• Main Menu
  • Microsoft Windows

    • NTFS File Compression

      NTFS File Compression

      One feature available when you format a volume with the NTFS file system is file compression. NTFS compression can only be applied to a partition or volume that is formatted with the NTFS file system. Through NTFS, you can create additional storage space for files by compressing either single files, or all files in a

    • How to Solve “Cannot Copy the Path is Too Deep” with My USB Drive

      How to Solve “Cannot Copy the Path is Too Deep” with My USB Drive

      If the error “Cannot Copy the Path is Too Deep” is displayed while a USB drive is being used, it is possible that there is a problem accessing the data on the drive. This is not an uncommon problem and it occurs especially when a USB storage device is used on different computers. A well

    • NetBEUI

      NetBEUI

      NetBEUI (NetBIOS Extended User Interface) is a program used for communication between applications installed on separate computers within the same LAN (Local Area Network). It is an upgraded version of NetBIOS and provides much more flexibility and functionality by rearranging the information in a data transmission. Like NetBIOS, NetBEUI is not a networking protocol and

    • Implementing Folder Redirection with Group Policy

      Implementing Folder Redirection with Group Policy

      Folder Redirection is a Group Policy feature that enables users to redirect the system folders containing the profile of a user on the network, through the use of the Folder Redirection node in the Group Policy Object Editor console. This basically makes folder redirection a user configuration option. Through the use of the Folder Redirection

    • Understanding the Microsoft Model

      Understanding the Microsoft Model

      Microsoft Model Overview Before Windows NT 3.1 was released, users had to obtain the TCP/IP protocol suite from a third party, and then install it. This was necessary for users to connect to the network, which in turn usually resulted in a number of issues. When it came to network communication, the TCP/IP software which

    • NetBIOS Names

      NetBIOS Names

      A NetBIOS name is an identifier that NetBIOS services running on a computer use. It is a combination of a 15 character (byte) name and a 16th character denoting the service. These names identify resources on the NetBIOS network. NetBIOS cannot do name resolution on the Internet because NetBIOS names are single part names and

    • Understanding Internet Security and Acceleration Server (ISA Server)

      Understanding Internet Security and Acceleration Server (ISA Server)

      Internet Security and Acceleration Server (ISA Server) Overview Microsoft Internet Security and Acceleration Server (ISA Server) is combination of a firewall and Web caching server that can be used to protect the enterprise from external access, while sharing a internet connection on the network. The multilayer firewall of ISA Server protects valuable network resources of

    • Replication Topology in Active Directory

      Replication Topology in Active Directory

      Replication Topology is the route by which replication data travels throughout a network. Replication occurs between two domain controllers at a time. Over time, replication synchronizes information in Active Directory for an entire forest of domain controllers. To create a replication topology active directory must determine which domain controller's replicate data with other domain controllers.

    • Group Policy

      Group Policy

      Group Policy gives users administrative control over people and computers in the user’s network. By using Group Policy, users can define the state of someone’s work environment once, then rely on Windows Server 2003 to continually force the Group Policy settings applied across an entire organization or to specific groups of people and computers. Group

    • Active Directory Authentication Types

      Active Directory Authentication Types

      The two types of authentication are Mutual Authentication and NTLM. Mutual Authentication requires both the server and the client to identify them. NTLM only requires the client to be validated by the server. Two types of authentication are Mutual Authentication and NTLM Authentication. Mutual Authentication Mutual Authentication is a security feature in which a client

    125 queries in 0.455 seconds.