Posts

Showing posts from November, 2015

Routed Vs Routing protocol

Routed Protocols vs. Routing Protocols In this article we will cover the difference between Routed Protocols and Routing Protocols. This is one of the thing that can be asked of you if you are attending a job interview or if you are going to CCNA exam so, you must know the difference between a “routed” protocol and a “routing protocol” as one of the key concepts in the Routing world and networking world. A  routed protocol  is a protocol by which data can be routed. Routed protocol are IP, AppleTalk, and IPX. In this kind of protocols we require an addressing scheme and subneting. Addressing scheme will be used to determine the network to which a host belongs and to identifying that host on that particular network. All hosts on an internetwork are using the services of a routed protocol. That means routers, servers, but workstations to. The only two routed protocols that are in use today are IP and IPX but IPX is dropped from Cisco in exams and is not in use much these days. If you

MCSE interview questions....

1. What is the location of the Active Directory database? A:   The AD database is stored on domain controllers and can be accessed by network applications. All domains can be domain controllers and have a copy of the AD database. 2. What’s the essence of application partitions? A:   The application partitions are a part of the Active Directory system and having said so, they are directory partitions which are replicated to domain controllers. Usually, domain controllers that are included in the process of directory partitions hold a replica of that directory partition. The attributes and values of application partitions is that you can replicated them to any specific domain controller in a forest, meaning that it could lessen replication traffic. While the domain directory partitions transfer all their data to all of the domains, the application partitions can focus on only one in the domain area. This makes application partitions redundant and more available. 3. What is a Gl

Difference between OU and group

Organization unit : OU can be used to segregate/filter department bases on the region or type of users/groups/computers.  OU - Structures are included to make Administrator job easy. For eg- You have 2 office 1. Main office 2. Branch office , You want to separte users and computer accounts for respective location so that you can go ahead and manage them easily , then you need to create OU structure in AD and move the user accounts or computer acccounts respectively according to your need. Groups : Groups can be used to group to be able to apply permission instead of doing it one by one. Its easy to manage group then individual. Consider, you need to add 1000 users in a folder but instead of adding one by one, you can add a security group & later on you can modify group to add or remove users instead of going to folder & adding or removing it manually.

How to manage OU in Server 2012

Image
1st step : Go to server manager than tools and click on AD user and computer 2nd step : bellow 3rd step : Give name for OU complete enjoy 

Changing password default policy in server 2012

Image
1st step : Go to server manager  2nd step : Go to tools and select Group policy management. 3rd : Right click on default policy and click edit 4th step : then follow setup in the bellow fig and edit security setting                                                          5th step : then go to account policy 6th step : then password policy  7th step : Now do your required configuration  In last to apply the policy us gpupdate Enjoy 

How to Remove Shortcut Virus on Your Computer or Flashdisk

Image
How to Remove Shortcut Virus on PC or FD When you open your Flash Drive or External Hard Drive in a PC, you will see all of your files and folders looks like shortcuts. They have changed to shortcuts. Sometimes this happens only to folders. Their name is OK, but all the icons have shortcut arrow. If you try to open a  file  or folder (just double click) nothing will happen. Very easily  you can solve this shortcut virus problem. You can recover your all data back because they are still there. Your data is not deleted, not damaged, they have converted to hidden data by a Virus. 1.  Download  the Shortcut  Virus Remover   setup file 2.  Install  the Shortcut Virus Remover to your Flash Drive 3. Run the  application  (Double click Shortcut Virus Remover .bat)                  This is a 100% free software (Open-Source). If you know something about Ms-Dos, you will see, this is a Batch file . A collection of Dos commands Source: http://www.svrtool.webs.com/

Important Interview questions ...

Q1. What is public IP address? Ans. A public IP address is an address leased from an ISP that allows or enables direct Internet communication. Q2. What's the benefit of subnetting? Ans. Reduce the size of the routing tables. Reduce network traffic. Broadcast traffic can be isolated within a single logical network.Provide a way to secure network traffic by isolating it from the rest of the network. Q3. What are the differences between static IP addressing and dynamic IP addressing? Ans. With static IP addressing, a computer (or other device) is configured to always use the same IP address. With dynamic addressing, the IP address can change periodically and is managed by a centralized network service Q4. What is APIPA? Ans. Automatic private IP addressing (APIPA) is a feature mainly found in Microsoft operating systems. APIPA enables clients to still communicate with other computers on the same network segment until an IP address can be obtained from a DHCP server, allowing t

How to Fix the “Windows Was Unable to Complete the Format” Error

Image
Discussion in ' How-To Articles, Tips and Guides ' started by  Littlebits ,  Jun 10, 2014 . In the majority of cases, the error that you get says that “Windows was unable to complete the format” which more or less leaves you without too many options because it simply doesn't reveal too much about what went wrong when trying to format the USB stick. Basically, there are three simple ways to deal with this error, all of which are detailed below. METHOD 1 – Windows Disk Management Although it provides you with this error message, Windows has what it takes to successfully format the USB flash pen and thus fix the issue. All you need to do is to follow this path Control Panel > Performance and Maintenance > Administrative Tools > Computer Management > Disk Management or simply right-click the “My Computer” icon on the desktop and hit the “Manage” option. Click on “Disk management” and you reach the exact same menu. In this screen, l

Active Directory Domain Services Server r2 2012 By Mahboob ur rahman

Purpose Active Directory Domain Services provide secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services. Active Directory Domain Services provide support for locating and working with these objects . › By using the Active Directory® Domain Services (AD DS) server role, you can create a scalable, secure, and manageable infrastructure for user and resource management, and you can provide support for directory-enabled applications, such as Microsoft® Exchange Server. What is the AD DS server role ? AD DS provides a distributed database that stores and manages information about network resources and application-specific data from directory-enabled applications. Administrators can use AD DS to organize elements of a network, such as users, computers, and other devices, into a hierarchical containment structure. The hierarchical containment structure includes the Active Directory forest, domains in the forest,