tag:blogger.com,1999:blog-73871418564952738492024-03-19T09:54:20.626+07:00The quieter you become, the more you are able to hear ...Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.comBlogger17125tag:blogger.com,1999:blog-7387141856495273849.post-53493564193123331212022-03-12T21:59:00.009+07:002011-05-04T00:22:43.740+07:00My Introduction :-)Hey guys, I am Long - student from National University of Information Technology. Thanks for visiting my Blog !<br />
This Blog is a place where I put all my knowledge about <b><span class="Apple-style-span" style="color: #274e13;">Microsoft Certified IT Professional (MCITP)</span></b> :<br />
<blockquote><i>The Microsoft Certified IT Professional (MCITP) certification helps validate that an individual has the comprehensive set of skills necessary to perform a particular job role, such as database administrator or enterprise messaging administrator. MCITP certifications build on the technical proficiency measured in the Microsoft Certified Technology Specialist (MCTS) certifications. Therefore, you will earn one or more MCTS certifications on your way to earning an MCITP certification. </i>(Quote from Microsoft)</blockquote>The fields I focus on are :<span class="Apple-style-span" style="color: #38761d;"> <b>SA (Server Administrator) & EA (Enterprise Administrator)</b></span> . The older versions are MCSA & MCSE .<br />
In the next posts, I will try to make things clear to help you understand step by step easily .<br />
<br />
You just need a <span class="Apple-style-span" style="color: #38761d;"><b>basic understanding about Computer to learn this,</b></span> so don't hesitate to take a look, <b><span class="Apple-style-span" style="color: #274e13;">learn something new</span></b>, and <span class="Apple-style-span" style="color: #38761d;"><b>prepare for longer steps in future</b></span> .<br />
<br />
<span class="Apple-style-span" style="color: #cc0000;"><b>ALL THINGS ARE FREE HERE !</b></span><br />
<br />
Good luck with your study & your career !Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-59701822321294891712011-05-04T13:03:00.001+07:002011-05-04T13:05:09.571+07:00Select all text on address bar (Browser)I tested it successfully on FireFox, Chrome Plus and IE ^^ and I guess It works perfectly on other browsers .<br />
This hotkey is very useful for lazy person like me .<br />
When I am browsing a website, for example <a href="http://eyesfall.blogspot.com/">eyesfall.blogspot.com</a> and I want to go to <a href="http://google.com/">Google.com</a> , as usual I need to select all text on my address bar, delete it and type Google.com .<br />
but I found out that I just need to press <b style="color: blue;">F6 </b>to do that .<br />
<br />
Try it yourself !Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-18113850570230172812011-05-04T00:21:00.000+07:002011-05-04T00:21:56.274+07:00How to clear Screen in Command Prompt (Windows)Start -> Run -> Type CMD and hit Enter , a new Windows appears : You've just opened Command Prompt .<br />
<br />
Type anything you want, like "ipconfig" to view Ip configuration of your comnputer ...<br />
<br />
If you want to clear your black screen : just type <b>cls</b> (it's not case-sensitive, don't worry) and hit enter . Enjoy !Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-70015354468226923392011-05-03T10:30:00.001+07:002011-05-03T10:30:54.940+07:00Hibernation in Windows 7When you go out and don't want to re-open your data, program...<br />
Hibernation is a good choice, it saves all data in hard disk when hibernating and recover all of them into RAM when start-up.<br />
<br />
To use it : <b>Start </b>-> <b>></b> (right arrow near <b>Shutdown </b>button) -> <b>Hibernate</b> .<br />
<br />
If you DON'T SEE IT :<br />
<br />
Step 1 : Start > Run > CMD , hit enter : in command prompt type : <b>powercfg -h on</b><br />
<br />
If you still don't see Hibernate button, go to step 2 : <br />
<br />
Step 2 : Start > type "power " > and click on <b>"Edit power plan"</b> ABOVE<br />
Click to "Change advanced power settings" > Expand + in "Sleep" and make sure that "Allow hybrid sleep" is OFF .<br />
<br />
DONE !Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-36645402180096531322011-04-17T23:32:00.000+07:002011-04-17T23:32:15.085+07:00Home Folder & Roaming User ProfileI) Home Folder :<br />
<br />
To centralize users data storage, File Server becomes a place where users put all their data . Every user has private space on File Server .<br />
<br />
We use Home Folder to do that :<br />
- User has his own Foler<br />
- Share permission and security permission<br />
- Map a folder from Server to user's computer as network drive .<br />
<br />
Step 1 : Create a folder on File Server,<br />
Step 2 : Share everyone - full control & remove users group in tab Security .<br />
Step 3 : Start > Run > dsa.msc > double click to user you want to grant Home Folder => Tab Profile --> Home Folder , at Connect : type <b>\\DCname\ShareFolder\%username% </b>and click Apply.<br />
<br />
<b>Note </b>: DCname : name of Domain Controller, it can be IP address.<br />
ShareFolder : name of share folder.<br />
%username% : after you click apply, it will change to name of userNguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-85383457953482888912011-04-11T23:24:00.000+07:002011-04-11T23:24:31.794+07:00Policy in Domain ControllerTo modify policies in Domain, we use <i><b>Group Policy Management : </b></i><br />
<i><b> (</b></i>Note that we are on Domain Controller <i><b>)</b></i><br />
Start> Administrative<i><b></b></i> Tools ><i>Group Policy Management</i><br />
<br />
From the left panel, click to a "+" sign : Forest :Long.local > Domain > Group Policy Objects<br />
<ul><li>Default Domain Policy : Affect to all Domain (Domain Controller and Domain member/member server)</li>
<li>Default Domain Controller Policy : Only afftect to Domain Controller\</li>
</ul>For example :<br />
<br />
<div style="color: blue;"><b>1/ Password Policy : </b></div>We use Default Domain Policy > Right Click and choose Edit : a new dialog appear<br />
<br />
Computer configuration> Policies> Security Settings> Account Policies> Password Policies<br />
<br />
affect <b>all Domain </b>.<br />
<br />
<b><span style="color: blue;">2/</span> </b>As you might know that user (<b>not </b>Domain Administrators) cannot <b><span style="color: blue;">log in locally on Domain </span></b>Controller.<br />
But there is a policy that you can do it , because you want this policy affect <b>only to DC, </b>so :<br />
<br />
Right click : Default Domain Controller Policy > User Right Assignment> Allow logon locally .<br />
<br />
----<br />
<br />
The point is, when Administrator is <b>on a member computer, </b>how can he manage a Domain ?<br />
<br />
On :<br />
Windows XP, 2K3, Vista : we use a software call Adminpak.msi<br />
Windows 7 : Download and Install <i><b>remote administration tool</b></i> <br />
Windows server 2008 : Server Manager> Right Click Features > Add Features > Check to :<br />
<br />
<ul><li>Group Policies Management</li>
<li>Expand <b>Remote Server Administration Tools</b> > <b>Role Administration Tools</b> > AD DS & AD LDS Tools > AD DS Tools> Check to <b>Active Directory Administrative Center </b>.</li>
<li>Add requirement features. Next .</li>
</ul><br />
<b>=> Install .</b><br />
<br />
----<br />
* Admin can manage time and computer for user logon (when ? - which computers ?) by accessing Active Directory User and Computer> Double Click to User > Account : Modify Logon Hour and Log on to .Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-51341309411629925312011-04-10T00:09:00.004+07:002011-04-11T22:39:14.152+07:00Domain Controller Promotion<div style="color: blue;"><b>I) Introduction to Domain :</b></div><br />
- In workgroup : Data and Policy stay on computers, if you want to make a change - you must change <b>each of them</b> . Imagine that you company has a hunred computer, you want to add a user and this user can log on every computer => You must do a job create a same new user 100 times ! to 100 computers . Absolutely it's not time-efficient, and very boring job .<br />
<br />
- So Domain saved the world - It is a model which data is stored in 1 computer. Now you just create a new user on a Domain - so he can log on every computers on that Domain.<br />
<br />
<b style="color: blue;">Domain Controller (DC) : </b>a computer has been installed Active Directory Domain Service and has a responsibily to manage Domain system .<br />
A computer can be a DC if it meets these requirements :<br />
- Using Windows Server (2000, 2003, 2008)<br />
- DNS Server .<br />
<br />
<b style="color: blue;">Domain Member (Windows workstation - Windows XP, Windows 7 ...) & Member Server (Windows Server : 2003, 2008 ...)</b><br />
<b style="color: blue;"></b>- A computer joins to Domain system will be managed by DC<br />
- This computer <b>must </b>have Windows operating system <b>newer </b>than Windows 95 .<br />
<br />
<div style="color: blue;"><b>II) Upgrade windows server to Domain Controller :</b></div><div style="color: blue;"><b> </b><span style="color: black;">2 steps :</span></div><div style="color: blue;"><br />
</div><div style="color: blue;"><span style="color: black;">- Configure IP and DNS (as usual, we configure DNS the same with IP address of this computer - It's also a DNS Server) </span></div><div style="color: blue;"><span style="color: black;">- Start> Run> <b>DCPROMO </b>- hit Enter. </span></div><div style="color: blue;"><br />
</div><div style="color: blue;"><span style="color: black;">Please wach my video ^^</span></div><div style="color: blue;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://i.ytimg.com/vi/11k_vNTVkL4/0.jpg" height="266" width="320"><param name="movie" value="http://www.youtube.com/v/11k_vNTVkL4?f=user_uploads&c=google-webdrive-0&app=youtube_gdata" /><param name="bgcolor" value="#FFFFFF" /><embed width="320" height="266" src="http://www.youtube.com/v/11k_vNTVkL4?f=user_uploads&c=google-webdrive-0&app=youtube_gdata" type="application/x-shockwave-flash"></embed></object></div><div style="color: blue;"><br />
<br />
<b>III) Join a computer to Domain :</b><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/4roMXO2SrAw?feature=player_embedded' frameborder='0'></iframe></div><br />
<br />
</div><div style="color: blue;"><br />
<b>IV/ Domain Environment :</b><br />
<br />
<span style="color: black;">To manage user/group and other object in Domain, we use tool called : Active Directory Domain User and Computer in Start> Administrative Tools or Start > Run> type : <b>DSA.msc </b>.</span><br />
<br />
<span style="color: black;">Creating a new user, you need to provide a password meet complexity with 7 characters, capital, number ... </span><br />
<br />
<span style="color: black;">As a member user of a Domain, user can log on <b>any computer </b>in domain <b>except Domain Controller (Only Admin can do that).</b></span><br />
<br />
<span style="color: black;"><b>(</b>But you can change a Policy in User Right Assignment to <b>Allow logon locally) </b></span></div>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-28098100622390969152011-04-07T23:07:00.002+07:002011-04-07T23:25:56.597+07:00File Server & Resource Manager<div style="color: blue;"><b>I) Introduction : </b></div><br />
File Server Resource Manager (FSRM) is an advanced function helps admin manage File Server efficiently .<br />
Administrator can limit user's disk space usage, stop user from accessing some specific file and supervising user .<br />
<br />
<b style="color: blue;">II) </b><b style="color: blue;">Practice</b><br />
<br />
<b>Server Manager </b>> <b>Right click</b> on <b>Roles </b>> <b>Add Role</b>, next > check <b>File Services</b>, next > <b>Check File Server Resource Manger</b>, next > Check the <b>Drive</b> you want to monitor , next and <b>Install.</b><br />
<b>Close </b>when <b>finished </b>.<br />
<br />
<b style="color: blue;">1) Folder & Disk Quota : </b><br />
<br />
First of all, create a new folder in C:/ or in any drive in your computer . <br />
Start > Administrative Tools, <b>File Server Resource Manager</b> .<br />
Quota Management> Right click on Quotas> Create Quota<br />
<b>Browse </b>-> Specify a path for a folder you want to apply Disk Quota<br />
<br />
You can use Disk Quota template or <b>Define custom quota properties</b> , right there , you specify a limit space for user (by soft quota - just for monitoring or hard quota) , add a warning ...<br />
<br />
<b>Close </b>a custom disk quota dialog and press <b>Create</b> . Save it as a template for later use if you want .<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-xZ7bwQCVEBA/TZ3bU_T2TAI/AAAAAAAAAB4/0HRPWM8nRPU/s1600/DiskQuota.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="243" src="http://1.bp.blogspot.com/-xZ7bwQCVEBA/TZ3bU_T2TAI/AAAAAAAAAB4/0HRPWM8nRPU/s400/DiskQuota.JPG" width="400" /></a></div><br />
Done !<br />
<br />
<b><span style="color: #38761d;">*Disk Quota</span></b> :<br />
For each user you can have different limit disk spaces : in <b>My Computer > </b>Right click on<b> Drive </b>you want to enable Disk Quota<b>> Properties</b> > Quota :<br />
<br />
Check on <b>Enable Disk Quota Management</b><br />
If you don't check <b>Deny disk space to users exceeding quota limit </b>, there will be only a <b>warning</b> for user, <b>NOT</b> a <b>Denial</b> when user reach disk space quota limit.<br />
<br />
Specify user by click on <b>Quota Entries ... </b> > <b>New Quota Entry</b> . And add user to apply disk quota to him . <br />
<br />
<b style="color: blue;">2) Prohibit user from copying a file to a Folder</b><br />
<br />
First of all, create a new folder in C:/ or in any drive in your computer .<br />
Start > Programs > Administrative Tools > <b>File Server Resource Manager > File Screening Management > </b>Right click to File Screens > <b>Create File Screen ... </b>Specify a Folder you want to prohibit user from doing something.<br />
<br />
<b>> Define custom file screens</b> <b>properties</b> > Custom Properties => Select group you want to block, choose some options, use <b>Edit </b>to view and modify them or you can Create your own option by clicking <b>Create</b>..<br />
<br />
You can also exclude some files that user are allowed to copy to <b>C:/Folder</b> by click on <b>Create...</b> and choose file to exclude . Remeber create a <b>file group name</b><br />
<br />
For example :<br />
a) You don't want user to copy a <b>.EXE files </b>to your Folder, but user can copy a file name <b>GoodFile.EXE </b>, so you type in <b>Files to exclude : GoodFile.Exe</b><br />
b) You want to prohibit user from copying a file have a extension <b>.XXX </b>, so you type in <b>Files to include : </b>"<b>.XXX</b>" - without quotation marks .<br />
<br />
After finishing custom properties, just press OK , at <b>Create File Screen , </b>press <b>Create . </b>Save it as a template if you want.<br />
<br />
Done! If you have any question, don't hesitate to comment here, I will reply within 24 hours ^.^<br />
Thanks for visiting my Blog .Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-77354192110674976552011-04-02T23:07:00.005+07:002011-04-06T23:34:29.243+07:00NTFS Permission<b><span class="Apple-style-span" style="color: blue;">I) What is NTFS Permission :</span></b><br />
<br />
As you can see : "NTFS" is one of the formats of hard disk drive, just like FAT, exFAT ... and nowaday, most of hard disk computers (Desktop & Laptop) use NTFS format.<br />
NTFS Permission help us give different permissions to different users on the same file or folder .<br />
<br />
Comparion between <i>Share Permission and NTFS Permission</i> :<br />
<br />
<b>Share NTFS</b><br />
<br />
<br />
<ul><li>Permission on Folder yes yes</li>
<li>Permission on File no yes</li>
<li>Affect a user by logging through yes yes</li>
<li>other computer</li>
<li>Affect a user by logging directly no yes</li>
<li>Number of permission 3 (Full, Change, Read) 19 permissions</li>
</ul><br />
<br />
<b><span class="Apple-style-span" style="color: blue;"><i>Try this : Right click on File or Foler > Properties> Security tab</i></span></b><br />
<br />
<span class="Apple-style-span" style="color: blue;"><b>1/ 6 standard Permissions</b> :</span><br />
<br />
- List Folder Content : You can access shared folder, see what's in it .<br />
- Read : For example : read the text file . But cannot execute any program .<br />
- Read & Execute : Read + Execute program .<br />
- Write : change, create new but cannot delete data .<br />
(note : Write is indepent permission with Read - write can change a file by console without "read" it)<br />
- Modify = Read + Write + Delete<br />
- Full Control : do anything to this file or folder : read, write, delete ...and especially : <i>be able to change the permission of this folder .</i><br />
<i><br />
</i><br />
<span class="Apple-style-span" style="color: blue;"><b>2</b>/<b> 13 special Permissions : </b></span><br />
<b><br />
</b><br />
<b>- </b>More detail & complex permissions, to serve administration's need .<br />
- For example : give user A the right to delete his own folder he created before but he cannot delete other folder belongs to user B .<br />
- Creator Owner : is a group, when user A create a folder or file, he belongs to this group and he has the right to fully control his Data he created before.<br />
<br />
<b><span class="Apple-style-span" style="color: blue;">3/ Inheritance permission :</span></b><br />
<b><br />
</b><br />
In folder A we have folder B, so if user1 has some permissions on folderA => He will have the same permissions on folder B .<br />
<br />
We can remove this inheritance by doing this :<br />
<br />
Right click on folder A > Properties> Security > Advanced => change permissions : un-check a option "include inheritable ..." , click Add to keep inheritable table .<br />
<br />
<b><span class="Apple-style-span" style="color: blue;">4/ Relationship between NTFS permission and Share Permission :</span></b><br />
<br />
<b><span class="Apple-style-span" style="color: blue;"></span></b><br />
When user A accesses folder X through the network from other computer. His rights are under 2 effects, one from NTFS, and the other from Share . His rights now are "mutual permission"<br />
<br />
<b><span class="Apple-style-span" style="color: blue;"></span></b><br />
NTFS Share User's Right<br />
<br />
<b><span class="Apple-style-span" style="color: blue;"></span></b><br />
modify read read<br />
write read <b>NO </b>right (remember write & read are separated permission)<br />
full control change change<b>/</b>modify <br />
<br />
R or M or F Full Control R or M or F <br />
<br />
(R/M/F : Read/Modify/Full Control)<br />
<br />
We don't want both permissions : Share & NTFS mix up with each other. So set Share Permission to <b><span style="color: #38761d;">everyone : Full Control</span>. </b>And don't worry, we have NTFS Permission to handle security problem .<br />
<br />
(*This post is marked as partially completed - there are some info I will supplement later, now I'm kinda busy for life, LOL, let's move on to the next post *)<br />
<b><br />
</b><b><span class="Apple-style-span" style="color: blue;"></span></b>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-2322201826961782982011-04-01T21:43:00.003+07:002011-04-02T22:15:41.502+07:00Share Permission<b><span class="Apple-style-span" style="color: blue;">I) Introduction :</span></b><br />
<br />
Sharing helps users access data resources easily and conveniently . There are some computers play a role as a sharing centre , and other computers can access to use resources like Data, Printer or Internet ...<br />
<br />
A computer which shares Data resources is called <b><i>File Server.</i></b><br />
This computer is a File Server if it meets these requirements :<br />
- Turn off Firewall<br />
- Using Classic Authentication<br />
- Has a list of users account - so other computers will use these accounts to access File Server.<br />
<br />
<span class="Apple-style-span" style="color: blue;"><b>II) Sharing :</b></span><br />
<br />
<b><span class="Apple-style-span" style="color: blue;">1) Data sharing and sharing permission : </span></b><br />
<b><span class="Apple-style-span" style="color: blue;"><br />
</span></b><br />
- We can only share a folder - NOT A FILE .<br />
- Folder A include folder B and C, if you want to share all of them, sharing folder A is enough .<br />
- Only <b>Administrators </b>has a right to share .<br />
- Sharing only affects to users log on from other computers, it won't work with directly logging on .<br />
<br />
(For example computer A has a user A and he has a right to access folder XXX, so if user A log on from computer B - he will see this folder ; if he log on at computer A - he won't see it)<br />
<br />
<i><span class="Apple-style-span" style="color: blue;">How to Share : </span>Right click on a folder you want to share> Properties> Sharing > Share...</i><br />
<i> Or for more options, choose Advanced Sharing ... > Tick at Share this folder .</i><br />
<b>Notice </b>:<br />
at Permissions> Share Permissions : You will see 3 options :<br />
+ Full control : User can do anything to this folder contents<br />
+ Write : User can create new contents or change it, but cannot delete it .<br />
+ Read : User just read them, cannot change or delete .<br />
<i><br />
</i><br />
<i><span class="Apple-style-span" style="font-style: normal;"><b><span class="Apple-style-span" style="color: blue;">2) Let's watch the video :</span></b></span></i><br />
<i><span class="Apple-style-span" style="font-style: normal;"><b><span class="Apple-style-span" style="color: blue;"><br />
</span></b></span></i><br />
It's mostly the best way to understand the bunch of theories, and it's always faster than reading .<br />
But you need more concentration :<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/Bc8TjtFiJSk?feature=player_embedded' frameborder='0'></iframe></div>AND<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><object class="BLOGGER-youtube-video" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" data-thumbnail-src="http://i.ytimg.com/vi/y95IYp_2lcA/0.jpg" height="266" width="320"><param name="movie" value="http://www.youtube.com/v/y95IYp_2lcA?f=user_uploads&c=google-webdrive-0&app=youtube_gdata" /><param name="bgcolor" value="#FFFFFF" /><embed width="320" height="266" src="http://www.youtube.com/v/y95IYp_2lcA?f=user_uploads&c=google-webdrive-0&app=youtube_gdata" type="application/x-shockwave-flash"></embed></object></div><br />
<br />
Notice that, Computer 2 WILL NOT access folder created in DESKTOP ...<br />
My teacher told me that is because of Desktop is Work-Place of user and doesn't permit any other user access shared folder on it. Quite ambiguous ! I will find it out and tell ya later !<br />
Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-47625414401285424772011-03-30T22:26:00.004+07:002011-04-01T21:20:22.271+07:00Network Access<div style="color: blue;"><b>I) Network Access :</b></div><br />
<div style="color: blue;"><b>1/ Configure IP address :</b></div><br />
If you don't know how to set an IP Address for a computer, please watch this video :<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/3rKcDxF4GLE?feature=player_embedded' frameborder='0'></iframe></div><br />
<div style="color: blue;"><b>2/ Ping :</b></div>Set IP address to 2 computers 1 & 2 :<br />
<br />
Computer 1 : 192.168.1.1 / 255.255.255.0<br />
Computer 2 : 192.168.1.2 / 255.255.255.0<br />
<br />
We will disable Firewall on both of these Computers, and try to use PING command to test their connnection (before doing that, just plug both cables to a Switch or directly connect 2 computers) .<br />
<br />
Watch this video :<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/XAFvm-z19r4?feature=player_embedded' frameborder='0'></iframe></div><br />
<div style="color: blue;"><b>3/ Access Authentication :</b></div><br />
In Windows : there are 2 models of authentication<br />
<div style="color: blue;"><b>a) Classic : 3 STEPS </b></div>STEP 1 :<br />
- Computer 1 is want to access Computer 2 will try to use its CURRENT ACCOUNT (username & password) .<br />
STEP 2 :<br />
- If not successful, Computer 1 will use Guest Account to access.<br />
<br />
STEP 3 <br />
- If not successful, Computer 1 will see a Dialog Box requires to Type Username/Password in order to access Computer 2.<br />
-If not successful, ACCESS DENIED !<br />
<br />
Please <i style="color: red;"><b>watch the video</b></i> to fully understand what I am saying, it has made me confused at the first time, I know you do, too .<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/CfqnR3OzvNc?feature=player_embedded' frameborder='0'></iframe></div><br />
<br />
<br />
<div style="color: blue;"><b>b) Guest Only : </b></div><div style="color: blue;"><br />
</div>Using Guest Account to access, if Guest Account has been disabled, Access is denied regardless User is Administrator (because <b>only Guest account has a permission to access</b>)Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-39786251603984341542011-03-27T10:01:00.001+07:002011-03-28T19:50:49.386+07:00Cannot boot to Windows when Ubuntu mess things up ?Today I got a problem with booting to Windows 7, after helping a girl last night LOL .<br />
She asked me how to divide a partition in Windows, I tried to do it with out Hiren Boot CD, by using Disk Management . I use dual boot Windows 7 - Ubuntu and I tried to delete partition which hosts Ubuntu OS & SWAP partition .<br />
<br />
I got 3 other drive called : C (Windows OS is here), D and E . Then I extended E by taking all partition I kept my Ubuntu OS before .<br />
<br />
Now I got 3 partitions : C, D and E.<br />
<br />
Today, I restart my computer and got a prolem when booting , It shows a command line "Grub Rescue"<br />
<br />
Hmm... I tried to insert a <b>Windows Install Disk and repair</b> (you should try this first if you got a same problem), but not successful.<br />
I do some searches on Google and found it !<br />
<br />
<i>After inserting a Windows Install Disk, you go to Repair and <b>Choose Command Line</b> , and just type "<b>bootrec /fixmbr</b> " (without a quotation marks) .</i><br />
<i><br />
</i><br />
It works perfectly ! <i><br />
</i>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-29964940008854165122011-03-25T21:03:00.004+07:002011-04-05T23:25:11.863+07:00Local Security PolicyLocal Security Policy is a part of Local Policy, it focuses on Security Policies in Windows .<br />
<br />
- <b>Start></b> type <b>Administrative Tools> Local Security Policy</b><br />
or<br />
- <b>Start> Run> </b>type<b> secpol.msc</b> <br />
<br />
Let's watch the video :<br />
<br />
Part 1 : <br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/PnsMcaQyxtc?feature=player_embedded' frameborder='0'></iframe></div><br />
Part 2 :<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/HWSrL00YWyQ?feature=player_embedded' frameborder='0'></iframe></div>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-28215471875594111262011-03-24T23:51:00.001+07:002011-04-05T23:26:04.812+07:00Local PolicyPolicy is a rule that we apply to a computer (User and Group, also) and tell them "Do this, not do that"<br />
For example, I don't want user A access drive C, so I set a rule to suit my need.<br />
<br />
Local Policy, as I said before "Local" means these rules will affect locally, only to a computer which you configured .<br />
<br />
To use Policy, we use a tool call Microsoft Management Control :<br />
- Start > Run > type <b>MMC (</b>not case-sensitive<b>)</b><br />
- File > Add/Remove Snap-ins ...<br />
<br />
Now, let's watch my video , it's more useful than words ^^ :<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/hnrJmJ0Ogzo?feature=player_embedded' frameborder='0'></iframe></div><br />
<br />
<br />
So, "Group Policy" Configuration file is hosted in C:/Windows/system32 <br />
<br />
Thanks for visiting my Blog, see ya later !Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-69720922208217472222011-03-23T23:26:00.003+07:002011-03-24T12:14:59.124+07:00Local User Account - Local Group<div style="color: blue;"><b>I) Local User Account :</b></div><br />
- "Local" means if user A has an account on computer 1, he cannot use it to access computer 2 ... His account just <b>only use </b>for computer 1 .<br />
- In a company, there many people, they do different job, most of them concern to computer . User A access computer 1 and write his report, user B also use computer 1 to prepare for her project . If both of them use the "same place" on computer 1, probably they can affect their job (A may delete B's date, or change it ...if he hates her - maybe) .<br />
<br />
There is a solution that they use different computers, but it's not cost-effective .<br />
So "User Account" has been created to save our money. Now, user A can be represented by an object called uA and user B -> uB . They have<i> "different account, different place"</i> on the <i>same computer</i> .<br />
<br />
Problem Solved !<br />
<br />
- By doing this, Administrator can easily manage users, by give them some specific rights - can & cannot do some things . <b>For example </b>: Admin give user A the right to access web browser, but he cannot view any pictures on Website .<br />
<br />
<b>LAB </b>: <b><span style="color: red;">I use Windows Server 2008 Enterprise </span></b>, to create user, delete user ... blah blah, let's see : <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/CGGpXvirU8k?feature=player_embedded' frameborder='0'></iframe></div><br />
<br />
<br />
<div style="color: blue;"><b>II) Local Group :</b></div><br />
In a company , there're 10 users do the same job, and have the same rights .<br />
It's unreasonable when Admin need to do the job : "give the rights to each of them" : 10 times.<br />
So, 10 users will join to a <b>Group, </b>what Admin needs to do is just give the rights to that Group .<br />
<br />
Time-effective !<br />
<br />
<b>LAB </b>: I will create a group, join user to that group ... check it out :<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/Z4NNF6J9ynk?feature=player_embedded' frameborder='0'></iframe></div>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-33555835192933064962011-03-17T22:38:00.012+07:002011-03-23T22:14:57.095+07:00IP - Internet Protocol<div style="color: blue;"><b>I) TCI/IP Model :</b></div><br />
First of all, let's talk a little bit about TCP/IP model .<br />
When we talk to each other, we use the same language so everyone can understand .<br />
If computer A wants to send file to computer B, both of them need to use the same language called "Protocol" .<br />
<br />
TCP /IP is the most popular <i><b>stack of Protocols</b></i> our computers use nowaday to communicate .<br />
TCP/ IP actually is a set of many protocols (for example when computer wants to send e-mail, it uses a protocol named SMTP, when it sends file - it uses FTP ....), its name is represented by 2 protocols : TCP & IP . So hence the name TCP/IP .<br />
<div style="color: blue;"><b><br />
</b></div><div style="color: blue;"><b>II) IP Address :</b></div><div style="color: blue;"><b> 1) Introduction to IP Address :</b></div><div style="color: blue;"><b><br />
</b></div>- Every computer has to have at least 1 IP address to communicate with others . Just like my house has a address so some girls can send me some gifts .<br />
- When we talk about IP address, we often talk about IP v4 (v = Version) : It comprises 32 bits (1 & 0) , and divides to 4 portions (called <b>Octet</b> ) separated by 3 dots (<span style="font-size: x-large;"><b>.</b></span>) :<br />
For example : 10000000.11000000.10000001.00000001 <br />
- It's kind of hard to remember so people write it in decimal number : 128.192.129.1<br />
(* You need to know how to convert from Binary to Decimal Number - just search on Google)<br />
<br />
- IP addresses also have 2 parts : Host ID and Net ID , just like your house's address has Street number and House number .<br />
<br />
<br />
<b style="color: blue;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">2) IP address class :</span></b> <br />
<br />
<div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- Classes help us to determine how many bits net id (or host id) owned , notice : bits net id + bits host id = 32 (please take a look at the figure above) .</span></div><div class="MsoNormal" style="line-height: normal;"><br />
</div><div class="MsoNormal" style="line-height: normal;"></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- <b>Five classes : </b></span></div><ul type="disc"><li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Class A : Net ID owns 8 bits, Host ID owns 24 bits .</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Class B : ------------- 16 -------------------16 .</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Class C : ------------- 24 -------------------8 .</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">Class D & E : are used for research & multicast .</span></li>
</ul><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- So how to know which class this IP address 1.2.3.4 belongs to ? </span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- Focus on first octet, for example IP address is X.Y.Z.T </span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">if</span></div><ul type="disc"><li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">X from 1 -> 126 : This IP belongs to class A</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">X from 128 -> 191 : This IP belongs to class B</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">X from 192 -> 223 : This IP belongs to class C</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">X from 224 -> 239 : This IP belongs to class D</span></li>
<li class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">X from 240 -> 255 : This IP belongs to class E </span></li>
</ul><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"> X = 127 is used for other purposes . For example : 127.0.0.1 is called loopback address .</span></div><div class="MsoNormal" style="line-height: normal;"><br />
</div><div class="MsoNormal" style="line-height: normal;"><b style="color: blue;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">3) Public & Private IP address :</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div><div class="MsoNormal" style="line-height: normal;"><br />
</div><div class="MsoNormal" style="line-height: normal;"><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">a) Public IP address : </span></b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- In WAN (Internet)</span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- Is provided by Service Provider</span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- Unique in Internet</span></div><div class="MsoNormal" style="line-height: normal;"><br />
</div><div class="MsoNormal" style="line-height: normal;"><b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">b) Private IP address : </span></b><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"></span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- In LAN (Local Area Network)</span></div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;">- Is provided by Administrator .</span></div><div class="MsoNormal" style="line-height: normal;"><br />
</div><div class="MsoNormal" style="line-height: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt;"><br />
</span></div><div class="MsoNormal" style="line-height: normal;"><br />
</div>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0tag:blogger.com,1999:blog-7387141856495273849.post-7408727946240626072011-03-17T09:59:00.002+07:002011-03-17T10:06:12.001+07:00Network Topologies & Network DevicesAlright, before starting to learn specific skills about Windows Server . You need some basic understandings in Networking fundamental.<br />
<br />
If you've been through this before, you can skip it, but make sure that you have a glance to know what it is .<br />
<br />
<div style="color: blue;"><b>I) Network Topology : </b></div><br />
Network Topology is kind of shape of Network in your house, your office or your school .<br />
<br />
