Pages

Wednesday, 26 June 2013

Microsoft Window Server 2008 Step by Step Installation

Windows Server 2008
Windows Server 2008 is one of Microsoft Windows' server lines of operating systems. Its officially released on February 27, 2008, it is the successor to Windows Server 2003, released nearly five years earlier. A second release, named Windows Server 2008 R2, was released to manufacturing on July 22, 2009. Like Windows Vista and Windows 7, Windows Server 2008 is based on Windows NT 6.x. window server 2008 is the most advanced windows yet designed to power the next generation of network
System Hardware Requirements of Window Server 2008
Component
Requirement
Processor
 Minimum: 1 GHz (x86 processor) or 1.4 GHz (x64 processor)
Memory
Minimum: 512 MB RAM
Available Disk Space
Minimum: 10 GB
Drive
DVD-ROM drive
Peripherals
Keyboard/Mouse

Step By Step Installation server 2008
1.       Insert the window server 2008 DVD into DVD ROM of Computer.
2.       Select the language Than Click on Next.

                      
3.        Click on Install Now.
4.       Enter the 25 character Product Key
5.       Click [YES] if you inserted the product key if you not inserted 25 character
        Product key select [NO] Click on Next.
6.       Select your window server 2008 product version and check Box at the bottom of the screen
   ☑. I have selected the edition of window that I purchased.
7.       Accept the license click on next.
8.       Click to Custom Installation.
9.       Now need to create a Hard Disk Drive Partition: Click on next.
10.   Select a partition where you want to install window server 2008
11.   Click on next.
12.   After clicking next this session will start the installing process.
13.   After completing installation process system will automatically reboot.
14.   After rebooting you should see similar to the following screen here you need to 
        click on [ok]
15.   Give Administrator Password Two times than click arrow Mark.
16.   Password changed successfully and now you can login now.

Configure Server Roles on Window Server 2008
1.       Click On Start -> Programs -> Administrator Tools-> Select server Manager
2.       Double Click On Roles.
3.       Click on ADD Roles.
4.       Click on next Bypass welcome screen
5.       Now you will see the select roles screen
6.       Checkmark the Box if you want to install any server Roles.
7.       Click Next to continue.
8.       Click Install to being Installation
9.       After Few mints Installation will complete now you can start the using your server 2008 .

Tuesday, 18 June 2013

What are the Functions keys and how it works in Computer:


Function key

A function key is a key on a computer or Terminal Keyboard which can be programmed so as to cause an operating system command interpreter or application program to perform certain actions. On some keyboards/computers, function keys may have default actions, accessible on power-on. Function keys on a terminal may either generate short fixed sequences of characters, often beginning with the escape character (ASCII 27), or the characters they generate may be configured by sending special character sequences to the terminal. Commonly known as "function keys", F1 through F12 may have a variety of different uses or no use at all. Depending on the installed operating system and the software program currently open will change how each of these keys operate.
 
 

 Function key: F1
Ø  Almost always used as the help key, almost every program will open the help screen when this key is pressed.
Ø  Enter CMOS SetUp.
Ø Windows Key + F1 would open the Microsoft Windows help and support center.
Ø  Open the Task Pane.

Function key: F2
Ø  In Windows renames a highlighted Icon, File, or Folder in all versions of Windows.
Ø  Alt + Ctrl + F2 opens document window in Microsoft Word.
Ø  Ctrl + F2 display the print preview window in Microsoft Word.
Ø  Quickly Rename a selected file or folder.
Ø  Enter CMOS SetUP.

Function key: F3
Ø  Often opens a search feature for many programs including Microsoft Windows when at the Windows Desktop.
Ø  In MS-DOS or Windows command line F3 will repeat the last command.
Ø  Shift + F3 will change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word.
Ø    Windows Key + F3 opens the Advanced find window in Microsoft Outlook.
Ø  Open Mission Control on an Apple computer running Mac OS X.

Function key: F4
Ø  Open find window in Windows 95 to XP.
Ø  Open the Address bar in Windows Explorer and Internet Explorer.
Ø  Repeat the last action performed (Word 2000+)
Ø  Alt + F4 will close the program window currently active in Microsoft Windows.
Ø  Ctrl + F4 will close the open window within the current active window in Microsoft Windows.

Function key: F5
Ø  In all modern Internet browsers pressing F5 will Refresh or reload the page or document window.
Ø  Open the find, replace, and go to window in Microsoft Word.
Ø  Starts a slideshow in PowerPoint.

Function key: F6
Ø  Move the cursor to the Address Bar in Internet Explorer, Mozilla Firefox, and most other Internet browsers.
Ø  Ctrl + Shift + F6 open to another open Microsoft Word document.

Function key: F7
Ø  Commonly used to Spell Check and Grammar Check a document in Microsoft programs such as Microsoft Word, Outlook, etc.
Ø  Shift + F7 runs a Thesaurus check on the word highlighted.
Ø  Turns on Caret browsing in Mozilla Firefox.

