Various kind of wireless network technology, computer technology, information technology, Ethernet security,isp,network security,wireless internet,wifi internet,wireless network,wi-fi network and various type of Tips and tricks are Known from this site.

How to Join Windows 8 to Windows 2012 Domain Server



1. Log on to the Windows 8 client computer you want to join to the domain. 2. Make sure you have set static IP and you have the DNS IP address that's pointing to the server. 3. Type domain in the metro UI. Open up the Settings Search and Join a Domain. 4. Select Change, Select the Domain radio button, and type in the domain name. 5. For this tutorial, Im using Domain.local and Press OK. 6. You will be prompted to enter Domain Admin Credentials to join computers to the domain. I will be using my Domain Admin account. 7. If there were no problems with your credentials, follow the prompts to reboot. 8. Once...
[Read More...]


How to Install Active Directory on Windows Server 2008 Tutorial



First Open Server Manager by clicking the icon in the Quick Launch toolbar, or from the Start > Administrative Tools > Server Manager. Wait till it finishes loading, then click on Roles > Add Roles link. In the Before you begin window, click Next. In the Server Roles window, click on check box to select Active Directory Domain Services, and then click Next. In the Active Directory Domain Services window read the provided information if you want to, and then click Next. In the Confirm Installation Selections, read the provided information if you want to, and then click Next. Wait till the process completes. When...
[Read More...]


How to Install DHCP on Windows Server 2008 Tutorial



To do Install DHCP, you will need a Windows Server 2008 system already installed and configured with a static IP address and Active directory. You will need to know your network’s IP address range, the range of IP addresses you will want to hand out to your PC clients, your DNS server IP addresses, and your default gateway. Additionally, you will want to have a plan for all subnets involved, what scopes you will want to define, and what exclusions you will want to create. 1. Click on Start then Click on Server Manager, click Roles from the Left  then Click on Add Roles. 2. When the Add Roles Wizard comes up, you...
[Read More...]


How to Set up VPN Server on Windows Server 2012



Set up a VPN Server on Windows Server 2012. This tutorial shows you how to install a VPN Server on Windows Server 2012, that's Setting up the firewall and Client computer for a successful connection to the server. Set up a VPN Server on Windows Server 2012: 1. Open the Server Manager and select Add rolls and features. 2. In “Select installation type” window check Role based or feature based installation. Next. 3. Select the local server in the Select destination server window. Next. 4. Now Select Remote access Role, and click on Add features button. Next. 5. No more features so Im clicking Next in the “Select features”...
[Read More...]


How to Set Up Remote Desktop Services on Windows Server 2012



Simple tutorial on How to Set Up Remote Desktop Services on Windows Server 2012. 1. Click on Add Rolls Features from the Server Manager. 1. From the Dashboard click on “Add roles and features”.  You will be presented with the “Before you begin screen.  Click Next. 2. In the “Installation Type” screen Select “Role-base or feature-based installation”. Click Next. 3. Select a destination server.  This is a new feature of Windows 2012 where you have the ability to deploy roles and features to remote servers and even offline virtual hard disks. 4. In our case, we are selecting the current server from the server...
[Read More...]


How to install Active Directory 2012 Domain on Windows Server 2012 Tutorial



First we need to change the computer name.  Windows provides a default name in the form of WIN <random characters> 1. To do it Go to Server Manager > Dashboard screen, click on Local Server and then click on the computer name hyperlink. This will take you to the all familiar System Properties 2. Click Change, enter a Computer Name and then click OK. 3. You will be prompted to restart your computer to apply the changes.  Click Ok and then Click on restart now. 4. After your computer has restarted, we will be presented with the Server Manager Screen.  Now we are ready to configure this server as...
[Read More...]


How to Install Windows Server 2012 step by step video tutorial



How to Install Windows Server 2012 this is a step by step video tutorial. Even though the steps haven’t really changed dramatically compared to windows server 2008, the interface has! especially with the new metro look.  So let’s begin Installing Windows Server 2012 How to Install Windows Server 2012 Steps Bellow. 1. The first step is to Boot up from the CD or ISO image and select your language settings. 2. Select your Language and input options and then click on Next. 3. Click Install Now 4. Select the operating system you want to install.  I selected Windows Server 2012 Release Candidate Server with a GUI. ...
[Read More...]


E-mail client Mail Server Settings



Hotmail Settings: As other web based email services, Hotmail is using the HTTP protocol for connecting you to your mailbox. If you want to send and receive Hotmail emails using an email client software, then your software must support Hotmail HTTP access for your email account. Some email clients, such as Outlook Express or Microsoft Outlook, offer builtin support for Hotmail accounts, so you only have to select HTTP when you are asked to select your email account type and select Hotmail as the HTTP Mail Service Provider. Mail Server Settings for Hotmail using the Microsoft Outlook Connector If you are using Microsoft...
[Read More...]


How to Configure Outlook Express email client



Configuring your email client: Microsoft Office Outlook Express Method 1: Microsoft Office Outlook 2010 1. Start Outlook. 2. On the File menu, click Info and click Account Settings. 3. Select Account Settings from the list. 4. On the E-mail tab, click New and Select Email Account, and then click Next 5. Click to select the Manually configure server settings or additional server types check box, and then click Next. 6. Click Internet E-Mail, and then click Next. 7. In the Server Information section, select IMAP for Account Type. 8. In the Your Name box, enter your name exactly as you want it to appear to recipients....
[Read More...]


