Posts Tagged ‘tech tips’
Problem: Mapped shared network folder would intermittently disconnect itself, and user could not remap it. When trying to remap it, user would get one of the following errors messages:
“Local device name is already in use”
“The drive could not be mapped because no network was found”
“The [\\Server Name\Folder] is not accessible. You might not have permission to use this network resource.”
Rebooting would fix the issue temporarily, but the disconnect would reoccur within an hour or so.
His colleagues did not have this problem, nor did the user have problems getting to other servers, the Internet, email application. He could ping the server by name, but could not map to the shared folder, by name or IP.
Microsoft’s KB890413 says the following:
This issue may occur if you log on to the Windows XP-based client by using a different connection type than you use to connect to the file server. If you created the network drive through a local area network (LAN) with your current user credentials, the mapping information does not contain any user information. When you log on to the computer, the operating system establishes only a partial connection to the share, and the network drive is considered used. Later, when you access the network drive, the connection is fully restored.
If you use another connection type such as Remote Access Service (RAS) to connect to the file server, the logon credentials used are different from the credentials that you used to create the network mapping. When you try to access the network drive to restore the connection, the operating system tries to use the logon credentials of the RAS connection. If the file share server does not accept the logon credentials of the RAS connection, the operating system cannot access the share. Then, the operation system tries to re-create the mapping to the already-used network drive, and the error occurs.
And their solution to this problem is to remove the existing network mapping and to remap the network drive. This did not work in my case, instead resulting in the error messages mentioned above.
I thought it might be the Symantec Protection Agent that was installed, so I uninstalled that, but the problem persisted. Tried putting the user on another switch port and VLAN (thus different subnet/IP), but that did not help either. The Windows Firewall was not being used.
I tried mapping the drive with my credentials, but I had trouble as well. I tried mapping by IP, no worky. I deleted all temporary files, cookies, and made sure there were no saved passwords under his profile (check that in Control Panel –> User Accounts, Advanced tab –> Manage Passwords):
The problem persisted. I then remoted into my desktop from the user’s laptop, and had the user map to the network drive using his credentials. That worked! So the problem was definitely with his laptop, and not an authorization/account issue.
I was about to rebuild a laptop for the user when I thought I should check one more thing.
Solution: I checked the local host file (C:\Windows\system32\drivers\etc\hosts) on the user’s laptop and he had an entry for the server name pointing to an old IP address. Even though the IP address listed was alive (it was being used by another server), which is why I was able to ping it, as soon as I removed the entry and pinged the server by name, it came back with a totally different IP address. Tried mapping to the shared folder again, and it worked!
I don’t know why the user had entries in his host file, but he’s an application developer, so that partially answers the question .
Note: User’s machine running Windows XP Professional w/ Service Pack 3
If you just bought a new desktop or laptop, no doubt it came with 30-Day trials of typical well known AntiVirus, AntiSpyware applications along with a host of other applications whose licenses expires within 30 to 60 days. The good news is, you can let them expire. The reason being, there are plenty of just as good, if not better, freeware applications out there, that can take their place. In this post, I’ll outline a list of freeware applications that I think are essential and should be installed on any desktop or laptop running Windows XP and Vista. Full disclosure, I don’t get paid to recommend these applications. I just use them myself and have found them to be very reliable, without any spyware, adware, or virus attached to them. Now without further ado:
Thirteen Essential Freeware Applications:
- AntiVirus Software: Microsoft Security Essentials or Avira – With it’s realtime protection, automatic updates, MSE and Avira are excellent alternatives to paid antivirus products. A highly configurable application, Avira guards against viruses by scanning downloaded files or email attachments. Similarly, another quality antivirus application is Microsoft Security Essentials. I previously recommended AVG, but it’s become more bloated. I loved it at version 7.5 , which will be dearly missed. Microsoft Security Essentials has realtime protection and automatic updates, and just like Avira, you basically install it and let it do it’s thing. In both cases, you can do scheduled scans – which I think is an important feature. For example, I have MSE scan my entire system starting at 1 AM every Saturday morning. Avira has a fully featured edition which cost money, but the free home/personal edition is perfect for the average home user.
