Undergoing MyBlogLog Verification

Friday, December 28, 2007

Vista Transformation Pack 8.0.1 rocking...

Here is the fixes and enhancements of 8.01:

http://www.windowsxlive.net/?page_id=15

Download the pack from here:

http://www.filefactory.com/file/25a431/

Monday, November 26, 2007

Beowolf 2007



In a time of heroes, the mighty warrior Beowulf slays the demon Grendel and incurs the wrath of its monstrous yet seductive mother in a conflict that transforms a king into a legend. Groundbreaking director Robert Zemeckis offers a vision of the Beowulf saga that has never been told before - "Beowulf," starring Ray Winstone in the title role and Anthony Hopkins as the corrupt King Hrothgar, as well as John Malkovich, Robin Wright Penn, Brendan Gleeson, Crispin Glover, Alison Lohman, and Angelina Jolie as Grendel’s mother. Neil Gaiman ("Mirrormask, the graphic novel," "Sandman") & Roger Avary ("Pulp Fiction") adapted the legend for the screen.

Based on the perhaps greatest and most important of the Anglo-Saxon epic poems, the 1200-year-old Beowulf is one of the earliest pieces of literature in the English language and an epic poem of war and adventure. Though English, the story is set in Scandinavia, where the Anglo-Saxon races lived before migration to England. It tells of the hero, Beowulf, who kills the monster Grendel after the dragonlike beast terrorizes the mead-halls, carrying off and eating the Thanes that are under Beowulf's protection.

Composed in England four centuries before the Norman Conquest. But no one knows exactly when it was composed, or by whom, or why. As a social document this great epic reflects a feudal, newly Christian world of heroes and monsters, blood and victory and death.

http://friendlyfiles.net/download/e96bcb931405/p2pxbeowulf%5Bwww.thegenius.us%5D.avi.html

http://www.eatlime.com/download.lc?sid=3d7cd910-e88f-102a-aaa7-0030488882b4

http://d01.megashares.com/?d01=e4f5eeb


http://rapidshare.com/files/70969187/p2pxvid-beowulf-ts.part1.rar
http://rapidshare.com/files/70969293/p2pxvid-beowulf-ts.part2.rar
http://rapidshare.com/files/70969391/p2pxvid-beowulf-ts.part3.rar
http://rapidshare.com/files/70969517/p2pxvid-beowulf-ts.part4.rar
http://rapidshare.com/files/70969609/p2pxvid-beowulf-ts.part5.rar
http://rapidshare.com/files/70969697/p2pxvid-beowulf-ts.part6.rar
http://rapidshare.com/files/70969803/p2pxvid-beowulf-ts.part7.rar


http://rapidshare.com/files/70974920/Beowulf.TS.XViD-P2PXViD.part1.rar
http://rapidshare.com/files/70975002/Beowulf.TS.XViD-P2PXViD.part2.rar
http://rapidshare.com/files/70975077/Beowulf.TS.XViD-P2PXViD.part3.rar
http://rapidshare.com/files/70975142/Beowulf.TS.XViD-P2PXViD.part4.rar
http://rapidshare.com/files/70975234/Beowulf.TS.XViD-P2PXViD.part5.rar
http://rapidshare.com/files/70975304/Beowulf.TS.XViD-P2PXViD.part6.rar
http://rapidshare.com/files/70975397/Beowulf.TS.XViD-P2PXViD.part7.rar

http://www.megaupload.com/?d=TONS3PZG

http://www.filefactory.com/file/f35b19/

http://depositfiles.com/files/2435986

Thursday, November 1, 2007

SAW IV

Once the pukka print is available, it will be added to this post. Till that, you can download this print and watch it.


http://www.filefactory.com/file/61cfa5/
http://www.filefactory.com/file/298dd2/
http://www.filefactory.com/file/599c78/

Wednesday, October 31, 2007

LinuxCBT RegEx Edition

LinuxCBT RegEx Edition

LinuxCBT RegEx Edition focuses on the application of POSIX and
Perl-compatible Regular Expressions.

Regular Expressions are critical to efficiently parsing textual data
(log file content, data feeds, files & directories, etc.). RegEx support
is included with Linux | Unix operating systems via ubiquitous tools
such as: grep, awk, sed, Perl, PHP, etc., and provides systems
administrator/engineers and developers alike, the ability search,
time-effectively, considerable amounts of textual data, using literals,
character classes, metacharacters, metasequences, etc.

Let LinuxCBT RegEx Edition cost-effectively teach you Regular Expressions!

Recommended Prerequisites for:

* Any LinuxCBT Operating System Course (Classic/EL-4/SUSE/Debian
Editions)
o Open mind & determination to master Linux and related
open-source applications
o Basic understanding of networking concepts
o Access to a Linux system to follow the exercises

LinuxCBT Scripting Editon - RegEx - Module 5

* Introduction - Features
o Discuss course outline
o Explore system configuration
o Identify key systems to be used
o Install the Bluefish graphical editor - Supports POSIX and
PERL-compatible RegExes
o List key Regular Expressions applications
o Enumerate and discuss key Regular Expressions features

* Metacharacters
o Enumerate important metacharacters
o Provide examples of asterisk '*' usage
o Apply simple character classes to searches
o Perform searches in the Bluefish editor using literals and
metacharacters
o Explain and apply anchors: '^', '$'

* Character Classes
o Discuss features and applications
o Perform searches in the Bluefish editor using character classes
o Search for case-insensitive characters
o Negate character class values using the circumflex
character: '^'
o Specify ranges and inclusions
o Search for string boundaries
o Alternate between POSIX and Perl-compatible Regular
Expressions in Bluefish Editor

* RegExes with GREP & EGREP
o Discuss features and applications
o Perform simple GREP searches
o Use EGREP to find strings based on RegExes
o Parse installed applications using EGREP
o Extract 'su' attempts from the system log file:
/var/log/messages
o Parse log file entries based on specific dates

* Parenthetical Expressions
o Discuss features and applications
o Compare and contrast with character classes
o Search for strings using the Bluefish Editor
o Combine anchors with parenthesis and evaluate results
o Search for multiple groups of strings using alternation
o Use parenthetical expressions with EGREP
o Nest expressions using parenthesis

* Quantifiers
o Discuss features and benefits
o Define RegEx tokens
o Enumerate and discuss RegEx quantifiers
o Test '?' using the Bluefish Editor and EGREP
o Test '*' using the Bluefish Editor and EGREP
o Test '+' using the Bluefish Editor and EGREP
o Test '*' using the Bluefish Editor and EGREP
o Test '{ }' - arbitrary quantifiers with the Bluefish Editor
and EGREP
o Combine anchors, parenthesis and various quantifiers

