Home
Module 14: Troubleshooting Software
Contents
1. File and Print Sharing Services 14 12 6 Incorrect service selection __ Network services provide added features to clients on the network For example File and Print Sharing is a popular service on nearly every network If this is not installed files or printers cannot be shared over the network Figure LUshows the screen that a enables print sharing Lwant to be able to give others access to my fies wanitto be able to alow others to print to my printer s Primary Network Logon Chart for Microso Networks File and Print Sharing Description The Clent for Microsoft Networks enables you to connect to other Microso Windows computers and servers and use the fles and printers shared on them pag 38 di 44 IT Essential modulo 14 14 12 7 Incorrect primary network logon settings Primary Network Logon Network access begins with the logon feature shown in Figure Li If a user cannot log on they will not be able to access the desktop or any of the network resources If this happens log on with the administrator account and make sure the account settings are correct Check the password setting and make sure that it has not expired or been locked out Description The primary network logon is the cient thal is used to validate your user name and passwork process any login scripts and perform other startup tasks Figure LUshows the Identification tab in the Network window If the co
2. Reasons to Identify Recent User Changes Identifying any changes that the end user has made to the software environment can simplify l the troubleshooting process Many computer Many times troubleshooting calls are a result of an end user either installing or uninstalling software problems result from end users installing or uninstalling software Sometimes they delete important folders or files by accident End users can provide valuable information about recent changes that have been made 14 1 4 Identify recent user changes to the software environment Sometimes the end user may have deleted a critical folder or file by accident Recently installed software may be incompatible with the operating system or it may have overwritten or deleted important files Sometimes an end user will uninstall software and accidentally delete files that are necessary for the operating system to function properly 14 1 5 Determining whether the problem is hardware or software related Boot Process Computer hardware refers to the physical components of the computer and software PhoenixBIOS 4 0 Release 6 0 refers to the operating system and programs Copyright 1985 2000 Phoenix Technologies Ltd Hardware and software are closely related and All Rights Reserved work with each other which can make problem solving difficult It is important to determine whether computer problems are related to hardware failures or corrupt pr
3. are identified by insufficient memory and incompatible device driver errors Before attempting to resolve hardware problems Hard Disk is Low on Disk Space consult the Microsoft website to see if the ees OUT ee ee eee L i i To free space on this drive by deleting old or hardware is compatible with the operating unnecessary files click Disk Cleanup system that is being installed If the hardware is not supported it should be replaced LEP Troubleshooting startup booting problems es Startup issues typically involve problems with hardware configuration and boot or operating systems Some of these problems will simply prevent system activities from occurring while others will produce error messages that make it easy to find the cause The problem is most likely hardware related if the system produces an error message or a beep coded error signal before the normal beep The normal beep signals that the BIOS has passed successfully and the operating system is about to load If the error message or beep coded error signal occurs after the normal beep the problem is most likely software related Creating the Windows 9x Startup Disk A startup or boot disk allows diagnostic programs to be used to identify the cause of computer problems A blank disk should be used to create a boot disk since any files on the disk will be erased by this procedure a Add Remove Programs Properties Use the following steps to create a
4. is too low error message will appear after logging on The message indicates that r Disable virtual memory Not recommended Windows is increasing the size of the paging file During this process programs may operate more slowly or pause because memory requests __ Cancel by the applications have been denied J Swap File Errors Swap file errors or Swap file corrupt messages indicate that the permanent swap file that was created for Windows has become corrupt Swap file errors commonly indicate that the amount of hard drive space is running out This error may also appear when disk management functions like FORMAT and FDISK are operating Sometimes the swap file will be overwritten or become corrupt If the swap file becomes corrupt or disabled the operating system must be reinstalled 14 5 Using System Tools and System Editors to Troubleshoot Windows 9x 2000 XP 14 5 1 Using System Tools CdS Windows 9x and 2000 have many system tools that are helpful when troubleshooting These include administrative and diagnostic tools that E Event Viewer can help fix problems with the computer system 7 Ge eH e System Log 2 avents TIP parry Sees Gee Peco ae Test Tip Know how to access and use the system tools in Windows Event Viewer The Event Viewer is shown in Figure LI The Event Viewer is used to monitor system application and security events in Windows 9x system events include successful and
5. Even though Windows XP is a Plug and Play operating system the BIOS option can prevent Windows XP boot loader from accessing devices at startup The BIOS option was intended for previous versions of Windows To boot the bootable CD during the installation process go into the BIOS setup and change the boot sequence The setting can be configured multiple ways and each BIOS is different The system may crash after the text mode setup is complete This indicates that the setup is not compatible or that the driver for the disk subsystem is missing If the computer comes with a high performance IDE controller or SCSI device Windows XP may not include a compatible driver Downloading a driver that is compatible with Windows XP copying the driver to a floppy disk and rebooting the system can solve this problem When the text mode setup starts look for the prompt along the bottom of screen that says to push F6 if third party drivers must be installed After the files are loaded setup will prompt for the floppy disk containing the driver After the driver is installed Windows XP setup will continue with the installation 14 8 2 Windows XP upgrade issues ae The issues that will occur when upgrading to Windows XP will be similar to the issues that occur when Windows XP Home and Professional Requirements performing Windows 9x NT and 2000 upgrades As with Windows 9x NT and 2000 problems that occur during upgrades to Windows XP will either be har
6. File System to set read ahead to none e Select Control Panel gt Display gt Settings gt Change Display Type to change the video driver to a standard VGA e Restart the computer in normal mode each time something is changed If the problem is software related consider editing the WIN INI file Only two lines in the WIN INI file do not load in safe mode These are the RUN and the LOAD lines Mark out these lines by putting a semi colon in front of them and then try to start the computer normally If this solves the problem then something loading on these lines is causing the problem If the problem is hardware related consider editing the SYSTEM INI file The Boot and 886Enh sections in the SYSTEM INI file should be examined These are the only two sections that are not loaded when booting into safe mode A line with an exe extension generally indicates a program that is loading Mark these lines out by putting a semi colon in front of them Also look for lines that access files with a 386 in them These are old legacy drivers These may be necessary for operating sound cards modems and other devices but most manufacturers offer updated drivers Command Prompt Only Mode Some systems can also be started in DOS mode to troubleshoot problems Enter the DOS mode by selecting the command prompt only mode This mode provides the ability to troubleshoot the operating system from the command line interface using command line tools and DOS
7. Hardware specific troubleshooting issues were covered in Module 13 14 1 6 Fixing the software eee After identifying and locating the problem it is Possible Ways of Fixing Software time to fix the software The method used to fix the software will depend on the problem It may be necessary to copy some files from the installation CD of the operating system or an To copy some files from the installation CD of the operating system or a CD of an application that was installed back to the hard drive installed application to the hard drive The a E Gol ia palhe chine ahora ia cca ihe paths for shortcuts to the executable files of an executable of the application that was installed installed application may need to be changed sometimes damages can be repaired by reinstalling the software depending on the cause of the software errors This module will discuss many techniques and troubleshooting To reinstall the software aids for resolving software related problems 14 2 DOS Troubleshooting Issues 0 0 00 00 O O TAN ISASTE E The bootup procedure reveals a great deal of information about the status of a system Some errors can be identified and eliminated during the bootup process A problem related to the bootup process will prevent the operating system from loading An understanding of the boot process will help determine which section failed if the system will not boot past that step For example if the system boots to t
8. a Back i AdsbaPs Arabai Distiller CEPS HP Lager dal AIDU Sariei Windows NT Fak Driwar T CEPS HP Lazar Jet 6100 Barka 2a COPS Mk Phaser SHIP iria s new prinfar oik fhe Add loss pag queue and print them in the background instead of waiting for each print job to be completed The print spooler is the printer managing function and its support components are integrated into a single print processing architecture Setup The print spooler is installed in Windows when the printing services and the printer 34 di 44 IT Essential modulo 14 are installed The print spooler sends print data to the printer when the data is ready The settings can be changed through the My Computer icon on the desktop or by clicking on Start gt Settings gt Printers as shown in Figure Li 14 11 21 Print queues O OOO can only process one print job at a time When a print job is sent to a printer while it E EEE is busy that print job is held in the printer queue as shown in Figure U A printer queue is a temporary holding area for print jobs The printer queue will send the next job to the printer when it becomes available The queue is an area of memory that is set aside on the print server for managing print jobs When a user prints a document it is sent to the printer queue If there are no other jobs in the queue it is processed immediately Printer queues by default use the First In First Out FIFO rule T
9. MOUSE EXE DOSKEY CLS The system would still boot if these files were missing or corrupted However these two files are essential for the complete bootup process to occur with the DOS operating system They contain information that is used to change the operating system for personal use They also contain the requirements of different software application packages A system would require troubleshooting if either of these files became damaged or corrupted 14 2 2 DOS error messages as Error messages are commonly displayed when operating systems require troubleshooting Many factors can cause error messages to display As technicians gain troubleshooting experience these messages become easier to recognize and address Error messages usually appear when the operating system identifies a problem or when end users try to use an application that the operating system cannot recognize pag 7 di 44 IT Essential modulo 14 Bad or Missing COMMAND COM In the DOS environment the Bad or Missing COMMAND COM error message is common This error message may appear for several reasons e The COMMAND COM file cannot be found on the hard drive e The COMMAND COM file is not located in the hard drive root directory This usually occurs when a new hard drive or operating system is installed e The end user accidentally erased the COMMAND COM file from the root directory This error message does not mean that the operating sy
10. To fix this error open the files and edit them to ntti Drive not formatted eran Failure to Start GUI The operating system files that control the graphical user interface GUI can become corrupted and generate the Failure to start GUI error message If this occurs start the operating system from the DOS hind nen prompt or the command line From the DOS prompt SYSTEM INI WIN INI or tana remove the lines that are referencing hardware or software A device has been improperly removed Registry is not found troubleshoot the operating system to repair the files avers that start the GUI Figure lis an activity related to error codes and startup messages i B Oe Windows 9x Startup Modes pn pag 15 di 44 IT Essential modulo 14 Access the Windows 9x Startup Menu by pressing the F8 key when the starting Windows 9x screen is displayed The menu offers several startup options including normal logged safe mode step by step confirmation and DOS modes as shown in Figure Lt These startup modes are helpful for troubleshooting startup issues In normal mode the system boots as it normally would with all the proper drivers and registry files The logged mode boots just like the normal mode but it creates an error log that contains the performed steps and their outcomes Safe Mode Safe mode is a troubleshooting tool for Windows Windows 9x Startup Modes It is similar to the command line switches for Win
11. Unfortunately many computer problems result from end users that are trying to do something pag 3 di 44 IT Essential modulo 14 they are not supposed to be doing such as installing software or downloading files from the Internet If their systems are not working because of these actions they are less likely to say what is wrong Administrators or service technicians usually know more about computers than end users Be patient with end users and do not get frustrated or say something that makes them feel stupid A trivial problem that is obvious to the administrator may be something that the end user does not understand It is important to be polite when eliciting information from end users 14 1 3 Reproducing the error symptoms Reasons to Reproduce the Error Symptoms After talking to the user administrators should try to reproduce the error symptoms Reproducing the error symptoms is helpful because determining To get an idea as to what the end user was doing when the when the error occurs in the process can help i ii identify where the search for the problem should To know at what point the error occurs in the process can begin For exam ple if an end user states that an help identify what area to begin the search for the problem error message appears during the bootup process the error symptoms can be reproduced by rebooting the computer which will determine at what point in the boot process the computer stops
12. Windows 98 FP insta Uninstal Windows Setup Startup Disk startup disk If you have trouble starting Windows 98 you can use a startup disk to start your computer run diagnostic programs and fix many problems To create a startup disk click Create Disk You will floppy disk e Label a blank disk as the Windows 98 startup disk e Goto Start gt Settings gt Control Panel e Double click the Add Remove Programs icon e Click the Startup Disk tab and then click Create Disk as shown in Figure LU e Insert the blank disk into the disk drive and click OK Using the Windows 9x Startup Disk The Windows 9x startup disk allows technicians pag 10 di 44 IT Essential modulo 14 access to the system when the OS becomes corrupted To use the disk insert it into the floppy drive and restart the system Use the Windows 9x startup disk to access the operating system files and use the troubleshooting tools on the disk to identify the cause of the problem In addition to the files that are needed to start the system in a minimal or DOS mode the Windows 9x Startup disk provides many diagnostic programs and CD ROM drivers The Startup disk also contains a RAM drive and an EXTRACT EXE command that can be used to copy CAB files from the Windows 98 CD TIP Test Tip Know the steps to create a boot disk and how to use it to start the system Using Windows System Tools to Troubleshoot Startup Problems The Windows operating s
13. Windows 9x Troubleshooting Problems s 14 4 1 Upgrade issues pag 13 di 44 IT Essential Windows 98 Minimum System Requirements 486DX 66 megahertz MHz or faster processor 16 megabytes MB of memory A full install of Windows 98 on a FAT16 drive requires 225 MB of free hard disk space A full install of Windows 98 on a FAT32 drive requires 175 MB of free hard disk space VGA or higher resolution monitor Keyboard CD ROM drive optional but recommended High density 3 5 inch disk drive if no bootable CD ROM drive is available install of Windows 98 on a FAT 32 drive e VGA or higher resolution monitor e Keyboard e CD ROM drive is optional but recommended modulo 14 Problems encountered during upgrades to Windows 9x will be related to hardware software or both Before starting an upgrade consult the Microsoft website to see if the hardware is compatible Make sure that the hardware meets the minimum system recommendations Check with the hardware component manufacturers and the software publishers to determine if updated drivers are needed for the upgrade The minimum system requirements for Windows 98 are as follows e 486DX 66 megahertz MHz or faster processor e 16 megabytes MB of memory e 225 MB of free hard disk space for a full install of Windows 98 on a FAT 16 drive e 1 75 MB of free hard disk space for a full High density 3 5 inch disk drive if no bootable C
14. and is not normally visible to users For example hidden files are not listed when the DOS dir command is executed However most file management utilities allow the viewing of hidden files DOS hides some files such as MSDOS SYS and IO SYS so that users will not accidentally corrupt them These two files are the special files in the operating system boot record Without them the system cannot boot successfully The hidden attribute for any normal file can also be turned on to prevent users from viewing or corrupting the file The attrib command is used to view and change file attributes The Command Interpreter COMMAND COM is the command interpreter It is the most important system file since the computer cannot boot without it COMMAND COM contains the most commonly used commands of the operating system When a DOS command is entered at the DOS prompt the COMMAND COM program examines it to determine if it is internal or external Internal commands are recognized and executed immediately External commands are stored in the DOS directory and the COMMAND COM file must browse through the directory to find the command program When DOS runs an application COMMAND COM finds the program and then loads it and gives it control of the system When the program is shut down it passes control back to the command interpreter DOS Switches Many common DOS switches were discussed in Module 4 This module will introduce a few more switches that are usefu
15. block conflict exists and needs to be resolved To resolve the conflicting driver issue run l the MSD EXE diagnostic tool to examine the drivers using the upper memory block After locating a conflicting driver add an emmexclude line to the 386Enh section of the SYSTEM INI file This statement in the SYSTEM INI file will prevent Windows from trying to use the space to establish buffers Figure 2lsummarizes useful information about the MS DOS memory layout Figure Sltests knowledge of MS DOS memory layout LASTDRIVE Errors The LASTDRIVE command is contained in the MS DOS Memory Layout Activity CONFIG SYS file and specifies the maximum number of drives the system can access Common troubleshooting issues with this command can be fixed by editing the INS CONFIG SYS file The parameter that contains 4 GB the actual number of drives may be incorrect and this value might have to be manually edited After correcting this value restart the system and see if it boots properly If the available disk drives are set to a letter value that is lower than what is required of the existing system DOS will automatically override the letter value to accommodate the drives installed in the system Tii pies Soo Eo i 7 e rea rea The number of drives should only be increased if 2 additional drives are going to be used because i a High Memory Area each drive letter above E decreases the amount of RAM available for othe
16. editors Loading the HIMEM SYS the IFSHLP SYS or any of the Windows 9x files can also be avoided Choose this startup option if the system will not boot in safe mode pag 16 di 44 IT Essential modulo 14 WIN Switches The WIN switches provide the ability to start up Windows from the command line These switches can be used to perform the following tasks e Usethe win D switch to troubleshoot and isolate problems with the operating system Modify the D switch to start Windows in a number of different configurations Use these different configurations to start Windows with different options to troubleshoot specific areas of the operating system e Use the D F switch to disable 32 bit disk access e Start Windows in safe mode or safe mode with networking by using the D M switch e Prohibit Windows from using the address space between FOOOh and FFFFFh by using the D Ss switch e Prevent Windows from controlling disk transfers by using the D V switch The hard drive disk transfers will be handled by the BIOS instead The various switches allow users to manipulate Windows to troubleshoot specific areas of the operating system 14 4 4 Windows 9x error log files a When troubleshooting a computer system it can be difficult to determine exactly what the error is or why it occurred It may be easy to recognize and solve the problem but it is important to identify the cause of the error Fixing the problem without fixing the caus
17. reply PING is used primarily to troubleshoot Internet and network connections Figure LUshows the ping command pag 39 di 44 IT Essential modulo 14 TRACERT EXE TRACERT EXE is a utility that traces a packet from the computer to an Internet host It shows how many hops the packet requires to reach the host and how long each hop takes If website pages are appearing slowly use TRACERT EXE to identify where the longest delays are occurring Figure elshows the tracert command The TRACERT EXE utility sends packets with Time to Live TTL fields The TTL value specifies how many hops the packet is allowed before it is returned When a packet cannot reach its destination because the TTL value is too low the last host returns the packet and identifies itself By sending a series of packets and increasing the TTL value with each successive packet TRACERT EXE identifies all the intermediary hosts WINIPCFG EXE Windows IP Configuration or the WINIPCFG EXE utility allows technicians to view the basic IP networking settings of a Windows 95 98 or ME computer IP addresses which allow computers to interact with the Internet are allocated and assigned by the Dynamic Host Configuration Protocol DHCP When the system boots up it sends a message to the DHCP server saying that it needs an IP address The DHCP server finds an available IP address and assigns it to the computer Figure shows the IP configuration from the WINIP
18. the backup Therefore it has the smallest impact on the network resources in a networked environment e Disadvantage If users need to restore the complete system backup they must first restore the full backup tape and then restore all the incremental backup tapes in order This takes a great deal of time and if one of the tapes is bad the information will be lost pag 33 di 44 IT Essential modulo 14 Differential Backup A differential backup procedure backs up all the files that have been created or modified since the last full backup The difference between a differential backup and an incremental backup is that after a file is saved in a differential backup the archive bit is not reset Each time a differential backup is performed all the files modified or created since the last full backup will be saved again If a full backup were performed on a Monday it would reset all the archive bits on the files On Tuesday a differential backup would be performed on a different tape This would store all the files modified on Tuesday but it would not reset their archive bits This process is repeated for every business day of the week using the same tape A differential backup will also provide a complete backup of network data in a networked environment The advantages and disadvantages of a differential backup are as follows Advantages Differential backups only require two tapes to create and restore a complete system backu
19. used These programs are using system resources Any unnecessary icons in the system tray should be disabled or removed to free up more resources for other applications A General Protection Fault GPF o A General Protection Fault GPF occurs when General Protection Faults GPF Problems an application attempts to access an unallocated memory location Figure Lishows the screen that is displayed GPFs are usually caused when programs use illegal instructions to access protected areas of memory In earlier versions of Windows a GPF would crash the i A fatal exception OE has occured at FOAD 42494C4C system and require the system to be rebooted the current application will be terminated Any unsaved data would be lost in the process The latest versions of Windows remain stable Press any key to terminate the current application Press CTRL ALT DELETE again to restart your after a GPF so that users can close the error computer You will lose any unsaved information in message and save their data before closing the all applications application or restarting the system Press any key to continue GPFs can be caused by trying to use applications that are not written for the Windows operating system selecting the wrong machine or network during installation or using incorrect versions of DOS in the system A CONFIG SYS or AUTOEXEC BAT file that contains unsupported programs or drivers could also be a cause 14 3 4 Windows OS m
20. CFG utility The WINIPCFG utility allows technicians to receive new IP information such as addresses masks or gateways without rebooting The IP information can be released by selecting the Release button Selecting the Renew es button will assign a new IP address to the computer from the DHCP server Obtaining new information can help with P related problems Broadcast To use WINIPCFG select Run from the Start menu and type piers winipcfg into the Open field Then hit the OK button This can Ener Ade tn also be run from a DOS prompt a z IP Autocon guration Address 169 254 64 188 IPCONFIG EXE ae 2525500 The IPCONFIG EXE utility is the Windows NT and 2000 equivalent DHCP Serer 255 255 255 255 of the WINIPCFG EXE utility The IPCONFIG EXE utility allows Primary WINS Server users to view the IP address information the WINS server i Nea Lease Obtained 02 26 02 10 35 38 AM addresses the DNS server addresses and the DHCP server addresses New IP addresses can be obtained by using the release or renew switches Unlike the winipcfg command the a PP a ipconfig command must be run from the DOS prompt It cannot be typed in the Run window on the Start menu Figure 4Ishows the ipconfig command being run from the DOS prompt Lease Expires pag 40 di 44 IT Essential modulo 14 Thenet viewCommand IPECONEIG EXE The net view command will display a list of domains a list of computers
21. D ROM drive is available The Microsoft website includes a list of recommendations that identify the type of processor and amount of RAM required to use the selected operating system 14 4 2 Error codes and startup messages y Error codes that are generated at system startup usually indicate hardware problems configuration problems or bootup problems that are associated with the operating system These types of errors will result in a startup failure These problems must be fixed before the system can boot up properly If one of these errors appears use the emergency boot disk to boot the system and begin the troubleshooting process No Operating System Found The Missing operating system error message is shown in Figure L1 If this message appears during startup it No Operating System Found Missing operating system_ probably indicates a failed hard drive or a damaged or corrupted MBR This error message might also appear if the command interpreter o COMMAND COM file is missing To troubleshoot the problem first check to make sure that the hard drive and all cables are properly installed If the problem continues start the system with a boot disk containing disk exe and use the disk exe mbr command to fix the master boot record on the hard drive It may be necessary to run diagnostics on the hard drive to determine if a hard drive failure has occurred NOTE The error message will depend on the BIOS and th
22. FC42 DLL files that can be found other than those in the system and cabs folders from MFC42 DLL to MFC42 OLD and reboot the computer This can only be done from a DOS prompt If the problem is resolved the name can be changed back to the original Do this one file at a time If three MFC42 DLL files are found rename the first one Reboot and if the problem remains rename the next one and continue the process Eventually there should only be one copy of this file in the system folder and one in the cabs folder nE Gan SEE rm you wii bo prompted io makere he original file By clicking Settings System File Checker can also be configured to notify you of changed and deleted files Windows Missing Corrupt DLL or VxD Files oOo 1 amp 4 System File Checker System File Checker verifies the integrity of your system files Extract one file from installation disk If this does not fix the problem rename the MFC42 DLL file a Se found in the system folder to MFC42 OLD Then copy one rent of the other MFC42 DLL files that were found in the other folders to the C windows system and rename it to MFC42 DLL The object is to use the other versions and see if they work This will usually solve the problem of missing or corrupt DLL files 14 3 5 System lockup errors Say System Lock Up Errors The majority of the system lockup errors occur when a memory End Program Win allocation error exists or when system resources are too l
23. Foward Options Web Help Contents Index Search Type in the keyword to find doc fies see documents _ Welcome to Help gt files using as wallpaper Use the Help system to learn more about Windows 98 Find answers to your questions Browse the online version of the Getting Started book e Connect to the Web to get software updates Troubleshoot your system Micr nights reserved Window XP includes a new help feature called the Help and Support Center which is shown in Figure The Help and Support Center home page includes links to basic tools and utilities such as Disk Defragmenter System Configuration Utility Network Diagnostics and Windows Update All of these utilities can be run from the Help and Support Center window Additional links provide up to date system information about current configurations installed services software and hardware Other links include Microsoft Knowledge Base and a variety of Windows focused newsgroups Remote Assistance allows experienced users to connect directly to a computer experiencing problems and make any configuration changes or repairs 42 di 44 IT Essential modulo 14 14 13 2 Troubleshooting and information resources SS If issues are not found in the Help and Troubleshooting Files database other resources are available such as the Windows 9x NT and 2000 resource kits and various websites Windows 9x NT and 2000 Resource Kits T
24. IT Essential modulo 14 Module 14 Troubleshooting Software Module Overview 14 1 14 2 14 3 14 4 14 5 14 6 14 7 14 8 14 9 14 10 Role of the End User 14 1 1 Overview of the troubleshooting process 14 1 2 Eliciting information from the end user regarding the problem 14 1 3 Reproducing the error symptoms 14 1 4 Identify recent user changes to the software environment 14 1 5 Determining whether the problem is hardware or software related 14 1 6 Fixing the software DOS Troubleshooting Issues 14 2 1 System boot problems 14 2 2 DOS error messages 14 2 3 Invalid directory errors Common Windows Operating System Problems 14 3 1 Troubleshooting setup installation problems 14 3 2 Troubleshooting startup booting problems 14 3 3 Windows memory usage problems 14 3 4 Windows OS missing corrupt DLL or VxD files 14 3 5 System lockup errors 14 3 6 Troubleshooting shutdown problems Windows 9x Troubleshooting Problems 14 4 1 Upgrade issues 14 4 2 Error codes and startup messages 14 4 3 Windows 9x Startup Modes 14 4 4 Windows 9x error log files 14 4 5 Windows virtual memory errors Using System Tools and System Editors to Troubleshoot Windows 9x 2000 XP 14 5 1 Using System Tools 14 5 2 Using Windows Device Manager to troubleshoot 14 5 3 Using Windows system editors Windows 9x 2000 XP Registry Problems 14 6 1 The Registry files 14 6 2 The Registry structure 14 6 3 Editing the Registry 14 6 4 Cl
25. Jobs Welcome to the Windows 2000 Backup and Recovery Tools Backup Wizard The Backup wizard helps you create a backup of your programs and files so you can prevent data loss and damage caused by disk failures power virus infections and other potentially damaging events Restore Wizard Fat The Restore wizard helps you restore your previously backed up data in the event of a 22 hardware failure accidental erasure or other data loss or damage Tai Emergency Repair Disk A This option helps you create an Emergency Repair Disk that you can use to repair and L restat Windows if it is damaged This option does not back up your files or programs and it is not a replacement for regularly backing up your system pag 31 di 44 IT Essential modulo 14 System Tools gt Backup or type NTBACKUP EXE in the Run dialog box at the Start menu Figure Lushows the screen that is displayed When the system backup begins a welcome page will appear with wizards for automating the backup and restoration processes To back up the registry with the Windows 2000 backup utility choose the Backup Windows 2000 Backup System State Wizard or select the Backup tab If the rere dob Edi View Tools Hep Wizard is used the user will be asked what to backup If the backup is running on a Ey Cto ns ce cr tr nc Windows 2000 Domain Controller back up 7 a ala we at the AD the registry and the data by selecting the opti
26. N INI The WIN INI file contains parameters that can be altered to change the Windows environment or software settings based on user preferences Registry Files The WIN INI file is a software initialization file for Windows It contains information about some Windows defaults the placement of windows color settings for the screen available ports printers fonts and software USER DAT applications USER DAO NOTE SYSTEM DAT WIN COM is another registry file that controls the initial environment It checks SYSTEM DAO and loads Windows 95 core components when Windows 95 is loading SYSTEM INI TIP Test Tip It is important to know how to access the Registry Editor and the files associated with the registry WIN INI pag 22 di 44 IT Essential modulo 14 14 6 2 The Registry structure Understanding the purpose of the registry structure subtrees Registry Keys will help troubleshoot and maintain the computer There is a key for every system process in the Registry Editor as shown in Figure Li The following five subtrees or subtree keys are dane A Ral le in Regi itor window SM computer displayed in Registry Editor window SN ccs ROOT H Registry Editors Ei HKEY_CURRENT_USER e HKEY_USERS Contains the system default settings GL HKEY_LOCAL_MACHINE data that is used to control individual user profiles and Fg HKEY_USERS environments such as desktop settings Windows La HKEY_CURRENT_CONFIG envir
27. O and USER DAT to USER DAQO If Windows 95 has not replaced either backup file with a corrupt registry these files can be restored This could be true if Windows 95 has not been restarted since the registry became corrupt Copy SYSTEM DAO to SYSTEM DAT and USER DAO to USER DAT to recover the last copy of the uncorrupted registry files Windows 98 and ME Windows 98 does not copy the registry to DAO files when the operating system starts Instead it provides a program called Registry Checker Registry Checker or SCANREGW EXE backs up the registry to a CAB file once a day The CAB file puts the registry in C Windows Sysbckup which is a hidden folder The first backup is named RBOOO CAB the second backup is RBOO1 CAB and so on The file with the most recent date is the latest backup Registry Checker can also make additional backup copies of the registry Do this by finding SCANREGW EXE in the C Windows folder or choose Run on the Start menu type SCANREGW EXE and press Enter After scanning the registry for errors it will ask whether to make another backup of the registry Click Yes and then Windows Registry Checker will back up the registry to another CAB file and display a dialog box stating that it is finished Click OK to close the Windows Registry Checker Windows NT Windows NT 4 0 offers several ways to back up and recover the registry or the individual hives in the registry A hive is a collection of registry keys subkeys and v
28. Problems between the program and a software driver in the operating system e Memory management problems between the program and an open program in the background e Problems and conflicts with different Dynamic Link Library DLL files which are added to the system when software programs are installed e Hardware conflicts e Defective RAM chips e Program bugs To pinpoint the cause ask the following questions e ls a program that has always worked now crashing unexpectedly e Have new hardware devices or software been added recently Tracing the origins of a problem to a specific event may help isolate the likely causes The Illegal operation error can also be caused by an incompatible printer driver even if the error is not generated when printing A Device Referenced in SYSTEM INI WIN INI or Registry Is Not Found The WIN INI file contains parameters that can be altered to change the Windows environment and software settings to user preferences WIN INI is a software initialization file for Windows It contains information about some Windows defaults the placement of windows color settings for the screen available ports printers fonts and software applications The SYSTEM INI file contains hardware setting information for the drivers that Windows uses for configuration When this error Error Codes and Startup Messages message displays it usually means that these files contain an entry that is no longer installed in the system
29. a Backs up selected F Microsof Backup Untied Siam files and folders When this option is U L U a Hlal e x slasi peal sacl wel clicked the Backup Wizard provides a J aa hierarchical view of the computer and Tole Weer nator ec the network through My Network Fo Places A backup is a copy of the files from your computer stared on e ss media such as a tape a floppy diskette or a removable disk e Only Back Up The System State What Abackup job can be created which tells your computer how Data Backs up important system aaa gaa components such as the registry and the boot files Open an existing backup jab For Windows 9x use the backup and Restor backed up fies restore commands to back up data The a ea ap a backup command BACKUP EXE can be used aa to begin the backup process This does not install automatically when Windows 9x is installed Install it by adding it from the Windows Setup tab in the Add Remove j Programs feature in the control panel When this backup program is used there is a prompt to create a new backup job open an existing backup job or restore backed up files 14 10 3 Types of data backup procedures CAMyBackup gic aid In this section some common backup procedures such as normal incremental differential and daily are discussed The first three backup procedures are the most common Figure LUshows the backup types available Normal Backup A nor
30. alues that are stored in a file The easiest way to back up the registry is by using the Emergency Repair Disk ERD The ERD copies local hive files found in systemroot system32 config to systemroot repair The files can also be copied to a floppy disk Use The Windows NT Resource Kit backup utilities or a third party backup program to copy the hive files to tape When the ERD process is run from the NT Backup utility the current registry hives can be backed up to the repair directory on the system hard drive before the ERD floppy is created If this option is chosen all registry hives are copied to a directory called regback in systemroot repair This option also copies the current user NTUSER DAT file to this folder The user specific COM Classes portion of the user profile is copied to a file called USRCLASS DAT This is the equivalent of NT 4 0 running RDISK EXE which is a recovery disk program with the option to create the files on the hard drive instead of a floppy If necessary these saved registry hives can be used during a system repair process Windows 2000 The registry backup is part of the system state backup which also includes critical boot files on domain controllers and the Active Directory database Start the Windows 2000 backup utility by selecting Start gt Programs gt Accessories gt Windows 2000 Backup and Recovery Backup Untitled Job Edit View Tools Help Welcome Backup Restore Schedule
31. and a list of F CAWINNT System32 emd exe resources for a computer The net view a command is a command line interface that A performs most of the browsing functions pate See eee ee ER available in Network Neighborhood or My a te se ee gee Computer However users cannot view a list of ea pagar ia workgroups C pdpcontig ranew Windows 2000 IP Configuration The syntax for the net view command is net Ethernet adapter Local Area Connection view computername Connection specific DNS Suffix domain domainname If the net view gedit Mas ee in 2 e command is entered with no parameters it will neni display a list of computers in the domain The ire iney computername should identify the computer ear ceee IP address successfully released for adapterLocal Area Connection with the resources that are to be displayed The domainname should identify the domain whose computer names are to be viewed Using domain will display all domain names on the network Type these commands from the DOS prompt The NetStat Utility The Network Statistics or Active Connectic NetStat utility displays the current TCP IP network Proto Local Address Foreign Address State connection and protocol information for the SHED i a computer The netstat command displays the contents of various network related data structures There are many different output formats depending on the information being presented For example this command can be us
32. auses the operating system to crash This could occur if multiple applications are being used and one application attempts to use the memory space of another When this happens the operating system will generate an error message or stop processing and lock up The typical error message is This operation has performed an illegal operation and is about to be shut down Some memory usage errors are non fatal which means that they will not cause the application or the system to lock up These errors give users the option to continue working or to shut down the application It is recommended that users shut down the application Otherwise it could become unstable and lock up causing a loss of unsaved data If a Windows memory error affects the Windows core files KRNLXXX EXE GDI EXE or USER EXE restart the Windows operating system Windows Resources Low Issues When the Windows resource level gets too low it can cause applications or the operating system to lock up This type of error indicates that the operating system is running out of real and virtual memory The system performance will begin to degrade and slow down This usually occurs when many applications are being used at the same time or when the system has not been restarted in a long time The system tray in the pag 11 di 44 IT Essential modulo 14 lower right corner of the screen contains programs that are constantly operating in the background even though they are not being
33. de by the programmer The loss or corruption of DLL files will cause an application to lock up or prevent it from loading Problems occur when a new application is installed and then updates the shared DLLs This creates a DLL conflict As a result of this conflict older applications may not be able to use the updated file and will not work properly pag 29 di 44 lT Essential Cyetam File Chacke System Hile Ghecker Ee CAWINNT System32iemd exe C Copyright 1985 1999 Microsoft Corp C gt stc Microsoft R Windows 2000 Windows File Checker Version 5 00 C 1999 Microsoft Corp All rights reserved modulo 14 Scans all protected system files and replaces incorrect versions with correct Microsoft vers lons SFC SCANNOW SCANONCE SCANBOOT CANCEL ENABLE PURGECACHE CAC SIZE y QUIET ISCANNOW Scans all protected system files immediately ISCNAONCE Scans all protected system files once at the next boot ISCANBOOT Scans all protected system files at every boot CANCEL Cancels all pending scans of protected system files IQUIET Replace all incorrect file versions without prompting the use fENABLE Enables Windows File Protection for normal operation IPURGECACHE Purges the file cache and scans all protected system files immediately iCACHESIZE Sets the file cache size Gi FE E A start H E E E CAWINNTSystem32 Windows NT and 2000 often experience the same application err
34. dows 3 x Safe mode allows access to Panen R E dat Windows using only the most basic drivers The lt properties of safe mode are as follows m th tiga rela 3 Safe mode 4 Step by step confirmation e The AUTOEXEC BAT and CONFIG SYS ERER files are not loaded e The main portion of the registry is not loaded e In WIN INI the load and run lines are not loaded e In SYSTEM INI the Boot and 886Enh sections are not loaded Starting Windows 9x in safe mode bypasses the real mode configuration and loads a protected mode configuration This disables Windows 95 device drivers and uses the standard VGA display adapter If the problem does not occur in safe mode it may indicate a conflict with hardware settings real mode configuration issues incompatible legacy Windows programs or drivers or registry damage While Windows is in safe mode the Device Manager should be checked for any hardware device conflicts If there are conflicts it may be necessary to change interrupt request IRQ or direct memory access DMA settings If no conflicts exist the problem is probably software related Safe mode is the best troubleshooting tool in Windows but safe mode does not state exactly where the problem is There are several common troubleshooting steps to perform in safe mode e Select Control Panel gt System gt Performance gt Graphics to set hardware acceleration to none e Select Control Panel gt System gt Performance gt
35. dware or software related and sometimes there will be problems with both hardware and software Before any upgrade is started consult the Microsoft website to see if the hardware is compatible Check with the manufacturer of the hardware components and software to see if they have any updated drivers that are necessary for the upgrade As shown in Figure LI Microsoft has recommended several requirements prior to installing the XP Home or XP Professional Edition operating system e A Pentium 233 MHz processor or faster with 300 MHz recommended pag 27 di 44 Pentium 233 MHz processor or faster with 300 Mhz recommended At least 64 MB of RAM with 128 MB recommended At least 1 5 GB of available hard disk space A CD Rom or DVD Rom drive A keyboard and a Microsoft mouse or some other compatible pointing device A video adapter and monitor with Super VGA resolution of 800 X 600 or higher A sound card Speakers or headphones XP Professional would need a NIC in the corporate environment IT Essential modulo 14 At least 64 MB of RAM with 128 MB recommended At least 1 5 GB of available hard disk space A CD ROM or DVD ROM drive A keyboard and a Microsoft Mouse or some other compatible pointing device A video adapter and monitor with Super VGA resolution of 800 x 600 or higher A sound card Speakers or headphones XP Professional would need a NIC in the corporate environment TIP Test Ti
36. e disk and start over The FORMAT EXE utility allows the administrator to reformat the hard drive if necessary The command is used to prepare a new disk for use with an operating system As a result all of the information on the hard drive will be erased pag 6 di 44 IT Essential FDISK EXE fdisk is one of the most commonly used MS DOS commands even with newer operating systems such as Windows 98 2000 and XP fdisk allows the technician to delete and create partitions on the hard drive After using the boot disk to boot to a DOS prompt type disk to enter the screen Figure elshows the fdisk options that allow changes to be made to the hard disk partitions If a computer is unable to boot this usually indicates that the Master Boot Record MBR has been damaged or corrupted This can be caused by a virus or by files that have been deleted The MBR is a program that is executed when a computer boots up The MBR usually resides on the first sector of the hard drive The program begins the CONFIG SYS fj Config sys Notepad File Edit Search Help DEVICE C WINDOWS HIMEM SYS DOS HIGH UMB DEVICE C WINDOWS EMM386 EXE NOEMS FILES 30 STACKS 0 0 BUFFERS 20 DEVICEHIGH C WINDOWS COMMANDI ANSILSYS DEVICEHIGH C CDROM SYS D 123 Figure El and AUTOEXEC BAT modulo 14 M MS DOS Prompt FDISK i e el Al Microsoft Window 98 Fixed Disk Setup Program C Copyright Microsoft Corp 1983 1998 FDISK Optio