- AntiSpyware Software: Malwarebytes and SuperAntiSpyware – Malwarebytes can scan and eliminate tracking programs, cookies, keyloggers, spyware, hijackers, and trojans. A good program, it unfortunately does not provide realtime protection. SuperAntiSpyware, despite having a name that sounds like a bogus AntiSpyware program, it actually works. My first experience with the software was when I used it to remove a varient of the Vundo trojan off a friend’s computer. The only drawback is that updates are manual and there is no realtime protection. Install both and run them manually biweekly.
- Browser Hijacks: HijackThis along with the Log Analyzer – An application that actually falls under the AntiSpyware category, HijackThis scans your machine for settings that may have been changed by spyware programs. For example, if you have alot of popups or if your google/yahoo searches lead you to shopping websites, your browser may have been hijacked. HijackThis will scan your machine and create a log file [select "Do a system scan and save a log file"]. You take the log file to the Log Analyzer page to get an interpretation of the results, giving you an idea of what’s good and what’s bad. Just like AdAware, you usually don’t need this program unless you unwittingly installed some “search assistant” or “shopping assistant” program or some third party wallpaper/screensaver that came with some “extra goodies”, that you really weren’t aware of.
- Firewall: Comodo Firewall Pro and Zone Alarm- If you have a router at home (if you don’t you should!!), that will protect you from incoming attacks. The router typically has firewall functionality built in, that will make your internal PC invisible to the outside world. A software firewall, on the other hand, installed on your PC, will protect you against malicious outgoing traffic. It will allow you to control which software programs on your computer has access to the internet. By using a software firewall, you can see which programs are trying to get out to the internet, either to access info (such as program updates, antivirus updates) or send info (such as your personal searching habits). Zone Alarm works well in giving you this type of protection, displaying alerts when applications try to connect out. It is good for the novice user who wants a general software firewall without the need to fine tune. Comodo allows a user to fine tune the firewall, with the ability to specify TCP ports, traffic direction (incoming, outgoing, or both). In other words, it’s for the user who wants to get down to the nitty gritty. If you choose to use Zone Alarm or Comodo, you should disable the Windows Firewall so that they don’t create any conflicts. On a side note, Sygate Personal Firewall was fantastic until Symantec bought them out and canned it (R.I.P.).
- Privacy: CCleaner – If you surf the Internet, whether using Internet Explorer or Firefox, of any other browser, you’re bound to have a load of cookies and temporary files. CCleaner will help clean up those unnecessary files in addition to, Windows Temporary Files, URL History, Recycle Bin, Clipboard, Windows Log Files, Recent Documents from the Start Menu, among other temporary files. A good, easy to use cleaner. You can set it to run automatically after the computer boots up, and set it for secure deletion (from 1 to 35 passes). I usually run it after I’m done browsing or going to websites where I need to enter a username and password. The “C” in CCleaner supposedly stands for Crap. NOTE: When you install CCleaner, make sure you uncheck the “Add CCleaner Yahoo! Toolbar and use CCleaner from your browser” option. It otherwise installs the Yahoo toolbar which is not something I recommend.
- Archiving: 7Zip – A fast archiving program which packs/unpacks files and directories in 7z format as well as the ZIP, GZIP, BZIP2 and TAR formats. It unpacks only in the RAR, CAB, ISO, ARJ, LZH, CHM, MSI, WIM, Z, CPIO, RPM, DEB and NSIS formats. It integrates well with the Windows shell, and works better than the Windows unpacking utility since you don’t have to deal with the Windows Extraction Wizard which makes something that should take one step, into four steps.
- CD/DVD Burner: CDBurnerXP – A CD/DVD Burner program which allows you to burn a data or audio disc, burn an ISO image, copy or erase a disc. Replace your trial version of Nero or Roxio with this free program.
