Вы находитесь на странице: 1из 76

Hacking Commands

1. C:\>ping 192.168.1.1

C:\> ping /?

Options

- t
- a
- n
- L
- f
- I - ttl
- v - tos
- r - count
- s - coat
- j - host list
- k - host list
- w - time out

2. C:\> ipconfig/all

We use this command for finding out the network interface and also finding out the
network interface device.

3. C:\> tracert

We use this command for finding out the exact path and also for jumping one computer
to another computer

C:\> tracert www.google.com

4. C:\> telnet
• telnet is used in port no. 23 | and telnet need always passward

C:\> telnet 192.168.1.1

BCM 96338 ADSL router

Login – Administrator

Password - ……………

C:\> logout

5. C:\> nslookup

This command is used for restore the DNS records it is used in Local DNS

C:\> nslookup ? <enter>


Server www.google.com (restore DNS server)

6 C:\> telnet 192.168.1.205 ( through this IP address we can access another computer)
7 C:\> mstsc <enter> (we can remotely access the another computer )
8 C:\> netstat <enter> ( this command is used for display protocol statistics and also
convert TCP/IP network connection. OR also used for watching session or current open
session.

- C:\> netstat – a <enter>


- C:\> netstat 192.168.1. 205 (through this command we can watch mail
session of another system, suppose main is open in system 205 it will show in
your system.

9 C:\> arp

This command is used for finding MAC IP and physical address

********************
Performing Computer (Disk) Management
Start > My computer > Mange> Disk Management

Right Click My computer > Disk Management

(Appearing) Disk 0, Disk 1, Disk 2

Very first time if you are managing any disk it will be on the Basic Disk Basic Disk
contains up to four Primary Partitions or three Partitions and an extended partition with
multiple logical drives.

Basic Disk contains up to four Primary Partitions or three Partitions and an extended
partition with multiple logical drives.

• Fist convert basis disk into Dynamic Disk by using disk management
• diskpart.exe command can be used ( to convert basic disk into dynamic disk)

What is Dynamic Disk?

A physical disk provides features that basic disk do not, such as support for volumes that
spam multiple disks.

What is Active Volume?

The Volume from which the computer startup. The Active Volume must be a Simple
Volume on a Dynamic Disk.

Caution while converting Basic Disk into Dynamic Dick

Fist you must dismount and take offline the volume containing the original files before
you convert the disk containing shadow copy in Dynamic Disk. Once converting Basic
Disk into Dynamic Disk you cannot change basic Volume back, you must delete all
volumes on the Disk and then you can convert Dynamic Disk into Basic Disk. Your
computer will restart when you convert Dynamic Disk into Basic Disk.

What is Extended Volume?

If a volume does not have a file system or it is formatted using the NTFS file
system, you cannot extend volumes formatted using FAT or NTFS 32.

• You cannot extend a system volume boot volume, striped volume,


mirrored volume, or Raid – 5 volumes.
• You can extend only Simple Volume or extended volumes that are not
system or boot volumes, as long as there is available disk space.

Resynching Message

The volumes mirrors are being resynchronized so that both mirrors contain
identically data. (the message appear when extending volumes)
Online Message

The disk is OK

Extended Volume

If you are extending volumes which contains system files it will also mirrored in another
disk.

Managing Simple Volume


Select the disk space unallocated > right click > new volume > <next>

Select Disks > Add > 200 MB <Next>

 perform quick format <next>

Simple Volume

• It contains disk space from a single disk and can be extended if necessary.
• If the volume deleted the file or data cannot be recovered.

Spanned Volume

• It uses 2 or more dynamic disks ( Up to 32 bits)


• Dynamically increases the size of volume
• Data contain sequentially on each disk.
• Same amount of space is not necessary on each disk.
• Both disk will be deleted if delete one disk and data cannot be recovered

Striped Volume

• It also uses two disks


• If delete one disk both disks deleted.

Mirrored Volume

• Recynching the both disks.


• For implementing Mirrored volume you need first convert basic disk into
dynamic disk then you can implement new volume ( mirrored)

***********
Backup
Types of back up

 Normal backup
 Copy backup
 Incremental backup
 Differential Backup
 Daily Backup

Normal Backup

A normal backup copies all selected files and marks each file as having been backed up
(in other words, the archive attribute is cleared). With normal backups, you need only the
most recent copy of the backup file or tape to restore all of the files. You usually perform
a normal backup the first time you create a backup set.

Backing up your data using a combination of normal backups and incremental backups
requires the least amount of storage space and is the quickest backup method. However,
recovering files can be time-consuming and difficult because the backup set can be stored
on several disks or tapes.

Backing up your data using a combination of normal backups and differential backups is
more time-consuming, especially if your data changes frequently, but it is easier to
restore the data because the backup set is usually stored on only a few disks or tapes.

Copy backup

A copy backup copies all selected files but does not mark each file as having been backed
up (in other words, the archive attribute is not cleared). Copying is useful if you want to
back up files between normal and incremental backups because copying does not affect
these other backup operations.

Incremental backup

An incremental backup backs up only those files created or changed since the last normal
or incremental backup. It marks files as having been backed up (in other words, the
archive attribute is cleared). If you use a combination of normal and incremental backups,
you will need to have the last normal backup set as well as all incremental backup sets in
order to restore your data.

Differential backup

A differential backup copies files created or changed since the last normal or incremental
backup. It does not mark files as having been backed up (in other words, the archive
attribute is not cleared). If you are performing a combination of normal and differential
backups, restoring files and folders requires that you have the last normal as well as the
last differential backup.
Daily Backup

A daily backup copies all selected files that have been modified the day the daily backup
is performed. The backed-up files are not marked as having been backed up (in other
words, the archive attribute is not cleared).

Performing Normal Backup

Create and select any file or folder which you want take backup. Suppose you want to
take backup the file placed on the desktop.

5 – N – All backup & Remove mark

5 – N – all backup & remove mark

Start > Run > Ntbackup >backup or restore wizard will open

Second Step
Step 3

Step 4

Step 5

A normal backup copies


all selected files and
marks each file as having
been backed up * (in other
words, the archive
attribute is cleared). With
normal backups, you need
only the most recent copy
of the backup file or tape
to restore all of the files.
You usually perform a
normal backup the first
time you create a backup
set
Then

Browse if you want to keep backup in desktop do next and save it on desktop and
finish

Now select
the
advance
tab
Open the box
available
various types
of backups,

There are 5
types of
backup
available.

The both box


should be
checked
during
backup
Now select the file which you have taken backup right click and see properties

Click the advance tab and see A normal


backup copies all selected files and marks
each file as having been backed up * (in
other words, the archive attribute is
cleared).

With normal backups, you need only the most recent copy of the backup
file or tape to restore all of the files. You have usually performed a normal
backup the first time you created a backup set.

In advanced Attributes box see the message the file is ready for archiving <click ok>
< apply> <ok> Right click the folder
which you want to
****************** check the archiving.

Advance Attirbutes Because it was the


While checking attributes that small box contained normal backup
the message so attributes
advance in
advance attributes box
will appear on the screen, the message “file is ready for archieving” will be shown in
the box when first time taking normal backup. will be unchecked in
first time, but in normal
back it will select and
take backup of all files
either you will select
files or not it will take
backup.
In first time
normal backup the
box will be
unchecked.

After modifying the file or


folder the box advanced
attributes will be checked
automatically. It is
because we have modified
something and backup is
completed. If we modify
many times then also the
box will be checked in
normal backup.

******************
Copy backup

A copy backup copies all selected files but does not mark each file as having been
backed up (in other words, the archive attribute is not cleared). Copying is useful if
you want to back up files between normal and incremental backups because copying
does not affect these other backup operations.

• A copy backup is responsible for taking backup the selected files only
• C – all files and no remove the mark, if we have modified file no. 1,2,5 then also
it will take backup but it will not remove the mark.

In advanced attributes box the


box will be checked always.

• This is the concept when


first time taking backup.

The box got unchecked if


we modified the file in
second time.

Conclusion: In previous
normal backup when second
time doing any modification
the box will be checked. But
in copy backup second time
modification the box will be
unchecked.
Incremental backup

An incremental backup backs up only those files created or changed since the last normal
or incremental backup. It marks files as having been backed up (in other words, the
archive attribute is cleared). If you use a combination of normal and incremental backups,
you will need to have the last normal backup set as well as all incremental backup sets in
order to restore your data.

• If we select all files it will take back up the selected files.


• 5 – incremental – all backup (only marked ) – remove mark
• 5 – incremental – only marked – remove mark

Backs up selected files


only if they were
created or modified
since the previous
backup.

The box is unchecked


while first time taking
incremental backup.

Conclusion: if we
have modified any
files previously then
incremental backup is
good.
After doing any
modification the
box will be
unchecked in
incremental
backup.

Differential backup

A differential backup copies files created or changed since the last normal or incremental
backup. It does not mark files as having been backed up (in other words, the archive
attribute is not cleared). If you are performing a combination of normal and differential
backups, restoring files and folders requires that you have the last normal as well as the
last differential backup.

* if we select all unmark file should copied, and mark will be removed

* If we select marked file it will not remove the mark.

Backs up selected files


only if they were
created or modified
since the previous
backup, but does not
mark them as backed
up.
The box is
unchecked while
taking first time
differential backup.
After doing any
modification the box
will also remain
unchecked.

Daily Backup

A daily backup copies all selected files that have been modified the day the daily backup
is performed. The backed-up files are not marked as having been backed up (in other
words, the archive attribute is not cleared).

 No remove mark but take backup of files in which data file was modified.

Type Copy Mark


Normal All file Remove mark file

Copy All file No remove mark

Incremental Only Mark Copy Remove Mark

Differential Only mark copy No remove mark

Daily Only Modify copy No remove

Microsoft recommend 3 types of backup schemes.

1. Normal
2. Normal + Incremental
3. Normal + Differential
Backup Planning

Monday Tuesday Wednesday Thursday Friday Saturday


Normal Normal Normal Normal Normal Normal
10 files 10 files 10 files 10 files 10 files 10 files

10 files 20 files 30 files 40 files 50 files 60 files

T1 T2 T3 T4 T5 T6

T1 T2 T3 T1 T2 T6

T1 T2 T3 T4 T5 T7

T3 T1 T2 T3 T1

Daily 5 files
Daily 3 files
Wed 4 Files
Mon 12 files

*****************

Compress & Encrypt

Compressing files, folders, and programs decreases their size and reduces the amount of
space they use on your drives or removable storage devices. Drive compression decreases
the amount of space used by all of the files and folders stored on that drive.

Windows supports two types of compression: NTFS compression and compression using
the Compressed (zipped) Folders feature.

NTFS compression

• If you do not have an NTFS drive, this option is not available. To determine
whether your drive is formatted with NTFS, open My Computer, right-click a
drive, and then click Properties. The file system is indicated on the General tab.
• You can compress individual files and folders using NTFS compression, as well
as entire NTFS drives.
• You can compress a folder without compressing its contents.
• You can work with NTFS-compressed files without decompressing them.
• You can display NTFS-compressed file and folder names in a different color to
make them easier to identify.
• You may notice a decrease in performance when working with NTFS-compressed
files. When you open a compressed file, Windows automatically decompresses it
for you, and when you close the file, Windows compresses it again. This process
may decrease your computer’s performance.
• NTFS-compressed files and folders only remain compressed while they are stored
on an NTFS drive.
• You cannot encrypt an NTFS-compressed file.
• NTFS file encryption is not available on Windows XP Home Edition.

Performing Compressing

• Before compressing file see the file size first, and note after compressing what is
the files size

The file size is 230MB


before compressing.
(241,887,018 bits)

Select the file > right click > properties > advance >

Compress contents
to save disk space
Check the box

The box will


appear while
clicking OK and
apply. Select
apply changes to
this folder only
After
compressing the
files the file size
will decrease

Note
(241,894,210)
bytes

*************
Encrypt
{for performing Encrypting need net atmosphere}

• This folder option is used to no one can access your file or folder.

Encrypting File System (EFS) provides the core file encryption technology used to store
encrypted files on NTFS file system volumes. Once you encrypt a file or folder, you
work with the encrypted file or folder just as you do with any other files and folders.

Encryption is transparent to the user that encrypted the file. This means that you do not
have to manually decrypt the encrypted file before you can use it. You can open and
change the file as you normally do.

Using EFS is similar to using permissions on files and folders. Both methods can be used
to restrict access to data. However, an intruder who gains unauthorized physical access to
your encrypted files or folders will be prevented from reading them. If the intruder tries
to open or copy your encrypted file or folder he receives an access denied message.
Permissions on files and folders does not protect against unauthorized physical attacks.

You encrypt or decrypt a folder or file by setting the encryption property for folders and
files just as you set any other attribute such as read-only, compressed, or hidden. If you
encrypt a folder, all files and subfolders created in the encrypted folder are automatically
encrypted. It is recommended that you encrypt at the folder level.

You can also encrypt or decrypt a file or folder using the cipher command. For more
information, see Cipher.
Configuring disk quotas for the POP3 service
Important

• You can configure disk quotas only on NTFS file system partitions.

You can use disk quotas to control and limit the amount of disk space individual
mailboxes on the mail server can use. This ensures that individual mailboxes, and the
mail store in general, do not use excessive or unanticipated amounts of disk space and
adversely affect the performance of the server where the POP3 service is running.

For example, if the mail server suddenly receives a large volume of unsolicited e-mail,
the mail store expands rapidly and might use all of the available disk space on the hard
disk. If you implement quotas, the mail store only expands to the quota limit that you
specified. As a result, no more mail is accepted by the server, and the rest of the server
still functions normally.

If you are using Active Directory integrated authentication or local Windows accounts
authentication, the e-mail delivered to a POP3 service mailbox will have file ownership
assigned to the mailbox user by default. A quota file is created in the mailbox directory
that contains the security identifier (SID) of the user account associated with the mailbox.
File ownership is then assigned to the user account that corresponds to the SID contained
in the quota file. The SID is also used by the NTFS file system disk quota system to
enforce the quota limits specified on the user account matching the SID. All e-mail
transferred to the mailbox's mail store directory is marked with the SID contained in the
quota file; this marks the e-mail so it can be monitored by the quota system.

Enabling disk quotas


If you are a member of the Administrators group, you can enable quotas on NTFS
volumes. On volumes that already contain files, Windows calculates the disk space used
by all users who have copied, saved, or taken ownership of files on the volume up to that
point. The quota limit and warning level are then applied to all current users based on
those calculations, and to users who begin using the volume from that point on. You can
then set different quotas, or disable quotas, for individual or multiple users. You can also
set quotas for specific users who have not yet copied, saved, or taken ownership of files
on the volume.

For example, if \\Production\Public is shared from the root directory of an NTFS volume,
you might want to set a quota limit of 50 megabytes (MB) for all users of
\\Production\Public, while making sure two users who work with larger files on the server
have a 100 MB limit. If both of these users already have files stored on
\\Production\Public, you can select both users and set their quota limit to 100 MB.
However, if one or both users do not have files stored on the server when you enable
quotas, you need to select the users in the Quota Entries window and then set their quota
limit to a value higher than the default for new users.

To enable disk quotas

1. Open My Computer.
2. Right-click the disk volume for which you want to enable disk quotas, and then
click Properties.
3. In the Properties dialog box, click the Quota tab.
4. On the Quota tab, click the Enable quota management check box.
5. Select one or more of the following options, and then click OK:

Then right
click the
selected
disk
properties
which you
want to
apply quota

See the quota


in advanced
tab
Check the box for
enabling quota
management

See the box carefully


and implementing disk
quota
Disk quota is
implementing in Drive D
for the Limit Disk Space
700 MB and also have set
the warning level to 600
MB.
See the error
message
appearing the
box. While
implementing
disk quota
Control Panel
Control Panel provides a set of special-purpose administrative tools that you can use to
configure the Windows, applications, and services environment. Control Panel includes
default items that you can use for common tasks (for example, Display and Add
Hardware). User-installed applications and services can also insert icons into Control
Panel.

There are two view options for Control Panel: Category View and Classic View.
Category View displays Control Panel icons according to the type of task that the user
wants to perform. Classic View displays Control Panel icons in a view that is familiar to
users of previous versions of Windows.

There is a list contains by the control panel

• Accessibility Options
• Add Hardware
• Add or Remove Programs
• Administrative Tools (Windows interface administrative tool reference A-Z)
• Date and Time
• Display
• Folder Options
• Fonts
• Game Controllers
• Internet Options
• Keyboard
• Licensing
• Mouse
• Network Connections
• Phone and Modem Options
• Power Options
• Printers and Faxes
• Regional and Language Options
• Scanners and Cameras
• Scheduled Tasks (Task Scheduler)
• Sounds and Audio Devices
• Speech
• Stored User Names and Passwords
• System & Taskbar and Start Menu

• CPL is the extension of control panel


• For performing control panel, start > search > *.cpl
Type *.cpl
for searching
control panel

The System
32 files
contains
maximum of
control panel
objects.
• When Selecting “access.cpl” the following window appear

This window
provide you the
information and
Accessibility
Option

Appwiz.cpl
Provides Add
or remove
Programmes
Desk.cpl
Provides
the Desktop
options

Through this option


you can give
privileges to your
administrator to do
not open the
particular selected
control panel object
in your administrator
account.
Through
Regional and
Language
Options you
can set the
worlds
language,
like Russian,
Japanise etc.

Through the control panel option there is some important task which we always
need to perform during administrating any system
 Add remove programmes
 Accessories & utilities
 Data & time
 UPS, Hybernet & power <power.cpl>
 Power schemes
 Display settings
 Regional & Language settings
 Folder Options
 View

***************
Active Directory
An active directory is a directory structure used on Microsoft Windows based computers
and servers to store information and data about networks and domains. It is primarily
used for online information and was originally created in 1996 and first used with
Windows 2000.

An active directory (sometimes referred to as an AD) does a variety of functions


including the ability to provide information on objects, helps organize these objects for
easy retrieval and access, allows access by end users and administrators and allows the
administrator to set security up for the directory.

An active directory can be defined as a hierarchical structure and this structure is usually
broken up into three main categories, the resources which might include hardware such as
printers, services for end users such as web email servers and objects which are the main
functions of the domain and network.

It is interesting to note the framework for the objects. Remember that an object can be a
piece of hardware such as a printer, end user or security settings set by the administrator.
These objects can hold other objects within their file structure. All objects have an ID,
usually an object name (folder name). In addition to these objects being able to hold other
objects, every object has its own attributes which allows it to be characterized by the
information which it contains. Most IT professionals call these setting or
characterizations schemas.

Depending on the type of schema created for a folder, will ultimately determine how
these objects are used. For instance, some objects with certain schemas can not be
deleted, they can only be deactivated. Others types of schemas with certain attributes can
be deleted entirely. For instance, a user object can be deleted, but the administrator object
can not be deleted.

When understanding active directories, it is important to know the framework that objects
can be viewed at. In fact, an active directory can be viewed at either one of three levels,
these levels are called forests, trees or domains. The highest structure is called the forest
because you can see all objects included within the active directory.

Within the Forest structure are trees, these structures usually hold one or more domains,
going further down the structure of an active directory are single domains. To put the
forest, trees and domains into perspective, consider the following example.

A large organization has many dozens of users and processes. The forest might be the
entire network of end users and specific computers at a set location. Within this forest
directory are now trees that hold information on specific objects such as domain
controllers, program data, system, etc. Within these objects are even more objects which
can then be controlled and categorized.
How are Active Directories used?

If you are a computer administrator for a large corporation or organization, you can easily
update all end users computers with new software, patches, files, etc simply by updating
one object in a forest or tree.

Because each object fits into a set schema and has specific attributes, a network
administrator can easily clear a person on a set tree or instantly give access to some users
for certain applications or deny access to certain users for others. The Microsoft servers
use trust to determine whether or not access should be allowed. Two types of trust that
Microsoft active directories incorporate are transitive trusts and one way non transitive
trusts. A transitive trust is when there is a trust that goes further than two domains in a set
tree, meaning two entities are able to access each others domains and trees.

A one way transitive trust is when a user is allowed accessed to another tree or domain,
however, the other domain does not allow access to the other domains. This can be
summed up as a network administrator and end user. The network administrator can
access most trees in the forest including a specific end user's domain. However the end
user, while able to access his or her own domain, can not access other trees.

It is important to note that active directories are a great way to organize a large
organization or corporation's computers data and network. Without an active directory,
most end users would have computers that would need to be updated individually and
would not have access to a larger network where data can be processed and reports can
be created. While active directories can be extremely technical and require lots of
expertise to navigate, they are essential to storing information and data on networks.

• When we install Active Directory services in server 2003 it is called DC ( Domain


Controller) and DC is called Active Directory. Active Directory functions to
organize a huge organization’s computers data and network.
• Active Directory is implemented in only Server Operating System.
• The purpose of implementing Active Directory is manage the data base :
• The Active Directory manages :

1. Users & Group


2. Computer
3. Resources ( Printer)
4. Organization Unit
5. Central Administration ( Manage from Central Location)
6. Security.
Active Directory

DC

Printer

Users & Groups

HCL.COM

http:\\ www.google.com
Public Domain
http is Protocols
www is services
google.com is Domain Name

URL ( Uniform
Resource Locator

When we run private domain like HCL.COM then it automatically works like public domain
www.hcl.com / http:\\ www.hcl.com
Goolge.com

Google is the Domain Name


server name

(.) dot is called root

Com gov
Edu org
.

Toplevel Domain
When creating DC – suppose HCL.COM in any system.
HCL.COM

Server 2003

DC
DC

DC FQDN (Fully
DC HCL.COM Qualified Domain
Name)

DC – Changed in Host – name – then FQDN

Domain Controller

Forest

DC
DC

Parent DC

Child DC Child DC

Child DC Child DC
Tree Concept of Domain Controller

How DC Works

HCL.COM

Raipur. hcl.com

durg.raipur.hcl.com
DC is functioning child by parenting so it is called the process of FQDN

Like : Childname\parent\toplevel domain

Domain Name

Replication

DC

Replication

Backup Domain Controller

U1 DC DC

Member Member

If you create any user suppose U1 in central location, U1 can login from any PC but User
cannot take any data backup from central location.
• With DNS we can implement DC , for creating member you must have DNS. So
it is important you must of combination of AD(DC) + DNS

• DC is the back bone of DNS


In Window
NT Window 2003 Server 2003
we can take
PDC ---- DC ( AD) backup data
(Primary Domain Controller) from ADC
(Additional
BDC ----- ADC Domain
(Backup Domain Controller ) Controller )

Implementing Domain Controller


Fist give IP in local net

Run Dc
promo
For making new dc select (O) Domain Controller for a new Domain
Give name
Do next
Check I386 file also
(See Active Director Installed)

How to make member


The Open Client Site Computer

Give same preferred DNS IP which is given in your server like 192.168.2.11

Step: My computer > property > computer name


Select change
Then Restart your computer you have made the member of Active directory of this
client computer

******

Step 3:

In server site computer we have to make user profile and map pofile.

1. Make one folder in server site suppose we have created a folder name MINAL

In MINAL folder just create two sub folder one should be M PRO and another should
be M MAP
Give Share and Security permission to your main folder ( MINAL)
Share this folder

Allow every one


Then set security option and give permission
If you need full security of your user then remove all Group or User Names give
aforeside in the fox which is 1. administrator 2.creator owner 3. system 4. user
(Bhili\users)

Go in advance tab

Now break the inheritance for doing inheritance uncheck the box and do copy

Then apply and ok


Remove the users if you want to keep the administrator use then you can keep it.
***********

Step 4 : Now we will create the user in server site

Start > Administrative Tools > Active Directory Users and Computers

Then open Bhilai.com


Then select Users folder given in the aforesaid box

Right click on the right side box > new > user

Do next and give complex password


See given below your user profile has been created

Then open my computer c Drive and open Minal folder


Give both folder sharing and security and also full permission to HCL1 user
Then check names
Then give full permission

The also set the security


Now do check names
Then allow permission for minal
Apply and OK

Then Go into the user side where we have created MINAL SAHARE user
Right click perperties

Now open profile tab and give path


Open your computer name select it and fill up the box for giving path
Apply OK

The Go in Client Site computer logon the HCL1 user thorough

For implementing Domain Controller first configure IP address

Step 1. Open Network Connections

Right click - Properties

Networking Tab

Propterties

General tab

Use the following IP Address


Give IP Address : 192.168.1.99
Use the DNS Server Address:
DNS IP Address: 192.168.1.99
( configure both IP address same )

<Finished >
Important

• For implementing domain controller check the Drive which contain NTFS file
system. Without NTFS the DC will not implement.

• You must have CD / or I386 Folder

Step 2:

Run > dcpromo

It will open Active Directory Installation Wizard

Do <next>

And make server installation finish

Then

Restart your computer

After starting your computer

Start – my computer – properties – computer name – change – member of domain – type


the name hcl.com- <OK>

Through performing the task your domain controller is completed

Step 3:

Run >CMD

Ping 192.168.1.100 Your IP Address


Then
Ping your Domain Controller self > HCL.COM

(All should send packets)

Step 4:

After completion of Domain Controller installation

Login computer
with new domain
name
Step 5:

Confirm you have installed Domain Controller or not in your PC

See the message box in your computer in server 2003 automitically open the tool
named <Manage Your Server>
Double arrow
symbol will appear
if domain server
installed

DNS

Step 6:

My computer > Administrative Tools > -----------------------------------------


----------------------------- ----------
-----------------------------------------

DNS Management ………………………

………………………

……………………….

……………………….

Step 7:

Now Select Account User & Computer


Also You can change your computer name > ABC.COM >User> Right Click > new user
> HCL <next) when you restart your computer the computer name will be changed and
you can logon with new user name and password with active directory. The message will
appear like “welcome to ABC.COM <OK>

Step 8:

Add another computer to make the member of your active directory, so that you can
access the file, folders and data through another workgroup computer in client side.
Suppose administrator has given privileges to U1 computer to access remotely for taking
backup the data.
Client Computer / User

While completing DNS in your server PC. Your another work is making your computer
the member of the server computer.

Configure the following steps for making the member of domain of your computer.
Suppose your user computer name is U1.

Step 1:
Give the unique name of your user (Client) computer like RAM.COM

Step 2:

Set IP Address in U1 computer : 192.168.1.99

Set preferred DNS : 192.168.1.100


(The preferred DNS IP address should be given to the Server computer)

It should be noted that your IP address and your Preferred IP address should not be same.

____________________________<finished>___________________________________

Creating Profiles

When we create any user account in our computer then the user
make profiles by default.

See My computer
See there is having some user documents and also some by default
folders like :
1. windows – system files, application files
2. Programme files – all software (Microsoft & III party)
3. Documents & Settings – Profiles

Why profile is useful ?

Profile is used for users personal settings.

One user having


1. Desktop
2. My document
3. temp
4. Templates
5. sent to
6. recent open document
7. start new
8. programme data
9. favourties
When we login in any user then create profile.

Fist profile is {Document & Setting }


1. Adminstrator
2. HCL ( initial user which made during installation )
3. U1, U2, U3,
4. all users display
5. default user – hidden

Performing Sent to option

Open My computer <double click> and select the user which you
want to sent on the desktop so users file can be access.

Select the user and right click > select create short cut of the user
so we can access it in our desktop.

Conclusion : All User : When we make any setting it will go in


( Current User + new user)

• Administrator having privillages to open any user account,


but user can not access another profile.
• Suppose we created one profile in U1 user account ( it is a
text file ) we can access it in administrator account and also
U1 user account but can not access it in U2 account.
• If you want to delete any user account you can delete it from
administrator account only.

 Open Administrator Account > My computer > Tools >


Folder options> view > show hidden files or folders > OK

 It will show all users accounts

 In this situation another user folder is containing only by


default music profile & picture documents.

Lab
If you have crated any shortcut in desktop it will go in all users
means current user + new user (means the user which you will
make in future)

all user
Desktop -------- shortcut -> current user
new user

Step > Default Folder

If you do any modification in default folder suppose you make any


shortcut it will only go in new user not in current user folder
profile.

Desktop -> shortcut-> only new user

Вам также может понравиться