Recent posts

Hello Geeks,

My system configurations are specified below.

ATI Radeom 5870 1 GB

Processor : AMD Phenom II X4 Black Edition 3.2 GHz.

RAM : 4 GB

Operating System : Windows 7 - 64 bit

Screen Resolution : 1920 x 1080

I know it is not the best computer in the world but I am only...



Read more

I'm trying to boot my Dell computer, but a pop up message appears stating that the Norton Anti-Virus (NAV) Auto-Protect "cannot locate the set up data". When I tried to boot into safe mode, I'm getting the same message. Anyone have a solution for this?



Read more

We were still using an old version of Peachtree Accounting System 2009 in our office. 

A fairly new user randomly got this error message when processing the payroll (see below). 

Peachtree Accounting

The payroll formula **SIT contains the word ENTER that is not recognized by Peachtree. To see...



Read more

I set up Tomcat 5.0 as an unprivileged user in IBM AIX [not Linux]. I need to use SSL port 443, and get an error when transferred to port 8443. In Linux, you can use IP tables, what are the solutions in AIX?



Read more

If Lotus Notes client is getting error, the Name Server Daemon (NSD)-KILL could help the program to restart.

Is it possible to use killnotes.exe to replace the "nsd -KILL"?

What are the variations of the two?

Which among this are advisable to use in terms of Lotus Notes version 8.5.x (up to...



Read more

What is the function of Name Server Daemon (NSD) and how to analyze the Hypertext Transfer Protocol (HTTP) as task to execute if there is a growth of volume in parallel consumer?

The data analysis will help us to determine the troubled sites and assist them.

Do you have any ideas...



Read more

Dear Experts,

I was installing Peachtree Accounting System to three (3) new PCs in our Finance Department when I got this error at the second installation (see below).  

We are still using Win XP for stability purposes. 

I wondered why I couldn’t get thru to this second (2nd) PC when I got...



Read more

What is the cause of the beating? How the system does recognized thrashing? Once it recognize thrashing, what would be the rule to terminate this issue? What is the use of Ntbootdd.sys files?



Read more

What are the system rules of conduct for the selection of the Windows clients if for some reason you do not want to use Transmission Control Protocol/Internet Protocol (TCP/IP)? What method should you use to resume data encrypted with Encrypting File System (EFS)?



Read more

What are the responsibilities or functions of the file connection layer in the Open Systems Interconnection (OSI) ideal source? File link layer has been seen above the physical layer; however, it is under the system layer and how does the key-based cryptography ensure the validity of file changed over...



Read more