tag:blogger.com,1999:blog-4686387457371868462024-03-14T03:37:16.860-07:00Wireless Network TechnologyVarious kind of wireless network technology, computer technology, information technology, Ethernet security,isp,network security,wireless internet,wifi internet,wireless network,wi-fi network and various type of Tips and tricks are Known from this site.Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.comBlogger117125tag:blogger.com,1999:blog-468638745737186846.post-12152750575429117842013-01-19T08:22:00.001-08:002013-01-19T09:08:38.398-08:00Domain Name System (DNS) Tutorial<p><strong>Contents </strong></p> <p>   1. Domain Name System (DNS) <br />   2. DNS Components <br />         2.1 DNS Servers <br />         2.2 DNS Data Base <br />         2.3 DNS Client <br />   3. Prerequisite Steps <br />         3.1 Static IP Address <br />         3.2 Steps to Assign Static IP to Server <br />         3.3 Steps to verify your static IP <br />   4. Domain Namespace <br />   5. Zone Types <br />         5.1 Primary and secondary zones <br />         5.2 Stub zones <br />         5.3 Active directory integrated zone <br />   6. Benefits <br />         6.1 Multi master replication <br />         6.2 Stream line data replication <br />         6.3 Secure dynamic updates <br />         6.4 Backward compatible to secondary zones <br />   7. Forward and Reverse look up <br />   8. Dynamic updates <br />   9. DNS Records <br />         9.1 A [Host]: <br />         9.2 PTR [Pointer]: <br />         9.3 SOA [Start of Authority]: <br />         9.4 SRV [Service Locator]: <br />         9.5 NS [Name Server]: <br />         9.6 MX [Mail Exchanger]: <br />         9.7 CNAME [Alias]: <br />  10.  Zone Transfers: <br />         10.1 AXFR [Full Transfer]: <br />         10.2 IXFR [Incremental Transfers]: </p> <h4><strong></strong></h4> <h4><strong>Domain Name System (DNS)</strong> </h4> <p>DNS stands for Domain Name System, which is basically an internet service to translate (convert) the domain names in to IP addresses as domain names are alphabetic and easy to remember then IP addresses. A distributed database is used to implement and store this name and address information for all public hosts on the internet.</p> <p><u><strong></strong></u></p> <p><u><strong>DNS Components</strong></u></p> <p><strong><u></u></strong></p> <p><strong><u>DNS Servers</u></strong> </p> <p>Responsible for answering queries (Request to translate name and IP addresses).DNS server change domain names to IP addresses and locating the hosting server.</p> <p><strong><u></u></strong></p> <p><strong><u>DNS Data Base</u></strong> </p> <p>Contain information about name and IP addresses where DNS server goes to and looks for the required information (or answer to the request).</p> <p><u><strong></strong></u></p> <p><u><strong>DNS Client</strong></u> </p> <p>It sends the requests to the DNS server and communicates with DNS server for translation of host name to IP address.</p> <p><strong></strong></p> <p><strong>Prerequisite Steps:</strong></p> <p><strong><u></u></strong></p> <p><strong><u>Static IP Address</u></strong> </p> <p>Make sure that the server where you want to install DNS is configured with static IP. Whenever you are installing a network service on a server and you have to provide the service to clients you need static IP as you should not be a moving target.</p> <p><strong><u></u></strong></p> <p><strong><u>Steps to Assign Static IP to Server</u></strong> </p> <p>    * Open start menu and Go to Network and sharing center <br />    * On the left side of the window click on Manage Network Connections <br />    * Right Click on the given connection and Disable it <br />    * Now Right click and go to properties of the connection <br />    * Click on Internet Protocol Version 4(TCP/IP4) and then click the properties <br />    * Select Radio Button “Use the following IP address” and write the appropriate static IP address in the given text area <br />    * Now right Click and Enable the Connection </p> <p><strong><u></u></strong></p> <p><strong><u>Steps to verify your static IP</u></strong> </p> <p>    * Go to start menu, and open up Command Prompt as Administrator <br />    * In the Command Prompt window Type ipconfig  /all <br />    * Notice the line “DHCP Enabled. No” which means it has static IP configuration </p> <p><strong><u></u></strong></p> <p><strong><u>Domain Namespace</u></strong> </p> <p>Domain Name space is higher archival naming convention used by DNS to locate given host name in the given domain relative to domain tree. It based on levels that are </p> <p>    * Root- Domain <br />    * Top- Level Domain <br />    * Second- Level Domain <br />    * Sub –Domain </p> <p><strong><u></u></strong></p> <p><strong><u>Zone Types</u></strong> </p> <p>Zones come in a two different types. <br />Primary and secondary zones </p> <p>Primary and secondary are standard zone types. This is how DNS used to work. It still can work same way but it is not common any more. </p> <p>    * Primary <br />          o Master <br />          o Read/write <br />          o Primary is the master read write copy of the zone. Whatever server is hosting the primary zone will have the master read/write copy of the zone data base coy of the hard drive. <br />    * Secondary <br />          o Read only <br />          o A DNS server hosting a secondary zone has a read only copy of the database. So no changes can be made. It has the full database it can respond to client requests and it is used for the exact purpose but updates cannot be made. <br />    * Stub <br />          o Only contains information about other DNS servers. <br />          o A stub zone only contains information about other DNS servers. It does not have a full database. <br />    * Active Directory Integrated <br />          o DNS database is stored as an active directory object. <br />          o Active directory integrated zones take the place of all primary and secondary. Now the DNS database is stored as an active directory object eliminating that master read/write copy having a single master. Now we can use the multi master topology that active directory provide for us. </p> <p><strong><u></u></strong></p> <p><strong><u>Stub zones</u></strong> </p> <p>    * DNS allows for delegations. <br />    * A delegation is where another DNS server has been delegated the authority over a sub-domain. <br />    * Before stub zones, all delegations had to be managed manually. <br />    * A stub zone allows for the automatic propagation of delegation to DNS servers. </p> <p><strong><u></u></strong></p> <p><strong><u>Active directory integrated zone</u></strong> </p> <p><strong></strong></p> <p><strong>Active directory integrated zone has many benefits.</strong></p> <p><strong><u></u></strong></p> <p><strong><u>Benefits </u></strong></p> <p>    *  Multi master replication <br />    *  Stream line data replication <br />          o Now we have DNS and active directory databases together and replicate them altogether as one. </p> <p>    *  Secure dynamic updates <br />          o Dynamic updates can now be secure to have only clients that have been authorized by the active directory database can update the DNS server, which stop somebody generically out of the internet for updating your DNS server. <br />*    Backward compatible to secondary zones <br />          o In active directory integrated zone will act as a primary zone. If you have older DNS server or UNIX bind DNS server which you want to keep functioning but it does not have the mechanism to support active directory integration. Simply make old DNS server in to a secondary zone DNS server pointing to one of the active directory integrated DNS servers as its primary and everything will work just fine. </p> <p><strong></strong></p> <p><strong>Forward and Reverse look up</strong> </p> <p>    * Forward look up <br />          o Name to IP address <br />          o Widely used <br />    * Reverse Look up <br />          o IP address to name <br />          o Not always needed <br />          o Usually used to meet the needs of a particular application (very often for validation purposes) </p> <p><strong><u></u></strong></p> <p><strong><u>]Dynamic updates</u></strong> </p> <p>    * Before dynamic updates all DNS information was manually entered. <br />    * Now records can be dynamically added (or updated) from the client. <br />    * Updates can be secured with active directory integrated zones. (Authorized users) <br />    * Dynamic updates can be integrated with other network services. (I.e. DHCP). <br />          o DHCP inform DNS to make a record that an IP address has been given. </p> <p><strong><u></u></strong></p> <p><strong><u>DNS Records</u></strong> </p> <p>The record can be added to the zone files we create. With the help of standard DNS query the DNS Resolver class resolves the domain names.As a result of the DNS query there is a DNS response that contains the DNS record for that query. And this DNS record contains the information depending upon the type of DNS resource record. There are many DNS record of different types but some of the records are commonly used. These are following:</p> <p><strong><u></u></strong></p> <p><strong><u>A [Host]:</u></strong> </p> <p>The A record or Host record resolves the Host name in to IP addresses and it is a typical Forward Lookup Record.  And A Record maps an IPv4 address to a hostname.</p> <p><strong><u></u></strong></p> <p><strong><u>PTR [Pointer]:</u></strong> </p> <p>The PTR or Pointer Record resolves the IP addresses to a Host name and it is exactly opposite to the A or Host Record and also called a Reverse Lookup Record</p> <p><strong><u></u></strong></p> <p><strong><u>SOA [Start of Authority]:</u></strong> </p> <p>This is the first record in any zone file and it is most authoritative for the zone.It gives the foundation and the starting point for the zone database. The SOA Record is added automatically created when we add a zone.</p> <p><strong><u></u></strong></p> <p><strong><u>SRV [Service Locator]:</u></strong> </p> <p>SRV Service Locator Records are used to represent a certain service that a computer is may be offering. They are typically use in conjunction with active directory.Active Directory requires DNS in order for its clients to locate the presence of domain controllers. When a user attempts to login for instance the client machine go out to its DNS Server to find the domain controller for the particular domain. It is the SRV Resource Record that resolves the query and directs it towards the domain controller services for that particular domain. The A record works in correspondence with the SRV Record to resolve the hostname in to IP addresses.</p> <p><strong><u></u></strong></p> <p><strong><u>NS [Name Server]:</u></strong> </p> <p>The Name Server or NS Record identifies the DNS Servers that are authoritative in each zone. And it specifies a name server for the particular domain that allows the DNS lookups within the different zones in the domain.</p> <p><strong><u></u></strong></p> <p><strong><u>MX [Mail Exchanger]:</u></strong> </p> <p>The MX or Mail Exchanger Record is used to help email give from one point to another suppose when you want to send an email to some body at sbk.edu.pk there are the DNS server over the internet that have MX or Mail Exchanger Record which point to our Email server. The Mail Exchanger Record specifies a mail exchange server for the particular domain that allows the mails to deliver to that particular mail server in the domain.</p> <p><u><strong></strong></u></p> <p><u><strong>CNAME [Alias]:</strong></u> </p> <p>The CNameor Canonical Name or simply refers to Alias some times. The CNAME Record resolves the Alias to a host name. For example when you go to www.microsoft .com then now the Microsoft might have the web server named webserv1.microsoft.com.when any body types www.microsoft .com the CNAME Record has been actually created where www.microsoft.com is directed to webserver1.microsoft.com.</p> <p><strong><u></u></strong></p> <p><strong><u>Zone Transfers:</u></strong> </p> <p>Zone transfers are only used with the Standard zones that are Primary and Secondary Zones. They cannot use with Active Directory Integrated zone. Replication takes place in active directory integrated zone as part of active directory replication. When we use standard zones Primary or Secondary we use Zone Transfers for this replication. There are two different types of zone transfers</p> <p><strong><u></u></strong></p> <p><strong><u>AXFR [Full Transfer]:</u></strong> </p> <p>AXFR means transfer the entire database. Older version of DNS has to do it every time there is an update. AXFR is really only used when we first create a secondary zone to get the entire database to come over or for the recovery of database.</p> <p><strong><u></u></strong></p> <p><strong><u>IXFR [Incremental Transfers]:</u></strong> </p> <p>IXFR is used to for the incremental transfers and most commonly used now days. IXFR is used to save our bandwidth so that when changes made only that changes must be added to the secondary. </p> <p>Note: The DNS Zone Transfers can be a Security risk as there are number of issues surrounding zone transfers for example a hacker might be able to create the DNS Server and can tell your primary database that it is the secondary database through all the data here. Zone transfers are less secured then the Active Directory Integration.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-82523245797163122013-01-19T07:46:00.000-08:002013-01-19T08:24:50.927-08:00Active Directory Domain Services (ADDS) Tutorial<h3>
<b>Contents</b></h3>
<h4>
1
Directory:</h4>
<h4>
<b>2
</b>Active Directory:</h4>
<h4>
<b>3
</b>Active Directory Domain Services (ADDS):</h4>
<h4>
<b>4
</b>Rules and Features in Active Directory Domain Services:</h4>
<h4>
<b>5
</b>Benefits of Active Directory Domain Services:</h4>
<h4>
<b>6
</b>Important Terms, Tools and Concepts in AD DS:</h4>
<ol><b>6.1
FQDN (Fully Qualified domain Name):</b></ol>
<ol><b>6.2
Active Directory Users and Computers:</b></ol>
<ol><b>6.3
User:</b></ol>
<ol><b>6.4
OU (Organizational Unit):</b></ol>
<ol><b>6.5
Group Policy Object (GPO):</b></ol>
<h4>
<b>7
</b>Benefits of using GPO</h4>
<h4>
<b>8
</b>Roaming Profile</h4>
<h4>
<b>9
</b>The Issues with Roaming Profile:</h4>
<h4>
<b>10
</b>Network Drive (Z drive)</h4>
<h4>
<b>11
</b>Advantages Network Drive:</h4>
<h4>
<b>12
</b>Home Directory/ Home Folder:</h4>
<h4>
<b>13
</b>Assigning Home Folder:</h4>
<u>
<h4>
<b>ACTIVE DIRECTORY DOMAIN SERVICES (ADDS)</b> </h4>
</u>
Active directory was introduces on 1990’s and implemented in Windows 2000
Server with its release in 2000. Windows Server 2003 and Windows Server 2008
used Active Directory with its expansions during time. Window 2000 Server,
Windows Server 2003 and Windows Server 2008 use Active Directory domain Services
as a base for distributed networks (distributed computing network system).<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="_Toc281068711"> </a><br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Directory:"></a><u>Directory:</u></h4>
The listing of objects in the comprehensive way general data base of
information or repository is known as directory.<br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Active-Directory:"></a><u>Active Directory:</u></h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="_Toc280463700"></a><a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="_Toc280460727"></a>Active directory provides
a way to store and avail information related to the network objects to other
users, administrator and applications. The objects organized inform of
organizational units (OUs), domain, sites, trees and forests. Active directory
with the standard protocols is accessible by third party directory services
because it can easily exchange and use the information effectively.<br />
Active Directory in Windows Server 2008 R2 with the expand functionalities
provide centralized administration to its users and application objects. The
management of related identities are provided for the network of organization by
Active Directory.<br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Active-Directory-Domain-Services-ADDS-:"></a><u>Active Directory
Domain Services (ADDS):</u></h4>
The Active directory domain Services stores information and use stored data
in the computer network. It has hierarchal structure for network objects.
Objects include in the network are users, resources, computer accounts, security
policies and applications. The user account in the Active directory can stores
names, email address and password which are the example of particular
information stores in the directory. Active Directory Domain Services make the
server domain controller and it is integrated with Domain Name system (DNS).The
data is protected from unauthorized use and access of objects by any
unauthorized access. The integration of AD DS with operating system and other
applications has different capabilities like shared resource management. AD DS
provides easier access of data for the users and administrator. <a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="_Toc281068714"></a><br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Rules-and-Features-in-Active-Directory-Domain-Services:"></a><u>Rules
and Features in Active Directory Domain Services:</u></h4>
The following features are included in Active Directory domain Services<br />
<ul>
<li>Access control to resources and authenticated logon for the users for the
security integration in AD DS
</li>
<li>Central management and organization by administrator with single network
logon
</li>
<li>The specific formats and limits for the objects and their related attributes
</li>
<li>The use of global catalogue by the users and administrator for information
about the objects
</li>
<li>Index mechanism provide query system for the easy access of network objects
and their attributes
</li>
<li>Centralized management of network with the security
</li>
<li>Comprehensive use of network object and properties with protected management
</li>
</ul>
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Benefits-of-Active-Directory-Domain-Services:"></a><u>Benefits of
Active Directory Domain Services:</u></h4>
Active Directory Domain Services is very secure with the comprehensive
solution for the span network in multiple locations.<br />
<ul>
<li>Ease of administration with centralized secure management
</li>
<li>Comprehensive management with the increasing number of objects (users,
computers and roles)
</li>
<li>Provide single view of the users with proper management
</li>
<li>Single network with different mechanisms of security
</li>
<li>Automation for the administration tasks like managing and adding users and
groups or other works related to different objects </li>
</ul>
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Important-Terms-Tools-and-Concepts-"></a><u>Important Terms,
Tools and Concepts in AD DS:</u></h4>
<h5>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-FQDN-Fully-Qualified-domain-Name-:"></a>FQDN (Fully Qualified
domain Name):</h5>
The FQDN is specified for the host, internet or specific computer. It is the
complete name with two parts host name and domain name and also top level
domain. Like project.sbk.com is FQDN where project is host name, “sbk” is second
level domain and com is top level domain. FQDN has specific location in the
hierarchy of Domain Name System (DNS).<br />
<h5>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Active-Directory-Users-and-Computer"></a>Active Directory Users
and Computers:</h5>
The active Directory Users and Computers is tool and a console snaps in
introduced by Microsoft for the management purposes. You can create user and
computer accounts; set their security policies an2d you can also apply group
policies.<br />
<h5>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-User:"></a>User:</h5>
User is the person who can use any specific computer in the given environment
with the specified policies. You can log on the computer by the Active Directory
user account. The Active Directory account identifies the user and establish
authentication so that the user can use the resources within the domain.<br />
<h5>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-OU-Organizational-Unit-:"></a>OU (Organizational Unit): </h5>
Organizational Unit let you organize the users in one container that can hold
all user and computer accounts that have common needs so that can be easily
managed and supported by the administrator. The example is an OU Students that
is for all the common users. The domain can contain the collection of different
OUs with the same policies like security (password policy) that is basically
same for every user in the OU. The organizational unit administrator is
responsible for user and computer account maintenance in the OU.<br />
<h5>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Group-Policy-Object-GPO-:"></a>Group Policy Object (GPO):</h5>
Group policy object is the tool which provides centralized configuration and
management for the operating system and let you set rules on user and computer
accounts in the Active Directory as the system administrator. It is used in the
small businesses and organizations very commonly. Group policy object will store
the configured setting of Active Directory. The management and configuration of
software, desktop and network environments can be done by GPO. The Group Policy
is the feature in Windows Server 2008’s Server Manager you need to install so
that you could use and manage multiple accounts. Group Policy management console
let you easily use different policies for the group policy objects.<br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Benefits-of-using-GPO"></a><u>Benefits of using GPO</u></h4>
There are some uses of Group Policy Objects<br />
<ul>
<li>You can block as the administrator the devices for specific users
</li>
<li>The improved security implementations for devices and users using firewall
and IPsec
</li>
<li>Categorized management of resources makes it possible to easily deploy and
manage the resources
</li>
<li>You can manage multiple groups, logs and event in the GPO </li>
</ul>
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Roaming-Profile"></a><u>Roaming Profile</u></h4>
The roaming profile let you store and access the shared documents and desktop
setting on the same network with the customize settings seamlessly. The roaming
profile stores your customized data on the server; you can get access of your
profile data in the same way as you saved last time even using the other
computers on the network so roaming profile makes it possible by just joining
the domain regardless of location. Administrator can control and designate the
roaming profile to the domain administrator group and other groups and
accounts.<br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-The-Issues-with-Roaming-Profile:"></a><u>The Issues with Roaming
Profile:</u></h4>
The roaming profile bandwidth problems can appear inform of time consuming
logging in and logging off from the account. The transformation and use of
higher bytes of data is not possible with it and it can create problems for the
different accounts of the users log in at the same time.<br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Network-Drive-Z-drive-"></a><u>Network Drive (Z drive)</u></h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="_Toc280463714"></a><a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="_Toc280460741"></a>Network drive is the
shared space on the hard disk for different users in the network. It is a
central location for the users provided on the server also known as remote
drive. The data from here is accessible by the authorized users of the domain.
Mapping the network drive can be the time saver to access data files and folders
from remote computer (Server). The path of drive is specified for each user in
the network so the users can easily access their required data.<br />
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Advantages-Network-Drive:"></a><u>Advantages Network
Drive:</u></h4>
Network drive has the following benefits:<br />
<ul>
<li>A user do not need to follow and remember a large path to access the data,
you just need to open ‘‘My Computer’’ and the access allocated drive by the
administrator
</li>
<li>You do not need to shift and transfer data after each modification, your
data is save at your network drive
</li>
<li>In case of any problem in the client computer data is accessible in the
centralized domain controller or server </li>
</ul>
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Home-Directory-Home-Folder:"></a><u>Home Directory/ Home
Folder:</u></h4>
Home directory is used for the user so that they can save securely their data
and could easily access the data. The users can have their unique and individual
home directory to save and use data. The UNC (Universal Naming Convention) path
is used and you can access your home drive from any directory. The users can
save the images, music, videos and text document in the home drive. In command
line activities it is called home directory and in graphical user interface it
is known as home folder. The user profile is used as the default home folder for
the user accounts. It has following benefits:<br />
<ul>
<li>Provide backup of important data on the server central to separate users by
the administrator
</li>
<li>Central collection of files makes the management easier for the
administrator
</li>
<li>Secure data by providing separating system data and user’s data, and
providing recovery to data
</li>
<li>The large files can be store easily
</li>
<li>The user can access the data from any connected computer in the network
</li>
</ul>
<h4>
<a href="http://www.blogger.com/blogger.g?blogID=468638745737186846" name="TOC-Assigning-Home-Folder:"></a><u>Assigning Home
Folder:</u></h4>
You can assign home folder to the domain users easily by the following the
instructions.<br />
<ul>
<li>Home folder path should be specified
</li>
<li>The shared permissions should permit the user to access the home folder
</li>
<li>Assign the home folder to the domain user </li>
</ul>
<br />Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com2tag:blogger.com,1999:blog-468638745737186846.post-15691931524161879152013-01-19T03:55:00.000-08:002013-01-19T04:14:18.539-08:00What is Hidden Camera ? How to find it?Now a days <a href="http://www.smartstun.com/HIDDEN-Cameras-w-DVRs_c_62.html" target="_blank"><b>Hidden Cameras</b></a> can be used for fun or serious business purpose. Hidden Cameras are hide in plants, radios, books, smoke detectors, desk plants, house plants, tissue boxes, DVD cases, air filter equipment, eye glasses, lava lamps, it looks like little hole, no bigger than this "o," somewhere on the side facing the room.<br />
<br />
surveillance systems at gainable prices for every person. When you need for prevention of losses in your business or the privacy of your Family and valuables at home, purchase one of hidden spy cameras today. Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com0tag:blogger.com,1999:blog-468638745737186846.post-37498932748892354752013-01-14T07:14:00.001-08:002013-01-14T07:14:58.409-08:00Installation and Configuration of DNS on Windows Server 2008<h4><u>Installation and Configuration of DNS</u></h4> <ul> <li>Go to the Start Menu and select Server Manager <p><a href="http://lh6.ggpht.com/--z6BvIQfmqU/ULy2Qpz_QTI/AAAAAAAAAJE/dCdv-wNRNRw/SERVER2008ADDS80.png?imgmax=800"><img title="SERVER 2008 ADDS (80)[1]" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="484" alt="SERVER 2008 ADDS (80)[1]" src="http://lh3.ggpht.com/-tKPh_MWWSfs/ULy2cnsoooI/AAAAAAAAAJM/W1sJN4aYpIE/SERVER2008ADDS8017.png?imgmax=800" width="390" border="0" /></a></p> </li> <li>The Server Manager Console will be open select Add Roles from Right pane <p><a href="http://lh5.ggpht.com/-a_qZwUxDBHQ/ULy3GbZbNhI/AAAAAAAAAJU/UW3yI5MZZWA/SERVER2008ADDS.png?imgmax=800"><img title="SERVER 2008 ADDS[1]" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="428" alt="SERVER 2008 ADDS[1]" src="http://lh4.ggpht.com/-ONPHWFNnf8A/ULzOeoIFl9I/AAAAAAAAAJo/sv0NhJLLT54/SERVER2008ADDS14.png?imgmax=800" width="510" border="0" /></a></p> </li> <li>The Add Roles Wizard will be open click Next <p><a href="http://lh6.ggpht.com/-dD4SCDDyciw/ULzO1QUsqWI/AAAAAAAAAJw/Cz4Axqpxj2U/SERVER2008ADDS1%25255B1%25255D.png?imgmax=800"><img title="SERVER 2008 ADDS (1)[1]" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="385" alt="SERVER 2008 ADDS (1)[1]" src="http://lh4.ggpht.com/-lTg1uU7MNH8/UMLoLgt7PsI/AAAAAAAAAKY/SBHD1BA2qX4/SERVER2008ADDS115.png?imgmax=800" width="521" border="0" /></a></p> </li> <li>Select The DNS Server Role from the Roles list and click Next <p><a href="file:///C:/server%20config%20text%20site/sites.google.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20INSTALLATION%20AND%20CONFIGURATION%20%283%296fb5.png?attredirects=0"><img title="DNS INSTALLATION AND CONFIGURATION (3)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="395" alt="DNS INSTALLATION AND CONFIGURATION (3)" src="http://lh5.ggpht.com/-1E-btoYw_NQ/UMLpkqjQkDI/AAAAAAAAAKg/ZQfhII3PjCA/DNSINSTALLATIONANDCONFIGURATION35.png?imgmax=800" width="535" border="0" /></a></p> </li> <li>Read the introduction to DNS Server and Click Next <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20INSTALLATION%20AND%20CONFIGURATION%20%284%290c65.png?attredirects=0"><img title="DNS INSTALLATION AND CONFIGURATION (4)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="403" alt="DNS INSTALLATION AND CONFIGURATION (4)" src="http://lh3.ggpht.com/-5S526KR-Zxs/UNWmN2vCudI/AAAAAAAAALw/2trjs-gcuRs/DNSINSTALLATIONANDCONFIGURATION45.png?imgmax=800" width="546" border="0" /></a></p> </li> <li>Review the Confirm Installation Selection and click Install <p><a href="file:///C:/server%20config%20text%20site/sites.google.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20INSTALLATION%20AND%20CONFIGURATION%20%285%296fb5.png?attredirects=0"><img title="DNS INSTALLATION AND CONFIGURATION (5)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="415" alt="DNS INSTALLATION AND CONFIGURATION (5)" src="http://lh6.ggpht.com/-BRP2DdV5j94/UNWmVGZILJI/AAAAAAAAAL4/pdOwVzzct-I/DNSINSTALLATIONANDCONFIGURATION55.png?imgmax=800" width="558" border="0" /></a></p> </li> <li>Check the Installation Progress <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20INSTALLATION%20AND%20CONFIGURATION%20%286%29010d.png?attredirects=0"><img title="DNS INSTALLATION AND CONFIGURATION (6)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="416" alt="DNS INSTALLATION AND CONFIGURATION (6)" src="http://lh5.ggpht.com/-gYamIYo3l8U/UNWmpFjHDwI/AAAAAAAAAMA/J_LO_9N838M/DNSINSTALLATIONANDCONFIGURATION65.png?imgmax=800" width="564" border="0" /></a></p> </li> <li>When the installation is succeeded click close to exit the installation wizard. <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20INSTALLATION%20AND%20CONFIGURATION%20%287%298b47.png?attredirects=0"><img title="DNS INSTALLATION AND CONFIGURATION (7)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="421" alt="DNS INSTALLATION AND CONFIGURATION (7)" src="http://lh5.ggpht.com/-W-LGaxfxJY8/UNWnIQxuy3I/AAAAAAAAAMI/dMjjbmqWGWo/DNSINSTALLATIONANDCONFIGURATION75.png?imgmax=800" width="571" border="0" /></a></p> </li> </ul> <b><u></u></b> <p><b><u>Configuration of DNS Zones</u></b></p> <ul> <li>Click on the Start menu select Administrative Tools and choose DNS to open DNS Manager Console <p><a href="file:///C:/server%20config%20text%20site/sites.google.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION6fb5.png?attredirects=0"><img title="DNS ZONES CONFIGURATION" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="375" alt="DNS ZONES CONFIGURATION" src="http://lh3.ggpht.com/-96YDD2hO1eI/UNWnRHK9y3I/AAAAAAAAAMQ/aiO5U6OShtU/DNSZONESCONFIGURATION611.png?imgmax=800" width="524" border="0" /></a></p> </li> <li>The DNS Manager Console will be open, now expand your computer name <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%281%29394c.