- Encryption: TrueCrypt - When you need to encrypt your USB flash drive or create an encrypted “container” or partition on your hard drive, TrueCrypt is the way to go. TrueCrypt provides for “on-the-fly”, transparent encryption allowing you to securely store your files without much hassle. Essential when you store personal information on your computer, such as your tax files, password lists, etc.
- PDF Reader: Foxit Reader - A small, fast alternative to Adobe Acrobat Reader (2.55M versus 20M) with no annoying splash window. Required for when you need to download/read user manuals or other documents which only come in PDF format.
- PDF Writer: PrimoPDF - Great for when you need to print something (like an online shopping receipt) but don’t have a printer handy, print to a PDF printer. Basically, acts like a printer, but simply “prints” to a pdf file, which you can save and print later, or save and open using your favorite PDF reader.
- Image Resizer: Microsoft Image Resizer PowerToy – Nice simple tool to resize pictures that you’ve taken with your digital camera. You simply right-click on the photo (or selection of photos), and select “Resize Pictures” from the menu. Easier than starting another program (such as Photoshop or Elements) to resize pictures.
That’s it!. Of course, if you’re not the type to install “free” wallpapers, screensavers, toolbars, shopping assistant applications, then you probably don’t need any of the above
Hope this list helps. Comments are certainly welcome!
Note: Understand that to use TrueCrypt, you need to have administrative privileges [admin rights]. If you are a home user, then most likely, you are already running your PC as an administrator. At work, it might be a different story. Your system administrator has probably locked down your PC. The reason you need admin rights is because TrueCrypt loads a driver that enables the “on-the-fly” encryption. To load the driver, you need the administrative privileges. It does not matter that you are running TrueCrypt from your USB Flash Drive. It still loads the driver and you still need admin rights. So, if you are at work, on a PC that is locked down, then you’ll need to have your system administrator install TrueCrypt on your PC in order for you to use your encrypted USB Flash Drive. If you plug your drive into a machine that requires administrative rights, and doesn’t have TrueCrypt already installed, then you’ll get a message stating “In order to load the TrueCrypt driver, you need to be logged into an account with administrator privileges“. You can read about it on the TrueCrypt website here. Now that we got that out of the way, let’s move on.
Portable USB flash drives are becoming cheaper and cheaper every day. Some companies are even giving them away. When they first arrived on the scene, most of the drives had a capacity of less than 1GB. But now, you can find 2GB to 4GB drives almost everywhere, including your local drugstore chain. At these sizes, they can actually be useful. You can use it to store your music, pictures, videos, or documents. Some even use it to store bootable operating systems like Linux. I use it to store a text file that contains the passwords for all of my online accounts, such as for my online bank accounts, my Amazon account, credit card accounts, etc. And since the flash drives are so portable, it makes sense to have one. However, since they ARE so portable, they can easily be lost, stolen, or misplaced. If you are like me, and store personal information on your flash drive, information that you don’t want to fall into the wrong hands, then you need to encrypt your flash drive. By encrypting your flash drive, the files contained within it become password protected and can only be accessed by you or someone who knows your password. There are many different applications that help you encrypt your flash drive. Some drive manufacturers include encryption applications on the flash drive. In this tutorial, I will show you how to encrypt your portable USB flash drive using my favorite freeware application, TrueCrypt.
What Is TrueCrypt?
Using TrueCrypt, you create a password protected encrypted file that is stored on the flash drive. This encrypted file acts as a “container”, within which all the files you want encrypted are stored. When you connect your flash drive into a PC, this “container” gets mounted as a separate hard drive (provided you enter the correct password). And now, everything you save into this separate hard drive is encrypted automatically. This is where TrueCrypt really shines, providing transparent, real-time encryption. Plus, you don’t need TrueCrypt to be installed on the local computer [unless you don't have admin rights on your computer - see note above].
How To Encrypt Your Flash Drive Using TrueCrypt
- Download the latest stable version of TrueCrypt here:
- Install the software on your local computer (accepting all the default options)
- Connect your USB flash drive to your computer. For this tutorial, let’s assume that it is assigned drive letter G:\
- Start the TrueCrypt application
- Click on the Create Volume button to start the TrueCrypt Volume Creation Wizard. This is where you create the “container”.
