Recent posts
I have 300+ machines on my network. The problem is when my staff tries to log back in, they were unable to get an IP address. Checking on the AD server which I used to serve as a DHCP, it was up and running actively.
But running the ipconfig command...
Read more
Hi,
Deleted some user accounts by mistake in Active directory. Can you help retrieving them. I have another question posted in this site about a desktop issue as well.
Thanks.
Magi
Read more
I get this error
svchost.exe -- application error the instruction at "0x745f2780" reference memory at "0x00000000". the memory could not be 'read'
when closed the error box the windows restarts and when left it alone it stays On.
Can anyone help me with a solution. Googling did not help much
Read more
Hi,
For few users we are getting error like
Windows cannot connect to the domain, either because the domain controller is down or otherwise unavailable, or because your computer account was not found.
Waiting for your reply.
Cheers, Bipin
Read more
Microsoft .net Framework Microsoft .net framework is a framework application which provides the bridging for programming languages and windows operating system. It is the common layer which includes libraries, definitions, code compatibility, language compatibility and much more. It is installable on every Microsoft Windows Operation System. Microsoft .net framework allows...
Read more
From Paper to 3TB HDD For several years, paper was utilized as the most important storage medium in the history of computer systems. Picture a life of punching holes into paper tapes or punch cards to record a program and data in your computer. Imagine yourself...
Read more
Lync server: HISTORY Microsoft Office Live Communications Server was initially launched on December 29, 2003 to replace the Exchange Instant Messenger service included in Exchange 2000, which was withdrawn from all the features of Exchange 2003. Dealers, including Exchange 2000 Software Assurance are entitled...
Read more
Introduction to Computer & IT Insecurity Computer security and IT security are terms associated with the protection of computer software, hardware, and the network systems from the hazards of external attacks from virus, cracking, hacking, etc. In fact, the security measures and policies aim at safeguarding or protecting the...
Read more
Ethical Hacking and its Difference to Malicious Hacking Ethical Hacking is also often termed as Intrusion, Penetration Testing, Tiger Teaming, Sneaking, or Red Teaming. The methodologies used for ethical hacking are similar to those used for malicious hacking. The only difference between the two is the former uses the...
Read more
Computer Network’s Security Systems Penetration Penetration refers to a successful, but an unauthorized breach of security perimeter of a computer system. Penetration Testing is done as a part of ethical infiltration, wherein the computer network’s security systems are evaluated thoroughly by simulating attacks from malevolent sources, also called the...
Read more