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (1)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="380" alt="DNS ZONES CONFIGURATION (1)" src="http://lh4.ggpht.com/-XaZ3sTw159w/UNWnW6P7lMI/AAAAAAAAAMY/1TWlcKgC9dY/DNSZONESCONFIGURATION15.png?imgmax=800" width="523" border="0" /></a></p> </li> <li>Right Click on Forward Look up Zones and select New Zone from the list <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%282%29ed1f.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (2)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="388" alt="DNS ZONES CONFIGURATION (2)" src="http://lh6.ggpht.com/--EWlUTJrrE0/UNWnmI5I7vI/AAAAAAAAAMg/YSWsv_kt7SM/DNSZONESCONFIGURATION25.png?imgmax=800" width="535" border="0" /></a></p> </li> <li>On the New Zone Wizard click Next to continue <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%283%298a6a.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (3)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="420" alt="DNS ZONES CONFIGURATION (3)" src="http://lh4.ggpht.com/-P-l8IBMYiIk/UPQftfA6y2I/AAAAAAAAANI/VfLk7MOHTqI/DNSZONESCONFIGURATION35.png?imgmax=800" width="544" border="0" /></a></p> </li> <li>Choose Primary Zone for creating the primary forward look up zone and click the check box for storing the zone in Active Directory and click Next. <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%284%29a5cf.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (4)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="429" alt="DNS ZONES CONFIGURATION (4)" src="http://lh4.ggpht.com/-A9bEfeiNY5k/UPQfzmmNeDI/AAAAAAAAANQ/JUwnb5SBFsU/DNSZONESCONFIGURATION45.png?imgmax=800" width="555" border="0" /></a></p> </li> <li>Select To all DNS servers in this domain: project.cs.com (your domain name) and click Next <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%285%291e1a.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (5)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="432" alt="DNS ZONES CONFIGURATION (5)" src="http://lh4.ggpht.com/-w8zxuv4wuEA/UPQf47h0VcI/AAAAAAAAANY/Q-xICHWizQQ/DNSZONESCONFIGURATION55.png?imgmax=800" width="559" border="0" /></a></p> </li> <li>Give appropriate Zone Name and click Next <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%286%293b78.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (6)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="438" alt="DNS ZONES CONFIGURATION (6)" src="http://lh6.ggpht.com/-LJiF4Is1uN8/UPQgAo4HOhI/AAAAAAAAANg/74ox8W8KIRY/DNSZONESCONFIGURATION66.png?imgmax=800" width="565" border="0" /></a></p> </li> <li>Select the radio button to Allow Secure Dynamic Updates and click Next <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%287%29bfb9.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (7)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="424" alt="DNS ZONES CONFIGURATION (7)" src="http://lh4.ggpht.com/-ChZdtX9hZRU/UPQgefgehrI/AAAAAAAAANo/Ok8BKcrmFvY/DNSZONESCONFIGURATION76.png?imgmax=800" width="547" border="0" /></a></p> </li> <li>Review the Settings you specified and click Finish <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%288%2985f4.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (8)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="422" alt="DNS ZONES CONFIGURATION (8)" src="http://lh6.ggpht.com/-M3cd8ugpdx0/UPQguSuI9RI/AAAAAAAAANw/qU6FcC8OrZE/DNSZONESCONFIGURATION811.png?imgmax=800" width="544" border="0" /></a></p> </li> <li>The newly created zone (sbk_zone) is displayed under the forward look up zones <p><a href="file:///C:/server%20config%20text%20site/0eaacf38-a-62cb3a1a-s-sites.googlegroups.com/site/windowsserver2008guide/domain-name-system/installation-and-configuration-of-dns/DNS%20ZONES%20CONFIGURATION%20%289%29fcd2.png?attredirects=0"><img title="DNS ZONES CONFIGURATION (9)" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; border-right-width: 0px" height="415" alt="DNS ZONES CONFIGURATION (9)" src="http://lh5.ggpht.com/-kjgj0WakO-Q/UPQg4ppi4lI/AAAAAAAAAN4/4deTgW9o5cw/DNSZONESCONFIGURATION96.png?imgmax=800" width="568" border="0" /></a></p> </li> </ul> <p>Thank you…………</p> <p><a name="page-comments"></a></p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-32227268875677897132012-12-26T06:59:00.001-08:002012-12-26T07:09:29.884-08:00How to Join Windows 8 to Windows 2012 Domain Server<span class="data-post">1. Log on to the Windows 8 client computer you want to join to the domain.<br />
2. Make sure you have set static IP and you have the DNS IP address that's pointing
to the server.<br />
3. Type <strong>domain</strong> in the metro UI. Open up the <strong>Settings
Search </strong>and<strong> Join a Domain.</strong><br />
4. Select <strong>Change, </strong>Select the <strong>Domain</strong> radio
button, and type in the domain name.<br />
5. For this tutorial, Im using <strong>Domain.local </strong>and
Press <strong>OK.</strong><br />
6. You will be prompted to <strong>enter Domain Admin Credentials</strong>
to join computers to the domain. I will be using my Domain Admin account.<br />
7. If there were no problems with your credentials, follow the prompts to <strong>reboot</strong>.<br />
8. Once rebooted, Log into the local computer.<br />
9. You can see this by looking at the current username CLIENT-PC\LOCAL-USER.<br />
10. Press the <strong>left arrow</strong> to <strong>switch users</strong>.
Select <strong>Other User</strong>.<br />
11. You need to log in using S<strong>erver2012\Local Username</strong><br />
12. At this point, you are on the domain.</span><br />
Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-49670333739150395582012-12-26T01:13:00.001-08:002012-12-26T01:13:12.036-08:00How to Install Active Directory on Windows Server 2008 Tutorial<ul>
<li><code><span id="more-6703"></span></code>First Open <b>Server Manager</b> by clicking the icon in the Quick Launch toolbar, or from the Start > Administrative Tools > <b>Server Manager</b>.</li>
</ul>
<ul>
<li>Wait till it finishes loading, then click on <b>Roles > Add Roles</b> link.</li>
</ul>
<ul>
<li>In the Before you begin window, click <b>Next.</b></li>
</ul>
<ol>
<li>In the Server Roles window, click on check box to select <b>Active Directory Domain Services</b>, and then click <b>Next</b>.</li>
<li>In the Active Directory Domain Services window read the provided information if you want to, and then click <b>Next</b>.</li>
<li>In the Confirm Installation Selections, read the provided information if you want to, and then click <b>Next</b>.</li>
<li>Wait till the process completes.</li>
<li>When it ends, click <b>Close</b>.</li>
<li>Going back to Server Manager, click on the <b>Active Directory Domain Services link</b>, and note that there’s no information linked to it, because the <b>DCPROMO</b> command has not been run yet.</li>
<li>Go to Start > Run then type DCPROMO then enter the <b>Run</b> command, or click on the DCPROMO link from <b>Server Manager > Roles > Active Directory Domain Services</b>.</li>
<li>Depending
upon the question if AD-DS was previously installed or not, the Active
Directory Domain Services Installation Wizard will appear immediately or
after a short while. Click <b>Next</b>.</li>
<li>In the Operating System Compatibility window, read the provided information and click <b>Next</b>.</li>
<li>In the Choosing Deployment Configuration window, click on “<b>Create a new domain in a new forest</b>” and click <b>Next</b>.</li>
<li>Enter
an appropriate name for the new domain. Make sure you pick the right
domain name, as renaming domains is a task you will not wish to perform
on a daily basis. Click <b>Next</b>.</li>
<li>Pick a full domain name such as “mydomain.local” or “mydomain.com”.</li>
<li>The wizard will perform checks to see if the domain name is not already in use on the local network.</li>
<li>Pick
the right forest function level. Windows 2000 mode is the default, and
it allows the addition of Windows 2000, Windows Server 2003 and Windows
Server 2008 Domain Controllers to the forest you’re creating.</li>
<li>Pick
the right domain function level. Windows 2000 Native mode is the
default, and it allows the addition of Windows 2000, Windows Server 2003
and Windows Server 2008 Domain Controllers to the domain you’re
creating.</li>
<li><b>Note:</b> If you select “Windows Server 2008″ for the forest function level, you will Not be prompted to pick a domain function level.</li>
<li>The
wizard will perform checks to see if DNS is properly configured on the
local network. In this case, no DNS server has been configured,
therefore, the wizard will offer to automatically install DNS on this
server.</li>
<li><b>Note:</b> The first DCs must also be a Global Catalog. Also, the first DCs in a forest cannot be a Read Only Domain controller.</li>
<li>It’s most likely that you’ll get a warning telling you that the server has one or more dynamic IP Addresses. Running <b>IPCONFIG /all</b>
will show that this is not the case, because as you can clearly saw, I
gave the server a static IP Address. So, this come from IPv6. I did not
manually configure the IPv6 Address, hence the warning. In a network
where IPv6 is not used, you can safely ignore this warning.by clicking
on <b>Yes,the Computer will use a dynamic assigned IP address (Not recommended)</b></li>
<li>You’ll probably get a warning about DNS delegation. Since no DNS has been configured yet, you can ignore the message and click <b>Yes</b>.</li>
<li>Next,
if you want change the paths for the AD database, log files and SYSVOL
folder. For large deployments, carefully plan your DC configuration to
get the maximum performance.or leave it as default When satisfied, click
<b>Next</b>.</li>
<li>Enter the password for the Active
Directory Recovery Mode. This password must be kept confidential, and
because it stays constant while regular domain user passwords expire
(based upon the password policy configured for the domain, the default
is 42 days), it does not. This password should be complex and at least 8
characters long (with capital latter, small latter and number combination). I strongly suggest that you do NOT use the regular
administrator’s password, and that you write it down and securely store
it. Click <b>Next</b>.</li>
<li>In the Summary window review your selections, and if required, save them to an unattend answer file. When satisfied, click <b>Next</b>.</li>
<li>The wizard will begin creating the Active Directory domain, and when finished, you will need to press <b>Finish</b> and reboot your computer.</li>
</ol>
Reboot and you will have AD installed on your Win 2008 Server.<br />
Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-11725708902153105432012-12-26T01:11:00.001-08:002012-12-26T01:11:26.232-08:00How to Install DHCP on Windows Server 2008 TutorialTo do Install DHCP, you will need a <strong>Windows Server 2008</strong> system already installed and configured with a<strong> static IP address</strong> and <strong>Active directory</strong>.
You will need to know your network’s IP address range, the range of IP
addresses you will want to hand out to your PC clients, your DNS server
IP addresses, and your default gateway. Additionally, you will want to
have a plan for all subnets involved, what scopes you will want to
define, and what exclusions you will want to create.<br /> <span id="more-10195"></span><br /> 1. Click on <strong>Start</strong> then Click on <strong>Server Manager</strong>, click<strong> Roles</strong> from the Left <strong>then Click on <strong>Add Roles</strong>.</strong><br />
2. When the <strong>Add Roles Wizard</strong> comes up, you can click <strong>Next</strong> on that screen.<br />
<strong>Note:</strong> have a static IP address assigned on your server, and a Strong Password.<br />
3. Select the <strong>DHCP Server Role</strong>, and click <strong>Next.</strong><br />
<strong>Note</strong>:
Plan the IP network information, scope information, and DNS
information. If you only want to install DHCP server with no configured
scopes or settings, you can just click <strong>Next</strong>.<br />
4.Select
the network Connection Bindings by selecting the Network connection
that is going to assign IP addresses to your clients then click on <strong>Next.</strong><br />
5. Validate Your DNS Settings. to make sure everything is fine.<br />
6. Type the address of the WINS server if you are using one. if not then leave it as default and click next<br />
7. Click on add, to add a DHCP scope.<br />
8. Now Name yous Scope, Type the starting IP range and the ending IP address, subnet mask and default gateway which is optional.<br />
9. Make sure activate the Scope is check. Click OK then Click Next.<br />
10. Then no need to Configure DHCPv6 so click Disable and click next.<br />
11. leave the authorization default and click next. Unless you are a user.<br />
12. Confirm the Installation and click install, and that is it you are Done!<br />
Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com2tag:blogger.com,1999:blog-468638745737186846.post-49255706518529941592012-12-09T05:57:00.000-08:002012-12-26T06:16:26.232-08:00How to Set up VPN Server on Windows Server 2012Set up a VPN Server on Windows Server 2012. This tutorial shows
you how to install a VPN Server on Windows Server 2012, that's Setting up the firewall and Client
computer for a successful connection to the server.<br />
<h4>
Set up a VPN Server on Windows Server 2012:</h4>
1. Open the <b>Server Manager</b> and select <b>Add rolls and features.</b><br />
2. In “Select installation type” window check <b>Role based or feature based installation</b>. Next.<br />
3. <b>Select the local server</b> in the Select destination server window. Next.<br />
4. Now Select Remote access Role, and click on Add features button. Next.<br />
5. No more features so Im clicking <b>Next</b> in the “Select features” window.<br />
6. <b>Next</b> in the Remote Access window.<br />
7. Select Direct Access and VPN (RAS) under Role Services Window.Next.<br />
8. Leave everything default in the Select role services Window. Next.<br />
9. Click <b>Install</b> in the Confirm Installation selection Window. Then close once it finish the installation.<br />
10. You will now see a Remote access on the left pain, Click on it.<br />
11. Now click on More link, under SERVERS.<br />
12. Click on the Open<b> Getting Started Wizard</b> to complete the VPN configuration.<br />
13. Select <b>Deploy VPN Only</b><br />
14. This opens the MMC for Routing and Remote Access<br />
15. Right click the server and select <b>Configure and Enable Routing and Remote Access</b><br />
16. This launches the Setup Wizard<br />
17. Since their is only one network interface you will need to choose Custom Configuration. Next<br />
18. Check VPN Access. Next<br />
19. Finish the Wizard.<br />
20. You will need to enable users to <b>Dial-in</b> On a standalone server (default) this can be done in the Computer Management MMC,<br />
if you are in a domain environment you can do this in the User properties of Active Directory.<br />
<h4>
Define a Static Address ‘pool’</h4>
Since you don’t have a DHCP Server in our VPS Environment you have to add a static address pool.<br />
1. Right click on the Remote Access server and select <b>Properties</b><br />
2. Select the IPv4 tab and select Static address pool<br />
<h4>
Firewall Settings</h4>
Now that your <b>VPN installation</b> is complete you will need to modify your Windows Firewall to allow the VPN traffic You will need to open the following ports.<br />
<ol>
<li>For PPTP: 1723 TCP and Protocol 47 GRE (also known as PPTP Pass-through</li>
<li>For L2TP over IPSEC: 1701 TCP and 500 UDP</li>
<li>For SSTP: 443 TCP</li>
</ol>
<b>Windows Firewall</b><br />
<ol>
<li>Launch Windows Firewall</li>
<li>Click Allow a program of feature through Windows Firewall</li>
<li>Check Routing and Remote Desktop</li>
<li>Click OK</li>
</ol>
<h4>
Configure the Client Computer</h4>
1.
