Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Vista
Change page: < 1 2 3 4 5 6 7 8 9 10 >  |  Displaying page 9 of 10, items 401 to 450 of 465.
Configure Network Security (part1 ) - Secure Files and Printer Shares with Access Control Lists (ACLs)
Securing access to file and printer shares is more involved than setting Sharing and Discovery options in the Network and Sharing Center. Network access to file shares also involves configuring Access Control Lists (ACLs) on the file share and NTFS file permissions on the folders and files within the share.
Configure and Troubleshoot Remote Access (part 2) - Troubleshooting Windows Vista Remote Access Connections
Windows Vista remote access connections all have the capability to draw on Microsoft’s Network Diagnostic Framework. This is the same troubleshooting utility used on LAN and WLAN connections.
Configure and Troubleshoot Remote Access (part 1) - Remote Client Access Connections
PPTP is an old Microsoft favorite. Microsoft clients are the most prolific users of PPTP. PPTP places an encrypted PPP payload inside a Generic Routing Encapsulated (GRE) tunnel
Configure and Troubleshoot Wireless Networking (part 3) - Troubleshooting Wireless Connections
Windows Vista collects all the errors and informational messages that wireless connections generate into logs. You can view these event messages in the logs by using Windows Vista Event Viewer
Configure and Troubleshoot Wireless Networking (part 2) - Wireless Security
Microsoft Windows Vista offers the full complement of wireless security. Wireless security presents the most troublesome aspect of wireless network configuration because the WCN wizards, along with a host of other wizards in the Network and Sharing Center, allow easy creation of a wireless connection.
Configure and Troubleshoot Wireless Networking (part 1) - Managing Wireless Connectivity in the Enterprise
Users within enterprise environments often make incorrect choices when it comes to administering their own network connections. Because the scenario described in the preceding section is quite typical of how easy it is to create a connection, it is left up to the IT desktop administrator to choose between ease of use and security
Troubleshoot Resource Access and Connectivity Issues (part 2)
Windows Vista clients should all be assigned two DNS server addresses either through DHCP or static configuration. This helps ensure stability of name resolution in the event of a single server being incapacitated or unreachable.
Troubleshoot Resource Access and Connectivity Issues (part 1) - Troubleshooting TCP/IP Configuration
Within an enterprise Windows Vista desktops are most likely configured to use automatic IP configuration or DHCP. A Windows Vista computer utilizes the DHCP client service to acquire its IP configuration information from a DHCP server.
Configure and Troubleshoot Network Services at the Client Level
The Network and Sharing Center is a new and improved user interface for managing network connections. Integrated into the Network and Sharing Center is the new Network Explorer, which has replaced My Network Places from previous Windows operating systems.
Configure and Troubleshoot Network Protocols (part 3) - Configuring TCP/IP Version 6
The transition to TCP/IP version 6 (IPv6) has been coming for many years. IPv4 has lasted this long due to life support services such as Classless Internet Domain Routing (CIDR) and Network Address Translation (NAT)
Configure and Troubleshoot Network Protocols (part 2) - WINS & NAT
NetBIOS has been the backbone service that has, in the past, tied Microsoft’s networking services and resources together. Starting with the Windows 2000 operating system, Microsoft has slowly extricated itself from its reliance on NetBIOS as the primary name service on its networks
Configure and Troubleshoot Network Protocols (part 1) - Configuring Internet Protocol Version 4
The use of Public versus Private IP addressing is more of a design discussion. You need to be concerned over which addressing is in use when you need to route packets over public networks and if you are going to need the use of Network Address Translation (NAT).
Reliability and Performance Monitor
Whereas Event Viewer allows you to monitor system and application events, Reliability and Performance Monitor (RPM) allows you to monitor and log the reliability and performance of your computer
Event Viewer and Event Forwarding
Event Viewer is a tool used to monitor the health of the computer. Event Viewer has had a significant overhaul in Windows Vista and is now closely integrated with Task Scheduler and the Reliability and Performance Monitor
Scheduling Tasks
Often, the best time to perform maintenance for performance and disaster recovery is late, late at night, when all the users are at home and asleep, and the servers and the network are at their quietest.
