• Main Menu
  • Microsoft Windows

    • How to Convert FAT32 to NTFS

      How to Convert FAT32 to NTFS

      DISCLAIMER: This is a one way process and all steps must be taken to ensure that data is backed up before attempting. The author is in no way responsible for loss of data or damage to disk, data, and the computer as a whole. Before beginning, become familiar with the following terms : FAT :

    • How to Delete an Exchange Server Mail Box

      How to Delete an Exchange Server Mail Box

      Deleting a Microsoft Exchange Server mail box is a relatively simple five step process. However, it is important to note that the mailbox will remain connected for thirty days after deletion. This is called the “mailbox retention period,” during which users can reconnect their mailbox if needed. Deleting a mailbox will not permanently remove it

    • Configuring and Managing IPSec

      Configuring and Managing IPSec

      IPSec Review IPSec is a framework of open standards for encrypting TCP/IP traffic within networking environments. IPSec works by encrypting the information contained in IP datagrams through encapsulating to provide data integrity, data confidentiality, data origin authentication, and replay protection. IPSec uses cryptography to provide authentication, data integrity, and data confidentiality services. Authentication deals with

    • Configuring and Troubleshooting Active Directory Replication

      Configuring and Troubleshooting Active Directory Replication

      Active Directory is a distributed multimaster replicated database. All domain controllers host a full replica of the domain information for its own domain. Domain controllers in Windows 2000 and Windows Server 2003 environments hold a read/write copy of the Active Directory database. In these environments, changes can be made to the Active Directory database on

    • The Certificate Enrollment Process

      The Certificate Enrollment Process

      While encryption can be a robust security technology, users have to implement a public key infrastructure (PKI) to make it beneficial and trusted within an organization. The Windows 2000 and Windows Server 2003 PKI implementation resides in Certificate Services. A public key infrastructure is the collection of technology, protocols, services, standards, and policies that control

    • Windows Protection Error

      Windows Protection Error

      A Windows Protection Error such as "Initializing device <device name> Windows Protection Error" can be received when either first starting Microsoft Windows or when shutting down your computer. The computer might then ask you restart the system. Windows Protection Errors are usually received by users of Windows 95, 98, and ME and these errors can

    • What is a Hackintosh?

      What is a Hackintosh?

      Hackintosh is a hacked PC that runs on MAC OS X OS (“Lion”, “Snow Leopard” , “Leopard”).  At first, a lot of people thought that this was impossible to run MAC OS on a non-MAC hardware because of the different software, drivers, and utilities being used between the two. It all started when Apple decided

    • How to Delete the Operating System from a Computer

      How to Delete the Operating System from a Computer

      The first thing anyone should do when deleting an operating system from a computer, is backup the computer’s contents. This is because deleting the operating system involves deleting the partition of the hard drive that is located on, causing all data to be lost. The user can backup his/her files by going to My Computer, copying

    • Active Directory Operations Masters

      Active Directory Operations Masters

      When a change is made to a domain, the change is replicated across all of the domain controllers in the domain. Some changes, such as those made to the schema, are replicated across all of the domains in the forest. This replication is called multimaster replication. But few changes are practically not possible to perform

    • Physical Structure of Active Directory

      Physical Structure of Active Directory

      In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when and where logon and replication traffic occurs. The physical structure of Active Directory contains all the physical subnets present in your network like domain controllers and replication between domain controllers. The physical structure of Active Directory: Domain Controllers:

    116 queries in 0.430 seconds.