Display :
Category: Operating System

Explaining IIS

Introduction Whenever I look at Bill Gates, I can't help but ask: how big is Microsoft again?  Don't give me market capitalization and market share: I'm feeling paranoid and anyone can doctor the numbers.  Happily, there's the Internet.

Category: Operating System

Disk Defragmentation

Introduction

In computing, disk defragmentation refers to the practice of uniting scattered files on your storage drive. Fragmentation occurs to a storage drive, i.e. hard disk, over a period of time as you save, make changes and erase files from your local drive.

Category: Operating System

What is a client and server OS?

If you have two PC programs communicating with each other; one being responsible for making a request for a specific program while the other is granting the request of another, this is a relationship specific to a client and server OS. Server OS means "server for certain Operating Systems and the client being the one making a request for a command to be executed by another program."

Category: Operating System

Windows 7 vs. Windows Vista

Versions and Variations

Windows 7 is the latest OS from Microsoft’s arsenal, the previous one being Vista.  There was a big hype when Windows 7 was released that its performance will be better manifold when compared to its forerunner Vista. 

We will see here whether Windows 7 lived up to its expectations or not.  Also, we will see if Windows 7 is better than Vista and if so, how?

Vista and its Flavors

Category: Operating System

BitLocker and its standard criteria

Bitlocker and its criteria BitLocker is a disk encryption software. Its function is to secure data by providing encryption for the entire drive. BitLocker is featured only in the latest versions of Microsoft OS such as Windows vista, Windows 7, Windows server 2008, and Windows server 2008 R2 (Ultimate and Enterprise editions).

There are three authentication mechanisms to encrypt:

Category: Operating System

User Access Control

With the increasing use of computer and information technology in all aspects of life, the importance of information security has increased concurrently. Microsoft has successfully dominated the market. Its Operating Systems have become the most widely used system application all across the globe.

Microsoft Operating Systems have been relying on third-party antivirus and antimalware programs for a long period of time while they have been trying to bring this feature from within the Operating System. In the progress of system security features, Microsoft launched User Access Control (UAC) first time with Windows Vista and Windows Server 2008.

Category: Operating System

TEN TOOLS TO ENHANCE SECURITY OF COMPUTERS IN A NETWORK

What is security?

In an information technology setting, security encompasses so many aspects. Some of these aspects are:

1. Data privacy and confidentiality

Category: Operating System

Resource Kit in Operating Systems

Resource Kit is a set of software resources and documentation released for Microsoft's software products.   This kit is a must for any athlete Windows soul and can work as an executable try of the tier professionalism on the applicant of Windows agnate berth.

Category: Operating System

Network and Sharing with Windows 7

Computers are becoming a basic need of each organization, institute, and for personal use. An end user is required to have an Operating System in the computer to be able to perform daily tasks that include both professional tasks and tasks at home. Microsoft, in this context, has launched several Operating Systems with the passage of time. Microsoft Windows 7 is the currently launched and a marketed Operating System.

Category: Operating System

Group Policy Management

What is Group Policy (GP)?

 Group Policy is a tool or console for system administrators to supervise Network resources such as forests, domains, system settings, users’ settings etc.

Technically, Group Policy provides a centralized management for administrators to configure and manage OS, programs and all Active Directory resources by utilizing and creating a set of Group Policy Object (GPO) rules, as per the organization requirement.

Why Use Group Policy?

      System admin could control the following using GP: