• Main Menu
  • Microsoft Windows

    • Configuring Power Management

      Configuring Power Management

      An Introduction to Power Management and its Features Power management is a component of system performance that affects how Windows makes use of power when the computer is running under normal conditions. You can use the Power management settings to preserve energy. This in turn extends the life of hardware components of the system because

    • How to Fix the ORA-12560 TNS Protocol Adapter Error

      How to Fix the ORA-12560 TNS Protocol Adapter Error

      Oracle is a free, open business management software available for both personal and commercial use. Oracle allows users to process credit card payments, handle customer support, and manage customer orders from one location and includes many additional features from third party companies, such as Paypal and Amazon, that allow users to sell products in a

    • Defining a Baseline Security Template

      Defining a Baseline Security Template

      Security Templates Review A security template is collection of security configuration settings that can be applied to a domain controller, member server or a workstation. The settings within a security template control the security configuration of a computer through both local policies and group policies. A security template can be applied to a local computer,

    • Implementing Account and Security Policies

      Implementing Account and Security Policies

      Understanding Security Policy Types With Windows Server 2003, you can implement and manage security settings at the following levels: Local computer (local security policies) Active Directory site, domain, or organizational unit (domain security policies) Local security policies are managed through Local Computer Group Policy Objects (GPOs), and domain security policies are managed through Group Policy

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    • How to Uninstall DirectX

      How to Uninstall DirectX

      When DirectX was first introduced, it was marketed to people involved in the gaming industry. Those who develop all types of graphical computer software currently use it. DirectX is “backward compatible” software, allowing the user to install a newer version of DirectX and still be able to play games created for an older version of

    • Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

      Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

      Recipient Objects Overview Active Directory objects such as user accounts, contacts and groups become recipient objects when e-mail address information is added to the object. The public folder is another type of recipient object. A public folder does not however usually have its own an email address. Exchange Server 2003 supports the following types of

    • How to Configure IIS to Host a Web Page

      How to Configure IIS to Host a Web Page

      IIS (Internet Information Services) is an easy to use web server from Microsoft. It is not installed on Windows XP Professional by default. However, it is installed when the user upgrades from Windows NT or Windows 2000 to Windows XP Pro. IIS can be installed as follows: Click Start, click Control Panel, and double-click Add/Remove

    • How to Maintain Active Directory

      How to Maintain Active Directory

      Maintaining an Active Directory is a very important administrative task that one must schedule regularly to ensure that, in case of disaster, you can recover your lost or corrupted data and can repair the active directory database. Extensible Storage Engine (ESE) is the active directory database, which manage all the active directory objects in active

    • Implementing IAS

      Implementing IAS

      Internet Authentication Service (IAS) Overview In most organizations that have multiple network access servers, the centralization of authentication and accounting of connections being established at a centralized server is the better approach than each network access server performing authentication and accounting services. The Remote Authentication Dial-In User Service (RADIUS) protocol is the recognized protocol for

    microsoft-windows
    } 429 queries in 0.484 seconds.