Function key: F8
Ø  Function key used to enter the Windows startup menu, commonly used to access Windows Safe Mode.

Function key: F9
Ø  Opens the Measurements toolbar in Quark 5.0.
Ø  With Mac OS 10.3 or later shows all open Windows.
Ø  Using the Fn Key and F9 at the same time will open Mission Control on an Apple computer running Mac OS X.

Function key: F10
Ø  In Microsoft Windows activates the Menu Bar of an open application.
Ø  Shift + F10 is the same as Right- Clicking on a highlighted icon, file, or Internet link.
Ø  Access the Hidden Recovery -Option  on HP and Sony computers.
Ø  Enter CMOS Setup.
Ø  With Mac OS 10.3 or later shows all open Windows for active program.

Function key: F11
Ø  Full-screen mode in all modern Internet browsers.
Ø  Ctrl + F11 as computer is starting to access the Hidden Recovery partition on many Dell computers.
Ø  Access the Hidden Recovery partition  on EMachines, Gateway, and Lenovo computers.
Ø  With Mac OS 10.4 or later hides all open windows and shows the Desktop.

Function key: F12
Ø  Open the Save as window in Microsoft Word.
Ø  Shift + F12 save the Microsoft Word document.
Ø  Ctrl + Shift + F12 print a document in Microsoft Word.
Ø  Preview a page in Microsoft Expression Web
Ø  Open FireBug.
Ø  With an Apple running Mac OS 10.4 or later F12 will show or hides the Dashboard..
vishalmassey.blogspot.com

Friday, 14 June 2013

How to Protect your computer from Viruses and Trojans

Computer Security:-

How to protect your computer from Virus?
Viruses and other kinds of malware slow your computer down and leave your private information vulnerable. Here’s how to protect your computer. To keep your computer healthy, it’s important to be aware of viruses and other malware that could slow performance, access your private information, and even delete files and programs. Malware is a harmful form of software that is used to send spam, host a phishing site, or steal your identity by monitoring your keystrokes without your knowledge. While there are several different types of malware, they can often be prevented with the same simple steps.

 Security Features:
• Network firewall: The Action Center ensures that Windows Firewall (or a third-party firewall) is enabled and protecting your PC against malicious Software that might travel to
your PC via a network or the Internet.
• Windows Update: Like Windows XP and Vista, Windows 7 includes an Automatic Updates feature that can automatically download and install critical Security fixes from Microsoft the moment they are released. Action Center ensures that Automatic Updates is enabled.
• Virus protection:  Although Windows 7 doesn’t ship with any antivirus Protection, Action Center still checks to ensure that an antivirus service is Installed and up-to-date. Modern antivirus solutions are designed to integrate With Windows Action Center so that the system can perform this monitoring Function.
• Spyware and unwanted software (malware) protection: Windows 7, like Vista, ships with Windows Defender, the malware protection suite. Action Center will monitor Windows Defender (or your anti-spyware solution of Choice) and ensure its running and using the latest definitions.
• Internet security settings: The Action Center ensures that Internet Explorer 8 Is configured in a secure manner. If you change any IE security settings Action Center will warn you about this issue.

Windows Defender:
Over the years, hackers have come up with new and inventive ways to attack PCs. Recently, spyware, one of the most pervasive and difficult forms of malware yet invented, Has become
a serious issue. For this reason, Windows 7 includes an integrated antispyware and anti-malware package called Windows Defender. Unlike some security products, you won’t typically see Windows Defender, as it’s designed to work in the background, keeping your system safe; but if you’d like to manually scan your system for malware or update your spyware definitions, you can do so by loading the Windows Defender application, Available through the Start menu.
Windows Defender does occasionally show up as an icon in the taskbar notification Area. This generally happens when the tool has been unable to download new definitions, the files it uses to ensure that its antispyware database is up-to-date. In such a Case, you can click the Windows Defender icon and trigger a manual download of the Latest updates.

 
Windows Firewall:
Windows Firewall is initially configured to block any unknown or entrusted connections
To the PC that originate over the network. You can enable exceptions to this behavior via
The Allowed Programs list, which you can access by clicking the link Allow a program or
Feature through Windows Firewall. Typically you just leave the settings as is, of course.
Depending on the network type (Home, Work, or Public) chosen when Windows 7 connects
To a network, some programs and features are automatically configured to communicate
Through the firewall.

Windows Update:
With Windows 98 over a decade ago, Microsoft introduced a Web-based service called
Windows Update that provided software updates to Windows users. That service has
Since been superseded by Microsoft Update, which also provides updates to many other
Microsoft software products. In Windows Vista, Windows Update was moved into the operating
System and made a client application, eliminating the number of Web browser hoops
You had to jump through to keep your operating system up-to-date. Windows 7 continues
To carry the Windows Update torch, making a few subtle changes for the good.

