WELCOME

In your persistence, competition has no existence.

WHAT IS A BACKUP


BACKUP
In information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event
The backup utility can be quickly accessed by typing the command “ntbackup”.


Performing a Backup

By default, the Backup Utility will use Wizard Mode. Uncheck the Always start in wizard mode checkbox.
Select Advanced Mode, which enables you to configure the backup exactly as you want it.
Select the Backup tab.
From the tree view, select the location of the backup.
Check the box next to the folder you wish to backup, e.g. Data. You can also backup an entire drive by selecting the checkbox next to the relevant drive letter.
Once you have selected all the files you wish to backup, you can save the selection by clicking Job.
And selecting Save Selections.
Choose a name for the backup selection and click Save.
You can now open the backup selection each time you  perform a backup, rather than re-selecting all of the files.
Next, specify a location for the backup, e.g. A network share or removable hard disk.
Once a location has been specified, select the Start Backup button.
Because this is a new backup, you should select the Replace the data on the media with this backup radio button.
Select the Advanced Option.
The Disable volume shadow copy option allows the backup of locked and open files. If this option is selected, some files that are open or in use might be skipped.
You can choose the Backup type from the Backup Type drop-down list.
In this case, a Normal backup is required.
Click on OK once all options have been configured.
To begin the backup select Start Backup.
The backup will then begin.
Once completed, you can either view a Report or Close the Backup dialog box.
Notice that the Archive attribute on the files in the data folder have now been cleared.
The backup has been saved to the network share as “databackup.bkf”.

Performing a Differential Backup

In this scenario, a differential backup is performed the day after the normal backup.
 Because the current.txt file has been modified, the archive attribute is set.
Open the ntbackup utility and select Job.
Select Load Selections.
And open the backup selection saved previously.
Specify a new name for the backup file.
Select Start Backup.
Click the Advanced Button.
Select the Backup type drop-down list.
Select the Differential Option.
Click on OK once all options have been configured.
Click on Start Backup to begin the backup process.
Once the backup is complete, click on Close.
Notice that the archive bit on the modified file stays selected. The differential backup will only contain this file.

Performing an Incremental Backup

With an incremental backup, the archive bit will be cleared. In this example, two files in the folder have been modified since the normal backup.
Again, using the ntbackup utility, open the backup selection, and begin the backup process.
This time, select the Incremental Backup type.
Once the backup has finished, click on Close.
Notice that, unlike a differential backup, the archive bit has now been cleared.

Creating a Backup Schedule

Incremental Backup Strategy

Monday – Normal Backup of entire computer
Tuesday – Incremental Backup of Data folder
Wednesday – Incremental Backup of Data folder
Thursday – Incremental Backup of Data folder
Friday – Incremental Backup of Data folder
The backup utility allows you to schedule backup jobs to run at pre-set times.
In this example, every Monday a normal backup of the entire computer is performed. Every Tuesday, Wednesday, Thursday and Friday nights, an incremental backup of the data folder is performed.
Launch the ntbackup utility and select the Schedule Jobs tab.
Select the Add Job button.
Click on Next to continue.
Select which files you would like to backup, in this case Back up everything on this computer.
Once selected, click Next.
Choose a name and location for the backup and click Next.
Ensure Normal backup is selected and click Next.
Click on Next to continue.
Because this is a normal backup, data should not be appended to the end of an existing backup.
Select the Replace the existing backup radio button.
Click on Next to continue.
Choose a name for the Schedule and then select the Set Schedule button.
Using the Schedule options, a backup schedule for the job can be set.
In this example, a normal backup will be performed every Monday night.
Click on OK to continue.
The scheduled task will need to run with the permissions of a user with the relevant rights, e.g. A member of the Administrators or Backup Operators group. Click on OK to continue.
Click on Next to continue.
Click on Finish to close the wizard.
The normal backup job has now been created. Click on Add Job to create the incremental backup schedule.
Click on Next to continue.
Select which files you would like to backup, in this case Back up selected files, drives, or network data. Once selected, click Next.
Select the files to be backed up.
Click on Next to continue.
Click on Next to continue.
Select the Backup type drop-down list and select Incremental.
Click on Next to continue.
Click on Next to continue.
Because this is an incremental backup, it is often easier to append data to the end of an existing backup. Click on Next to continue.