Click Start button –> Control Panel -> Network and Internet ->
Network and Share Center –> Click “Set up a new connection or
network” under the “Change your networking settings”.<br />
2.Select ” Connect to a workplace” and click Next.<br />
3. Use my internet connection (VPN) –> Type the IP address and destination name in the box –><br />
4. Check ‘Don’t connect now; just set it up so I can connect later’ and click Next<br />
5. Now we need to Configure the VPN Connection so right click Properties.<br />
6. Select the Security Tab. in the Data encription drop down Select <b>“Optional encryption</b> <b>(Connect even with no encryption)</b>” Also Check <b>Allow these protocols</b> and place a check on Microsoft CHAP version 2 Click <b>OK</b>.<br />
7. Now Enter your VPN username and password to Connect to the VPN server.Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-35030898745520738392012-12-07T06:42:00.000-08:002012-12-26T06:48:00.970-08:00How to Set Up Remote Desktop Services on Windows Server 2012Simple tutorial on How to Set Up Remote Desktop Services on Windows Server 2012.<br />
<br />
<span id="more-12907"></span><br />
<strong>1. </strong>Click on<strong> Add Rolls Features</strong> from the <strong>Server Manager.</strong><br />
1. From the Dashboard click on “<strong>Add roles and features</strong>”. You will be presented with the “Before you begin screen. <strong>Click Next</strong>.<br />
2. In the “<strong>Installation Type</strong>” screen Select <strong>“Role-base or feature-based installation”.</strong> Click Next.<br />
3.
Select a destination server. This is a new feature of Windows 2012
where you have the ability to deploy roles and features to remote
servers and even offline virtual hard disks.<br />
4. In our case, we are selecting the current server from the server pool.Click Next.<br />
5. Select the “<strong>Remote Desktop Services</strong>” Click Next.<br />
6. Select<strong> Remote Desktop Session Host</strong> from the <strong>Select Roll Services window.</strong><br />
7. You will then be prompted to add features that are required for <strong>Remote Desktop Session Host</strong>. <strong>Click on Add Features</strong>. Click Next.<br />
8. Check mark <strong>Restart the destination server if require</strong>.Click <strong>Install</strong>.<br />
9. Once the server restart is ready for remote access.<br />
Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com0tag:blogger.com,1999:blog-468638745737186846.post-46027947062101521512012-12-04T07:03:00.000-08:002012-12-26T07:08:07.440-08:00How to install Active Directory 2012 Domain on Windows Server 2012 Tutorial<div class="MsoNormal" style="line-height: normal;">
<b><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">First we need to change the computer name. Windows
provides a default name in the form of WIN <random characters></span></b><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></b></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">1. To do it Go to
Server Manager > Dashboard screen, click on Local Server and then click on
the computer name hyperlink. This will take you to the all familiar System
Properties</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">2. Click Change, enter a
Computer Name and then click <b>OK</b>.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">3. You will be prompted
to restart your computer to apply the changes. Click Ok and then Click on
restart now.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">4. After your computer
has restarted, we will be presented with the Server Manager Screen. Now
we are ready to configure this server as an Active Directory Controller.</span></div>
<div class="MsoNormal" style="line-height: normal;">
</div>
<div class="MsoNormal" style="line-height: normal;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Second
</span></b><b style="color: black;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Assign a Static IP</span></b><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></b></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt;">1. To do so, from the Server Manager
> Dashboard screen, click on Local Server and then click on the Ethernet IP
hyperlink.</span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt;">2. Right click on the <b>Ethernet
adapter</b> > Click on Properties from the context menu.</span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt;">4. In the Ethernet properties select
the Internet Protocol version then click on Properties to assign an static IP.</span></div>
<div class="MsoNormal" style="line-height: normal;">
<b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Note:</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"> You can use the Gateway IP address as your Primary DNS,
Once you install Active Directory and DNS it will change to point to itself.</span></div>
<div class="MsoNormal" style="line-height: normal;">
</div>
<div class="MsoNormal" style="line-height: normal;">
<b><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">Third Make sure you have set the proper time and timezone on the
server before (AD DS)</span></b><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></b></div>
<div class="MsoNormal" style="line-height: normal;">
<b><span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">Adding the Active Directory Domain Services Role</span></b><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></b></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">1. From the Dashboard
click on “<b>Add roles and features</b>”. You will be presented with the
“Before you begin screen. <b>Click Next</b>. </span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">2. In the “<b>Installation
Type</b>” screen Select <b>“Role-base or feature-based installation”.</b> Click
Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">3. Select a destination
server. This is a <i>new feature of Windows 2012</i> where you have the ability
to deploy roles and features to remote servers and even offline virtual hard
disks.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">4. In our case, we are
selecting the current server from the server pool.Click Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">5. Select the “<b>Active
Directory Domain Services</b>”</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">6. You will then be
prompted to add features that are required for Active Directory Domain
Services. <b>Click on Add Features</b>, Click Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">7. If you want to add
additional features, you can do so from the next screen, otherwise click Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">8. You will now be
presented with the Active Directory Domain Services (AD DS) screen outlining
some information about AD DS and its requirements. Click next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">9. You now provided with
a summary of installation selections, The installation will now begin</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">10. Upon completion you
will see an installation succeeded message. Click Close.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">11. Back in Server
Manager, you will notice that AD DS has been added to the left navigation
tree. </span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">12. Click on it and then
click on <b>More…</b> on the right navigation pane where it states that
Configuration is required for Active Directory Domain Services.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">13. In the All Servers
Task Details Window, you will click on Promote this server to a domain
controller under Action.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">14. The Deployment
Configuration screen appears and we will select “<b>Add a new forest</b>” as
this is the first domain controller.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">15. Enter your Root
domain name and then click Next.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">16. The following screen
will then appear in which you will enter and select your Domain Controller
Options.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">17. You will then get a
warning in which you can ignore for now. Click Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">18. The NetBIOS domain
name will then be inputted automatically. In the event of a conflict, it
will suggest an alternative by appending the original name with a 0. Click Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">19. Confirm or change
the locations of your database folder, log folder and SYSVOL folder. Click Next</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">20. Review your
selections and then Click Next.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">21. If all of the
prerequisites checks have passed successfully, you will be able to click on
Install to proceed. Click Install</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">22. The installation
will now proceed and you will see the progress being displayed.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">23. The computer will
most likely restart on its own to complete the installation so don’t be alarmed
if it does.</span><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;">Upon restart, you should
be able to login using your domain credentials for the user administrator.</span></div>
<div class="MsoNormal" style="line-height: normal;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12pt;"> </span></div>
Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-34857689915189818312012-12-03T05:44:00.000-08:002012-12-26T05:50:19.448-08:00How to Install Windows Server 2012 step by step video tutorialHow to Install Windows
Server 2012 this is a step by step video tutorial. Even though the steps haven’t really changed dramatically
compared to windows server 2008, the interface has! especially with the
new metro look. So let’s begin Installing Windows Server 2012<br />
<br />
<br />
<span id="more-12856"></span><br />
<strong>How to Install Windows Server 2012 Steps Bellow.</strong><br />
1. The first step is to <strong>Boot up from the CD</strong> or ISO image and select your language settings.<br />
2. Select your Language and input options and then click on Next.<br />
3. Click Install Now<br />
4.
Select the operating system you want to install. I selected Windows
Server 2012 Release Candidate Server with a GUI. The other option is
server core which was first introduced in Windows 2008 and is a minimal
install with no GUI but provides remote management through Windows
PowerShell and other tools. Click Next<br />
5. Accept the License terms. Click Next<br />
6. We are performing a new installation of Windows Server, so click on Custom.<br />
7. Partition your drives and then click Next.<br />
8. The Installation of Windows then proceeds.<br />
9.
The installation will eventually re-start your Windows Server where it
will go through the final stages of preparing the environment for first
time use.<br />
10. You will eventually be prompted to enter a password for the built-in Administrator account. Click Finish<br />
11.