- Select Create a file container (default option) and click on Next.
- This brings you to the Volume Type window. Here you can specify if you want your “container” to be a standard, visible file or if you want to create a hidden “container” (essentially a “container” within a “container”). For this tutorial, we’ll select the default option, Standard TrueCrypt Volume, and click on Next.
- This brings you to the Volume Location window. Here you specify the filename and location of the “container”. For this tutorial, let’s call the container MyCrypt. And since your flash drive is mounted as the G:\ drive, specify your location and filename as G:\MyCrypt, placing the container in the root of the flash drive. Click Next.
Next you need to select the Encryption Algorithm and Hash Algorithm. I won’t go into the details of the differences between the different options, their pros and cons. That would turn this tutorial into a book. For this tutorial, we’ll leave the defaults, as they should be sufficient. Click Next.
Next, you need to choose the size of the “container”. This depends on the size of your flash drive and how much info you want to encrypt. Personally, I would suggest leaving anywhere between 10% to 20% of the drive unencrypted so that you have room for the TrueCrypt application files (about 6MB) as well as unimportant files that you might want to share or just don’t need encrypted. For this tutorial, using a 1GB flash drive, we’ll set the “container” to be 850MB. Click Next.
Next, specify the password you want to use to access and mount this “container”. Select a strong password, that would be easy for you to remember and hard for anyone else to figure out. A strong password usually consists of at least 20 characters, and uses a combination of letters (both lower and upper case), and numbers. But at a minimum, it should consist of 8 characters. Click Next after you enter your password.
Next, you are ready to format the container. You can select the type of File System and Cluster. For this tutorial, leave the default values. Move your mouse randomly within the Volume Format window to generate the encryption keys. Don’t worry; you are not going to have to remember these keys. When ready, click on Format to start. Depending on the size of the “container” (chosen in step 8), this may take up to 5 minutes.
- Once the format successfully completes, you will get a pop up indicating that the “container” has been created. Click OK then Exit.
From the main TrueCrypt window, select Tools -> Traveler Disk Setup to start the Traveler Disk Setup Wizard.
- In the Traveler Disk Setup Wizard, we need to set several things. First, specify the root directory of the removable drive, in our case G:\. Uncheck the “Include TrueCrypt Volume Creation Wizard” (we’ve already created the “container” called MyCrypt so we don’t need the wizard). Next, select the “Auto-mount TrueCrypt Volume” button. This will allow you to be automatically prompted to mount the encrypted “container” when you insert your removable drive. Next, specify the name of the encrypted “container”, in our case it’s MyCrypt. Finally, click on Create.
- Once the Traveler Disk Setup is complete, you will get a confirmation popup:
Click OK, Close out of the Traveler Disk Setup Wizard and Exit the TrueCrypt application. That’s it! Now, every time you connect your flash drive, you will be asked if you want to mount your encrypted “container”. Select Mount TrueCrypt volume and click OK.
Next, you will be prompted to enter in the password you created for your encrypted “container”. Enter your password and click OK.
Your encrypted “container” will be mounted as a drive using the next available drive letter. In this case, it is the H:\ drive.
Now, every time you put a file into the H:\ drive, it will be encrypted automatically. To “disconnect” the drive, right-click on the TrueCrypt icon in your taskbar and select Dismount:
Hopefully, I made the steps to create an encrypted drive easy. Having an encrypted drive will give you the assurance that if you lost your flash drive, the personal information stored in the encrypted drive will never be exposed.
Comments for this tutorial are welcomed!
Copyright © 2008 JB Network Design LLC. All rights reserved. TrueCrypt and the TrueCrypt logo are registered trademarks of the TrueCrypt Foundation.
How-To Geek has a nice writeup on how to create a shortcut or hotkey for the “Safely Remove Hardware” dialog. Comes in handy if you’re like me and use a flash drive alot.