N.B.
You should set the Tuesday backup to replace the existing backup .
Choose a name for the backup job and click Set Schedule.
Choose a schedule from the available options.
The backup will be performed at midnight every Tuesday, Wednesday, Thursday, and Friday.
Click on Next to continue.
Click on Next to continue.
Click on Finish to close the wizard.
The backup schedule has now been set.

WINDOWS REGISTRY


The Windows Registry

The Microsoft Windows Registry is a very powerful and logically designed computer database that controls virtually every facet of your computer's operation and is found on all Microsoft Windows installations.

While the computer's microprocessor is the brain of the hardware, the Registry is the brain of the Operating System.  Most people are unfamiliar with the Registry and with good reason. A deleted or corrupted Registry entry could render an application or even the entire operating system completely unusable.

However, with the advent of spam, poorly written software rushed to production, and any number of spyware agents available to corrupt one's computer, not knowing what the Registry does or how to navigate its basic structure could compromise your computer as easily as any piece of malware waiting to infiltrate its every file.
Reg Edit 
The regedit command opens the Registry and provides the user with a graphical interface that allows for editing or inserting keys that can manipulate software throughout the computer's operating system.

The Registry 
the registry

  • The Classes_Root hive manages installed applications and their associated file extensions.
  • The Current_User hive manages the data and preferences of the currently logged in user.
  • The Local_Machine hive controls settings that affect the entire operating system.
  • The Users hive holds the settings pertaining to all users who have logged into that computer.
  • The Current_Config contains per session data. This data changes the next time a different user logs in or if the computer is restarted.
The Registry is comprised of folders, or Keys, and within those folders STRING, BINARY, DWORD, MULTIWORD, or EXPANDABLE STRING values that can launch, stop, or change process that run on your computer.

Accessing and Editing the Registry
The Registry can be edited manually by expanding each section and drilling down (expanding) into the hive, or folder structure, and locating the entry that needs to be modified or inserting a new entry to control or support a new function.
In many corporate settings, the Network or Computer administrators will disable a users ability to access the Registry. However, most computers used at home or for recreational purposes automatically give the main account administrative privileges. This is good and bad because, while the user has access to add or remove software and hardware, a smart programmer can execute a program to maliciously access the Registry and do untold damage to the computer without the user suspecting a thing.
One of the most vulnerable and, at the same time, powerful Keys within the Registry is the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run location. Within this key, authors of spyware, malware, virus purveyors, and even useful software programs will modify the processes of a user computer from the moment that user logs in.

                                                                 registry keys

The HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Key will execute a program when any user logs in and bog down system resources (memory, CPU, and disk space) without ever requesting permission by the user This is because the user gave the software the implicit right to do so at the time of install without knowing that the application will hinder the system performance from the very first keystroke.

Why Do You Need a Registry Cleaner?

Most personal computers sold today contain many extraneous applications that are pre installed by the manufacturer.  Updates or complete re-installations of applications may result in duplicate or additional Registry entries requiring more processor and memory overhead as the computer is required to scan deeper into the Registry’s bloated hive. 

Removing these applications may delete the application files but that does not necessarily remove the Registry entries.  Having an easy to use, no-nonsense Registry Cleaner can assist the user in determining what key can be discarded and, more importantly, what keys need to be left untouched for the computer to operate correctly.

Data mining, the practice of sending sensitive data to an irresponsible or unethical marketing firm can lead many unpleasant circumstances, not the least of which is Identity Theft.  With the right Registry Cleaner, you can safeguard yourself from Internet thieves and other eMiscreants by removing potential security breaches caused by less than ethical computer programmers and the malware installed by their applications.
The right Registry Cleaner is a must-have for today’s computer user.  With the right one, a computer has a fighting chance to reach its full potential.

Warning!

 You should never attempt to delete or modify any entries in your computer registry unless you are absolutely sure you know what you are doing. Deleting or modifying valid entries could render your PC or applications completely unusable.



