programming4us
         
 
 
Windows Server
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 >  |  Displaying page 4 of 12, items 91 to 120 of 340.
Windows Home Server 2011 : Understanding Security Groups & Adding a New User
You can’t access Windows Home Server shares until you configure Windows Home Server with a user account that has the same logon name as a user account on the client computer.
Setting Up Your Windows Home Server 2011 Network : Handling Multiple Network Subnets & Making a Remote Desktop Connection to the Server
Windows Home Server’s Remote Desktop feature enables you to connect to the server from a workgroup computer and use the server’s desktop just as though you were sitting in front of it.
Windows Small Business Server 2011 : A Networking Primer - Ethernet/IEEE 802.3 & TCP/IP Basics
The Ethernet protocol is responsible for the basic communication between computers on the same network. In a typical local area network (LAN), the Ethernet implementation takes the form of the network interface adapters in the computers and the device drivers that enable the computers to use the adapters.
Windows Small Business Server 2011 : A Networking Primer - Networking Hardware
The physical layer of the OSI model defines the hardware that connects the computers on the network. Traditionally, the physical layer refers to network cables that carry signals using copper conductors or fiber optic threads, but today, wireless networking is an equally viable medium for the small-business network.
Windows Server 2008 Server Core : Installing Applications with the MSIExec Utility
The application setup package must appear in a form that MSIExec can understand, which is normally a file with a Microsoft Installer (MSI) extension, although you'll see these files with an EXE extension as well.
Windows Server 2008 Server Core : Getting System Configuration Information with the SystemInfo Utility
The SystemInfo utility lets you query the system for configuration information. The purpose of this utility is to provide a quick overview of the system configuration, not the detailed information that other utilities, such as MSInfo32 provide.
Setting Up Your Windows Home Server 2011 Network : Troubleshooting Network Problems (part 2)
If a device is flagged on your system but you don’t notice problems, you can usually get away with just ignoring the flag. I’ve seen lots of systems that run perfectly well with flagged devices, so this falls under the “If it ain’t broke...” school of troubleshooting.
Setting Up Your Windows Home Server 2011 Network : Troubleshooting Network Problems (part 1)
On most Windows Home Server networks, the Received value is significantly higher than the Sent value at first because you’re sending lots of data to the server. After a while, however, the two values should be fairly balanced, with one or the other being perhaps 10–40% higher than the other.
Windows Server 2008 : Working with Event Subscriptions - Managing Subscriptions with wecutil & Logging Events with eventcreate
In the context of event logs, there might be times when you want to log specific information into either the Windows Server 2008 Application or System logs.
Windows Server 2003 : Managing Security Configuration with Security Templates (part 2)
The Export Template feature creates a new template from the current database settings at the time you execute the command, not from the computer’s current settings.
Windows Server 2003 : Managing Security Configuration with Security Templates (part 1)
Windows Server 2003 includes another mechanism for deploying security configuration settings called security templates. A security template is a collection of configuration settings stored as a text file with the .inf extension.
Setting Up Your Windows Home Server 2011 Network : Configuring Windows Home Server for Networking
Windows Home Server’s default networking setup creates a basic configuration that should work without a hitch on most home networks.
Introducing Windows Small Business Server 2011: Why Use Windows SBS 2011?
Another big problem for the small business owner is information technology (IT) staffing. Many small businesses cannot justify the expense of full-time IT employees, which leaves them two alternatives: train someone in the organization to manage the network part-time or hire a freelance consultant as needed.
Introducing Windows Small Business Server 2011: What is Included with Windows SBS 2011?
Windows SBS includes a number of Microsoft server applications; some are retail products, and others are available as free downloads. Even in the case of a free product, however, you benefit by obtaining it with Windows SBS in several ways, including ease of installation and automated configuration.
Windows Server 2003 Security Configuration (part 2) - Creating Role-Specific Server Configurations
The Windows Server 2003 default configuration is far more secure than those of previous versions of the Microsoft Windows operating system, but there are still security settings you should consider modifying from their defaults.
