I've tried uploading the article before with links and 1 of the editors did not approved it...should i put back the links?

I will add some headers and ad an image.

Please let me know when the article was approved and "went live" ok?

Many thanks!
Tom.
0

Expert Comment

by:Jame Griffin
Comment Utility
Some computer viruses are programmed to harm your computer by damaging programs, deleting files, or reformatting the hard drive. Others simply replicate themselves or flood a network with traffic, making it impossible to perform any internet activity. Even less harmful computer viruses can significantly disrupt your system’s performance, sapping computer memory and causing frequent computer crashes.
0
pdf recovery
Are you looking for the perfect solution to fix the error message "The File is Damaged and Could Not Be Repaired"? Then, go through this post and know the step by step process to resolve the error message.
4
The 7 Worst Nightmares of a Sysadmin
LVL 1
The 7 Worst Nightmares of a Sysadmin

Fear not! To defend your business’ IT systems we’re going to shine a light on the seven most sinister terrors that haunt sysadmins. That way you can be sure there’s nothing in your stack waiting to go bump in the night.

AutoHotkey logo
AutoHotkey is an excellent, free, open source programming/scripting language for Windows. It started out as a keyboard/mouse macros product, but has expanded into a robust language. This article provides an introduction to it, with links to additional resources for EE members who want to learn more.
22

Expert Comment

by:camtz
Comment Utility
Excellent. Thanks Joe.
Carlos
0
LVL 62

Author Comment

by:Joe Winograd, Fellow&MVE
Comment Utility
You're welcome, Carlos, and thanks to you for the compliment. If you take a moment to click the thumbs-up icon at the bottom of the article, I''ll appreciate it — as you can see, you'll be endorsement #20. :) Regards, Joe
0
After the April 8, 2014 some Microsoft products are no longer supported; Windows XP, Server 2003, Exchange 2003, Office 2003 … It is estimated that 30% of desktop operating systems are Windows XP.


Why you should be concerned.

Here’s a possible scenario. Let’s say that Windows 7 shares some code with Windows XP and an exploit is discovered that effects both. The security patch will be released for Windows 7 but not the discontinued Windows XP. Attackers can reverse engineer the patch to discover the effected code and then test the exploit against Windows XP.


This is not as unlikely as it might sound. Have a read of : Microsoft Security Blog
Between July 2012 and July 2013 Windows XP was an affected product in 45 Microsoft security bulletins, of which 30 also affected Windows 7 and Windows 8

It’s not advisable to have these end of life products on your network after April 8. If attackers get into a vulnerable machine it makes it easier to exploit other machines on your network.

The worst possible scenario is having Windows XP machines running Office 2003 and using Server 2003 or Exchange 2003. That’s just asking for trouble.

Hopefully most folks are either upgrading or shutting down these machines after April 8. If you have to run any of these, I suggest that you isolate that machine.
3
April 8, 2014 Windows XP will lose support and be open to attacks. Now is the time to consider upgrading Windows XP to Windows 7 (Win 7). Windows 8 is not an upgrade path that most folks would want to consider.


Copy Files

The upgrade is relatively easy with Windows Easy Transfer. You will need an external drive but this is an essential peripheral these days. You need to find out if your PC is 32 or 64 bit (Start, right-click My Computer, and then click Properties) and download the appropriate version of Easy Transfer for Windows XP. Easy Transfer is included in Windows 7 so you won’t need to download anything else. This will transfer all your files on the XP PC to an external drive and then Windows 7. If you are replacing the XP PC with a different PC don’t bother with the tool since it only works on one PC.


Purchase DVD or Download

There are a number of ways to upgrade to Windows 7. While numerous OEM DVDs can be found on the Internet it is recommended that you purchase the retail version to fully comply with Microsoft licensing unless you are building new PC to sell.

With an upgrade version of the software you will need to do a clean install so backup up your …
2
LVL 65

Expert Comment

by:☠ MASQ ☠
Comment Utility
Strange the link is working here - maybe it's a regional thing?

Windows 7 was the last OS version the "hobbyist's clause" applied to, the Personal Use licence superceeds it but only from Win 8 forward.

Anyways here's the Win 7 version of the System Builder Guide which has a piece on hobbyist use tucked in right at the end.
0
LVL 30

Author Comment

by:Randy Downs
Comment Utility
Open in new tab via Chrome was the problem I ran into. It works fine if I just click it.

Open in new tab changes the link to a non working link
http://www.microsoft.com/oem/en/licensing/sblicensing/pages/licensing_for_hobbyists.aspx

http://www.microsoft.com/oem/en-gb/licensing/sblicensing/pages/licensing_for_hobbyists.aspx#fbid=zKmE5ap1y7Y

Thanks for the OEM links.
0
Strategies for Windows XP in 2014

On April 8, 2014, Microsoft will cease updating Windows XP.  This means no more support, no more bug fixes and, more prominently, no more security “patches” that plug security holes.  

See the Microsoft information on this at:

http://www.microsoft.com/en-us/windows/enterprise/end-of-support.aspx

This will make computers running Windows XP increasingly vulnerable to targeted security attacks.  After all, Windows XP will remain with a considerable fraction of the operating system landscape and, thus, a worthy target as it becomes more vulnerable to the rapidly-evolving threats.

You might ask: “Isn’t Windows XP just going to stay the same as it is now?  Perhaps no better but just the same? What will make Windows XP more vulnerable?”
-      Yes.  As of April 8, Windows XP will stay the same after that date but it won’t be supported.
-      In that sense, it will certainly be no better and it will worsen due to external forces.

The security landscape works like this:

Experts continue to seek out vulnerabilities.  These experts can be “black hats” or they can be “white hats” – depending on their motives.  Either way, the newly-found vulnerabilities are widely known throughout the computer community.  So, it’s the newest, most recent, threats that one needs to be the most concerned about.  Most of the parasites we remove are new ones.  The old ones have pretty much been covered by fixes and in the security software suites.  

6
LVL 27

Author Comment

by:Fred Marshall
Comment Utility
The ad was left over from a more localized message.  It's not needed.
0

Expert Comment

by:Jame Griffin
Comment Utility
1)The first thing is to make sure that you back up your computer’s files regularly, and periodically test you’re your backup strategy by restoring backups, preferably on a different computer, a few times a year. This helps ensure that in the event of a catastrophe, you will still have access to the information on your computer.
2)The next thing to do is to make sure that your copy of Windows XP is up-to-date.
3)In addition to the operating system and drivers, you should also make sure you have the latest versions of your application software on the computer
4)If the computer does not have to be connected to the Internet, disconnect or disable the connection so that the PC can only connect to other machines on the same non-Internet network. This will ensure that Internet-borne threats cannot directly attack your XP PC, and will make it harder for an attacker to steal data off the computer.
5)Make sure your security software is up-to-date, as well.
0
If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine.

Here is how to get rid of this:
Click Start
Click Run
Type msconfig
Press Enter

At the top of the System Configuration Utility, choose Boot.ini
Next, click on "Check All Boot Paths"

Once you do that, a box will come up saying something is invalid and asks you if you would like to remove the invalid one.  

Choose to remove it

Press ok

Restart the machine...

Now, you will notice that you do not get prompted to choose an operating system.

Once Windows boots up, the system configuration utility window will come up.  Put a check in the box, and press ok.

That's all there is to it!

Why does this happen? Well, it's because of the Master Boot Record or MBR.

