Advert

Resolving ntdll.dll Errors

Last edited by . Total of no comments in the discussion.

The ntdll.dll file is a Microsoft dynamic link library file that contains the NT kernel functions for a computer running the Windows Operating System (OS). The file is normally found in the windowssystem32 or the winntsystem32 directories. Windows computer users may come across the “Unknown Hard Drive Ntdll.dll Error” message. A corrupted or damaged ntdll.dll file (a computer/Trojan virus is usually the cause), corrupted driver files, or software update issues with the kernel file causes this. The file should not be deleted as it is a critical Windows operating system Read More

Share on:

Understanding Network Protocols

Last edited by . Total of no comments in the discussion.

A protocol is a collection of specifications or rules for data packets that enable information to be sent over the network. Network protocols are designed for network communication. In order to understand the different protocols available and their efficiencies, lets first look at the Open Systems Interconnection (OSI) reference model. This is the standard model for network communication developed by International Organization for Standardization (ISO). The design of the OSI model is that of a stack of protocols. The different stacks of protocols operate together to transport data and enable Read More

Share on:

Identifying Security Issues Common to All Server Roles

Last edited by . Total of no comments in the discussion.

Physical Security Issues Server security is basically one of the initial security requirements when you install any server operating system. Servers have to be physically secure from physical threats such as physical unauthorized access. Physical security prevents an individual from physically accessing your server, and performing malicious actions. A few guidelines and recommendations for implementing physical server security are detailed below: All servers should be secured in a locked server room. Only those individuals that need access should be permitted to access the server room using a key or security Read More

Share on:

How to Dual Boot Windows 7 and Ubuntu

Last edited by . Total of no comments in the discussion.

Windows 7 is the latest operating system that Microsoft released. It replaced Windows Vista in 2009. Windows 7 was invented to address fatal flaws in Windows Vista that the general public disliked. While correcting major concerns about file accessibility, design, and compatibility issues with popular applications, Windows 7 combined some of the beneficial aspects of both Windows XP and Windows Vista.   What is Ubuntu? Ubuntu is a Linux-based operating system that was released in 2004. It is very similar to Windows 7 in design and accessibility. Ubuntu is completely Read More

Share on:

NTFS File Compression

Last edited by . Total of no comments in the discussion.

One feature available when you format a volume with the NTFS file system is file compression. NTFS compression can only be applied to a partition or volume that is formatted with the NTFS file system. Through NTFS, you can create additional storage space for files by compressing either single files, or all files in a NTFS folder. Files in a compressed folder are compressed when folder compression is enabled. Any subfolders included in the compressed folder can also be compressed. You can also compress all files on NTFS volumes. A Read More

Share on:

Managing the DHCP Server

Last edited by . Total of no comments in the discussion.

Management Tasks for the DHCP Server The common management tasks that you need to perform for your DHCP servers are listed below: Delegate DHCPadministration to individuals. View and analyze DHCPstatistical information. Change the status of the DHCP service. Configure superscopeadministration entities. Back up the DHCPserver database. Restore the DHCPserver database. Repair a corruptedDHCP server database. Move a DHCP databaseto a different DHCP server. Controlling DHCP Administration With Windows Server2003, there are three built-in local groups which have rights to manage your DHCP servers: Enterprise Admins group: The characteristics of the Read More

Share on:

How Do I Open XLS Attachments?

Last edited by . Total of no comments in the discussion.

An XLS attachment is an attachment for the Microsoft Office Excel program. This program allows for easy to make spread sheets. When you save the file, it is saved as a .xls. You can easily email an individual with a XLS attached and opening them is easy. The problem comes when you don’t have Excel on your computer to view it. There is a way around that thanks to Google. The first step is to download the file from your email to your computer. To do this, click the attachment Read More

Share on:

Dual Time Zone Clocks

Last edited by . Total of no comments in the discussion.

Time display is a feature that is already incorporated into the Windows operating system Task Bar. Although this clock is very simple to use, it is only set to a specific time zone and extra steps must be taken to switch over to a new time zone, even temporarily. There are some simple ways to get multiple time zone clocks on a Windows computer. Some options that are available are built into the Windows operating system (Windows Vista, 7), while others can be implemented (Windows XP, Server 2K3) or independently Read More

Share on:

Understanding the Microsoft Outlook Client

Last edited by . Total of 1 comment in the discussion.

The graphical user interface (GUI) of Outlook bears resemblance to the Outlook Web Access (OWA) graphical user interface. In fact, with regard to end user experience, there are a number of similarities between Outlook and Outlook Web Access (OWA). The Outlook interface has a four-pane view. You can use the buttons in the Shortcut pane to access a number of Outlook features. For the viewing of email, the Preview pane allows for more space now than the previous Outlook versions. Outlook 2003 also allows users to quickly view information on Read More

Share on:

Troubleshooting BizTalk Server

Last edited by . Total of no comments in the discussion.

Auditing enables you to determine which activities are occurring on your system and allows you to track access to objects, files and folders; and modifications made to the objects, files and folders. Auditing also enables you to collect information associated with resource access and usage on your system by allowing you to audit system logon, file access, and object access. Security auditing events are written to the Security log of the system and can be accessed from Event Viewer. Because event logs grow over time and typically consume valuable disk Read More

Share on: