It was a two step process. First the file CRC needed repaired, and then I could run the MSFT ScanPST.exe utility to actually repair the file.
- java -jar jfilerecovery.jar (requires Java 1.5+)
- Run C:\Program Files\Microsoft Office\Office12\ScanPST.exe

Technical notes, and other ideas.
It was a two step process. First the file CRC needed repaired, and then I could run the MSFT ScanPST.exe utility to actually repair the file.
Granulated sugar: 1 cup = 200 grams
Brown sugar: 1 cup, packed = 220 grams
Sifted white flour: 1 cup = 125 grams
White rice, uncooked: 1 cup = 185 grams
White rice, cooked: 1 cup = 175 grams
Butter: 1 cup = 227 grams
Almonds, slivered: 1 cup = 108 grams
Oil: 1 cup = 224 grams
Maple syrup: 1 cup = 322 grams
Milk, non-fat: 1 cup = 245 grams
Milk, sweetened condensed: 306 grams
Broccoli, flowerets: 1 cup = 71 grams
Raisins: 1 cup, packed = 165 grams
Milk, dry: 1 cup = 68 grams
Yogurt: 1 cup = 245 grams
Water: 1 cup = 236 grams
Confectioners sugar: 1 C = 110 g
Cocoa: 1 C = 125 g
Create new virtual pc, boot from the iso image, and then...
Use this option to prevent any updates against a desktop.
Refer: Windows SteadyState
/etc/passwd file stores essential information, which is required during login i.e. user account information.
/etc/passwd is a text file, that contains a list of the system's accounts, giving for each account some useful information like user ID, group ID, home directory, shell, etc. It should have general read permission as many utilities, like ls use it to map user IDs to user names, but write access only for the superuser (root).
Understanding fields in /etc/passwd
The /etc/passwd contains one entry per line for each user (or user account) of the system. All fields are separated by a colon (:) symbol. Total seven fields as follows.

Generally, passwd file entry looks as follows:
1. Username: It is used when user logs in. It should be between 1 and 32 characters in length.
2. Password: An x character indicates that encrypted password is stored in /etc/shadow file.
3. User ID (UID): Each user must be assigned a user ID (UID). UID 0 (zero) is reserved for root and UIDs 1-99 are reserved for other predefined accounts. Further UID 100-999 are reserved by system for administrative and system accounts/groups.
4. Group ID (GID): The primary group ID (stored in /etc/group file)
5. User ID Info: The comment field. It allow you to add extra information about the users such as user's full name, phone number etc. This field use by finger command.
6. Home directory: The absolute path to the directory the user will be in when they log in. If this directory does not exists then users directory becomes /
7. Command/shell: The absolute path of a command or shell (/bin/bash). Typically, this is a shell. Please note that it does not have to be a shell.
/etc/passwd is only used for local users only. To see list of all users, enter:
$ cat /etc/passwd
To search for a username called tom, enter:
$ grep tom /etc/passwd
/etc/passwd file permission
The permission on the /etc/passwd file should be read only to users (-rw-r--r--) and the owner must be root:
$ ls -l /etc/passwd
Output:
-rw-r--r-- 1 root root 2659 Sep 17 01:46 /etc/passwd
Your password is stored in /etc/shadow file
Your encrpted password is not stored in /etc/passwd file. It is stored in /etc/shadow file. In the good old days there was no great problem with this general read permission. Everybody could read the encrypted passwords, but the hardware was too slow to crack a well-chosen password, and moreover, the basic assumption used to be that of a friendly user-community.
Almost, all modern Linux / UNIX line operating systems use some sort of the shadow password suite, where /etc/passwd has asterisks (*) instead of encrypted passwords, and the encrypted passwords are in /etc/shadow which is readable by the superuser only.
Once you configure the menus the way you want you can change the permissions on the menu config file so the children can't mess it up. You can take ownership of it and give the children read and execute permission. Something like this:
chown -R admin_account:target_account /home/target_username/.config/menus
chmod -R 744 /home/target_username/.config/menus
Refer: LifeHacker
Ubuntu 8.10
sudo apt-get install ssh
Stop the server
sudo /etc/init.d/ssh stop
Start the server
sudo /etc/init.d/ssh start
Restart the server
sudo /etc/init.d/ssh restart
You probably want to change security for users allowed SSH login and disable root from SSH login
Edit this file:
vi /etc/ssh/sshd_config
Un-comment the following line:
PermitRootLogin no
Now restart the SSH server
/etc/init.d/sshd restart
SSH with Public Key
Refer: Cyberciti
Idea: Install Ubuntu in Virtual PC hang outside firewall and use for SSH uninstall samba and perhaps a whole bunch of other stuff too.
Use GuardDog to install a firewall, and lockdown everything except SSH. Tested inside proxy, and it was necessary to enable Internet, HTTP, HTTPS and also Network, Windows Networking (NETBIOS). This seemed to do a good job of locking down pretty much everything.
Use the command line to clone:
"C:\Program Files\Sun\xVM VirtualBox\VBoxManage.exe" clonevdi source.vdi target.vdi
It's easiest to prepare video for the IPod Nano just by using the Handbrake software in command line mode. The GUI interface requires Net 2.0 and it seems a bit buggy in a virtual pc.
The following seems to have smaller video size:
HandBrakeCLI.exe -i DVD\MYVIDEO\VIDEO_TS -o myvideo.mp4 --preset="iPhone & iPod Touch"
Other option:
HandBrakeCLI.exe -i DVD\MYVIDEO\VIDEO_TS -o myvideo.mp4 --preset="iPod"
Encrypted DVD's Finding Title
The following command will show all of the menus, find the right title, and then use that with the -t switch to set it, default is always 1.
handbrake -i /dev/dvd -t 0