• Main Menu
  • Microsoft Windows

    • Using IIS Command-Line Utilities to Manage IIS

      Using IIS Command-Line Utilities to Manage IIS

      The Types of Commands used to Manage IIS from the Command Line The types of commands that manage IIS from the command line are: IISReset, Windows Management Instrumentation (WMI) scripts, Active Directory Services Interface (ADSI), and the standard Windows commands and Support Tools utilities. IISReset Command-line Utility IISReset is a command-line utility that has been

    • What is Funcres.xla?

      What is Funcres.xla?

      Funcres.xla is a Microsoft Excel add-in that adds additional features to the software. Funcres.xla (Analysis Toolpak) includes 19 various features and a number of statistical functions that allow the user to correlate data and perform calculations that are not otherwise found in Microsoft Excel. However, Funcres.xla is included in most Microsoft Excel copies and the

    • SolutionCenter.msi

      SolutionCenter.msi

      Windows users may encounter the following when trying to start the HP Solution Center: “The installation package for solution center cannot be found. Try the installation again by using a valid SolutionCenter.msi.” This error commonly occurs when the solution center software was installed from a downloaded file and is then unavailable to reinstall the HP

    • How to Delete the Operating System from a Computer

      How to Delete the Operating System from a Computer

      The first thing anyone should do when deleting an operating system from a computer, is backup the computer’s contents. This is because deleting the operating system involves deleting the partition of the hard drive that is located on, causing all data to be lost. The user can backup his/her files by going to My Computer, copying

    • What is a Hackintosh?

      What is a Hackintosh?

      Hackintosh is a hacked PC that runs on MAC OS X OS (“Lion”, “Snow Leopard” , “Leopard”).  At first, a lot of people thought that this was impossible to run MAC OS on a non-MAC hardware because of the different software, drivers, and utilities being used between the two. It all started when Apple decided

    • Understanding and Implementing Smart Card Authentication

      Understanding and Implementing Smart Card Authentication

      An Overview on Authentication and Smart Cards Administrators have to secure the network from attacks launched by hackers, spies, terrorists, thieves and criminals. Security encompasses numerous technologies, protocols, standards, policies, passwords, and secret keys. All these mechanisms typically focus on the following: Authentication Access Control Data Protection Auditing/Accountability Authentication is the process by which an

    • Understanding Proxy Server

      Understanding Proxy Server

      Proxy Server Overview Proxy Server enables you to connect the private network or LAN to a public network such as the Internet, by acting as a gateway for internal client computers to the Internet. Proxy Server is a secure gateway which you can use to provide Internet connectivity for IP and IPX based networks. A

    • How to Read IIS Server Logs

      How to Read IIS Server Logs

      IIS stands for Internet Information Services and it is a type of software that runs on servers using Microsoft Windows. IIS is the second most popular server software right behind Apache servers, which are open source and usually less expensive to run. Servers that run IIS include FTP, HTTP, HTTPS, SMTP and NNTP. One of

    • Remote Access Security

      Remote Access Security

      Remote Access Security Overview To protect your corporate data from attacks from intruders and from being accessed by unauthorized users, you need to plan for and implement remote access security. You should authenticate remote access clients attempting to establish a remote connection with the remote access server. To secure connections to the corporate network, you

    • Active Directory Objects

      Active Directory Objects

      The Active Directory data store, also referred to as directory, contains data on users, groups, computers, and on which resources these users, groups, and computers can access. It holds all Active Directory information. Each domain controller within a domain holds a readable/writable replica of the Active Directory data store that consists of information pertaining to

    microsoft-windows
    467 queries in 0.727 seconds.