Articles & Tutorials

View All RSS Feed

Last Updated on 27 Sept. 2016, Total: 1466 Articles and Tutorials

83 Cloud Computing
90 Common for all OSes
42 Dial up, ICS, RAS, ADSL
298 General Networking
8 Interviews
48 Network Protocols
86 Network Troubleshooting
41 Product Reviews
10 VoIP
10 Windows 10
32 Windows 2000
93 Windows 2003
116 Windows 7
10 Windows 8
20 Windows 95/98/ME
29 Windows NT 4
135 Windows Server 2008
155 Windows Server 2012
59 Windows Vista
57 Windows XP
44 Wireless Networking
  1. Using NSLOOKUP for DNS Server diagnosis

    The DNS protocol has been around for decades and is a stable and reliable protocol. Even so, DNS does occasionally have problems. PING is a great tool for DNS server diagnosis, and I tend to use it quite frequently myself. However, sometimes PING just doesn’t give you enough information about the problem at hand. When you need more information about... Read More

  2. Understanding the HTTP Protocol (Part 1)

    The Internet is composed of all kinds of packets containing various types of traffic. One of the most used application layer protocols is HTTP. We will take a look at what really happens during an HTTP transaction, and thereby gain a deeper understanding of what this protocol is about... Read More

  3. File System Planning for Active Directory 101

    When you are going to install Active Directory in an organization, it’s always wise to consider the base operating system install and to verify that a few important configurations are done in advance. One of the most important being the planning of the local server file system. Although commonly not overlooked, it is not commonly understood why it’s so important... Read More

  4. Running Windows Under Non-Admin Accounts

    Everyone knows that one of the most important principles of network security is least privilege: grant ordinary users only those rights and permissions they need to get their work done and no more. For example, if ordinary users don’t need access to sensitive data stored in the Accounting share, don’t give them any permissions on that share, either through shared... Read More

  5. A First Look at Longhorn Vista

    Earlier this month, I got my copy of Longhorn Vista, Beta 1, the eventual successor to Windows XP. Although the new operating system does have a few kinks that need to be worked out, it does look promising. In this article, I will share with you some of my first impressions of Longhorn Vista Beta 1... Read More

  6. Understanding the FTP Protocol

    Out of the many protocols in existence today only a couple have been written for the purpose of data transfer. After all, not all of the Internet’s activity revolves around HTTP and web pages. This article will cover the FTP protocol and how it goes about actually doing your data transfers for you... Read More

  7. Window Server 2003 R2, what’s new with Active Directory?

    In this article we will look at a few new things that are coming out in Active Directory with Windows Server 2003 R2. Some of the new features included are Active Directory Federation Services (ADFS) which allows you to securely extend Active Directory over the public Internet when trying to do business with other businesses, partners, clients and customers. This... Read More

  8. Using Virtual PC as a Test and Learning Platform

    This article examines some of the various ways that Microsoft Virtual PC 2004 (and Virtual Server 2005) can be used as a platform for software testing and learning... Read More

  9. Protecting EFS Encryption Keys

    If you have mobile users in your organization, then implementing security can be especially challenging. You must secure the users’ laptops in such a way that if the laptops were lost or stolen that sensitive data would not be compromised. One way of accomplishing this task is by using the Encrypting File System (EFS). In this article, I will explain... Read More

  10. Understanding the ICMP Protocol (Part 2)

    In part one of the article we covered what the ICMP protocol actually was, and what it was used for. Further to that we also looked at one of the most common ICMP message types seen; the ping packet. This last part on ICMP will cover other various types of ICMP error messages that can commonly be seen traversing the... Read More

Featured Links