Tuesday, 11 February 2014

Are you guys getting bored from your Old Whatsapp which give you simple as it is theme from day one & same emotions?  Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ...
What To Do When Error Like In Feed Burner : " Your feed file size is larger than 576K. You need to reduce its size in order for Feed Burner to process it"  Tips for controlling feed file size with Blogger can be found in Tech Tips on FeedBurner Forums, our support site." This happens when original feed from your blog if it is greater than 576K in size How to solve  this? Sign in to your FeedBurner account. At the dashboard, click on the feed in which you are facing problem. Now click on "Edit feed details" just below your...
Overview of Active Directory Domain Services Active Directory Domain Services (AD DS) is a directory service from Microsoft that stores information about different network objects , such as printers ,databases and users at a centralized location and makes this information available to all the users of the network. For example :  AD DS stores data related to different user accounts , such as ids , passwords and email ids at a central location and provides secure access of these information to the authorized users. I am going...
Domain Controller Installation - Step by Step Once you install the AD DS role , the files required to perform the role are installed on the server .However, in this case, the server is still not promoted to a DC, You must therefore promote the server to act as a DC by launching the Active Directory Domain Services Installed Wizard by using the dcpromo.exe command.Lets perform the following steps to promote the server to a DC and create a abc.com forest :1. Click Start --> Run . The Run dialog box opens. 2. Type the dcpromo.exe command...

Server 2008 vs Server 2012

Posted by Unknown | 14:08 Categories: , ,
Server 2008 vs Server 2012 Server 2008 Features :  Virtualization Server core IIS Role Based Installation Read Only Domain Controller - RODC Enhanced Terminal Services Network Access Protection Bit locker Windows Power Shell Better Security Cache / Proxy Management Server core Installation Server 2012 Features : IIS 8 Power shell 3.0 Direct access Cluster Shared Volumes De-duplication Hyper-V 3.0 Hyper-V Replica iSCSI NFS 4.1 SMB 3.0 ...
pfsense - An Open Source Firewall pfsense is a free, open source customized distribution of FreeBSD, as a software firewall it is powerful and flexible.the current version pfsense 2.0 includes most all the features in expensive commercial firewalls, and more in many cases.The following is a list of pfsense 2.0 features. The main advantage of pfsense is we do not need to touch anything at the command line. -Firewall- NAT (Network Address Translation)- State Table- Redundancy- Load Balancing- VPN (Virtual Private Network)- Reporting...

The List of DNS record types

Posted by Unknown | 14:06 Categories: , ,
The List of DNS record types      The Records or Information held by Primary zone, Secondary zone and Stub zone are of various types. Some of the commonly-used record types are : Alias (CNAME) :     Refers to domain name aliases, that is , creating an alternate record or DNS name for the name already specified as another type in a particular zone. It is normally found with computers on the Internet perform multiple tasks, such as Web server and Chat server. Under such a situation, the CNAME records...
Understand Full and Incremental Backup      Backup ensures that the data of an organization is protected or can be recovered under the following circumstances :      Hardware failure      Accidental deletion or modification of data      Restoration of the old version of a file      Unauthorized deletion or modification of data Below I mentioned...
Full Server Backup - Using WBADMIN command             Windows Server 2008 also provides the wbadmin command utility to create system state backup. Perform the following steps for the system state data backup by using the webadmin command :             -  Click the Start button and then right-click Command Promt and select the Run as administrator option.    The Administrator: Command Promt appears.           ...
RAID Levels - Easy to Understand              RAID in Windows 2008 is implemented not only for fault tolerance but also for improving the performance. It is a technology that provides storage functions and reliability through redundancy. Therefore, you can define RAID as group of technologies that use multiple drives, in multiple  configurations, to store redundant data.  In Windows Server 2008 , two types of RAID are implemented:                         ...
How well do you know VOIP Protocols ?     In computing , a protocol is a set of rules used by computers to communicate with each other across a network. It sets a standard that controls or enables the connection, communication and data transfer between computing endpoints.   For example, HTTP and HTTPS are protocols used for communications over the Internet.  Similarly, VOIP also communicates using standard protocols and they are;   H.323 Protocols :        H.323 is an umbrella...
Difference between POP and IMAP Post Office Protocol (POP): - Best of you use only one computer to check email (Office users) - Downloads your email to the particular computer you are checking it on. - Allows you to keep a large size of email messages only limited by the size of your computer. - Does not have web interface - New messages are downloaded in their entirety ; you have to wait for the message to download. - Clients connect to email server only for the time it takes to download any new messages.  -...
Concept of Routing Table for Beginners         Routers maintain routing tables that provide information about the path from router to the destination.In Windows Operating system, there are two commands available that allow you to view the routing table.                - NETSTAT -  Allows the users to check the network configuration. It is to display protocol statistics and current TCP/IP network connections.There are several switches associated with this command.  ...
Routing Protocols with the help of Diagram  Routers communicates with each other using Routing protocols. The protocols help routers to learn the network topology and changes that occur in the network topology . routing protocols use routing algorithms to decide the best output path for the received packet. Routing algorithm is a part of network layer software and should be correct, stable and simple. It should decide the perfect path...
  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube