IT tutorials
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 11 of 29, items 301 to 330 of 865.
Windows 7 : Encrypting File System (part 2) - How to Grant an Additional User Access to an EFS-encrypted File , How to Import Personal Certificates
By default, only the user who encrypted a file is able to access it. However, Windows 7 (as well as Windows Vista, Windows XP, and Windows Server 2003, but not Microsoft Windows 2000) allows you to grant more than one user access to an EFS-encrypted file
Windows 7 : Encrypting File System (part 1) - How to Encrypt a Folder with EFS, How to Create and Back Up EFS Certificates
EFS uses certificates to encrypt and decrypt data. If you lose an EFS certificate, you will be unable to decrypt your files. Therefore, it is extremely important to back up EFS certificates.
Windows 7 : How to Troubleshoot Authentication Issues (part 3) - How to Troubleshoot an Untrusted Certification Authority
Certificates, such as those issued by an enterprise certification authority (CA), are often used for authentication. Windows 7 can store certificates locally to authenticate a user or the computer itself, and users can carry certificates with them on smart cards.
Windows 7 : How to Troubleshoot Authentication Issues (part 2) - How to Use Auditing to Troubleshoot Authentication Problems
By default, Windows 7 does not add an event to the event log when a user provides incorrect credentials (such as when a user mistypes a password).
Windows 7 : How to Troubleshoot Authentication Issues (part 1) - Identifying Logon Restrictions
Logon restrictions include locking accounts after several incorrect attempts at typing a password, allowing users to log on only during specific hours, requiring users to change their passwords regularly, disabling accounts, and accounts that expire on a specific date.
Windows 7 : Authenticating Users - How to Use Credential Manager
Credential Manager is a single-sign on feature, originally for Windows Server 2003 and Windows XP, that enables users to input user names and passwords for multiple network resources and applications.
Windows 7 : Changing the Default Connection, Managing Multiple Internet Connections
If you don’t establish a connection manually before using an Internet program such as Internet Explorer, Windows dials your ISP automatically when you start these programs.
Windows 7 : Configuring a High-Speed Connection (part 2) - Setting Up a Fixed IP Address
When you have completed this procedure, return to the PPPoE setup steps, or, if you have always-on service, open Internet Explorer to test-drive your new connection.
Windows 7 : Configuring a High-Speed Connection (part 1) - Configuring a PPPoE Broadband Connection, Setting Up Dynamic IP Addressing
In most cases, your ISP will use the DHCP protocol to configure client network adapters. This is the default setting for all new network adapters.
Windows 7 : Installing a Network Adapter for Broadband Service
If you are going to use cable or DSL Internet service, the following sections should help you get the service installed and working. To start with you will need to connect your computer to your cable or DSL modem. A very few DSL and cable modems use a USB connection and can just be plugged into your computer this way.
Windows Server 2008 : Understanding Group Policy Settings (part 2) - Deploying Applications
You can also deploy applications with Group Policy. Advanced tools, such as Microsoft’s System Center Configuration Manager (SCCM), give you additional capabilities such as scheduling the deployments. However, you can use Group Policy to deploy applications without buying SCCM.
Windows Server 2008 : Understanding Group Policy Settings (part 1) - Enabling Auditing Through Group Policy
Administrators use Group Policy to administer and manage users and computers within a domain. There are literally thousands of Group Policy settings. The goal isn’t to know them all but instead to understand a few key Group Policy settings, how they’re created, and how they apply. The following sections cover a few Group Policy settings.
Windows Server 2008 : Filtering GPOs by Modifying Permissions
As soon as a user logs in to the domain, the user account is automatically added to the Authenticated Users group. In other words, all GPOs automatically apply to any user that logs in because the GPOs apply to the Authenticated Users group by default.
Windows Server 2008 : Launching the Group Policy Management Console, Understanding Group Policy Order of Precedence
The majority of the work with Group Policy starts with the Group Policy Management Console (GPMC). Figure 1 shows the GPMC with the Default Domain Policy selected and the Default Domain Controllers Policy showing.
Windows Server 2008 : Creating and Running a PowerShell Script - Scheduling PowerShell Scripts
You can schedule PowerShell scripts through the Task Scheduler, but it is a little trickier than simple batch files. If you try to schedule the .ps1 file, Notepad opens the file instead of the script running.
Windows Server 2008 : Creating and Running a PowerShell Script - Running a Script Against Multiple Computers
This script shows how to read the computer list from a text file and then run the script against each computer in the list. Although this script records the BIOS information for each computer in the list, you can use it to do any other task by modifying the content of the foreach loop.
Windows Server 2012 : Preparing for deploying domain controllers (part 3) - Existing forest domain controller deployment
Although performing in-place upgrades can help reduce hardware costs, the margin for error is greater. If possible, avoid performing in-place upgrades of your existing domain controllers; instead, introduce new domain controllers and then, if desired, retire your existing domain controllers.
Windows Server 2012 : Preparing for deploying domain controllers (part 2) - New forest domain controller deployment
Depending on the administrative and geographical structure of your organization and the number of users to be supported, deploying a new forest based on Windows Server 2012 AD DS might involve several of the following domain-controller deployment scenarios
Windows Server 2012 : Preparing for deploying domain controllers (part 1) - AD DS deployment scenarios
If your organization has not yet deployed AD DS, you’re in luck: this is your opportunity to get it right. Although deploying a new forest based on Windows Server 2012 AD DS is as simple as deploying your first domain controller (the forest root domain controller), there are numerous planning considerations you need to be aware of before you perform this task.
Windows Server 2012 : Windows PowerShell automation (part 2) - Disconnected sessions
In the previous version of PowerShell, you can use the New-PSSession cmdlet to create a PowerShell session on a remote computer. When you create the new session, PowerShell establishes a persistent connection to the remote computer. These persistent sessions are called PSSessions.
Windows Server 2012 : Windows PowerShell automation (part 1) - Background jobs, Scheduled jobs
New in PowerShell 3.0 is the capability of scheduling PowerShell background jobs and managing them either with PowerShell or the Windows Task Scheduler
Windows 7 : Making and Ending a Dial-Up Connection
u use a dial-up connection with an analog modem, after you’ve set up an icon for your ISP, making the connection is a snap. You use this same procedure if you use a broadband connection with Point-to-Point Protocol over Ethernet (PPPoE) that requires you to log on
Windows 7 : Configuring a Dial-Up Internet Connection (part 2) - Adjusting Dial-Up Connection Properties
As configured by the wizard, your dial-up connection is properly set up for most ISPs. However, the wizard doesn’t do a good job of setting up the area code and call-waiting settings, so you might want to manually adjust these.
Windows 7 : Configuring a Dial-Up Internet Connection (part 1) - Creating a New Dial-Up Connection
To set up a new connection to your dial-up Internet service, click Start, Control Panel, View Network Status and Tasks (under Network and Internet), and select Set Up a New Connection or Network. Select Connect to the Internet and click Next. Click Dial-Up.
Windows 7 : Installing a Modem for Dial-Up Service
Installing a modem is a pretty painless process these days. Your modem should come with straightforward installation instructions; follow those, and you’ll be online in no time.
Windows 7 : Connection Technologies - Analog Modem, ISDN, DSL, Cable Modem, Satellite Service, Wireless and Cellular Service
Not long ago, you had one choice to make for your Internet connection: which brand of modem to buy. Now options abound, and you can choose among several technologies, speeds, and ISP types. A huge technology shift is taking place as high-speed digital (broadband) connection services are being deployed worldwide.
Windows Server 2012 : Securing IIS 8 (part 4) - Configuring Feature Delegation, Using IIS Logging
To allow users who have been granted permission to a site, application, directory, or page to make changes to configurations, feature delegation must be used to unlock the relevant portion of the configuration file for the element.
Windows Server 2012 : Securing IIS 8 (part 3) - Creating an IIS 8 User Account, Assigning Permissions to an IIS 8 User Account
In some situations, you might need to provide management capabilities and not want to use an Active Directory or Windows account. Examples of this scenario are often related to vendor support of an application.
Windows Server 2012 : Securing IIS 8 (part 2) - Auditing Web Services , Using SSL Certificates
Secure Sockets Layer (SSL) encryption preserves user and content integrity and confidentiality so that communications between a client and the web server, containing sensitive data such as passwords or credit card information, are protected. SSL is based on the public key infrastructure (PKI, X.509) security standards that protect communication by encrypting data before being transmitted.
Windows Server 2012 : Securing IIS 8 (part 1) - Windows Server 2012 Security, IIS Authentication
Windows Server 2012 security actually begins during the planning and designing phases so that every conceivable security aspect is addressed. This can entail physical, logical (Windows Server 2012, applications, and so on), and communications security.
Top 10
Technology FAQ
- Microsoft ebs security server configuration
- IIs7 on Windows server 2003
- How to Configure Failover Clusters With Win 2008 Server R2?
- Windows 2008 Network Load Balancing
- Windows Server 2008 - Group Policy Management - Remove Computer Management
- Remove shortcuts possibility in a web page or to put in favorite
- HTA Dynamic Drop Down List
- IIS host header and DNS
- VMware or MS Virtual Server?
- Adobe Acrobat 9 inserting tab pages
programming4us programming4us