answersLogoWhite

0

Windows Server 2003

Also known as the Win2K3, Windows Server 2003 is a server OS (operating system) from the American software company Microsoft. This OS has the capability to share printers and files, provide email services, authenticate users, and host message queues.

1,215 Questions

How do you enter ntp server information on a router?

If your router supports NTP-server configuration, the spesifics should be described in the manual. Often the manual can be found on the internet by searching for Manufacturer Model User Guide. Most routers have web-based configuration: You simply connect your PC to it and enter http://192.168.1.1 (or your routers IP-address*) in your browser, and you will get a login-page. Enter the admin user name and password** for your router. Now you are logged in as administrator of your router. Find the link for the time settings-page and see what is available there. Some routers like Apple AirPorts etc don't use web-interface. There you use the Airport Admin utility *What IP-number to use? Find the IP-number for the router your computer is connected to in it's internet settings. 198.162.1.1 and 10.0.0.1 are common. Try your computer's IP-number except with a 1 as last digit. **No password? Don't log in or reset anything if it is not your router! Try admin / admin or admin and empty password if you don't remember the password (or read the manual about first login. Or about factory reset to erase all settings including password.

Why to use samba file server?

A free software package, Samba enables network access to Linux and UNIX® file and print services. Samba's core functionality derives from its implementation of the Server Message Block (SMB) protocol. SMB client- and server-side support comes bundled with Windows 95 and newer versions of Microsoft Windows. This large installed base has helped Samba grow in popularity...

From the perspective that samba is everywhere, then yes it is good. If you are asking if it is a good protocol, then the answer is that it isn't really all that great. It has large problems on links with high latency. It has far too many redundant commands.

What is the single domain system?

A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.domain is security boundary for all the resources in the network like pc,printer etc.

so a single domain system is one which has only one domain in the forest

eg..

xyz.com

and no other domain in the forest except xyz.com.

Can you use the local security policy to determine if some was trying to hack into a user account?

The local security policy will not always contain records of an attempt to gain unauthorized access to a system or account. At best, changes made to the policy to allow such access may remain, either as a mistake or deliberately left to allow future access.

Where can one find Windows dedicated server hosting?

we house our servers in highly secure and ultra-modern Tier 4 data centers for Dedicated Servers, VPN, Hybrid Servers & Colocation Services with BGP network redundancy provided by Simply Transit. We host over 35,000 customers in our state-of-the-art data centers serving over 2,000,000 websites worldwide.

.

What happens if GC and infrastructure master are on same DC in active directory?

If you only have one domain in your forest, nothing will be wrong. If you do however have multiple domains in you forest, and you put your GC and infrastructure master on the same machine, things can go horribly wrong. This is because GC and Infrastructure Master use the same NTDS.dit file, changes will be changed by GC and Infrastructure Master checks the NTDS.dit and doesn't see any change, because GC already changed the NTDS.dit Only way you can run GC and infrastructure Master on the same machine in a multiple domain forest is to enable GC on all domain controllers... greets

What is the schema master?

schema Master

All databases have a schema which is a formal definition (set of rules) which govern the database structure and types of objects and attributes which can be contained in the database. The schema contains a list of all classes and attributes in the forest.

The schema keeps track of:

* Classes

* Class attributes

* Class relationships such as subclasses (Child classes that inherit attributes from the super class) and super classes (Parent classes).

* Object relationships such as what objects are contained by other objects or what objects contain other objects.

There is a class Schema object for each class in the Active Directory database. For each object attribute in the database, there is an attributeSchema object.

Schem Master is A FSMO role held by single DC in forest

Security groups in windows server?

Security groups

Used with care, security groups provide an efficient way to assign access to resources on your network. Using security groups, you can:

Assign user rights to security groups in Active Directory

User rights are assigned to security groups to determine what members of that group can do within the scope of a domain (or forest). User rights are automatically assigned to some security groups at the time Active Directory is installed to help administrators define a person's administrative role in the domain. For example, a user who is added to the Backup Operators group in Active Directory has the ability to backup and restore files and directories located on each domain controller in the domain.

This is possible because by default, the user rights Back up files and directories and Restore files and directories are automatically assigned to the Backup Operators group. Therefore, members of this group inherit the user rights assigned to that group. For more information about user rights, see User rights. For more information about the user rights assigned to security groups, see Default groups.

You can assign user rights to security groups, using Group Policy, to help delegate specific tasks. You should always use discretion when assigning delegated tasks because an untrained user assigned too many rights on a security group can potentially cause significant harm to your network. For more information, see Delegating administration. For more information about assigning user rights to groups, see Assign user rights to a group in Active Directory.

Assign permissions to security groups on resources

Permissions should not be confused with user rights. Permissions are assigned to the security group on the shared resource. Permissions determine who can access the resource and the level of access, such as Full Control. Some permissions set on domain objects are automatically assigned to allow various levels of access to default security groups such as the Account Operators group or the Domain Admins group. For more information about permissions, see Access control in Active Directory.

Security groups are listed in DACLs that define permissions on resources and objects. When assigning permissions for resources (file shares, printers, and so on), administrators should assign those permissions to a security group rather than to individual users. The permissions are assigned once to the group, instead of several times to each individual user. Each account added to a group receives the rights assigned to that group in Active Directory and the permissions defined for that group at the resource.

Like distribution groups, security groups can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group.

How can you brock administrator password?

mujhe pc ka passwored todne wala software ka nam chahiye

Domain controllers located in different sites will participate in intrasite replication?

Only one domain controller will be used per site to replicate to another site(process called as intersite replication) it could be a bridge head server(selected DC to do replication from the site)or DC selected by ISTG protocol if enabled. there would be lot of DCs in intrasite replication within a site.

Does Every domain controller in a domain have a complete copy of that domains partition in its Active Directory?

yes all the DCs have full information about different partions except for application partion The dcs which have application partition activated can get additional updates for it.

What is the process of copying directory data to multiple domain controllers known as?

Replication

The data is available with all domain controller(DC) in case any DC fails other has same files with it.

What if your preferred dns server is blank?

if the preferred dns server is blank then the system takes dns as the host server and try to resolve the entries from its own cache if it is able to do it then finew other wise it will show dns error on the IE page.

same thing happens with the resources if its in the cache it will resolve the FQDN to IP othere wise will give error