You will now be presented with the new Windows Login Screen, which is a
fair change to what we have been accustomed to with previous releases
of Windows Server.<br />
Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-43286062416113230052012-11-29T06:18:00.001-08:002012-11-29T06:18:43.977-08:00E-mail client Mail Server Settings<h4><b><u>Hotmail Settings:</u></b></h4> <p>As other web based email services, Hotmail is using the HTTP protocol for connecting you to your mailbox. If you want to send and receive Hotmail emails using an email client software, then your software must support Hotmail HTTP access for your email account. Some email clients, such as Outlook Express or Microsoft Outlook, offer builtin support for Hotmail accounts, so you only have to select HTTP when you are asked to select your email account type and select Hotmail as the HTTP Mail Service Provider. <br /><b>Mail Server Settings for Hotmail using the </b><a href="http://office.microsoft.com/en-us/outlook/HA102225181033.aspx"><b>Microsoft Outlook Connector</b></a> <br />If you are using Microsoft Outlook & the Outlook Connector, you can define your Hotmail account just like any regular POP3 email account:</p> <p>Hotmail Incoming Mail Server (POP3) - pop3.live.com (logon using Secure Password Authentification - SPA, mail server port: 995)</p> <p>Hotmail Outgoing Mail Server (SMTP) - smtp.live.com (TLS enabled, port 587)</p> <p>· <b>Yahoo! Mail Settings</b> <br />Yahoo Mail offers standard POP3 access for receiving emails incoming through your Yahoo mailbox, by using your favorite email client software. To setup your email client for working with your Yahoo account, you need to select the POP3 protocol and use the following mail server settings:</p> <p>Yahoo Incoming Mail Server (POP3) - pop.mail.yahoo.com (SSL enabled, port 465)</p> <p>Yahoo Outgoing Mail Server (SMTP) - smtp.mail.yahoo.com (SSL enabled, port 995)</p> <p><b>POP Yahoo! Mail Plus email server settings</b></p> <p>Yahoo Plus Incoming Mail Server (POP3) - plus.pop.mail.yahoo.com (SSL enabled, port 995)</p> <p>Yahoo Plus Outgoing Mail Server (SMTP) - plus.smtp.mail.yahoo.com (SSL enabled, port 465, use authentication)</p> <p>· <b>Google GMail Settings</b> <br />The Google GMail service offers email client access for retrieving and sending emails through your Gmail account. However, for security reasons, GMail uses POP3 over an SSL connection, so make sure your email client supports encrypted SSL connections.</p> <p>Google Gmail Incoming Mail Server (POP3) - pop.gmail.com (SSL enabled, port 995)</p> <p>Outgoing Mail Server - use the SMTP mail server address provided by your local ISP or smtp.gmail.com (TLS enabled, port 587)</p> <p>Google Gmail Outgoing Mail Server (SMTP): smtp.gmail.com</p> <p>The Gmail SMTP server requires authentication (use the same settings as for the incoming mail server)</p> <p>The Google Gmail SMTP Server requires an encrypted connection (SSL) on port 465.</p> <p>· <b>MSN Mail Settings</b> <br />The MSN email service allows you to use the MSN POP3 and SMTP servers to access your MSN mailbox.</p> <p>MSN Incoming Mail Server (POP3) - pop3.email.msn.com (port 110, using Secure Password Authentication - SPA)</p> <p>MSN Outgoing Mail Server - smtp.email.msn.com (select "My outgoing server requires authentication")</p> <p>· <b>Lycos Mail Settings</b> <br />The Lycos Mail Plus service allows you to use POP3 and SMTP servers for accessing your Lycos mailbox.</p> <p>Lycos Mail Incoming Mail Server (POP3) - pop.mail.lycos.com (port 110)</p> <p>Outgoing Mail Server - smtp.mail.lycos.com or use your local ISP SMTP mail server</p> <p>· <b>AOL Mail Settings</b> <br />The AOL email service is a web based system, designed for managing your AOL mailbox via HTTP IMAP access. Unlike Hotmail, you can use any email client to access your AOL mailbox, as long as it supports the IMAP protocol.</p> <p>AOL Incoming Mail Server (IMAP) - imap.aol.com (port 143)</p> <p>AOL Outgoing Mail Server - smtp.aol.com or use your local ISP SMTP mail server</p> <p>· <b>Mail.com Mail Settings</b> <br />The Mail.com email service allows you to use POP3 and SMTP servers for accessing your Mail.com mailbox.</p> <p>Mail.com Mail Incoming Mail Server (POP3) - pop1.mail.com (port 110)</p> <p>Outgoing Mail Server - use your local ISP SMTP mail server</p> <p>· <b>Netscape Internet Service Mail Settings</b> <br />The Netscape e-mail system is web-based, which means you can access their e-mail from any Internet connection. Netscape Internet Service also supports AOL® Communicator, Microsoft® Outlook, Microsoft® Outlook Express, and other POP3 e-mail software. The outgoing mail server needs SSL support, so make sure your email client software supports SSL connections over the SMTP protocol.</p> <p>Netscape Internet Service Incoming Mail Server (POP3) - pop.3.isp.netscape.com (port 110)</p> <p>Netscape Internet Service Outgoing Mail Server - smtp.isp.netscape.com (port 25, using a secure SSL connection)</p> <p>· <b>Tiscali Mail Settings</b> <br />The Tiscali email service allows you to use POP3 and SMTP servers for accessing your Tiscali mailbox.</p> <p>Tiscali Incoming Mail Server (POP3) - pop.tiscali.com (port 110)</p> <p>Outgoing Mail Server - use your local ISP SMTP mail server</p> <p>· <b>Freeserve Mail Settings</b> <br />The Freeserve email service allows you to use POP3 and SMTP servers for accessing your Freeserve mailbox.</p> <p>Freeserve Incoming Mail Server (POP3) - pop.freeserve.com (port 110)</p> <p>Outgoing Mail Server - use your local ISP SMTP mail server</p> <p>· <b>Supanet Mail Settings</b> <br />The Supanet email service allows you to use POP3 and SMTP servers for accessing your Supanet mailbox.</p> <p>Supanet Incoming Mail Server (POP3) - pop.supanet.com (port 110)</p> <p>Outgoing Mail Server - use your local ISP SMTP mail server</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com2tag:blogger.com,1999:blog-468638745737186846.post-80764995516512171832012-11-29T05:10:00.000-08:002012-11-29T06:22:07.427-08:00How to Configure Outlook Express email client<p><strong><font size="4"><font face="Times New Roman"><u>Configuring your email client: </u><u>Microsoft Office Outlook Express</u></font></font></strong></p> <p><b>Method 1: Microsoft Office Outlook 2010</b></p> <p>1. Start Outlook.</p> <p>2. On the <b>File</b> menu, click <b>Info and click Account Settings</b>.</p> <p>3. Select <b>Account Settings</b> from the list.</p> <p>4. On the <b>E-mail</b> tab, click <b>New and Select Email Account</b>, and then click <b>Next</b></p> <p>5. Click to select the <b>Manually configure server settings or additional server types</b> check box, and then click <b>Next</b>.</p> <p>6. Click <b>Internet E-Mail</b>, and then click <b>Next</b>.</p> <p>7. In the <b>Server Information</b> section, select <b>IMAP</b> for <b>Account Type</b>.</p> <p>8. In the <b>Your Name</b> box, enter your name exactly as you want it to appear to recipients.</p> <p>9. In the <b>E-mail Address</b> box, type your e-mail address.</p> <p>10. In the <b>User Name</b> box, type your account name.</p> <p>11. In the <b>Password</b> box, type your password.</p> <p>12. In the <b>Incoming mail server</b> box, type the name of your IMAP4 server.</p> <p>13. In the <b>Outgoing mail server (SMTP)</b> box, type the name of your SMTP server.</p> <p><b>Note</b> IMAP4 is a retrieval protocol. You must have SMTP to send your messages.</p> <p>14. Click <b>Next</b> after you have completed entering this configuration information, and then click <b>Finish</b>.</p> <p><b>Method 2: Microsoft Office Outlook 2007</b></p> <p>1. Start Outlook.</p> <p>2. On the <b>Tools</b> menu, click <b>Account Settings</b>.</p> <p>3. Click <b>New</b>.</p> <p>4. Click <b>Microsoft Exchange, POP3, IMAP, or HTTP</b>, and then click <b>Next</b>.</p> <p>5. In the <b>Auto Account Setup</b> dialog box, click to select the <b>Manually configure server settings or additional server types</b> check box, and then click <b>Next</b>.</p> <p>6. Click <b>Internet E-Mail</b>, and then click <b>Next</b>.</p> <p>7. In the <b>Server Information</b> section, select <b>IMAP</b> for <b>Account Type</b>.</p> <p>8. In the <b>Your Name</b> box, enter your name exactly as you want it to appear to recipients.</p> <p>9. In the <b>E-mail Address</b> box, type your e-mail address.</p> <p>10. In the <b>User Name</b> box, type your account name.</p> <p>11. In the <b>Password</b> box, type your password.</p> <p>12. In the <b>Incoming mail server</b> box, type the name of your IMAP4 server.</p> <p>13. In the <b>Outgoing mail server (SMTP)</b> box, type the name of your SMTP server.</p> <p><b>Note</b> IMAP4 is a retrieval protocol. You must have SMTP to send your messages.</p> <p>14. Click <b>Next</b> after you have completed entering this configuration information, and then click <b>Finish</b>.</p> <p><b>Method 3: Microsoft Office Outlook 2003 and earlier versions of Outlook</b></p> <p>1. Start Outlook.</p> <p>2. On the <b>Tools</b> menu, click <b>E-mail Accounts</b>.</p> <p>3. Under <b>E-mail Accounts</b>, click <b>Add a new e-mail account</b>, and then click <b>Next</b>.</p> <p>4. Click <b>IMAP</b> as the type of account that you are creating, and then click <b>Next</b>.</p> <p>5. In the <b>Your Name</b> box, enter your name exactly as you would like it to appear to recipients.</p> <p>6. In the <b>E-mail Address</b> box, type your e-mail address.</p> <p>7. In the <b>User Name</b> box, type your account name.</p> <p>8. In the <b>Password</b> box, type your password.</p> <p>9. In the <b>Incoming mail server (IMAP)</b> box, type the name of your IMAP4 server.</p> <p>10. In the <b>Outgoing mail server (SMTP)</b> box, type the name of your SMTP server.<b>NOTE</b>: IMAP4 is a retrieval protocol. You need SMTP to send your messages.</p> <p>11. Click <b>Next</b> after you have completed entering this configuration information, and then click <b>Finish</b>.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-83520991235967706542012-11-06T02:47:00.001-08:002012-11-06T02:47:55.935-08:00How to Configure your email client Eudora 7.0<p>Now Eudora is popular e-mail client program available for Microsoft Windows. <em>Configuring Eudora 7</em> for Windows to use your new E-mail account. If you should be problem in <p>“ Could not connect to "pop.gmail.com" <p>Cause: connection timed out (10060) ” <p>Then try this procedure, it 100% work for you. <p><strong><font size="5">Configuring your email client Eudora 7.0</font></strong> <ol> <li>Open Eudora. <li>Click the 'Tools' menu, and select 'Options.' </li></ol> <p><a href="http://lh3.ggpht.com/-jLogQFwIVIk/UJjqBGmqPDI/AAAAAAAAAGk/npD3tjavniE/s1600-h/clip_image001%25255B5%25255D.gif"><img title="clip_image001" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="322" alt="clip_image001" src="http://lh4.ggpht.com/--ySMs0fjRHM/UJjqDkrhCTI/AAAAAAAAAGs/mY0JTqxbN8s/clip_image001_thumb%25255B2%25255D.gif?imgmax=800" width="174" border="0"></a> <ol start="3"> <li>Click 'Getting Started' under 'Category' <ul> <li>Enter your full name in the 'Real name' field. <li>Enter your full webmail address (sample@yourdomain.com) in the 'Email address:' field. <li>Enter 'pop.mailserver.com' Like Gmail (pop.gmail.com) in the 'Mail Server (Incoming):' field. <li>Enter your Login “User Name” in User Name field. <li>Click 'Allow authentication' below 'SMTP Server.' <li>Enter 'smtp.mailserver.com’ Like Gmail (smtp.gmail.com) in the 'SMTP (Outgoing) Server:' field. </li></ul></li></ol><a href="http://lh3.ggpht.com/-2VTIb_o2JOs/UJjqFv00ViI/AAAAAAAAAG0/aKQ4cN1ZAM8/s1600-h/clip_image003%25255B11%25255D.gif"><img title="clip_image003" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="399" alt="clip_image003" src="http://lh4.ggpht.com/-7AaOWToPCUs/UJjqH-tU1rI/AAAAAAAAAG8/QzJJNdIwE7o/clip_image003_thumb%25255B8%25255D.gif?imgmax=800" width="533" border="0"></a> <p> <ol start="4"> <li>Click 'Checking Mail' under 'Category:.' <ul> <li>Set 'Secure Sockets when Receiving' to 'Required, Alternate port'</li></ul></li></ol> <p><a href="http://lh6.ggpht.com/-bfiAaabNhVo/UJjqKjWjylI/AAAAAAAAAHE/oEtF-6NeUCo/s1600-h/clip_image002%25255B1%25255D%25255B4%25255D.gif"><img title="clip_image002[1]" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="363" alt="clip_image002[1]" src="http://lh6.ggpht.com/-rYDLYtzX3_g/UJjqNGCFclI/AAAAAAAAAHM/eVW6BRwlKKw/clip_image002%25255B1%25255D_thumb%25255B2%25255D.gif?imgmax=800" width="531" border="0"></a> <ol start="5"> <li>Click 'Incoming Mail' under 'Category' <ul> <li><b>Optional:</b> If you want to use both Eudora and webmail to check your mail, check the box for "<b>Leave mail on server</b>". <li>Select 'Passwords' for 'Authentication Style.' </li></ul></li></ol> <p><a href="http://lh3.ggpht.com/-Sow1twfMU9k/UJjqPzAj9FI/AAAAAAAAAHU/n5iGFPjLOUA/s1600-h/clip_image004%25255B5%25255D.gif"><img title="clip_image004" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="389" alt="clip_image004" src="http://lh3.ggpht.com/-196M_P4TkQg/UJjqSph4zDI/AAAAAAAAAHc/5wrqC_vz7Vk/clip_image004_thumb%25255B2%25255D.gif?imgmax=800" width="536" border="0"></a> <ol start="6"> <li>Click 'Sending Mail' under 'Category:.' <ul> <li>Check the box next to 'Allow authentication.' <li>Set 'Secure Sockets when Sending' to 'Never,' and click 'OK.' <li>Check the box next to "<b>Use submission port (587)</b>" (Check your firewall settings if necessary to enable that port.). </li></ul></li></ol> <p><a href="http://lh5.ggpht.com/-g32-FDURXy4/UJjqXxVBp_I/AAAAAAAAAHk/L-xSFpsVNgE/s1600-h/clip_image005%25255B5%25255D.gif"><img title="clip_image005" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="395" alt="clip_image005" src="http://lh3.ggpht.com/-B0DE8Lwyv4I/UJjqbllIpzI/AAAAAAAAAHs/Jye_8yQAjOA/clip_image005_thumb%25255B2%25255D.gif?imgmax=800" width="537" border="0"></a> <ol start="7"> <li>Click 'OK,' <li>Now go personalities option then “Dominant option”.</li></ol> <p><a href="http://lh4.ggpht.com/-ALfzzi2R0l8/UJjqeT--pGI/AAAAAAAAAH0/e3yoe2ig35Q/s1600-h/clip_image007%25255B5%25255D.jpg"><img title="clip_image007" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="385" alt="clip_image007" src="http://lh4.ggpht.com/--4e9naD4X4k/UJjqicDS87I/AAAAAAAAAH8/JlLci3tkF94/clip_image007_thumb%25255B2%25255D.jpg?imgmax=800" width="606" border="0"></a> <ol start="9"> <li>Right click on Dominant then click properties.</li></ol> <p><a href="http://lh5.ggpht.com/-n8WIGbvCx-E/UJjql2qZtbI/AAAAAAAAAIE/PbccnxkR4Uc/s1600-h/clip_image009%25255B5%25255D.jpg"><img title="clip_image009" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="376" alt="clip_image009" src="http://lh4.ggpht.com/-ovRSIZlq_ow/UJjqpUMen-I/AAAAAAAAAIM/WH73iromFbo/clip_image009_thumb%25255B2%25255D.jpg?imgmax=800" width="543" border="0"></a> <ol start="10"> <li> <p>set 'Secure Sockets when Receiving' to 'Required, Alternate port', And check all check box</p></li></ol> <p><a href="http://lh4.ggpht.com/-8wiHkc8rpXY/UJjqsWKWezI/AAAAAAAAAIU/AqCo5aSjhnw/s1600-h/clip_image010%25255B5%25255D.gif"><img title="clip_image010" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="464" alt="clip_image010" src="http://lh6.ggpht.com/-ZjfI6i9V5Bk/UJjqvgk7ipI/AAAAAAAAAIc/A0q9yRSYpZc/clip_image010_thumb%25255B2%25255D.gif?imgmax=800" width="346" border="0"></a></p> <ol start="11"> <li>et 'Secure Sockets when Receiving' to 'Required, Alternate port'</li></ol> <p><a href="http://lh4.ggpht.com/-sWnNSiqSGkM/UJjqybYORXI/AAAAAAAAAIk/LjW-GlSu2_I/s1600-h/clip_image011%25255B5%25255D.gif"><img title="clip_image011" style="border-right: 0px; border-top: 0px; display: block; float: none; margin-left: auto; border-left: 0px; margin-right: auto; border-bottom: 0px" height="464" alt="clip_image011" src="http://lh3.ggpht.com/-kwiTX2XpN50/UJjq1Pc6REI/AAAAAAAAAIs/a6HwJbobk3E/clip_image011_thumb%25255B2%25255D.gif?imgmax=800" width="346" border="0"></a> <p>12. Click ok. <p>13. Now verify your settings by clicking 'File,' and then 'Check Mail.' Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-79507444970056217232012-11-01T03:32:00.000-07:002012-11-01T03:32:00.525-07:00what is a computer firewall and how does it work<p><strong>What is Computer firewall:</strong> <p>A wall between the source and the user that blocks a certain type of traffic from reaching its destination is f<strong>irewall</strong>. The firewall protects systems from unauthorized access while maintaining communications with the legitimate ones. A device or a combination of devices configured to allow and reject transmissions in a network on the bases of well-defines rules works as <strong>firewall</strong>. <p>A majority of personal computers have built-in firewalls to defend the operating system from illegitimate efforts of transmitting or accessing data. <strong>Firewalls</strong> do have the capability to perform the routing functions where a number of routers are capacitated to act like firewall filters. <p><u>Network traffic has three features:</u> a source, a protocol (typically UDP, TCP or ICMP) and a destination. The UDP and TCP protocols have a source (mostly random) as well as a destination port (a well-known number) for example the destination port of DNS is 53 and the destination port for HTTP is 80. The ICMP protocol carries an ICMP message type; the most common of them are Echo Reply and Echo Request. A firewall protection allows network security administrator to pick which ports and protocols or message types would have access and which would be blocked. Read below to find out how firewall works <p><strong>How the Firewall Works?