Troubleshooting Policy Settings
With all the complexity of GPO processing through the series of L-S-D-OU-OU-OU, and with Block Inheritance and Enforced settings, you might easily recognize that, on occasion, what you get from your collection of GPOs isn’t exactly what you expected
Group Policy Settings (part 5) - Point and Print Restrictions & Digital Certificates and Authenticode
Point and Print restrictions allow you to control access to selected shared printers on the corporate network. By default, printers are shared with the permissions set to Allow—Print for the Everyone group
Group Policy Settings (part 4) - The Audit Policy
Auditing is a critical component of the security program for every company. You can configure systems to record what your users do (Success) and what your users attempt to do (Failure).
Group Policy Settings (part 3) - Managing Device Installation
Windows Vista and Windows Server 2008 have addressed and solved this problem through new GPO settings that can control what types of devices can be installed by users, by administrators, or both.
Group Policy Settings (part 2) - Software Restrictions
These GPOs are used to deny all executables except those specifically allowed using the Restricted Default Rule, or used to allow all executables and then disallow specific executables using the Unrestricted Default Rule.
Group Policy Settings (part 1) - Desktop Settings & Software Deployment by GPO
One of the first target areas has to do with locking down your Desktop settings. Remember that GPOs have two halves: the computer configuration half and the user configuration half.
Group Policy Object Overview (part 2) - Applying GPOs to a Computer and User in an AD Environment
The computer is turned on. All the Local settings are read from the files on the local hard drive that make up the Registry and the Local Computer Policy (LCP) and are placed in RAM
Group Policy Object Overview (part 1) - Building a Local Computer Policy & The Domain Member Computer
GPOs Apply to Domain Members Only Keep in mind that GPOs affect only computers and users that are members of an Active Directory domain. If the computer and user are not members of an AD domain, only the Local Computer Policy and the user’s profile get applied to the user’s desktop session.
User Account Control (UAC)
User Account Control is enabled by default in Windows Vista and recognizes when more privilege is required to complete a task. When UAC detects that elevated privilege is needed, UAC first locks the desktop so no malicious activity can occur.
Troubleshoot Authentication Issues - SmartCards
Authentication is the process of having an authentication system validate a user’s identity. First, a user provides some sort of proof of identity and then requests an authentication system to validate that identity information is accurate.
Configure and Troubleshoot Access to Resources (part 4) - Securing Network Traffic for Remote Desktop Protocol (RDP) Access
IPSec is used to secure network traffic between client and server computers, typically on the corporate LAN, or over the Internet between two LANs.
Configure and Troubleshoot Access to Resources (part 3) - IPSec for Securing Network Traffic on the Local LAN
Internet Protocol Security, or IPSec, is an authenticated, encrypted channel between two computers. The IPSec protocol is built into all Microsoft operating systems since Windows 2000, including Windows Vista.
Configure and Troubleshoot Access to Resources (part 2) - Printer Sharing
Another common network resource is the shared printer. This functionality of sharing printers is provided by the Server service (File and Printer Sharing) on a Vista computer.
Configure and Troubleshoot Access to Resources (part 1) - Permissions
The whole reason to build and administer a network is to provide users with access to resources to make them more productive. When this access fails, users get cranky, bosses get cranky, and an administrator’s day just got worse.
Windows Update (part 4) - Troubleshooting Updates
Automatic updates can fail for many reasons. We’re going to look at a few of the more common failures here and address how to recover from them to get the automatic update process running again.
Windows Update (part 3) - Windows Server Update Services Server (WSUS)
In a corporate environment, with dozens, hundreds, or even thousands of client computers, administrators need more control over the updating system. Microsoft provides, free of charge, the Windows Server Update Services (WSUS) server.
Windows Update (part 2) - Automatic Updates
Windows Update can also be configured for automatic updates, where the computer downloads the list of all available updates, from the Windows Update website, on a predefined schedule.
Windows Update (part 1) - Manual Updates
Updates can be implemented manually or automatically in the consumer environment, or through an infrastructure-based system called Windows Server Update Services that is typically implemented in a larger, corporate environment where Active Directory is present.
