With the release of VMware vSphere 5.1, VMware brings a number of
powerful new features and enhancements to the networking capabilities in
the VMware vSphere platform. The following diagram provides a list of
new features in different categories
Monday, September 17, 2012
Sunday, September 9, 2012
How To Add A READ MORE Option To Your Blogspot Posts:Blogger
Would you like to have an option, or a way, to make your Blogger posts
on your Home Page,have a 'Read more..' text or button, in case they get
too long?..If Yes, sit back and keep reading..
The "Read More" feature, also called "Jump Break" is a feature which lets you create expandable post summaries in your blog posts, so longer posts appear as an intro with a link to Read More. With Jump Breaks you can show just a snippet of your post on your blog's home page. Blogger will insert a "Read more" link to the full post page where your readers can keep reading.
If you go to the home page of my blog( http://sarkari-naukari-job.blogspot.in/ ), you will see that each blog post on the page has a READ MORE link, which after been clicked on, will take the reader to the full post page where the reader can read the full post.
love using the READ MORE feature because I believe it makes it easier for my blog readers to scan through the main topics on the home page. More so, it makes my blog home page to load faster. I cherish simplicity a lot...
So, How Do I Get Started ?
There are a couple of ways to insert a "Read more" jump to your posts. Before we go into that, I will like you to activate post pages and set it to, probably 5 posts on the main page. To do this, login to your blogger dashboard, go to SETTINGS > FORMATING and set the "show at most" option to "5 posts on the main page". You can choose any number you desire though.
The "Read More" feature, also called "Jump Break" is a feature which lets you create expandable post summaries in your blog posts, so longer posts appear as an intro with a link to Read More. With Jump Breaks you can show just a snippet of your post on your blog's home page. Blogger will insert a "Read more" link to the full post page where your readers can keep reading.
If you go to the home page of my blog( http://sarkari-naukari-job.blogspot.in/ ), you will see that each blog post on the page has a READ MORE link, which after been clicked on, will take the reader to the full post page where the reader can read the full post.
love using the READ MORE feature because I believe it makes it easier for my blog readers to scan through the main topics on the home page. More so, it makes my blog home page to load faster. I cherish simplicity a lot...
So, How Do I Get Started ?
There are a couple of ways to insert a "Read more" jump to your posts. Before we go into that, I will like you to activate post pages and set it to, probably 5 posts on the main page. To do this, login to your blogger dashboard, go to SETTINGS > FORMATING and set the "show at most" option to "5 posts on the main page". You can choose any number you desire though.
Thursday, April 12, 2012
Interview Question ‘N’ Answer Bank For IT
Q.1 What is the
latest Service Pack for Exchange 2000?
Ans : Service
Pack 3.
Q.2 What are the
versions of ISA servers and their service packs?
Ans : ISA Server 2000 SP1
ISA Server 2004 SP1
Q.3 What are the
core services that run a ISA server?
Ans : Microsoft
ISA Server Control
Microsoft Web Proxy
Unix Interview Qus & Ans
User
These questions will demonstrate whether the supplicant has had exposure to UNIX as an end-user. Does not imply that the user has any other skills, only that they've really used
These questions will demonstrate whether the supplicant has had exposure to UNIX as an end-user. Does not imply that the user has any other skills, only that they've really used
UNIX.
___ List 10 UNIX Commands List 10 UNIX Commands
___ List 10 UNIX Commands List 10 UNIX Commands
___ What is the most important UNIX command? Man
___ How do I create a directory? Mkdir
___ How do I find out what processes are running? ps, top
___ How do I exit Emacs/How do I exit vi? ^C^X for Emacs, :q for vi
___ What does the grep command do? searches files or streams for a regex
___ How do I stop a process? kill
Technical round Interview Help Tips
Technical round
ADS Overview,
definitions of
definitions of
Trees, Forest, Domain,
Organizational Unit, Global Catalog, Sites, Domain Controller,
you will have to explain him the differences between any of the asked question.
you will have to explain him the differences between any of the asked question.
make sure that you know the FSMOS roles, that is Schema
Master, RID Master, Domain Naming Master, PDC Emulator Master and
Infrastructure Master.
the basic of Exchange server Administrator, like
How to create address list,users.
How to install Exchange server,
Requirements for installing Exchange server.
Why do we run forestprep, domainprep before actually
installing exchange server.
The basic of TCPIP, Routing Protocols, Nat, Subnet, Layer3
Switch, Layer2 Switch, Hub, Router.
You should be aware of the
DNS Integration with Active Directory and also DHCP
authorizing with Active directory.
DNS Integration with Active Directory and also DHCP
authorizing with Active directory.
What Is system state backup?
Difference between admin groups
and routing groups?
Difference between incremental and differential backup?
What is DNS?
What are forward Look up and
reverse lookup?
What is difference between 10 base
2 and 10 base 5 cable?
UR overall job profile in current industry
How to GC in new additional domain
controller?(Pocedure how u practically do it)?
Tuesday, April 3, 2012
How to make ISA server 2004
Today’s a big day here at www.isaserver.org. That’s right, today ISA Server 2004 beta 2 was released to the public. Yes, that’s right, beta 2. Earlier betas were done in a private beta testing group, so that you wouldn’t be exposed to problems you usually see in beta 1 releases. The good news is that the beta 2 version has been out for a few weeks already, and it’s pretty reliable and just about all the features work how they say they do.
First, some suggestions:
Now let’s get to business. In this article we’ll go over the following steps to get you up and running:
Like ISA Server 2000, ISA Server 2004 has modest hardware requirements. You can install ISA Server 2004 on any machine with a Pentium III 500+ MHz processor with at least 256MB of RAM. Of course, I recommend that you increase the processor speed and memory to as much as you can afford, but you don’t need a PC that can run the starship Enterprise to run ISA Server 2004.
The machine should have at least two network interface cards. One of the cards is the external interface and the other card will be the internal interface. Unlike ISA Server 2000, there is no Local Address Table, so you can install multiple internal interface cards to create multiple internal networks, in addition to multiple public or private address DMZs. Firewall Access Policy controls traffic moving between all network interface cards.
The test network used in the discussion in this article is configured as shown below. The ISA Server 2004 firewall is located behind a DSL router, and the external interface of the ISA Server 2004 firewall uses the LAN address of the DSL router as its default gateway.
I have not yet tested ISA Server 2004 using a dial-up interface, so I won’t be covering that configuration in this article. I’ll be very interested in your experiences using a dial-up interface with ISA Server 2004, so if you’re using a dial-up interface, make sure to post your experiences with using a dial-up interface over at the Web boards at http://forums.isaserver.org.
As with all firewall installations, DNS and DHCP are critical factors in making sure that everything works correctly. You can install a DNS server on the ISA Server 2004 firewall computer and use it to connect to the Internet, or you can use a DNS server located on your internal network. In this example, we will install a DNS server on the ISA Server 2004 firewall and configure your client located behind the ISA Server 2004 firewall to use the ISA Server 2004 DNS server as its DNS server.
DHCP is a bit stickier. You can install a DHCP server on the ISA Server 2004 machine, but there is a beta issue where you need to allow all networks access to inbound DHCP REQUEST messages. For this reason, external hosts can send DHCP REQUEST messages to the DHCP server on the ISA Server 2004 firewall. While the firewall is not required to send a reply to these hosts, there are potential security risks with allowing these inbound DHCP REQUEST messages. This problem should be fixed by the time the software is finalized. At this time, I recommend that you do not install a DHCP server on the ISA Server 2004 firewall machine until this problem is addressed. If you want to use DHCP, install a DHCP server on the internal network.
Perform the following steps to install the DNS server on the Windows Server 2003 machine that will be the ISA Server 2000 firewall. If you already have a DNS server on your network that can resolve Internet host names, then you do not need to perform these steps and you can configure your clients to use your current DNS server:
- Click Start and point to Control Panel. Click the Add/Remove Programs entry.
- In the Add or Remove Programs window, click the Add/Remove Windows Components button on the left side of the window.
- In the Windows Components page, click on the Networking Services entry in the Components list and click Details.
- In the Networking Services dialog box, put a checkmark in the Domain Name System (DNS) checkbox and click OK.
- Click Next on the Windows Components page.
- Point the installer to the Windows Server 2003 installation files when asked.
- Click Finish on the Completing the Windows Components Wizard page.
Installing ISA Server 2004
The next step is to install the ISA Server 2004 software. Setup is relatively straightforward, but we’ll go through the steps in detail to make sure you understand what’s happening.Perform the following steps to install the ISA Server 2004 software on the dual-homed Windows Server 2003 machine:
- Download the ISA Server 2004 beta 2 software from http://www.microsoft.com/isaserver/beta/default.asp. When you run the exe file, it will create a folder on your C: drive containing the installation files. Double click on the isaautorun.exe file.
- On the Microsoft Internet Security and Acceleration Server 2004 Beta 2 Setup page, click the link for Review Release Notes and read the release notes. The doc isn’t that long, and you’ll get some useful information about what works and what doesn’t, as well as some useful tips on how to access the Internet from the ISA Server 2004 firewall machine itself. After reading the release notes, click the Read Setup and Feature Guide link. You don’t need to read the entire guide right now, but you might want to print it out to read later. Click the Install ISA Server 2004 link.
