Auditing Security Events

Auditing Security Events

An Overview of Auditing Auditing enables you to determine which activities are occurring on your system. Through auditing, you can track access to objects, files and folders; as well as any modifications made to the objects, files and folders. Auditing therefore enables you to collect information associated with resource access and usage on your system by allowing you to audit system logon, file access, object access, as well as any configuration changes. An audit trail can be defined as a list

[ Read Auditing Security Events ]

Implementing Public Key Infrastructure

Implementing Public Key Infrastructure

An Overview on the Public Key Infrastructure (PKI) A set of components, standards, and protocols make up the Public Key Infrastructure (PKI), which protects data as it is transmitted over the network. The PKI is an integral aspect of security within a network. Digital certificates form the basis of the PKI because these certificates use cryptographic algorithms and key lengths to protect data as it is transmitted over the network. The more important components of the PKI are summarized bel

[ Read Implementing Public Key Infrastructure ]

Renaming Domains

Renaming Domains

An Overview of the Domain Renaming Feature With the Windows NT 4 domain model, you had to completely rebuild an existing domain if you wanted to change the names of any of your existing domains. In Windows 2000 domains, you also have to create a new domain but the Active Directory Object Manager can be used to migrate existing users, groups and computers into the new domain. The Active Directory Object Manager plays a vital role in moving the contents of existing Windows 2000 domains into new d

[ Read Renaming Domains ]

The Windows Routing Table

The Windows Routing Table

When routers need to forward packets, they interpret the packets' addresses then use the information in the routing tables to pass the packet on. Data packets contain both source and destination addresses in their packet headers. This is the information that is used when routing decisions need to be made. The destination address is compared with the local address to determine the following information on how to route the packet: Should the packet be sent up the stack on the local host?

[ Read The Windows Routing Table ]

How to Unprotect an Excel Sheet

How to Unprotect an Excel Sheet

Unprotecting an Excel sheet is surprisingly easy. If your Excel sheet is password protected and you do not know the password, there is no way that you can unprotect the sheet in that particular workbook – but you can create a new workbook which will contain exactly the same formulas, formatting and values that will not be protected and will be editable. How to Unprotect a Non-Password Protected Excel Sheet Open up the Excel document. Click on the “Review” tab. Click “Unprotect S

[ Read How to Unprotect an Excel Sheet ]

Error 815

Error 815

Windows error 815 occurs when a Windows computer fails to make a DSL connection. This code replaces traditional error codes 676, 678, 691, and 769 from Windows XP, and no less than four different causes trigger it. The error's four possible causes include DSL server problems (or an indicator that the phone line is busy), a username or password error, an unreachable destination host, or an unresponsive remote computer (general connectivity error). There are several troubleshooting steps that can

[ Read Error 815 ]

Active Directory Objects

Active Directory Objects

The Active Directory data store, also referred to as directory, contains data on users, groups, computers, and on which resources these users, groups, and computers can access. It holds all Active Directory information. Each domain controller within a domain holds a readable/writable replica of the Active Directory data store that consists of information pertaining to the particular domain to which it belongs. Users and computers can continue to access the Active Directory data store when one do

[ Read Active Directory Objects ]

How to Make Desktop Icons

How to Make Desktop Icons

Desktop Icons are some of the necessary files that are required to spice up and personalize folders, shortcuts and programs on your computer.  There are many options available to produce icons from multiple sources including photos, graphics and can even be made from scratch with drawing tools.  There are several free desktop icon makers available on the Internet.  One of the free options that work very well is IcoFX, which is available at the www.icofx.ro website. Making Desktop

[ Read How to Make Desktop Icons ]

Implementing Auditing

Implementing Auditing

Auditing Overview Auditing enables you to determine which activities are occurring on your system and allows you to track access to objects, files and folders; and modifications made to the objects, files and folders. Auditing also enables you to collect information associated with resource access and usage on your system by allowing you to audit system logon, file access, and object access. Security auditing events are written to the Security log of the system and can be accessed from the Even

[ Read Implementing Auditing ]

How to Flip a Computer Screen Upside Down

How to Flip a Computer Screen Upside Down

Windows Hot Keys allow computer users to conduct specific Windows operating system (OS) functions without having to navigate to application menus, which saves time. A common task that can be accomplished through Window Hot Keys is flipping a computer screen upside down. The resulting display can also be reversed with a similar method or by using applications found in the Windows Control Panel. How to Flip a Computer Screen Upside Down with Windows Hot Keys Step 1 – Press the “Ctrl” + “

[ Read How to Flip a Computer Screen Upside Down ]

Page 1 of 381234Last »