• Main Menu
  • Microsoft Windows

    • Planning a Group Policy Strategy

      Planning a Group Policy Strategy

      On Overview on Group Policy Before you can consider to even begin planning a Group Policy implementation in your organization, you have to understand a few important aspects of Group Policy. Microsoft initially introduced group policies in Windows NT to assist administrators in managing the desktop configuration settings of users and computers. Windows Server 2000

    • What is a Segmentation Fault?

      What is a Segmentation Fault?

      The term “segmentation fault” refers to an error received on computer systems, especially Unix-based operating systems, when a program is attempting to perform an action that is unavailable or not allowed. Segmentation faults often arise when a program is attempting to access memory that the computer cannot locate or when a user or program is

    • Understanding DNS Queries and Lookups

      Understanding DNS Queries and Lookups

      DNS Queries Overview The naming system used by DNS is a hierarchical namespace, called the DNS namespace. The DNS namespace has a unique root. The root can contain numerous subdomains. Each subdomain also can contain multiple subdomains. Each domain registered in DNS is connected to a DNS name server. The DNS server of a domain

    • Monitoring IPSec

      Monitoring IPSec

      Using the IP Security Monitor Snap-In to Monitor IPSec The IP Security Monitor snap-in, a new feature in Windows Server 2003, can be used to monitor and troubleshoot IPSec activity. The IP Security Monitor snap-in provides enhanced IPSec security monitoring. As long as the IPSec policy is active, you can monitor how the IPSec policy

    • Active Directory Authentication Types

      Active Directory Authentication Types

      The two types of authentication are Mutual Authentication and NTLM. Mutual Authentication requires both the server and the client to identify them. NTLM only requires the client to be validated by the server. Two types of authentication are Mutual Authentication and NTLM Authentication. Mutual Authentication Mutual Authentication is a security feature in which a client

    • VMWare Error 1335

      VMWare Error 1335

      Computer professionals have used the VMWare workstation for a number of years to test software on different types of operating systems on a single computer. Those who purchase and download the VMWare software from the online store often encounter VMWare error 1335. This error is typically as a result of downloading the incorrect software build,

    • How to Solve “Windows Installer Service Could not be Accessed”

      How to Solve “Windows Installer Service Could not be Accessed”

      Windows Installer is a very important component of all Windows operating systems. It installs, uninstalls, and supports applications and software. If the Windows Installer is corrupted or the service stops for an unknown reason, an error message comes up. The error message typically appears as: “The Windows Installer Service could not be accessed. This can

    • 0xc0000135

      0xc0000135

      Windows error 0xc0000135 is displayed when an application fails to initialize properly. It is also displayed when a new program, game, or plug-in is installed and fails to work properly due to the wrong version of .Net being installed on the computer or as a result of a computer malware infection. Is the .Net Environment

    • Understanding Internet Connections

      Understanding Internet Connections

      Internet Connectivity Introduction  In most organizations and networks today, Internet connectivity is no longer an additional option, but a necessity. Most organizations that have a networking environment need to provide its employees or users with some form of connectivity to the Internet. E-mail and Web sites have evolved into being important mechanisms for a vast

    • Monitoring BizTalk Server

      Monitoring BizTalk Server

      The Different Monitoring Tools for Monitoring Windows and BizTalk Server Systems You can use System Monitor, Task Monitor, Network Monitor, Event Viewer, and Performance Logs And Alerts to monitor the system. You can use System Monitor and Performance Logs And Alerts to create baselines, identify bottlenecks, determine performance trends, and test any configuration changes. Windows

    116 queries in 0.280 seconds.