The Master Boot Record is the very first sector of your hard drive.  This sector has all of the boot information.  In other words, the MBR tells the computer how to boot.  Keep in mind, the Master Boot Record is in no way part of the main partition of the system.  So, when you do a complete reformat of your hard drive, whether you use NTFS or FAT32, you are not actually formatting the Master Boot Record.  So, since the Master Boot Record held information from a previous installation of Windows, it is telling the computer that the Operating System still exists when in fact it does…
2
LVL 11

Expert Comment

by:BillBondo
Comment Utility
I see this all the time. What I like to do is put movie quotes in place of the second OS choice and set the timer to 5 seconds before defaulting. Good for a laugh when I run across it...
0
Sometimes people don't understand why download speed shows differently for Windows than Linux.Specially, this article covers and shows the solution for throughput difference for Windows than a Linux machine.

For this, I arranged a test scenario.I used 2 routers, 4 computers (3 Windows and 1 Linux) and 2 switches.

Scenario:

   Network Scenario
***All the links are Fast Ethernet 100 Mbps link *****

From the figure we can see the BDR router is the internet gateway. The Mikrotik Router has NAT enabled and default gateway is BDR router's LAN IP.2 IP's are assigned into Mikrotik's LAN interface. One is private and another is public IP. Using private block IP (172.x.x.0/24) indicates NAT is using as a routing protocol. To know more about NAT please check the following link:

http://www.cisco.com/en/US/tech/tk648/tk361/technologies_tech_note09186a0080094831.shtml

Test Plan and Subnet Scenario :

172.x.x.0/24 is the LAN of Mikrotik.Gateway is 172.x.x.1. The Microtek router translates it's public IP (41.x.x.30) into 172.x.x.0/24
41.x.x.128/26 is also LAN of Mikrotik.Gateway is 41.x.x129. Default route is using for this subnet
41.x.x.0/27 is the WAN side of Mirotik Router. Default gateway of this subnet is: 41.x.x.1.

So, the difference between 172.x.x.0/24 and 41.x.x.128/26 is routing protocol.172.x.x.0/24 is using NAT and 41.x.x.128/26 is using default route.
41.x.x.0/27 is the subnet of Mikrotik's WAN. We used 2 different machines from …
2
Issue:

Unstable cursor in Windows XP and Windows runs extremely slow in that any click will bring up the Hour glass (sometimes for several seconds before giving you what you want) .

Troubleshooting Process and the FINAL FIX:

This issue seems to be dominant in Outlook and in Word. A further detailed description of the issue would be during typing a line of text the cursor would suddenly jump back to the beginning or the middle of the line and your text would be inserted at that point (almost impossible to complete a line of text in an Outlook Email message). I've run into this issue on two different occasions. The first time failing to resolve the issue after two days (which included running the Windows Task manager and unloading all the tasks in memory one by one). At this point I gave up and saved all my client's personal data to an external drive and restored the entire hard drive from a previously created Acronis image file, and copied the data back to where it belonged (there is absolutely nothing like a full image backup to save the day).

The Second time I ran into this issue (about a year later) I didn't plan on being very patient but I did go into Windows Services and one by one methodically disabled each service, reboot the computer, open Outlook, and test to see if the issue was still there. When I finally got to "Terminal Services" (near the bottom is the very long list of services) the issue disappeared. I ran multiple tests and the …
3
LVL 56

Expert Comment

by:Mark Wills
Comment Utility
Fantastic - thanks - fixed my old computer (which I still use from time to time).

Voted "Yes"
0
LVL 39

Expert Comment

by:BillDL
Comment Utility
Good and concise article.

The "Terminal Services" Service on Windows XP is required for Remote Desktop Connection (RDC - remotely connecting from one computer to another to access it as though you were sitting in front of it), and for the Remote Assistance functionality whereby a user can sent out a request for somebody to connect to their computer and access it as described above or to initiate the connection to another computer for the same purposes.

These areas can be seen as potential vulnerabilities as they leave ports open and can expose your system to unwelcome intrusion, so if these functions are never used it is a good idea to disable Terminal Services.

The "Fast User Switching" Service is dependent on the "Terminal Services" Service, but this is only a feature that does what the name implies, and allows quick swapping between different users while retaining access to running programs.  This function should never be needed on a home computer where users should be fully logging out between different user sessions and thereby terminating access to running processes.

