Archive for June, 2010


Stopping and starting Exchange consists of stopping and starting the Exchange related services through the Services MMC snap-in or the net stop/net start command-line utilities. See the “Discussion” of this recipe for the list of Exchange services.

Using GUI

  1. Open the Computer Management MMC snap-in (compmgmt.msc).
  2. Scroll to the service that you wish to manage, and click Stop, Start, or Restart.

Using a command-line

The following command will stop a service:

> net stop <ServiceName>

The following command will start a service:

> net start <ServiceName>

The following will stop and start a service in a single command:

> net stop <ServiceName> && net start <ServiceName>

Using VBScript

‘————-SCRIPT CONFIGURATION———————-

strComputer = “<ComputerName>

strServiceName = “<ServiceName>

Set objWMIService = GetObject(“winmgmts:” _

& “{impersonationLevel=impersonate}!\\” & strComputer _

& “\root\cimv2”)

Set colServiceList = objWMIService.ExecQuery _

(“Select * from Win32_Service where Name='” & strServiceName _

_ ‘”)

‘ The following code will start a service

For Each objService in colServiceList

errReturn = objService.StartService()

Next

‘ The following code will stop a service

For Each objService in colServiceList

errReturn = objService.StopService()

Next

Summary

There are several services involved with Exchange Server, and stopping different services will accomplish different things. The services are interdependent, so when you stop or start various services you may see a message about having to stop dependent services. If you do stop dependent services, don’t forget to restart them again when you restart the service that you began with.

To shut down Exchange completely on a given machine, you need to stop all of the following services:

Microsoft Exchange Event (MSExchangeES)

This service was used for launching event-based scripts in Exchange 5.5 when folder changes were detected. Exchange 2000 offered the ability to create Event Sinks directly, so this use of this service has decreased. This service is not started by default.

Microsoft Exchange IMAP4 (IMAP4Svc)

This service supplies IMAP4 protocol message server functionality. This service is disabled by default. To use IMAP4 you must enable this service, configure it to auto-start, and start the service.

Microsoft Exchange Information Store (MSExchangeIS)

This service is used to access the Exchange mail and public folder stores. If this service is not running, users will not be able to use Exchange. This service is started by default.

Microsoft Exchange Management (MSExchangeMGMT)

This service is responsible for various management functions available through WMI, such as message tracking. This service is started by default.

Microsoft Exchange MTA Stacks (MSExchangeMTA)

This service is used to transfer X.400 messages sent to and from foreign systems, including Exchange 5.5 Servers. This service was extremely important in Exchange 5.5, which used X.400 as the default message transfer protocol. Before stopping or disabling this service, review MS KB 810489. This service is started by default.

Microsoft Exchange POP3 (POP3Svc)

This service supplies POP3 protocol message server functionality. This service is disabled by default. To use POP3 you must enable this service, configure it to auto-start, and start the service.

Microsoft Exchange Routing Engine (RESvc)

This service is used for routing and topology information for routing SMTP based messages. This service is started by default.

Microsoft Exchange System Attendant (MSExchangeSA)

This service handles various cleanup and monitoring functions. One of the most important functions of the System Attendant is the Recipient Update Service (RUS), which is responsible for mapping attributes in Active Directory to the Exchange subsystem and enforcing recipient policies. When you create a mailbox for a user, you simply set some attributes on a user object. The RUS takes that information and does all of the work in the background with Exchange to really make the mailbox. If you mailbox-enable or mail-enable objects and they don’t seem to work, the RUS is one of the first places you will look for an issue. If you need to enable diagnostics for the RUS, the parameters are maintained in a separate service registry entry called MSExchangeAL. This isn’t a real service; it is simply the supplied location to modify RUS functionality. This service is started by default.

Microsoft Exchange Site Replication Service (MSExchangeSRS)

This service is used in Organizations that have Exchange 5.5 combined with Exchange 2000/2003. This service is not started by default.

Network News Transfer Protocol (NntpSvc)

This service is responsible for supplying NNTP Protocol Server functionality. This service is started by default.

Simple Mail Transfer Protocol (SMTPSVC)

This service is responsible for supplying SMTP Protocol Server functionality. This service is started by default.

Advertisements

Computer Acronyms

Posted: June 19, 2010 in System Basics, System Information
Tags:

ADSL – Asymmetric Digital Subscriber Line

AGP – Accelerated Graphics Port

ALI – Acer Labs, Incorporated

ALU – Arithmetic Logic Unit

AMD – Advanced Micro Devices

APC – American Power Conversion

ASCII – American Standard Code for Information Interchange

ASIC – Application Specific Integrated Circuit

ASPI – Advanced SCSI Programming Interface

AT – Advanced Technology

ATI – ATI Technologies Inc.

ATX – Advanced Technology Extended

— B —

BFG – BFG Technologies

BIOS – Basic Input Output System

BNC – Barrel Nut Connector

— C —

CAS – Column Address Signal

CD – Compact Disk

CDR – Compact Disk Recorder

CDRW – Compact Disk Re-Writer

CD-ROM – Compact Disk – Read Only Memory

CFM – Cubic Feet per Minute (ft�/min)

CMOS – Complementary Metal Oxide Semiconductor

CPU – Central Processing Unit

CTX – CTX Technology Corporation (Commited to Excellence)

— D —

DDR – Double Data Rate

DDR-SDRAM – Double Data Rate – Synchronous Dynamic Random Access Memory

DFI – DFI Inc. (Design for Innovation)

DIMM – Dual Inline Memory Module

DRAM – Dynamic Random Access Memory

DPI – Dots Per Inch

DSL – See ASDL

DVD – Digital Versatile Disc

DVD-RAM – Digital Versatile Disk – Random Access Memory

— E —

ECC – Error Correction Code

ECS – Elitegroup Computer Systems

EDO – Extended Data Out

EEPROM – Electrically Erasable Programmable Read-Only Memory

EPROM – Erasable Programmable Read-Only Memory

EVGA – EVGA Corporation

— F —

FC-PGA – Flip Chip Pin Grid Array

FDC – Floppy Disk Controller

FDD – Floppy Disk Drive

FPS – Frame Per Second

FPU – Floating Point Unit

FSAA – Full Screen Anti-Aliasing

FS – For Sale

FSB – Front Side Bus

— G —

GB – Gigabytes

GBps – Gigabytes per second or Gigabits per second

GDI – Graphical Device Interface

GHz – GigaHertz

— H —

HDD – Hard Disk Drive

HIS – Hightech Information System Limited

HP – Hewlett-Packard Development Company

HSF – Heatsink-Fan

— I —

IBM – International Business Machines Corporation

IC – Integrated Circuit

IDE – Integrated Drive Electronics

IFS- Item for Sale

IRQ – Interrupt Request

ISA – Industry Standard Architecture

ISO – International Standards Organization

— J —

JBL – JBL (Jame B. Lansing) Speakers

JVC – JVC Company of America

– K —

Kbps – Kilobits Per Second

KBps – KiloBytes per second

— L —

LG – LG Electronics

LAN – Local Are Network

LCD – Liquid Crystal Display

LDT – Lightning Data Transport

LED – Light Emitting Diode

— M —

MAC – Media Access Control

MB � MotherBoard or Megabyte

MBps – Megabytes Per Second

Mbps – Megabits Per Second or Megabits Per Second

MHz – MegaHertz

MIPS – Million Instructions Per Second

MMX – Multi-Media Extensions

MSI – Micro Star International

— N —

NAS – Network Attached Storage

NAT – Network Address Translation

NEC – NEC Corporation

NIC – Network Interface Card

— O —

OC – Overclock (Over Clock)

