• Main Menu
  • Microsoft Windows

    • Global Catalog in Active Directory

      Global Catalog in Active Directory

      Domains and Forests can also share resources available in active directory. These resources are searched by Global Catalog across domains and forests and this search is transparent to user. For example, if you make a search for all of the printers in a forest, this search goes to global catalog server for its query and

    • Deploying Service Packs and Hotfixes

      Deploying Service Packs and Hotfixes

      What are Service Packs and Hotfixes Service packs and hotfixes are network updates that need to be applied to network computers. Hotfixes are also sometimes referred to as security hotfixes or security fixes. Before delving into the differences between service packs, and hotfixes; you can think of a service pack as being a collection of

    • Monitoring Network Activity

      Monitoring Network Activity

      Monitoring Network Activity with Network Monitor The tool which you can utilize to both monitor and log network activity as it occurs on the network is the Network Monitor. You can use the information obtained from Network Monitor to optimize network traffic as well. Network Monitor stems directly from the Windows NT Network Monitor. Network

    • Implementing Folder Redirection with Group Policy

      Implementing Folder Redirection with Group Policy

      Folder Redirection is a Group Policy feature that enables users to redirect the system folders containing the profile of a user on the network, through the use of the Folder Redirection node in the Group Policy Object Editor console. This basically makes folder redirection a user configuration option. Through the use of the Folder Redirection

    • Considerations in Planning a Network Infrastructure

      Considerations in Planning a Network Infrastructure

      Defining Network Infrastructure A network can be defined as the grouping of hardware devices and software components which are necessary to connect devices within the organization, and to connect the organization to other organizations and the Internet. Typical hardware components utilized in a networking environment are network interface cards, computers, routers, hubs, switches, printers, and

    • Understanding and Managing SMTP Virtual Servers

      Understanding and Managing SMTP Virtual Servers

      Simple Mail Transfer Protocol (SMTP) Service Overview The Simple Mail Transfer Protocol (SMTP) service, a primary service included as part of IIS, performs the key functions and has the characteristics listed below: SMTP can be used to forward mail from one SMTP host to another. SMTP cannot deliver mail directly to the client. Mail clients

    • Understanding Proxy Server

      Understanding Proxy Server

      Proxy Server Overview Proxy Server enables you to connect the private network or LAN to a public network such as the Internet, by acting as a gateway for internal client computers to the Internet. Proxy Server is a secure gateway which you can use to provide Internet connectivity for IP and IPX based networks. A

    • How Do I Open XLS Attachments?

      How Do I Open XLS Attachments?

      An XLS attachment is an attachment for the Microsoft Office Excel program. This program allows for easy to make spread sheets. When you save the file, it is saved as a .xls. You can easily email an individual with a XLS attached and opening them is easy. The problem comes when you don’t have Excel

    • MSOCACHE

      MSOCACHE

      MSOCACHE (Local Install Source) is a setup feature that Microsoft deploys with Microsoft Office 2003. It is a hidden folder that is installed on the target computer’s local hard drive. It can occupy up to 290 Megabytes (MB) of space depending on the Microsoft Office programs that are installed on the computer. This feature eliminates

    • Microsoft PowerPoint Password Recovery

      Microsoft PowerPoint Password Recovery

      Microsoft PowerPoint documents can utilize two passwords: Password to open Password to modify Password to open The Password to open requires a user to enter a password to view the document. When the user sets a Password to open, the entire Microsoft PowerPoint document is encrypted with the RC4 stream cipher. Password to modify The

    177 queries in 1.066 seconds.