Categories
- All Posts
- android
- AntiVirus
- apps
- AWS
- Backup
- Batch
- Blogger
- Books
- CISCO
- Cloud
- Cluster
- Coin Master
- commands
- Commvault
- Configurations
- CSS
- Data Protector
- Data Recovery
- DB Backup
- Desktop Sharing
- Disabling
- domain
- Downloads
- Dumps
- ESX
- exam questions
- Excel
- Exchange
- FOLDER LOCK
- free Books
- games
- Guide
- Hacks
- HP - UX
- HP0-A113
- HP0-A113 HP ATP - Data Protector v9 (Exam 1 Questions) - Question 9
- HTML
- Hyper-V
- information
- Internet
- interview questions
- inventory
- jQuery
- key
- Links
- Linux or Unix
- Mcafee
- microsoft
- Migrations
- mobile tips
- NetBackup
- Networker
- Networking
- Online Database
- Operating system
- Outlook
- Password reset
- PHP
- Ports
- RAID
- regedit-tips
- Registry
- SAN
- SBS 2008
- Simulator
- software
- SQL
- Storage
- Study Meterial
- tech support
- Tools
- Top List
- Troble Shooting
- Useful commands
- vbscript
- Veeam
- Videos
- Virtual Machine
- VirtualBox
- VMWare
- VSphere
- webinar
- windows
- windows 10
- Windows 2003
- Windows 2008
- Windows 7
- Windows 8
- Windows Tips
- windows XP
- YouTube
Contact
Friday, March 4, 2011
Thursday, February 10, 2011
windows admin
I can not find where to run Skype as an admin: Windows 7? - Yahoo ...
Last post: Feb 8, 2011
turn UAC off and you will never need the "run as admin" stuff anymore. ...
<http://answers.yahoo.com/question/index?qid=20110208174829AAMHf5w>
How to enable or disable the admin account in Windows 7 - Security ...
4 posts - 4 authors - Last post: Feb 8, 2011
Forum discussion: Windows comes with a built-in administrator account, but
in Windows 7 that account is hidden by default.
<http://www.dslreports.com/forum/r25443100-How-to-enable-or-disable-the-admin-account-in-Windows-7~start=40>
How do you give AD users the ability to install programs without ...
3 posts - 2 authors - Last post: Feb 8, 2011
If I add the user to the Domain Admin groups, then they are able ... Local
administrator should be all that's needed to install software in ...
<http://social.technet.microsoft.com/Forums/en-US/winserverDS/thread/4d625983-9859-4e86-8760-0a08aa17c25c/>
Q&A: how do speed up client login time to a windows server 2003 ...
4 posts - 3 authors - Last post: Feb 8, 2011
TR Dojo: Four netstat tricks every Windows admin should know VIDEO (4 of
14) TR Dojo: Four netstat tricks every Windows. ...
<http://www.techrepublic.com/forum/questions/101-206110>
Missing security tab - Security-Admin - Windows-XP
4 posts - 3 authors - Last post: Feb 8, 2011
Hello, when I right-click on the printer, then click on properties their is
no security tab.
<http://www.tomshardware.com/forum/255581-45-missing-security>
Forgot our administrator password - Tech Support Guy Forums
Last post: Feb 8, 2011
Feb 8, 2011 ... I know, its a rookie move. We had our roommate reload
windows and all our software. We can't remember what he entered as the
administrator ...
<http://forums.techguy.org/windows-xp/979696-forgot-our-administrator-password.html>
Windows Forums • View topic - What Did Your Mouse Just do for the ...
10 posts - 4 authors - Last post: Feb 8, 2011
User avatar. Site Admin. Site Admin. Windows Guru. Windows Guru ... User
avatar. Site Admin. Site Admin. Windows Guru. Windows Guru ...
<http://forum.mintywhite.com/viewtopic.php?t=3585&p=23676&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+WindowsForums+(Windows+Forums+Latest+Topics)>
Tenable Network Security: Nessus 4.4.0 on Windows Server 2008 -...
10 posts - 3 authors - Last post: Feb 8, 2011
Nessus 4.4.0 on Windows Server 2008 - nessus-adduser fails w/
"Administrator" error. Trying to run nessus-adduser as a user that is part
of ...
<https://discussions.nessus.org/message/9334;jsessionid=622AB7C0B22F2B3468BF0BA77BCF3D9F>
Saturday, February 5, 2011
Net security opening
- Working knowledge in Nokia Firewall with Checkpoint firewall R70
- IBM Site Protector (IDS/IPS knowledge)
- For Vulnerability assessment and analysis. (ISS, Nessus, GFILanguard)
- Patch management Like Big fix, LANDesk etc...
- Antivirus (Preferably MacAfee)
- Packet Analysis. (Sniffer, Wire shark, Ethereal)
Please send in your updated CV with current and expected CTC mentioned on it.
Sameer K
Consultant
Shonel Services
Cell - 9820502077 / 9820880702
Friday, February 4, 2011
Tech Support Engg at HP
HI,
Greetings from HP,
HP is hiring Tech Support Engineers for 3par at Bangalore Location,
Key Attributes
â€Â¢ Must possess excellent Communication skills - professional, clear, and articulate in English(oral/written)
â€Â¢ Have the courage to challenge processes and practices in our strive for continual improvement
â€Â¢ Be able to follow processes as outlined in the Support Process Guidelines.
â€Â¢ Interact closely with Peers, next-level team members and Managers to resolve customer issues.
â€Â¢ Exhibit a positive attitude to customers and other employees.
â€Â¢ Be able to demonstrate empathy and understanding.
â€Â¢ Continue to upgrade technical and customer service skills.
â€Â¢ Participate in shift work as required
â€Â¢ Ability to remain calm whilst under pressure
Requirements:
â€Â¢ BS in CS/EE degree or equivalent related technical school or related experience.
â€Â¢ 2-6 years of relevant experience in the high-tech industry, preferably within the enterprise Storage /networking arena
â€Â¢ General / high level knowledge of Unix Systems (Solaris, HP, AIX, LinuxWindows and VMware
â€Â¢ General / high level of knowledge supporting complex Enterprise Storage systems and Storage Area Networks.
â€Â¢ Experience in SAN Switch/Fabric: Core Edge Topology, Fiber Channel Routing and Protocol Virtual SANs, LUN Exports, host bus adapters, Storage management; NAS, and Enterprise storage systems (troubleshooting, updating, and maintaining H/W).
â€Â¢ Must have demonstrated ability to take initiative in identifying and successfully resolving technical problems at customer sites via phone and email.
â€Â¢ As an individual in this position, you must have strong communication skills, both verbal and written; be able to develop and document technical and operational notes; effectively communicate with end-customers and internally when resolving customer problems or escalating cases.
â€Â¢ Proven troubleshooting ability to perform end-to-end (host to storage) diagnosis of complex large scale enterprise SAN configurations in a multivendor environment.
â€Â¢ Experience with enterprise storage systems and networking technologies
â€Â¢ Ability to work with customers under a variety of circumstances and understandimg and meeting customer expectations is fundamental.
If you find the JD relevant Kindly revert back with an updated resume at the earliest'
Regards,
Vasudha Patil
Hiring Security Analyst Professionals in TCS MUMBAI - Work Location : Delhi
Hi Friend, We have openings in Tata Consultancy Services (TCS) Delhi for the following skill. Face-to-Face interviews will be held on 5/6 -Feb-11 Security Analyst professionals - 3+ yrs. Responsibilities: • Maintain security administration on Medco Systems: SecureId, RACF, Oracle, Sybase, UNIX, Alpha, eSD, Autofax, DB2, JDE, TIM - User ID password administration - Account creation, deletions and modifications - Security access administration - User ID password resets • Maintain updated security documentation • Support all audit initiatives • Report systems and security issues to management • Provide resolution and support for all day to day responsibilities IF YOU MEET THE ELIGIBILITY CRITERIA PLEASE WALK IN Dateâ€" 5th Feb 2011 (Saturday) Venue- Gateway Park Akruti Business Port, Gateway Park, Road NO. 13, MIDC, Andheri Mumbai 400 093 Registration Time: 10.00 am to 12.30 pm Dateâ€" 6th Feb 2011 (Sunday) Venue- Vikroli office Empire Plaza, Empire Industrial Estate, (Adjacent to Empire Vitrum Glass), 101 LBS Marg, Vikhroli (West), Mumbai 400 083 Registration Time: 10.00 am to 12.30 pm If any of your friends/colleagues are looking for opportunities, please pass this msg. Pls carry along the following with you: -Printed copy of TCS Online form -A copy of your latest resume. -A copy of your last salary slip. Salary: Best in the Industry Please ignore this mail if you have been INTERVIEWED by TCS in last 6 months Eligibility : B.E. / B.Tech / M.E. / M.Tech / MSc / MCA / MCM / MS/ MBA (IT Systems) PGDIT (2 years full time Approved by AICTE) B.Sc. / BCA/ B.Com /Diploma holders with 3 years of relevant functional / technical experience. 50% consistent academic records including the Qualifying exam Correspondence/Part time courses will not be considered Candidates who have attended TCS interviews in the last 6 months need not apply. Contact Person: Warm Regards Jasleen |
REVISED CCNA COURSE CONTENTS
REVISED CCNA COURSE CONTENTS
NAT : NETWORK ADDRESS TRANSLATION
Functional Levels Server 2008
Functional Levels Server 2008
The features available in a Windows Server 2008 domain depend on the functional level. Therefore, you can add additional features to a domain by raising the functional level. Windows Server 2008 supports three different domain functional levels. The three domain functional levels are:
* Windows 2000
* Windows Server 2003
* Windows Server 2008
Windows 2000
When you configure a new Windows Server 2003 domain, the default domain functional level is Windows 2000. This functional level supports Windows 2000, 2003 and 2008 domain controllers. Other available features include universal groups, group nesting, group conversions and security identifier history.
Windows Server 2003
The second domain functional level is Windows Server 2003. Upgrading to this domain functional level provides support for Windows Server 2003 and 2008 domain controllers. You get all the features under the Windows 2000 functional level and additional ones that include:
* Netdom.exe management tool
* Logon time stamp dates
* Ability to redirect Users and Computers container
* Ability for Authorization Manager to store its authorization policies in AD DS
* Constrained delegation
* Selective delegation
Windows Server 2008
The third domain functional level is Windows Server 2008. This domain functional level only provides support for Windows Server 2008 domain controllers. If you want to take advantage of all the features included with Windows Server 2008, you must implement this functional level. Along with the features introduced at the previous levels, you can also take advantage of the following:
* Distributed File System
* Advanced Encryption Standard support for the Kerberos protocol
* Last Interactive Logon Information
* Fine-grained password policies
Functional levels determine the features that are available and the domain controllers that are supported. In a previous article, you learned about the three domain functional levels that are supported under Windows Server 2008. There are also functional levels at the forest level.
Windows Server 2008 supports the following three forest functional levels:
* Windows 2000 Native
* Windows Server 2003 Interim
* Windows Server 2003
Windows 2000 Native
Windows 2000 native is the default forest functional level. It provides support for Windows 2000, 2003 and 2008 domain controllers. This functional level support all of the default AD DS features.
Windows Server 2003
This forest functional level supports Windows Server 2003 and 2008 domain controllers. Along with the default features, the following features are introduced at this level:
* Forest trust
* Domain rename
* Linked-value replication
* Read-only domain controller
* Improved Knowledge Consistency Checker
* Ability to create the dynamic auxiliary class named dynamicObject
* Ability to create instances on new group types to support role-based
authorization.
* Deactivation and redefinition of attributes and classes in the schema
Windows Server 2008
The third forest functional level is Windows Server 2008. As the name implies, only domain controllers running Windows Server 2008 are supported. No additional features are introduced at this level.
