Thursday, September 27, 2007
Encyclopedia Britannica Ultimate 2008
Here is the link to download Britannica DVD:
Thousands of Articles, References and Magazine and Online Links
Start your research with over 100,000 articles and 166,000+ magazine and online links. 3 Encyclopedias in One- Elementary, Student, and Adult.
Find information with 3 encyclopedias written by professionals.
1.http://www.filefactory.com/file/e46ac0/
2.http://www.filefactory.com/file/7d2569/
3.http://www.filefactory.com/file/871790/
4.http://www.filefactory.com/file/553d51/
5.http://www.filefactory.com/file/c909e9/
6.http://www.filefactory.com/file/5205fc/
7.http://www.filefactory.com/file/dcd704/
8.http://www.filefactory.com/file/c9c056/
9.http://www.filefactory.com/file/7684a5/
10.http://www.filefactory.com/file/428901/
11.http://www.filefactory.com/file/ed1cbe/
12.http://www.filefactory.com/file/022c8b/
13.http://www.filefactory.com/file/865d66/
14.http://www.filefactory.com/file/c69436/
15.http://www.filefactory.com/file/fdd6ae/
16.http://www.filefactory.com/file/ded3f8/
17.http://www.filefactory.com/file/bd0fb6/
18.http://www.filefactory.com/file/28b947/
19.http://www.filefactory.com/file/ebdd22/
20.http://www.filefactory.com/file/010164/
21.http://www.filefactory.com/file/3c8746/
22.http://www.filefactory.com/file/5df2ba/
23.http://www.filefactory.com/file/90108c/
24.http://www.filefactory.com/file/a5a6e4/
25.http://www.filefactory.com/file/1910cc/
26.http://www.filefactory.com/file/0b548c/
27.http://www.filefactory.com/file/c83d9b/
28.http://www.filefactory.com/file/d71883/
29.http://www.filefactory.com/file/38e7b4/
30.http://www.filefactory.com/file/b8a89d/
31.http://www.filefactory.com/file/23571d/
32.http://www.filefactory.com/file/33a3b2/
33.http://www.filefactory.com/file/1f149e/
34.http://www.filefactory.com/file/07819a/
The Bourne Ultimatuam
Here is the link for pukka print of "The Bourne Ultimatuam":
http://dlnova.com/rs.php?protect=56931326/p-tbu.avi.001
http://dlnova.com/rs.php?protect=56931348/p-tbu.avi.002
http://dlnova.com/rs.php?protect=56931340/p-tbu.avi.003
http://dlnova.com/rs.php?protect=56931313/p-tbu.avi.004
http://dlnova.com/rs.php?protect=56931301/p-tbu.avi.005
http://dlnova.com/rs.php?protect=56931302/p-tbu.avi.006
http://dlnova.com/rs.php?protect=56931298/p-tbu.avi.007
http://dlnova.com/rs.php?protect=56930931/p-tbu.avi.008
Monday, September 24, 2007
Exchange 2007 Exam 70-236
September 7th, 2007 — Admin
CBT Nuggets Configuring Exchange Server 2007 Exam Pack 70-236
Exam-Pack 70-236: Exchange Server 2007, Configuring gives you hands-on
skills for configurig Microsoft Exchange Server 2007. In addition to
these real-world skills, the series maps to exam objectives for
Microsoft Certified Technology Specialist (MCTS) exam 70-236, certifying
to employers that you have the skills to deploy and configure Exchange
Server 2007 for their business e-mail system.
Exam-Pack 70-236: Exchange Server 2007, Configuring contains:
- Series Intro
- Introduction to Exchange 2007
- Preparing and Installing Exchange 2007 (free video!)
- Managing Storage Groups and Databases
- Configure Public Folders
- Managing Recipient Objects: Mailboxes
- Managing More Recipient Objects
- E-mail Policies, Accepted Domains and Address Lists
- Configuring Your Client Access Server
- Outlook Anywhere and POP/IMAP Configuration
- Configuring Disaster Recovery
- Configure High Availability
- Understanding Message Transport
- Troubleshoot Message Transport
- Configuring Your Edge Transport Role
- Finalizing Edge Transport
- Configuring Anti-Spam
- Analyze and Monitor Exchange 2007
- A Look At Unified Messaging
- Troubleshooting Your Exchange Environment
- Using PowerShell
- Skills Measured by Exam 70-236
165 MB
http://www.filefactory.com/file/c4a680/
http://www.filefactory.com/file/276175/
Thursday, September 20, 2007
Visual Studio 2005 + MSDN
http://www.filefactory.com/file/317afd
http://www.filefactory.com/file/3a1f89
http://www.filefactory.com/file/aed445
http://www.filefactory.com/file/aab3d5
http://www.filefactory.com/file/dd9cbe
http://www.filefactory.com/file/66ab27
http://www.filefactory.com/file/0c0c0f
http://www.filefactory.com/file/93cbff
http://www.filefactory.com/file/c5c6cf
http://www.filefactory.com/file/dd8fb7
http://www.filefactory.com/file/a14f0b
http://www.filefactory.com/file/8a9db1
http://www.filefactory.com/file/6993a6
http://www.filefactory.com/file/b1004a
http://www.filefactory.com/file/66a626
http://www.filefactory.com/file/4e0056
http://www.filefactory.com/file/04bb37
http://www.filefactory.com/file/5d4093
http://www.filefactory.com/file/1c172c
http://www.filefactory.com/file/766451
http://www.filefactory.com/file/690587
http://www.filefactory.com/file/e0ee33
http://www.filefactory.com/file/7f316c
http://www.filefactory.com/file/60b178
http://www.filefactory.com/file/658e64
http://www.filefactory.com/file/018dda
http://www.filefactory.com/file/03d6b5
http://www.filefactory.com/file/4aadf8
http://www.filefactory.com/file/f7b0b2
http://www.filefactory.com/file/1419ad
http://www.filefactory.com/file/320845
http://www.filefactory.com/file/2f7bb6
Monday, September 17, 2007
Remove Fax icon from Cell phone
Some weeks before, the service providers tested with fax and we received
a fax.