SHORTCUT KEYS

WORKING WITH TABS

The following table describes shortcuts used when working with tabs.
To do this
Press this
Open links in a new tab in the background
CTRL+click
Open links in a new tab in the foreground
CTRL+SHIFT+click
Open a new tab in the foreground
CTRL+T
Switch between tabs
CTRL+TAB or CTRL+SHIFT+TAB
Close current tab (or the current window if tabbed browsing is disabled)
CTRL+W
Open a new tab in the foreground from the Address bar
ALT+ENTER
Switch to a specific tab number
CTRL+n (where n is a number between 1 and 8)
Switch to the last tab
CTRL+9
Close other tabs
CTRL+ALT+F4
Toggle Quick Tabs (thumbnail view) on or off
CTRL+Q

USING ZOOM:

To do this
Press this
Increase zoom (+ 10%)
CTRL+PLUS SIGN
Decrease zoom (- 10%)
CTRL+MINUS SIGN
Zoom to 100%
CTRL+0
USING SEARCH:

To do this
Press this
Go to the search box
CTRL+E
Open your search query in a new tab
ALT+ENTER
Open the search provider menu
CTRL+DOWN ARROW

USING PRINT PREVIEW:

To do this
Press this
Set printing options and print the page
ALT+P
Change paper, headers and footers, orientation, and margins for this page
ALT+U
Display the first page to be printed
ALT+HOME
Display the previous page to be printed
ALT+LEFT ARROW
Type the number of the page you want displayed
ALT+A
Display the next page to be printed
ALT+RIGHT ARROW
Display the last page to be printed
ALT+END
Specify how you want frames to print (this option is available only if you are printing a webpage that uses frames)
ALT+F
Close Print Preview
ALT+C

USING THE ADDRESS BAR:

To do this
Press this
Select the text in the Address bar
ALT+D
Display a list of addresses you've typed
F4
When in the Address bar, move the cursor left to the next logical break in the address (period or slash)
CTRL+LEFT ARROW
When in the Address bar, move the cursor right to the next logical break in the address (period or slash)
CTRL+RIGHT ARROW
Add "www." to the beginning and ".com" to the end of the text typed in the Address bar
CTRL+ENTER
Move forward through the list of AutoComplete matches
UP ARROW
Move back through the list of AutoComplete matches
DOWN ARROW

OPENING IE TOOLBAR MENU:

To do this
Press this
Open the Home menu
ALT+M
Open the Print menu
ALT+R
Open the RSS menu
ALT+J
Open the Tools menu
ALT+O
Open the Safety menu
ALT+S
Open the Help menu
ALT+L

WORKING WITH FEED, HISTORY AND FAVOURITES:
To do this
Press this
Add the current page to your favorites (or subscribe to the feed when in feed preview)
CTRL+D
Delete browsing history
CTRL+SHIFT+DEL
Open an InPrivate Browsing window
CTRL+SHIFT+P
Open the Organize Favorites dialog box
CTRL+B
Move selected item up in the Favorites list in the Organize Favorites dialog box
ALT+UP ARROW
Move selected item down in the Favorites list in the Organize Favorites dialog box
ALT+DOWN ARROW
Open Favorites Center and display your favorites
ALT+C
Open Favorites Center and display your history
CTRL+H
Open Favorites Center and display your feeds
CTRL+J
Open and dock the Favorites Center and display your feeds
CTRL+SHIFT+J
Open the Add to Favorites menu (or open Subscribe to feed when in feed preview)
ALT+Z
Open the Favorites menu from the menu bar
ALT+A
Display all feeds (when in feed view)
ALT+I
Mark a feed as read (when in feed view)
ALT+M
Put cursor in Search box in feed view
ALT+S

EDITING:

To do this
Press this
Remove the selected items and copy them to the Clipboard
CTRL+X
Copy the selected items to the Clipboard
CTRL+C
Insert the contents of the Clipboard at the selected location
CTRL+V
Select all items on the current webpage
CTRL+A
Open Internet Explorer Developer Tools
F12

TIPS ABOUT COMMAND PROMPT

Tips: RUN commands

We all know that Windows logo key + R leads us to the RUN command box and we have been using quite a few commands like msconfig, cmd, notepad etc… as a shortcut to open the applications quickly without having to locate them in their respective directories. So, here is the list of all the commands you can execute in Run and access various applications:



