As the number of home computer users creating local networks increases, so does the number of Operating Systems (OS’s) used in homes or small business. As long as the version of Windows OS running on the network is Windows XP SP2 or newer, all of the computers should be able to be linked and information shared among them on the network. Some Windows users will encounter error code 0x80070035 when attempting to access remote resources on their network. There are several ways to figure out the problem in order to Read More
Securing DHCP Servers
The DHCP server role is responsible for dynamically assigning IP addresses to DHCP clients, and for assigning additional TCP/IP configuration information to DHCP clients as well. This includes subnet mask information, default gateway IP addresses, Domain Name System (DNS) server IP addresses, and Windows Internet Naming Service (WINS) server IP addresses. A DHCP must have at least one scope which consists of the IP addresses which the DHCP server can allocate or assign to DHCP clients. Scope information for DHCP servers is DHCP server specific. The DHCP scope includes important Read More
Securing Exchange Server 2003
Understanding Digital Signatures You can through digital signatures secure an Exchange Server 2003 messaging system. Digital signatures are used to verify the identities of the senders of data messages. With Exchange Server 2003, a digital signature can be attached to an e-mail message to ensure that the sender of the message is actually who he/she claims to be. If the content of the e-mail message is modified as the message is being transported, the signature becomes invalid. Hashing algorithms provide data authentication and non-repudiation. A hashing algorithm is a complex Read More
Migrating from Proxy Server 2.0 to ISA Server
Why Upgrade to ISA Server A few reasons for migrating from Proxy Server 2.0 to ISA Server are listed here: You need a H.323 Filter Gatekeeper. You need a multi-layered firewall. You need a firewall client. You need to perform SSL traffic inspection. You want to perform email-content screening. Stateful inspection has become important. You need secure publishing. You want to use smart application filters. You require advanced authentication. You want SecureNAT. You need to use system hardening templates. You want integrated Intrusion Detection. You want to use integrated VPNs Read More
Planning a Remote Access Strategy
Remote Access Overview Dial-up networking allows a remote access client to establish a dial-up connection to a port on a remote access server. The configuration of the DUN server determines what resources the remote user can access. Users that connect through a DUN server, connect to the network much like a standard LAN user accessing resources. Virtual Private Networks (VPNs) provide secure and advanced connections through a non-secure network by providing data privacy. Private data is secure in a public environment. Remote access VPNs provides a common environment where Read More
How to Solve Page_Fault_In_Nonpaged_Area in Windows
A page fault is an error known as the “0x50 Stop Error,” which occurs when a computer’s RAM requests a page of memory from the page file and does not receive it. Because the RAM needs the page of memory to continue running its current tasks, the CPU is forced to dump all of its current processes and display a blue error screen known as the “Blue Screen of Death” or (BSOD). Page File and Nonpaged Area Page faults arise from a miscommunication between two critical parts of the Read More
How Do I Open an ODT File?
The ODT file format is one that was developed by Sun Microsystems and is now an open format file type. ODT stands for open document text and therefore, is specific to text documents. However, the overall ODF stands for open document format which includes many different types of file variations that can be opened. OpenOffice.org and LibreOffice support ODT files natively, and since both are cross platform they can be used to open ODT files easily as well. One of the problems people find when trying to open an ODT Read More
How Do You Copy and Paste in Windows?
All Windows users should be familiar with the Copy, Cut and Paste functions; even for a first-time Windows user, it will not take much time or effort to understand their usage. Windows make it very simple to move and copy data by using the cut, copy and paste functions. Whether it is working with a word processing program like Word, sending an email, or organizing the documents on the computer, knowing how to quickly copy and paste can simplify the task. All three of these basic functions make use of Read More
How to Restore Deleted Files
A user often accidentally deletes a picture, document, or other file. In most cases, the file is still in the user’s Recycle Bin and can be recovered simply by opening the Recycle Bin, right-clicking on the appropriate file, and selecting “Restore.” However, if the file is too large for the Recycle Bin or is deleted through a program that is not run by Windows Explorer, the file will seem to have been completely erased. This is not true, however, as hard drives do not simply delete files. Instead, a hard Read More
How WINS Replication works
WINS replication is the process of copying updated WINS data from one WINS server to other WINS servers in a network to synchronize the data. Replication of WINS databases ensures that a name which is registered with one server gets replicated to other WINS servers on the network. With the use of replication between different WINS server, a particular set of information on WINS is maintained and distributed all over the network. As a result, a WINS client can resolve any NetBIOS name in the network, regardless of the WINS Read More
Share on: