Blog Maintained by Eniac Technology

  • Tech Facts

    Over 3.8 billion people use the internet today, which is 40% of the world's population.

  • Tech Facts

    More than 570 new websites are created every minute.

  • Tech Facts

    There are over 3.5 billion searches per day on Google.

Thursday, February 2, 2023

How to install windows 7? Error: Device driver missing while installing windows 7.

Problem Observed:

“A required CD/DVD drive device driver is missing”

The issue occurs because the required drivers for installing windows 7 in your new hardware are missing.
1: Make sure you have inserted USB stick to a USB 2.0 port instead of a USB 3.0 port.
2. Download and create bootable USB using the windows installation tool. It adds the required driver to the flash-drive while creating a bootable windows pendrive.

For further info or have any question do let me know in the comment section below 🙂

Failed to install .NET Framework, Error: Hresult 0xc8000222

Why Error Occured?

This error usually indicates a problem with Windows Update.

How to Resolve?

1. Open CMD(command prompt) as administrator and type “net stop WuAuServ” without quotes. This will stop windows update services using CMD

2. Go to Run type %windir%. Basically it is windows directory in your C drive.

3. Find the folder SoftwareDistribution and rename it (let’s say “Sdist).

4. Now again start windows update services by typing “net start WuAuServ” in cmd.

5.Try reinstalling .NET Framework again.

In-Case you still face any problem while installing .NET Frmework, let us know in the comments below.

Social Engineering: Understanding the Psychology of Cyber Attacks

Social engineering is a tactic used by cybercriminals to manipulate individuals into divulging sensitive information or performing actions that compromise security. In this blog post, we will explore the psychology of social engineering and how organizations and individuals can protect themselves.

Social engineering attacks often prey on human emotions such as fear, urgency, and trust. Cybercriminals use these emotions to trick individuals into divulging sensitive information or performing actions that compromise security. For example, a phishing email may use a sense of urgency to convince the recipient to click on a link or enter their login credentials.

Social engineering attacks can also be used to gain access to sensitive information or systems. For example, an attacker may impersonate a trusted source, such as a company representative, to gain access to a system or sensitive information.

To protect themselves from social engineering attacks, organizations and individuals should be aware of the tactics used by cybercriminals. This includes understanding how attackers use emotions to manipulate individuals and being suspicious of unsolicited emails or phone calls.

Organizations should also provide regular training to employees on how to identify and respond to social engineering attacks. This includes training on how to identify phishing emails and social engineering tactics.

Individuals should also be vigilant about their personal information and be wary of providing sensitive information online or over the phone. Additionally, individuals should use strong, unique passwords and avoid clicking on links or entering login credentials in unsolicited emails or phone calls.

In conclusion, social engineering is a tactic used by cybercriminals to manipulate individuals into divulging sensitive information or performing actions that compromise security. To protect themselves, organizations and individuals should be aware of the tactics used by cybercriminals, provide regular training on how to identify and respond to social engineering attacks, and be vigilant about their personal information. By understanding the psychology of social engineering, organizations and individuals can better protect themselves from these types of cyber attacks.


How to remove OEMDRV partition from Dell servers (OS Development Drive Volumes)

OEMDRV is Default OS Development Drive created by lifecycle controller of Dell Servers and contains the drivers used while installing the server.

Remove OEMDRV partition in Dell Servers

In our case OEMDRV was E: and we wanted to use that drive letter to install some of our softwares, we were also unable change the drive letter or eject/delete it using disk management though the drive gets automatically removed after 18 hours and we did not wanted to wait that long in order to complete the server setup at the earliest..

But there is another way to force remove the volume, simply enter and exit the lifecycle controller during boot.

Restart the server and Press F10 to enter lifecycle controller during the time of boot and simply exit it (no need to change any settings).

This will remove the OEMDRV partition.

Enjoy 🙂


Error: There is a job printing now (35)

This error causes you not to install/print and occurs because there are already print jobs available in the system.

Step 1. Browse to Start type CMD (Run as administrator)

Step 2. Type “net stop spooler” and press Enter

Step 3. Go to C Drive browse to the folder C:WindowsSystem32spoolPRINTERS

Step 4. Delete .SPL and .SHD in the folder

Step 4. Type “net start spooler” and press Enter

Done Enjoy


Wednesday, February 1, 2023

The Limitations of ChatGPT: Understanding the Boundaries of AI Language Models

As AI language models like ChatGPT continue to evolve and advance, they have become increasingly powerful tools for generating human-like text. However, it is important to understand the limitations of these models so that we can effectively use and interpret their outputs.

One of the key limitations of ChatGPT is that it is a statistical model trained on a massive corpus of text data, which means it is limited by the biases and inaccuracies in that data. For example, if the data it was trained on contains sexist or racist language, the model may generate similar outputs.

Another limitation is that ChatGPT does not have the ability to understand context in the same way that a human would. This means that it may generate nonsensical or irrelevant responses if the context is unclear or if it is asked a question outside of its training data.

ChatGPT also lacks common sense knowledge and creativity, which are important for generating more nuanced and original responses. It is also not capable of introspection or self-awareness, meaning it cannot reflect on its own limitations or understand its own outputs.

Finally, ChatGPT is not capable of handling sensitive or confidential information, as it has no way of knowing whether certain information should be kept private. This is an important consideration when using language models for applications such as customer support or content creation.

In conclusion, while ChatGPT is a powerful tool for generating human-like text, it is important to understand its limitations so that we can effectively use and interpret its outputs. As AI technology continues to advance, it will be important to address these limitations to ensure that AI language models are safe, ethical, and trustworthy.

Click here to read more about ChatGPT


The Rise of Infosys: A Look at India's Global IT Giant

Infosys, a global leader in consulting, technology, and next-generation services, is a name synonymous with innovation and excellence. Founded in 1981, this Indian multinational corporation has come a long way, becoming one of the most significant players in the technology industry. In this blog, we will take a closer look at the rise of Infosys, exploring its journey from a startup to a global IT giant.

From Humble Beginnings

Infosys was founded by seven engineers in Pune, India, with a goal of providing software solutions to businesses worldwide. The company was initially focused on offering software development services, but over the years, it has expanded into areas such as digital transformation, artificial intelligence, and cloud computing.

In the early years, Infosys was primarily focused on serving clients in the United States, which was a crucial market for the company’s growth. With the rise of the internet, Infosys saw a significant increase in demand for its services, leading to rapid expansion and a growing global presence.

From Outsourcing to Innovation

Infosys was once considered a pioneer in outsourcing, providing low-cost IT services to companies around the world. However, over time, the company has transformed into a leader in innovation and digital transformation. Infosys now provides cutting-edge services to help businesses stay ahead of the curve, leveraging the latest technology trends to drive growth and success.

The company has invested heavily in innovation, launching numerous initiatives to drive research and development. Infosys’ investment in AI, machine learning, and cloud computing has helped it to stay ahead of the curve, positioning itself as a leading provider of these services to businesses worldwide.

A Global Player

Today, Infosys has a presence in over 50 countries, serving clients across a range of industries, including banking, insurance, retail, and healthcare. The company has a workforce of over 200,000 employees, with a large number of its employees located in India.

Infosys has a strong reputation as a responsible corporate citizen, with a focus on sustainability and ethical practices. The company has been recognized for its efforts in this area, including being listed on the Dow Jones Sustainability Index for several years in a row.


The rise of Infosys is a testament to the power of innovation and hard work. From its humble beginnings as a software development company, Infosys has become a global IT giant, providing cutting-edge services to businesses worldwide. The company’s investment in research and development has positioned it as a leader in digital transformation, and its focus on sustainability and ethical practices has earned it a strong reputation as a responsible corporate citizen. Whether you’re looking for software solutions or innovative digital services, Infosys is a name you can trust to drive your business forward.


About US is a technology blog maintained and run by Eniac Technology. At Eniac we provide Information Technology services.
Powered by Blogger.

Search This Blog