OCZ – OCZ Technology

OEM – Original Equipment Manufacturer

— P —

PC – Personal Computer

PCB – Printed Circuit Board

PCI – Peripheral Component Interconnect

PDA – Personal Digital Assistant

PCMCIA – Peripheral Component Microchannel Interconnect Architecture

PGA – Professional Graphics Array

PLD – Programmable Logic Device

PM – Private Message / Private Messaging

PnP – Plug ‘n Play

PNY – PNY Technology

POST – Power On Self Test

PPPoA – Point-to-Point Protocol over ATM

PPPoE – Point-to-Point Protocol over Ethernet

PQI – PQI Corporation

PSU – Power Supply Unit

— R —

RAID – Redundant Array of Inexpensive Disks

RAM – Random Access Memory

RAMDAC – Random Access Memory Digital Analog Convertor

RDRAM – Rambus Dynamic Random Access Memory

ROM – Read Only Memory

RPM – Revolutions Per Minute

— S —

SASID – Self-scanned Amorphous Silicon Integrated Display

SCA – SCSI Configured Automatically

SCSI – Small Computer System Interface

SDRAM – Synchronous Dynamic Random Access Memory

SECC – Single Edge Contact Connector

SODIMM – Small Outline Dual Inline Memory Module

SPARC – Scalable Processor ArChitecture

SOHO – Small Office Home Office

SRAM – Static Random Access Memory

SSE – Streaming SIMD Extensions

SVGA – Super Video Graphics Array

S/PDIF – Sony/Philips Digital Interface

— T —

TB – Terabytes

TBps – Terabytes per second

Tbps – Terabits per second

TDK – TDK Electronics

TEC – Thermoelectric Cooler

TPC – TipidPC

TWAIN – Technology Without An Important Name

— U —

UART – Universal Asynchronous Receiver/Transmitter

USB – Universal Serial Bus

UTP – Unshieled Twisted Pair

— V —

VCD – Video CD

VPN – Virtual Private Network

— W —

WAN – Wide Area Network

WTB – Want to Buy

WYSIWYG – What You See Is What You Get

— X —

XGA – Extended Graphics Array

XFX – XFX Graphics, a Division of Pine

XMS – Extended Memory Specification

XT – Extended Technology

All mIRC Commands

Posted: June 19, 2010 in Commands, System Information
Tags:

/ Recalls the previous command entered in the current window.

/! Recalls the last command typed in any window.

/action {action text} Sends the specifed action to the active channel or query window.

/add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events.

/ame {action text} Sends the specifed action to all channels which you are currently on.

/amsg {text} Sends the specifed message to all channels which you are currently on.

/auser {level} {nick|address} Adds a user with the specified access level to the remote users

list.

/auto [on|off|nickname|address] Toggles auto-opping of a nick or address or sets it on or off

totally.

/away {away message} Sets you away leave a message explaining that you are not currently paying

attention to IRC.

/away Sets you being back.

/ban [#channel] {nickname} [type] Bans the specified nick from the curent or given channel.

/beep {number} {delay} Locally beeps ‘number’ times with ‘delay’ in between the beeps. /channel

Pops up the channel central window (only works in a channel).

/clear Clears the entire scrollback buffer of the current window.

/ctcp {nickname} {ping|finger|version|time|userinfo|clientinfo} Does the given ctcp request on

nickname.

/closemsg {nickname} Closes the query window you have open to the specified nick.

/creq [ask | auto | ignore] Sets your DCC ‘On Chat request’ settings in DCC/Options.

/dcc send {nickname} {file1} {file2} {file3} … {fileN} Sends the specified files to nick.

/dcc chat {nickname} Opens a dcc window and sends a dcc chat request to nickname.

/describe {#channel} {action text} Sends the specifed action to the specified channel window.

/dde [-r] {service} {topic} {item} [data] Allows DDE control between mIRC and other

applications.

/ddeserver [on [service name] | off] To turn on the DDE server mode, eventually with a given

service name.

/disable {#groupname} De-activates a group of commands or events.

/disconnect Forces a hard and immediate disconnect from your IRC server. Use it with care.

/dlevel {level} Changes the default user level in the remote section.

/dns {nickname | IP address | IP name} Uses your providers DNS to resolve an IP address.

/echo [nickname|#channel|status] {text} Displays the given text only to YOU on the given place

in color N.

/enable {#groupname} Activates a group of commands or events.

/events [on|off] Shows the remote events status or sets it to listening or not.

/exit Forces mIRC to closedown and exit.

/finger Does a finger on a users address.

/flood [{numberoflines} {seconds} {pausetime}] Sets a crude flood control method.

/fsend [on|off] Shows fsends status and allows you to turn dcc fast send on or off.

/fserve {nickname} {maxgets} {homedirectory} [welcome text file] Opens a fileserver.

/guser {level} {nick} [type] Adds the user to the user list with the specified level and

address type.

/help {keyword} Brings up the Basic IRC Commands section in the mIRC help file.

/ignore [on|off|nickname|address] Toggles ignoring of a nick or address or sets it on or off

totally.

/invite {nickname} {#channel} Invites another user to a channel.

/join {#channel} Makes you join the specified channel.

/kick {#channel} {nickname} Kicks nickname off a given channel.

/list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for

parameters.

/log [on|off] Shows the logging status or sets it on or off for the current window.

/me {action text} Sends the specifed action to the active channel or query window.

/mode {#channel|nickname} [[+|-]modechars [parameters]] Sets channel or user modes.

/msg {nickname} {message} Send a private message to this user without opening a query window.

/names {#channel} Shows the nicks of all people on the given channel.

/nick {new nickname} Changes your nickname to whatever you like.

/notice {nick} {message} Send the specified notice message to the nick.

/notify [on|off|nickname] Toggles notifying you of a nick on IRC or sets it on or off totally.

/onotice [#channel] {message} Send the specified notice message to all channel ops.

/omsg [#channel] {message} Send the specified message to all ops on a channel.

/part {#channel} Makes you leave the specified channel.

/partall Makes you leave all channels you are on.

/ping {server address} Pings the given server. NOT a nickname.

/play [-c] {filename} [delay] Allows you to send text files to a window.

/pop {delay} [#channel] {nickname} Performs a randomly delayed +o on a not already opped nick.

/protect [on|off|nickname|address] Toggles protection of a nick or address or sets it on or off

totally.

/query {nickname} {message} Open a query window to this user and send them the private message.

/quit [reason] Disconnect you from IRC with the optional byebye message.

/raw {raw command} Sends any raw command you supply directly to the server. Use it with care!!

/remote [on|off] Shows the remote commands status or sets it to listening or not.

/rlevel {access level} Removes all users from the remote users list with the specified access

level.

/run {c:\path\program.exe} [parameters] Runs the specified program, evt. with parameters.

/ruser {nick[!]|address} [type] Removes the user from the remote users list.

/save {filename.ini} Saves remote sections into a specified INI file.

/say {text} Says whatever you want to the active window.

/server [server address [port] [password]] Reconnects to the previous server or a newly

specified one.

/sound [nickname|#channel] {filename.wav} {action text} Sends an action and a fitting sound.

/speak {text} Uses the external text to speech program Monologue to speak up the text.

/sreq [ask | auto | ignore] Sets your DCC ‘On Send request’ settings in DCC/Options.

/time Tells you the time on the server you use.

/timer[N] {repetitions} {interval in seconds} {command} [| {more commands}] Activates a timer.

/topic {#channel} {newtopic} Changes the topic for the specified channel.

/ulist [{|}]{level} Lists all users in the remote list with the specified access levels.

/url [-d] Opens the URL windows that allows you to surf the www parallel to IRC.

/uwho [nick] Pops up the user central with information about the specified user.

/who {#channel} Shows the nicks of all people on the given channel.

/who {*address.string*} Shows all people on IRC with a matching address.

/whois {nickname} Shows information about someone in the status window.

/whowas {nickname} Shows information about someone who -just- left IRC.

/wavplay {c:\path\sound.wav} Locally plays the specified wave file.

/write [-cidl] {filename} [text] To write the specified text to a .txt file.

Now that you know how to work with variables and form expressions, let’s look at something more advanced: selection statements used with the command line. When you want to control the flow of execution based upon conditions known only at run time, you’ll use

  • if to execute a statement when a condition is true, such as if the operating system is Windows 2000 or later. Otherwise, the statement is bypassed.
  • if not to execute a statement when a condition is false, such as if a system doesn’t have a C:\Windows directory. Otherwise, the statement is bypassed.
  • if…else to execute a statement if a condition is matched (true or false) and to otherwise execute the second statement.

Although some of the previous examples in this chapter have used conditional execution, we haven’t discussed the syntax for these statements or the associated comparison operators. If your background doesn’t include programming, you probably will be surprised by the power and flexibility of these statements.

Using If

The if statement is used for conditional branching. It can be used to route script execution through two different paths. Its basic syntax is

if condition (statement1) [else (statement2)]

Here each statement can be a single command or multiple commands chained, piped, or grouped within parentheses. The condition is any expression that returns a Boolean value of True or False when evaluated. The else clause is optional, meaning you can also use the syntax

if condition (statement)
Tip Technically, parentheses aren’t required, but using them is a good idea, especially if the condition includes an echo statement or a command with parameters. If you don’t use parentheses in these instances, everything that follows the statement on the current line will be interpreted as part of the statement, which usually results in an error.

The if statement works like this: If the condition is true, then statement1 is executed. Otherwise statement2 is executed (if it is provided). In no case will both the if and the else clauses be executed. Consider the following example:

if "%1"=="1" (echo is one) else (echo is not one)

Here if the first parameter passed to the script is 1, then “is one” is written to the output. Otherwise, “is not one” is written to the output.

The command shell expects only one statement after each condition. Typically, the statement is a single command to execute. If you want to execute multiple commands, you’ll need to use one of the command piping, chaining, or group techniques, as in this example:

if "%1"=="1" (hostname & ver & ipconfig /all) else (netstat -a)

Here all three commands between parentheses will execute if the first parameter value is 1.

Using If Not

When you want to execute a statement only if a condition is false, you can use if not. The basic syntax is

if not condition (statement1) [else (statement2)]

Here the command shell evaluates the condition. If it is false, the command shell executes the statement. Otherwise, the command doesn’t execute and the command shell proceeds to the next statement. The else clause is optional, meaning you can also use the syntax

if not condition (statement1)

Consider the following example:

if not errorlevel 0 (echo An error has occurred!) & (goto :EXIT)

Here you check for error conditions other than zero. If no error has occurred (meaning the error level is zero), the command shell continues to the next statement. Otherwise, the command shell writes “An error has occurred!” to the output and exits the script. (You’ll learn all about goto and subroutines later in the chapter.)

Using If Defined and If Not Defined

The final types of if statements you can use are if defined and if not defined. These statements are designed to help you check for the existence of variables, and their respective syntaxes are

if defined variable statement

and

if not defined variable statement

Both statements are useful in your shell scripts. In the first case, you execute a command if the specified variable exists. In the second case, you execute a command if the specified variable does not exist. Consider the following example:

if defined numServers (echo Servers: %numServers%)

Here, if the numServers variable is defined, the script writes output. Otherwise, the script continues to the next statement.

Nesting Ifs

A nested if is an if statement within an if statement. Nested ifs are very common in programming, and command-shell programming is no exception. When you nest if statements, pay attention to the following points:

  1. Use parentheses to define blocks of code and the @ symbol to designate the start of the nested if statement.
  2. Remember that an else statement always refers to the nearest if statement that is within the same block as the else statement and that is not already associated with another else statement.

Here is an example:

if "%1"=="1" (
@if "%2"=="2" (hostname & ver) else (ver)) else (hostname & ver & 
netstat -a)

The first else statement is associated with if “%2″==”2”. The final else statement is associated with if “%1″==”1”.

Making Comparisons in If Statements

Frequently, the expression used to control if statements will involve comparison operators as shown in previous examples. The most basic type of string comparison is when you compare two strings using the equality operator (=), such as

if stringA==stringB statement

Here, you are performing a literal comparison of the strings and if they are exactly identical, the command statement is executed. This syntax works for literal strings but is not ideal for scripts. Parameters and arguments may contain spaces or there may be no value at all for a variable. In this case, you may get an error if you perform literal comparisons. Instead, use double quotation marks to perform a string comparison and prevent most errors, such as

if "%varA%"=="%varB%" statement

or

if "%varA%"=="string" statement

String comparisons are always case-sensitive unless you specify otherwise with the /i switch. The /i switch tells the command shell to ignore the case in the comparison, and you can use it as follows:

if /I "%1"=="a" (echo A) else (echo is not A)

These operators are used in place of the standard equality operator, such as

if "%varA%" equ "%varB" (echo The values match!)

Group Command Sequences

Posted: June 13, 2010 in Commands, System Information
Tags: ,


When you combine multiple commands, you may need a way to group commands to prevent conflicts or to ensure that an exact order is followed. You group commands using a set of parentheses. To understand why grouping may be needed, consider the following example. Here, you want to write the host name, IP configuration, and network status to a file, so you use this statement:

hostname & ipconfig & netstat -a > current-config.log

When you examine the log file, however, you find that it contains only the network status. The reason for this is that the command line executes the commands in sequence as follows:

  1. hostname
  2. ipconfig
  3. netstat – a > current_config.log

Because the commands are executed in sequence, the system host name and IP configuration are written to the command line, and only the network status is written to the log file. To write the output of all the commands to the file, you would need to group the commands as follows:

(hostname & ipconfig & netstat -a) > current_config.log

Here, the output of all three commands is collected and then redirected to the log file. You can also use grouping with conditional success and failure. In the following example, both Command1 and Command2 must succeed for Command3 to execute:

(cd C:\working\data & xcopy n:\docs\*.*) && (hostname >
n:\runninglog.txt)

Hey Guys……

Download the MCTS 70-236 Exchange Server 2007  E book in the below link……

Please let me know if you would like to have any different Books

DownLoad Here

• Exchange Server 2010 only runs on Windows Server 2008 and Windows Server 2008
R2. Since Windows Server 2008 also needs some additional software to be installed, and
bearing in mind the improvements in Windows Server 2008 R2, the latter is the better
option.
• Any Active Directory domain containing Exchange objects has to be running in (at the
very least) Windows 2003 domain functional level.
• The Active Directory forest also has to be running in at least Windows 2003 forest
functional level.
• The Schema Master and the Global Catalog Server(s) have to have a minimum level of
Windows Server 2003 R2.
• Exchange Server 2010 cannot be installed in an organization where an Exchange Server
2000 exists.

During setup Exchange features are easily configured through the use of the Configure Email and Internet Connection Wizard. The wizard configures the following settings by default.

  • Deleted Items RetentionSet to 30 days. Changes can be made as well by running the Backup Configuration Wizard. Here you can change the value or turn the value on or off.
  • Circular LoggingEnabled to save drive space. It is recommended that you use this configuration only if a backup solution has not been selected. Circular logging is disabled after the Backup Configuration Wizard has been run.
  • Idle User SessionsThe timeout interval is set to 10 minutes.
  • SMTP ConnectorThe connector is created and configured with any send/receive options you select for Internet email.
  • Default Recipient PolicyThe default policy is created and set to your domain name. It also applies the policy to all for SMTP email addresses.
  • The Microsoft Connector for POP3 MailboxesThe connector is installed. Through the CEICW or the POP3 Connector manager you can define POP3 mailboxes that are to be downloaded to Exchange mailboxes.
  • Maximum Number of Concurrent ConnectionsFor Message Delivery the maximum number of concurrent connections is set to 500.
  • Outbound ConnectionsLimited to 10.
  • Email Attachment TypesAttachment filtering can be utilized.
  • Mail ClientsClients assigned an address within the specified local IP range are allowed to relay mail through the SMTP virtual server.

In addition to these settings, you should also be aware of the mailbox management process in Exchange and what it does for your mail server. By default, the mailbox management process is set to Never Run. However, the mailbox management process can perform some important tasks and should be enabled on the SBS server.

One of the most important tasks handled by the mailbox management process is the online defrag of the mail databases. Through the course of normal operation, mail data is added and removed from the mail database, and over time a large amount of unused space becomes scattered across the database. The online defrag process rearranges the storage within the database so that all the empty database records are moved to the end of the database file. You can also start the mailbox management process manually by right-clicking on the server object in Exchange System Manager and selecting Start Mailbox Management Process.


If you are the primary user of your computer and you do not have any other users, or if everyone in your household uses the same username, you are the perfect candidate for enabling automatic logon. Automatic logon is a great technique that will save you time that is often wasted when your computer is waiting for you to type your password. Even if you do not have a password assigned to your account, you are still required by the logon welcome screen to click your name to sign in. Having to do these tasks yourself is unnecessary and a waste of time if you are a candidate for automatic logon.

Caution Automatic logon can be a great feature but it can also create a security problem for your computer. If you use your computer for business, if you have data you prefer to keep safe from others, or both, I strongly recommend that you do not enable this feature. If you happen to step out of your office or if your laptop is stolen, you have left the door to your computer wide open. By enabling automatic logon, you are trading convenience for physical access security. However, you are not changing your network security, so your data is still safe from network attackers. The risk of someone remotely connecting to your computer is the same as if you did not have automatic logon enabled.

Enabling automatic logon is a quick and easy Registry hack. Follow these steps to speed up your sign-on with automatic logon:

  1. Click the Start button, type regedit in the Search box, and then press Enter.
  2. After Registry Editor has started, navigate through HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows NT\CurrentVersion\Winlogon.
  3. Locate the AutoAdminLogon entry. If the key does not exist, create it by right-clicking the Winlogon folder and selecting New and then Registry String.
  4. Right-click the AutoAdminLogon entry and select Modify. Set the Value to 1. Then press OK to save the new value.
  5. Locate the DefaultUserName entry or create it if it does not exist.
  6. Right-click DefaultUserName and select Modify. Set the value to the username that you primarily use to sign in to Windows. Press OK.
  7. Locate the DefaultPassword entry or create it if it does not exist.
  8. Right-click the DefaultPassword entry and set the Value to your password.
  9. Close Registry Editor and restart your computer.

After you reboot your computer, Windows Vista should automatically sign on to your account. You will notice that your computer will now get to the desktop much quicker than before. If you ever want to disable automatic logon, just go back into Registry Editor and set the AutoAdminLogon entry to 0.