• Main Menu
  • Microsoft Windows

    • Controlling Bandwidth Usage in ISA Server

      Controlling Bandwidth Usage in ISA Server

      Bandwidth Usage in ISA Server Network performance can depreciate because of a number of issues. With ISA Server, you can use bandwidth priorities and bandwidth rules to set propriety levels for traffic. Effective bandwidth is the terminology used to describe the data transfer rate available to clients through dial-up connections or dedicated Internet connections. Bandwidth

    • How Does Microsoft Word Password Recovery Work?

      How Does Microsoft Word Password Recovery Work?

      Microsoft Word documents can utilize three passwords: Password to open Password to modify Protect document password   Password to Open   The Password to open requires a user to enter a password to view the document.   When the user sets a Password to open, the entire Microsoft Word document is encrypted with the RC4

    • Understanding Internet Connections

      Understanding Internet Connections

      Internet Connectivity Introduction  In most organizations and networks today, Internet connectivity is no longer an additional option, but a necessity. Most organizations that have a networking environment need to provide its employees or users with some form of connectivity to the Internet. E-mail and Web sites have evolved into being important mechanisms for a vast

    • Installing a SMS Primary Site Server

      Installing a SMS Primary Site Server

      Primary Site Server Installation Overview A SMS site server is the Windows server on which SMS 2.0 is installed and running. The SMS site server is the main access point between the SMS database and administrators. The SMS server manages the SMS site and component attributes. The SMS site server must be installed on a

    • How to Delegate Administrator Privileges in Active Directory

      How to Delegate Administrator Privileges in Active Directory

      The primary reason to create organizational units is to distribute administrative tasks across the organization by delegating administrative control to other administrators. Delegation is especially important when a decentralized administrative model is developed. Delegation of administration is the process of decentralizing the responsibility for managing organizational units from a central administrator to other administrators. The

    • Error 734

      Error 734

      Error 734 is a Point-to-Point Protocol error, usually associated with workstation connectivity to a internet provider or wide area network connection. The exact error message is "Error 734: The PPP link control protocol was terminated.". Source of the problem Error 734 is usually produced due to an error in authentication. Generally the username or password

    • Understanding Trust Relationships

      Understanding Trust Relationships

      In the Windows NT domain model, domains had to be bound together through trust relationships simply because the SAM databases used in those domains could not be joined. What this meant was that where a domain trusted another Windows NT domain, the members of the domain could access network resources located in the other domain.

    • Understanding NetBIOS Name Resolution

      Understanding NetBIOS Name Resolution

      NetBIOS, broadcasts names to listening nodes on the network. NetBIOS utilizes a User Datagram Protocol (UDP) query to broadcast names. NetBIOS names identified computers on the network before the introduction of Windows 2000. The NetBIOS name is resolved to an IP address through Windows Internet Name Service (WINS), broadcasting, or the LMHOSTS file. If the

    • Monitoring BizTalk Server

      Monitoring BizTalk Server

      The Different Monitoring Tools for Monitoring Windows and BizTalk Server Systems You can use System Monitor, Task Monitor, Network Monitor, Event Viewer, and Performance Logs And Alerts to monitor the system. You can use System Monitor and Performance Logs And Alerts to create baselines, identify bottlenecks, determine performance trends, and test any configuration changes. Windows

    • Windows 10: How to Uninstall Built-in Apps?

      Windows 10: How to Uninstall Built-in Apps?

      Past Windows versions always had some preinstalled applications. Some were legendary and enjoyed a legendary status, while some were quite annoying. The same applies to Windows 10, with one exception: the number of “unwanted” apps is larger than ever. There is no simple way to uninstall the numerous unwanted Windows 10 apps. You either need

    180 queries in 0.635 seconds.