Advert

Your System is Low on Virtual Memory

Last edited by . Total of no comments in the discussion.

Getting the “Your System is Low on Virtual Memory” error is very frustrating. Fortunately, it will not destroy the computer. It merely indicates that the computer no longer has any memory to run the process requested and is trying to use virtual memory, but even that is running low because the program requires too much. This typically happens when numerous programs are being run or a program that has a glitch in it is running. Virtual memory (file swap or page swap) is a file on the hard drive. Its Read More

Share on:

Troubleshooting IIS

Last edited by . Total of 1 comment in the discussion.

Understanding HTTP Error Messages HTTP error messages are related to the HTTP status codes which are included in the response headers when pages are requested from the Web server. HTTP status codes are three digit numbers. HTTP status codes are categorized into the following categories: Informational (1xx): This category is used for testing, and is not used for production Web servers. Successful (2xx): Indicates that requests were successfully received. Redirection (3xx): Indicates that the client needs to perform additional steps for his/her request to be serviced. Client Error (4xx): Indicates Read More

Share on:

Securing Web Servers

Last edited by . Total of no comments in the discussion.

Web Server Security Issues Internet Information Services (IIS) is the Microsoft Web server provided in each Windows Server 2003 Edition. Internet Information Services (IIS) 6.0 was designed as the solution for intranets, extranets, and the Internet. Through IIS, organizations can implement Web sites and applications, and Web services. IIS supports Secure Sockets Layer (SSL) version 3. SSL is used to encrypt HTTP and NNTP authentication data and transmission data through public key cryptography. IIS also supports Transport Layer Security (TLS), which is used to encrypt SMTP data transmissions. Basic security Read More

Share on:

NTLDR

Last edited by . Total of no comments in the discussion.

A boot loader is a special program whose purpose is to load other software and files that are required to bring the computing system into a ready-to-run state. NTLDR is an abbreviation for New Technology Loader, and it is the boot loader for all the releases of Microsoft’s Windows NT operating system up to Windows Server 2003 and Windows XP. In Windows Server 2008 and Windows Vista and Windows 7, NTLDR has been replaced by Windows Boot Manager and winload.exe. A boot loader usually resides in the nonvolatile portion of Read More

Share on:

Managing Recipient Objects, Address Lists, and Distribution and Administrative Groups

Last edited by . Total of no comments in the discussion.

Recipient Objects Overview Active Directory objects such as user accounts, contacts and groups become recipient objects when e-mail address information is added to the object. The public folder is another type of recipient object. A public folder does not however usually have its own an email address. Exchange Server 2003 supports the following types of recipient objects: User recipient objects: This recipient object type is created and managed using the Active Directory Users And Computers management console. User recipient objects are associated with the user accounts in the Active Directory Read More

Share on:

BOOTMGR is Missing

Last edited by . Total of no comments in the discussion.

The BOOTMGR (Windows Boot Manager) is part of Microsoft Windows Vista, Windows Server 2008, and Windows 7. It finalizes the steps in booting the computer and loading the Operating System by looking for the active partition in which Boot Configuration Data is stored. BOOTMGR runs the “winload.exe” process in order to do this. This process is essentially the operating system boot loader that loads the operating system kernel and device drivers that are in the boot-class.Small changes can easily corrupt the BOOTMGR configuration on Vista, Server 2008, and Windows 7. Read More

Share on:

How Vista File Sharing works

Last edited by . Total of no comments in the discussion.

File sharing is a necessity when there is a network. Whether it is the Internet or an intranet, people are sharing files all the time. It helps businesses function at an optimum level as people can share any information they want. File sharing makes files available for others to use. This is accomplished in many ways. In business networks it is done via file servers, on the wider Internet it is done via the peer-to-peer (P2P) model, in which the files are received, stored, and served by the personal computers Read More

Share on:

TCP/IP

Last edited by . Total of 2 comments in the discussion.

Understanding the Function of Protocols Protocols are rules, standards and procedures that enable information to be communicated in the network environment. The rules and standards that control the way in which computers communicate are referred to as protocols. A few relevant factors to consider when discussing protocols and the network environment are: There are numerous protocols Each protocol has a specific set of functions that assist in enabling communication over the network. The layer of the OSI reference model at which the protocol operates indicates its function. Certain protocols can Read More

Share on:

How to Set an Environment Variable

Last edited by . Total of no comments in the discussion.

An environment variable is a variable that describes the way a computer environment, such as an operating system, works. Environment variables can be used to manage a wide variety of environment settings and control how functions are carried out. For example, an environment variable can be used to specify the directory in which temporary files are stored or the functions a user interface tool is able to perform.   How Environment Variables Work Environment variables are integrated into any software’s script before the software is released. Since environment variables control Read More

Share on:

Understanding and Designing a Public Key Infrastructure

Last edited by . Total of no comments in the discussion.

An Introduction to the Public Key Infrastructure (PKI) It has grown more important to ensure the confidentiality and integrity for data communication where an organization's network contains intranets, extranets, and Internet Web sites. Because of the connectivity of networks today, an organization's network is exposed to unauthorized users who could possibly attempt to access and manipulate mission critical data or the confidential data of its clients. The need to authenticate the identities of users, computers and even other organizations, has led to the development of the public key infrastructure (PKI). Read More

Share on: