The Acer D2D Erecovery 101

Disclaimer: First of all backup your system before launching you in any hazardous operation, some of the operations to come can cause data loss. Any modification and/or damage done on your laptop will be under your responsibility.

As you know now the Acer laptops and those of other manufacturers are now delivered with a restoration system installed in a hidden partition (PQservice for Acer)on your hard disk. Normally this system launches out while pressing simultaneously keys ALT+F10, but sometimes that does not function.

What’s the problem?

There are many possible causes, but most common are:

A The function D2D was disabled in the bios.

Solution: Enable the function by pressing F2 during the boot to access the bios menu and change the setting, then reboot and press keys ALT+F10 during the starting of the laptop.

Note: For all the following solutions take into account the Max advice, I quote Max now, a contributor in my site «But I want to mention the way I sorted out the thing, because it’s very rarely mentioned on the web. All the methods to repair the D2D Alt+f10 issue are knowledgeable and smart but all of them forget to say a fundamental thing:

first of all you have to rebuild with a partition soft the D:Acerdata FAT32 empty partition that almost everybody deletes cause is usually empty. Simply doing it, everything turned fine and the recovery worked perfectly.»

Yes much of attempts to restore fail because of this condition.

B An other common problem the Acer Master Boot Record (MBR)is damaged, or replaced by the MBR of another system. You can reinstall the Acer MBR if the partition PQservice is present or if you can have access to the necessary files.

Solutions:

FIRST

On a functional FAT32 Windows system the partition table values are OC or OB for installable FAT32 system files and 12 or 1B for Hidden FAT32 partition, for a NTFS system the known partition table values are O7 for installable NTFS files system and 27 for Acer custom hidden NTFS partition:

1. Go in the bios and disable the D2D recovery option.

2. Download partedit32.

3. Identify the PQservice partition by its size (there is an information box at the bottom of the partedit window) it is the small sized partition approximately 4 to 9 Go.Once made change the type of your partition into 0C(FAT32) or 07(NTFS) and save. Reboot and now you should be able to navigate inside the PQservice partition.

Search for these two files:

mbrwrdos.exe

rtmbr.bin

(The name of these two files can be different sometimes)

When localized open a command prompt windows as an administrator and enter this command “mbrwrdos.exe install rtmbr.bin”, to install the Acer MBR. Close the command prompt, reboot again your laptop, reactivate the D2D recovery in the bios. Now ALT+F10 should work and run the Acer Erecovery when the laptop start.

SECOND

Somebody who tried to follow the first method but did not succeed to find the 2 files found another solution to restore the partition.

Use partedit32 to locate the partition pqservice(on aspire 5920g,its the larger 9 gb partition)

Change the partition type to 07(Installable NTFS),reboot.

After reboot,go to the windows computer management and mark the PQservice partition as active then reboot again.

Voila!! You can now proceed to the road to recovery

THIRD

On a nonfunctional Windows system.

Download the Ultimate Boot CD(UBCD) run it choose in the menu:

-Filesystem Tools

-Boot Managers

-For me GAG functioned well, but you can choose any of the other boot loader, you will recognize the PQservice by it type(hidden).

Just install any boot loader and use it to boot into the PQservice to start the Erecovery restoring process.

C The last problem: You replaced your hard disc( in this case PQservice is not present any more) or your partition was erased or damaged.

Solution: I hope that you burned the Acer restoration CD/DVD when it had been asked to you at the time of the first use, cause if you did not previously make a backup of your laptop by making a disc image, it will not be possible to use the Acer Erecovery.

Let us give the last words to Max:

«Problem Sorted Alan. And you’re right that an external drive for data backup it’s all important. Yes I have it and backed-up my data before starting messing up… »

Disaster Recovery and Business Continuity

Disaster recovery planning and preventive measures ensure business continuity. The main question is “What if an attacker succeeds and renders an organization’s functions impossible?” Whether the break in business continuity is a short or long one, this is where an organization’s disaster recovery plans comes into play. The disaster recovery plans define the resources, actions, and data required to reinstate critical business processes that have been damaged or disabled because of a disaster. By focusing on disaster recovery plans and preventions, network managers can minimize the impact that catastrophic events may have in their environment. The recovery plan is the best way to insure that a business survives an IT emergency.

The various potential disasters that security administrators need to be concerned about can be classified as human induced incidents, natural, internal, armed conflict, and external. Human induced incidents can include loss of power, transportation accidents, and chemical contaminations. Natural incidents can include flood, earthquake, and tornado. Internal incidents include sabotage, theft, and employee violence. Armed conflict can include acts of terrorism, like the 911 attacks, civil unrest, and war. External incidents include hacking, unauthorized use, and industrial espionage.

Organizations identify potential threats and analyze what needs to be achieved in order to continue operating as though nothing had happened. After identifying these potential threats, security administrators can be in a better position to protect the mission-critical information systems.

Data backup is an essential part of any disaster recovery plan. Data backup allows personnel to restore files and application software that is vital to continue business. An effective data backup strategy should address how often backups are run, type of backup medium, when the backups are run, are backups automated or manual, backup verification, storage, who is responsible for the backups, and the fallback person responsible for backups. Addressing the need for off-site storage may also be an important guideline for organizations with extensive business-critical data (Boswell…, 2003 p. 433).

Organizations must include thorough planning and testing and include provisions for business continuity. Anticipating disasters is the first in the process. There is a lot to be learned and corrected from the testing phase and it needs to be taken very seriously. The testing exercise helps minimize losses during an actual attack. An effective disaster recovery plan should include the following documents: a list of covered disasters, a list of the disaster recovery team members, a business impact assessment, a business resumption and continuity plan, backup documentation, and restoration documentation.

It has been said that the most important step in managing potential disasters is to have in place a well-trained and ready to respond team including a member from senior management, members of the IT department, representatives from facilities management, and representatives from the user community affected by the crisis. In a real crisis, the disaster recovery team meets to evaluate and determine the sources of the disaster and identify the critical components that are affected. The team than assesses the business impact of the disaster, estimating how long the disaster may disrupt business continuity. In this process the cost of the disaster is also ascertained. Exhaustively documenting changes that are implemented during the rush to solve the problem is also crucial.

It is also important that organizations show their commitment to these plans that come from the IS department by adopting well-defined security policies and human resource policies that reflects their support to information security. A useful and well-written security policy should include sections on acceptable use, privacy, due care, separation of duties, “need-to-know” issues, password management, service-level agreements, and the destruction or disposal of information and storage media (Boswell…, 2003 p. 437). Human resources policy deals with personnel management. There should be thorough hiring practices including background, reference, and educational checks. To minimize a security risk, employees should have periodic reviews and rotate job functions and duties, which is beneficial in an emergency due to the more even distribution of information. Employee termination practices are also important in the protection and prevention of threats. Exit interviews should be conducted, individuals should be escorted off the property, and the terminated employee’s computer accounts and passwords should be deactivated and changed. A code of ethics should also be included in an organization’s human resources policy. This would help define and clarify the company’s stance on information security and provide a foundation built on ethics (Boswell…, 2003 p. 441).

An incident response policy can also play a critical role. This policy covers how to deal with a security incident after it has occurred. Following a sound incident response methodology lessens the likelihood that incompetent and inefficient actions will occur and contributes to the practice of due care. An incident response policy should follow the steps of preparation (being ready before an incident occurs), detection (recognizing the presents of malicious code or whether files have been altered), containment (preventing further loss or disruption of services), eradication (removing viruses or malicious code along with cleaning and reformatting hard drives that were affected), recovery (restoring the system), and follow up (develop set of lessons learned) (Boswell…, 2003 p. 442).

In conclusion, in is important to combine a disaster recovery plan with a well-defined and documented security policy, human resources policy, and incident response policy, which can minimize the effects of a catastrophic event and help assure business continuity. It is said, “Failure to prepare is preparing to fail.”

Works Cited

Boswell, S., Calvert, B., Campbell, P. (2003). Security + Guide to Network Security

Fundamentals. Boston, Massachusetts: Thomson Course Technology.

Data Processing Steps – How to Process Data Efficiently?

Data processing in simplest way, we can draw like this; DATA –> Processing on Data –> Converted to Information.

As we have seen above, data processing means a process of converting data into information. This processing is done through computers which accept raw data as input and provide information as output.

Data processing is very much helpful to most of the financial institutions, universities, publishing companies, different hospitals, oil and transportation organizations and pharmaceutical organizations. There are various kinds of data processing services are available in the market. Check processing, image processing, form processing, survey processing are some of them.

Data Processing Steps:

Collecting – First step is to collect the raw data which you want to process. From which data do you want information? This is first question before you start.

Sorting – Relevance of data is very important while processing the data. There are various irrelevant data which decrease the perfection of the information. So from the bunch of collected data, sorting is needed to get relevant output information. Data must be in proper categorization.

Bucketing – It is similar to ‘netting’ or ‘coding’. This step involves aligning the random data in particular structure. When data collected and sorted, it was not aligned properly. Random data can create problem while processing the data. Bucketing helps you to have the process smoothly.

Entering Data – If system is not having any data, what it process!! To process data, there must be data for the software. Entering organized data in to the software is required to get processed information at the end of whole process.

Cleansing – This step increase the quality of the processed data. In this step, quality controller validates the data. Data is double-checked to secure the faultless data processing. This cleansing helps you to process the data very efficiently and quickly.

Proper Formatting – Last but most important step to end the process very effectively is proper formatting. Without proper formatting, there is no meaning of data processing. Proper formatting is very much helpful to understand the data very easily and conclude the decision quickly.

Most of the well-known companies are following above mention steps to satisfy the clients’ needs.

How To Quickly Make A Bootable USB Stick With FreeBSD

Install FreeBSD, or use an existing FreeBSD installation, and follow these steps:

1) First, you need to prepare and format your USB stick:

fdisk -BI /dev/da0
bsdlabel -B -w da0s1
newfs -U -O1 /dev/da0s1a
boot0cfg -v -B da0
(“-U -O1” [“O” like in Olympus, not zero] is for UFS1 which provides much faster copying than UFS2; if you decide for UFS2, type “-U -O2” – but expect that the copying will be slower)

2) Then mount it: mount /dev/da0s1a /usb
3) Copy all directories (FreeBSD) to the stick
4) After copying, modify the /usb/boot/loader.conf (explained below)
5) In the /boot directory on your USB stick you must have MFS (Memory File System – mfsroot.gz), which you will make (instructions are below)
6) Modify your /etc/fstab in MFS and put the following line (only) there:
/dev/md0 / ufs rw 0 0
7) After you boot your computer with the stick, you will be in the MFS environment from which you will mount your USB stick with mount_nullfs (described below)

Modification of /boot/loader.conf on your USB stick

You must have the following lines in your /boot/loader.conf (some lines are optional):

mfsroot_load=”YES”
mfsroot_type=”mfs_root”
mfsroot_name=”/boot/mfsroot”
nullfs_load=”YES”
splash_bmp_load=”YES”
vesa_load=”YES”
geom_uzip_load=”YES”
geom_label_load=”YES”
bitmap_load=”YES”
bitmap_name=”/boot/splash.bmp”
snd_driver_load=”YES”
kern.maxfiles=”25000″
kern.maxusers=”64″
vfs.root.mountfrom=”/dev/md0″

# Additional filesystem drivers

udf_load=”YES”
linux_load=”YES”
fuse_load=”YES”
ntfs_load=”YES”
ext2fs_load=”YES”
reiserfs_load=”YES”