- Click Next on the Welcome to the Installation Wizard for Microsoft ISA Server 2004 Beta 2 page.
- Select the I accept the terms in the license agreement option on the License Agreement page. Click Next.
- On the Customer Information page, enter your name and the name of your organization in the User Name and Organization text boxes. The Product Serial Number is automatically entered for you. Click Next.
- On the Setup Type page, select the Custom option. If you do not want to install the ISA Server 2004 software on the C: drive, then click the Change button to change the location of the program files on the hard disk. Click Next.
- On the Custom Setup page you can choose which components to install. By default, the Firewall Services, ISA Server Management and Firewall Client Installation Share are installed. The Message Screener, which is used to control spam and file attachments from entering and leaving the network, is not installed by default. You need to install the IIS 6.0 SMTP service on the ISA Server 2004 firewall computer before you install the Message Screener. I will do some articles in the near future on how to install the Message Screener on the ISA Server 2004 firewall to control inbound and outbound flow of spam and email attachments. Use the default settings and click Next.
- On the Internal Network page, click the Add button. The Internal network is different than how the LAT was used in ISA Server 2000. In the case of ISA Server 2004, the internal network contains trusted network services that the ISA Server 2004 firewall must communicate with. Examples of such services include Active Directory domain controllers, DNS, DHCP, terminal services clients, and others. The firewall System Policy is automatically applied to the Internal network. We will look at the System Policy later in this article.
- In the Internal Network setup page, click the Configure Internal Network button.
- In the Configure Internal Network dialog box, remove the checkmark from the Add the following private ranges… checkbox. Leave the checkmark in the Add address ranges based on the Windows Routing Table checkbox. Put a checkmark in the checkbox next to the adapter that is connected to the Internal network. Click OK.
- Click OK in the dialog box informing you that the Internal network was defined, based on the Windows routing table.
- Click OK on the Internal network address ranges dialog box.
- Click Next on the Internal Network page.
- Click Install on the Ready to Install the Program page.
- On the Installation Wizard Completed page, put a checkmark in the Invoke ISA Server Management when wizard closes checkbox and click Finish.
- The Microsoft Internet Security and Acceleration Server 2004 management console opens. By default you are taken to the top node in the left pane of the console. Notice that ISA Server 2004 console requires quite a bit more screen real-estate than ISA Server 2000 did. To get the most out of the interface, change your screen resolution to 1024x768 or higher. I will need to keep the resolution at 640x480 for these screen shots to make them fit the Web page. For that reason, I will use the Show/Hide Console Tree button in the button bar of the console frequently.
Viewing the System Policy
By default, ISA Server 2004 does not allow outbound access to the Internet and does not allow Internet hosts to access the firewall. However, a default firewall System Policy is installed that allows network management tasks to be completed.Perform the following steps to see the default firewall System Policy:
- In this Microsoft Internet Security and Acceleration Server 2004 management console, expand the server node in the scope pane (left pane) and click on the Firewall Policy node. Right click on the Firewall Policy node, point to View and click Show System Rules.
- Click the Show/Hide Console Tree button and then click the Open/Close Task Pane arrow (the little blue arrow on the left edge of the task pane on the right side of the console). Notice that the ISA Server 2004 Access Policy represents an ordered list. Policies are processed from top to bottom, which is a significant departure from how ISA Server 2000 processed Access Policy. The System Policy represents a default list of rules that controls access to and from the ISA Server 2004 firewall by default. Scroll down the list of System Policy Rules. Notice that the rules are defined by:
Order number
Name
Action (allow or deny)
Protocols
From (source network or host)
To (destination network or host)
Condition (who or what the rule applies to) You may want to widen the Name column to get a quick view of the rules. Notice that not all the rules are enabled. System Policy Rules that are disabled by default have a tiny down-pointing red arrow in their lower right corner. The disabled System Policy Rules will become automatically enabled when you make configuration changes to the ISA Server 2004 firewall, such as when you enable VPN access.
Notice that one of the System Policy Rules allows the firewall to perform DNS queries to DNS servers on all networks.
- Review the System Policy Rule and then hide the rules by clicking the Show/Hide System Policy Rules button in the console’s button bar. This is the depressed (pushed in) button seen in the figure below.
Creating an "All Open" Outbound Access Policy
The first thing most of you will want to do is see if the ISA Server 2004 is actually working. You can do this by creating an "all open" outbound access policy that allows SecureNAT clients to access the Internet. It’s important to keep in mind that this "all open" outbound access policy is for testing only. Secure networks do not allow all traffic outbound, and users should be given access only to the protocols they require. This is the difference between an ISA Server 2004 firewall and your old traditional packet filter based firewall!Perform the following steps to create the "all open" outbound access policy:
- In the Microsoft Internet Security and Acceleration Server 2004 management console, click the Show/Hide Console Tree button to expose the scope pane. Right click the Firewall Policy node, point to New and click Access Rule.
- On the Welcome to the New Access Rule Wizard page, enter All Open Outbound in the Access policy rule name text box. Click OK.
- On the Rule Action page, select the Allow option, then click Next.
- On the Protocols page, select the All outbound protocols option and click Next.
- On the Access Rule Sources page, click the Add button. In the Add Network Entities dialog box, click on the Networks folder. Double click on the Internal network, then click the Close button in the Add Network Entities dialog box. You may want to click on each of the folders so that you can see the Network Entities that come predefined with the ISA Server 2004 firewall. These Network Entities give you very fined tuned control over inbound and outbound access control. Click Next in the Access Rule Sources dialog box.
- Click the Add button on the Access Rule Destinations page. In the Add Network Entities dialog box, click the Networks folder. Double click the External entry and click Close in the Add Network Entities dialog box. Click Next on the Access Rule Destinations page.
- On the User Sets page, accept the default setting of All Users. ISA Server 2004 enables you to create custom user sets based on Active Directory or local SAM groups. This enables the firewall administrator to create custom firewall user groups without requiring access to the Active Directory and creating groups there. Click Next.
- Review your settings and click Finish on the Completing the New Access Rule Wizard page.
- Click the Apply button to save the changes and update the firewall policy. This button is located at the top of the Details pane (the middle pane) of the console. This Apply button enables you to make multiple changes to the firewall policy before they are applied. Change take place immediately after you click the Apply button.
- Click the Show/Hide Console Tree button so that you can expose the entire line of the Access Policy in the Details pane.
Internal network clients now have full access to the Internet. SecureNAT clients have access to all protocols listed in the Protocols list in the Firewall Policy toolbox. Perform the following steps to view the Firewall Policy toolbox:
- In this Microsoft Internet Security and Acceleration Server 2004 management console, expose the scope pane if it is not visible by using the Show/Hide Console Tree button.
- If the Task Pane is not visible in the right side of the console, click the Open/Close Task Pane button.
- In the Task Pane, click the Toolbox tab. Click on the Protocols label. You will see protocols grouped into logical groups. Click on the All protocols folder. This displays a list of all the predefined protocols on the ISA Server 2004 firewall. You can create your own protocols if you like later. SecureNAT clients have access to all these protocols. SecureNAT client access to complex protocols still requires an application filter. Firewall clients can access all protocols, even those not included in this list (including complex protocols).
The next rule we need to create is an Access Policy that allows Internal network clients to connect to the DNS sever on the ISA Server 2004 firewall. Remember, ISA Server 2004 is different from ISA Server 2000; Access Policy is applied to all interfaces, so the Internal network interface is protected just like all other interfaces.
Perform the following steps to create the DNS rule that allows Internal network clients DNS access:
- Click the Show/Hide Console Tree button to expose the scope pane. Right click on the Firewall Policy node, point to New and click Access Rule.
- In the Welcome to the New Access Rule Wizard page, enter DNS from Internal Network in the Access policy rule name text box. Click Next.
- Select Allow on the Rule Action page and click Next.
- On the Protocols page, select the Selected protocols option from the This rule applies to list. Click the Add button.
- In the Add Protocols dialog box, click the Infrastructure folder. Double click on the DNS protocol and click Close in the Add Protocols dialog box. Click Next on the Protocols page.
- On the Access Rule Sources page, click Add. Click on the Networks folder and then double click on the Internal network. Click Close in the Add Network Entities dialog box. Click Next on the Access Rule Sources page.
- On the Access Rule Destinations page, click the Add button. In the Add Network Entities dialog box, click the Networks folder. Double click on the Local Host entry. Click Close in the Add Network Entities dialog box. Click Next on the Access Rule Destinations page.
- Accept the default entry of All Users on the User Sets page. Click Next.
- Click Finish on the Completing the New Access Rule Wizard page.
- Click Apply to save the changes and update the firewall policy.
Create an HTTP Policy that Prevents HTTP Downloads
ISA Server 2004 HTTP Policy allows you to get very fined-tuned control over what users can access via the HTTP protocol. HTTP policy can be used to prevent users from accessing any site, any content, and any protocol that might be tunneled in an HTTP header. In the future we will go over the details of HTTP Policy, but in this introductory article, we’ll see how you can quickly and easily prevent users from downloading Windows executables using HTTP. Note that HTTP policy will not look inside .zip files to determine if a Windows executable is inside it.Perform the following steps to configure HTTP Policy to prevent access to Windows executable files:
- Right click on the All Open Outbound Access Policy and click on the Configure HTTP command.
- On the General tab of the Configure HTTP policy for rule dialog box, put a checkmark in the Block responses with Windows executable content checkbox. Click Apply, then click OK.
- Click the Apply button to save the changes and update the firewall policy.
Perform the following steps on the SecureNAT client behind the ISA Server 2004 firewall computer:
- Open Internet Explorer and go to the www.isaserver.org Web site. Great! You were able to access the site.
- Now to the Web site http://www.microsoft.com/downloads/details.aspx?FamilyID=2f92b02c-ac49-44df-af6c-5be084b345f9&DisplayLang=en and scroll down to the bottom of the page. Click the link for isafp1.exe.
- The ISA Server 2004 firewall blocks the request because the HTTP Policy is configured to block access to Windows executable files. Close the Web browser.
VMware vCenter Configuration Manager - Voted VirtualizationAdmin.com Readers' Choice Award Winner - Monitoring, Management & Performance
March 22, 2012 - VMware vCenter Configuration Manager
was selected the winner in the Monitoring, Management & Performance
category of the VirtualizationAdmin.com Readers' Choice Awards. SolarWinds Virtualization Manager and Quest vFoglight were runner-up and second runner-up respectively.
“Our Readers’ Choice Awards give visitors to our site the opportunity
to vote for the products they view as the very best in their respective
category,” said Sean Buttigieg, VirtualizationAdmin.com manager.
"VirtualizationAdmin.com users are specialists in their field who
encounter various solutions for virtualization at the workplace. The
award serves as a mark of excellence, providing the ultimate recognition
from peers within the industry."
VirtualizationAdmin.com conducts bi-monthly polls to discover which product is preferred by administrators in a particular category of third party solutions for virtualization environments. The awards draw a huge response per category and are based entirely on the visitors' votes. VirtualizationAdmin.com users can submit their votes for the current Readers' Award poll in the site's left-hand bar.
“Our Readers’ Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respective category,” said Sean Buttigieg, VirtualizationAdmin.com manager. "VirtualizationAdmin.com users are specialists in their field who encounter various solutions for virtualization at the workplace. The award serves as a mark of excellence, providing the ultimate recognition from peers within the industry."
VirtualizationAdmin.com conducts bi-monthly polls to discover which product is preferred by administrators in a particular category of third party solutions for virtualization environments. The awards draw a huge response per category and are based entirely on the visitors' votes. VirtualizationAdmin.com users can submit their votes for the current Readers' Award poll in the site's left-hand bar.
|
|
vCenter Configuration Manager |
| Results | ||
| 1st | VMware vCenter Configuration Manager | 36% |
| 2nd | SolarWinds Virtualization Manager | 15% |
| 3rd | Quest vFoglight | 11% |
| 4th | eG VM Monitor | 9% |
| 4th | AppManager Suite | 9% |
| 5th | ManageIQ Enterprise Virtualization Management Suite | 8% |
| 6th | XTS Introspect | 3% |
| Others | 9% | |
VirtualizationAdmin.com conducts bi-monthly polls to discover which product is preferred by administrators in a particular category of third party solutions for virtualization environments. The awards draw a huge response per category and are based entirely on the visitors' votes. VirtualizationAdmin.com users can submit their votes for the current Readers' Award poll in the site's left-hand bar.
“Our Readers’ Choice Awards give visitors to our site the opportunity to vote for the products they view as the very best in their respective category,” said Sean Buttigieg, VirtualizationAdmin.com manager. "VirtualizationAdmin.com users are specialists in their field who encounter various solutions for virtualization at the workplace. The award serves as a mark of excellence, providing the ultimate recognition from peers within the industry."
VirtualizationAdmin.com conducts bi-monthly polls to discover which product is preferred by administrators in a particular category of third party solutions for virtualization environments. The awards draw a huge response per category and are based entirely on the visitors' votes. VirtualizationAdmin.com users can submit their votes for the current Readers' Award poll in the site's left-hand bar.
Thursday, January 12, 2012
How to block users from accessing your site based on their IP address
Web Hosting Articles »
A simple guide to .htaccess »
How to block users from accessing your site based on their IP address
Blocking users by IP address is pretty simple with .htaccess.
