Remote Access
Time-to-Live (TTL)
The DNS System powers the Internet as we know it today and is responsible for converting domain names into IP addresses and for placing them on the correct hosting server. But the DNS system would have been just a theoretical concept, if TTL was not presented.
TTL is an acronym for Time To Live and refers to the capability of the DNS servers to cache DNS records. It represents the amount of time that a DNS record for a certain host remains in the cache memory of a DNS server after the latter has located the host's matching IP address.
By specifying TTL settings for a particular domain's DNS records, webmasters define the frequency of website content updates. The longer the TTL value is, the faster the domain resolution time periods will be. The TTL value can be set from one to several hours, if you are not planning any changes to your domain's DNS records in the meantime. If you need to make such changes, you will have to decrease the TTL value entry to several minutes to avoid any outdated data on your website.
TTL values are entered as seconds and the common TTL time value is 86400 seconds, which is virtually equal to one day (24 hours). With this value set for your domain, any changes to your DNS records will be reflected online in up to 24 hour
Difference between windows xp and server 2003?
Note: There is Lot of difference win XP & win server 2003. Xp is a client operating systems. but win 2003 is a server. we can not install active directory in Xp. but we install active directorey win server 2003. we can not manage centralize Win xp. but we manage centralize Win server 2003. Win Xp use small network Maximum 25 computer in a network. but we manage large network through win server 2003.
Note: If you want more information so you can visit http://www.iyogibusiness.com/
What is the function of the forward lookup DNS zone in the DNS name resolution pro?
I think the forward look-up zone is use to convert host name to ip address of a pc in our network
Specialized Device for exchanging data amongst class based Networks & Subnetted (multiple parts of one network) is Router.
A DNS address is the address to a server that converts a URL to an IP address. Most DNS address' are provided by your ISP, although there are many free DNS servers available.
How do you find primary and secondary DNS number?
could somebody help me out on this one i can't figure it out to?
there is no difference between a primary and secondary DNS server except that in normal operation the primary is the one that is tried first if that dosent work then the secondry is used, just list any 2 of the 3 you have as primary and secondry
Which types of dns records does a domain client use to find a domain controller?
NS 2 RFC 1035
Name Server. Defines the authoritative name server(s) for the domain (defined by the SOA record) or the subdomain.
SOA
What is the difference between dhcp server and dns?
DHCP is Dynamic Host Configuration Protocal. It assings IP addresses to the needed computers in a network dynamically.
DNS is Domain Naming System(Service) It is system for naming computers and network services that is organized into a hierarchy of domains. DNS naming is used in TCP/IP networks, such as Internet, to locate computers and services through user friendly names.
What is the server used to run PHP in Windows?
One of the Windows Server operating systems.
PHP can be installed with Microsoft's IIS web server as an ISAPI filter, or you can install the WAMP server under Windows that contains the Apache web server, the PHP interpreter, and mySQL.
There are others as well, such as the Xitami web server, etc., that work equally well with PHP under windows.
What is organizational unit in active directory?
Domain: A security boundary for the network On a local area network (LAN), a domain is a subnetwork made up of a group of clients and servers under the control of one central security database. Within a domain, users authenticate once to a centralized server known as a domain controller, rather than repeatedly authenticating to individual servers and services. Individual servers and services accept the user based on the approval of the domain controller. Organisational Unit: A part of Active Directory used to Organise and Manage the objects of AD An organizational unit (OU) is a subdivision within an Active Directory into which you can place users, groups, computers, and other organizational units. You can create organizational units to mirror your organization's functional or business structure. Each domain can implement its own organizational unit hierarchy. If your organization contains several domains, you can create organizational unit structures in each domain that are independent of the structures in the other domains. The term "organizational unit" is often called as "OU" in casual conversation. "Container" is also often applied in its place, even in Microsoft's own documentation. All terms are considered correct and interchangeable.
Talk about all the AD-related roles in Windows Server 2008 R2?
Windows Server 2008 has five Active directory related roles. below are the list
1. Active Directory Domain Services (Identity): AD DS it provides the functionality of an identity and access (IDA) solution for enterprise networks. It also provides the mechanisms to support, manage, and configure resources in distribution network environments.
2. Active Directory Lightweight Directory Services (Applications): AD LDS formerly known as Active directory application mode (ADAM), provides support for directory-enabled applications.
3. Active Directory Certificate Services (Trust): AD CS to set up a certificate authority for issuing digital certificates as a part of a public key infrastructure (PKI) that binds the identity of a person, device or service to corresponding private key. Certificates can be used to authenticate users and computers, provide web-based authentication, support smart card authentication, and support application, including secure wireless n/w, vpn, Ipsec, EFS, and more.
4. Active Directory Rights management Services (Integrity): AD RMS is an information-protection technology that enables you to implement persistent usage policy templates (for documents) that define allowed and unauthorized use whether online, offline, inside, or outside the firewall.
5. Active Directory Federation Services (Partnership): AD FS enable an organization to extend IDA across multiple platforms, including both window and non-windows environments, and to project identity and access rights across security boundaries to trusted partners.
domain local group
Can I use Windows XP home as a website server?
There is nothing that specifically stops you from using Windows XP as a server. However, the TCP/IP stack has been "crippled" to limit the number of simultaneous connections, ostensibly to prevent the spread of malware. This would stop you from effectively using a Windows XP as a large-scale server. There are patches to improve such functionality.
Activate it
What membership information is stored on the global catalog?
A complete or partial replica of all objects in an Active Directory forest is stored in the Global Catalog. This includes a user's group memberships in global, universal, and domain local groups. A universal group is stored in the Global Catalog in its entirety, including all users within that group. Global groups, on the other hand, only store the group data in the Global Catalog. The actual members of the group are not replicated to the Global Catalog, saving some network bandwidth. Domain local groups are a breed of their own. Like global groups, their members are not stored in the Global Catalog, again saving bandwidth. It's when we start adding domain local groups in a multi-domain or multi-forest environment that things get tricky.
When a user attempts to search for or access an Active Directory object (such as a shared folder or printer), he must go through the Global Catalog first. When a client accesses the Global Catalog, he is granted what is called an impersonation token. This token is used to grant or deny the user access to objects stored in the Global Catalog. Inside this token is information on what type of groups the user belongs to (global, universal, or domain local). However, domain local group membership included in the token can be incomplete in a multi-domain environment.
The following two items are included in the user's token:
Domain local groups present in the domain hosting the Global Catalog
User's membership in domain local groups within the domain hosting the Global Catalog
BUT if the user is a member of other domain local groups in other domains, he is out of luck, as this information is not included in the token. Why is this important? In addition to a partial replica of all objects in a forest, the Global Catalog contains a listing of each object's permissions specifying who should and should not have access to them. This listing is called a Discretionary Access Control List (DACL). When the user tries to access an Active Directory object, the Global Catalog compares the user's impersonation token with the object's DACL. If the object to be shared has read/write access granted to a domain local group in a different domain to which the user is a member, he may be denied access because this group membership is not present in the user's token
What are the advantages of application server?
; and code integrity : By centralizing business logic on an individual or small number of server machines, updates and upgrades to the application for all users can be guaranteed. There is no risk of old versions of the application accessing or manipulating data in an older, incompatible manner. ; Centralized configuration : Changes to the application configuration, such as a move of database server, or system settings, can be done centrally. ; Security : A central point through which access to data and portions of the application itself can be managed is considered a security benefit, devolving responsibility for authentication away from the potentially insecure client layer without exposing the database layer. ; Performance : By limiting the network traffic to performance tier traffic, it is perceived that the client-server model improves the performance of large applications in heavy usage environments. ; Total Cost of Ownership (TCO) : In combination, the benefits above are considered to represent a cost saving to a company when developing enterprise applications. In practice, however, the technical challenges of writing software that conforms to that paradigm combined with the need for software distribution to distribute client code somewhat negate these benefits. ; and code integrity : By centralizing business logic on an individual or small number of server machines, updates and upgrades to the application for all users can be guaranteed. There is no risk of old versions of the application accessing or manipulating data in an older, incompatible manner. ; Centralized configuration : Changes to the application configuration, such as a move of database server, or system settings, can be done centrally. ; Security : A central point through which access to data and portions of the application itself can be managed is considered a security benefit, devolving responsibility for authentication away from the potentially insecure client layer without exposing the database layer. ; Performance : By limiting the network traffic to performance tier traffic, it is perceived that the client-server model improves the performance of large applications in heavy usage environments. ; Total Cost of Ownership (TCO) : In combination, the benefits above are considered to represent a cost saving to a company when developing enterprise applications. In practice, however, the technical challenges of writing software that conforms to that paradigm combined with the need for software distribution to distribute client code somewhat negate these benefits.
How do you Restore deleted objects in Active Directory?
Deleted user account has been restored through system sate backup.
But it can be restored in DRSM mode i.e directory restored mode .
What is the ticker symbol for Norton AntiVirus?
Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today!
cutt.ly/qhNQh2V
A provides a two-way transitive trust relationship between all domains within two forest?
Tree-Root Trust or cross forest trust (windows server 2008 active directory)
How do you close open ports on Windows Server 2003?
Hi , there is many ways to close or open ports the 1st one from the router (AL)access list the 2nd one throw the firewall cotrol panel-firewall-advanced-LAC(local area connection)-settings or cotrol panel-firewall--exceptions-add port the 3ed way control Panel|Network|"connection"|Properties|Tcp/Ip|Properties|Advanced|Options| Tcp/Ip|filtering|Properties i hope that i answer the question Regards Eng.thaer thaer2oo2@yahoo.com
Explain the process of installing dhcp server in an active directory infrastructure?
It is about how to install DHCP server...
In Windows server 2008 ...
Go to... START-->Administrative Tools --> Server Manager --> Roles (Right Click)
--> Add Roles (Here a Add roles wizard will appear) --> Check the box of DHCP Server
--> click next --> Next --> In IPv4 DNS settings Give the parent domain Name and DNS server
IP address and validate it... Click Next --> Add the DHCP scopes --> Disable DHCPv6.. click
Next --> Finally Click on INSTALL
This was the process for installing the DHCP server.,....
What is the primary responsibility of the web server administrator?
granting and monitoring
maintaining access and security
developing, coordinating, publishing, maintaining, and testing
What is the System requirement for windows 2003 server installation?
The following are the Minimum requirements for installation but it would be better to increase most of them. * 133 MHz or more Pentium microprocessor (or equivalent). Windows 2000 Professional supports up to two processors on a single computer. * 64 megabytes (MB) of RAM recommended minimum. 32 MB of RAM is the minimum supported. 4 gigabytes (GB) of RAM is the maximum. * At least 2 GB hard disk that has 650 MB of free space. If you are installing over a network, more free hard disk space is required. * monitor. * Keyboard. * Mouse * CD drive or DVD drive