Unable to read the fax and also to delete it from the mobile.
Atlast, we got solution for it.
Requirements:
Your mobile and one lower end model mobile (eg:-Nokia 1110).
* Switch off both the mobiles.
* Exchange the sim cards & power on the mobiles.
* Switch off and exchange the sim cards back to the original mobiles.
Now, the fax is removed from your cell phone.
This was tested and works perfectly.
XP Ultimate Edition 2007
http://www.filefactory.com/file/ad392a
http://www.filefactory.com/file/582ffb
http://www.filefactory.com/file/0caecd
http://www.filefactory.com/file/8dc53a
http://www.filefactory.com/file/d4d007
http://www.filefactory.com/file/2ab523
http://www.filefactory.com/file/b1311e
http://www.filefactory.com/file/143acf
Includes the following:
* XP + SP2 + Updates till June '07.
* Vista Themes + Sidebar.
* Window Thumbnail.
* Internet Explorer 7.
* Media Player 11.
* Media Center Edition.
* CD Burning software.
* Yahoo Messenger.
* Winrar.
How logging works in Update mode
Logs from the Outlook Time Zone Data Update tool
When the Outlook tool is run, the tool creates a log file in the temp directory. This file is named "Outlook Time Zone Update.log." Msextmz.exe extracts the information from "Outlook Time Zone Update.log," and then creates per-user log files in the directory that is specified in the LogDirectory of the .ini file.These files are named by using the following format:
Error file
If Msextmz.exe is unable to run the Outlook tool against any mailbox, the DN of the user will be logged in the error file. Msextmz.exe will not log anything to the error file if the Outlook tool ran successfully.Log file
If the Log file option is configured in the Msextmz.ini file, the information output from Msextmz.exe to the Command Prompt window is also available in the specified file."Grant Mailbox Permission" script
This script can be run only by an Exchange administrator on a computer that is running Exchange 2000 Server or Exchange Server 2003. This script cannot be run on a computer that is running Exchange Server 2007. However, you can use the Exchange Management Shell to grant the necessary permissions.
The code for the VBS script is provided in the "References" section. The following table describes the two modes in which this script runs.
Mode | Command line | Description |
---|---|---|
Add | CScript GrantMailboxPermission.vbs –add Domain_Name\User_Name File_Name | Grants Domain_Name\User_Name Full Mailbox Access and Send As rights to user mailboxes that are listed in the input file. The input file must be a text file that contains legacy DNs of the user mailboxes that are delimited by CRLF. The script generates a GrantMailboxPermission.log file. This file is a record of the mailboxes that were processed. The first line of the log file is the Domain_Name\User_Name user who is granted access. Do not delete this file. This file is used in the Remove mode. If an explicit "deny" access has been assigned to the user, the script logs the information in a file that is named "GrantMailboxPermission.err." The script will not grant or change the permission. If the user is part of a security group that has been assigned "deny" access, the script grants Full Mailbox Access and Send As permissions. However, the user will be unable to log on to the mailbox. All errors will be logged in the GrantMailboxPermission.err file. |
Remove | CScript GrantMailboxPermission.vbs –remove | Removes Full Mailbox Access and Send As rights to mailboxes that are listed in the GrantMailboxPermission.log file from Domain_Name\User_Name. The Domain_Name\User_Name is specified in the GrantMailboxPermission.log file. |
Note The output file of the Time Zone Extraction mode cannot be used as an input file for this script. To create the input file for this script, you can paste the contents of the Time Zone Extraction output file into Notepad, save the contents as a new document, and then use the new document as the input file.