Tuesday, January 11, 2011
25. Name some OU design considerations.
24. What tool would I use to try to grab security related packets from the wire?
A good packet sniffer would be "ethereal"
23. Can I get user passwords from the AD database?
22. How can you forcibly remove AD from a server, and what do you do later?
21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link?
First available in Windows 2003, you will create a copy of the system state from an existing DC and copy it to the new remote server. Run "Dcpromo /adv". You will be prompted for the location of the system state files
20. What are the requirements for installing AD on a new server?
19. What is the ISTG? Who has that role by default?
By Default the first Server has this role. If that server can no longer preform this role then the next server with the highest GUID then takes over the role of ISTG.
Windows 2000 Domain controllers each create Active Directory Replication connection objects representing inbound replication from intra-site replication partners. For inter-site replication, one domain controller per site has the responsibility of evaluating the inter-site replication topology and creating Active Directory Replication Connection objects for appropriate bridgehead servers within its site. The domain controller in each site that owns this role is referred to as the Inter-Site Topology Generator (ISTG).
18. What is the KCC?
KCC is Knowledge Consistency Checker, which creates the connection object that links the DCs into common replication topology and dictates the replication routes between one DC to another in Active Directory forest.
17. What’s the difference between a site link’s schedule and interval?
Any time two networks are separated by links that are heavily used during parts of the day and are idle during other parts of the day, put those networks into separate sites. You can use the ability to schedule replication between sites to prevent replication traffic from competing with other traffic during high usage hours.
In simple words you can define it as the time when you allow the replication to happen.
Interval is also a part of schedule but it takes cares of the replication polling frequency. In other words in a said schedule of say 9:00 AM to 1 PM replication polling shuld occur in every 15 minutes.
Schedule here is 9:00 AM to 1 PM
Interval is every 15 minutes.
Friday, December 24, 2010
16. What are sites? What are they used for?
Sites in Active Directory represent the physical structure, or topology, of your network. Active Directory uses topology information, stored as site and site link objects in the directory, to build the most efficient replication topology. You use Active Directory Sites and Services to define sites and site links. A site is a set of well-connected subnets. Sites differ from domains; sites represent the physical structure of your network, while domains represent the logical structure of your organization.
Read More: http://technet.microsoft.com/en-us/library/cc782048%28WS.10%29.aspx
15. What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN?
The Lightweight Directory Access Protocol, or LDAP is an application protocol for querying and modifying directory services running over TCP/IP.[1]
A directory is a set of objects with attributes organized in a logical and hierarchical manner. The most common example is the telephone directory, which consists of a series of names (either of persons or organizations) organized alphabetically, with each name having an address and phone number attached.
An LDAP directory tree often reflects various political, geographic, and/or organizational boundaries, depending on the model chosen. LDAP deployments today tend to use Domain name system (DNS) names for structuring the topmost levels of the hierarchy. Deeper inside the directory might appear entries representing people, organizational units, printers, documents, groups of people or anything else that represents a given tree entry (or multiple entries).
Its current version is LDAPv3, which is specified in a series of Internet Engineering Task Force (IETF) Standard Track Requests for comments (RFCs) as detailed in RFC 4510.
LDAP means Light-Weight Directory Access Protocol. It determines how an object in an Active directory should be named. LDAP (Lightweight Directory Access Protocol) is a proposed open standard for accessing global or local directory services over a network and/or the Internet. A directory, in this sense, is very much like a phone book. LDAP can handle other information, but at present it is typically used to associate names with phone numbers and email addresses. LDAP directories are designed to support a high volume of queries, but the data stored in the directory does not change very often. It works on port no. 389. LDAP is sometimes known as X.500 Lite. X.500 is an international standard for directories and full-featured, but it is also complex, requiring a lot of computing resources and the full OSI stack. LDAP, in contrast, can run easily on a PC and over TCP/IP. LDAP can access X.500 directories but does not support every capability of X.500
What is REPLMON?
A: Replmon is the first tool you should use when troubleshooting Active Directory replication issues. As it is a graphical tool, replication issues are easy to see and somewhat easier to diagnose than using its command line counterparts. The purpose of this document is to guide you in how to use it, list some common replication errors and show some examples of when replication issues can stop other network installation actions.
for more go to http://www.techtutorials.net/articles/replmon_howto_a.html
What is ADSIEDIT?
A: ADSIEdit is a Microsoft Management Console (MMC) snap-in that acts as a low-level editor for Active Directory. It is a Graphical User Interface (GUI) tool. Network administrators can use it for common administrative tasks such as adding, deleting, and moving objects with a directory service. The attributes for each object can be edited or deleted by using this tool. ADSIEdit uses the ADSI application programming interfaces (APIs) to access Active Directory. The following are the required files for using this tool:
• ADSIEDIT.DLL
• ADSIEDIT.MSC
Regarding system requirements, a connection to an Active Directory environment and Microsoft Management Console (MMC) is necessary
What is NETDOM?
A: NETDOM is a command-line tool that allows management of Windows domains and trust relationships. It is used for batch management of trusts, joining computers to domains, verifying trusts, and secure channels
A:
Enables administrators to manage Active Directory domains and trust relationships from the command prompt.
Netdom is a command-line tool that is built into Windows Server 2008. It is available if you have the Active Directory Domain Services (AD DS) server role installed. To use netdom, you must run the netdom command from an elevated command prompt. To open an elevated command prompt, click Start, right-click Command Prompt, and then click Run as administrator.
You can use netdom to:
Join a computer that runs Windows XP Professional or Windows Vista to a Windows Server 2008 or Windows Server 2003 or Windows 2000 or Windows NT 4.0 domain.
Provide an option to specify the organizational unit (OU) for the computer account.
Generate a random computer password for an initial Join operation.
Manage computer accounts for domain member workstations and member servers. Management operations include:
Add, Remove, Query.
An option to specify the OU for the computer account.
An option to move an existing computer account for a member workstation from one domain to another while maintaining the security descriptor on the computer account.
Establish one-way or two-way trust relationships between domains, including the following kinds of trust relationships:
From a Windows 2000 or Windows Server 2003 or Windows Server 2008 domain to a Windows NT 4.0 domain.
From a Windows 2000 or Windows Server 2003 or Windows Server 2008 domain to a Windows 2000 or Windows Server 2003 or Windows Server 2008 domain in another enterprise.
Between two Windows 2000 or Windows Server 2003 or Windows Server 2008 domains in an enterprise (a shortcut trust).
The Windows Server 2008 or Windows Server 2003 or Windows 2000 Server half of an interoperable Kerberos protocol realm.
Verify or reset the secure channel for the following configurations:
Member workstations and servers.
Backup domain controllers (BDCs) in a Windows NT 4.0 domain.
Specific Windows Server 2008 or Windows Server 2003 or Windows 2000 replicas.
Manage trust relationships between domains, including the following operations:
Enumerate trust relationships (direct and indirect).
View and change some attributes on a trust.
Syntax
Netdom uses the following general syntaxes:
NetDom
NetDom help
14. What are the Support Tools? Why do I need them?
The Windows 2003 Support Tools consist of a number of command-line utilities, visual basic scripts, GUI based applications, and documents - all of which you must install from a separate application. The Support Tools are not automatically installed when you install Windows 2003; their installation isn’t an option in the Windows 2003 setup. The installation program is located on the CD-ROM in the \support\tools folder and the setup file (suptools.msi) must be opened manually to initiate the installation wizard. You can also download support tool fromhttp://www.microsoft.com/downloads/en/details.aspx?familyid=96A35011-FD83-419D-939B-9A772EA2DF90&displaylang=en
13. Trying to look at the Schema, how can I do that?
Active Directory Schema Tools and Settings
When existing class and attribute definitions in the Active Directory schema do not meet the needs of your organization, you can use schema-based administrative tools to modify or add schema objects. You can modify an existing attribute or add a new class or attribute to the schema to store a new type of information in the directory. The process of modifying or updating the schema is often referred to as “extending the schema.” In addition to using schema tools to extend the schema, you can perform most schema extensions by using customized applications or Active Directory Service Interfaces (ADSI) scripts.
The following tools are associated with the Active Directory schema.
Adsiedit.exe: ADSI Edit
ADSI Edit is included when you install Support Tools for Windows Server 2003 and later.
ADSI Edit is a Microsoft Management Console (MMC) snap-in that uses ADSI, which uses the Lightweight Directory Access Protocol (LDAP). You can use ADSI Edit to view and modify directory objects in the Active Directory database. You can also use it to view schema directory partition objects and properties. When you open ADSI Edit, the Schema container is displayed by default. You can expand the container to view schema classes and attributes.
Csvde.exe: Csvde
Csvde is a command-line tool that ships with Windows Server 2003.
You can use Csvde.exe to export directory information to an Excel spreadsheet or to import data from a spreadsheet into Active Directory. You can use this format only for additions to the directory. Csvde.exe cannot be used to modify or delete objects.
Ldifde.exe: Ldifde
Ldifde is a command-line tool that ships with Windows Server 2003.
Active Directory supports the use of files that are formatted with the LDAP Data Interchange Format (LDIF) for importing and exporting information in the directory. This includes information that is stored in the schema, such as schema modifications. After an LDIF file is created, a tool such as Ldifde.exe performs the import operation by using the LDIF file for input. You can also use Ldifde.exe to add, modify, and delete directory objects; export Active Directory user and group information to other applications or services; and populate Active Directory with data from other directory services.
Schmmgmt.msc: The Active Directory Schema snap-in
The Active Directory Schema snap-in is an MMC snap-in in Administrative Tools that is installed automatically on all domain controllers running Windows Server 2003. However, you must register it manually before you use it for the first time. To register the Active Directory Schema snap-in, run Regsvr32 Schmmgmt.dll from the command prompt or from the Run command on the Start menu. Open MMC and add Active directory schema snap in.
ADSI and Visual Basic Scripts
Active Directory provides a set of interfaces that you can use programmatically to gain access to directory objects, including schema objects. ADSI conforms to the Component Object Model (COM), and it supports standard COM features. ADSI defines a directory service model and a set of COM interfaces that you can easily use with a variety of programming languages. With Microsoft Visual Basic, Scripting Edition and ADSI, you can write scripts to modify the directory in various ways, including extending the schema.
12. Why not make all DCs in a large forest as GCs?
Unless you have some really bad connections that may not be able to handle the extra traffic, you should make every DC a GC. In ANY single domain forest, it is recommended and beneficial to make all DCs GCs since it has no replication impact and serves to better distribute query load.
Upcoming Topics
Search This Blog
Subscribe via email
Weekly
-
Being a NetBackup backup administrator we should know minimum commands to manage our regular tasks with a simple CLI commands, here...
-
NetBackup 7.x Backup Process Flow 1. When a PolicyClient task has its timer expire (indicating that it is due to run) an i...
-
Based on my experience in the daily issues level I have shorted few must know backup failure issues status codes which I have mentioned here...
-
AWS Interview Questions And Answers The AWS Solution Architect Role: With regards to AWS, a Solution Architect would design and defin...
-
Today i'm going to explain how to configure your VMware integration or backup policy in Veritas Netbackup in a simple and straight way...
-
NetBackup Tutorial: Steps to verify device configuration using "robtest" The process to absolutely verify that the drive pa...
-
#NetBackup interview Questions and Answers. I just described the answers as per my knowledge in a short term, if you need more details info...
-
Below are some of the frequently asked Storage (SAN) basic interview question and answers. Check the Storage Area Networks (SAN) basic ...
-
Sample Error Log : [Critical] From: BSM@cellsrv01.in.com "backup_spec_01” Time: 8/16/2014 [61:12500] cannot connect to ...
-
QUESTION NO: 14 Which statements are true about Synthetic Full Backups? (Select two) A. The incremental backups must be written to t...