</strong> <p>The prime security feature of a firewall is its inbound restriction. A typical <strong>firewall configuration</strong> abandons all inbound traffic to internal IP addresses. A DMZ network should carry the server that accepts the incoming connections or traffic. Latest firewalls allow in the responses to outbound tariff; the firewalls of computers that are connected to web server via internet would automatically accept responses from the web server that would in turn return to the computer. <p><strong>Inbound Confinement Example: </strong>A “ping” command transmits ICMP Echo Request message and as a response receives ICMP Echo Reply message. For blocking the ICMP Echo Request messages to reach its destination, one has to configure a firewall that would result in failed ping commands. For blocking ICMP Echo Reply messages a firewall could be assembled between the source and the destination to fail all ping commands. A potential attacker is allowed by ping to map the network; for preventing the use of ping command for mapping network disable the inbound Echo Request messages. <p>The outbound traffic is denied in some network security administrators. The feature forbids users from accessing unapproved protocols while limiting their access to only approved protocols; such restrictions involve avoiding users from online chat or sending outbound emails especially in work places. Such limitations are sensitive to work-around the time and effort of the user necessary to approach a particular protocol via indirect ways thus very few users spent time in figuring out a way. The outbound confinement most of the time works as per design. <p><strong>Outbound Confinement Example:</strong> SMTP protocol that responds to TCP port 25 is used for emails. Blocking the outbound TCP port 25 in your network would disable the users from sending outbound emails except from enabled email servers. An effective work-around the confinement policy is the configuration of mail server to respond to an additional port along with port 25 by an intelligent user. <p><strong>What are the Types of Firewall?</strong><br>On the foundation of communication’s situation, its interception and the state firewalls could be classified. <ul> <li>The <strong>Network Layer Firewall</strong> also known as packet filters (in BSD operating systems’ context) works on the low level of the TCP/IP protocol heap which means that none could cross the <strong>firewall</strong> unless the packets resemble the established rules. Usually default rules are applied but the administrator has authority to modify rules. The Packet Filters have two sub-types. A <em>firewall</em> could make use of a number of packet attributes for filtering traffic such as source port, IP address, destination port or IP address, destination service like FTP or WWW. The process of filtering could be based on protocols of the source such as net block, TTL values and other properties. <li> <ul> <li><strong>Stateful Firewalls</strong> manages the context of ongoing sessions and process speed packet by the help of state information. In case a packet does not resemble an existing connection then the evaluation would be based on the rules of new connections where the resemblance with the connection on the bases of comparison with the state table of firewall would enable the packet to cross the firewall without any further processing. <li>Faster filters and less memory requirement makes <strong>Stateless Firewalls</strong> a better option. These firewalls are fundamental for the filtering of stateless network protocols due to no concept of session in their set ups. The firewalls are not clever enough to figure out the extent of communication between the hosts. </li></ul></li></ul> <p> </p> <ul> <li>The <strong>Application Layer Firewall</strong> functions on the application level of TCP/IP stack such as all telnet or FTP traffic and tap all packets whether travelling from or to an application. They drop other packets without recognition of the sender. These filters are helpful in restricting outbound traffic from approaching the confined machine. </li></ul> <p> </p> <ul> <li>The process ID of data packets is examined by the application firewall against a local process’ ruleset implied in data transmission. The rendered ruleset defines the extent to which filtering would be done. In this firewall the ruleset for standard services such as sharing services is very complex. Along with other processes there might occur some possible associations but these ruleset for process has fixed efficiency; it could not defend against modifications that are caused by exploitations such as the exploits of memory corruption. </li></ul> <p> </p> <ul> <li>These limitations in the application firewall have triggered the association of a new generation of application named MAC (Mandatory Access Control) or sandboxing in these firewalls in order to secure sensitive services. APPArmor is an example of next generation application firewall that is included in some distributions of Linux. </li></ul> <p> </p> <ul> <li>A <strong>Proxy Server</strong> could be configured to act as a firewall by responding to input packets such as connection requests. The server could serve as an application that runs on software of a machine made for this purpose or on a hardware dedicated to the task thus breaking into the path of other packets so they could not access their destination.<br>It would be extremely tough for an external network to temper with an internal system that is synchronized with a proxy server. If the application proxy is accurately configured and intact then the misuse by an external network would not inevitably lead to some security breach exploitation. A system that is in the reach of public might be hacked by intruders who would employee the system as a proxy for their illegitimate motives; in such cases proxy would present that machine as it is to the internal computers. For passing packets to a specific target, hijackers could make use of IP Spoofing. </li></ul> <p> </p> <ul> <li>The function of NAT (Network Address Translation) is often installed in firewalls that give private or personalized address range as given in RFC 1918 to the hosts that are secured behind a <strong>firewall.</strong> The initiative is taken to protect or camouflage the hosts from potential threats. </li></ul> <p> </p> <ul> <li>The routable addresses of IPv4, assigned to individuals or organizations to reduce the number along with cost of acquiring such public addresses for every other computer in the building, were the reason behind the designing of a function like NAT. Against network reconnaissance the best defense is to hide the address of protected devices. </li></ul> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-66985547112676733972012-10-31T03:31:00.001-07:002012-10-31T03:31:02.434-07:00what is spam in computer networking? How spam works?<h3> <p><strong><u>What is Spam?</u></strong></p></h3> <p>When we use different types of technologies related to the field of computer networking, we should know about the different types of advantages and disadvantages of the technologies. As we know that there are lot of advancements in the computer networking field but still these technologies has a security issue in there working. However, one of the major disadvantages of the computer networking is that they can easily affected by different types of methods from different source without the permission of the users. One of them is <strong>Spamming</strong>. Read further below about what is spam. <p>An other important types of such infection that can affect the system badly is the Spam. It is the types of messages or the email that can infect your personal computer and decode all the important information related to your computer called as spam. It is that types of system that can infect the PC with the help of different types advertising messages or email downloaded from the net that are unwanted and stored in the email box with out the permission of the user. <p><strong><u>How spam Works?</u></strong><br>Spam is the type of the unwanted or infected messages that infect the personal computer and slows down the working of the computer. Spam works in number of ways some important that is used by the spammers to spread the spam in enter networks and also in your systems are as follows. <p>When we move on to the network with the help of different networking devices, there are lot of advertisements present on the internet the can provide some good offers to the customers such as some sale purchase offer or some kind of games etc. But in these advertisements spammers use different techniques to store the infected messages in it and when we click to open the ad, the email works and decode the information and the working of the system become very slow and it can also hijack the personal information of your system. Commonly it is present in the inbox of the users and when the user clicks to read the mail it can infect the whole system with the help of different types of software that can be stored by the <strong>spammers</strong> in it. And can cause the harm to your operating system at the large extent. <p>Basically spammers designed the system to spread the different type of emails in the form of spam and then distribute those spam to that site that contains the protection software such as antivirus. And when the users download the protection software, these spam can also downloaded to your system and affect the whole system. Some common types of spam are present almost on every mail site. But the major sources that take part in spreading the spam are the spy wares or ad wares. With the help of such <strong>spam</strong> the email recommend the site to the user where such kind of dangerous software are present and can be downloaded easily when the user open the site. <p><strong><u>Methods Used by Spammers:</u></strong> <p>Spammers used different ways to get the email address to spread the spam into the mail boxes of different types of users. Some times they can purchase the CD of the email address directly from the company and do there work of spreading the spam easily. Another method that is used by the spammers to search the email addresses is that they designed such system that can search the email address on the internet with the help of @ such sign.</p> <p><br><strong><u>Protection from Spam:</u></strong></p> <p>Some protective software and different ways are also adopted to reduce the distribution of spam in the mail boxes. Te easy and the common method to avoid the spam is to use only those email sites that can provided with the spam filters.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-25107052678748170872012-10-14T07:03:00.000-07:002012-10-14T07:03:00.627-07:00E-mail Attachments Security<h3 align="justify">Security of email attachments:</h3> <p align="justify"><strong>Using cautions for sending the email attachments: </strong>Cautions are the important tips and measure that should be taken while composing the mail box. And also when attaching any kind of file such as document, jpeg file or data spreadsheets. Cautions must be followed because emails attachments an be dangerous sometimes <p align="justify"><strong>Characteristics that makes email Attachments dangerous: </strong>There are several factors that make Email attachments dangerous because sometimes the most attractive feature of emails allows different types of attackers to harm your id. some of these features are listed below. <p align="justify"><strong>Easy and random circulation: </strong>One of the important features of email that makes it dangerous sometime is the easy circulation when you and some <strong>attachments</strong> in your mail box it can be viewed or forwarded to the different unwanted users. Forwarding of the email quickly entertains viruses to harm your computer system. This happens because the attackers can easily track your address they can easily guess that which uses opens every mail message without bothering the security and the source from where mail is coming from. <p align="justify"><strong>Broadcast emails: </strong>Broadcast mails are those mails that provide certain kind of message to the users or group of users. They travel randomly within the networks and can carry the infection. Many attackers can also compose these messages to harm the entire network especially in client serve connections all the client systems can get infected easily. <p align="justify"><strong>Use friendly options and programs: </strong>Many email service providers offers the automatic download of the attachment by just clicking the file .this could also be very harmful for the computer system which can affect the computer file system just in the matter of seconds. <p align="justify"><strong>Precautions for the protection: </strong>Although transferring information from one place to another and dealing with online files and services can be risky but there are some steps that can be followed for preventing the harmful and spam mails. <p align="justify"><strong>Beware of unwanted attachments:</strong> always stay conscious for the mail message that are not requested even from the people you know especially mails with the subject from mom, from dad etc .because attacker always tricks the computer users to trust the mail message easily that they send. It is important because infected attachment can destroy your contact list. <p align="justify"><strong>Keep your software/applications up to date: </strong>Always keep your system files and operating system up to date, in this way the internal programs can protect the computer from external damages more effectively. <p align="justify"><strong>Save and properly scan the attachments before exploring: </strong>Before opening the attachments online download it and scan it to know that file your going to open in safe. You can choose good anti virus software for scanning. <p align="justify"><strong>Disable the automatic download option: </strong>Turn off the automatic download and auto open option to stay safe from infections. <p align="justify"><strong>Create separate accounts: </strong>Many of the operating systems offers you the multi boot or multi account processing. You can create limited account with restricted privileges. Because some the master infections require administrator privileges for infecting the computer. <p align="justify"><strong>Practice additional security features:</strong> Now there are many solution and tips for providing high security to your system, you can also try these for good protection .learn and implement the firewall advancements and spam reduction techniques. You can also report the spam to your network administrator in order to review the entire networking for seeking the infection. You must use the licensed anti virus software to provide satisfactory security to you computer. <p align="justify"><strong>Browser securities:</strong> You can also manage your browser preferences in order to automatically detect the infected or unknown files. Latest browsers have the feature for prompting the infection to the computer user</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com0tag:blogger.com,1999:blog-468638745737186846.post-70061589023833838442012-10-13T18:44:00.001-07:002012-10-13T18:44:05.795-07:00What is digital signature ? concept of digital signatures<h3 align="justify"><strong>Understanding digital signature:</strong></h3> <p align="justify"><em><strong>Digital signatures</strong></em> are used to present any type of digital data, message or file in the form of numbers or mathematical format. It’s a technique which is used for verifying the authenticity of the message and the user. It tells the receiver of the message that it has been sent by the known source and it also confirms that file is secure to be explored. They are most often used for the financial dealings and transactions and also in some scenarios where the delivery of information is required to be confidential. They can be referred as the type of electronic signatures but we cannot say that all electronic signatures are <strong>digital signatures</strong>. In some countries of this world they are considered to be the important part and instrument of significance in sensitive issues for instance in US parliament digital signatures of the all the national members are used to authenticate the received information. <p align="justify"><strong>Historical Background:</strong></p><strong></strong> <p align="justify"><br>The concept of <strong><em>digital signatures</em></strong> are first originated by the White field Daffier and Martin Hellman in 1976.at first their scheme was considered useless but with the passage of time the effective algorithms were designed that strongly supported the concept of <strong>digital signatures</strong>. Later on proper soft wares for data authenticity were developed which became very famous in the world. One of the most famous software for digital signatures is Lotus Notes 1.0 which was officially released in 1989, this software uses RSA algorithm for data cryptography.</p> <p align="justify"><strong>How digital signature works:</strong></p> <p align="justify"><strong><em>Digital signature</em></strong> works by the integration of three algorithms which are implemented in a sequence to make the message in the digital signature format. Private, public and corresponding keys are built in <em>digital signatures</em> to enhance the security and <em>authenticity</em>. At first the very first private key that is assigned to the message verifies the authenticity of the public key and after that flexible computational signatures are developed in this way the information become unknown to the irrelevant parties.</p> <p align="justify"><br><strong>Why digital signature are used ?