Configure permissions for Msextmz.exe
Execution mode | Permissions |
---|---|
Time Zone Extraction | Exchange View-Only Administrator Local administrator of the computer that is running Msextmz.exe |
Update | Domain user who has Full Mailbox Access and Send As rights to all mailboxes Local administrator of the computer that is running Msextmz.exe |
Manually configure and run Msextmz.exe
Configure the Msextmz.ini file
The Msextmz.ini file must be configured correctly for Msextmz.exe to run correctly. We recommend that you read the comments in the Msextmz.ini file carefully before you modify the Msextmz.ini file.Specify the Msextmz.exe execution mode
Msextmz.exe runs in two modes. To specify the mode of execution, specific parameters have to be set in the Msextmz.ini file. The following list describes the three modes and describes how to configure the modes in the Msextmz.ini file.• | Time Zone Extraction In this mode, Msextmz.exe extracts time zone information from each mailbox by reading a set of MAPI properties. Msextmz.exe can examine recurring appointments that are organized by the user in the user’s calendar and then try to determine a time zone for the user. However, this option is resource-intensive. By default, therefore, this option is not enabled. To enable this option, set the ReadCalendarTimezones parameter in the Msextmz.ini file. Msextmz.exe records the time zone information for each user in an output file that contains a list of mailbox legacy DNs. Each mailbox legacy DN has the following types of time zone values:
User_DN<\TAB >CDO_Time_Zone<\TAB>Outlook Web Access_Time_Zone<\TAB>Outlook_Time_Zone<\TAB >Recurring_Meeting_Time_Zone<\CRLF> If Msextmz.exe cannot extract time zone information for any of the four types of time zones, the mailbox legacy DN will be logged in the error file.To map the user to only one time zone, you must import the output file to Microsoft Excel. In Excel, filter the list of users according to one of the time zones. The time zone that you use depends on your environment. For example, if most users use BlackBerry devices, Exchange 5.5 Outlook Web Access, or other CDO-based solutions, filter the list by CDO Time Zone. If most users use Exchange Outlook Web Access, filter the list by Outlook Web Access Time Zone. If most users do not fit into one of these scenarios, filter the list by Recurring Meeting Time Zone. To run the tool in Time Zone Extraction mode, configure the .ini file as follows:
| ||||||||||||||||||||||||
• | Update In this mode, Msextmz.exe will update all mailboxes that are specified in an input file. The input file should be in the following format: User_DN<\TAB>Server_Friendly_Name<\TAB>OS_Time Zone_Registry_Key<\CRLF> Only one instance of Msextmz.exe can run on one client. However, Msextmz.exe can be run on multiple clients at the same time.To run Msextmz.exe in this mode, you must configure the Msextmz.ini file as follows:
To update recurring appointments only, configure the CommandLine parameter with the following value: tzmove.exe /q /onlyrecurring To update both recurring and single-instance appointments, use the default CommandLine value. |
Install the Exchange tool
After installation, the files in the installation directory should include the following files:
• | Msextmz.exe |
• | Msextmzcfg.exe |
• | Msextmz.ini This file is the master .ini file that documents all parameters that are used by Msextmz.exe. |
• | Msextmzcfg.xml This file is the time zone mapping file that maps Outlook, CDO, and Outlook Web Access time zones to operating system time zones. |
Versions of Exchange Server that are compatible with the Exchange tool
The Exchange tool can update mailboxes on the following versions of Exchange Server:• | Microsoft Exchange Server 2007 Enterprise Edition |
• | Microsoft Exchange Server 2007 |
• | Microsoft Exchange Server 2007 Standard Edition |
• | Microsoft Exchange Server 2003 |
• | Microsoft Exchange Server 2003 Enterprise Edition |
• | Microsoft Exchange 2000 Server |
• | Microsoft Exchange Server 2003 Standard Edition |
• | Microsoft Exchange 2000 Server Enterprise Edition |
• | Microsoft Exchange 2000 Server Standard Edition |
Operating systems that are supported by the Exchange tool
The Exchange tool will run on the following operating systems:• | Microsoft Windows Server 2003 |
• | Microsoft Windows XP |
• | Microsoft Windows 2000 |
Confirm That You Set Public Folder Storage Limits Correctly in Exchange 2000
1. | Change the generate warnings schedule to run constantly on the public folder store. |
2. | Modify the permissions on a test public folder so that only you can add items to that public folder. |
3. | Log on to Outlook as yourself, and then add postings and attachments to the public folders until you receive the warning messages. NOTE: It may take up to 15 minutes after you add the postings to receive the message. |
4. | Add postings that have attachments that exceed the allowable size limit. These postings cannot be saved to the folder. |
To check for folder sizes in Outlook:
1. | Log on to the Outlook client computer. |
2. | In the Folder List column, expand Public Folders, right-click All Public Folders, and then click Properties. |
3. | Click the General tab, and then click Folder Size. |
NOTE: After you finish testing, reset the schedule to generate warning messages.
Set Limits on Individual Public Folders in Exchange 2000
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager. |
2. | In the left pane, expand the Exchange 2000 hierarchy until you find the Servers container. If an Administrative Groups container is displayed, the Servers container is under the respective administrative group. |
3. | Expand the Servers container, click the server that hosts the public folder store that you want to configure, and then double-click Storage group in the right pane. |
4. | Expand the public folder store that you want to configure, and then click Public Folders. A list of the public folders that are hosted on the selected public folder store is displayed in the right pane. |
5. | Double-click on the public folder that you want to configure, and then click the Limits tab. The Use public store defaults check box is selected and the public store limits are shaded, by default. |
6. | Click to clear the Use public store defaults check box, and then configure the Issue warning at setting, the Prohibit post setting, and the Maximum Item setting to the limit (in KB) that is required on this public folder. |
7. | Optionally, you can clear the Use public store defaults check box under Deletion Settings to configure different settings for deleted items on this public store. |
8. | Click OK. |
Set Limits on Public Folder Stores in Exchange 2000
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager. | ||||||
2. | In the left pane, expand the Exchange 2000 hierarchy until you find the Servers container. If an Administrative Groups container is displayed, the Servers container is under the respective administrative group. | ||||||
3. | Expand the Servers container, click the server that hosts the public folder store that you want to configure, and then double-click Storage group in the right pane. | ||||||
4. | Right-click the public folder store that you want to configure, click Properties, and then click the Limits tab. | ||||||
5. | Click to select one or all of the following check boxes under Storage limits:
| ||||||
6. | Either click the time that you want the warning messages to be generated in the Warning message interval box or click Customize. | ||||||
7. | If you click Customize, either click a day in the left column and a time on the top row or click and hold the mouse button as you sweep across the time slots to configure warning settings. NOTE: To configure the schedule to be displayed in hour slots or in 15-minute slots, click the appropriate setting under Detail View. | ||||||
8. | After you configure the warning message interval times, click OK. | ||||||
9. | If you want maximum control of your database sizes, configure the Keep deleted items for (days) setting to 0. Otherwise, Microsoft recommends that you a configure this setting to 7 days. Deleted item retention time is more important on public folders, where items are deleted immediately and are not sent to the Deleted Items folder. | ||||||
10. | After you finish configuring public folder store limits, click OK. |
Plan Public Folder Limits in Exchange 2000
• | Messaging Application Programming Interface (MAPI) clients such as Microsoft Outlook can only use the default public folder tree, which is associated with the default public folder store in the first storage group that is created on each Exchange 2000 computer. If you want all of your public folders to be accessible over MAPI, you need to limit yourself to one public folder store for each server. |
• | Although Exchange 2000 Enterprise edition removes the 16-gigabyte (GB) limit on an individual mailbox store, there are practical limits for backing up and restoring databases. Microsoft recommends that you use a 50-GB limit (approximately) for a single mailbox store. |
• | Public folders are often used as archives; therefore, they tend to fill up eventually unless controls are implemented. |
• | You can configure expiration policies on public folders to delete postings that are older than a certain age. However, this procedure is not appropriate for certain types of public folders, such as those folders that store contact details. |
• | You may want to configure limits on a typical public folder that is used for simple posts to 20 megabytes (MB) and the limits on an archive folder to 100 MB. However, you may not want to configure limits on a Contacts folder (to make the space unlimited). |
• | Like mailbox limits, you configure public folder limits on the public folder store; however, you can configure individual public folder limits to override the limits that you set on the store. |
• | To perform an in-place restore, Microsoft recommends that your disks have at least as much free space as the size of the database itself plus at least 10 percent. For example, a 35-GB database runs on an 80-GB partition. |
• | Remember that the deleted item retention time also affects the size of a public folder store because items are not actually deleted until after the deleted item retention time has expired. |
Recover a Deleted Mailbox in Exchange
To Delete a Mailbox in Exchange
1. | Right-click the user in Active Directory Users and Computers. |
2. | Click Exchange Tasks. |
3. | Click Next on the Welcome page of the Exchange Task Wizard. |
4. | Click Delete Mailbox. |
5. | Click Next, click Next, and then click Finish. |
To Reconnect (or Recover) a Deleted Mailbox
1. | In Exchange System Manager, locate the mailbox store that contains the disconnected mailbox. |
2. | Click the Mailboxes object under the mailbox store. |
3. | If the mailbox is not already marked as disconnected (the mailbox icon appears with a red X), right-click the Mailboxes object, and then click Cleanup Agent. |
4. | Right-click the disconnected mailbox, click Reconnect, and then select the appropriate user from the dialog box that appears. |
5. | Click OK. |
To Reconnect a Deleted Mailbox to a New User Object
1. | In Active Directory Users and Computers, create a new user object. When you create the new user object, click to clear the Create an Exchange Mailbox check box. You will connect this user account to an already existing mailbox. |
2. | Follow steps 1 through 4 in the preceding "To Reconnect (or Recover) a Deleted Mailbox" section. |
To Configure the Mailbox Retention Period
1. | Right-click the mailbox store, and then click Properties. |
2. | On the Limits tab, change the Keep deleted mailboxes for (days) default setting of 30 to the number of days you want. |
3. | Click OK. |
How to Confirm That You Set Mailbox Storage Limits Correctly
After you confirm the mailbox store limits, configure different mailbox limits for the test user, log off Outlook, and then log on again. The mailbox receives mail again.
NOTE: To check for folder sizes in Outlook:
1. | Log on to the Outlook client computer. |
2. | In the Folder List column, right-click Outlook Today, and then click Properties for Mailbox (User Name). |
3. | Click the General tab, and then click the Folder Size. |
NOTE: After you finish testing, reset the schedule to generate warning messages.
Troubleshooting
If you configure storage limits, note that the mailbox limits are measured in KB and not megabytes (MB). If you do not make this distinction, you may type 100 KB instead of 100,000 KB as the mailbox limit.How to Set Limits on Individual Mailboxes
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click Active Directory Users and Computers. |
2. | In the left pane, expand Domain, and then expand Organizational units. |
3. | Open the organizational unit that contains the mailbox that you want to configure. |
4. | Right-click the mailbox, and then click Properties. |
5. | Click the Exchange General tab, and then click Storage Limits. The Use mailbox store defaults check box is selected and the mailbox limits are shaded by default. |
6. | Click to clear the Use mailbox store defaults check box, and then configure either the Issue warning at setting, the Prohibit send at setting, or the Prohibit send and receive at setting as required on this mailbox. |
7. | Optionally, click to clear the Use mailbox store defaults under Deleted Item Retention to configure different settings for this mailbox. |
8. | Click OK, and then click OK. |
How to Set Limits on a Mailbox Store
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager. | ||||||
2. | In the left pane, expand the Exchange 2000 hierarchy until you find the Servers container. If an Administrative Groups container is displayed, the Servers container is under the respective administrative group. | ||||||
3. | Expand the Servers container, click the server that hosts the mailbox store that you want to configure, and then double-click Storage group in the right pane. | ||||||
4. | Right-click the mailbox store that you want to configure, click Properties, and then click the Limits tab. | ||||||
5. | Click to select one or all of the following check boxes under Storage limits:
| ||||||
6. | Either click the time that you want the warning messages to be generated in the Warning message interval box or click Customize. | ||||||
7. | If you click Customize, either click a day in the left column, and then click a time on the top row or click and hold the mouse button as you sweep across the time slots to configure warning settings. NOTE: To configure the schedule to be displayed in hour slots or in 15-minute slots, click the appropriate option under Detail View. | ||||||
8. | After you configure the warning message interval times, click OK. | ||||||
9. | If you want maximum control of your database sizes, configure the Keep deleted items for (days) setting to 0. Otherwise, Microsoft recommends that you a configure this setting to 7 days. |
How to use one Mailbox Manager recipient policy to move items to the Deleted Items folder and then to delete the items
Problem description
In Exchange 2000 and in Exchange 2003, a customer wanted to use one Mailbox Manager recipient policy to move items to the Deleted Items folder after 30 days. Additionally, the customer wanted a second Mailbox Manager recipient policy to delete the items from the Deleted Items folder after five days. By design, only the highest priority recipient policy is applied. Therefore, if two recipient policies are created, only the first recipient policy is evaluated.Solution
In Exchange System Manager, create one Mailbox Manager recipient policy to perform both actions. To do this, follow these steps:1. | Specify the action to "move items to the Deleted Items folder" from any specified folders. This forces the items to be moved to the Deleted Items folder. |
2. | In the same policy, set the Age Limit for the Deleted Items folder. This forces Mailbox Manager to delete the items that have reached the age limit that is specified for the Deleted Items folder. |
Confirm that your new mailbox management policy works correctly
1. | Create a test Exchange user account. |
2. | Configure the filter rule so that the recipient policy applies only to the test account. |
3. | Import old and large messages to the test account. |
4. | Run the mailbox management process manually from the server. |
Note Mailbox Manager does not process mailboxes in the priority order that the mailbox management recipient policies are applied. When Mailbox Manager runs, it iterates through all the private stores on the server, and then iterates through all the mailboxes in each store. Each mailbox is cleaned based on the recipient policy that is applied to the user object for that mailbox in the Active Directory directory service by the Recipient Update Service. The order or priority of the recipient policies does not affect the order that the mailboxes are processed
Manually run mailbox management
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager. |
2. | In the left pane of Exchange System Manager, expand the Servers object. |
3. | Right-click the computer that you want to process, and then click Start Mailbox Management Process. Mailbox management starts after a short delay, depending on the current resource utilization on that computer. |
Configure mailbox management at the server level
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager. | ||||
2. | In the left pane of Exchange System Manager, expand the Servers object. | ||||
3. | Right-click the computer that you want to configure, and then click Properties. The Servername Properties dialog box appears. | ||||
4. | Click the Mailbox Management tab to display the current settings. | ||||
5. | Under Start mailbox management process, do one of the following:
| ||||
6. | Click Reporting to select the type of report (either a detailed report or a summary) to create when mailboxes are processed. You must also select a recipient to receive the reports. Click Browse, select a recipient, and then click OK. Note You cannot send reports to distribution lists. | ||||
7. | Click OK to accept the mailbox management settings. |
Create a mailbox management recipient policy
• | What limits you want the policy to enforce. |
• | What group you want the policy to control. |
• | How you want the policy to handle messages that go past policy limits. |
To create a mailbox management recipient policy, follow these steps:
1. | Click Start, point to Programs, point to Microsoft Exchange, and then click System Manager. | ||||||||||||||
2. | In the left pane of Exchange System Manager, expand the Recipients object, right-click Recipient Policies, point to New, and then click Recipient Policy. The New Policy dialog box appears. | ||||||||||||||
3. | Click to select the Mailbox Manager Settings check box, and then click OK. Note If you do not see the option for Mailbox Manager Settings, reapply the Exchange service pack. It may not have been correctly applied. | ||||||||||||||
4. | The Properties dialog box appears. Type a name for the recipient policy in the Name box. Note We recommend that you use a descriptive name, such as "Accounts Department Mailbox Settings." | ||||||||||||||
5. | Click Modify. The Find Exchange Recipients dialog box appears. | ||||||||||||||
6. | Click the General tab. In this example, mailbox management settings apply only to accounts that have an Exchange mailbox. Therefore, click to clear the Users with external e-mail addresses check box, the Groups check box, the Contacts check box, and the Public Folders check box to exclude these groups from the recipient policy. | ||||||||||||||
7. | Click the Storage tab to configure mailbox management recipient policies that are specific to a particular Exchange 2000 computer. Then, do one of the following:
| ||||||||||||||
8. | Click the Advanced tab, and then click Field. You can now select any of the following options:
| ||||||||||||||
9. | For this example, click User, and then click Department to select Department in the field value. | ||||||||||||||
10. | Under Condition, click any of the following:
| ||||||||||||||
11. | If you click Starts with, Ends with, Is (exactly), or Is not as your condition, type a value in the Value field. For example, click Is (exactly), and then type Accounts to find all employees who work for the accounts department. | ||||||||||||||
12. | Click Add to add the condition to the list. Note You can add additional conditions, but remember that all conditions must be true for a match to be displayed. | ||||||||||||||
13. | After you have finished adding conditions, click Find Now. Any matches to the conditions are displayed in the new list that appears in the Find Exchange Recipients dialog box. | ||||||||||||||
14. | If the list displays the correct users for this recipient policy, click OK. If not, revise the search conditions until your search displays the correct users for this recipient policy. | ||||||||||||||
15. | Click OK. You receive the following message: When a recipient policy filter changes it does not mean that proxy addresses for recipients who may no longer be under the control of the policy will be automatically re-evaluated. For these recipients to receive proxies from the new policies that they belong to, use 'Apply this policy now' on the policies that now affect these recipients. This message does not affect mailbox management recipient policies. Click OK. | ||||||||||||||
16. | Under Filter rules, the LDAP filter statement shows the current filter rule. Click the Mailbox Manager Settings (Policy) tab. Note If the Mailbox Manager Settings (Policy) tab is not available after you apply Exchange 2000 Server SP1, right-click the recipient policy, click Change Property Pages, and then click to select the Mailbox Manager Settings check box. | ||||||||||||||
17. | Under When processing a mailbox, click one of the following options for handling messages that go past the policy limits:
| ||||||||||||||
18. | In the list of folders, select the folder that you want to configure, and then click Edit. | ||||||||||||||
19. | In the Folder Retention Settings dialog box, type an age limit when you want the selected processing action to occur, specify a size limit for the messages that you want the action to apply to, and then click OK. For example, if you type 90 and 2048, all messages that are older than 90 days and over 2 megabytes (MB) are processed. | ||||||||||||||
20. | Repeat steps 18 and 19 for each folder in the list that you want to configure. | ||||||||||||||
21. | Click Send notification mail to users after processing if you want to send users an e-mail message notifying them when their mailboxes have been processed. Click Message to edit the notification message. | ||||||||||||||
22. | Click the Insert the number of messages processed check box if you want a summary of the number of oversize messages processed. Click OK to return to the Properties dialog box. | ||||||||||||||
23. | If you want to exclude certain message classes (for example, to prevent the processing task reports), click the Exclude specific message classes box, and then click Customize. The Message Classes dialog box appears. Type a message class in the Exclude Message Classes field. For example, type IPM.Task, and then click Add. Add all the classes you want to exclude. Message class types include:
http://msdn2.microsoft.com/en-us/library/aa262246(office.10).aspx (http://msdn2.microsoft.com/en-us/library/aa262246(office.10).aspx) | ||||||||||||||
24. | After you have finished adding message classes, click OK to return to the Properties dialog box. | ||||||||||||||
25. | Click OK to close the Properties dialog box. The new mailbox management recipient policy is displayed in the right pane in Exchange System Manager. |
Tuesday, September 11, 2007
Restore Desktop icons
-
Right-click an empty space on your desktop. Choose Properties.
-
In the Display Properties window go to the Desktop tab and click the Customize Desktop button.
-
In the Desktop Icons section, select all the icons you want.
-
Click Ok till the all the windows gets closed.
-
Your icons will be back to your desktop.
Disable MSN Passport creation
Here are the steps to disable the Windows XP MSN passport creation ballon:
-
Start Registry Editor (Regedit.exe).
Note: As always, before making changes to your registry you should always make sure you have a valid backup. In cases where you're supposed to delete or modify keys or values from the registry it is possible to first export that key or value(s) to a .REG file before performing the changes.
-
Locate the following key in the registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MessengerService
-
On the Edit menu, click Add Value, and then add the following registry value:
Value Name: PassportBalloon
Value Type: REG_BINARY
Data: 0a (hexadecimal)Note: 0a as in "zero a" not "oh a"...
-
Close the registry editor.
XP Tour ballon
If you want to stop the "Take Tour of Windows XP" ballon permanently, here are the steps:
To disable it follow the next steps:
-
Open the registry editor and go to
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Tour
-
Create a new value with the name of
RunCount
Data Type: REG_DWORD
-
Give it a value of 0.
Monday, September 10, 2007
Tuesday, September 4, 2007
Technical Links
1 | 10 minute guide to lotus notes mail 4.5 | |
2 | 10 minute guide to Microsoft exchange 5.0 | |
3 | 10 minute guide to outlook 97 | |
4 | 10 minute guide to schedule+ for windows 95 | |
5 | ActiveX programming unleashed | |
6 | ActiveX programming unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
7 | Advanced perl programming | |
8 | Advanced PL/SQL programming with packages | |
9 | Adventure in Prolog/AMZI | |
10 | Algorithms CMSC251/Mount, David | |
11 | Alison Balter's Mastering Access 95 development, premier ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
12 | Apache : The definitive guide, 3rd.ed. | |
13 | Beej's guide to network programming/Hall, Brain | |
14 | Beyond Linux from Scratch/BLFS Development Team | http://book.onairwebnet/computer/os/linux/Administration/Beyond_Linux_From_Scratch/ |
15 | Borland C++ builder unleashed | |
16 | Building an intranet with windows NT 4 | |
17 | Building an Intranet with Windows NT 4 | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
18 | Building expert systems in prolog/AMZI | |
19 | C programming language | http://book.onairwebnet/computer/pl/C/The_C_Programming_Language_by_K&R/ |
20 | C Programming/Holmes, Steven | |
21 | C++ Annotations | |
22 | CGI developer's guide | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
23 | CGI manual of style | |
24 | CGI manual of style online | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
25 | CGI programming | |
26 | CGI programming unleashed | |
27 | CGI programming with Perl, 2nd.ed. | |
28 | Charlie Calvert's Borland C++ builder unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
29 | Client/server computing, 2nd.ed. | |
30 | Client-server computing, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
31 | Common LISP, the language/Steele, Guy | |
32 | Compilers and compiler generators : an introduction with C++/Terry, P.D. | |
33 | Complete idiot's guide to creating HTML webpage | |
34 | Computer graphics CMSC 427/Mount, David | |
35 | Configuring and troubleshooting the windows NT/95 registry | |
36 | Creating commercial websites | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
37 | Creating web applets with Java | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
38 | Crystal Reports.NET | |
39 | Curious about the internet | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
40 | Curious about the internet? | |
41 | Dan appleman's developing activeX components with Visual Basic 5 | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
42 | Dan appleman's developing activex components with Visual Basic 5.0 | |
43 | Data structures CMSC420/Mount, David | |
44 | Database developer's guide with visual basic 4, 2nd.ed. | |
45 | Database developer's guide with Visual Basic 4, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
46 | Database developer's guide with Visual C++ 4, 2nd.ed. | |
47 | Database developer's guide with Visual C++ 4, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
48 | Design and analysis of computer algorithms CMSC451/Mount, David | |
49 | Designing implementing Microsoft internet information server | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
50 | Designing implementing Microsoft proxy server | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
51 | Developing for netscape one | |
52 | Developing intranet applications with java | |
53 | Developing personal oracle 7 for windows 95 applications | |
54 | Developing personal Oracle 7 for windows 95 applications | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
55 | Developing professional java applets | |
56 | Developing professional java applets | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
57 | DNS and BIND | |
58 | Doing objects with VB.NET and C# | |
59 | EAI/BPM Evaluation Series: IBM WebSphere MQ Workflow v3.3.2 & EAI Suite by | http://www.cmis.csiro.au/mte/reports/BPM_IBMwebsphereMQ332.htm |
60 | Effective AWK programming | http://book.onairwebnet/computer/os/shell/Effective_AWK_Programming/ |
61 | Enterprise javabeans, 2nd.ed. | |
62 | Exploring java | |
63 | GNOME/Sheets, John | |
64 | Graph theory/Prof. Even | |
65 | Hacking java | |
66 | How intranets work | |
67 | How intranets work | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
68 | How to program visual basic 5.0 | |
69 | How to use HTML 3.2 | |
70 | Html : The definitive guide | |
71 | HTML 3.2 & CGI unleashed | |
72 | HTML 3.2 and CGI professional reference edition unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
73 | HTML by example | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
74 | Internet firewall | |
75 | Intranets unleashed | |
76 | Introduction to object-oriented programming using C++/Muller, Peter | |
77 | Introduction to programming using Java/Eck, David | |
78 | Introduction to socket programming | http://book.onairwebnet/computer/network/An_Introduction_to_Socket_Programming/ |
79 | Java 1.1 unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
80 | Java 1.1 unleashed, 2nd.ed. | |
81 | Java 1.1 unleashed, 3rd.ed. | |
82 | Java 114 documentation | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
83 | Java AWT reference | |
84 | Java by example | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
85 | Java developer's guide | |
86 | Java developer's guide | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
87 | Java developer's reference | |
88 | Java developer's reference | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
89 | Java Distributed computing | |
90 | Java enterprise | |
91 | Java enterprise in a nutshell | |
92 | Java foundation classes in a nutshell | |
93 | Java fundamental classes reference | |
94 | Java in a nutshell | |
95 | Java in a nutshell, 3rd.ed. | |
96 | Java language reference | |
97 | Java security | |
98 | Java servlet programming | |
99 | Java unleashed | |
100 | Java unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
101 | Java, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
102 | __JavaScript : the definitive guide | |
103 | __Javascript manual of style | |
104 | __Javascript manual of style | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
105 | Josh's GNU Linux Guide/Joshua | http://book.onairwebnet/computer/os/linux/Administration/Josh's_GNU_Linux_Guide/ |
106 | Late night activex | |
107 | Late night activeX | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
108 | Laura lemay's 3D graphics in and VRML 2 | |
109 | Laura lemay's activex and __VBScript | |
110 | Laura lemay's graphics and web page design | |
111 | Laura lemay's guide to sizzling websites design | |
112 | Laura lemay's __javascript 1.1 | |
113 | Laura lemay's web workshop activex and __VBScript | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
114 | Laura lemay's web workshop Graphics web page design | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
115 | Laura lemay's web workshop __javascript | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
116 | Learning perl | |
117 | Learning perl on win32 | |
118 | Learning the kornshell | |
119 | Learning unix | |
120 | Learning vi | |
121 | Linux from Scratch/Beekmans, Gerard | http://book.onairwebnet/computer/os/linux/Administration/Linux_From_Scratch/ |
122 | Linux in a nutshell, 3rd.ed. | |
123 | Linux kernel/Rusling, David | |
124 | Linux network administrator's guide/Dawson, Terry | |
125 | Linux system administrator's survival guide | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
126 | MAPI, SAPI and TAPI developer's guide | |
127 | Mastering access 95 development | |
128 | Microsoft access 97 quick reference | |
129 | Microsoft access 97 quick reference | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
130 | Microsoft backoffice 2 unleashed | |
131 | Microsoft excel 97 quick reference | |
132 | Microsoft excel 97 quick reference | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
133 | Microsoft exchange server survival guide | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
134 | Microsoft frontpage unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
135 | Microsoft word 97 quick reference | |
136 | Microsoft word 97 quick reference | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
137 | Microsoft works 4.5 6-In-1 | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
138 | More than 100 full-text e-books | |
139 | Ms backoffice administrator's survival guide | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
140 | Ms backoffice unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
141 | Mysql and msql | |
142 | Netscape plug-ins developer's kit | |
143 | Official gamelan java directory | |
144 | Oracle built-in packages | |
145 | Oracle PL/SQL built-in pocket reference | |
146 | Oracle PL/SQL language pocket reference | |
147 | Oracle PL/SQL programming guide to Oracle 8 features | |
148 | Oracle PL/SQL programming, 2nd.ed. | |
149 | Oracle unleashed | |
150 | Oracle unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
151 | Oracle web applications PL/SQL developer's introduction | |
152 | Patterns of enterprise application architecture/Fowler, Martin | http://www.awprofessional.com/catalog/product.asp?product_id={574D77DF-6ED2-BC5-A6A8-02E59CA7482D} |
153 | PC week : the intranet advantage | |
154 | Perl 5 by example | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
155 | Perl 5 quick reference | |
156 | Perl 5 unleashed | |
157 | Perl 5.0 CGI web pages | |
158 | Perl cookbook | |
159 | Perl for system administration | |
160 | Perl in a nutshell | |
161 | Perl quick reference | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
162 | Peter norton's complete guide to windows NT 4 workstations | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
163 | Presenting activex | |
164 | Presenting activex | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
165 | Presenting javabeans | |
166 | Presenting javabeans | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
167 | Programming perl | |
168 | Programming perl, 3rd.ed. | |
169 | Programming the Perl DBI | |
170 | Red hat linux unleashed | |
171 | Running a perfect intranet | |
172 | Running Linux, 3rd.ed. | |
173 | Sams teach yourself java 1.1 in 24 hours/ | http://book.onairwebnet/computer/sams/Sams_Teach_Yourself_Java_1.1_Programming_in_24_Hours |