* Shortcut Sequences - POSIX & Perl
o Discuss features and benefits
o Enumerate and discuss key shortcut sequences
o Test shortcut sequences using the Bluefish Editor

* Awk - Field Parser
o Discuss features and applications
o Use awk to extract fields from the process listing
o Apply RegEx literal strings to awk search and evaluate results
o Apply RegEx character classes to awk search and evaluate results
o Apply RegEx parenthetical expressions to awk search and
evaluate results
o Apply RegEx quantifiers to awk search and evaluate results
o Incorporate conditional RegEx matching with awk search and
evaluate results
o Extract fields, based on RegExes, from system log file:
/var/log/messages

* SED - Stream Editor
o Discuss features and applications
o Perform text transformation of text file using string literals
o Perform text transformation of text file using string
literals and character classes
o Perform text transformation of text file using string
literals and anchors
o Perform text transformation of text file using string
literals and character classes
o Evaluate results

* GNU Utilities (GREP|Awk|SED) for Windows
o Discuss features and benefits
o Identify and connect to Windows Server target system
o Download and install GNU utilities for Windows: GREP, Awk, SED
o Perform EGREP searches and evaluate results
o Perform gawk searches and evaluate results
o Perform SED substitutions and evaluate results

* Perl Regular Expressions
o Discuss features and applications
o Write simple Perl script to compare command line argument to
RegEx and evaluate results
o Alter Perl script to read text file and perform RegEx
comparisons and evaluate results
o Incorporate character classes, parenthetical expressions,
case-insensitivity and quantifiers
o Evaluate results
o Substitute matched text using Perl RegExes
o Substitute matched text using Perl RegExes from the command line
o Update system log using text substitution from the command line

* PHP Regular Expressions
o Discuss features and applications
o Perform POSIX and Perl-compatible RegExes from the command line
o Substitute text using RegExes
o Evaluate results
o Design HTML form to collect fields via the browser
o Design back-end, action script to process the POST fields
using RegExes
o Halt processing if POST fields do NOT meed criteria based on
RegExes
o Evaluate results

* Apache Regular Expressions
o Discuss features and benefits
o Identify key configuration files
o Explore key RegEx-supporting Apache directives
o Match a range of directories using RegExes with
<DirectoryMatch> directive
o Restrict access to files using RegExes with <FilesMatch>
directive
o Match URL directory values using RegExes with <AliasMatch>
directive
o Redirect users to alternate content using RegExes with
<RedirectMatch> directive

Download:

http://rapidshare.com/files/61612098/LRE_UDK_.sfv
http://rapidshare.com/files/61644505/LRE_UDK_.rar
http://rapidshare.com/files/61678117/LRE_UDK_.r00
http://rapidshare.com/files/61695389/LRE_UDK_.r01

Pass: NeedZ

Mirror

http://www.filefactory.com/file/c4e7db/
http://www.filefactory.com/file/842c4f/
http://www.filefactory.com/file/1d27da/

LinuxCBT PAM Edition

LinuxCBT PAM Edition encompasses: 1. Pluggable Authentication Modules
(PAM) Security.

LinuxCBT PAM Edition entails 6-hours, or ~1-day of classroom training.
LinuxCBT PAM Edition prepares you or your organization for successfully
securing GNU/Linux & Open Source-based solutions.

Let LinuxCBT PAM Edition cost-effectively sharpen your PAM Security skills!

PAM Security - Module 1

- Introduction - Topology - Features
- PAM Rules Files & Syntax
- Common PAMs - Identify & Discuss Commonly Implemented PAMs
- Account Policies with PAM
- PAM Tally
- PAM Password Quality Check
- PAM Time - Time-based Access Control
- PAM Nologin
- PAM Limits - System Resource Limits Controlled by PAM
- PAM Authentication with Apache


http://www.filefactory.com/file/99e63c/
http://www.filefactory.com/file/90025d/
http://www.filefactory.com/file/0cf81b/
http://www.filefactory.com/file/3af3bf/

Thursday, October 25, 2007

rFactor


Name: rFactor
Genre: Racing, Cars, Simulator, 3D
Developer: Image Space Incorporated

rFactor - simulator from the creators of the known famous F1 Challenge
99-02, company ISI - Image Space Incorporated. True, the developers
decided not to lie down under wing EA Sports and let out project
independently this time. As a result (what, however, and it was to be
expected) money was sufficient neither to the litsenzirovannye machines
nor to the reliable routes. However, even the fictitious routes and
bolides are executed sufficiently qualitatively, not into the example to
other budgetary "simulators". Game has the open architecture and it has
available enormous possibilities for moddinga.

System requirements:
1.0 GHz processor
Windows 98 SE, ME, 2000, XP, XP 64-bit (will not run in Windows 95 or
Windows 98 first edition)
256 MB RAM
Geforce 3 or Radeon 8500
64 MB video RAM
DirectX 9.0c
1.1 GB of hard drive space for installation
Internet connection required for one-time activation

Download Full Game (PC)
http://www.filefactory.com/file/708b04/
http://www.filefactory.com/file/87dc0c/
http://www.filefactory.com/file/8dcc71/
http://www.filefactory.com/file/d65034/
http://www.filefactory.com/file/9d2dc7/
http://www.filefactory.com/file/351359/
http://www.filefactory.com/file/a85377/
http://www.filefactory.com/file/5efdc4/
http://www.filefactory.com/file/ff7758/
http://www.filefactory.com/file/d9adc6/

Monday, October 22, 2007

Ultimate CBT collection...

The Ultimate Certification CBTs: Practise Exam Collection l 430 MB

Preparing for a certification exam? This is the COMPLETE SelfTest
software practice exam catalog featuring 147 CBTs from vendors , such as
Microsoft, Cisco, Oracle, Novel, CompTIA just to name a few.

 Microsoft Certifications

70-086 Implementing and Supporting Microsoft Systems Management Server 2.0
70-210 Installing, Configuring and Administering Microsoft Windows 2000
Professional
70-214 Implemening and Administering Security in a Microsoft Windows
2000 Network
70-215 Installing, Configuring and Administering Microsoft Windows 2000
Server
70-216 Implementing and Supporting Microsoft Microsoft Windows 2000
Network Infrastructure
70-217 Implementing and Supporting Microsoft Microsoft Windows 2000
Directory Services Infrastructure
70-218 Managing a Microsoft Windows 2000 Network Environment
70-219 Designing a Windows 2000 Directory Services Infrastructure + 4
Case Studies
70-220 Designing Security for a Windows 2000 Network + 4 Case Studies
70-221 Designing a Windows 2000 Network Infrastructure + 4 Case Studies
70-222 Migrating from Microsoft Windows NT 4.0 to Microsoft Windows 2000
70-223 Installing, Configuring, and Administering Microsoft Clustering
Services by Using Microsoft Windows 2000 Advanced Server
70-224 Installing, Configuring, and Administering Microsoft Exchange
2000 Server
70-225 Designing and Deploying a Messaging Infrastructure with Microsoft
Exchange 2000 Server
70-226 Designing Highly Available Web Solutions with Microsoft Windows
2000 Server Technologies
70-227 Installing, Configuring, and Administering Microsoft Internet
Security and Acceleration (ISA) Server 2000, Enterprise Edition
70-228 Installing, Configuring, and Administering Microsoft SQL Server
2000 Enterprise Edition
70-229 Designing and Implementing Databases with Microsoft SQL Server
2000 Enterprise Edition
70-230 Designing and Implementing Solutions with Microsoft BizTalk
Server 2000, Enterprise Edition
70-232 Implemting and Maintaining Highly Available Web Solutions with
Microsoft Windows 2000 Server Technologies and Microsoft Application
Center 2000
70-234 Designing and Implementing Solutions with Microsoft Commerce
Server 2000
70-244 Supporting and Maintaining a Microsoft Windows NT Server 4.0 Network
70-270 Installing, Configuring, and Administering Microsoft Windows XP
Professional
70-271 Supporting Users and Troubleshooting a Microsoft Windows XP
Operating System
70-272 Supporting Users and Troubleshooting Desktop Applications on a
Microsoft Windows XP Operating System
70-282 Designing, Deploying, and Managing a Network Solution for a
Small- and Medium-Sized Business
70-284 Implementing and Managing Microsoft Exchange Server 2003
70-285 Designing a Microsoft Exchange Server 2003 Organization
70-290 Mangaing and Maintaining a Microsoft Exchange Server 2003 Environment
70-291 Implementing, Managing, and Maintaining a Microsoft Windows
Server 2003 Network Infrastructure
70-292 Managing and Maintaining a Microsoft Windows Server 2003
Environment for an MCSA Certified on Windows 2000
70-293 Planning and Maintaining a Microsoft Windows Server 2003 Network
Infractructure
70-294 Planning, Implementing, and Maintaining a Microsoft Windows
Server 2003 Active Directory Infractructure
70-296 Planning, Implementing, and Maintaining a Microsoft Windows
Server 2003 Environment for an MCSA Certified on Windows 2000
70-297 Designing a Microsoft Windows Server 2003 Active Directory and
Network Infractructure
70-298 Designing Security for a Microsoft Windows Server 2003 Network
70-299 Implementing and Administering Security in a Microsoft Windows
Server 2003 Network
70-300 Analyzing Requirements and Defining Microsoft .NET Solutions
Architectures
70-301 Managing, Organizing, and Delivering IT Projects by Using
Microsoft Solutions Framework 3.0
70-305 Developing and Implementing Web Applications with Microsoft
Visual Basic .NET and Microsoft Visual Studio .NET
70-306 Developing and Implementing Windows-based Applications with
Microsoft Visual Basic .NET and Microsoft Visual Studio .NET
70-310 Developing XML Web Services and Server Components with Microsoft
Visual Basic .NET and the Microsoft .NET Framework
70-315 Developing and Implementing Web Applications with Microsoft
Visual C# .NET and Microsoft Visual Studio .NET
70-316 Developing and Implementing Windows-based Applications with
Microsoft Visual C# .NET and Microsoft Visual Studio .NET
70-320 Developing XML Web Services and Server Components with Microsoft
Visual C# .NET and the Microsoft .NET Framework
70-330 Implementing Security for Applications with Microsoft Visual
Basic .NET
70-340 Implementing Security for Applications with Microsoft Visual C# .NET

 Microsoft Office Certifications

Access 2003 Core
Excel 2003 Core
Excel 2003 Expert
Outlook 2003 Core
PowerPoint 2003 Core
Word 2003 Core
Word 2003 Expert
Access 2000 Core
Excel 2000 Core
Excel 2000 Expert
PowerPoint 2000 Core
Word 2000 Core
Word 2000 Expert
Access 2002 Core
Excel 2002 Core
Excel 2002 Expert
PowerPoint 2002 Core
Word 2002 Core
Word 2002 Expert

 Cisco Certifications

640-801 Cisco Certified Network Associate
640-811 Interconnecting Cisco Networking Devices
640-821 Introduction to Cisco Networking Technologies
640-861 Designing for Cisco Internetwork Solutions (DESIGN)
642-432 Cisco Voice Over IP
642-501 Securing Cisco IOS Networks
642-511 Cisco Secure Virtual Private Networks (CSVPN)
642-521 Cisco Cisco Secure PIX Firewall Advanced
642-531 Cisco Secure Intrusion Detection System (CSIDS)
642-541 Cisco SAFE Implementationi (CSI)
642-577 Cisco Wireless LAN Design Specialist
642-582 Cisco Wireless LAN Support Specialist
642-611 Implementing Cisco MPLS (MPLS)
642-642 Implementing Cisco Quality of Service (QoS)
642-661 Configuring BGP on Cisco Routers
642-801 Building Scalable Cisco Internetworks
642-811 Building Cisco Multilayer Switched Networks v2.0 (BCMSN)
642-821 Building Cisco Remote Access Networksv2.0 (BCRAN)
642-831 Cisco Internetwork Troubleshooting Support
642-871 Designing Cisco Network Service Architectures
642-891 Cisco Composite Exam


 (ISC)2 Certifications

CISSP CISSP
PMI Certifications

CAPM Certified Associate in Project Management
PMP Project Management Professional 2000


 CheckPoint Certifications

156-110 Check Point Certified Security Principles Associate
156-210 Check Point Certified Security Administrator 156-210.4


 CIW Certifications

1D0-420 CIW Site Designer
1D0-425 CIW E-Commerce
1D0-435 JavaScript Fundamentals


 ORACLE Certifications

1Z0-001 Introduction to Oracle: SQL and PL/SQL
1Z0-007 Introduction to Oracle9i
1Z0-010 Oracle8: New Features for Administrators (Certication Upgrade
from Oracle7 to Oracle
1Z0-020 Oracle8i: New Features for Administrators
1Z0-030 Oracle9i: New Features for Administrators
1Z0-031 Oracle9i: DBA Fundamentals I
1Z0-032 Oracle9i Database: Fundamentals II
1Z0-033 Oracle9i Performance Tuning
1Z0-035 Oracle9i New Features for Oracle7.3 and Oracle8 OCPs
1Z0-040 Oracle Database 10g: New Features for Administrators
1Z0-042 Oracle Database 10g: Administration I
1Z0-101 Develop PL/SQL Program Units
1Z0-130 Oracle Forms Rel. 1 to Rel. 6/6i New Features
1Z0-131 Build Internet Applications I
1Z0-132 Build Internet Applications II
1Z0-147 Oracle9i: Program with PL/SQL