37. e DRWATSON LOG file This log provides details about events that cause GPFs and can be used to diagnose technical problems If an error occurs more than once in the same application the software may need to be updated with a patch alee atari The SCANREG EXE file is used to scan the registry for Windows Registry Checker corruption This should be used if system troubleshooting indicates that an error is caused by a corrupted registry Scanning System Registry entry Figure Elshows the Windows registry being scanned If the scan produces any corrupted files try to repair them by inserting the installation CD and choosing the repair installation option DEFRAG EXE system performance can be degraded when files are fragmented on the hard drive As files are added and erased pieces of files are scattered through the hard drive This degrades performance and can also cause the system or applications to lockup Use the DEFRAG EXE file to start the defrag utility Figure Elshows the DEFRAG EXE utility operating This will rewrite all the files on the hard drive back to the beginning of the drive which will simplify information retrieval CHKDSK EXE The CHKDSK utility is a command line tool that is used to recover lost allocation units from the hard drive The lost allocation units occur when an application terminates unexpectedly Over time lost allocation units can accumulate and occupy large amounts of disk space By adding the F switch to
38. e edited and viewed through the Registry Editors Access the Registry Editors by typing regedit or regedt32 at the run command window on the Start menu When this command is entered there will be an interface with the registry subtrees window allowing the search of all registry values This allows the manual change of any registry values REGEDIT EXE and REGEDT32 EXE REGEDIT EXE which is shown in Figure Lt was designed to work with Windows 9x but it will also work with Windows 2000 Figure 2lshows REGEDT32 EXE REGEDT32 EXE is recommended for use with Windows 2000 and REGEDIT EXE is recommended for Windows 9x REGEDT32 is automatically installed in the systemroot System32 folder REGEDIT EXE is automatically installed in the systemroot folder Use these commands to navigate and edit the registry manually Third Party Registry Editing Tools pag 23 di 44 IT Essential modulo 14 G Registry Editors Registry Edit View Favorites Help LJ HKEY_ CLASSES ROOT H O HKEY_CURRENT_USER H E HKEY_LOCAL_MACHINE HE HKEY_USERS SHA HKEY_CURRENT_CONFIG ge A ok Connect t the Internet Astar 7 E3 Registry Editor zum Navigating and editing the Windows registry can be a difficult and confusing task even for the most experienced technician The operating system can be damaged beyond repair if the wrong value is edited or deleted To make editing the registry and easier and safer task use third party registry editing tool
39. e functioning properly If a message appears stating that the updates amp patches i sore packet was not ee then the NIC is bad and will serch eerie need to be replaced If the PING receives a response i Caoba seem then the NIC is working asi _ a Seite rer and apport enal NIC Driver Software Issues pelt ae i The NIC driver software issues will probably include incorrect versions of the driver corrupt drivers or incompatible drivers If a driver is an incorrect version contact the manufacturer for the correct one The correct gt es printing instructions sing this site means you accep pt its terms nag 36 di 44 IT Essential modulo 14 driver can usually be downloaded from the manufacturer website Figure shows the HP download site with the drivers available If the driver is corrupt Incorrect Drivers Upgrade Device Driver Wizard a a version that is not corrupt can be SEENE E m obtained from the website If other Which network adapter do you want to install ty conflicts with the operating system h produce an error the driver may work if Click the Network Adapter that matches your hardware then click OK If you have an the cause of the conflict is fixed If an a Se ae incompatible driver error message appears check to see which version of the driver is installed and update it to TAR at match the version that is required by the E CoIVEan Wii A tthe der operati
40. e version that is on the machine Windows Protection Error This error can occur when a computer loads or unloads a virtual device driver VxD The VxD that did not load or unload is usually mentioned in the error message Sometimes it will be impossible to identify the VxD that caused the error Windows protection error messages can occur for several reasons e Areal mode driver and a protected mode driver are in conflict pag 14 di 44 IT Essential modulo 14 The registry is damaged The WIN COM file or the COMMAND COM file is infected with a virus or is damaged A protected mode driver is loaded from the SYSTEM INI file and the driver is already initialized There is a physical input output I O address conflict or a Random Access Memory RAM address conflict e There are incorrect Complementary Metal Oxide Semiconductor CMOS settings for built in peripheral devices such as cache settings CPU timing and hard disks e The Plug and Play feature of the computer Basic Input Output System BIOS is not working correctly e The computer contains a malfunctioning cache or malfunctioning memory e The computer motherboard is not working properly Illegal Operation This error message indicates that a specific program is having a problem The illegal operation designation covers a wide range of errors It may take some time to identify the cause The most common causes of an illegal operation error message are as follows e
41. e will not prevent it from coming back Windows 9x maintains error log files of system operations which list the events that led to the error The filenames of these log files are indicative of the type of information they track Figure LUlshows the function and location of each log file and indicates when each log file is created The BOOTLOG TXT file contains the information that is collected while the system is booting up This file is created during the Windows installation process It is not automatically updated each time the system boots The file can be updated by pressing the F8 key during startup or by starting Windows with the win B switch The log information is recorded in five steps Step 1 Loading Real Mode Drivers The system loads the real mode drivers and reports an error in the log if it is unsuccessful Step 2 Loading Virtual Device Drivers VxDs The system loads the Virtual Device Drivers and reports an error in the log if it is unsuccessful Step 3 Initialization of Critical VxDs The system initializes critical VxDs and reports an error in the log if it is unsuccessful Step 4 Device Initialization of VxDs This log shows all of the VxDs that have been successfully initialized In this section each device will be initialized and a success or failure report will be generated Step 5 Successful Initialization of VxDs This section verifies the successful completion of the initialization of the system VxD
42. eaning the Registry Windows NT4 2000 Troubleshooting Problems 14 7 1 Windows NT 2000 installation problems Review 14 7 2 Windows NT 2000 upgrade issues 14 7 3 Windows NT Startup Modes 14 7 4 Windows 2000 Startup Modes 14 7 5 Windows 2000 Recovery Console Troubleshooting Windows XP 14 8 1 Windows XP installation problems 14 8 2 Windows XP upgrade issues 14 8 3 Windows XP startup modes 14 8 4 Windows XP recovery console Troubleshooting Applications 14 9 1 Troubleshooting DOS applications 14 9 2 Troubleshooting DOS applications Windows Data Backup and Recovery pag 1 di 44 IT Essential modulo 14 14 11 14 12 14 13 14 10 1 Windows Registry backup and recovery tools 14 10 2 Windows Registry backup and recovery tools 14 10 3 Types of data backup procedures Windows Specific Printer Software Problem Troubleshooting 14 11 1 Print spoolers 14 11 2 Print queues 14 11 3 Incorrect incompatible printer drivers Windows Specific Network Software Connection Troubleshooting 14 12 1 Error messages 14 12 2 Incorrect parameter setting switches 14 12 3 Incorrect protocols or protocol properties 14 12 4 Incorrect client or client properties 14 12 5 Missing or incorrect bindings 14 12 6 Incorrect service selection 14 12 7 Incorrect primary network logon settings 14 12 8 Incorrect computer name or workgroup name 14 12 9 Network troubleshooting software utilities Windows 9x NT 2000 and XP Help 14 13 1 Help and tr
43. ed to display a list of active sockets for each protocol being used It can present the contents of other network data structures according to the option selected The NetStat utility can also display information about packet traffic on the nen configured network interfaces Figure Elshows the err netstat command being run from DOS Trace Route Operation Figure Elillustrates how trace route works compared to PING which is illustrated in Figure 7 Figure L lis a drag and drop activity that will help students identify different command outputs TIP Test Tip It is important to know the utilities used to troubleshoot a network Ping Operation pag 41 di 44 IT Essential Network Troubleshooting Commands modulo 14 TCP computer 91 2268 www cisco com 5050 ESTABLISHED ipconfig Ping Tracert Netstat Check Answers 14 13 Windows 9x NT 2000 and XP Help r 14 13 1 Help and troubleshooting files All of the Windows 9x NT 2000 and XP operating systems include a built in help center with numerous troubleshooting files for basic system troubleshooting tasks The Windows 9x 2000 and XP help files are more comprehensive than the Windows NT help files The help files utility can be accessed from the Start menu or from the Help icon on the standard toolbar Windows 98 and more recent Windows operating systems have increased the help file database added troubleshooting tools a
44. failed Windows component startups Application events store information about system applications and their performance Security start A GZ a Fevent viewer events store information related to system security such as logons and logoffs file and folder access and the creation of a new Active Directory The Event Viewer also creates categories of system and application events Information events indicate that an application service or driver has loaded successfully Warning events identify things that may be harmful in the future Error events indicate that an application service or driver has failed to load Since the security log is limited in size and a large number of routine audit records can make it difficult to find records that suggest a security problem carefully consider how to audit object access Too many audit records will require a frequent review and clearing of the security log This will generate an Event log is full error message When this occurs open the event log and delete some of the entries pag 19 di 44 IT Essential modulo 14 Dr Watson Utility The Dr Watson utility is used to isolate and correct General Protection Faults GPFs When the cause of a GPF cannot be traced to the operating system it is usually caused by an application The Dr Watson utility can operate in the background while an application is being used The utility monitors application operations and logs important events in th
45. gistry files contain all the system configuration information This includes the local hardware configuration the network environment file associations and user configurations USER DAT and SYSTEM DAT are the registry files that contain all the contents of the registry The following system files are related to the registry e USER DAT The USER DAT file contains all of the information that is specific to the user This file is used to maintain user profiles such as mouse speed wallpaper and color scheme e USER DAO When Windows successfully boots up the USER DAQO file is created This file is a back up of the USER DAT file If the USER DAT file becomes corrupted or is erased rename the USER DAO file as USER DAT and the Registry can be restored e SYSTEM DAT This file holds hardware profiles computer specific profiles and settings information When a new piece of hardware such as a video card is installed the SYSTEM DAT file is updated e SYSTEM DAO Like the USER DAQO file the SYSTEM DAO file is also created when Windows successfully boots This file is a backup of the SYSTEM DAT file If the SYSTEM DAT file becomes corrupted or is erased rename the SYSTEM DAO file as SYSTEM DAT and the registry can be restored e SYSTEM INI The SYSTEM INI file contains hardware information for the drivers that Windows uses for configuration When the operating system needs to reference hardware information it uses the SYSTEM INI file e WI
46. h a command prompt As with Windows 9x Windows NT and 2000 provide a way to boot the system into safe mode with minimal drivers to allow troubleshooting Enable Boot Logging If the enable boot logging startup mode is chosen a NIBTLOG TXT file will be created This is similar to the BOOTLOG TXT file and contains a listing of all the drivers and services that the system attempts to load during the bootup process Use this startup mode to determine what device or service is causing the system to fail Enable VGA Mode Use the enable VGA startup mode if any display problems are experienced while booting up This mode will load the standard VGA driver instead of the driver for the video card Boot into VGA mode and reconfigure the display setting Last Known Good Configuration If the system begins to fail after a new device driver is loaded use the last known good configuration startup mode option This will enable the system to start from the point of the last successful user log on without the new device drivers installed Debugging Mode The debugging mode startup feature enables the use of special debugger utilities to access the kernel for troubleshooting and analysis by starting the operating system in a kernel debug mode 14 7 5 Windows 2000 Recovery Console a The Windows 2000 Recovery Console is a command line interface that is used to perform a variety of troubleshooting and recovery tasks These include starting and stopping serv
47. he Windows 9x NT and 2000 resource kits contain solutions for almost every troubleshooting issue They provide CDs and textbooks with thousands of pages of in depth technical information and reference materials The kits also include many features and troubleshooting tools that can be installed on a computer system For example they provide hundreds of utilities for troubleshooting and maintaining a network These resource kits are not included with the operating system installation CD Internet Help Another good source of help and troubleshooting aids is the Internet Many websites provide useful information about common Windows operating system issues For example the Microsoft website has a huge database of troubleshooting pages called the Microsoft TechNet Other websites for troubleshooting operating system issues can be found by using the search feature Windows 2000 Resource Kit icroso Windows 2000 Professional i IT Professional sammas This module discussed troubleshooting software Some of the important concepts to retain from this module include the following e The steps to take to identify an error are defining whether the issue is hardware or software related questioning the end user reproducing the error and identifying changes to the system e Animportant tool when dealing with system boot problems is the bootable disk Booting with a floppy disk allows technicians to recopy files inspec
48. he point where it is checking the floppy drive and the floppy drive light does not come on then the problem exists in the floppy drive The Bootable Disk Every system administrator should have a bootable disk Many systems will have issues that cannot be resolved or a corrupt operating system that will prevent the system from booting up A bootable disk allows administrators to boot from a E PET EEE disk instead of the hard drive Simply insert the SEO a Keys used to view or disk into the floppy drive and restart the ATAPT CD ROM Drive page reg computer Make sure that the BIOS is set to boot rpe agp eae from the floppy drive Figure LUshows the BIOS Sener gal settings for booting from the floppy drive The lt Shift 1 gt enables i i or disables a device disk contains the necessary files to boot the lt gt and lt gt moves the system while bypassing the corrupted files on the ah e hard drive Booting from a bootable disk will bring raie iei up a DOS prompt This will allow the Removable Disk a i i lt d gt Remove a device administrator to recopy files inspect the hard that is not installed drive partition or reformat the drive If the bootable floppy has the fdiskexecutable file on it the administrator will be able to navigate through the files on the hard drive for problem Esc Enter F10 pag 5 di 44 lT Essential modulo 14 inspection Hidden Files A hidden file has a special attribute turned on
49. he print job that reaches the queue first receives the highest priority and is output before other jobs Setup The print queue is automatically set up and configured when the printer is installed The print queue can be configured in the Properties menu of the printer The size of the queue can be specified Printing priorities can also be set so that user files with higher priority will be printed before other files Clearing Print Jobs The print queue is also a management tool that can be used to view and manipulate print jobs The queue shows information about each print job and the progress of the job as it is being fed to the printer This information includes user identification the job start time and the current status of the print job Several print job manipulation tasks can be performed in the printer queue e Deleting print jobs The print queue can be used to delete specific print jobs or all of the jobs that are currently held in the queue This is useful if an error occurs or if multiple copies of a document are accidentally sent to the printer e Rearranging print jobs Even though the printer queue uses FIFO by default the processing order of print jobs can be changed Higher priority print jobs can be moved to the top of the queue while lower priority jobs can be moved to the bottom of the list e Pause the printer Pausing the printing process puts the queue in a wait state During this time changes can be made wit
50. he problem that is affecting the computer The main goal of troubleshooting is to allow end users to work with their systems The process starts when the user calls for support as illustrated in Figure LU My computer won t boot up need to call the help desk gt ERROR NON SYSTEM DISK Eliciting Information from End Users Before troubleshooting a computer talk to end users to gather information regarding their problems Sometimes end users can explain what they might have done to cause the problem Determine what they were doing when they e Find out what application the users were using at the time began to experience issues For example find Find out if the users were attempting to install or uninstall a out what applications they were using or if they piece of hardware or software were attempting to install or uninstall hardware or software This information will provide a good starting point for troubleshooting the computer 14 1 2 Eliciting information from the end user regarding the problem Establish what the users were doing at the time they began to experience issues Eliciting information from end users can be a tricky process Some end users will be easy to deal with and they will answer all questions honestly However others will not In a working environment many end users are limited in what they can do with their computers The administrator determines the level of access for each user
51. hin the print queue such as deletions or rearrangements Changes can also be made to the printer such as changing the media type ink or toner The printer queue can then resume processing the print jobs Redirecting Print documents can be redirected to a different printer For example if a printer is connected to a faulty device the documents can be redirected to prevent users from having to resubmit them All print jobs for a printer can be redirected collectively but individual documents cannot be redirected The new printer must use the same printer driver as the current printer To redirect documents to a different printer open the Printers window right click the printer icon and then click Properties gt Ports gt Add Port In the Available Port Types list click Local Port gt New Port In the port name dialog box type the name of the printer to redirect the documents to such as prntsrv9 HPLaser4XL and then click OK The printer driver is important for a printer to work correctly Drivers are necessary for the operating system to communicate with the system hardware If the proper drivers are not installed the system cannot print 14 11 3 Incorrect incompatible printer drivers pag 35 di 44 IT Essential modulo 14 Error messages will probably appear stating that the incorrect driver has been installed and that the operating system is unable to find the printer Printer Drivers Incorrect Printer Drivers Dri
52. i 44 IT Essential modulo 14 Windows System Policy Editor also prevents security problems such as file tampering data losses as a result of accidental system software changes or users being locked out of their computers Group Policy Editor GPE Group policies can be used to refine and centralize the management of an end user desktop environment Group policies can be used to control the programs that are available to users the programs that appear on a user desktop and the Start menu options Group policies are a set of configuration settings that a system administrator can apply to objects in the Active Directory database A group policy is used to control the work environment of users in a domain Group policies can also control the work environment for accounts in a specific organizational unit Group policies can be set at the site level by using the Active Directory Sites and Services snap in A group policy consists of the settings that control how an object and sub objects behave Group policies allow a group policy administrator to provide users with a fully populated desktop environment This environment can include a customized Start menu applications that are automatically setup and restricted access to files folders and Microsoft Windows 2000 system settings Group policies can also determine the rights of user accounts and groups 14 6 Windows 9x 2000 XP Registry Problems s 14 6 1 TheRegistry files The re
53. ications are causing the system to stall LH C WINDOWS COMMAND MSDEX EXE D 123 reboot the computer and press the F8 key when the Starting Windows 98 message Is displayed Restart in MS DOS mode and edit DOSKEY the AUTOEXEC BAT file from this point CLS Place a REM statement at the beginning of any application statements that were preventing the system from booting When the system is restarted the lines beginning with REM will not be executed in the bootup process and the system should start up Figure Lshows the AUTOEXEC BAT file with the REM statement added REM SET SOUND C PROGRA 1 CREATIVE CTSND REM SET BLASTER A220 I5 D1 HS P330 E620 T6 REM LH C MOUSE MOUSE EXE REM statements can be used in the CONFIG SYS file which contains configuration information about the system hardware and devices For example a device driver may be preventing the system from booting up properly Edit the CONFIG SYS file by placing a REM statement at the beginning of the line for the device driver This will temporarily prevent it from running when the CONFIG SYS file is loaded Extended Memory Access DOS 4 0 and higher versions have a memory management program called HIMEM SYS that manages the extended memory above the 1024 KB level When this utility is loaded it shifts most of the operating system functions into the High Memory Area of extended memory Adding the line device C DOS himem sys to the CONFIG SYS file can activate this functio
54. ices reading and writing data on local drives such as drives that are formatted with the NTFS file system and formatting hard disks Figure Lilshows the startup screen with the recovery console option After starting the recovery console use the commands from the command line to remove replace or copy corrupt files TIP Test Tip Know how to use the Windows 2000 Recovery Console There are many ways to start the recovery console First try inserting the Windows 2000 CD ROM into the CD ROM drive and wait for the Microsoft Windows 2000 CD dialog box to open If this does not work go to the run command window on the start menu and type cmd This will display the command prompt window Change to the drive letter of the CD ROM then to the 1386 folder and run the winnt32 command with the cmdcons switch After the recovery console is installed it can be accessed from the Please Select Operating System To Start menu The recovery console can also be started by using the Windows 2000 setup disks or CD to start the system and selecting the recovery console option when prompted pag 26 di 44 IT Essential Windows 2000 Recovery Console Please select the operating system to start Microsoft Windows 2000 Professional Microsoft Windows 2000 Recovery Console Use and to move the highlight to your choice Press Enter to choose Seconds until highlighted choice will be started automatically 27 For troubleshooting and advanced
55. issing corrupt DLL or VxD files ea Two important types of files associated with the Windows operating system are VxD and DLL files It is important to learn what these files do and how to repair them because they are critical to the health of the system If they are deleted or become corrupt the system will no longer run properly A VxD file is a Virtual Device Driver and is only found in the Windows 9x operating systems These VxD files take the place of the device and loadhigh commands for devices that are in versions of DOS The VxD files are protected mode drivers that allow multiple applications to access a system hardware or software resource The x in VxD represents a particular type of driver For example VDD is a display adapter driver and VPD is a printer driver If these VxD files are missing or corrupt then many devices may fail As a result the system may not start up properly or may not start up at all If this happens try reloading the driver that came with the hardware or try to update the driver by downloading it from the manufacturer website SFC Utility The Windows operating system includes many tools to make it more stable and dependable such as the System File Checker SFC The SFC is a command line utility that scans the operating system files to ensure that they are the correct Microsoft versions Although it is no longer a widespread problem some applications may replace system files such as VxD or DLL files wi
56. l in troubleshooting software problems As a review DOS switches are used to configure DOS commands to perform specific functions For example DOS switches are used in the CONFIG SYS file to configure DOS to emulate different hardware configurations The switches command is useful when using older applications with a new enhanced keyboard that is incompatible with the operating system Entering the switches k command in the CONFIG SYS file will configure the keyboard to act like a standard keyboard These switches can be helpful when troubleshooting computer systems They can also be used to manipulate the DOS commands The following is a list of common switches e k Causes an enhanced keyboard to act like an older standard keyboard e f Removes the two second delay that occurs when the Starting MS DOS message is displayed on the screen in DOS Version 6 e n Disables the F5 and F8 keys during system start up for DOS Version 6 e w Tells DOS that the WINA20 386 file has been moved to a directory other than the root directory TIP Test Tip Know the DOS switches and what they do Bootable Disk Utility Files A DOS boot disk can be used to boot the system to the DOS prompt This allows a system to start so that troubleshooting can begin FORMAT EXE and FDISK EXE are two useful utilities that can be added to the boot disk FORMAT EXE If an operating system is corrupted beyond repair the FORMAT EXE command can be used to erase th
57. lated or may be related to both Before starting an upgrade consult the Microsoft website to make sure the hardware is compatible Check with the manufacturer of the Windows 2000 Pro Minimum Requirements hardware components and software to see if they have any updated drivers that are necessary for the upgrade The system requirements for Windows 2000 are as follows 133 MHz Pentium of higher microprocessor 64 MB of RAM for Intel e 166 MHz Pentium or higher 2 GB hard disk with a minimum of 650 MB of free space microprocessor e 32 MB of RAM or more VGA or higher resolution monitor e 2 GB hard disk with at least 650 MB of Keyboard free space Mouse e VGA or higher resolution monitor CD ROM drive e Keyboard l a High density 3 5 inch disk drive if no bootable CD ROM e Mouse drive is available e CD ROM drive e High density 3 5 inch disk drive if no bootable CD ROM drive is available TIP Test Tip Make sure you know the minimum requirements for Windows 2000 Pro Check hardware to verify that it meets the minimum recommendations for an upgrade Microsoft has a list of recommendations on its website for the types of processors and the amounts of RAM that are needed to run various operating systems It also includes recommendations for other hardware components Windows NT Startup Modes aa Startup mode options are also available in Windows NT However the startup process for Windows NT is a little differen
58. mal backup is also called a full backup During a normal backup all files on the disk are stored to tape and the archive bit for all files is set to off or cleared A full daily backup only requires one tape to restore the data but it is impractical to run a full backup each day because of the amount of time it requires Copy backups and daily backups do not reset the archive bit and both are used to back up selected files Incremental Backup An incremental backup procedure backs up all the files that have been created or modified since the last full backup There are two important characteristics of incremental backups First they must be used in conjunction with a full backup Second any file that is created or modified has its archive bit turned back on so that it will be saved during the next incremental backup If a full backup were performed on a Monday this would reset all the archive bits on the files On Tuesday an incremental backup would be performed to a separate tape This would store all the files modified on Tuesday and reset their archive bits This process is repeated for every business day of the week each with a separate tape This provides a complete backup of all files modified during the week On the following Monday the entire process would begin again The advantages and disadvantages of an incremental backup are as follows Advantage This type of backup scheme requires the least amount of time each day to perform
59. mmand to retrieve a FIXBOOT list of device names An example of a valid device name is MAP Device HardDiskO Micorsoft Windows XP TM Recovery Console The Recovery Console provides system repair and recovery functionality The ixboot command writes a new boot Type EXIT to quit the Recovery Console and restart the computer sector onto the system partition Shown in 1 C WINDOWS Figure lis the syntax for the command Which Windows installation would you like to log onto i a lt To cancel press ENTER gt 1 fixboot drive 2 g It IS important to note Giwwa 0 that if the drive option is not specified We eee N fixboot writes the boot sector to the we target partition is C d Are you sure you want to write a new bootsector to the partition c 7 y default boot partition Specify a different eee ee eee eee eee ee ee drive if a boot sector is to be written to a FIXBOOT is writing a new boot sector volume other than the default boot partition The new bootsector was successfully written Cc WINDOWS gt 14 9 Troubleshooting Applications e 14 9 1 Troubleshooting DOS applications To successfully troubleshoot the Windows operating system it may be necessary to troubleshoot the applications that are installed on the operating system Missing or Corrupt DLL or VXD Files Dynamic Link Library DLL files are small files that store subroutines which either come with the application or are ma
60. mputer name or workgroup name is incorrect the system will be unable to access the network This may result in the following error messages computer the workgroup it wil appear in and a short description of the computer e User cannot see any other computers on the local network e User cannot see any other computers on different networks e Clients cannot see the DHCP server but do have an IP Address When a computer is added to a network domain an account is created which allows the computer to access resources in that domain The computer name is i registered and if the name changes then the domain controller will not recognize it and access will be denied The same rule applies to the workgroup name If a computer has an incorrect workgroup name then network access will be denied Administrators can change the computer name and then recreate an account in the domain for the new name if they forget the name of the computer Windows provides some useful network troubleshooting tools to help determine why an end user is unable to access a network These tools allow technicians to test connections check settings and trace the route of packets on a network to identify the problem 14 12 9 Network troubleshooting software utilities PING EXE The Packet Internet Groper or PING EXE utility is used to determine if a specific IP address is accessible It works by sending a packet to the specified address and waiting for a
61. n This will load the DOS Extended Memory Specification XMS driver This causes HIMEM SYS to be executed automatically when the computer is started The first thing to do when troubleshooting a HIMEM SYS error is to use the System Editor to check the entry in the CONFIG SYS file for accuracy In Windows 98 the HIMEM SYS statement must be present and pag 8 di 44 IT Essential modulo 14 correct for the operating system to operate Also make sure that the version and location of the HIMEM SYS file are correct SS l Expanded Memory Access MS DOS Memory Layout The EMM386 EXE utility is another memory management program that provides system access to the Upper Memory Area UMA of RAM This program works with the HIMEM SYS utility to enable the system to conserve Extended Memory conventional memory by moving device drivers and Area Memory Manager memory resident programs into the UMA HIMEM SYS 1024 KB 4 GB Troubleshooting issues commonly occur with this program due to conflicts in the allocation of the upper memory High Memory Area blocks This may be caused by a missing or incorrect Memory Manager HIMEM SYS file or conflicting drivers To detect this type EMM386 EXE of memory conflict start Windows by using a win D x switch at the DOS prompt This will bypass the complete upper memory portion in the bootup process If Windows starts up after using this switch the system has identified that an upper memory
62. n Windows XP is similar to the backup function in Windows 2000 It is installed by going senor ae to the backup in Start gt Programs gt Accessories gt System Tools Clicking on Backup will start the backup wizard Check the Automated System Recovery Wizard The ASR Preparation wizard helps you create a two part backup of your systems a floppy disk that box to open the Backup Utility Advanced Mode as has your system settings and other media that contains a backup of your local system partition shown in Figure 5 New in Win dows XP is the option to Restore and Manage Media tab This expands on the previous option to enable users to not only restore data but to manage the type of media being restored from There are many ways to back up data and applications Windows comes with backup utilities installed with the operating system or third party utilities can be purchased to back up data and applications The chosen backup method will depend on the type and amount of data that is being backed up In Windows 2000 the Backup Wizard can be used by executing the NTBACKUP command Specify what to back up by choosing one of the following options e Back Up Everything On My Computer Backs up all files on the computer except the files that Backup Wizard excludes by default such as certain power management files pag 32 di 44 IT Essential modulo 14 Using the Backup Utility e Back Up Selected Files Drives Or Network Dat
63. nd incorporated a Web browser to access online help The online access provides many helpful resources from Microsoft and other sources Figure LUshows the Windows Help window XP Help and Support Center Help and Support Center Qe A index yf pFavorites JHistory FfSupron y Options Teal o G Help and Support Center Ask for assistance 9 iiie a friend to connect to your computer with Remote Assistance Pick a Help topic What s new in Windows XP Music video games and photos Windows basics Security and privacy 3 Get support or find information in Windows XP newsgroups Pick a task Networking and the Web 9 Keep your computer up to date with Windows Update Working remotely System administration gt Find compatible hardware and software for Windows XP B Undo Changes to your computer with System Restore Customizing your computer T 3 Use Tools to view your computer information and diagnose problems Accessibility Did you know When you are connected to the Internet this area will splay links to timely ePrinting and faxing Performance and maintenance eHardware Fixing a problem Send your feedback to Microsoft help and support information If you want to connect to the Intemet now start the New Connection Wizard and see how to establish a Web connection through an Internet service provider pag Windows Help E Windows Help g5 Hide Beak cy
64. ng system as shown in Figure is not compatible your hardware will not work correctly and your i computer might become unstable or stop working completely Do you want to continue installing this driver TIP Test Tip Know how to troubleshoot a NIC 14 12 2 Incorrect parameter setting switches a NIC Setti Incorrect parameter setting and switches may also apply a T to the NIC drivers Some NICs and NIC drivers have many M c ET EAA software and parameter settings or switches The NIC Osi anon Aara may not be functioning even if the correct driver has been sibreraeotegt S nn installed The software settings or switches may need to be configured before the NIC will work properly Figure shows the advanced settings for a NIC card Incorrect protocols or protocol Network Properties properties Before a system can successfully log on to the network the protocols must be set correctly If they are not the user will be unable to see any of the computers on the network or access any of the network resources After determining if the network is using TCP IP IPX SPX or another protocol access the network properties page as shown in Figure L Check the protocol properties to see if they are set properly The correct protocol may be installed but the IP address settings may be incorrect These must both be correct before the network can be accessed pag 37 di 44 IT Essential m
65. nh sections are not loaded in the SYSTEM INI It allows the technician to access the device manager and run system utilities e The Registry Editor is accessed by typing REGEDIT or REGEDT32 in the Run dialog box Six registry files contain all the system configuration information Understanding the registry subtree keys is helpful for troubleshooting and maintaining the computer Registry editing tools can be used to remove unused files from the registry that can cause problems and degrade system performance e One of the most important tasks to perform is a regular backup The only way data can be recovered is if it has been backed up Normal or full backups store all files Incremental backups save the files that have been created or modified since the last full backup Differential backups are similar to pag 43 di 44 lT Essential modulo 14 incremental backups except the archive bit is not reset Copy backups back up user selected files but do not reset the archive bit e Device drivers are important for computer components such as NICs and printers The most reliable place to find and download a current driver for a device is the manufacturer website Help is available on the Windows operating system and can be accessed from the Start menu There is also additional information on the Microsoft website pag 44 di 44
66. ns Current fixed disk drive 1 Choose one of the following Create DOS partition or Logical DOS Drive Set active partition Delete partition or Logical DOS Drive Display partition information 1 Enter choice Press Esc to exit FDISK boot process by referencing the partition table to determine which partition to use for booting It then transfers program control to the boot sector of that partition to continue the boot process In DOS and Windows systems the MBR is created with the fdisk mbr command This command is used to rewrite the MBR to allow the system to boot up again Bootable Configuration Files The two main configuration files that a computer uses to boot are CONFIG SYS which is shown in AUTOEXEC BAT CONFIG SYS is a special file that contains setup or configuration instructions for the computer system The commands in this file configure the DOS program for use with devices and applications in the system They also set up the memory managers in the system After the commands in CONFIG SYS have been completed DOS begins searching for the AUTOEXEC BAT file which is shown in Figure 4 This file contains a list of DOS commands that will automatically execute when DOS is loaded into the system fj Autoexec Notepad File Edit Search Help echo off SET SOUND C PROGRA 1 CREATIVE CTSND SET BLASTER A220 I5 D1 H5 P330 E620 T6 SET PATH C WINDOWS C LH C WINDOWS COMMAND MSDEX EXE D 123 LH C MOUSE
67. o run these applications Virtual memory is the part of the hard drive that is reserved for the operating system to do paging Data is stored in pages and only a certain number of pages can fit in the physical memory or RAM at the same time The operating system moves some of the pages to the virtual memory so that the current pages can be kept in physical memory which is faster This process is called swapping A swap file is essentially a large file that can contain thousands of these pages on a reserved portion of the hard drive pag 18 di 44 IT Essential modulo 14 Virtual Memory Settings The default paging file size is 2 MB The recommended paging file size for Windows 2000 Virtual Memory Settings is equal to 1 5 times the total amount of RAM Virtual Memory 21x Windows will set a default paging file size during Tiss Sois i HUE Gens Sams WRG ear CN a ea SCL installation Figure LUshows the Virtual Memory be adjusted by advanced users and system administrators only window If many applications are operating simultaneously it may be beneficial to use a tha ened larger paging file or multiple paging files Unused space in the paging file remains available to the 7 Let me specify my own virtual memory settings internal Windows Virtual Memory Manager Hard disk C 1593MB Free Ilf Windows detects that the Windows paging file Minimum fO is set too low then a Virtual memory minimum nan porama i vaxmum No maximum
68. odulo 14 properties 14 124 oe client or client A Client Properties The proper client and client properties must also be installed For example if Novell NetWare is running and the system needs to connect to iamais kag ar resources on the Novell servers the client for i When you iog on your passwort wil be vers Novell NetWare must be installed on the Windows operating system If the proper clients are not installed users will not be able to access the resources on the servers Figure Llshows the voller eae dere mae erat screen for Microsoft client settings a When you log onto the network Windows verifies that each network drive is ready for use 14 12 5 Missing or incorrect bindings as Technicians must understand how network bindings affect networked computers For example network bindings must be manipulated to run two different protocols on two different network adapters in a server Changing the order Cickte pool at pis ager wile Your oomputer of bindings can optimize network performance want to communicate with Transport protocols are assigned to run on specific network adapters Creating this association between protocols and adapters is called binding The most frequently used protocol is usually listed first in the binding on a NIC If the bindings are missing or incorrect the NIC will not function and the user will not be able to access the network The Bindings screen is shown in Figure U
69. ogramming in step by step the software TE Hardware Issues Mouse initialized Look at the bootup sequence to begin isolating Fixed Disk 0 IDE Hard Drive the problem When the computer boots up the im a user should hear a single beep after the power RIRPL CU RUN IDE CORUM Drive on self test POST and before the boot process begins Hardware problems will be displayed before this beep The operating p lt P gt SETUP system and software will not start until after this m m ar beep Only the BIOS and basic system hardware are active before the beep pag 4 di 44 IT Essential modulo 14 Hardware related issues are either configuration errors or hardware failures Hardware failures usually prevent the operating system from loading After the BIOS and basic system hardware have been checked and passed the operating system will start to load as shown in Figure U If the hardware is unable to load this may indicate that a component has failed After determining which hardware component has failed replace it and retry the boot process Configuration errors result from a mismatch between the programmed configuration of the system and the equipment installed in the system After installing software end users may enter some parameters into programs to match their capabilities to the computer configuration If these parameters are set incorrectly the software will be unable to detect the system hardware and an error will occur
70. olicy the system administrator desires A system administrator can use the SYSEDIT EXE and POLEDIT EXE editor to edit configuration settings to the user interface In Windows 2000 the Group Policy Editor GPE allows the administrator to edit a policy for an entire group of users at one time SYSEDIT EXE Typing sysedit in the Run dialog box of the Start menu will open the system editor tool The sysedit utility is used to modify text files such as INI files and the System Configuration Editor rasmi gnam m CONFIG SYS and AUTOEXEC BAT files S IT je The sysedit commands are similar to other Windows based text editing programs Figure Lilshows the System Configuration Editor Me samrsearn melee ll A djatine dry cM OL EASED FONSEGARWOA FON hl EG aM FON EGAADWOA FON al camo FON CLARIDA FON E Maoh FONDOA SHAA FON hi TTF owDimenCecheleCe 4 POLEDIT EXE Use the System Policy Editor or POLEDIT EXE to set up different security restrictions for different users Use it to set one policy for a whole group configure desktops for roving users so that any computer they use will have the same look or to protect a computer if it is unplugged from the network The Windows System Policy Editor is a powerful tool that is used to create and edit local registry values to standardize desktop settings prevent users from modifying hardware and environment settings and control or restrict user actions pag 21 d
71. on to back up System State data as shown in Figure l After choosing to back up the System State select disks files or tapes as the media The backup utility will back up all necessary hives in systemroot system32 config including Backup destin Bac optone o Default Software System SAM and a page eae security The utility also backs up system files user profiles and any part of the system that is required for a complete system restoration This can potentially mean a lot of data depending on the size of the user profiles and registry hive files stored on the machine To perform selected backup of registry hive files use a tool from the Resource Kit such as regback The option to create an ERD is available in the Windows 2000 backup utility It backs up only three files They are the AUTOEXEC NT CONFIG NT and Windows XP Backup System State SETUP LOG files The SETUP LOG file is a list of the system files on the machine and includes a Backup Utility Untitled TE checksum value that indicates the correct version Job Edt View Tools Help Ea of the file Use SETUP LOG to restore corrupt Welcome Backup Restore and Manage Media Schedule Jobs system files when booting from a Windows 2000 Welcome to the Backup Utility Advanced Mode CD and choose the repair option lf you prefer you can switch to Wizard Mode to use simplified settings for backup or restore Backup Wizard Advanced Windows XP eee mes ew Mera nee ee Backup i