How to Configure your email client Eudora 7.0



Now Eudora is popular e-mail client program available for Microsoft Windows. Configuring Eudora 7 for Windows to use your new E-mail account. If you should be problem in “ Could not connect to "pop.gmail.com" Cause: connection timed out (10060) ” Then try this procedure, it 100% work for you. Configuring your email client Eudora 7.0 Open Eudora. Click the 'Tools' menu, and select 'Options.' Click 'Getting Started' under 'Category'...
[Read More...]


what is a computer firewall and how does it work



What is Computer firewall: A wall between the source and the user that blocks a certain type of traffic from reaching its destination is firewall. The firewall protects systems from unauthorized access while maintaining communications with the legitimate ones. A device or a combination of devices configured to allow and reject transmissions in a network on the bases of well-defines rules works as firewall. A majority of personal computers have built-in firewalls to defend the operating system from illegitimate efforts of transmitting or accessing data. Firewalls do have the capability to perform the routing functions where...
[Read More...]


what is spam in computer networking? How spam works?



What is Spam? When we use different types of technologies related to the field of computer networking, we should know about the different types of advantages and disadvantages of the technologies. As we know that there are lot of advancements in the computer networking field but still these technologies has a security issue in there working. However, one of the major disadvantages of the computer networking is that they can easily affected by different types of methods from different source without the permission of the users. One of them is Spamming. Read further below about what is spam. An other important types of such...
[Read More...]


E-mail Attachments Security



Security of email attachments: Using cautions for sending the email attachments: Cautions are the important tips and measure that should be taken while composing the mail box. And also when attaching any kind of file such as document, jpeg file or data spreadsheets. Cautions must be followed because emails attachments an be dangerous sometimes Characteristics that makes email Attachments dangerous: There are several factors that make Email attachments dangerous because sometimes the most attractive feature of emails allows different types of attackers to harm your id. some of these features are listed below. Easy and random...
[Read More...]


What is digital signature ? concept of digital signatures



Understanding digital signature: Digital signatures are used to present any type of digital data, message or file in the form of numbers or mathematical format. It’s a technique which is used for verifying the authenticity of the message and the user. It tells the receiver of the message that it has been sent by the known source and it also confirms that file is secure to be explored. They are most often used for the financial dealings and transactions and also in some scenarios where the delivery of information is required to be confidential. They can be referred as the type of electronic signatures but we cannot say that...
[Read More...]


What is Cyber Security?



Cyber Security: Cyber security is an activity or set of activities that involves, protecting, tracking and resolving the cyber threat and also explains how to respond them Why it is importantWe use cyber internet for different purposes and all of the information almost relies on web and computers and its networks such as communication through emails and cell phones, entertainment, data transfer and for record keeping and maintenance. Excess use of computer and internet have made the security essential in every field because online attackers and hackers are also the part of computer network which we never know can see our personal...
[Read More...]


Characteristics of information security



What is information security: In the field of information technology, many technologies are used for the benefit of the people of the present era. Where there are many advantages of the information technology some disadvantages are also present that really throw a bad light on the technological devices and processes. However, the major advantage of the information technology is providing the information security to the data that is used in the transmission of the data or producing the new technical products. It is defined as the technology designed to protect the information from the different types of hackers and the from...
[Read More...]


Types of computer security



computer secuirty: Different types of software or the hardware that are used to protect your personal computer or your network from different types of unauthorized users / spam is called as computer security. As we know that computer networking is the part of the field of science that deals with different type of technologies and applications related to the field of computer networking. This branch of science is referred to as information technology. This branch is used in developing the new applications of computer. There are many types of technologies that have a great impact in the development of the new applications of...
[Read More...]


Important Advantages of WiMax Technology



Wimax Advantages Wimax stands for Worldwide Interoperability for Microwave Access services brings long time term evolution in wireless data market. WiMax Technology is facing many hurdles in market while it has some great advantages which make it a technology of todays. The advantages of Wimax Technology are discussed in details below. Wimax Coverage: The single station of Wimax can operate and provide coverage for hundred of users at a time and manage sending and receiving of data at very high speed with full of network security. Wimax High Speed: The High speed of connectivity over long distance and high speed voice makes...
[Read More...]


Deployments of Wimax Technology



Wimax Deployments: Wimax Technology is a great development in wireless technology offering long distance broadband access. After viewing the rapid growth of Wimax technology in large business companies, multimedia project software and hardware manufacturer start to develop and test the compulsory components to deploy a Wimax Technology network. Large business corporations such as Intel, Samsung, Motorola and others have commenced worldwide deployment. In 2004  leapfrogging cables and DSl technologies used to fetch wireless broadband access to rural areas and in 2009 Wimax technology widely spread in all over the world....
[Read More...]


WiMax Coverage Areas



WiMAX Coverage: In this present era there is need of two things; speed and mobility and these two factors knock the door at Coverage. For speed there is broadband and for mobility there is WiFi/ Wireless networks. Now the only way to get both things together is to merge them and now we have WiMAX that boast both speed and mobility combined together with wider WiMAX coverage. The standard is set for this new technology and speed is also guaranteed as it goes for the last mile when there is requirement to send data. IP protocol has been utilized to attain the broadband characteristic over the WiFi networking since the WiMAX...
[Read More...]


Which Type of Service provides Wimax Technology? Wimax Services



Wimax Services: WiMAX is a new wireless technology which provides Mobility, Coverage,Maintainability, Roaming Services etc. Wimax offers both point to point data transformation known as fixed Wimax. It also provide full cellular type mobile data services refers to Mobile Wimax. Wimax offer point to point or point to multipoint network. It employs radio signal which carry both voice and data signals. Wimax technology offers various types of high value services for the ease and multi-tenancy expansion. Wimax services totally change the way of living. The most valuable services offered by Wimax are under. Data and networks: Wimax...
[Read More...]


Related Posts Plugin for WordPress, Blogger...
 

Subscribe And Get Free E-Mail Updates:

Return to top of page Copyright © 2012