</strong></p><strong></strong> <p align="justify"><br>There are different reasons for which digital signatures are used</p> <p align="justify"><br><strong>Efficiency: </strong><em>Digital signatures</em> are efficient because they are comparatively shorter in length and takes very small portion of the memory the technique for shortening the <strong>digital signatures</strong> is known as hashing.</p> <p align="justify"><strong>More compatibility:</strong> <em>Digital signatures</em> are more compatible because they are operated on domains and are not at all independent. Leading signatures scheme are implemented on the domains. This feature makes the signature much useful.]</p> <p align="justify"><strong>Enhanced integrity: </strong>Without the hash function the <strong><em>digital signature</em></strong> offers the enhanced integrity. If the boxes that appear to the receiver in form of sign are not properly arranged then receiver would not be able to recognize the message. This is one of the features that provide good security as well. <p align="justify"><strong>Authentication:</strong> We have commonly seen that the entire message that is communication contains the information of the entity both at the sender and receivers end. One of the most important purposes of using the <strong>digital signature</strong> is the authentication of the source of the messages. Secret keys are assigned that can be recognized only by the matching key at the receiver end. This keeps the network threats and unauthenticated and illegal use of the message <p align="justify"><strong>Non repudiation: </strong>one of the distinguishing feature of digital signatures is that once signed by the entity , it cannot be denied when transmitted over domains</p> <p align="justify"><br><strong>Uses of digital signatures</strong></p> <p align="justify"><strong>Digital signatures</strong> are used in the aspects of life and world where <strong>security </strong>matters a lot. Many governmental and confidential organizations prepare their important and private document in the form of <strong>digital signature</strong> which assures the security.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-58279089118096301902012-10-03T09:08:00.000-07:002012-10-03T09:08:00.278-07:00What is Cyber Security?<p align="justify"><strong>Cyber Security:</strong> <p align="justify"><strong>Cyber security</strong> is an activity or set of activities that involves, protecting, tracking and resolving the <em>cyber threat</em> and also explains how to respond them <p align="justify"><strong>Why it is importan</strong>t<br>We use cyber internet for different purposes and all of the information almost relies on web and computers and its networks such as communication through emails and cell phones, entertainment, data transfer and for record keeping and maintenance. Excess use of computer and internet have made the security essential in every field because online attackers and hackers are also the part of computer network which we never know can see our personal information or can steal our confidential data. Its very important for use to understand the potential risks and basic <strong>security</strong> measures in order to protect ourselves from the cyber threats.</p> <p align="justify"><strong><u>What risks are involved in cyber security?</u></strong><br>Long list of risky factors is there which makes you feel unsafe while dealing with <em>cyber technologies</em>.</p> <p align="justify"><strong>Downloading:</strong><br>One of the most practiced thing or task is the downloading. Internet users allover the world downloads the different kinds of soft wares, music audios/videos, movies, games and many more in bulk quantity every day. Many of them forgets about the risks involves in downloading .the file your saving to your <strong>computer system</strong> straight from the internet. In spite of using the bets anti virus you still need to be conscious about the s<strong>ecurity</strong> of your computer and files.</p> <p align="justify"><strong>Unauthorized purchases:</strong><br>You have often heard about the fraudulent companies and online platforms that work online and steal the confidential information of the customers who shop, sell or buy stuff online. Your important information or your data can be theft online. In worst scenarios people loss millions of dollars while selling and purchasing through unauthorized websites.</p> <p align="justify"><strong>Infected or ,malicious programming snippets:</strong><br>These are the small codes that are developed transfer viruses or worms of different types to your <strong>computer system</strong>. They can be generated by the professional computer hackers. These code shave unique features in them viruses are such programs that travel through your network and usually hits your system when some one form you clicks them, but the worms are so powerful that they automatically penetrates into your computer and may erase the important <em>system files</em> may make your system is halted while working. They propagate themselves automatically when you get online.</p> <p align="justify"><strong>Trojan horses:</strong><br>These are such type of dangerous software that damages you behind the screen. It means that at front interface they claim the speeding up or enhancing your RAM cache or downloading speed but at the back end they start stealing and copy your confidential information from your email accounts or computer.</p> <p align="justify"><strong></strong> <p align="justify"><strong>Precaution to stay safe:</strong><br>Although it’s always risky to work and deal online but if some rules of <strong>cyber security</strong> are continuously practiced then cyber threat risk could be minimized to some extent .here are some steps to follow.</p> <ul> <li> <div align="justify">The foremost step is that you must understand the importance and risks of <em>cyber security</em>. </div> <li> <div align="justify">After that what kind of hackers or intruders may involve in your dealings. Motivate yourself against the online hackers and be aware of them all the tie even sending a single mail message from your email account. </div> <li> <div align="justify">Avoid instant or random clicking in attractive stuff that you see around your mail box screen that may contains win cash prize adds or wok online etc. these fascinating ads may carry infections for your computer.</div></li></ul> <p align="justify">Always choose the authorized companies for selling and purchasing stuff online. don’t forget to see the privacy policy that they are offering</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com0tag:blogger.com,1999:blog-468638745737186846.post-21856985435241658622012-10-02T09:03:00.000-07:002012-10-02T09:03:00.535-07:00Characteristics of information security<h3 align="justify"><strong>What is information security:</strong></h3> <p align="justify">In the field of <strong>information technology</strong>, many technologies are used for the benefit of the people of the present era. Where there are many advantages of the information technology some disadvantages are also present that really throw a bad light on the technological devices and processes. However, the major advantage of the <em>information technology</em> is providing the information <strong>security</strong> to the data that is used in the transmission of the data or producing the new technical products. It is defined as the technology designed to protect the information from the different types of hackers and the from identity theft and protect your information from <em>unauthorized use is called as information security</em>. <p align="justify">Basically this technology used in the field of computer networking due to its importance in maintaining the <strong>security of the information</strong> that needs security and confidentiality. <p align="justify"><strong><u>Characteristics of Information Security:</u></strong> <p align="justify">Due the importance of the <em>information security</em>, it has many important features that are really helpful for the protection of the confidential data from leaking and also help to protect from hacking. Some important <em>characteristics of the information security</em> are as follows <ol> <li> <div align="justify">Integrity </div> <li> <div align="justify">Confidentiality </div> <li> <div align="justify">Authentication </div> <li> <div align="justify">Management of Risk</div></li></ol> <p align="justify"><strong>Integrity:</strong> <p align="justify"><strong>Information security</strong> plays a very important role in maintaining the security in different types of drastic conditions such as the errors of the integrity. As we know that information, security is used to provide the protection to the documentation or different types information present on the network or in the system. So, there are many viruses that can infect the computer, slows down the working and also break the integrity of the system. Therefore, <strong>information security</strong> provides the valuable and easy steps to prevent the different types of errors created due to integrity. <p align="justify"><strong>Authentication:</strong></p> <p align="justify">Another important characteristic of the <strong>information security</strong> technology, that it can provide the authentication method to protect the documents or the files from different types of hackers and also protect them from infection of different viruses. In authentication method, <em>information security</em> provides the opportunity to the user that he or she can assign the different types of special or the secret word that is called as password to the required information that has to be protected.</p> <p align="justify"><br><strong>Confidentiality:</strong></p> <p align="justify">Confidentiality is the process that is used to protect the information on the network by avoids the unauthorized person to see your <strong>information</strong> on the networking technology such as internet technology. For example, different types of thieves use different types of methods to steel the confidential information on the internet without the knowledge of the person, such as credit card number and steel all the money. However, the <strong>information security</strong> plays a vital role in preventing the information from the disclosure and unauthenticated use. In addition, your data remain save from different types identity theft technologies used by the thieves. <p align="justify"><strong>Management of Risk:</strong></p> <p align="justify"><em>Information security</em> also take part in managing different types of risk that are harmful for the information and can disclose the private or the important information easily. The characteristic feature of the <em><strong>information security</strong></em> is that it is very helpful in removing different types of threats and increases the reliability of the information present on the network, but stopping different spam to infect the information.</p> <p align="justify"><strong><u>Benefits of Information Security:</u></strong> <p align="justify">As we know that information, security plays a very important role in defending the information from different types of disclosure. Therefore, it has several benefits that really encourage us to use information <strong><em>security technology.</em></strong> One of the big and the major advantage of the information security is that it can take steps to prevent different topes of data leakage and increase the reliability of the information. Another benefit of the <strong>information security</strong> is that it can increase the confidentiality of the document.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-20554153609157509282012-10-01T08:56:00.000-07:002012-09-30T08:59:36.836-07:00Types of computer security<h3 align="justify">computer secuirty:</h3> <p align="justify">Different types of software or the hardware that are used to protect your personal computer or your network from different types of unauthorized users / spam is called as <strong>computer security</strong>. As we know that computer networking is the part of the field of science that deals with different type of technologies and applications related to the field of <strong>computer networking</strong>. This branch of science is referred to as information technology. <p align="justify">This branch is used in developing the new applications of computer. There are many types of technologies that have a great impact in the development of the new applications of the computer networking for the sake of humanity has some disastrous security problems. So, to save these kind of information from different type publications <strong>computer network security</strong> is of vital importance. <p align="justify"><strong><u>Types of Computer Security:</u></strong> <p align="justify">There are several types of computer securities that are completely based on protecting from different types of viruses and Trojans. Some common <em>types of computer security</em> are as follows <ul> <li> <div align="justify"><strong>Network security</strong></div> <li> <div align="justify"><strong>Data security</strong></div></li></ul> <p align="justify"><strong>Network Security:</strong> <p align="justify">A common <strong>type of computer security</strong> is to deal with the network security. It is that type of security that is required to secure the networking media from different type of viruses and also many other forms of threats to keep the working of computer networking smoothly. Having set right kind of <strong>network security</strong> assures the stable working of computer network. <p align="justify"><strong>Data Security:</strong> <p align="justify">Another important form of the <strong>computer security</strong> is the data security. It is defined as the type of security that is used to protect the important data present on different drives of the computer from different types of threats through different types of software/hardware solutions such as Antivirus and firewalls etc. <p align="justify">You can refer to menu for advance topics like what are <strong>firewalls</strong> and how to configure them. <p align="justify"><strong><u>Working Description:</u></strong> <p align="justify">The basic aim for applying <strong>computer security</strong> is to keep computer network stable and running without interruption of intruders, there are software available to perform tasks which help in achieving this goal. There are many types of antivirus software that are used from protection of different types of information and the data storage on the drives of the computer. These anti viruses also plays a vital role in detecting different types of virtues, Trojans, spy wares, Ad wares and many other form that are harmful for the computer data and also for the computer network stability. <strong>Computer security</strong> software first help in detecting the viruses and malware then remove these viruses from the network or from the hard drive. <em>Computer security</em> is completely based on the following three steps i.e. <ol> <li> <div align="justify"><strong>Confidentiality</strong></div></li></ol> <p align="justify">Protect different type confidential documents from unfair use and also help in reducing theft of documents. <ol start="2"> <li> <div align="justify"><strong>Authentication</strong></div></li></ol> <p align="justify">User name and passwords used of the choice of the user to protect the file or protect the access to the network is called as authentication. <p align="justify"><strong><u>Why Computer Security Important:</u></strong> <p align="justify"><strong><em>Computer security</em></strong> is important because it can provide the opportunity for the users to protect their important information present on the network and also in the system. It also helps in defending the computer system against different types of destructive technologies and protects the PC from damage. It also help in monitoring the network and protect it also from different threats. So, we should use <strong>computer security</strong> solution on some level to protect our data from different type of sniffing stolen problems. <p align="justify"><strong><u>Future of Computer Security:</u></strong> <p align="justify">Future of the computer security seems quit bright, as it is in the need of development of the new and better technologies and applications for network security for future. There are going to lot more network attacks in organizations, on world’s busiest servers and websites. To ensure the security of such networks and its users on to global scale of "Internet" it is very important to come up with invincible solutions to counter the attacks of intruders. <p align="justify">On the other hand <strong>computer security</strong> is ongoing and everlasting game. Even if we find a solution to current disastrous condition of viruses, worms and other security threats to our networks, we will have to encounter much worst and dangerous malware and virus in future, which will keep our computer networks security personals on their toes.