A
Add/Remove Programs = appwiz.cpl
Administrative Tools = control admintools
Authorization Manager= azman.msc "New


C

Calculator = calc
Certificate Manager = certmgr.msc
Character Map = charmap
Check Disk Utility = chkdsk
Control Panel = control "New"
Command Prompt = cmd.exe
Component Services = dcomcnfg
Computer Management = compmgmt.msc = CompMgmtLauncher "New"


D
Date and Time Properties = timedate.cpl
Downloads = Downloads "New"
Device Manager = devmgmt.msc
Direct X Troubleshooter = dxdiag
Disk Cleanup Utility = cleanmgr
Defragment User Interface = dfrgui "New"
Ditilizer Calibration Tool = tabcal "New"
Disk Management = diskmgmt.msc
Disk Parmelonion Manager = diskpart
Display Properties = control desktop or desk.cpl
DPI Scaling = dpiscaling "New"
Driver Package Installer = dpinst "New"
Driver Verifier Utility = verifier or /reset
DVD Player = dvdplay "New"

E
Encryption File System = rekeywiz "New"
Event Viewer = eventvwr.msc

F
Fax Cover Sheet Editor = fxscover "New"
File Signature Verification Tool = sigverif
Folders Properties = control folders
Fonts = control fonts
Free Cell Card Game = freecell
G
Group Policy Editor = gpedit.msc
I
Internet Explorer = iexplore
Iexpress Wizard = iexpress
Internet Properties = inetcpl.cpl
IP Configuration = ipconfig.exe
iSCSI Initiator = iscsicpl "New"

J
Keyboard Properties = control keyboard
L
Libraries = explorer or Windows key + E
Local Security Settings = secpol.msc
Local Users and Groups = lusrmgr.msc
Logs You Out Of Windows = logoff
M
Microsoft Support Diagnostic Tool = msdt "New"
Microsoft Paint = mspaint.exe
Mouse Properties = control mouse
Mouse Properties = main.cpl
Mobility Center (only on mobile) = mblctr or Windows key + X
Network Connections = control netconnections
Network Connections = ncpa.cpl
Notepad = notepad
O
ODBC Data Source Administrator = odbcad32 "New"
Optional Features Manager = optionalfeatures "New"
On Screen Keyboard = osk or Windows key + U
P
Performance Monitor = perfmon.msc
Phone and Modem Options = telephon.cpl
Power Configuration = powercfg.cpl
Printers and Faxes = control printers
Printer Migration = PrintBrmUi "New"
Private Character Editor = eudcedit
R
Regional Settings = intl.cpl
Registry Editor = regedit.exe
Remote Assistance = msra "New"
Remote Desktop = mstsc
Resultant Set of Policy = rsop.msc
S
Scheduled Tasks = control schedtasks
Security Center = wscui.cpl
Services = services.msc
Shared Folders/MMC = fsmgmt.msc
Shuts Down Windows = shutdown
Snipping Tool = snippingtool "New"
Sounds and Audio = mmsys.cpl
Sound Recorder = soundrecorder "New"
Sound Volume = sndvol "New"
Spider Solitare Card Game = spider
SQL Client Configuration = cliconfg
Stored User Names and Passwords = credwiz "New"
Sticky Note = StikyNot "New"
System Configuration Editor = sysedit
System Configuration Utility = msconfig
System File Checker Utility = sfc
System Information = msinfo32
System Properties = sysdm.cpl or Windows key + Pause/Break

T
Task Manager = taskmgr
Trusted Platform Module = TpmInit "New"
U
Utility Manager = utilman
User Accounts = netplwiz or control userpasswords2
W
Windows Activation = slui "New"
Windows Backup Utility = sdclt "New"
Windows Fax and Scan = wfs "New"
Windows Firewall = firewall.cpl
Windows Firewall with Advanced Security = wf.msc "New"
Windows Image Acquisition = wiaacmgr "New"
Windows Media Player = wmplayer
Windows Magnifier = magnify
Windows Management Infrastructure = wmimgmt.msc
Windows Update App Manager = wuapp "New"
Windows Standalong Update Manager = wusa "New'
Windows System Security Tool = syskey
Windows Share Creation Wizard = shrpubw "New"
Wordpad = write

NB: Use your mind for creativity not for storage.