72. onment and custom software settings e HKEY_CURRENT_CONFIG Contains data on the active hardware profile that is selected during the boot process This information is used to configure settings for the device drivers to load and for the display resolution to use e HKEY_ CLASSES ROOT This subtree contains software configuration data for all software installed on the computer e HKEY_CURRENT_USER Contains data about the current user logged onto the computer Retrieves a copy of each user account that is used to log on to the computer and stores it in the registry Registry Keys Exercise e HKEY LOCAL MACHINE Contains all configuration data for the computer including hardware and operating Contains desktop settings windows etre ae isto stare setings system data such as bus type system control data Applications device Contains data about the current user logged this data to set the computer onto the computer configuration The data in this subtree Contains all configuration data for the local remains constant regardless of the computer user HKEY RRENT NFI i Figure 2lis an exercise on registry keys TIP the registry CheckAnswers Reset Show Me 14 6 3 Editing the Registry Most end users will not have to edit the registry but the troubleshooting responsibilities of a computer technician may include viewing editing backing up and restoring the registry The contents of the registry can b
73. ors as Windows 9x For example the application properties may be incorrect the registry entries might be missing or corrupt or the DLL files may be corrupt The Windows NT and 2000 operating systems are usually part of an integrated network which introduces many potential problems For example the permissions that are set on files or folders may be too restrictive for end users to access them or they may not be restrictive enough Windows 2000 Task Manager The Windows 2000 Task Manager is a useful tool for troubleshooting applications Access the Task Manager by pressing the Ctrl Alt Delete buttons and then click on the Task Manager tab As shown in Figure 1 the Task Manager displays a list of active applications to help identify the applications that are not responding It can be used to switch to a particular application for troubleshooting if necessary It can also be used to end the application if it has crashed and is not responding 11 04 AM e f A ad P m i HE pm Nindows 2000 Task manager f Windows Task Manager f x File Options View Windows Help Applications Processes Performance F Welcome to MSN cam Microsoft Intemet Ex RUNNING ICalculator Running cos Nowak Processes 18 CPU Usage 21 Mem Usage 42468K 2001 16K The Processes tab provides information that is used to identify applications that are slowing down system operations Sometimes when an application crashe
74. oubleshooting files 14 13 2 Troubleshooting and information resources Module Summary Module Quiz pag 2 di 44 IT Essential modulo 14 r loverview Module 14 Troubleshooting Software This module discusses general troubleshooting procedures for software and operating systems It also provides helpful tips for gathering the information needed to diagnose and repair common comp Aa vat os a sho ba la F a TE i 1naTe iy gt Pa sali To EA GATE SG G9 LS Tho ile tudents will be able to complete ASRS related tO tne rolowing 14 1 Role of the End User 14 2 DOS Troubleshooting Issues 14 3 Common Windows Operating System Problems 14 4 Windows 9x Troubleshooting Problems 14 5 Using System Tools and System Editors to Troubleshoot Windows 9x 2000 XP 14 6 Windows 9x 2000 XP Registry Problems 14 7 Windows NT4 2000 Troubleshooting Problems 14 8 Troubleshooting Windows XP 14 9 Troubleshooting Applications 14 10 Windows Data Backup and Recovery 14 11 Windows Specific Printer Software Problem Troubleshooting 14 12 Windows Specific Networking Software Connection Troubleshooting 14 13 Windows 9x NT 2000 and XP Help uter problems 14 1 Role of the End User 14 1 1 Overview of the troubleshooting process The troubleshooting process usually begins with the end users End User Calling for Support because they have the most valuable information Their input will help narrow the search for t
75. ow Memory allocation errors MAs were discussed earlier in this T eee ee module Use only one or two applications at a time to help EET idee cute Chisels ues Mista oe ite prevent system lockup problems The screen shown in Figure program click Cancel Lilwill be displayed when the Ctrl Alt Del keys are pressed A Be yea cists by eel ds N vou more permanent solution is to add system resources For will lose any unsaved data To end the program example the processor could be upgraded or memory could be now click End Now added Ennon 14 3 6 Troubleshooting shutdown problems D Sometimes technicians receive troubleshooting calls from WJU E ia pifeie apih end users whose systems will not shut down This is usually caused by an application that is still operating in the background This application may have encountered an error and the application processes may be hanging up the system and preventing it from shutting down If this occurs one solution is to press the Ctrl Alt Del keys The Vmwaresevice screen shown in Figure Ltwill appear The application pete processes can be shut down manually and then the system can be shut down Further troubleshooting steps should be taken to determine what caused the application to hang up Close Program ae WARNING Pressing CTRL ALT DEL again will restart your computer You will lose unsaved information in all programs that are running End Task Shut Down Cancel 14 4
76. p Disadvantages The files that were backed up on previous days are stored again which requires extra network resources If the differential backup tape is damaged and the restore is performed on a Friday the data from four days will be lost and will have to be re entered Windows 2000 Backup Types Backup Wizard Type of Backup You can perfonm various types of backups depending on your needs Select the type of backup operation to perform Normal Norma Copy Backup TRR Copy backups are used to back up files ata selected by a user A copy backup does not reset the archive bit after saving a file Specify whether to back up contents of files which hawe migrated to Remote Storage Daily Backup Daily backups only back up the files that are modified on the day of the backup Daily backups do not reset the archive bit Backup migrated Remote Storage data cone TIP Test Tip Know the different types of backup options and how they are used 14 11 Windows Specific Printer Software Problem Troubleshooting 14 111 Printspoolers TT Nr The word spooling represents Simultaneous Peripheral Operations On Line It refers to the process of loading documents into a buffer which is usually an area on a hard drive until the printer is ready This allows users to place multiple print jobs into a Printer Settings EI Printers Fike Edil Wiew Favoriies Tools Help E Beech Folders OS o E
77. p If the have not This file is essentially a detailed problems Itis detection process report of the hardware detection phase of not updated is completed the system Plug and Play Operation automatically successfully this To update file will be deleted press F8 during startup or start Windows with the WIN B command DETCRASH LOG Itis created This file records This file is stored when setup fails information in the Windows during about the Directory It is hardware detection created during the detection module that was Windows i running and the installation memory process resources or I O port it was accessing when it failed DETLOG TXT It is created This file contains This file is located every time the a record ofa in the root detection specific directory once process runs hardware device Windows 98 is that was installed This file detected and indicates the start identifies the of a detection test parameters for and ifitwas the detected completed device Note The error message displayed will depend upon the BIOS and the specific version that is on the machine s 14 4 5 Windows virtual memory errors az Many operating systems such as Windows have huge memory requirements that exceed the amount of physical memory or RAM in the system Even if there is enough physical memory to operate Windows other applications on the system will require more memory Without virtual memory it may be impossible t
78. p Make sure you know the minimum requirements for Windows XP Home and Professional Check hardware to verify that it meets the minimum recommendations for an upgrade Microsoft has a list of recommendations on its website for types of processors and amounts of RAM that are needed to run the selected operating system It also includes recommendations for other hardware components 14 8 3 Windows XP startup modes a The Windows XP operating systems provide a choice of startup modes just as the Windows 9x operating systems However Windows XP provides an advanced Options Menu that provides features in addition to the Safe Mode options as shown in Figure U Normal and Safe Boot Modes Windows XP allows users to boot normally boot to Safe mode Safe mode with Networking or Safe mode with Command Prompt As with Windows 9x Windows NT 2000 provides a means of booting the system into Safe Mode with minimal drivers to allow troubleshooting Enable Boot Logging If the Enable Boot Logging Startup mode is chosen a NTBTLOG TXT file will be created This works similar to the BOOTLOG TXT file It contains a listing of all the drivers and services that the system attempts to load during the boot process Use this Startup Mode to determine what device or service is causing the system to fail Enable VGA Mode Use the Enable VGA Startup mode if any XP Startup Modes display problems are experienced while booting up This mode will load the Windows Ad
79. r purposes C CheckAnswers ee Showme DEVICEHIGH Errors The devicehigh command is used to load drivers into the UMA instead of loading them into conventional memory Errors commonly occur when this command attempts to load a device driver file that is too large to fit in the buffer space available in a block of the Upper Memory Area This may cause the system to lock up Use the mem d command to determine the size of the file and then edit this value by modifying the entry in the CONFIG SYS file This will modify the DEVICEHIGH line to only use the buffer size that is needed pag 9 di 44 IT Essential modulo 14 TE BNE ace Sa An invalid directory error is shown in Figure These errors may occur while attempting to navigate through the file system in DOS For C gt cd testme example if a hard drive contains two partitions and only the first partition has been formatted attempting to access the second partition drive letter will result in an invalid directory error C gt This error will also appear when a user tries to access a directory that has been deleted or damaged If the system has been backed up recopy the directory to the hard drive and try to Invalid Directory Error Message Invalid directory access it again 14 3 Common Windows Operating System Problems 7 TEXN Troubleshooting setup installation problems Es Common installation issues related to hardware HSG Bis lt jecle
80. s SETUPLOG TXT The SETUPLOG TXT file is created during the installation process and contains the system setup information It can be used for safe recovery situations and is stored in the system root directory The entries in this file are listed in the order they occurred during the start up process This can be helpful when troubleshooting because it shows exactly where the error occurred pag 17 di 44 IT Essential modulo 14 DETCRASH LOG If the system crashes during the hardware detection phase of the start up process the DETCRASH LOG file will be created This file will contain information about the Summary of Log Files ame Vnen Ghede Funcwon OCA SETUPLOG TXT Itis created Windows 98 will This file is located that ti h th when Setup recover by in the root processes Ma were opera MY WAEN UN fails before reading this file directory It will crash occurred This file cannot be read hardware This file can also determine where directly because it is in binary form detection be used for the system troubleshooting stalled what to errors that occur redo and what to DETLOG TXT during skip Use the DETLOG TXT file to read the installation information that is generated when the DETCRASH LOG file is created It will indicate which components have been detected by the system and which ones BOOTLOG TXT Asthe system Itis used to This file can be is booting up debug windows read only by need ie l startup Setu
81. s 5 gy Display adapters 5 5 Floppy disk controllers a Hard disk controllers E Keyboard 5 Monitors mE System devices Ports COM amp LPT Sound video and game controllers Universal Serial Bus controfers modulo 14 The Windows Device Manager allows the hardware on a system to be viewed in a graphical interface and is helpful for managing and troubleshooting the system The Device Manager which is shown in Figure U can be used to disable uninstall and update device drivers The Device Manager can also be used to determine if the system hardware is working properly and if the correct drivers are installed for the hardware Each device that is having a problem will be labeled so the hardware that is not installed properly can be easily identified When device configurations are being changed manually Device Manager can help avoid problems The Device Manager is used to identify free resources and assign devices to those resources disable devices to make resources available and reallocate resources if necessary In Windows 2000 users must be logged on as members of the administrators group to change resource settings Even if a user is logged on as an administrator policy settings on a network might prevent them from changing resources 14 5 3 Using Windows system editors g The Windows operating systems contain important editors These editors allow Windows settings to be changed and customized to whatever p
82. s Some popular tools are Norton WINDOCTOR McAffee Registry Wizard and PC Doctor OnCall These tools provide an interface that is easier to use and navigate than the standard Windows registry editors 14 6 4 Cleaning the Registry a An important part of maintaining a healthy computer is cleaning the registry As the system is used and applications are installed and Remove Programs From Your Computer uninstalled values are left behind in the registry a JES ees en nk ae eh These values remain even if the Add Remove ee EEA ether E Programs wizard is used If the registry becomes ee cluttered with old files and old application registry a eth are entries it can cause problems and degrade eon SRN OAT a system performance Folder items Program folders Program directories Third Party Registry Cleaning Tools Third party registry cleaning tools are Program registry entries recommended for cleaning the registry Popular GE D BENENEEEENEEEEEEEEEEE cleaning tools are Norton WINDOCTOR and N Uninstal complete Some elements coula not vo Microsoft RegCleaner related to the application 14 7 Windows NT4 2000 Troubleshooting Problems al 14 7 1 Windows NT 2000 installation problems Review a The most common types of installation problems that occur when installing Windows NT or 2000 are hardware and software compatibility issues Before installing Windows 2000 check to make sure that the hard
83. s XP So ee ws Recovery Console FIXMBR may damage your partition tables if you proceed This could cause all the partitions on the current hard disk to become inaccessible There is more than one way to start the If you are not having problems accessing your drive do not Recovery Console One way is to insert the continue Windows XP CD ROM into the CD ROM drive Are you sure you want to write a new MBR y and wait for the Microsoft Windows XP CD aio mediotaddias oS dialog box to open The option to open the Recovery Console will display Enter R to run it The new master boot record has been successfully written C WINDOWS gt Another way is to go to the Run command window on the Start menu and type cmd This will display the command prompt window Change to the drive letter of the CD ROM then to the 1386 folder and run the winnt32 command with the cmdcons switch After the Recovery Console is installed it can be accessed from the Please Select Operating System To Start menu FIXMBR and FIXBOOT The fixmbr command can be used with the Recovery Console to fix hard drive problems The fixmbr command repairs a Master Boot Record MBR The syntax for this command is fixmbr Device Name As shown in Figure U If the Device Name parameter is omitted fixmbr rewrites the MBR on the boot device A device name can be specified to write a MBR to a different drive such as a floppy disk or secondary hard disk Use the map co