 NOVEL Certifications

50-632 Networking Technologies
50-649 TCP/IP fro Networking Professionals
50-650 Internet Security Management with BorderManager Enterprise
Edition 3.5
50-653 NetWare 5.1 Administration
50-654 NetWare 5.1 Advanced Administration
50-658 Service and Support
50-664 Novel eDirectory Design & Implementation
50-676 Upgrading to NetWare 6
50-677 Foundatations of Novel Networking
50-681 Novel Network Nanagement: NetWare 6


 IBM Certifications
 IBM-700 DB2 UDB V8.1 Family Fundamentals

 LOTUS Certifications

273 LotusScript in Notes for Advanced Developers
513 Using JavaScript in Domino R5 Application
601 Notes Domino 6 Application Development Update
602 Notes Domino 6 System Administration Update
610 Notes Domino 6 Application Development Foundataion Skill
611 Notes Domino 6 Application Development Intermediate Skill
620 Notes Domino 6 System Administration Operating Fundamentals
621 Notes Domino 6: Building the Infrastructure
622 Notes Domino 6: Managing Servers and Users


 CompTIA Certifications

220-301 A+ 2003 Core Hardware
220-302 A+ 2003 Operating System Technologies
IK0-002 i-Net+
N10-002 Network+ 2002 Objectives
N10-003 Network+ 2005 Objectives
PK0-002 Project+
SK0-002 server+
SY0-101 Security+
XK0-001 Linux+


 SUN Certifications

310-014 Sun Certified System Administrator for Solaris 9 OE, Part I
310-015 Sun Certified System Administrator for Solaris 9 OE, Part II
310-016 Sun Certified System Administrator for Solaris 9 OE, Upgrade Exam
310-025 Sun Certified Programmer for Jave 2 Platform 1.2
310-035 Sun Certified Programmer for Jave 2 Platform 1.4
310-036 Sun Certified Programmer for Jave 2 Platform Upgrade Exam
310-044 Sun Certified Network Administrator for the Solaris 9 Operating
Environment

Download

http://www.filefactory.com/file/44cf9a/

or

http://www.filefactory.com/file/7f0dec/
http://www.filefactory.com/file/bcabdd/
http://www.filefactory.com/file/637134/
http://www.filefactory.com/file/216446/
http://www.filefactory.com/file/812f32/

430 MB

Wednesday, October 17, 2007

Adobe Vulnerability

Adobe has acknowledged "a critical security vulnerability in Adobe Reader and Acrobat" reported several weeks ago. The vulnerability affects only Windows XP with Internet Explorer 7 (Vista is not affected).


The workaround involves disabling the mailto: option in Acrobat and Reader, which is a pretty good clue that it is the vulnerable component. Alternatively, you can set it to prompt the user rather than disable it entirely.

If you are using the full Acrobat product, go to the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\8.0\FeatureLockDown\cDefaultLaunchURLPerms

If you are using Acrobat Reader, go to the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Acrobat Reader\8.0\FeatureLockDown\cDefaultLaunchURLPerms

In that key find the tSchemePerms data value.

* If tSchemePerms is set as follows:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|
mailto:2|file:2
* To Disable mailto (recommended)
Modify tSchemePerms by setting the mailto: value to 3:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|
mailto:3|file:2
* To set mailto to prompt
Modify tSchemePerms by removing the mailto: value:
version:1|shell:3|hcp:3|ms-help:3|ms-its:3|ms-itss:3|its:3|mk:3|mhtml:3|help:3|disk:3|afp:3|disks:3|telnet:3|ssh:3|acrobat:2|
file:2

Tuesday, October 16, 2007

Microsoft System Center Operations Manager 2007

Microsoft System Center Operations Manager 2007 ISO | 310 MB

System Center Operations Manager 2007 is the end-to-end service
management solution that is the best choice for Windows because it works
seamlessly with Microsoft software and applications helping you increase
efficiency while enabling greater control of your IT environment.

http://www.filefactory.com/file/d6ec27
http://www.filefactory.com/file/06d0c1
http://www.filefactory.com/file/55a038
http://www.filefactory.com/file/22e58f

Monday, October 15, 2007

TechSmith Camtasia Studio 5.0.0.384


Camtasia Studio is a complete solution for recording, editing and publishing rich screen video presentations. With support for a variety of video standards, you can ensure your content delivery now and in the future.


Record Anything
Easily create training, demonstrations, presentations, online courses... the possibilities are endless. Connect with your audience by including screen recordings, audio, voice narration, PowerPoint, Picture-in-Picture and webcam video.

Edit and Enhance
Edit and enhance your video with callouts, titles, credits, zooming, panning, quizzes and additional audio tracks. Camtasia Studio's extensive editing options are at your fingertips.

Share
Publish in Flash, QuickTime and a variety of video formats, then share on the Web, CD or DVD. You can use the Production Wizard to assist you in choosing the best format and settings for sharing with your audience, or you can have complete control over audio and video codecs and quality, frame rate, color depth, and inclusion or exclusion of special effects.

http://www.filefactory.com/file/2dbaa1/

Friday, October 12, 2007

Online School Books

This is really a good site to check for Tamil Nadu school books
available online:

http://www.textbooksonline.tn.nic.in/

Wednesday, October 10, 2007

Alex Gaudino - Destination Unknown

Watch this stunning song:

http://youtu.be/u6B0F6edMy8

Jacked


Jacked (ENG)

Game in the best traditions Road Rash raises the lath of quality to the
new level, and the hurricane of breakneck speed and severe fights makes
it necessary to forget about everything, except the desire to win fatal
race.

Twisting routes are full of obstacles, springboards and bonusov,
desperate rivals mchatsya next, aiming to stun and to knock out from the
saddle, and from the enormous speed, at which passes the race, the level
of sharp sensations can go off scale. Besides traditional weapon, in the
game be present the double-barrel, the cocktails of Molotov and even
grenade, which can be used for the separately effective destruction of
enemies. Besides this in the game there is the unique possibility to
take possession of the motorcycle of rival, after sending him to the
rigid encounter with the asphalt.