Cleaning Malware:
Most of us are aware, that malware files usually hide in the user profile section. So I did a brief study. The study included about 10 computers in a mixed environment. Surf all sorts of websites (including hank panky ones). USE Free C Cleaner to clean up your temporary files, and then RUN the malware program again. NONE of the computers were infected in RUN Moral of the story: Run a System clean up at every start up and you might save money on the Anti Malware subscription. Obviously this is not a "real time protection" protection!

In Private Browsing:
In Private Browsing turns off IE’s ability to locally store or retain browser history,Temporary Internet files, form data, cookies and user names, and passwords. It does Allow you to download files and add sites to your Favorites. By default, IE add-ons like Toolbars are
disabled in In Private Browsing mode, but you can change that from Internet Settings if desired. A related feature, In Private Filtering, is a first step in addressing the way in which many
Web sites share data with each other. Consider a mainstream Web site like wsj.com, for
The Wall Street Journal. This site is certainly reputable, but it utilizes advertising services
That work across multiple non-WSJ Web sites. Once these services have collected Information about you on wsj.com, they can track you across other sites that utilize the same services. This
is usually innocuous, but it’s possible that a malicious site could take Advantage of this capability and deliver dangerous content via other sites.
 

Tuesday, 11 June 2013

Information About Bluetooth Technology:

What is Bluetooth SIG Technology?
Bluetooth Special Interest Group (SIG)
Bluetooth wireless technology is revolutionizing personal connectivity by providing freedom from wired connections. It is a specification for a small-form factor, low-cost radio solution providing links between mobile computers, mobile phones, other portable handheld devices and automobiles, as well as connectivity to the Internet. The Bluetooth SIG, comprised of leaders in the telecommunications, computing, automotive and consumer electronics industries, is driving development of the technology and bringing it to market. The Bluetooth SIG includes Promoter member companies Agree, Ericsson, IBM, Intel, Microsoft, Motorola, Nokia and Toshiba, and thousands of Associate and Adopter member companies. The Bluetooth SIG, Inc. headquarters are located in Overland Park, Kansas, U.S.A.


What is the history of Bluetooth?
Bluetooth was initiated by Ericsson, IBM, Intel, Nokia and Toshiba in early 1998. These companies later formed a special interest group known as the Bluetooth SIG. The Bluetooth 1.0 specifications were released on July 26, 1999, but the technology has only recently become inexpensive enough for widespread use.

How secure a Bluetooth device is?
Bluetooth uses the SAFER+ algorithm for authentication and key generation. The E0 stream cipher is used for encrypting packets. This makes eavesdropping on Bluetooth-enabled devices more difficult.

How many devices can communicate concurrently?
A Bluetooth device playing the role of the “master” can communicate with up to 7 devices playing the role of the “slave”. This network of “group of up to 8 devices” (1 master + 7 slaves) is called a piconet . A piconet is an ad-hoc computer network of devices using Bluetooth technology protocols to allow one master device to interconnect with up to seven active slave devices (because a three-bit MAC address is used). Up to 255 further slave devices can be inactive, or parked, which the master device can bring into active status at any time.

Few applications Name of Bluetooth?
* Wireless control of and communication between a cell phone and a hands free headset or car kit. This is the most popular use.
* Wireless networking between PCs in a confined space and where little bandwidth is required.
* Wireless communications with PC input devices such as mouse and keyboards and output devices such as printers.
* Transfer of files between devices via OBEX.
* Transfer of contact details, calendar appointments, and reminders between devices via OBEX.
* Replacement of traditional wired serial communications in test equipment, GPS receivers and medical equipment.
* For remote controls where infrared was traditionally used.
* Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices.
* Wireless control of a games console, Nintendo’s Wii and Sony’s PlayStation 3 will both use Bluetooth technology for their wireless controllers.
* Sending commands and software to the upcoming LEGO Mind storms NXT instead of infra red.


Is Bluetooth an IEEE standard, like IEEE 802.11 and Ethernet?
Being an IEEE standard will be a big plus to widespread adoption of Bluetooth, and IEEE 802.15 working group for personal area networks (PAN) announced that they will be adopting Bluetooth as the IEEE 802.15 standard.

What is it - a technology, a standard, an initiative, or a product?
Bluetooth wireless technology is a de facto standard, as well as a specification for small-form factor, low-cost, short range radio links between mobile PCs, mobile phones and other portable devices. The Bluetooth Special Interest Group is an industry group consisting of leaders in the telecommunications, computing, and networking industries that are driving development of the technology and bringing it to market.

How does Bluetooth fit in with Wi-Fi?
The 802.11b (Wi-Fi) standard is commonly used for wireless networking. Bluetooth is not a competitor with 802.11b, but rather a complement to it. While 802.11b is generally a replacement for wired local area networking, Bluetooth is more commonly used as a replacement for cables between individual devices. Bluetooth is designed to link devices within a very short range (up to 33 feet). Bluetooth is part of the 802.15 standard.




(Bluetooth is a Wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.)

AddThis