IT tutorials
 
Technology
 
Change page: < 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... >  |  Displaying page 3 of 56, items 61 to 90 of 1656.
Sharepoint 2013 : My Sites (part 5) - My Content
SharePoint 2010 used the concept of “My Content” and provided a link on the top menu of your My Site that linked the user to stored content. SharePoint 2013 also allows stored content and is one of the main reasons to provision a My Site (in addition to newsfeeds, etc.).
Sharepoint 2013 : My Sites (part 4) - My Newsfeed
The newsfeed is akin to those seen on Facebook and Twitter and shows a feed of current activity of my colleagues and me. Activities on the newsfeed consist of a list of SharePoint tracked events, configured in each personal profile.
Sharepoint 2013 : My Sites (part 3) - My User Profile Page
SharePoint 2013 continues to support user profiles as it always has done since SharePoint 2007. The way in which SharePoint manages profile organization under the hood has changed over time, but users have always been able to see some demographic details about themselves and their peers, irrespective of My Sites.
Sharepoint 2013 : My Sites (part 2) - Capacity Planning for My Sites
My Sites are individual site collections, supporting document libraries, lists, and subsites. By default, the owner of a My Site has full control over the collection, and carte blanche on what he or she may store in the collection.
Sharepoint 2013 : My Sites (part 1) - Creating the My Site Host Site Collection
Each My Site exists as a separate site collection. Site collections provide a level of independence in that each defines its own security model and each may reside in different databases from other site collections.
Sharepoint 2013 : Social Networking, Notes and Tagging
“Tagging” is the flavor of the Internet these days. With the explosion of social networking, and sites like Facebook, everyone is in the mode to tag and “like” content. SharePoint 2013 is on the tagging bandwagon and offers users the ability to perform extensive tagging using the Managed Metadata Service application.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 10) - Configuring firewall rules - Configuring rules using Group Policy
Although the Windows Firewall with Advanced Security is useful for configuring firewall rules and settings on the local computer, in managed environments you will want to use Group Policy to deploy firewall rules and settings on targeted computers.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 9) - Configuring firewall rules - Viewing and managing rules
You can view and manage firewall rules using either the Windows Firewall with Advanced Security snap-in or Windows PowerShell.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 8) - Configuring firewall rules - Creating firewall rules using Windows PowerShell, Creating rules for refreshing Group
You can also use Windows PowerShell cmdlets from the NetSecurity module to view, create, modify, and remove firewall rules on both the local and remote computers.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 7) - Configuring firewall rules - Creating a predefined rule, Creating a custom rule
Once a predefined rule has been created, you can open its properties by double-clicking on the rule in either the Inbound Rules or Outbound Rules sections of the Windows Firewall with Advanced Security snap-in
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 6) - Configuring firewall rules - Creating firewall rules, Creating a program rule, Creating a port rule
To create new firewall rules using the New Inbound (or Outbound) Rule Wizard, right-click on the Inbound (or Outbound) node in the Windows Firewall with Advanced Security snap-in, select New Rule, and follow the steps of the wizard.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 5) - Configuring firewall rules - Types of firewall rules, Rules processing, Rule groups
When a packet of network traffic is processed by Windows Firewall with Advanced Security, one or more rules might apply to that particular packet
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 4) - Managing firewall profiles - Configuring logging, Configuring profiles using Windows PowerShell
Clicking Customize in the Logging section of a profile’s properties opens the dialog box shown in Figure 4, which you use to specify how Windows Firewall with Advanced Security logging operations will behave for the selected profile.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 3) - Managing firewall profiles - Configuring profiles, Configuring profile settings
By default, all three firewall profiles are enabled on Windows computers. You can change the state of any profile or configure its properties by right-clicking on the root node in the Windows Firewall with Advanced Security snap-in and selecting Properties.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 2) - Managing firewall profiles
Computers today are often connected to different networks at different times, and they might even be connected to several networks at the same time.
Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 1) - Understanding Windows Firewall with Advanced Security
Windows Firewall with Advanced Security is a host-based, stateful firewall included in Windows Server 2012 and Windows 8. The feature was first introduced in Windows Vista and Windows Server 2008, and its functionality has been enhanced in several ways in later Windows versions.
Microsoft Exchange Server 2013 : Addressing Exchange - Hierarchical address book
The standard address book meets the needs of most companies throughout the world. Presenting users and groups sorted by first name or last name does not work so well in companies where the culture is strongly based on adherence to a hierarchical structure, especially in East Asian countries.
Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 3) - Creating and using customized OABs
The foundation for the OAB is provided by a set of one or more address lists. The default OAB contains just one address list, the default GAL, so any object that is included in the GAL is also included in the default OAB.
Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 2) - How Exchange 2013 generates the Offline Address Book
Following the redefinition of the Mailbox server role, Exchange 2013 changes the approach to how the Offline Address Book (OAB) is generated. EAC does not include any options to manage the process of OAB generation or distribution, so these tasks are handled through EMS.
Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 1) - The OAB and Outlook
Outlook clients that are configured in cached Exchange mode download the OAB automatically. The first download occurs after the mailbox folders are replicated to the OST.
Microsoft Exchange Server 2013 : Addressing Exchange - Address book policies - Creating and implementing an ABP
Many Exchange deployments will be quite happy with the default GAL, by which every mail-enabled object in the organization is visible to every user.
Microsoft Exchange Server 2013 : Addressing Exchange - Address lists
Address lists provide a convenient method to present directory objects in containers and can be combined in an address book policy (ABP) to restrict users to the Active Directory information they can see.
User Profiles in SharePoint 2013 (part 3) - A Custom Profile Property and Subtype in Action - Audiences
An audience defines a set of people who see targeted content. Do not confuse audiences with SharePoint security groups—although both combine a set of users, audiences define only those users who see specific content in lists and list items, and you define membership of an audience by rule criteria, not explicit inclusion.
User Profiles in SharePoint 2013 (part 2) - A Custom Profile Property and Subtype in Action - Organization Profiles
Having completed the steps in the previous two sections, you should now have a new custom user profile property added, and you have contained this custom property in a new Contractor subtype.
User Profiles in SharePoint 2013 (part 1) - User Profile Properties and Subtypes
Each profile property consists of a type, shown in the Property Type column in Figure 1. The property type indicates the type of value data a user profile instance might contain for the property.
Windows 8 : Managing Internet Explorer add-ons (part 5) - Managing Internet Explorer add-ons by using Group Policy
By using the following Group Policy settings, you can prevent the installation of add-ons unless those add-ons are included as part of another Group Policy, called the Add-On List.
Windows 8 : Managing Internet Explorer add-ons (part 4) - Managing other add-ons - Enabling or disabling add-ons , Starting Internet Explorer without add-ons
From testing, security, and troubleshooting standpoints, you can start Internet Explorer for the desktop without loading any add-on modules. In fact, this is often the first step administrators take when attempting to resolve browsing issues for a user.
Windows 8 : Managing Internet Explorer add-ons (part 3) - Managing other add-ons
ActiveX is just one method by which Internet Explorer for the desktop can be extended. A number of other add-ons are available in the Internet Explorer add-on area
Windows 8 : Managing Internet Explorer add-ons (part 2) - Managing ActiveX controls - Managing ActiveX behavior
A number of other ActiveX configuration options are configured on a per-zone basis. Table 2 provides you with a look at the available settings that relate to ActiveX.
Windows 8 : Managing Internet Explorer add-ons (part 1) - Managing ActiveX controls - Controlling ActiveX opt-in
The most common interaction that you will have with ActiveX occurs when someone browses to a site on the Internet that requires an ActiveX add-on to be installed to enable some kind of functionality on the page.
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us