Special features of the product:
- the possibility to take the motorcycle of the enemy
- the wide arsenal of weapon, from the bits also of inhibitor to
Molotov's cocktail
-24 diverse missions, whose action is turned on the urban streets, the
dumps, the alpine routes and in the boundless steppes
-18 models of the sport motorcycles
-7 gripping play regimes, including "to take flag" and the "war of bands"
- regime split screen for the game two together

Minimum system requirements:
- the operating system Microsoft?® Windows?® XP
- Processor Pentium?® OF III 1 GHz
-600 MB. of vacant place on the hard disk
-256 MB. of the working storage
to -.GeForche FX (it does not support SHITYU 2/YA/.MKH and analogous) or
Radeon 9500
- the sonic device, compatible with DirectX?® 9..0c
-.DirechtKh?® 9.0s
- device for reading of the CDS

http://www.filefactory.com/file/46ab64/
http://www.filefactory.com/file/78321a/
http://www.filefactory.com/file/693cb0/
http://www.filefactory.com/file/a2d665/
http://www.filefactory.com/file/5fb931/
http://www.filefactory.com/file/65fc99/

Wednesday, October 3, 2007

Tally Full 9.1.0

Tally 9 now offers the following new and unique benefits:

Concurrent Multi-lingual Capability

* Operate in any language of your choice, concurrently *
* Enter accounts in the language of your choice, view reports in another
language and print them in yet another language, at the same time
* Enter data using normal keyboards with Tally phonetic key board support

* Currently, language support is available in 13 languages. Support for
many more languages will be available shortly.

Payroll
Tally 9 now offers enhanced payroll management that includes:

* Capturing of employee related information like general employee
details, payment details, statutory details, Passport and Visa details
and contract information.
* Multiple methods for calculation of salaries
* Auto-generation of payslips including multiple payslip printing
* Tracking of loans and advances
* Calculation of PF and Gratuity
* Support for Expatriate Employee processing and generation of expiry
reports

POS Invoicing

* Invoice printing in continuous mode
* Invoice printing on 40 column paper
* Faster data entry and calculation
* Barcode support, batch support, multi-mode payment
* Integration with accounts and inventory

Unlimited Companies and Consolidation of Companies

* Create and maintain any number of companies concurrently (up to 99,999
companies)
* Enables grouping of companies and provides consolidated reports
* Changes done in any constituent or branch company are automatically
updated in the grouped information
* Maintain multiple levels of group companies

Data Synchronisation

* Helps synchronise and update data across multiple locations
* Fast and easy access/exchange of business information across offices &
branches

http://www.filefactory.com/file/2b355e

(Rar Pass - warezkings.com)

or

http://rapidshare.com/files/52624293/Tally_Full_9.1.0_-_MassRush.rar


(Rar Pass - warezkings.com)

Note: If the file is with .html extension, rename with rar extension to
open it.

Thursday, September 27, 2007

Encyclopedia Britannica Ultimate 2008


Here is the link to download Britannica DVD:

Thousands of Articles, References and Magazine and Online Links
Start your research with over 100,000 articles and 166,000+ magazine and online links. 3 Encyclopedias in One- Elementary, Student, and Adult.
Find information with 3 encyclopedias written by professionals.


1.http://www.filefactory.com/file/e46ac0/
2.http://www.filefactory.com/file/7d2569/
3.http://www.filefactory.com/file/871790/
4.http://www.filefactory.com/file/553d51/
5.http://www.filefactory.com/file/c909e9/
6.http://www.filefactory.com/file/5205fc/
7.http://www.filefactory.com/file/dcd704/
8.http://www.filefactory.com/file/c9c056/
9.http://www.filefactory.com/file/7684a5/
10.http://www.filefactory.com/file/428901/
11.http://www.filefactory.com/file/ed1cbe/
12.http://www.filefactory.com/file/022c8b/
13.http://www.filefactory.com/file/865d66/
14.http://www.filefactory.com/file/c69436/
15.http://www.filefactory.com/file/fdd6ae/
16.http://www.filefactory.com/file/ded3f8/
17.http://www.filefactory.com/file/bd0fb6/
18.http://www.filefactory.com/file/28b947/
19.http://www.filefactory.com/file/ebdd22/
20.http://www.filefactory.com/file/010164/
21.http://www.filefactory.com/file/3c8746/
22.http://www.filefactory.com/file/5df2ba/
23.http://www.filefactory.com/file/90108c/
24.http://www.filefactory.com/file/a5a6e4/
25.http://www.filefactory.com/file/1910cc/
26.http://www.filefactory.com/file/0b548c/
27.http://www.filefactory.com/file/c83d9b/
28.http://www.filefactory.com/file/d71883/
29.http://www.filefactory.com/file/38e7b4/
30.http://www.filefactory.com/file/b8a89d/
31.http://www.filefactory.com/file/23571d/
32.http://www.filefactory.com/file/33a3b2/
33.http://www.filefactory.com/file/1f149e/
34.http://www.filefactory.com/file/07819a/

The Bourne Ultimatuam


Here is the link for pukka print of "The Bourne Ultimatuam":

http://dlnova.com/rs.php?protect=56931326/p-tbu.avi.001
http://dlnova.com/rs.php?protect=56931348/p-tbu.avi.002
http://dlnova.com/rs.php?protect=56931340/p-tbu.avi.003
http://dlnova.com/rs.php?protect=56931313/p-tbu.avi.004
http://dlnova.com/rs.php?protect=56931301/p-tbu.avi.005
http://dlnova.com/rs.php?protect=56931302/p-tbu.avi.006
http://dlnova.com/rs.php?protect=56931298/p-tbu.avi.007
http://dlnova.com/rs.php?protect=56930931/p-tbu.avi.008

Monday, September 24, 2007

Exchange 2007 Exam 70-236

CBT Nuggets Configuring Exchange Server (2007)
September 7th, 2007 — Admin

CBT Nuggets Configuring Exchange Server 2007 Exam Pack 70-236

Exam-Pack 70-236: Exchange Server 2007, Configuring gives you hands-on
skills for configurig Microsoft Exchange Server 2007. In addition to
these real-world skills, the series maps to exam objectives for
Microsoft Certified Technology Specialist (MCTS) exam 70-236, certifying
to employers that you have the skills to deploy and configure Exchange
Server 2007 for their business e-mail system.

Exam-Pack 70-236: Exchange Server 2007, Configuring contains:

- Series Intro
- Introduction to Exchange 2007
- Preparing and Installing Exchange 2007 (free video!)
- Managing Storage Groups and Databases
- Configure Public Folders
- Managing Recipient Objects: Mailboxes
- Managing More Recipient Objects
- E-mail Policies, Accepted Domains and Address Lists
- Configuring Your Client Access Server
- Outlook Anywhere and POP/IMAP Configuration
- Configuring Disaster Recovery
- Configure High Availability
- Understanding Message Transport
- Troubleshoot Message Transport
- Configuring Your Edge Transport Role
- Finalizing Edge Transport
- Configuring Anti-Spam
- Analyze and Monitor Exchange 2007
- A Look At Unified Messaging
- Troubleshooting Your Exchange Environment
- Using PowerShell
- Skills Measured by Exam 70-236

165 MB

http://www.filefactory.com/file/c4a680/
http://www.filefactory.com/file/276175/

Monday, September 17, 2007

Remove Fax icon from Cell phone

A lot of Cell phone users are facing this issue.

Some weeks before, the service providers tested with fax and we received
a fax.

Unable to read the fax and also to delete it from the mobile.

Atlast, we got solution for it.

Requirements:

Your mobile and one lower end model mobile (eg:-Nokia 1110).

* Switch off both the mobiles.

* Exchange the sim cards & power on the mobiles.

* Switch off and exchange the sim cards back to the original mobiles.

Now, the fax is removed from your cell phone.

This was tested and works perfectly.

XP Ultimate Edition 2007

Here is the set of links to download XP Ultimate Edition 2007:

http://www.filefactory.com/file/ad392a
http://www.filefactory.com/file/582ffb
http://www.filefactory.com/file/0caecd
http://www.filefactory.com/file/8dc53a
http://www.filefactory.com/file/d4d007
http://www.filefactory.com/file/2ab523
http://www.filefactory.com/file/b1311e
http://www.filefactory.com/file/143acf

Includes the following:

* XP + SP2 + Updates till June '07.
* Vista Themes + Sidebar.
* Window Thumbnail.
* Internet Explorer 7.
* Media Player 11.
* Media Center Edition.
* CD Burning software.
* Yahoo Messenger.
* Winrar.

How logging works in Update mode

Logs from the Outlook Time Zone Data Update tool

When the Outlook tool is run, the tool creates a log file in the temp directory. This file is named "Outlook Time Zone Update.log." Msextmz.exe extracts the information from "Outlook Time Zone Update.log," and then creates per-user log files in the directory that is specified in the LogDirectory of the .ini file.

These files are named by using the following format:
MSExTmz-User’s CN from the User DN-Random number.LOG
For example, the Outlook tool logs the following information:
MSExTmz-USER3-0x0131273E.LOG
The Outlook tool does this when it processes a user who has the following DN:
/O=FIRST ORGANIZATION/OU=FIRST ADMINISTRATIVE GROUP/CN=RECIPIENTS/CN=USER3

Error file

If Msextmz.exe is unable to run the Outlook tool against any mailbox, the DN of the user will be logged in the error file. Msextmz.exe will not log anything to the error file if the Outlook tool ran successfully.

Log file

If the Log file option is configured in the Msextmz.ini file, the information output from Msextmz.exe to the Command Prompt window is also available in the specified file.

"Grant Mailbox Permission" script

You can use the sample GrantMailboxPermission.vbs script to grant a domain user Full Mailbox Access and Send As rights to all mailboxes.

This script can be run only by an Exchange administrator on a computer that is running Exchange 2000 Server or Exchange Server 2003. This script cannot be run on a computer that is running Exchange Server 2007. However, you can use the Exchange Management Shell to grant the necessary permissions.

The code for the VBS script is provided in the "References" section. The following table describes the two modes in which this script runs.
Mode Command line Description
Add CScript GrantMailboxPermission.vbs –add Domain_Name\User_Name File_Name Grants Domain_Name\User_Name Full Mailbox Access and Send As rights to user mailboxes that are listed in the input file. The input file must be a text file that contains legacy DNs of the user mailboxes that are delimited by CRLF.

The script generates a GrantMailboxPermission.log file. This file is a record of the mailboxes that were processed. The first line of the log file is the Domain_Name\User_Name user who is granted access. Do not delete this file. This file is used in the Remove mode.

If an explicit "deny" access has been assigned to the user, the script logs the information in a file that is named "GrantMailboxPermission.err." The script will not grant or change the permission.

If the user is part of a security group that has been assigned "deny" access, the script grants Full Mailbox Access and Send As permissions. However, the user will be unable to log on to the mailbox. All errors will be logged in the GrantMailboxPermission.err file.
Remove CScript GrantMailboxPermission.vbs –remove Removes Full Mailbox Access and Send As rights to mailboxes that are listed in the GrantMailboxPermission.log file from Domain_Name\User_Name. The Domain_Name\User_Name is specified in the GrantMailboxPermission.log file.
Note When you run this script on the computer that is running Exchange Server, the script returns a period (.) when the script successfully processes a user. The script returns an exclamation point (!) if it does not successfully process a user.

Note The output file of the Time Zone Extraction mode cannot be used as an input file for this script. To create the input file for this script, you can paste the contents of the Time Zone Extraction output file into Notepad, save the contents as a new document, and then use the new document as the input file.

Configure permissions for Msextmz.exe

The permissions that are required to run Msextmz.exe depend on the execution mode that is used. The following table lists the permissions that are needed for each execution mode.
Execution mode Permissions
Time Zone Extraction Exchange View-Only Administrator
Local administrator of the computer that is running Msextmz.exe
Update Domain user who has Full Mailbox Access and Send As rights to all mailboxes
Local administrator of the computer that is running Msextmz.exe

Manually configure and run Msextmz.exe

Configure the Msextmz.ini file

The Msextmz.ini file must be configured correctly for Msextmz.exe to run correctly. We recommend that you read the comments in the Msextmz.ini file carefully before you modify the Msextmz.ini file.

Specify the Msextmz.exe execution mode

Msextmz.exe runs in two modes. To specify the mode of execution, specific parameters have to be set in the Msextmz.ini file. The following list describes the three modes and describes how to configure the modes in the Msextmz.ini file.
Time Zone Extraction

In this mode, Msextmz.exe extracts time zone information from each mailbox by reading a set of MAPI properties.

Msextmz.exe can examine recurring appointments that are organized by the user in the user’s calendar and then try to determine a time zone for the user. However, this option is resource-intensive. By default, therefore, this option is not enabled. To enable this option, set the ReadCalendarTimezones parameter in the Msextmz.ini file.

Msextmz.exe records the time zone information for each user in an output file that contains a list of mailbox legacy DNs. Each mailbox legacy DN has the following types of time zone values:
Outlook Web Access Time Zone
CDO Time Zone
Outlook Time Zone
Recurring Meeting Time Zone
The format of the file uses the following format:
User_DN<\TAB >CDO_Time_Zone<\TAB>Outlook Web Access_Time_Zone<\TAB>Outlook_Time_Zone<\TAB >Recurring_Meeting_Time_Zone<\CRLF>
If Msextmz.exe cannot extract time zone information for any of the four types of time zones, the mailbox legacy DN will be logged in the error file.

To map the user to only one time zone, you must import the output file to Microsoft Excel. In Excel, filter the list of users according to one of the time zones. The time zone that you use depends on your environment.

For example, if most users use BlackBerry devices, Exchange 5.5 Outlook Web Access, or other CDO-based solutions, filter the list by CDO Time Zone. If most users use Exchange Outlook Web Access, filter the list by Outlook Web Access Time Zone. If most users do not fit into one of these scenarios, filter the list by Recurring Meeting Time Zone.

To run the tool in Time Zone Extraction mode, configure the .ini file as follows:
Leave the CommandLine parameter uncommented.
Set the OutputFile parameter.
Set the ErrorFile parameter.
Set the ServerDN parameter.
Set the Profile parameter.
Set the LogFile parameter.
Set the ExportTimezones parameter to 1.
Comment out the rest of the parameters in the .ini file.
Update

In this mode, Msextmz.exe will update all mailboxes that are specified in an input file. The input file should be in the following format:
User_DN<\TAB>Server_Friendly_Name<\TAB>OS_Time Zone_Registry_Key<\CRLF>
Only one instance of Msextmz.exe can run on one client. However, Msextmz.exe can be run on multiple clients at the same time.

To run Msextmz.exe in this mode, you must configure the Msextmz.ini file as follows:
Make sure that the CommandLine parameter is uncommented and points to the correct location of Tzmove.exe.
Set the InputFile parameter.
Comment out the OutputFile parameter.
Set the ErrorFile parameter.
Set the ServerDN parameter.
Set the LogFile parameter.
Set the LogDirectory parameter.
Comment out the ExportTimezones parameter.
Uncomment remaining parameters.
In Update mode, Msextmz.exe can accept an input file that contains users on different Exchange servers. The .ini setting requires that you provide the DN of an Exchange server. In this case, you only have to specify a server DN of an Exchange server in the Exchange organization.

To update recurring appointments only, configure the CommandLine parameter with the following value:
tzmove.exe /q /onlyrecurring
To update both recurring and single-instance appointments, use the default CommandLine value.

Install the Exchange tool

The Exchange Calendar Update Tool is available in the form of the self-extracting executable file Msextmz.exe.

After installation, the files in the installation directory should include the following files:
Msextmz.exe
Msextmzcfg.exe
Msextmz.ini

This file is the master .ini file that documents all parameters that are used by Msextmz.exe.
Msextmzcfg.xml

This file is the time zone mapping file that maps Outlook, CDO, and Outlook Web Access time zones to operating system time zones.
For more information about the latest version of the Exchange Calendar Update tool, click the following article number to view the article in the Microsoft Knowledge Base:
941018 (http://support.microsoft.com/kb/941018/) How to address daylight saving time by using the Exchange Calendar Update Tool

Versions of Exchange Server that are compatible with the Exchange tool

The Exchange tool can update mailboxes on the following versions of Exchange Server:
Microsoft Exchange Server 2007 Enterprise Edition
Microsoft Exchange Server 2007
Microsoft Exchange Server 2007 Standard Edition
Microsoft Exchange Server 2003
Microsoft Exchange Server 2003 Enterprise Edition
Microsoft Exchange 2000 Server
Microsoft Exchange Server 2003 Standard Edition
Microsoft Exchange 2000 Server Enterprise Edition
Microsoft Exchange 2000 Server Standard Edition

Operating systems that are supported by the Exchange tool

The Exchange tool will run on the following operating systems:
Microsoft Windows Server 2003
Microsoft Windows XP
Microsoft Windows 2000
Windows Vista is not supported as of September 7, 2007 update.

Confirm That You Set Public Folder Storage Limits Correctly in Exchange 2000

To confirm that you configured the public folder limits correctly:
1. Change the generate warnings schedule to run constantly on the public folder store.
2. Modify the permissions on a test public folder so that only you can add items to that public folder.
3. Log on to Outlook as yourself, and then add postings and attachments to the public folders until you receive the warning messages.

NOTE: It may take up to 15 minutes after you add the postings to receive the message.
4. Add postings that have attachments that exceed the allowable size limit.

These postings cannot be saved to the folder.
If you exceed the prohibit post limit, any messages that you send to the public folders are returned as undeliverable. After you confirm the public folder store limits, use the same procedure on a public folder on which you set individual limits.

To check for folder sizes in Outlook:
1. Log on to the Outlook client computer.
2. In the Folder List column, expand Public Folders, right-click All Public Folders, and then click Properties.
3. Click the General tab, and then click Folder Size.
To check folder sizes in Exchange System Manager, click the Public Folders object under Public Folder Store (Servername) in the left pane. The mailboxes that are hosted on that store, their size, and the number of items that they contain are displayed in the right pane.

NOTE: After you finish testing, reset the schedule to generate warning messages.

Set Limits on Individual Public Folders in Exchange 2000

You can configure individual public folder limits on a folder that exists in the public folder store to override the store limits:
1. Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager.
2. In the left pane, expand the Exchange 2000 hierarchy until you find the Servers container.

If an Administrative Groups container is displayed, the Servers container is under the respective administrative group.
3. Expand the Servers container, click the server that hosts the public folder store that you want to configure, and then double-click Storage group in the right pane.
4. Expand the public folder store that you want to configure, and then click Public Folders.

A list of the public folders that are hosted on the selected public folder store is displayed in the right pane.
5. Double-click on the public folder that you want to configure, and then click the Limits tab.

The Use public store defaults check box is selected and the public store limits are shaded, by default.
6. Click to clear the Use public store defaults check box, and then configure the Issue warning at setting, the Prohibit post setting, and the Maximum Item setting to the limit (in KB) that is required on this public folder.
7. Optionally, you can clear the Use public store defaults check box under Deletion Settings to configure different settings for deleted items on this public store.
8. Click OK.

Set Limits on Public Folder Stores in Exchange 2000

You use a slightly different procedure to set limits on public folder stores than the procedure that you use to set limits on a mailbox store because you cannot set the prohibit send setting on a public folder.
1. Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager.
2. In the left pane, expand the Exchange 2000 hierarchy until you find the Servers container.

If an Administrative Groups container is displayed, the Servers container is under the respective administrative group.
3. Expand the Servers container, click the server that hosts the public folder store that you want to configure, and then double-click Storage group in the right pane.
4. Right-click the public folder store that you want to configure, click Properties, and then click the Limits tab.
5. Click to select one or all of the following check boxes under Storage limits:
a. Issue warning at: Select this check box to warn the users that have public folder Owner or Folder Contact roles that their public folder has exceeded its limit. However, normal functioning of the public folder continues.
b. Prohibit post at: Select this check box to prevent new messages from being posted to the folder if the folder reaches the size that you specify.
c. Maximum item size: Select this check box to prevent anyone from posting messages that are larger than a certain size, regardless of how full the folder is.

NOTE: Type the size value in KB for the majority of the public folders that are hosted in this store, for example, type 20,000 KB for the limit of a message-based public folder and type 100 KB for the Maximum item size setting.
6. Either click the time that you want the warning messages to be generated in the Warning message interval box or click Customize.
7. If you click Customize, either click a day in the left column and a time on the top row or click and hold the mouse button as you sweep across the time slots to configure warning settings.

NOTE: To configure the schedule to be displayed in hour slots or in 15-minute slots, click the appropriate setting under Detail View.
8. After you configure the warning message interval times, click OK.
9. If you want maximum control of your database sizes, configure the Keep deleted items for (days) setting to 0. Otherwise, Microsoft recommends that you a configure this setting to 7 days. Deleted item retention time is more important on public folders, where items are deleted immediately and are not sent to the Deleted Items folder.
10. After you finish configuring public folder store limits, click OK.

Plan Public Folder Limits in Exchange 2000

If you plan to use the public folders regularly, Microsoft recommends that you consider the maximum size of these folders, and then implement the limits before you make the folders available to users. This order is important for a number of reasons:
Messaging Application Programming Interface (MAPI) clients such as Microsoft Outlook can only use the default public folder tree, which is associated with the default public folder store in the first storage group that is created on each Exchange 2000 computer. If you want all of your public folders to be accessible over MAPI, you need to limit yourself to one public folder store for each server.
Although Exchange 2000 Enterprise edition removes the 16-gigabyte (GB) limit on an individual mailbox store, there are practical limits for backing up and restoring databases. Microsoft recommends that you use a 50-GB limit (approximately) for a single mailbox store.
Public folders are often used as archives; therefore, they tend to fill up eventually unless controls are implemented.
You can configure expiration policies on public folders to delete postings that are older than a certain age. However, this procedure is not appropriate for certain types of public folders, such as those folders that store contact details.
You may want to configure limits on a typical public folder that is used for simple posts to 20 megabytes (MB) and the limits on an archive folder to 100 MB. However, you may not want to configure limits on a Contacts folder (to make the space unlimited).
Like mailbox limits, you configure public folder limits on the public folder store; however, you can configure individual public folder limits to override the limits that you set on the store.
To perform an in-place restore, Microsoft recommends that your disks have at least as much free space as the size of the database itself plus at least 10 percent. For example, a 35-GB database runs on an 80-GB partition.
Remember that the deleted item retention time also affects the size of a public folder store because items are not actually deleted until after the deleted item retention time has expired.

Recover a Deleted Mailbox in Exchange

To Delete a Mailbox in Exchange

1. Right-click the user in Active Directory Users and Computers.
2. Click Exchange Tasks.
3. Click Next on the Welcome page of the Exchange Task Wizard.
4. Click Delete Mailbox.
5. Click Next, click Next, and then click Finish.
The mailbox is now flagged for deletion and will be permanently deleted at the end of the mailbox retention period unless you recover it.

To Reconnect (or Recover) a Deleted Mailbox

1. In Exchange System Manager, locate the mailbox store that contains the disconnected mailbox.
2. Click the Mailboxes object under the mailbox store.
3. If the mailbox is not already marked as disconnected (the mailbox icon appears with a red X), right-click the Mailboxes object, and then click Cleanup Agent.
4. Right-click the disconnected mailbox, click Reconnect, and then select the appropriate user from the dialog box that appears.
5. Click OK.
Note Only one user may be connected to a mailbox because all globally unique identifiers (GUIDs) are required to be unique across an entire forest.

To Reconnect a Deleted Mailbox to a New User Object

1. In Active Directory Users and Computers, create a new user object. When you create the new user object, click to clear the Create an Exchange Mailbox check box.

You will connect this user account to an already existing mailbox.
2. Follow steps 1 through 4 in the preceding "To Reconnect (or Recover) a Deleted Mailbox" section.

To Configure the Mailbox Retention Period

1. Right-click the mailbox store, and then click Properties.
2. On the Limits tab, change the Keep deleted mailboxes for (days) default setting of 30 to the number of days you want.
3. Click OK.

How to Confirm That You Set Mailbox Storage Limits Correctly

To confirm that the mailbox store limits work, change the generate warnings schedule to run constantly, create a dummy user account and mailbox, and then add messages to that mailbox until the warning messages are displayed. You may receive the warning message up to 15 minutes after you have added the messages. After you exceed the Prohibit send and receive setting, any messages that you send to the test account are returned as undeliverable.

After you confirm the mailbox store limits, configure different mailbox limits for the test user, log off Outlook, and then log on again. The mailbox receives mail again.

NOTE: To check for folder sizes in Outlook:
1. Log on to the Outlook client computer.
2. In the Folder List column, right-click Outlook Today, and then click Properties for Mailbox (User Name).
3. Click the General tab, and then click the Folder Size.
To check folder sizes in Exchange System Manager, click the Mailboxes object under Mailbox Store (Servername) in the left pane. The mailboxes that are hosted on that store, their size, and the number of items that they contain are displayed in the right pane.

NOTE: After you finish testing, reset the schedule to generate warning messages.

Troubleshooting

If you configure storage limits, note that the mailbox limits are measured in KB and not megabytes (MB). If you do not make this distinction, you may type 100 KB instead of 100,000 KB as the mailbox limit.

How to Set Limits on Individual Mailboxes

All mailboxes that have a mailbox store have the same limit that is set on that mailbox store. However, you can configure individual mailbox limits to override the limits that you set for the mailbox store.
1. Click Start, point to Programs, point to Microsoft Exchange, and then click Active Directory Users and Computers.
2. In the left pane, expand Domain, and then expand Organizational units.
3. Open the organizational unit that contains the mailbox that you want to configure.
4. Right-click the mailbox, and then click Properties.
5. Click the Exchange General tab, and then click Storage Limits.

The Use mailbox store defaults check box is selected and the mailbox limits are shaded by default.
6. Click to clear the Use mailbox store defaults check box, and then configure either the Issue warning at setting, the Prohibit send at setting, or the Prohibit send and receive at setting as required on this mailbox.
7. Optionally, click to clear the Use mailbox store defaults under Deleted Item Retention to configure different settings for this mailbox.
8. Click OK, and then click OK.