Академический Документы
Профессиональный Документы
Культура Документы
1. C:\>ping 192.168.1.1
C:\> ping /?
Options
- t
- a
- n
- L
- f
- I - ttl
- v - tos
- r - count
- s - coat
- j - host list
- k - host list
- w - time out
2. C:\> ipconfig/all
We use this command for finding out the network interface and also finding out the
network interface device.
3. C:\> tracert
We use this command for finding out the exact path and also for jumping one computer
to another computer
4. C:\> telnet
• telnet is used in port no. 23 | and telnet need always passward
Login – Administrator
Password - ……………
C:\> logout
5. C:\> nslookup
This command is used for restore the DNS records it is used in Local DNS
6 C:\> telnet 192.168.1.205 ( through this IP address we can access another computer)
7 C:\> mstsc <enter> (we can remotely access the another computer )
8 C:\> netstat <enter> ( this command is used for display protocol statistics and also
convert TCP/IP network connection. OR also used for watching session or current open
session.
9 C:\> arp
********************
Performing Computer (Disk) Management
Start > My computer > Mange> Disk Management
Very first time if you are managing any disk it will be on the Basic Disk Basic Disk
contains up to four Primary Partitions or three Partitions and an extended partition with
multiple logical drives.
Basic Disk contains up to four Primary Partitions or three Partitions and an extended
partition with multiple logical drives.
• Fist convert basis disk into Dynamic Disk by using disk management
• diskpart.exe command can be used ( to convert basic disk into dynamic disk)
A physical disk provides features that basic disk do not, such as support for volumes that
spam multiple disks.
The Volume from which the computer startup. The Active Volume must be a Simple
Volume on a Dynamic Disk.
Fist you must dismount and take offline the volume containing the original files before
you convert the disk containing shadow copy in Dynamic Disk. Once converting Basic
Disk into Dynamic Disk you cannot change basic Volume back, you must delete all
volumes on the Disk and then you can convert Dynamic Disk into Basic Disk. Your
computer will restart when you convert Dynamic Disk into Basic Disk.
If a volume does not have a file system or it is formatted using the NTFS file
system, you cannot extend volumes formatted using FAT or NTFS 32.
Resynching Message
The volumes mirrors are being resynchronized so that both mirrors contain
identically data. (the message appear when extending volumes)
Online Message
The disk is OK
Extended Volume
If you are extending volumes which contains system files it will also mirrored in another
disk.
Simple Volume
• It contains disk space from a single disk and can be extended if necessary.
• If the volume deleted the file or data cannot be recovered.
Spanned Volume
Striped Volume
Mirrored Volume
***********
Backup
Types of back up
Normal backup
Copy backup
Incremental backup
Differential Backup
Daily Backup
Normal Backup
A normal backup copies all selected files and marks each file as having been backed up
(in other words, the archive attribute is cleared). With normal backups, you need only the
most recent copy of the backup file or tape to restore all of the files. You usually perform
a normal backup the first time you create a backup set.
Backing up your data using a combination of normal backups and incremental backups
requires the least amount of storage space and is the quickest backup method. However,
recovering files can be time-consuming and difficult because the backup set can be stored
on several disks or tapes.
Backing up your data using a combination of normal backups and differential backups is
more time-consuming, especially if your data changes frequently, but it is easier to
restore the data because the backup set is usually stored on only a few disks or tapes.
Copy backup
A copy backup copies all selected files but does not mark each file as having been backed
up (in other words, the archive attribute is not cleared). Copying is useful if you want to
back up files between normal and incremental backups because copying does not affect
these other backup operations.
Incremental backup
An incremental backup backs up only those files created or changed since the last normal
or incremental backup. It marks files as having been backed up (in other words, the
archive attribute is cleared). If you use a combination of normal and incremental backups,
you will need to have the last normal backup set as well as all incremental backup sets in
order to restore your data.
Differential backup
A differential backup copies files created or changed since the last normal or incremental
backup. It does not mark files as having been backed up (in other words, the archive
attribute is not cleared). If you are performing a combination of normal and differential
backups, restoring files and folders requires that you have the last normal as well as the
last differential backup.
Daily Backup
A daily backup copies all selected files that have been modified the day the daily backup
is performed. The backed-up files are not marked as having been backed up (in other
words, the archive attribute is not cleared).
Create and select any file or folder which you want take backup. Suppose you want to
take backup the file placed on the desktop.
Start > Run > Ntbackup >backup or restore wizard will open
Second Step
Step 3
Step 4
Step 5
Browse if you want to keep backup in desktop do next and save it on desktop and
finish
Now select
the
advance
tab
Open the box
available
various types
of backups,
There are 5
types of
backup
available.
With normal backups, you need only the most recent copy of the backup
file or tape to restore all of the files. You have usually performed a normal
backup the first time you created a backup set.
In advanced Attributes box see the message the file is ready for archiving <click ok>
< apply> <ok> Right click the folder
which you want to
****************** check the archiving.
******************
Copy backup
A copy backup copies all selected files but does not mark each file as having been
backed up (in other words, the archive attribute is not cleared). Copying is useful if
you want to back up files between normal and incremental backups because copying
does not affect these other backup operations.
• A copy backup is responsible for taking backup the selected files only
• C – all files and no remove the mark, if we have modified file no. 1,2,5 then also
it will take backup but it will not remove the mark.
Conclusion: In previous
normal backup when second
time doing any modification
the box will be checked. But
in copy backup second time
modification the box will be
unchecked.
Incremental backup
An incremental backup backs up only those files created or changed since the last normal
or incremental backup. It marks files as having been backed up (in other words, the
archive attribute is cleared). If you use a combination of normal and incremental backups,
you will need to have the last normal backup set as well as all incremental backup sets in
order to restore your data.
Conclusion: if we
have modified any
files previously then
incremental backup is
good.
After doing any
modification the
box will be
unchecked in
incremental
backup.
Differential backup
A differential backup copies files created or changed since the last normal or incremental
backup. It does not mark files as having been backed up (in other words, the archive
attribute is not cleared). If you are performing a combination of normal and differential
backups, restoring files and folders requires that you have the last normal as well as the
last differential backup.
* if we select all unmark file should copied, and mark will be removed
Daily Backup
A daily backup copies all selected files that have been modified the day the daily backup
is performed. The backed-up files are not marked as having been backed up (in other
words, the archive attribute is not cleared).
No remove mark but take backup of files in which data file was modified.
1. Normal
2. Normal + Incremental
3. Normal + Differential
Backup Planning
T1 T2 T3 T4 T5 T6
T1 T2 T3 T1 T2 T6
T1 T2 T3 T4 T5 T7
T3 T1 T2 T3 T1
Daily 5 files
Daily 3 files
Wed 4 Files
Mon 12 files
*****************
Compressing files, folders, and programs decreases their size and reduces the amount of
space they use on your drives or removable storage devices. Drive compression decreases
the amount of space used by all of the files and folders stored on that drive.
Windows supports two types of compression: NTFS compression and compression using
the Compressed (zipped) Folders feature.
NTFS compression
• If you do not have an NTFS drive, this option is not available. To determine
whether your drive is formatted with NTFS, open My Computer, right-click a
drive, and then click Properties. The file system is indicated on the General tab.
• You can compress individual files and folders using NTFS compression, as well
as entire NTFS drives.
• You can compress a folder without compressing its contents.
• You can work with NTFS-compressed files without decompressing them.
• You can display NTFS-compressed file and folder names in a different color to
make them easier to identify.
• You may notice a decrease in performance when working with NTFS-compressed
files. When you open a compressed file, Windows automatically decompresses it
for you, and when you close the file, Windows compresses it again. This process
may decrease your computer’s performance.
• NTFS-compressed files and folders only remain compressed while they are stored
on an NTFS drive.
• You cannot encrypt an NTFS-compressed file.
• NTFS file encryption is not available on Windows XP Home Edition.
Performing Compressing
• Before compressing file see the file size first, and note after compressing what is
the files size
Select the file > right click > properties > advance >
Compress contents
to save disk space
Check the box
Note
(241,894,210)
bytes
*************
Encrypt
{for performing Encrypting need net atmosphere}
• This folder option is used to no one can access your file or folder.
Encrypting File System (EFS) provides the core file encryption technology used to store
encrypted files on NTFS file system volumes. Once you encrypt a file or folder, you
work with the encrypted file or folder just as you do with any other files and folders.
Encryption is transparent to the user that encrypted the file. This means that you do not
have to manually decrypt the encrypted file before you can use it. You can open and
change the file as you normally do.
Using EFS is similar to using permissions on files and folders. Both methods can be used
to restrict access to data. However, an intruder who gains unauthorized physical access to
your encrypted files or folders will be prevented from reading them. If the intruder tries
to open or copy your encrypted file or folder he receives an access denied message.
Permissions on files and folders does not protect against unauthorized physical attacks.
You encrypt or decrypt a folder or file by setting the encryption property for folders and
files just as you set any other attribute such as read-only, compressed, or hidden. If you
encrypt a folder, all files and subfolders created in the encrypted folder are automatically
encrypted. It is recommended that you encrypt at the folder level.
You can also encrypt or decrypt a file or folder using the cipher command. For more
information, see Cipher.
Configuring disk quotas for the POP3 service
Important
• You can configure disk quotas only on NTFS file system partitions.
You can use disk quotas to control and limit the amount of disk space individual
mailboxes on the mail server can use. This ensures that individual mailboxes, and the
mail store in general, do not use excessive or unanticipated amounts of disk space and
adversely affect the performance of the server where the POP3 service is running.
For example, if the mail server suddenly receives a large volume of unsolicited e-mail,
the mail store expands rapidly and might use all of the available disk space on the hard
disk. If you implement quotas, the mail store only expands to the quota limit that you
specified. As a result, no more mail is accepted by the server, and the rest of the server
still functions normally.
If you are using Active Directory integrated authentication or local Windows accounts
authentication, the e-mail delivered to a POP3 service mailbox will have file ownership
assigned to the mailbox user by default. A quota file is created in the mailbox directory
that contains the security identifier (SID) of the user account associated with the mailbox.
File ownership is then assigned to the user account that corresponds to the SID contained
in the quota file. The SID is also used by the NTFS file system disk quota system to
enforce the quota limits specified on the user account matching the SID. All e-mail
transferred to the mailbox's mail store directory is marked with the SID contained in the
quota file; this marks the e-mail so it can be monitored by the quota system.
For example, if \\Production\Public is shared from the root directory of an NTFS volume,
you might want to set a quota limit of 50 megabytes (MB) for all users of
\\Production\Public, while making sure two users who work with larger files on the server
have a 100 MB limit. If both of these users already have files stored on
\\Production\Public, you can select both users and set their quota limit to 100 MB.
However, if one or both users do not have files stored on the server when you enable
quotas, you need to select the users in the Quota Entries window and then set their quota
limit to a value higher than the default for new users.
1. Open My Computer.
2. Right-click the disk volume for which you want to enable disk quotas, and then
click Properties.
3. In the Properties dialog box, click the Quota tab.
4. On the Quota tab, click the Enable quota management check box.
5. Select one or more of the following options, and then click OK:
Then right
click the
selected
disk
properties
which you
want to
apply quota
There are two view options for Control Panel: Category View and Classic View.
Category View displays Control Panel icons according to the type of task that the user
wants to perform. Classic View displays Control Panel icons in a view that is familiar to
users of previous versions of Windows.
• Accessibility Options
• Add Hardware
• Add or Remove Programs
• Administrative Tools (Windows interface administrative tool reference A-Z)
• Date and Time
• Display
• Folder Options
• Fonts
• Game Controllers
• Internet Options
• Keyboard
• Licensing
• Mouse
• Network Connections
• Phone and Modem Options
• Power Options
• Printers and Faxes
• Regional and Language Options
• Scanners and Cameras
• Scheduled Tasks (Task Scheduler)
• Sounds and Audio Devices
• Speech
• Stored User Names and Passwords
• System & Taskbar and Start Menu
The System
32 files
contains
maximum of
control panel
objects.
• When Selecting “access.cpl” the following window appear
This window
provide you the
information and
Accessibility
Option
Appwiz.cpl
Provides Add
or remove
Programmes
Desk.cpl
Provides
the Desktop
options
Through the control panel option there is some important task which we always
need to perform during administrating any system
Add remove programmes
Accessories & utilities
Data & time
UPS, Hybernet & power <power.cpl>
Power schemes
Display settings
Regional & Language settings
Folder Options
View
***************
Active Directory
An active directory is a directory structure used on Microsoft Windows based computers
and servers to store information and data about networks and domains. It is primarily
used for online information and was originally created in 1996 and first used with
Windows 2000.
An active directory can be defined as a hierarchical structure and this structure is usually
broken up into three main categories, the resources which might include hardware such as
printers, services for end users such as web email servers and objects which are the main
functions of the domain and network.
It is interesting to note the framework for the objects. Remember that an object can be a
piece of hardware such as a printer, end user or security settings set by the administrator.
These objects can hold other objects within their file structure. All objects have an ID,
usually an object name (folder name). In addition to these objects being able to hold other
objects, every object has its own attributes which allows it to be characterized by the
information which it contains. Most IT professionals call these setting or
characterizations schemas.
Depending on the type of schema created for a folder, will ultimately determine how
these objects are used. For instance, some objects with certain schemas can not be
deleted, they can only be deactivated. Others types of schemas with certain attributes can
be deleted entirely. For instance, a user object can be deleted, but the administrator object
can not be deleted.
When understanding active directories, it is important to know the framework that objects
can be viewed at. In fact, an active directory can be viewed at either one of three levels,
these levels are called forests, trees or domains. The highest structure is called the forest
because you can see all objects included within the active directory.
Within the Forest structure are trees, these structures usually hold one or more domains,
going further down the structure of an active directory are single domains. To put the
forest, trees and domains into perspective, consider the following example.
A large organization has many dozens of users and processes. The forest might be the
entire network of end users and specific computers at a set location. Within this forest
directory are now trees that hold information on specific objects such as domain
controllers, program data, system, etc. Within these objects are even more objects which
can then be controlled and categorized.
How are Active Directories used?
If you are a computer administrator for a large corporation or organization, you can easily
update all end users computers with new software, patches, files, etc simply by updating
one object in a forest or tree.
Because each object fits into a set schema and has specific attributes, a network
administrator can easily clear a person on a set tree or instantly give access to some users
for certain applications or deny access to certain users for others. The Microsoft servers
use trust to determine whether or not access should be allowed. Two types of trust that
Microsoft active directories incorporate are transitive trusts and one way non transitive
trusts. A transitive trust is when there is a trust that goes further than two domains in a set
tree, meaning two entities are able to access each others domains and trees.
A one way transitive trust is when a user is allowed accessed to another tree or domain,
however, the other domain does not allow access to the other domains. This can be
summed up as a network administrator and end user. The network administrator can
access most trees in the forest including a specific end user's domain. However the end
user, while able to access his or her own domain, can not access other trees.
It is important to note that active directories are a great way to organize a large
organization or corporation's computers data and network. Without an active directory,
most end users would have computers that would need to be updated individually and
would not have access to a larger network where data can be processed and reports can
be created. While active directories can be extremely technical and require lots of
expertise to navigate, they are essential to storing information and data on networks.
DC
Printer
HCL.COM
http:\\ www.google.com
Public Domain
http is Protocols
www is services
google.com is Domain Name
URL ( Uniform
Resource Locator
When we run private domain like HCL.COM then it automatically works like public domain
www.hcl.com / http:\\ www.hcl.com
Goolge.com
Com gov
Edu org
.
Toplevel Domain
When creating DC – suppose HCL.COM in any system.
HCL.COM
Server 2003
DC
DC
DC FQDN (Fully
DC HCL.COM Qualified Domain
Name)
Domain Controller
Forest
DC
DC
Parent DC
Child DC Child DC
Child DC Child DC
Tree Concept of Domain Controller
How DC Works
HCL.COM
Raipur. hcl.com
durg.raipur.hcl.com
DC is functioning child by parenting so it is called the process of FQDN
Domain Name
Replication
DC
Replication
U1 DC DC
Member Member
If you create any user suppose U1 in central location, U1 can login from any PC but User
cannot take any data backup from central location.
• With DNS we can implement DC , for creating member you must have DNS. So
it is important you must of combination of AD(DC) + DNS
Run Dc
promo
For making new dc select (O) Domain Controller for a new Domain
Give name
Do next
Check I386 file also
(See Active Director Installed)
Give same preferred DNS IP which is given in your server like 192.168.2.11
******
Step 3:
In server site computer we have to make user profile and map pofile.
1. Make one folder in server site suppose we have created a folder name MINAL
In MINAL folder just create two sub folder one should be M PRO and another should
be M MAP
Give Share and Security permission to your main folder ( MINAL)
Share this folder
Go in advance tab
Now break the inheritance for doing inheritance uncheck the box and do copy
Start > Administrative Tools > Active Directory Users and Computers
Right click on the right side box > new > user
Then Go into the user side where we have created MINAL SAHARE user
Right click perperties
Networking Tab
Propterties
General tab
<Finished >
Important
• For implementing domain controller check the Drive which contain NTFS file
system. Without NTFS the DC will not implement.
Step 2:
Do <next>
Then
Step 3:
Run >CMD
Step 4:
Login computer
with new domain
name
Step 5:
See the message box in your computer in server 2003 automitically open the tool
named <Manage Your Server>
Double arrow
symbol will appear
if domain server
installed
DNS
Step 6:
………………………
……………………….
……………………….
Step 7:
Step 8:
Add another computer to make the member of your active directory, so that you can
access the file, folders and data through another workgroup computer in client side.
Suppose administrator has given privileges to U1 computer to access remotely for taking
backup the data.
Client Computer / User
While completing DNS in your server PC. Your another work is making your computer
the member of the server computer.
Configure the following steps for making the member of domain of your computer.
Suppose your user computer name is U1.
Step 1:
Give the unique name of your user (Client) computer like RAM.COM
Step 2:
It should be noted that your IP address and your Preferred IP address should not be same.
____________________________<finished>___________________________________
Creating Profiles
When we create any user account in our computer then the user
make profiles by default.
See My computer
See there is having some user documents and also some by default
folders like :
1. windows – system files, application files
2. Programme files – all software (Microsoft & III party)
3. Documents & Settings – Profiles
Open My computer <double click> and select the user which you
want to sent on the desktop so users file can be access.
Select the user and right click > select create short cut of the user
so we can access it in our desktop.
Lab
If you have crated any shortcut in desktop it will go in all users
means current user + new user (means the user which you will
make in future)
all user
Desktop -------- shortcut -> current user
new user