Making your own MFS

FreeBSD, after the kernel boots, can use the root file system in memory (mfsroot_load=”YES” command in /boot/loader.conf will do the trick). To build such a memory file system, type the command:
dd if = /dev/zero of = mfsroot bs = 1024k count = 42

The mfsroot file of about 40 MB in size will be created. You need to format it, mount it and copy the most important files into it from your FreeBSD system (/bin, /sbin, /etc, /root….):

mdconfig -a -f mfsroot md0
newfs /dev/md0
mount /dev/md0 /mnt

Once copied, you must unmount it and gzip it: gzip mfsroot

Optionally, you can chroot it to see if everything works, then copy the mfsroot.gz to /usb/boot onto your USB flash drive (or disk). If you think it may be a problem to pick the most important files for your MFS (from your FreeBSD installation), search for mfsbsd in Google and either use its toolset or the MFS image alone (contained in the downloadable ISO of mfsbsd).

After booting from the USB stick (you will jump into MFS), you must mount the physical USB stick:

/sbin/mount -o ro /dev/da0s1a /usb
/sbin/mount_nullfs /usb/boot /boot
/sbin/mount_nullfs /usb/usr /usr

The above commands will help you use the big /usr directory on your USB stick instead of the /usr dir in MFS. mount_nullfs /usb/boot /boot is optional, as in your MFS/boot directory only the following files are needed for the little MFS to boot (/boot/kernel directory in MFS): geom_label.ko, geom_uzip.ko, zlib.ko a their debug symbols (zlib.ko.symbols, etc.). By mounting the /usb/boot dir via mount_nullfs into the /boot directory in your MFS you will be able to load kernel modules.

Entourage Repair to Fix "Not Enough Memory" in Microsoft Entourage

Are you unable to access your Entourage Inbox, Drafts folder, Deleted Items folder, and any of your subfolders of Inbox? You get memory errors while accessing items from your database. This behavior makes all your precious data inaccessible and leads to severe data loss. At this point of time, you need to opt for Entourage repair solutions to get your precious data back.

In a practical instance of this problem with your E-mail client, you may encounter the below error message while accessing data-

“Entourage cannot open the item due to an error. Not enough memory.”

This behavior renders all your precious data inaccessible. In order to recover Entourage database in such cases, you need to find out the cause of this issue and fix it using appropriate solutions.

Root of the problem-

Unfortunately, the above error is not caused by memory problems. This is actually a wrong description on generic error, which can be caused by number of other things, such as-

  • If you get this error while receiving emails, it can be due to a corrupt message.
  • The fonts are faulty or damaged.
  • Your Mac RAM (Read Only Memory) is either low or damaged.
  • Entourage database is either corrupt or unrecognizable.

Resolution-

  • Log into your account using web browser and remove the damaged items.
  • Install new fonts or remove the faulty fonts.
  • Replace or Upgrade your Macintosh RAM.
  • Restore your database from the most recent backup. You are recommended to repair Entourage database from backup only if it is updated.

If you cannot perform Entourage database recovery using any of the above methods, you need to opt for Entourage recovery software to get your data back. Entourage repair software are capable of retrieving inaccessible data in all data loss situations.

Scope of Data Recovery Services

Losing an important document or file is enough to rob us of a peaceful night’s sleep. If we lose or are unable to access data due to a system crash or computer virus, it is time to invest in a strategic and affordable data recovery service. As opposed to prevention and backup, data recovery is a remedial measure. This process can reduce the danger of data loss to the lowest.

Data recovery services are comprehensive processes involved in recovering data from desktop drives, laptop drives, external drives, servers, RAID systems, Network Attached Storage devices (NAS), Storage Area Network devices (SAN), flash drives and camera media.

Scope of Data Recovery Services

There are various forms and repercussions of loss of data, so we divide the scope according to different symptoms:

  • System problem: This is caused by the inability of logging into the system or the system shutting down and displaying an abnormal behavior. There are various reasons for this anomaly and we need to adopt suitable recovery methods. Reasons for such symptoms may be a lost or damaged file, bad track on the hard disk, MBR or DBR is lost or incorrect CMOS settings.
  • Bad track on hard disk: Tracks can be either logical or physical. While logical tracks can be restored by data recovery software, physical track damage can be restored partially by changing the partition or sector. Proper backups must be done to ensure minimal physical damage.
  • Partition problem: If a partition cannot be identified or accessed, or is rendered unformatted, suitable partition recovery services should be deployed.
  • File loss:If important files are lost due to deletion, disk format or a clone error, file recovery services should be administered into the system to recover the lost files.
  • File repair: For some reasons, some files cannot be accessed or used. Also they may contain some characters that make it inaccessible. In such cases, special file recovery tools should be used to restore the files.

Data Recovery Service Tips: Some Do’s and Don’ts

Measures can be taken to minimize the blow when a computer failure happens. Understanding and recognizing the warning signals can make a significant difference for a successful data recovery operation.

Do’s

  • Backup essential data frequently.
  • If there is some problem with the computer, shut it down without delay.
  • If there is some unusual noise from the drive, power it down immediately.
  • Proper caution must be taken when shipping the drive to a data recovery specialist. Additional damage can occur if the drive is poorly packaged.

Don’ts

  • Do not assume that data recovery services are impossible. Even in the worst case scenario, data recovery specialists are usually able to retrieve important data.
  • It is not advisable to tamper with the hard drive.
  • The computer must be protected from all shocks and vibrations.
  • We should not subject the drive to extreme temperature.

OffSiteBackups has a high success rate and one of the fastest turnaround times in the industry. Log on to the website for a wide range of data recovery services.

Turn a Physical Linux or Windows Machine Into A Virtual Machine for Free

We will be focusing on creating this masterpiece in the Windows environment, but don’t worry the same principles can be used in any operating system that can run Virtual Box.

List of Software and Hardware needed:

Software:

-Virtual Box and Extension Pack

-Windows 7 or higher PC or most any Linux Distro

-Redo Backup and Recovery ISO

-YUMI installer

Hardware:

-USB flash drive

-USB hard drive

The overall benefits of performing this procedure is three fold. One, cost savings on power, climate control and space required will be seen instantly. Two, manageability and scalability dramatically increases due to working with virtual disks and virtual networks that can scaled up or down with finer grained control. Three, redundancy and faster disaster recovery that is provided by cloud services. Especially when tied into your already existing network infrastructure for a seamless transition when disaster strikes.

While this process can be completed in numerous ways with different software, this is the way that I am familiar with and all the tools needed are free.

Sounds daunting? No sweat, but where do we start first?

Well, we need to get an image of the physical machine onto removable media (USB hard drive). I recommend a USB hard drive vs. just a USB flash drive due to the space the image will take up. We will also need a USB flash drive at least 2 GB in size to use as a bootable media for Redo Backup and Recovery.

Plug the USB hard drive into your USB port and open up the folder structure. Create a folder in a location that you can remember I.e D:”Your Computer’s Name”. This is the location where we will install the files from our initial physical image copy to. After this is complete, eject your USB hard drive by right clicking on the “Safely Remove Hardware” icon in your taskbar and click on Eject “whatever your USB hard drive is named”, unplug the USB HDD.

Next, we need to create a bootable USB to load Redo Backup and Recovery on. Download a small program called “YUMI”. YUMI will create a bootable USB flash drive for Redo Backup and Recovery on it. Also grab a copy of Redo Backup and Recovery, save both files to your desktop or location of choice.

Now, run YUMI and choose your USB flash drive from the list (Remember to choose your USB drive and not your USB HDD that should be unplugged anyway!). Choose “Redo Backup and Recovery” from the software list that you can create an installer for. Click the “Browse” button to look for the Redo Backup and Recovery.iso to include on the install. Finally click on “create” to start the bootable Redo Backup and Recovery bootable USB creation process. When this is done, YUMI will ask you if you want to add any more distros, just say “no”. Eject your USB out of the computer using the “Safely Remove Hardware” icon in your taskbar and click on Eject “whatever your USB flash drive is named” and unplug the USB flash drive. Please keep Redo Backup and Recovery.iso we will need it later.

Make sure that the physical computer that you would like to virtualize is in a powered down state, if not please power down the computer. Insert only the USB flash drive into the computer. Power up the computer and press the correct key to access to boot menu or make sure that the USB drive is set to boot before the computers internal hard drive. Choose the USB entry to boot from, YUMI should now load. Choose the entry for “Tools” then “Redo Backup and Recovery”. Press enter on the Redo menu to start the mini recovery O/S. When Redo Backup and Recovery is loaded, insert your USB HDD and give it about 20 seconds.

Open Redo Backup and Recovery Software:

1. Choose “Backup”

2. Choose your disk to backup (your physical computer’s disk)

3. Choose your partitions to backup (typically it would be all partitions and MBR)

4. On the “Destination Drive” screen choose “Connected directly to my computer” and click browse.

5. Locate the file folder we made earlier I.e D:”Your Computer’s Name” click OK.

6. Choose a name for the disk image. I will usually choose the date, click next. The backup process will take anywhere from 1 hr to 3 hrs depending on hard drive capacity and computer speed.

Congratulations, at this point you have made a full backup of your physical machine. Please click “Close” on the Redo and Recovery Backup program and choose the power button in the bottom right corner of your screen. Select “Shutdown” and let the computer shutdown. Remove both USB flash drive and USB HDD and boot up any computer that has Windows 7 or higher installed on it.

Now, lets turn that physical machine into a virtual machine!

Open up Virtual Box and choose “New”. Give your Virtual Machine a name and choose the type of virtual machine it will be as well as the version. Choose your memory size, I usually a lot 2 GB=2048 MB if I plan on running it on a machine that has 4 GB of ram physically installed. Create a new hard drive, choose VHD as the hard drive file type, click next. Choose “Dynamically allocated” for the storage, click next. Give your VHD hard drive a name, I will usually name it by whats running on it, hence name it what you named your computer. Make the VHD hard drive large enough to store your operating system, I will usually choose 200GB to be on the safe side. Again this depends on how big your physical machine’s data was. You are now returned to the Virtual Box Manager screen with your new VM present. Make sure your Virtual Box extension has been installed. Obtain the extension for your software version and install it like so:

In Virtual Box, click File–>Preferences–>Extensions–>Add Package–>Locate extension file and select it. It will be automatically installed.

Prepare the conversion! Use only Option A or Option B:

Option A: If you can get USB support working in Virtual Box:

Make sure that you have installed the extension pack and setup USB access properly, if you are having some troubles, refer to the Virtual Box document here:

https://www.virtualbox.org/manual/ch03.html#idp55342960

In Virtual Box, click on your VM name and choose “Settings” at the top, choose “Storage”. Click on the empty CD/DVD icon and then the CD/DVD icon on the right under “Attributes” and select your Redo Backup and Recovery ISO and click “OK”. At this point you have the Redo Backup and Recovery.iso at the ready and a blank VHD to install to. All you need to do now is insert your USB hard drive and skip over Option B because you do not need to perform it.

Option B: If you cannot get USB support to work in Virtual Box. No problem, its what happened to me so I found a way around it.

In Virtual Box, click on your VM name and choose “Settings” at the top, choose “Storage”, choose “Add hard disk” next to Controller:Sata or Controller:IDE whatever you have. Choose “Create new disk”, choose VHD and again make it 200GB Dynamically allocated and name it “Installer”. Underneath “Storage Tree” click on the empty CD/DVD icon and then the CD/DVD icon on the right under “Attributes” and select your Redo Backup and Recovery ISO and click “OK”. At this point you have the Redo Backup and Recovery.iso at the ready and a blank VHD which is named after your computer and another black VHD named Installer. Now close Virtual Box and right click on “Computer” and choose “Manage”. Left click on “Disk Management” then right click on “Disk Management” again and choose “Attach VHD”. Browse for the location of your Installer VHD that you created in Virtual Box, usually in the “My Documents” folder and click okay. Now you can copy the physical computer backup image that we took earlier from D:”Your Computer’s Name” to Installer VHD. After the contents have been copied, right click on computer management again and click on “Detach VHD”. Open up Virtual Box and proceed to the next step.

Lets Convert This Thing!

Once you have either USB support or the Installer VHD setup and the Redo Backup and Recovery ISO mounted. Press “Start” on your VM name in Virtual Box. You will be met the familiar Redo Backup and Recovery boot menu, press enter to proceed. Launch the Backup and Recovery program if it did not start automatically. Choose “Restore”. In a nutshell, you will choose where your Image backup is “The Source Drive” (your USB HDD or Installer VHD if applicable) and where to install the image (blank VHD named after your computer). After you have chosen to install into the blank VHD, confirm the prompt to overite any data and let the recovery process begin. After this is finished, click close and shutdown Backup and Recovery as you did before. The VM should stop running. Click on “Settings” from the Virtual Box Manager and unmount the Backup and Recovery ISO and the Installer VHD if applicable. Leave your VHD with the name of your computer or whatever you named it and click on “OK” to go back to the Virtual Box Manager. Click on “Start”, you should now be looking at a fully virtualized version of your physical computer!

Celebrate the many uses of this power little VHD!

You can transport this VHD and include it in any Virtual Box VM instance or even VMware if you are so inclined. You can run it on your local premises or deploy it in the cloud. A cloud instance of this VM would either require running Virtual Box on your cloud computing instance, or running it natively in your cloud computing space if the hosting provider supports it.

Common Gotchas and Troubleshooting:

Q: When trying to run my Linux based virtual machine, I get ” not syncing: VFS: Unable to mount root fs on unknown-block(0,0) “?

A: This is because in the backup and recovery process all the entries for hda##, hdb## and so forth have been converted to sda## extc. First, copy your precious VHD so you won’t lose your work if something goes wrong. Then all you will have to do is mount Backup and Recovery ISO, start your VM again and bring up a terminal session. Mount the Root partition and edit the entries in GRUB or Lilo to the proper boot device. For example: in GRUB, the entries are included in menu.Ist and fstab. In Lilo they are included in /etc/lilo.config and then /sbin/lilo -v to write the changes.

Q: When trying to run my Windows based virtual machine I get a boot error?

A: Obtain a copy or a Windows disc and mount it inside of Virtual Box making sure it is set to boot first. Choose the “Repair” option. Choose “Start Up Repair” and let it run. If this does not do the trick, go back into the “Repair” option and choose “Command Prompt”. Try these commands one at a time, shutting down and unmounting the Windows disc each time to check if the problem has been corrected:

bootrec.exe /FixMbr. Then restart to see if resolved. If no result, try:

bootrec.exe /FixBoot. Then restart to see if resolved. If no result, try:

bootrec.exe /RebuildBcd. Then restart to see if resolved. If no result, try:

You may have to remove your BCD folder by running these commands one line at a time without quotes:

“bcdedit /export C:BCD_Backup

c: <—- Only if your Windows installation is installed on C:

cd boot

attrib bcd -s -h -r

ren c:bootbcd bcd.old

bootrec /RebuildBcd”

A viral marketing task by Kelvin Scotts, best marketing firms in singapore that provides complete singapore social media services. More information, click here.

How to Virtualize Red Hat and CentOS Linux Physical Server Into VMware VSphere ESX Servers

Converting Red Hat and CentOS Linux physical server into VMware VSphere ESX servers is not an easy task as compare to MS Windows. It is even harder is you have older version of Red Hat such as 7.2 or Linux box with software raid.

I had successfully converted a few unit of Red Hat 7.2. and software-raid Linux box for past few years. The process of P2V migration needs some extra efforts and its challenging process. You might faced all sorts of issues after P2V migration such as Kernel Panic or even worst is the Linux OS cannot be booted up due to no virtual hard disk is found.

Hot Cloning using VMware tools to be used for the conversion task:

  • VMware ESXi 4.0.0 or ESX 4.0.0
  • VMware Converter Standalone 4.0.1

From experience this are the best tool to be used for P2V migration. I faced lots of issue using ESX 4.1.x and force to downgraded for the migration process. Worst case scenario if hot cloning is not working then the only method- cold cloning method using Clonzilla will help you in most of the Linux-disto cloning. Let’s assume that you had perform the migration successfully completed without error. The next challenge is to get Red Hat or CentOS Linux to boot up.

  1. You have to choose the correct Disk Controller either is BusLogic Parallel or LSI Logic Parallel from Vmware Image setting. This is important process, else your Linux will never find your virtual hardisk.
  2. Boot from System Rescue and chroot to your /mnt/sysimage.
  3. Add in disk controller into /etc/modules.conf and remove any raid setting.
  4. Recompile kernel and Reinstall grub
  5. Edit the /etc/fstab and /etc/grub.conf to change all the hda to sda so that it can be mounted properly when system boot
  6. Once system booted correctly, run Kudzu to re-initialization
  7. install vmware tools

The steps above all the necessary steps for migrating physical server into VMware VSphere ESX servers. There are however, plenty of codes and extra configuration needs to be done.

A digital marketing blog post by Kelvin Scotts, best social media agency singapore that provides complete social media marketing singapore services.

Delete Browsing History – How to Clear & Permanently Delete Cookies and Cache From Your Web Browser

It has always been pretty simple to delete your Internet browsing search history. Your favorite browser, whether it is Internet Explorer, Firefox or some other, has long come with the option to delete your Internet, web and browser search history and to clear cookies and memory cache. The trick is your simply knowing what to do.

Now, remember that as in deleting other files, these files are not permanently erased until they are written over, so there are numerous special programs out there to permanently erase your search and Internet history. However, while most users do not know how to erase the history, even fewer know how to retrieve it, so using these built in functions is going to be successful for most computer users.

Most people surfing the web still use Internet Explorer. On the top menu, simply click Tools/Options/Internet Options/General. Then click “delete files”, then click OK. Finally click “clear history”, then click Yes when prompted.

Safari users have it easy. Simply click History on the top menu, and then click Clear History on the bottom of the list that appears. Just in case you did not know, Safari is now freely available for Windows users. It is one of the best browsers when it comes to protecting your search history and enabling private browsing.

If you are a Mozilla FireFox user, you will choose Tools/Options/Privacy/Clear. It is a piece of cake, right?

AOL is just as simple…Settings/Preferences/Toolbars and Sounds/Clear History Trail Now.

Granted, having to choose “toolbars and sounds” does not sound intuitive, but it does bring up an important point. If you have toolbars on your browser, like the Google, Yahoo, or Alexa toolbars, those also keep your search history for future reference…which is actually quite handy when you are trying to find something again and cannot remember what search term was successful.

However, if you are trying to cover your tracks, you do not want that information left there for prying eyes. As an example, click the Down arrow to the right of where you enter your search on the Google toolbar, and you will see your search history right in front of you. Fortunately, you will also see a link that says Clear History. Just click there, and your history is gone from sight.

All toolbars provide this sort of option, as well as an option to not even remember your Internet search history, although you might have to go into your browser and turn off the AutoComplete function.

But, again, if you want to truly make sure your search history is gone forever, you are going to need third-party privacy control software to do it. These programs cannot only clear history, cache and cookies, but they will usually permanently delete them from your computer where they cannot be recovered using undelete or data recovery software. Most programs on the market use government and military level deletion protocols, which wipe the data from your computer for good.