• Main Menu
  • Microsoft Windows

    • Wireless Connection Security

      Wireless Connection Security

      Wireless Network Security Threats Wireless networks do not have the inbuilt physical security of wired networks, and are unfortunately more prone to attacks from intruders. Once unauthorized access is gained to the wireless network, the intruder would be able to easily access the resources of the corporate, internal network. To complicate matters, there are numerous

    • Publishing Resources in Active Directory

      Publishing Resources in Active Directory

      What Resources can be published in Active Directory When you make Active Directory objects available to users, you are publishing the Active Directory resource. The resources that can be published in Active Directory include the Active Directory resources listed below: User objects Computer objects Printer objects Folders and files Network services The two primary published

    • How to Backup and Restore a WINS Database

      How to Backup and Restore a WINS Database

      If you are unable to repair a corrupt database that has been caused by a system failure, a virus attach, a power failure, or a similar disaster, you can first delete the WINS database and then entirely restore it from a backup. The WINS management console is a comprehensive tool which can be used to

    • Implementing Public Key Infrastructure

      Implementing Public Key Infrastructure

      An Overview on the Public Key Infrastructure (PKI) A set of components, standards, and protocols make up the Public Key Infrastructure (PKI), which protects data as it is transmitted over the network. The PKI is an integral aspect of security within a network. Digital certificates form the basis of the PKI because these certificates use

    • Cannot Copy and Paste in Windows

      Cannot Copy and Paste in Windows

      Copy and paste are Windows commands that allow users to copy content from a source that is then “pasted” in another window or program. The process can be done by selecting any supported content such as text or a file on the disk, right clicking to open the context menu, selecting copy from the list,

    • How to Read Windows Log Files

      How to Read Windows Log Files

      Reading Windows log files is an important part of maintaining proper operation and ensuring system security. In addition, log files can be extremely useful in troubleshooting Windows errors. Only a Windows Administrator can read some Windows log files, such as the Security Event Log. Any system user can view other log files, such as logs

    • How to Rotate the Screen in Windows

      How to Rotate the Screen in Windows

      Rotating a monitor screen has several practical uses. Having a “portrait” screen orientation allows viewers to see entire documents at 100% size and view taller web pages without the need to scroll as much. Additionally, rotated screens take up less space on a desk, especially if they are widescreen monitors. Note: Some monitors are not

    • Managing Exchange Server Connectivity Across Firewalls

      Managing Exchange Server Connectivity Across Firewalls

      Using Firewalls To Prevent Unauthorized Access The method, by which you can physically secure the network, is through the usage of firewalls. While firewalls provide some level of physical security, you should bear in mind that firewalls are just barriers which make it difficult for intruders to attack the network. Firewalls are categorized as follows:

    • PCL XL Error

      PCL XL Error

      The PCL XL error is most commonly associated with HP LaserJet printers. The error occurs when several pages are sent from a document to the printer’s print queue. The printer displays this error message if the printer’s driver has become outdated or corrupted from operating system (OS) updates or conflicting third-party software being installed on

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    microsoft-windows
    274 queries in 0.490 seconds.