So here it is the example:
The first line “Order allow, deny” tells the web server the “Order” in which the Allow and Deny directive will be evaluated. It simply says: Give access to all hosts that are not present in the Deny from list and are present in the Allow from list. With allow, deny order Allow list is looked up first and then the web server checks the deny from list. So as we have allow from all – all access is allowed. Then the allowed access is filtered based on the Deny lists. With allow,deny access is disabled by default.
If we change the order to “deny, allow” then all access is enabled by default and only users in the deny lists are blocked. However as the deny is being processed first allow directives will override any maching settings set in deny directives.
The default Apache order is deny,allow. So you can skip the first line in your .htaccess file if you do not need to change the order in which the Deny and Allow rules are being evaluated by the web server.
So to keep the .htaccess simple you can just use:
You can put entire networks as
Or to block all access to your site:
Allow from 1.2.3.4
Where “1.2.3.4” should be replaced with your computer IP address.
Blocking users by IP address is pretty simple with .htaccess.
So here it is the example:
Order allow, deny Deny from 192.168.0.10 Deny from 212.155. Deny from 1.2.3.4 5.6.7.8 127.0.0.1 Allow from all
Let’s take a look at the code line by line:
The first line “Order allow, deny” tells the web server the “Order” in which the Allow and Deny directive will be evaluated. It simply says: Give access to all hosts that are not present in the Deny from list and are present in the Allow from list. With allow, deny order Allow list is looked up first and then the web server checks the deny from list. So as we have allow from all – all access is allowed. Then the allowed access is filtered based on the Deny lists. With allow,deny access is disabled by default.
If we change the order to “deny, allow” then all access is enabled by default and only users in the deny lists are blocked. However as the deny is being processed first allow directives will override any maching settings set in deny directives.
The default Apache order is deny,allow. So you can skip the first line in your .htaccess file if you do not need to change the order in which the Deny and Allow rules are being evaluated by the web server.
So to keep the .htaccess simple you can just use:
Deny from 192.168.0.10 Deny from 212.155.
Basically you can use such rules in your .htaccess file to block a particular user, or a network from accessing your site. You can put several IP address in a Deny or Allow rule. For example:
Deny from 1.2.3.4 5.6.7.9
The IP addresses must be separated by a space or tab.
You can put entire networks as
Deny from 212.155.
This will block all users which IP addresses start with 212.155
Or to block all access to your site:
Deny from all
And then add another line to enable access only for yourself:
Allow from 1.2.3.4
Where “1.2.3.4” should be replaced with your computer IP address.
Wednesday, January 4, 2012
Windows Server 2008 Tips
- Quickly Remove Features in Windows Server 2008 R2
In Windows Server 2008 R2, you no longer use the Add/Remove Windows Components option to remove features. Here’s a look at the new way to remove features.
- Quickly Add Features in Windows Server 2008 R2
In Windows Server 2008 R2, you no longer use the Add/Remove Windows Components option to add features. Here’s a look at the new way to add features.
- Perform Admin Tasks During Windows Server Installation
Discover how you can access common tools during Windows Server 2008 R2 installation so you can perform administrative tasks without having to restart the installation.
- Control How Group Policy Is Applied At Logon
Fast Logon Optimization causes policy to be applied asynchronously so the user can start working more quickly. But you can configure systems to apply the latest policy updates before letting the user start working.
- Understand and Manually Trigger Group Policy Refresh
Get a brief overview of how systems refresh Group Policy in the background to ensure users have the latest settings.
- Delegate Control to Users to Work with GPOs
It's easy to give users the rights to work with a domain, site, or OU GPO. Here’s an overview of the permissions you can assign to users or groups and step-by-step instructions on how to do this.
- Delegate Privileges for Group Policy Management
Learn how to delegate GPO creation and management privileges to other users—even non-administrative users.
- Five Command Line Tools for Managing Group Policy
Here are five command line tools you should keep handy when managing Group Policy throughout your organization.
- Troubleshoot Group Policy from the Command Line with GPRESULT
Get an overview of some best practices for using gpresult at the command line to troubleshoot policy settings.
- Fix Remote Administration when Windows Firewall Gets in the Way
Windows Firewall can sometimes prevent you from performing remote administration with certain MMC snap-ins. Here’s a quick fix.
- Enable the Print Job Error Notification on Windows Server 2008
Find out how you can enable (and disable) an audible error notification on print servers.
- Best Practices for Enforcing Password Policies
Get an overview of how you should configure key password policies to ensure greater security on your network.
- Back Up and Restore the DHCP Database
DHCP lease and reservation information is stored in database files. Here’s how you can backup and restore this information.
- Update DHCP Statistics Automatically
The DHCP console provides statistics concerning IPv4 and IPv6 address availability and usage. But the info isn't updated automatically. If you monitor DHCP routinely, you might want to enable automatic updating. Here's how.
- Detect and Avoid IP Address Conflicts
To better detect and avoid potential conflicts, you can enable IPv4 address conflict detection by following these two simple steps.
- Track User and Computer Sessions on Windows Server 2008
Find out how you can easily track all connections to shared resources on a Windows Server 2008 R2 system.
- Know the Right Way to Resynchronize and Repair a Mirrored Set
Data on mirrored drives can get out of sync. You can resynchronize and repair mirrored sets, but the corrective action you take depends on the failed volume’s status. Here’s a look at what you need to know.
- Make It Easier for Users to Find Shared Resources
When you create a share for general use, here’s one thing you should do to make sure users can find the shared resource.
- Back Up and Restore the System State
Learn the fastest and easiest way to use Windows Server 2008 to back up and restore a server’s system state.
- Understand and Configure System Environment Variables
Environment variables let you specify path information that is dynamically assigned. Here's a look at the most common environment variables.
- Enable and Configure MAC Address Filtering
Explore how you can include and exclude computers and devices based on their MAC address.
- Monitor your DNS Servers on Windows Server 2008 R2
Explore the built-in functionality for monitoring a DNS server and get advice on how to configure this monitoring for your specific needs.
- Install the Windows PowerShell Graphical Environment on Windows Server 2008 R2
Windows PowerShell 2.0 offers a handy graphical scripting environment, but it isn’t installed by default. Here’s how you can install it on Windows Server 2008 R2.
- Use the Server Manager module for Windows PowerShell
Learn how to access and use additional Server Manager cmdlets in Windows PowerShell.
- Use the Sconfig Utility to Install Windows PowerShell on Server Core
Get an overview of the new Server Configuration utility, which simplifies tasks in Windows Server 2008 R2 Server Core. And see how you can use it to install Windows PowerShell.
- Configure Windows Server 2008 to Notify you when Certain Events Occur
Here are 11 easy steps for configuring Performance Counter Alerts in Windows Server 2008 R2.
- Configure Application Performance on Windows Server 2008 R2
Find out how to configure Application Performance to improve application responsiveness.
- Use the Wbadmin Backup Command Line Utility in Windows Server 2008
Are you familiar with the Wbadmin Backup Command Line Utility? Wbadmin is the command-line counterpart to Windows Server Backup. You use Wbadmin to manage all aspects of backup configuration that you would otherwise manage in Windows Server Backup. For more info, read on.
- 9 Questions You Must Ask Yourself When Planning a Backup Strategy
It takes time to create and implement a backup and recovery plan. To help you create a plan, consider the following questions in this tip.
- Use Group Policy and the Scwcmd Tool to Deploy Security Policies
This tip shows you how to use the transform command in the Scwcmd utility to create a GPO that includes the settings in the security policy (and any security templates attached to the policy).
- Create Shared Resources that Are Hidden
This tip shows you how to hide a share from users. Pretty sneaky stuff!
- Monitor and Tune Network Bandwidth and Connectivity
No other factor matters more to the way a user perceives your server’s performance than the network that connects your server to the user’s computer. The delay, or latency, between when a request is made and the time it’s received can make all the difference. To determine the throughput and current activity on a server’s network cards, you can check these counters.
- Uncover Memory-Related Bottlenecks
Memory is often the source of performance problems, and you should always rule out memory problems before examining other areas of the system. Here’s an overview of counters that you’ll want to track to uncover memory, caching, and virtual memory (paging) bottlenecks.
- Create and Use Starter GPOs
When you create a new GPO in the GPMC, you are given the opportunity to base the new GPO on a starter GPO. Because the settings of the starter GPO are then imported into the new GPO, you can use a starter GPO to define the base configuration settings for a new GPO. Here are the steps you need to follow to create a starter GPO.
- Create a New Failover Cluster in 12 Steps
Once you’ve thoroughly researched and planned your implementation of Failover clusters, you’re ready to actually create the cluster. The mechanism to create and manage Failover clusters is the Cluster Administrator application, part of the Administrative Tools folder. Here are the 12 easy steps!
- Use Windows PowerShell to Manage Virtual Machines
Here are a few examples of how you can use Windows PowerShell scripts to manage virtual machines running on a Server Core installation. Note that these scripts are presented as samples and may need to be customized to work in your environment.
- Install the Windows Server Backup Feature on Server Core
Before you can back up a Server Core computer, you must install the Windows Server Backup feature. This can be done in two ways, both of which we detail here.