174 | Sams Teach yourself java in 21 days/Lemay, Laura | http://book.onairwebnet/computer/sams/Sams_Teach_Yourself_Java_in_21_Days/ |
175 | Sams teach yourself linux in 24 hours/Ball, Bill | http://book.onairwebnet/computer/sams/Sams_Teach_Yourself_Linux_in_24%20Hours/ |
176 | Sams teach yourself shell programming in 24 hours | http://book.onairwebnet/computer/sams/Sams_Teach_Yourself_Shell_Programming_in_24_Hours/ |
177 | Sams teach yourself TCP/IP in 14 days | http://book.onairwebnet/computer/sams/Sams_Teach_Yourself_TCP-IP_in_14_Days(SE)/ |
178 | Sed and awk | |
179 | Sendmail | |
180 | Sendmail desktop reference | |
181 | Slackware linux unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
182 | Special edition using java, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
183 | Special edition using __javascript | |
184 | Special edition using __javascript | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
185 | Special edition using __Jscript | |
186 | Special edition using lotus notes and domino 4.5 | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
187 | Special edition using Microsoft SQL server 6.5, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
188 | Special edition using Microsoft visual Interdev | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
189 | Special edition using perl 5 for web programming | |
190 | Special edition using perl for web programming | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
191 | Special edition using Visual Basic 4 | |
192 | TCP/IP | |
193 | Teach yourself activex programming in 21 days | |
194 | Teach yourself C++ in 21 days | |
195 | Teach yourself C++ in 21 days | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
196 | Teach yourself CGI programming with Perl 5 in a week | |
197 | Teach yourself database programming with VB5 in 21 days, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
198 | Teach yourself database programming with visual basic 5 in 21 days | |
199 | Teach yourself HTML 3.2 in 24 hours | |
200 | Teach yourself HTML 3.2 in 24 hours | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
201 | Teach yourself internet game programming with java in 21 days | |
202 | Teach yourself java 1.1 programming in 24 hours | |
203 | Teach yourself jave in café in 21 days | |
204 | Teach yourself Microsoft visual Interdev in 21 days | |
205 | Teach yourself Microsoft visual Interdev in 21 days | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
206 | Teach yourself oracle 8 in 21 days | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
207 | Teach yourself perl 5 in 21 days | |
208 | Teach yourself perl 5 in 21 days, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
209 | Teach yourself SQL in 21 days | |
210 | Teach yourself SQL in 21 days, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
211 | Teach yourself TCP/IP in 14 days | |
212 | Teach yourself TCP/IP in 14 days, 2nd.ed. | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
213 | Teach yourself the Internet in 24 hours | |
214 | Teach yourself the internet in 24 hours | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
215 | Teach yourself __VBScript in 21 days | |
216 | Teach yourself __VBScript in 21 days | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
217 | Teach yourself visual basic 5 in 24 hours | |
218 | Teach yourself Visual Basic 5 in 24 hours | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
219 | Teach yourself Visual J++ in 21 days | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
220 | Teach yourself web publishing with HTML 3.2 in 14 days | |
221 | Teach yourself web publishing with HTML in 14 days | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
222 | Thinking in C++ | |
223 | Thinking in C++/Eckel, Bruce - Vol.I, 2nd.ed. | |
224 | Thinking in C++/Eckel, Bruce - Vol.II, 2nd.ed. | |
225 | Thinking in Enterprise Java | |
226 | Thinking in Java, 2nd.ed. | |
227 | Thinking in Java, 3rd.ed. (pdf) | |
228 | Tricks of the internet gurus | |
229 | Tricks of the java programming gurus | |
230 | Unix and internet security | |
231 | Unix hints and hacks/Waingrow, Kirk | http://book.onairwebnet/computer/os/unix/Administration/UNIX_Hints_&_Hacks/19270001..htm |
232 | Unix in a nutshell | |
233 | Unix kornshell quick reference | http://book.onairwebnet/computer/os/shell/Unix_KornShell_Quick_Reference/kornShell.html |
234 | Unix power tools | |
235 | Unix shell guide | http://book.onairwebnet/computer/os/shell/The_UNIX_Shell_Guide/ |
236 | Unix unleashed | |
237 | Unix unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
238 | Unix unleashed Internet Ed./Burk, Robin | http://book.onairwebnet/computer/os/unix/Administration/UNIX_Unleashed(Internet_Edition)/fm.htm |
239 | Unix unleashed, System administrator's Edition | |
240 | Unix Unleashed/Sams Publication | http://book.onairwebnet/computer/os/unix/Administration/UNIX_Unleashed/ |
241 | Upgrading PCs illustrated | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
242 | Using windows NT workstation 4.0 | |
243 | __VBScript unleashed | |
244 | __Vbscript unleashed | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
245 | Visual basic 4 in 12 easy lessons | |
246 | Visual basic 4 unleashed | |
247 | Visual Basic 5 night school | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
248 | Visual basic programming in 12 easy lessons | |
249 | Visual Basic programming in 12 easy lessons | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
250 | Visual C++ 4 unleashed | |
251 | Visual C++ programming in 12 easy lessons | |
252 | Web database developer's guide with visual basic 5 | |
253 | Web database developer's guide with visual basic 5 | http://www.emu.edu.tr/english/facilitiesservices/computercenter/bookslib/ |
254 | Web programming desktop reference 6-in-1 |