So yes, good finding and hopefully will help others with the same hourglass issue on XP.

Bill
0
It is only natural that we all want our PCs to be in good working order, improved system performance, so that is exactly how programs are advertised to entice. They say things like:

           •      PC crashes? Get registry cleaner to repair it!
           •      Fix registry errors!
           •      Improve PC performance!
           •      Have your computer running like new!

These might sound really good but are not necessarily true. The scanners don't always deliver what they claim to do, at times quite the opposite.  I have seen reports where after using a reg cleaner the user could no longer open any files, Control Panel buttons are missing, browser is broken, errors pop up, and in some cases the system can no longer boot!

Despite that, in the Virus & Spyware zone I sometimes see posts suggesting a registry cleaner to fix PC crashes and registry errors, and techs/"experts" recommending the use of a registry cleaner as part of their virus cleanup routine.

Using a registry cleaner might be okay for an advanced user who knows exactly what he is doing. But for an inexperienced user who just like to scan and click the "Fix all" button without making sure that those entries being deleted are really redundant can have a disastrous result.

The risk of removing a critical entry is greater than the benefits you hoped to gain when using one of these tools. If you are not careful, a registry cleaner can mess up your registry big time, and a messed up registry is a broken Windows. …
38
LVL 47

Author Comment

by:rpggamergirl
Comment Utility
I still use CCleaner now and then but just for cleaning temp files not for cleaning my registry.

Also if your PC is infected make sure you don't run CCleaner(or any temp folder cleaners) just yet in case one of those rogues that move files to the temp folders is present in the system.

Windows XP/Vista Recovery - Desktop icons missing - Empty Programs files
http://www.experts-exchange.com/A_6209.html


Thank you guys for your comments and input.
0
LVL 38

Expert Comment

by:ValentinoV
Comment Utility
+1 for the Russinovich reference :)
0
We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the attention of the users. As said “A picture is worth a thousand words”.

Secondly, people treat the windows logon message as a regular notice and ignore it always. We cannot force them to read and it never displays or highlights the new message thus does not help in grabbing attention of the user. Further the network group policies do take some time in loading the policies and profiles so try to rely less on them for such small things.

The process is fairly simple and you do no need any third party software other than sharing a folder on your computer and group policy editor.

How it works:
Share a folder on your computer with permissions that everyone can view that folder and share the wallpaper you want to display on remote computers.

Manual Process:
Click Start - Goto Run
Type: gpedit.msc
Group Policy window will open
Goto User Configurations --- Administrative Templates -- Desktop -- Active Desktop
Click Active Desktop Wallpaper and Select Enable
Under Wallpaper name
Give full path to the shared wallpaper
e.g \\computername\wallpaperfolder\wallpaper.jpg
Press okay and exit group policy editor

If you are using imaging technique in your labs, just deploy the modified image and as soon as the …
0
Fundamentals of JavaScript
LVL 12
Fundamentals of JavaScript

Learn the fundamentals of the popular programming language JavaScript so that you can explore the realm of web development.

Step by step guide to Clean and Sort your windows registry!


Introduction:

Always remember:
A Clean registry = Better performance = Save your invaluable time

In this article we're going to clear our registry manually! Yes, manually! The expert's way!
Some of the steps below and this article in general was inspired by the article : "How to Clean the Windows Registry by Hand"

Some might say cleaning registry manually is unsafe and may suggest using Third-party softwares. But I say when you do it yourself, you know what you're doing to your heart of windows! Plus that even famous registry cleaners may harm your windows or softwares in some situations (As I experienced it!).

Just take precautions and take backups before you begin! And read the Article (and links down the bottom) before you start and make sure you understand.