<div style="color: blue;"><b>1/ Token Ring : </b></div><div style="color: blue;"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW8-sBrA3DsTiAajvcLMtzMWNwh9OIW4jrMMloxQOUBW1NJvPq_U_JeDJC2BEFZRzR8kDZoBIO6hOAvZavFa2S1lelGjD17eenyYT21dga1HDAThU5P7cvCP4vKBrk2UHS1ct0S3a40QM/s1600/1_22_RingTopology.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW8-sBrA3DsTiAajvcLMtzMWNwh9OIW4jrMMloxQOUBW1NJvPq_U_JeDJC2BEFZRzR8kDZoBIO6hOAvZavFa2S1lelGjD17eenyYT21dga1HDAThU5P7cvCP4vKBrk2UHS1ct0S3a40QM/s320/1_22_RingTopology.jpg" width="316" /></a></div><div style="color: blue;"><br />
</div><div style="color: blue;"><br />
</div><div class="separator" style="clear: both; text-align: center;"></div>As its name says : all computers connect to a "Ring". If the ring is broken somewhere, computer cannot communicate with each other .<br />
Just one computer can send data at a time .<br />
Data are sent one-way (clockwise or counter clockwise)<br />
Use method called "Token Passing" - it means if a computer want to send data, it needs a token (like a priority) , taken from other computers .<br />
So, data transfer speed is slow ~ 10 Mbps<br />
=> This Topology is <b>oblivion </b>.<br />
<br />
<div style="color: blue;"><b>2/ Bus :</b></div><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.novell.com/info/primer/art/prim10.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="206" src="http://www.novell.com/info/primer/art/prim10.gif" width="400" /> </a></div><div class="separator" style="clear: both; text-align: center;"><br />
</div><div class="separator" style="clear: both; text-align: left;">The two end-points are called Terminators .</div>Computers connect to the Bus by T-connector .<br />
If computer 1 want to send data to computer 4, data must be send to computer 2, computer 3 ... => Not assure for security .<br />
If 2 computers are sending data simultaneously - bandwidth is divided by 2 and so forth .<br />
This topology is easy to expand (just connect a computer to the Bus)<br />
Because of slow speed, it is no longer used in modern Network.<br />
<br />
<br />
<div style="color: blue;"><b>3/ Star :</b></div><div class="separator" style="clear: both; text-align: center;"><a href="http://files.myopera.com/mathhoang/blog/1_21_StarTopology.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="247" src="http://files.myopera.com/mathhoang/blog/1_21_StarTopology.jpg" width="320" /></a></div>There is always a central device (called HUB - in this figure) .<br />
Every computer becomes a member by connecting to central device .<br />
Speed : 100 Mbps<br />
Easy to deploy and expand .<br />
<br />
=> The most popular Network topology is used nowaday .<br />
<br />
There're also many topologies, but we just focus on the main ones ; you can find out more about them by doing some Google searches.<br />
<br />
<div style="color: blue;"><b>II) Network Devices :</b></div><br />
<div style="color: blue;"><b>1) Network Interface Card (NIC) - or Network Adapter :</b></div><br />
- It's a part of your computer (behind a CPU-Case)<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia0NnCvvFJWt76_2fja-qpNpkG1wuiaRetO8cljbKOMdXckHg_ziWPiXrj4H9mWsyA4lqMl8d3yTBLoFy1WAN0v5HHZL6WzYB5iXlWUgt76uX5ht6ZwRUod9WnWlbIwrPTBDD-Fvcy7Eha/s1600/Network-interface-card.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="261" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia0NnCvvFJWt76_2fja-qpNpkG1wuiaRetO8cljbKOMdXckHg_ziWPiXrj4H9mWsyA4lqMl8d3yTBLoFy1WAN0v5HHZL6WzYB5iXlWUgt76uX5ht6ZwRUod9WnWlbIwrPTBDD-Fvcy7Eha/s320/Network-interface-card.jpg" width="320" /></a></div>- Help computers to communicate to each other, and connect to central device - also .<br />
- To recognise each other, NIC has something called : Address . Imagine that NIC is a house - if I need to send email to you - I need your House's address, right ?<br />
- NIC has 2 types of address :<br />
+ Physical address (MAC address) : Producer provides and cannot be changed - It's unique .<br />
+ Logical address (Netowork address - IP address) : can be changed by administrator .<br />
<b><br />
</b><br />
<div style="color: blue;"><b>2/ Central devices :</b></div><br />
Today, Hub is no longer used; instead , we use Switch which provides more efficient functions and enhance speed of transfer, also .<br />
<br />
Central devices are used in Star Topology as I wrote in previous section.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.ascisa.com/zen-cart/images/untitled.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="260" src="http://www.ascisa.com/zen-cart/images/untitled.bmp" width="320" /></a></div><br />
<br />
<div style="color: blue;"><b>3/ Cable</b> :</div><br />
2 types of cable :<br />
- UTP : Unshielded Twisted Pair . Cheap.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://img1.topfreebiz.com/o2010-7/4-Pair-23AWG-CAT6-UTP-Cable-42039452.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="312" src="http://img1.topfreebiz.com/o2010-7/4-Pair-23AWG-CAT6-UTP-Cable-42039452.jpg" width="320" /></a></div><br />
- STP : Shielded Twisted Pair . Cover by copper to avoid interferences . Expensive 3 times when compare to UTP cable .<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.lextec.com/images/bk_cat5estp.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://www.lextec.com/images/bk_cat5estp.jpg" /></a></div>Nguyễn Vũ Longhttp://www.blogger.com/profile/12854302498507236571noreply@blogger.com0