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com2tag:blogger.com,1999:blog-468638745737186846.post-71570571406208090332012-09-30T08:42:00.001-07:002012-09-30T08:42:47.322-07:00Important Advantages of WiMax Technology<h3 align="justify"><strong>Wimax Advantages</strong></h3> <p align="justify">Wimax stands for Worldwide Interoperability for Microwave Access services brings long time term evolution in wireless data market. <strong>WiMax Technology</strong> is facing many hurdles in market while it has some great <strong>advantages</strong> which make it a technology of todays. The <strong>advantages of Wimax Technology</strong> are discussed in details below. <h3 align="justify"><strong>Wimax Coverage:</strong></h3> <p align="justify">The single station of Wimax can operate and provide <strong>coverage</strong> for hundred of users at a time and manage sending and receiving of data at very high speed with full of network security. <h3 align="justify"><br><strong>Wimax High Speed:</strong></h3> <p align="justify">The <strong>High speed</strong> of connectivity over long distance and high speed voice makes it more demanded in hardly populated areas plus compacted areas. <h3 align="justify"><br><strong>Multi-functionality within Wimax Technology:</strong></h3> <p align="justify">Wimax Technology perform a variety of task at a time such as offering high speed internet, providing telephone service, transformation of data, video streaming, voice application etc. <h3 align="justify"><strong>Potential and development:</strong></h3> <p align="justify">Wimax Technology is a great invention for new Era because Wimax has enough potential for developing and opportunity to offer various types of services for new generation. Now you can connect internet anywhere and browse any site and make possible online conference with mobile internet, multimedia application never let you bored, IPTV stay you up to date etc. <h3 align="justify"><br><strong>Stay in touch with end user:</strong></h3> <p align="justify">Wimax network always keep stay in touch with your friends and all others using same Wimax network because it provide absolute communication service to the end users to make possible rich communications. <h3 align="justify"><br><strong>Wimax Infrastructure:</strong></h3> <p align="justify"><strong>Wimax infrastructure</strong> is very easy and flexible therefore it provides maximum reliability of network and consent to actual access to end users. <h3 align="justify"><br><strong>Wimax, cheap network :</strong></h3> <p align="justify">Wimax is a well known wireless network now days because it provide a low cost network substitute to internet services offered via ADSL, modem or local area network. <h3 align="justify"><br><strong>Wimax Rich Features:</strong></h3> <p align="justify">Wimax Technology is offering <strong>rich features</strong> which make it useful. Wimax offers separate voice and data channel for fun, the semantic connection make your network more secure then before, fast connectively, license spectrum, liberty of movement etc.<br><strong>Wimax and Wifi:</strong></p> <p align="justify">The <strong>Wimax network</strong> providing much higher speed and very long range as compared to WiFi Technology. <h3 align="justify"><strong>Smart antenna and Mesh Topology:</strong></h3> <p align="justify">The use of smart antenna in Wimax<strong> network</strong> offering high quality widest array which enable you to make possible communication on long route without any encryption. It offers 2.3, 2.7, 3.3, 3.8GHz frequency ranges. The use of Mesh topology in Wimax network for the expansion is an extensive spectrum of antennas for commercial as well as for residential users. <h3 align="justify"><br><strong>Ultra wide Band :</strong></h3> <p align="justify">The unique and excellent infrastructure of Wimax is offering <strong>Ultra-Wideband</strong>. Its exclusive design is providing range from 2 to 10 GHz and outstanding time response. <h3 align="justify"><br><strong>Homeland Security:</strong></h3> <p align="justify">Security options of <strong>Wimax Technology</strong> also offer very high security because of encryption system used by Wimax. The Wimax is providing exclusive <strong>homeland security</strong>. Now you can exchange your data on whole network without any fear of losing data. <h3 align="justify"><br><strong>Lack of history:</strong></h3> <p align="justify">The best <strong>advantage of Wimax</strong> vendor technology is lack of history within mobile industry for protection. Wimax push the existing technologies and forward on steady stream. Only Wimax technology offers first major mobile standard to all mobile broadband infrastructures. It is a foremost mobile transporter. WiMAX technology support both wireless and wired network including cable operator which are now successful due to core networks of Wimax. <p align="justify">In short Wimax have great <strong>advantages</strong> such as it has ability to perform an exclusive list of services over a single station. Wimax decrease in operating and capital expenditure. The development of application is often a competitive edge.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-83466987303629094442012-09-30T08:38:00.001-07:002012-09-30T08:38:12.807-07:00Deployments of Wimax Technology<h3 align="justify"><strong>Wimax Deployments:</strong></h3> <p align="justify"><strong>Wimax Technology</strong> is a great development in wireless technology offering long distance broadband access. After viewing the rapid growth of Wimax technology in large business companies, multimedia project software and hardware manufacturer start to develop and test the compulsory components to deploy a <strong>Wimax Technology network</strong>. Large business corporations such as Intel, Samsung, Motorola and others have commenced worldwide deployment. <p align="justify">In 2004 leapfrogging cables and DSl technologies used to fetch wireless broadband access to rural areas and in 2009 Wimax technology widely spread in all over the world. Fixed wimax technology introduced in 2008. The rapid development of both Wimax technologies will be rolling out in coming days. For <strong>Wimax deployments</strong>; Asia and Amrica working as a testing ground because in Taiwan, Pakistan, South Africa, Vietnam, and Nigeria <strong>Wimax technology</strong> take start and now the growth or accomplishment of Wimax deployments covering whole world. At the moment Wateen Technologies deployed Wimax Network in Pakistan that is one of the largest Wimax network in the world. In united state Sprint, clearwire and Nextel communications have already bought up the available spectrum and <strong>Wimax wireless technologies</strong> has been start in many urban and metropolitan areas. It is more expected that Wimax Technology will take over the mobile industries. The Wimax deployment skill set to overcome the digital divide because of easiness and efficiency. The Wimax deployments going on today throughout the world are under as. <h3 align="justify"><strong>Wimax Deployments in Lao Cai, Vietnam:</strong></h3> <p align="justify">Lao Cai is a maintained area located on Chinese border in Vietnam. It has round about 600,000 populations been most community is very poor. Intel, USAID, and VDC get on partnership to bring broadband and VoIP services via Wimax technology in region in 2004. The objective behind this partnership is that to encourage overseas investment and promote economic development in a region. Than Lao Cai had attractive good mobile phone exposure in the region. The wimax network contains a single base station bound to provide internet access via a fiber optical backhaul. <strong>Wimax deployment</strong> is offering services in the city and nearby areas. In urban areas VoIP services would also be put in practice which offering telecommunication services specially when there is never had a phone. In the <strong>Wimax deployment</strong> there is a base station which has an antenna that installed up to 70 meters on a <em>telecommunication</em>s tower. In Internet café, government offices, schools, health centers, and farm about 20 modem installed and sip phone provided to each site. Then within local PSTN a line up VoIP switch and gateway connected which are located 300 miles away. Now the community of Lao Cai makes progress with broadband and telecommunication transportation. Nowadays Intel which is a leader to introduce this technology is thinking to implement <strong>Wimax deployment</strong> in nearby areas to get better economical status and for this it providing satellite backhaul for VoIP and broadband access. <h3 align="justify"><br><strong>Wimax Deployments in Gauteng, South Africa:</strong></h3> <p align="justify">The deployment of Wimax<strong> technology</strong> is beginning in Gauteng which is the province of South Africa. Gauteng is a large industrial region and Pretoria and Johannesburg are its popular cities. Almost in 150 countries <strong>Wimax deployment</strong> has been established and a WiMAX business market share of over 60% within 3.5 GHZ frequency range. <strong>Wimax broadband</strong> access is offering multimedia internet, Voice and data services. According to a report internet carry on to achieve approval in South Africa. This has socio-economic implication that goes ahead of the ideological or moral with very real insinuation for the development of the Internet economy in South Africa. The deployment of WiMAX technology is an inexpensively practicable means to recommend equivalent access for all. <h3 align="justify"><br><strong>Wimax Deployments in the United States:</strong></h3> <p align="justify">Clearwire and Sprint Nextel have been buying up Wimax spectrum in the united states. They both creating a large metropolitan market and offering 2.5 GHz frequency to 30 million users at the end of 2010. Sprint also choose the Wimax format for 4G network and Nokia, Samsung, Intel and Motorola may be excepted partner in <strong>wireless broadband</strong>scheme. The subscriber base of Clearwire is round about 200,000 and now focusing on the urban market because in rural areas there are no broadband internet services. Clearwire is playing a major role to promote Wimax Technology market and be expecting to be capable to roll out their networks more rapidly. <p align="justify">According to a 4G research report almost 600 <strong>Wimax deployments</strong> are now alive by the end of 2009. Therefore Wimax deployment may exceed HSPA deployment because by HSPA and LTE. There are only 300 cellular networks are alive and only 70 operators have committed with them for the deployment of Wimax technology. The rapid growth of Wimax is due to wide range of coverage not only in specific areas but also in urban or rural areas. In 2011 it is expected that Wimax <strong>deployment</strong> will increase more vastly than before because of its significant features.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com0tag:blogger.com,1999:blog-468638745737186846.post-46120192871146886852012-09-30T08:33:00.001-07:002012-09-30T08:33:44.737-07:00WiMax Coverage Areas<p align="justify"><strong>WiMAX Coverage:</strong> <p align="justify">In this present era there is need of two things; speed and mobility and these two factors knock the door at Coverage. For speed there is broadband and for mobility there is WiFi/ <em>Wireless networks</em>. Now the only way to get both things together is to merge them and now we have WiMAX that boast both speed and mobility combined together with wider <strong>WiMAX coverage</strong>. The standard is set for this new technology and speed is also guaranteed as it goes for the last mile when there is requirement to send data. IP protocol has been utilized to attain the broadband characteristic over the WiFi networking since the <strong>WiMAX technology</strong> introduced to provide last mile <strong>WiMAX coverage</strong>. <p align="justify"><strong>WiMax coverage</strong> is approximately 40 Mbit/s and is going to touch 1 Gbit/s for fixed users in the near future. Similarly, fixed users can access WiMAX and it ranges 50 km or in other words 30 miles. The case for the mobile user is different. It could not go to that extent as stationary customers. For mobile users the <strong>WiMax coverage</strong> is 5-15 km or 3-10 miles. Here you can see that WiFi is already there to provide around 30-100 m or 100-300 feet which is much higher than WiMAX. The main reason as preferring WiMax is that it is receiving high frequency band to operate. It supports all frequencies to perform wireless function well n good. <p align="justify">WiMAX as a wireless broadband service is welcoming by the customers in perspective of speed and reliability. It works as a wireless backhaul, supports <em>broadband connection</em> and also acts hot spots. It is quite familiar to WiFi but gives better coverage when compared.<br>WiMAX is going to give tough competition to the DSL operators with quality service and <strong>broadband </strong>connectivity. It is also very cheap as compared to WiFi and other <strong>internet service providers</strong>. It is only profit-oriented service.</p> <p align="justify">It is acting as a backhaul for previous all <em>wireless standards</em> for up-gradation. It is good when talk about services like <strong>VoIP</strong>, IPTV and data transmission.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1tag:blogger.com,1999:blog-468638745737186846.post-26701786142205501582012-09-24T00:06:00.000-07:002012-09-24T00:06:00.758-07:00Which Type of Service provides Wimax Technology? Wimax Services<h3><strong>Wimax Services:</strong></h3> <p><strong>WiMAX</strong> is a new <strong>wireless technology</strong> which provides <strong>Mobility</strong>, <strong>Coverage</strong>,<strong>Maintainability</strong>, <strong>Roaming Services</strong> etc. Wimax offers both point to point data transformation known as <strong>fixed Wimax</strong>. It also provide full cellular type mobile data services refers to <strong>Mobile Wimax</strong>. Wimax offer point to point or point to multipoint network. It employs radio signal which carry both voice and data signals. Wimax technology offers various types of high value services for the ease and multi-tenancy expansion. Wimax services totally change the way of living. The most valuable services offered by Wimax are under. <h3><strong>Data and networks:</strong></h3> <p>Wimax network is offering a network which meets your todays and future need. The cabling system of wimax network are appropriately planned, managed and installed. It provides accurate proficiency in <em><strong>telecommunications</strong></em> and latest technology of hub and routers to get best result during broadcasting. Wimax services make available a customized network for home, business and others. <h3><strong>CCTV Surveillance:</strong></h3> <p>Wimax network is allowing various types of devices to communicate. <strong>Wimax Services </strong>facilitate you with <strong>security cameras</strong> through which you can secure your business such as colleges, school, offices, shopping mall, jewelry shops, mobile shops etc. Wimax services also providing time <strong><em>lapse security</em></strong> recorder for your home or <em>business security, spy security cameras</em> which can protect you from spy, nanny cam, monitors and other equipments through which you can secure your home or any type of business without any fear of theft and make confident about security conditions. <h3><strong>Home Automation:</strong></h3> <p>Wimax services offering home automations such as home theatre technology which enable you to get full cinema experience with plasma screen, high quality sound, best quality DVD player and recorder, Through Wimax services you can enjoy long time fun with music, TV cable, and FM radio. <strong>Wimax services</strong> offering a well design system, wiring installment etc according to client needs and requirements. <h3><strong>Access Control:</strong></h3> <p>The Access control system presented by <strong>Wimax services</strong> permit the flow of personal data into a site and encrypted unwanted visitors to save your data. Wimax services are providing a range of access control system such as pin codes, swipe card and proxy readers. The CCTV, time and attendance records offered by <em><strong>Wimax services</strong></em> can be incorporated into other systems in the building. <h3><strong>Intercoms: </strong><strong><br></strong></h3> <p>The intercom systems for Wimax services permit inhabitants to speak via a call station with visitor. Intercom systems linked to an internal unit within a handset and control functions. After confirmation of visit the host may allow the visitor to enter home by releasing electronic door. The use of intercom is increasing with the passage of time in big hotels, restaurants, educational institute, collages, universities etc and it is only possible by <strong>Wimax services.</strong> <h3><strong>Security: </strong></h3> <p>Security is such a considerable Wimax service which provides full security with well thought-out wiring for telephone, video, and LAN. It is possible via home theatre and multi room audio. It also provides advanced lighting control via build up system. The other services are control of blinds, flow of water, air conditioning, keyless entry and <em>security</em>, exhaust fans, ceiling fans, and lots of other electric devices from touch screens. The <em>fire alarm, smoke, and heating system</em>, utility bills, and other multimedia equipments are great services provided by Wimax. <p>In short <strong>Wimax Services</strong> facilitate you with up-to-date equipments, facilities, and customised solutions for upcoming challenges. Wimax services solutions make possible the network connectivity without any cable and high quality of access including PC platforms, notebook etc. Wimax technology makes our lives more comfortable and tension free. Wimax services are providing inflexible performance with superior security, supple connectivity at business work, at building, or on the road.</p> Anonymoushttp://www.blogger.com/profile/06288272867312616650noreply@blogger.com1