By reading this article not only you'll be able to clean the registry yourself but also you'll learn many places that windows uses to store it's data! In next steps I'll show you how to clean this areas of your registry:

1) Useless or old Software settings
2) Useless or old File extensions
3) Windows history list
4) Explorer history lists
5) Recent Office documents references
6) Nero history lists
7) Run command's most recently used list
8) Internet Explorer Address Bar History (Recently typed URLs)
9) Useless or unwanted Startup programs
10) Advanced cleanup


Precautions:
0
LVL 10

Expert Comment

by:Timothy McCartney
Comment Utility
Good point regarding your initial disclaimer. I failed to bring that into consideration when I first commented.

Again, great layout on your article. Very easy for a lesser-experienced user to follow and understand.

And thanks for the response on my comment!

Regards,
Tracer Fett
0

Expert Comment

by:shehap
Comment Utility
0
If your system is showing symptoms of browser hijacks or 'google search redirects' check out my other article first and run the tool TDSSKiller to get rid of the infection.

Once done, and if the PC seems to be clean but the redirect has not stopped, or in cases where you have just reformatted your system yet also showing the symptoms - then this article is for you, read on.


Router infections:

This infection has been doing its rounds for a while now; there were many PCs infected last year and currently it is still going as seen here. While it only needs to infect one PC in the network and affect all systems which share the same router; it's not surprising that a newly reformatted PC could also show the same symptom.


How does it get into the system:

Much like the Smitfraud family of infection, the Zlob/DNS changer trojans often trick the user by masquerading as a video codec to download. When they are in, these trojans check for wired and wireless hardware router. Once known that a router is being used, it guesses the router’s password by consulting a built-in list of routers with default username and password. Once it has access to the router it then changes the DNS settings, hence called DNS Changer trojans.

However, if the user had changed the default username and password for the router, these trojans will not be able to change DNS settings. That is why it is very important to create your own password and username when using one.
20
LVL 47

Author Comment

by:rpggamergirl
Comment Utility
@ Jsmply,

Your feedbacks on questions and continued support to my articles are what motivate me, and I am very grateful. :)
0

Expert Comment

by:Jsmply
Comment Utility
Glad to hear it, we have said many times that access to RPG alone is worth the price of EE!
0
cPanel is a Unix based web hosting control panel that provides a graphical interface and automation tools designed to simplify the process of hosting a web site. cPanel utilizes a 3 tier structure that provides functionality for administrators, resellers, and end-user website owners to control the various aspects of website and server administration through a standard web browser. cPanel is commonly accessed on port 2082, with an SSL-secured server operating on port 2083.

Access through cPanel:

Generally cPanel customers will not have direct access to generate their own CSR (certificate signing request) and install a Cheap SSL Certificate. One may have to check with the hosting provider as to how to go about generating a CSR for certificates.

WHM (Web Hosting Manager):

The control center of the CPanel package is the WebHost Manager. Accounts can be set up and managed through WebHost Manager. Use WHM to generate your CSR and install your issued certificate.

To generate a CSR Certificate:

•      Click on the “Generate an SSL certificate and Signing Request” link in the SSL/TLS menu.
•      Enter the email address to send the certificate.
•      Enter the domain that the SSL is being created for in the “Host to make cert. for” field.
•      Fill in the other administration details of the certificate in the Country, State, City, Company Name, Company Division, and Email fields.
•      Enter the password for the certificate in the Password field and click on …
0
Ok I have been working on this for some time having learned and gained certification in XenDesktop 4 along came version 5 which was released last month.

Since then I have been working to deploy XenDesktop 5 in a small environment with only 2 virtual machines, first thing was to learn the new concepts in XD5 to understand their relationship to XD4. I then began to deploy the required components and got it up and running internally however my main issue to tackle was providing external access which proved a hassle. The following is what I did to successfully implement external access.

Citrix Secure Gateway

Ok there are different ways of implementing external access notably for one of our clients we used NATing to achieve this, this is not the most ideal way as it required a lot of configuration and generally is more time consuming, find out how to do this here

NATing option basically maps the internal IP of the XD server to an external IP, the problem arises when launching an ICA session as it has to map to an internal virtual desktop which obviously does not carry a public IP.  This is overcome by using port forwarding to the internal IP of the desired desktop; port forwarding is done for all virtual machines and thus is not the best way to implement external access for a large environment. This is where CSG (Citrix Secure Gateway) comes into play.

Citrix have the Access Gateway appliance which is a hardware version of CSG this of course is the preferred way to…
1
Migration of Exchange mailbox can be done with the ExProfre.exe tool. But at times, when the ExProfre.exe tool migrates the Exchange Server user profile, it results in numerous synchronization problems. Synchronization error messages appear in the event log. In such pathetic situations, you face problems while converting OST file into PST file. To overcome these situations a third-party OST to PST converter is needed. With the help of a converter, you are able to convert OST to PST with much ease.

Let's discuss what kind of synchronization problems occur when you use Exprofre.exe (Exchange Profile Update Tool) to migrate a user profile of Microsoft Exchange Server:
Numerous synchronization errors appear on screen. You can see these errors in synchronization log.

Synchronization of organizational forms does not occur. As a result, messages requiring organizational form get displayed without form data.

Synchronization of security settings of MS-Outlook doesn't occur So, if new public folder applies new security settings, then these settings remain unavailable.

Synchronization of favorite folders of Public Folder cannot be done. All the Items that are contained in that folder remain unsynchronized.

Synchronization log contains the below events in it:
 
“12:03:52 Synchronizer Version 11.0.6352
12:03:52 Synchronizing Mailbox 'move six'
12:03:52 Synchronizing Hierarchy
12:03:52 Synchronizing server changes in folder 'Outlook 10 Security Settings'

Open in new window

1
LVL 74

Administrative Comment

by:Glen Knight
Comment Utility
exportostoutlook,
It is against Experts Exchange Terms of Use to solicit for business.

Please refrain from doing this in the future.

Thanks
demazter
Experts Exchange Zone Advisor & Page Editor
0
LVL 31

Expert Comment

by:Justin Owens
Comment Utility
jennylembert,

I am not sure I understand the value of this Article.  If you have sync problems after migrating from one information store to another, why not just delete the profile and recreate it.  I see no value in importing a converted PST, as that data would be stored in the Exchange server (else you would not have an OST).  If you are having to do such an import, you are assuming a complete migration failure, and if that is the case, then you would need to address the problem at the server level first.  You Article doesn't even mention server side troubleshooting for failed migrations.

It seems to me that it is basically an advertisement for software more than a "how to".

DrUltima
0
Can you find a fax from a vendor you saved a decade ago in seconds? Have you ever cursed your PC under your breath during an audit because you couldn’t find the requested statement or driver history?  If you answered no to the first question or yes to the second, file abbreviations could save you time and aggravation.

Many organizations do not have the expertise, funding or resources to implement an enterprise search engine.  Neatly organizing files in folders can help, however, users may move files to the incorrect location or need to combine them as a set for archiving or distribution.  In this case a file naming convention can ensure the correct files are found quickly.

The most important part of organization is implementing and using a system. Any system is better than none. A system of specific yet easily followed procedures gives consistent results.  If you don’t use file abbreviations as part of your file naming system, consider the benefits. If you do use them, consider enhancing them.

The concept of file abbreviations is not new. The FBI uses them as well as the Canadian CAIPS (Computer Assisted Immigration Processing System) as well as many workplaces, organizations and departments. Text messaging is rife with abbreviations.

Language is always changing. Have you read any Shakespeare lately? I expect our great-great-great grand children will speak in abbreviations and sound like the clickety-clack aliens from the movie District 9. Okay, maybe not …
6

Windows XP

118K

Solutions

78K

Contributors

Microsoft Windows XP is the sixth release of the NT series of operating systems, and was the first to be marketed in a variety of editions: XP Home and XP Professional, designed for business and power users. The advanced features in XP Professional are generally disabled in Home Edition, but are there and can be activated. There were two 64-bit editions, an embedded edition and a tablet edition.