Windows Defender and Other Defenses Against Malware
Microsoft’s Windows Defender is a free tool that gets installed automatically with Windows Vista. It finds and tries to remove malicious software and other unwanted programs, often called malware or spyware.
Windows Firewall
A firewall is a service on a computer or a device that isolates your computer from unsolicited network traffic and can be used to control the type and destination of outbound traffic sent from your computer.
Troubleshoot Security Configuration Issues (part 2) - Securing Data in Storage with Encrypting File System & Securing Computers with the Security Configuration and Analysis Tool
The Encrypting File System (EFS) can be used on New Technology File System (NTFS) partitions beginning with Windows 2000. It can be used on files and folders, whereas BitLocker only encrypts the entire partition.
Troubleshoot Security Configuration Issues (part 1) - The Windows Security Center & Securing the Operating System and Data in Storage with BitLocker
BitLocker is an encrypting technology that has been introduced in Windows Vista. It is included with Windows Vista Ultimate and with Windows Vista Enterprise. BitLocker encrypts the entire volume (partition) that holds the operating system.
Configure and Troubleshoot Security for Windows Internet Explorer 7 (part 4) - Digital Certificates
Digital certificates are used to establish strong security in an information system. Digital certificates provide four services to the user.
Configure and Troubleshoot Security for Windows Internet Explorer 7 (part 3) - Cookie-Handling & ActiveX Opt-In
A cookie gets used, for example, when you personalize a home page—with a greeting that calls you by name, your chosen background color, and additional content that you choose to have on your personalized home page.
Configure and Troubleshoot Security for Windows Internet Explorer 7 (part 2) - Internet Explorer’s Protected Mode
Protected Mode reduces the level of privilege for the user account that launched Internet Explorer. This way, if malware (or a bad guy) attacks and compromises the browser, it can access only a bare minimum of resources on your computer.
Configure and Troubleshoot Security for Windows Internet Explorer 7 (part 1) - Pop-Up Blocker & Phishing Filter
Pop-ups are extra windows that appear when you visit a website. They are usually advertisements and are often from an advertiser other than the website you intended to visit
Troubleshooting Deployment Issues
During any deployment of a new operating system, you are bound to run up against unforeseen obstacles. The key to overcoming these obstacles is to be armed to the teeth with lots and lots of knowledge.
Perform Post-Installation Tasks (part 3) - Managing Computers with Multiple Operating Systems
Windows Vista profiles have an entirely different structure than those in previous versions. The profile’s directory structure was simplified by reducing the complex folder hierarchy of previous Window profiles.
Perform Post-Installation Tasks (part 2) - Managing User Data
Windows Vista profiles have an entirely different structure than those in previous versions. The profile’s directory structure was simplified by reducing the complex folder hierarchy of previous Window profiles.
Perform Post-Installation Tasks (part 1) - Restoring User State Data & Ensuring Driver Availability
If the computers have been upgraded with profiles contained locally, all that is necessary for you to complete the installation is to check for any issues with the profiles and ensure their operability.
Deploy Windows Vista from a Custom Image
Several configuration passes occur during the different phases of Windows Vista Setup. When performing unattended installations, you must heed the issues of each of these phases as well as what settings can or should be made during a specific configuration pass.
Configuring Windows Vista Productivity Applications - Windows Mail
Windows Mail is an e-mail and newsgroup client software package that replaced Outlook Express, which came with Windows XP. It enables you to exchange email with others, and it enables you to organize, manage, and protect your e-mail.
Configuring Mobile Computers - Configuring Tablet PCs
All Tablet PCs have several hardware buttons for common tasks, which can be programmed as needed. In addition, you can program the digital pen by assigning key commands or actions to simple pen gestures called flicks.
Configuring Mobile Computers - Giving Presentations
When presentation settings are turned on, your mobile PC stays awake, and system notifications are turned off. You can also choose to turn off the screen saver, adjust the speaker volume, and change your desktop background image
Configuring Mobile Computers : File and Data Synchronization
While using mobile computers, sometimes you are connected to a corporate network and other times you are not. Sometimes you might want to work on the files stored on a network server even when you are not connected to the network that holds the network server.
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server