• Main Menu
  • Microsoft Windows

    • Understanding and Designing a Public Key Infrastructure

      Understanding and Designing a Public Key Infrastructure

      An Introduction to the Public Key Infrastructure (PKI) It has grown more important to ensure the confidentiality and integrity for data communication where an organization's network contains intranets, extranets, and Internet Web sites. Because of the connectivity of networks today, an organization's network is exposed to unauthorized users who could possibly attempt to access and

    • Encrypting File System (EFS)

      Encrypting File System (EFS)

      An Overview of EFS Encrypting File System (EFS) enables users to encrypt files and folders, and entire data drives on NTFS formatted volumes. NTFS enables you to set permissions on files and folders on an NTFS formatted volume which controls access to these files and folders. EFS enables you to encrypt files and folders to

    • VMWare Error 1335

      VMWare Error 1335

      Computer professionals have used the VMWare workstation for a number of years to test software on different types of operating systems on a single computer. Those who purchase and download the VMWare software from the online store often encounter VMWare error 1335. This error is typically as a result of downloading the incorrect software build,

    • Active Directory Objects

      Active Directory Objects

      The Active Directory data store, also referred to as directory, contains data on users, groups, computers, and on which resources these users, groups, and computers can access. It holds all Active Directory information. Each domain controller within a domain holds a readable/writable replica of the Active Directory data store that consists of information pertaining to

    • Error Code 80072efd

      Error Code 80072efd

      Error code 80072efd often occurs when users try to update Windows Vista through the Windows Update service. Overloaded Microsoft update services or incorrect firewall settings can trigger this error. If the Microsoft server causes the error, it can be corrected within the hour. When this occurs it is typically due to unusually high demand on

    • How to Delete the Operating System from a Computer

      How to Delete the Operating System from a Computer

      The first thing anyone should do when deleting an operating system from a computer, is backup the computer’s contents. This is because deleting the operating system involves deleting the partition of the hard drive that is┬álocated on, causing all data to be lost. The user can backup his/her files by going to My Computer, copying

    • Tree and Forest in Active Directory

      Tree and Forest in Active Directory

      The Domain is the core unit of logical structure in Active Directory. All objects that share a common directory database and trust relationship with other domain and security policies are known as Domains. Each domain stores information only about the objects that belong to that domain. All security polices and settings, such as administrative rights,

    • NTFS Permissions after Copying or Moving Files

      NTFS Permissions after Copying or Moving Files

      When copying or moving a file or folder, the permissions may change depending on where you move the file or folder. Copying Files and Folders When copying folder or files from one folder to another folder or from one partition to another partition, permissions for this files or folders may change. When copying a folder

    • Authentication Types

      Authentication Types

      What is Authentication Authentication is the process whereby the system identifies legitimate users from unauthorized users. It is the process in which a user identifies his/her self to the system. How effective an authentication process is, is determined by the authentication protocols and mechanisms being used. Windows Server 2003 provides a few different authentication types

    • Understanding the Department of Defense Network Model

      Understanding the Department of Defense Network Model

      Department of Defense Network (DoD) Network Model Introduction Back in 1960, systems were primarily made up of mainframe computers, and were typically owned by fairly large companies and government institutions. Because mainframe computers run different proprietary software, and due to mainframes not being able to communicate between each other, special code (interface) had to be

    microsoft-windows
    271 queries in 0.295 seconds.