84. s it affects the systems processor and causes the rest of the system to lock up or slow down to a point where it becomes unusable The Processes tab shows the percentage of CPU that an application is using If an application is not responding and it is using a large percentage of the CPU shut down the application and see if the system returns to normal pag 30 di 44 IT Essential modulo 14 The Performance tab allows users to view a graphical interface that shows the processor performance and memory usage Past and current usage can be viewed to obtain information about the applications that were running and when they caused the system to lock up 14 10 Windows Data Backup and Recovery ie indows Registry backup and recovery tools Technicians may also encounter blue screens that are sometimes called the blue screen of death popup boxes reporting errors and other messages indicating that the registry is corrupt or cannot load a device When the database or registry is corrupt the only solution is to reinstall Windows These types of errors are not uncommon However data loss can be prevented with proper backup and recovery tools The method for backing up the registry will depend on the operating system Windows 95 Previous sections of this module discussed the SYSTEM DAT and USER DAT files Windows 95 usually creates a backup copy of the registry each time the operating system is started It copies SYSTEM DAT to SYSTEM DA
85. startup options for Windows 2000 press F8 modulo 14 FIXMBR and FIXBOOT The fixmbr command can be used with the recovery console to fix hard drive problems The fixmbr command repairs the Master Boot Record MBR The syntax for this command is fixmbr Device Name If the device name parameter is omitted fixmbr rewrites the MBR on the boot device A device name can be specified to write an MBR to a different drive such as a floppy disk or a secondary hard disk Use the map command to retrieve a list of device names An example of a valid device name is MAP Device HardDiskO The fixboot command writes a new boot sector onto the system partition The syntax for the command is fixboot drive If the drive is not specified fixboot writes the boot sector to the default boot partition Specify a drive if the boot sector is to be written to a volume other than the default boot partition 14 8 Troubleshooting Windows XP 14 8 1 ii indows XP installation problems some of the peripherals may not work correctly during the setup process Begin troubleshooting by checking the system BIOS An outdated BIOS can cause problems with disk partitioning power management peripheral configuration and other important low level functions Identify the BIOS manufacturer and check to see if an update is available When the computer is using the most current version of the BIOS go to the BIOS setup and select the Non Plug and Play operating system option
86. stem has been corrupted and must be reinstalled If this message appears use the bootable disk and type sys C at the DOS prompt The sys command copies the lO SYS MSDOS SYS and COMMAND COM system files from the boot disk to the hard drive Remove the bootable disk and reboot the system Configuration File Errors Two other common error messages associated with the CONFIG SYS and the AUTOEXEC BAT files are the Error in CONFIG SYS Line XX and Error in AUTOEXEC BAT Line XX messages The line specified by the XX in the error message contains a syntax error that will prevent these files from operating This means that the files contain a spelling punctuation or usage error This can also produce an unrecognized command error Sometimes there are missing or corrupted files in the CONFIG SYS and AUTOEXEC BAT files To correct these files enter them at the DOS prompt and edit them by correcting the line in the specified file Reload the indicated file and restart the computer REM Statements Administrators must be familiar with the REM Example REM Statements statements in the CONFIG SYS and AUTOEXEC BAT files to edit these files The j Autoexec Notepad REM statements prevent a line from being File Edit Search Help read or executed when the CONFIG SYS and echo off AUTOEXEC BAT files are being used For example when the computer boots up If Windows 98 is being used and there are problems booting because DOS based SET PATH C WINDOWS C appl
87. t from Windows 9x The Windows NT Startup depends on the boot Windows NT Startup Modes loader file or BOOT INI The NTLDR program uses this file to generate a Boot Loader menu that is displayed on the screen to select which operating system to use From this menu choose to Last Known Good Hardware Configuration Mode start the system in VGA mode or Last Known Good Hardware Configuration Mode These modes will be explained in the next section because they are also included with Windows 2000 VGA Mode pag 25 di 44 IT Essential modulo 14 Windows 2000 Startup Modes Sa Windows 2000 also provides a choice of startup ULUSS AUUU Ate Elne le Oy cleats Vout modes In addition to the safe mode options j j j j Windows 2000 Advanced Options Menu lent in Hpo eat ela 2000 th Please select an option rovides an Advance ions Menu wi see aT additional features Figure LUshows the options Safe Mode with Networking available to enable boot logging VGA mode ee eee eee last known good configuration mode and Enable Boot Logging nable ode debugging mode Last Known Good Configuration Directory Services Restore Mode Windows 2000 domain controllers only Debugging Mode Normal and Safe Mode Boot Modes Boot Normally Windows 2000 allows users to boot normally Use t and to move the highlight to your choice boot to safe mode boot to safe mode with Press Enter to choose networking or boot to safe mode wit
88. t the hard drive partition or reformat the hard drive It also provides the ability to navigate through the files on the disk e The MBR resides on the first sector of the hard drive and if it has been damaged the computer will not boot The disk mbr command is used to rewrite the MBR so the system will boot e DOS error messages typically occur when the operating system identifies a problem or when an end user attempts to run an application that the operating system cannot recognize Error messages include bad or missing commands configuration files errors and memory errors e Astartup disk is created to start the computer when the operating system becomes corrupt Shutdown problems are usually caused by an application that is still running in the background Pressing Ctrl Alt Delete will open the task manager that allows users to end an application that has stopped or restart the computer e A GPF occurs when an operating system application attempts to access an unallocated memory location Running applications that are not written for the Windows operating system selecting the wrong machine or network during installation or using incorrect versions of DOS in the system can cause a GPF e Safe Mode is a troubleshooting tool in Windows It does not load the AUTOEXEC BAT and CONFIG SYS files the Registry LOAD and RUN lines are not loaded in WIN INI and the boot and 386Enh sections are not loaded in the SYSTEM INI and the boot and 386E
89. ta One error message that is typically related to eply from 1 0 1 5 32 time lt 10ms TTL 128 networking issues is Cannot log onto erly from 127 0 0 1 bytes 32 timeclOme PTL 126 Network NIC not functioning This message ply from as Se can appear for several reasons For example Sekat Gare E 1 bacalied SA eee lt 9 oe the Network Interface Card NIC may need Approximate round trip times in milli seconds Minimum Ome Maximum Oms Average Oms to be replaced This can be done by opening the systems case and replacing the old NIC with a new one Check the NIC on the back of the system and verify if the NIC LED light is on A green light usually means that the card is good and does not need to be replaced PING the card with its local loopback address which is 127 0 0 1 This In this example note that PING returned a reply showing that the NIC is sends a packet out and back to the NIC to functioning HP Driver Download Site see if it is functioning properly If a message appears Stating that the packet was not received then the NIC is Sees sts bad and will need to be replaced PING the card with its Cura a a A dui local loopback address which is 127 0 0 1 or use the pinglocalhost command as shown in Figure LU This sends a packet out and back to the NIC to see if it is Back gt gt gt Aa Address e hp comicountryusieng soflware_drivers him wee es how to buy driver downloads softwar
90. th different files of the same name This will eventually prevent a computer system from working The operating system is no longer stable and will have difficulty booting after installing or uninstalling some applications or utilities SFC is a tool that allows users to scan their system and verify that the versions of protected system files are up to date If a protected system file has moved or has disappeared SFC automatically replaces the file with the correct version from the DLL cache folder Locating Replacing Missing or Corrupt DLL or VxD Files The SFC utility scans the hard drive for damaged and missing Windows files and corrects problems An operating system CD must be available for restoring missing files to the proper location on the system This utility works in Windows 98 and Windows 2000 In Windows 2000 type sfc scannow at a command prompt To return to the default Windows File Protection operation type sfc enable In this mode sfc automatically prompts the user to restore the correct system file version whenever it detects that an application has overwritten a file Do not forget to enable this option before exiting the command prompt window pag 12 di 44 IT Essential modulo 14 Although running the SFC utility will solve the problem most of the time many programs load their own restore file in their own folder This can be fixed several ways One example is an error with the MFC42 DLL files First rename any M
91. the CHKDSK EXE command the lost allocation units can be converted into files so they can be viewed and deleted if necessary This utility is used to optimize disk storage space by locating and removing files that have been corrupted SCANDSKW EXE Scandisk for Windows or SCANDSKW EXE is a disk checking and repair tool that is used to ea ene ey oon o problems The media includes hard disks and ai epooooooencoocanan ao gees floppy disks io MSCONFIG EXE appeoa pecan ocoggg ooog Load the system tools configuration utility from y 4 i a the command line by typing MSCONFIG EXE PRERE Pe ene eens ee See This troubleshooting tool is used to interactively fee eee cee ero eece eae nces load device drivers and software options Thi dio nicemaicn i ee os vien ti J utility makes it possible to systematically view pret co Legend Hide petits the lines of the CONFIG SYS and the AUTOEXEC BAT files and to decide whether or not to load each line Items can be enabled or disabled until all the problems are identified EDIT COM This is a windows troubleshooting tool that can be used to view and edit configuration files such as AUTOEXEC BAT CONFIG SYS and INI files pag 20 di 44 IT Essential 14 5 2 Using Windows Device Manager to troubleshoot Device Manager System Properties General Device Manager Hardware Profiles Performance View devices by type View devices by connection lt 9 Disk drive
92. vanced Options Menu standard VGA driver instead of the driver Please select an option for the video card Boot into VGA mode ante siete and reconfigure the display setting with Safe Mode with Networking the Enable VGA mode Startup Mode ee E E Enable Boot logging Enable VGA Mode Last Known Good Configuration Last Known Good Configuration your most recent settings that worked R i Directory services Restore Mode Windows domain controllers only If a new device driver is loaded into the Debugging Mode system and then afterwards the system begins to fail use the Last Known Good ee i eturn to OS Choices Menu Configuration Startup Mode option This will enable the system to start from the Use the up and down arrow keys to move the highlight to your choice point of the last successful user log on without the new device drivers installed 14 8 4 Windows XP recovery console The Windows XP Recovery Console is a command line interface used to perform a variety of troubleshooting and recovery tasks These include starting and stopping services reading and writing data on a local drive including drives that are formatted with the NTFS file system and formatting hard disks Once the pag 28 di 44 IT Essential modulo 14 Recovery Console has been started use the commands from the command line to remove replace or copy corrupt files TIP C WINDOWS gt FIXMBR Test Tip Know how to use the Window
93. vers are usually included with a printer However they are not always the correct printer drivers for the operating system being used Most manufacturers maintain a website Incorrect printer drivers that contains downloadable printer drivers Incorrect printer software parameter setting switches Possible problems of Printer Drivers Sometimes the correct printer drivers are installed and the printer will still not work This usually means that the printer hardware is not compatible with the system hardware or operating system Incorrect Printer Software Parameter Setting or Switches some printers and printer drivers have numerous software and parameter settings or switches After installing the drivers the specific settings or switches may need to be configured before the printer will work properly For example there could be a non standard size paper in the printer The current settings may not recognize the paper size and the printer settings will need to be changed for the printer to operate TIP Test Tip Understand the most common printers problems and how to fix them 14 12 Windows Specific Network Software Connection Troubleshooting F 4 12 1 Jerror messages E Technicians will also need to troubleshoot Testing NIC Functionality software issues related to networking C WINNT System3Zicmd exe Cannot Log Onto Network NIC Not cieyien tenet Functioning Pinging cayafor wrk amer cisco com 127 0 0 1 with 32 bytes of da
94. ware is capable of running Windows 2000 The processor must be at least in the Pentium class The system is also required to have at least 64 MB of RAM The hard drive or partition that the operating system files are installed on must be at least 2GB A VGA monitor and a CD ROM that is at least capable of reading at a 12X or higher speed are also required Windows 2000 is a network operating system and to enable networking a network card is required pag 24 di 44 IT Essential modulo 14 A Microsoft tool called the Hardware Compatibility List HCL can be used before installing Windows 2000 to verify that the hardware will be compatible with Windows 2000 Windows NT 2000 Installation The followings are Microsoft s recommended hardware Microsoft provides tested drivers only for devices included ee ee ee on this list Using hardware that is not listed on the HCL Pentium class processors might cause problems during and after installation View Atleast 64 MB of RAM this HCL by opening the HCL TXT file in the Support folder on the Windows 2000 Professional CD ROM At least 2GB of hard drive space A VGA monitor A 12x CD ROM drive 14 7 2 Windows NT 2000 upgrade issues a The issues that occur when upgrading to Windows NT and 2000 are similar to the issues that occur when performing Windows 9x upgrades As with Windows 9x problems that occur during upgrades to Windows 2000 will be hardware or software re
95. ystem provides many ro r system troubleshooting tools These tools can be used to isolate and correct many computer issues Load the system tools configuration utility from the command line by typing MSCONFIG EXE Figure 2 shows the screen that displays This troubleshooting tool can be used to load device drivers and software options This utility can also be used to systematically view the CONFIG SYS and the AUTOEXEC BAT files It can enable or disable items until all the problems are identified General Config sys Autoexec bat System ini Win ini Startup Create Backup Restore Backup Advanced If inspecting the CONFIG SYS and AUTOEXEC BAT files does not solve the problem the system tools utility provides other options Lower level configuration settings such as real mode disk access and VGA standard video settings can be inspected The Device Manager can also be started from the MSCONFIG view option allowing technicians to troubleshoot protected mode device drivers Checking to verify that system files are not missing or corrupt is another option Other items that can be inspected are corrupt registry entries viruses and possible hardware conflicts LEE i indows memory usage problems g Memory usage errors occur when the operating system or an application attempts to access a memory location that is unallocated When this type of conflict occurs the unallocated memory location becomes corrupted and usually c
Download Pdf Manuals
Related Search
Related Contents
MS TR7041.pmd Bedienungsanleitung (Deutsch) GR 1538A_Stroboscope Manual Nautilus Waterproof Action Camera User Manual Exhibit 2 - Management Control Agreement Engager avec confiance les conversations difficiles PROCESSO ORÇAMENTÁRIO PARA 2007 Lindy 38151 video switch Eglo LYDIA Appareil de radiologie fixe - Luminos Agile Max, Luminos Copyright © All rights reserved.
Failed to retrieve file