- Use Built-In Tools to Monitor DNS Servers
Windows Server 2008 offers built-in functionality for monitoring a DNS server. You can configure monitoring to occur manually or automatically by following these simple steps!
- Installing and Uninstalling Roles and Features Using Ocsetup
You can use Ocsetup.exe to install or remove roles, role services, and features on Server Core. Note that the Ocsetup.exe syntax is case sensitive so you must type package names exactly as shown in this list.
- Administer Windows Server 2008 Server Core from the Command Prompt
This tip offers a list of tools that will help you become an expert in administering Server Core from the command prompt.
- Disabling an Unused Part of Group Policy Objects
One way to disable a policy is to disable an unused part of the GPO. By disabling part of a policy that isn’t used, the application of GPOs and security will be faster.
- Quickly Map a Network Drive in Windows Vista and Windows Server 2008
Need to quickly map a network drive? We show you how, in both Windows Vista and Windows Server 2008.
- Create and Restore Shadow Copies on Windows Server 2008
Simple steps for creating and restoring Shadow Copies on Windows Server 2008!
- Run Check Disk from the Command Line to Find and Fix Errors
You can run Check Disk from the command line or within other utilities. At a command prompt, you can test the integrity of the E drive by typing these commands.
- Use Built-In Tools to Create Partitions and Volumes in Windows Server
Windows Server 2008 simplifies the Disk Management user interface by using one set of dialog boxes and wizards for both partitions and volumes.
- Understand Implicit Groups and Identities in Windows Server 2008
Windows Server 2008 defines a set of special identities that you can use to assign permissions in certain situations. The special identities are listed here.
- Create System Startup / Shutdown and User Logon / Logoff Scripts
With Windows Server 2008 you can configure four types of scripts: Computer Startup Executed during startup; Computer Shutdown Executed prior to shutdown; User Logon Executed when a user logs on; and User Logoff Executed when a user logs off. Here's how to write these useful scripts.
- Quickly Filter Event Logs in Windows Server 2008
The Event Viewer automatically creates several filtered views of the event logs. You can also create a custom view to make it easier to look for specific types of events.
How to install Java ME application in mobile phone
Overview
Installing J2ME applications to the phones can be done in a number of ways:First you have to transfer the application to your mobile. You can transfer your application to the mobile from PC by making use of data cable, infrared or Bluetooth. You can install the MIDlets either with or without PC Suite or Ovi Suite.
On Series 40 phones the application gets installed automatically. On S60 phones you need to open message (in the inbox) containing the application and install it manually. However if you use PC Suite to install the MIDlet, the installation process is started automatically on the S60 phones, although you need to step through it manually.
Another way to transfer the MIDlet to the phone is store it (JAR and or JAD file) on a Web server and download the files using the browser of the phone (so called OTA download). Note that the server has to have the MIME types correctly defined:
There are four ways to deploy the application into a mobile device
Over-the-Air (OTA)
With OTA deployment, the MIDlet (Java ME application) is installed on a Web server and then downloaded to a device via the device's Internet microbrowser. A JAR file and a JAD file are required for OTA installation. The process begins by browsing to a page that includes a link to a MIDlet suite. The link is then clicked, which causes the Web server to deliver the JAD file for the MIDlet suite to the browser. On receipt of the JAD file, it is opened and its contents are displayed. The JAD file contains a description of the MIDlet suite, including its size, version number, and who provided it. A request is then sent for the JAR file and, finally, the Web server delivers the JAR file. Once the JAR file has been delivered to the device, the suite is installed and individual MIDlets can be selected and run.Infrared and Bluetooth
IR or Bluetooth technology can be used to send the MIDlet from a PC to another device .And these two technologies can also be used to send JAR files between two devices.Of course,the file must be saved in source device memory by any way before sent.And the destination device must support installing applications via MMS.Installing over a serial cable
If the device has a serial cable port and connectivity software (either Nokia PC suite or the Ovi Suite) for a PC, the MIDlet can be installed on the device over a serial cable. To install the MIDlet, double-click on either the *.jar or *.jad file and follow on-screen instructions. On a PC, if jar/jad files are not associated with PC suite or Ovi suite by default, you can right click and select "open with" then choose "Ovi suite" or "PC suite" as applicable. Many devices can also be operated by connectivity software via IR or Bluetooth.WAP Push
We can send as a WAP Push messages, the download link will be send to the targeted mobile number. User can download the application by clicking the link.WAP Push messages are specially formatted SMS messages that display an alert message to the user, and give the user the option of connecting directly to a particular URL via the mobile phone’s WAP browser
Subscribe to:
Comments (Atom)