Windows Server 2003 Security Configuration (part 1) - Windows Server 2003 Security Settings
Windows Server 2003 is configured, by default, to perform a variety of roles for any given enterprise. Chances are, however, that you will be applying a server to one specific role or a small number of roles.
Windows Server 2008 Server Core : Accessing the WinPE Network Installer with the NetCfg Utility
You must pass the arguments in the order shown in the syntax or the command may fail. It's always a good idea to use the order shown in the syntax examples, but when using the NetCfg utility the order is essential.
Windows Server 2008 Server Core : Managing the Boot Configuration with the BCDEdit Command
The Boot Configuration Data Store Editor (BCDEdit) command is a powerful replacement for the BootCfg utility provided with previous versions of Windows.
Windows Server 2008 : Enabling and Testing Event Subscriptions
The following table shows the steps to enable and test event subscriptions. These steps are performed on two domain controllers (DC1 and DC2). DC2 (as the source computer) forwards Active Directory Replication and other events to DC1 (as the collector).
Windows Server 2008 : Adding an Account to the Event Log Readers Group
When creating event subscriptions, you must use an account that has access to the event logs on all your source computers, and it’s best not to use the administrator account.
Windows Server 2008 : Enabling the Source Computer with winrm & Enabling the Collector Computer with wecutil
Services configured with a startup mode of Delay-Start starts when the system boots, but only after all the services set to Automatic start.
Windows Server 2008 : Using Virtualization to Increase Productivity and Facilitate Consolidation
One of the most popular methods for storing both data and virtual operating systems is iSCSI. A relative new kid on the block, Internet Small Computer Systems Interface (iSCSI) is very popular for virtualization solutions because iSCSI devices can be installed via TCP/IP protocols and receive standard SCSI commands.
Windows Server 2008 : Using Virtualization to Increase Productivity and Facilitate Consolidation - Installing Hyper-V
The VMC in Windows Server 2008 is called the Hyper-V Manager. Using the Hyper-V Manager, you're allowed access to the central brains of the hypervised machines.
Windows Server 2008 : Using Virtualization to Increase Productivity and Facilitate Consolidation - Introducing Virtualization & Server Consolidation
Hyper-V is a new tool, available with Windows Server 2008 Standard, Enterprise, and Datacenter x64-bit builds, that is designed to support individualized virtualization of different platforms on a single Windows Server 2008 server workstation
Windows Server 2003 : Configuring IAS for Use with VLANs
Wireless network access can be secured using Wi-Fi Protected Access (WPA) as defined in the IEEE 802.11i standard and/or using IEE 802.1x authentication.
Windows Server 2003 : Configuring IAS for Use with VLANs
Virtual Local Area Networks (VLANs) allow logical groupings of network resources that may exist in different physical locations or on different physical subnets
Windows Server 2003 : Using IAS to Protect the Network from Bad Computers
When network access quarantine control was first announced, many people asked if it could be used for restricting access to the LAN by inspecting each new connection attempt.
Windows Server 2003 : Centralizing Authentication and Authorization with Internet Authentication Server - Configuring IAS as a RADIUS Proxy
RADIUS servers can themselves act as RADIUS clients and forward authentication and/or authorization request to another RADIUS server. For example, an ISP may use a RADIUS server to protect access to its network
Windows Server 2003 : Centralizing Authentication and Authorization with Internet Authentication Server - Installing and Configuring IAS
An IAS server does not have to be a member of an AD domain, but if it is, it can be used in more RADIUS deployment scenarios. If IAS is not a domain member, the local user database is used for authenticating users. If IAS is a domain member, AD is used.
Windows Server 2003 : Centralizing Authentication and Authorization with Internet Authentication Server - The RADIUS Protocol
Microsoft's Internet Authentication Service (IAS) supports the RADIUS protocol as defined in RFC 2865, Remote Authentication Dial-in User Service (RADIUS), and RFC 2866, RADIUS Accounting.
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us
Video Tutorail Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Celebrity Style, Fashion Trends, Beauty and Makeup Tips.