Friday, March 4, 2011

Retaining Individual E-mail Messages

Best Practice Definition Retaining unnecessary messages quickly takes up the storage space on the Exchange server. This can lead to a crash of the server, leading to down time for users. Thus, it is important to apply correct storage practices to these messages. (Exchange is not meant for long term storage of information!) Best Practice Usage When you receive a message that...

How will I know when I am reaching the maximum size limitations?

·         Warning messages when total size of mailbox is approaching the maximum allowed.  The message will look like this: You are exceeding the size limit set on your mailbox by the system administrator.Ex. Your mailbox size limit is 92460 KbytesYou are currently exceeding this limit by 11453 Kbytes You may not be able to send...

How can I recover deleted items? (Exchange)

The deleted items folder is kept in an archive for 7 days (Depend upon your Policies) after the messages have been deleted. They may be recovered anytime within this 7 day period by doing the following :-:·         Open Outlook 98·         Select “Deleted Items” folder·        ...

Thursday, February 10, 2011

windows admin

I can not find where to run Skype as an admin: Windows 7? - Yahoo ... Last post: Feb 8, 2011 turn UAC off and you will never need the "run as admin" stuff anymore. ... <http://answers.yahoo.com/question/index?qid=20110208174829AAMHf5w> How to enable or disable the admin account in Windows 7 - Security ... 4 posts - 4 authors - Last post: Feb 8, 2011 Forum discussion: Windows...

Saturday, February 5, 2011

Net security opening

Hi,   An IT company located in Kanjur marg require 3 persons for Net Security. Working knowledge in Nokia Firewall with Checkpoint firewall R70 IBM Site Protector (IDS/IPS knowledge) For Vulnerability assessment and analysis. (ISS, Nessus, GFILanguard) Patch management Like Big fix, LANDesk etc... Antivirus (Preferably MacAfee) Packet Analysis. (Sniffer, Wire...

Friday, February 4, 2011

Tech Support Engg at HP

HI, Greetings from HP, HP is hiring Tech Support Engineers for 3par at Bangalore Location, Key Attributes • Must possess excellent Communication skills - professional, clear, and articulate in English(oral/written) • Have the courage to challenge processes and practices in our strive for continual improvement • Be able to follow processes as outlined in the...

Hiring Security Analyst Professionals in TCS MUMBAI - Work Location : Delhi

Hi Friend, We have openings in Tata Consultancy Services (TCS) Delhi for the following skill. Face-to-Face interviews will be held on 5/6 -Feb-11 Security Analyst professionals - 3+ yrs. Responsibilities: • Maintain security administration on Medco Systems: SecureId, RACF, Oracle, Sybase, UNIX, Alpha, eSD, Autofax, DB2, JDE, TIM - User ID password administration - Account...

REVISED CCNA COURSE CONTENTS

                   INTERCONNECTING CISCO NETWORK DEVICES INTRODUCTION Course Acronym: ICND (640 – 801)                Course Duration: 40 Hours Course Content: ·         Concepts and commands required to configure...

Functional Levels Server 2008

Functional Levels Server 2008 The features available in a Windows Server 2008 domain depend on the functional level. Therefore, you can add additional features to a domain by raising the functional level. Windows Server 2008 supports three different domain functional levels. The three domain functional levels are: * Windows 2000 * Windows Server 2003 * Windows Server...

Tuesday, January 11, 2011

25. Name some OU design considerations.

Windows admin interview questions (includes Vista) OU design requires balancing requirements for delegating administrative rights - independent of Group Policy needs - and the need to scope the application of Group Policy. The following OU design recommendations address delegation and scope issues:Applying Group Policy An OU is the lowest-level Active Directory container...

23. Can I get user passwords from the AD database?

Windows admin interview questions (includes Vista) The passwords in AD are not stored encrypted by default, so they cannot be decrypted. They are hashed. The only way to recover the data from a hash is with some sort of a hacking algorithm that attempts to crack the hash (such tools exis...

22. How can you forcibly remove AD from a server, and what do you do later?

Windows admin interview questions (includes Vista) Demote the server using dcpromo /forceremoval, then remove the metadata from Active directory using ndtsutil. There is no way to get user passwords from AD that I am aware of, but you should still be able to change them.Another way out tooRestart the DC is DSRM modea. Locate the following registry subkey:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ProductOptionsb....

21. What can you do to promote a server to DC if you’re in a remote location with slow WAN link?

Windows admin interview questions (includes Vista) First available in Windows 2003, you will create a copy of the system state from an existing DC and copy it to the new remote server. Run "Dcpromo /adv". You will be prompted for the location of the system state fi...

20. What are the requirements for installing AD on a new server?

Windows admin interview questions (includes Vista) An NTFS partition with enough free space (250MB minimum) · An Administrator's username and password· The correct operating system version· A NIC· Properly configured TCP/IP (IP address, subnet mask and - optional - default gateway)· A network connection (to a hub or to another computer via...

19. What is the ISTG? Who has that role by default?

Windows admin interview questions (includes Vista) Intersite Topology Generator (ISTG), which is responsible for the connections among the sites. By default Windows 2003 Forest level functionality has this role.  By Default the first Server has this role. If that server can no longer preform this role then the next server with the highest GUID then takes...

18. What is the KCC?

Windows admin interview questions (includes Vista) With in a Site, a Windows server 2003 service known as the KCC automatically generates a topology for replication among the domain controllers in the domain using a ring structure.Th Kcc is a built in process that runs on all domain controllers. The KCC analyzes the replication topology within a site every 15 minute...

17. What’s the difference between a site link’s schedule and interval?

Windows admin interview questions (includes Vista) Any time two networks are separated by links that are heavily used during parts of the day and are idle during other parts of the day, put those networks into separate sites. You can use the ability to schedule replication between sites to prevent replication traffic from competing with other traffic during high usage hours. In...