Remote Access Connection Manager is a program installed on all Windows Operating System versions that controls all dial-up Internet and Virtual Private Network (VPN) connections. Though access to the Internet depends on a number of factors and applications, Remote Access Connection Manager runs all of the required software necessary to connect to a remote device or network. As a result, Remote Access Connection Manager will not function properly if any of its required services is disabled. Likewise, applications that access the Internet will not function properly if Remote Access Connection Read More
Optimizing Servers for Application Performance
Monitoring Server Performance and Activity One of the basic steps to optimizing server performance is to monitor server performance. To optimize server performance, you can perform a number of tasks, such as: Reducing the load of network traffic on the particular server by implementing load balancing strategies. Reducing CPU usage Improving disk I/O In order to optimize server performance for whatsoever reason, you need to start by monitoring the server. In most cases, before server monitoring commences, it is common practice to establish baseline performance metrics for the specific server. Read More
Integrating the DNS Server with DHCP and WINS
Configuring DNS Server and DHCP Integration Windows 2000, Windows XP, and Windows Server 2003 clients can dynamically update their own resource records in Windows Server 2003 DNS. DHCP can also be used to configure down-level clients as DHCP clients. To enable the DHCP server to dynamically update clients; Click Start, Administrative Tools, and then click DHCP to open the DHCP console. Expand the DHCP server node in the console tree. Select and then right-click the DHCP scope, and then click Properties on the shortcut menu. Click the DNS tab. The Read More
IPSec Security Considerations
Securing the Network When planning for and implementing network security, the activities which you should be performing would typically involve the following: Planning how the network infrastructure will be secured from both internal and external threats. Defining and creating internal and external security boundaries. Implementing network security technologies and mechanisms that can assist the organization in meeting its security requirements. Implementing server security technologies and mechanisms. Implementing application security technologies and mechanisms. Implementing user security technologies and mechanisms. Planning and implementing an auditing strategy. Implementing network monitoring. A few methods Read More
Error 721
Error 721 is a Microsoft error which is encountered after making an unsuccessful attempt to establish a virtual private network (VPN) connection to a corporate network by using a Point-to-Point Tunneling Protocol (PPTP) client. You may even get an error 721 after making an unsuccessful attempt to establish a dial-up connection after upgrading your computer to Microsoft Windows XP from earlier versions. The exact error 721 description may vary from 'Remote PPP peer is not responding' to 'the remote computer is not responding'. Cause of Error 721 Point-to-Point Tunneling Protocol Read More
How Internet Authentication Service (IAS) works
Internet Authentication Service (IAS) is Microsoft's implementation of a RADIUS (Remote Authentication Dial-in User Service) server and proxy. As a RADIUS server, IAS performs centralized connection authentication, authorization, and accounting for many types of network access, including wireless and VPN (Virtual Private Network) connections. As a RADIUS proxy, IAS forwards authentication and accounting messages to other RADIUS servers. The Authentication and Authorization Processes When a user tries to connect to a dial-up connection server or a Network Access Server (NAS)/Virtual Private Network (VPN) Server the following authentication requests are performed: Read More
Installing Exchange Server 2003 Clusters
Microsoft Cluster Service Overview Microsoft Clustering Server (MSCS), initially launched in the Windows NT Server Enterprise Edition, enabled organizations to increase server availability for mission critical resources by grouping multiple physical servers into a cluster. Servers in the cluster are referred to as nodes, while services and applications are referred to as resources. A cluster can be defined as the grouping of two or multiple physical servers that are portrayed as, and operate as one network server. These servers provide redundancy to the enterprise network by resuming operations of a Read More
How to Map a Network Drive
Mapping a network drive is extremely quick and easy. When someone maps a network drive he/she is configuring a file folder on a remote computer that can share files or folders of data over a Local Area Network (LAN). Users can map a network drive with Window Explorer if they are running Windows XP. Users can also use the MS-DOS prompt to map their network drive. Map a Network Drive in Windows XP Right click on the start button and select Explore, then the menu bar will appear at the Read More
dwm.exe
dwm.exe is the executable filename for the Desktop Windows Manager first deployed by the Microsoft Corporation on Windows Vista and is now a part of Windows 7. dwm.exe is designed to show transparent and glossy graphic effects as 3D modules, control Windows theme and icon views, and provide live window thumbnail previews. The application performs these effects for any program window before it is displayed, when highlighted in the System task tray. Although many users like this new feature, it requires additional memory and can slow down computer operations if Read More
Lsass.exe System Error
The Lsass.exe System Error is a problem that may affect a computer system running Windows XP. Lsass (Local Security Authentication Subsystem Service) manages the log in process information for accounts on the system. Three things that may cause an error with the Lsass.exe process: The msvcrt.dll file was corrupted or replaced with an incompatible version. The user deleted or corrupted the Lsass.exe file. A virus made changes to the Lsass.exe file. Restoring the Original msvcrt File The system user must have access to the installation CD for their Operating System. Read More
Share on: