Você está na página 1de 44

Basic System Troubleshooting Task :-

While starting a PC , if you get a red/ yellow light glowing , then there is a problem with
your PC.

[1]We have to initially, check a switch board & a switch is working or not.
[2]We have to check a power cord by using that same cord to a monitor or any other devices ,
by knowing whether it is properly working or not.

Process of checking SMPS :


[1]To check SMPS , check whether the fan is moving or not
[2]If the fan is not moving, then we have to short green & black of SMPS.
[3]We have to remove all components of computer & start PC using only 4
components that are motherboard, processor, RAM & SMPS.
[4]Now if RAM is not working properly then a computer generates a ‘ beep ‘ ( Beep may not
be generated )
[4]SMPS may have switched sometimes such as ON or OFF, so always make sure that it is
ON.
[5]RAM may be damaged due to burning of some of its portion, or it may be damaged or it
may have sometimes dust on it, which can be removed by using an eraser.
[6]Sometimes a slot where RAM is inserted may also be damage, so instate that RAM into
anther slot.
[7]If the fan has a lot of dust on it, than remove it by using any pin because, this may result
into improper moving of a fan.
[8]Fan may not work properly because if may be loose in connection.
If the processor is not working properly, than if may also create a specific beep.
[9]Now to check a motherboard, check the capacitors, whether they are in normal size or not,
if they are swollen, than they are not, proper to work on a motherboard.
[10]Motherboard can also be checked by touching a clip present on a motherboard, if it gets
heated to extreme level, than there is a problem with motherboard.
[11]Sometimes a motherboard may touch to a cabinet & a current may be generated, so
unplug the motherboard & plug if properly again.
[12]Now if all the 4 components are checked & still you are getting a display, than check a
remaining once.
[13]Now check your MODEM, if the modem is not plugged properly, then there may be a
display problem ,now we can say that either MODEM is not proper or either a slot not proper
(It may happen with TV tuner card, display card, VGA card, graphics card etc)
[14]The another fans of SMPS may have problem, if none of the connectors of SMPS works
than check all the connectors in this case.
[15]The another fans of SMPS may have problem, if none of the connectors in this case.
The display may also disturbs, due to PCB board, which may either be damaged or
connection of that PCB to motherboard may not be proper, sometimes the audio proof may
not be proper or sometimes both may not be.
[16]The hard drive may not work properly because.
[17]The pins of SMPS to that hard drive may be damaged.
[18]The 4 pin connector of hard drive may be damaged.
[19]The IDE pin may be damaged.
[20]The connection of both 4 pin connectors & IDF pin to that motherboard may not be
proper.

Boot sequence of windows-XP


Method of how windows-XP starts:
1) Power good signal.
It checks all the connectors of SMPS, whether they are ready to function or not.
2) It generates +5v current and sends to all connected computer peripherals
(keyboard, mouse, monitor, motherboard, processor, RAM, CD-Rom, floppy drive etc. and
takes the acknowledgment, whether the all devices are in order or not.
3) Now it comes in BIOS, finds the boot device sequence by referring boot order
in BIOS.
4) It loads MBR (Master Boot Record). The job of MBR is to scan the active
partition. The partition which is selected to be started then it is active, that is initially at the
time of choosing one O/S.
5) Load the NTLDR (NTLDR is the boot loader of windows-XP) (MTLDR loads
the O/S) by referring boot.ini files. Boot.ini files contain all the information about the O/S.
available with that computer and also the timer it provides to choose one of those O.S.

6) Password Recovery of windows


XP:
7) Insert Password recovery disk in CD drive  enter in BIOS and make 1st boot
device as CD –ROM & save it  1. Start window
8) 2. Start boot CD.
9) Enter your choice: Select start boot CD and enter
10) Select 4 number (Password and registry tools)
11) Enter active password change 3.0 (NT/2000/XP/2003) and next
12) options. 1. choose logical drive
13) 2. Search for Ms-SAM database
14) 3. Exit
15) Enter choice : (1) and enter
16)  0 Drive
17) 1 drive
18) 2 drive
19) 3 drive .
20) Now you can choose any of the drive to search for a password and make choice
as 0 now it has received a MS-SAM database file in this drive so press continue.

Netmetting configuration :
Start run conf next First Name
Last Name
E-mail ID
 next Netmetting window tools  option  advanced calling
Used a gateway to call telephones and video conferencing system.
Gateway: 10.0.0.2 (this is an IP address of that computer from which we will proceed).
 OK ok then you have to enter IP address of that computer to which you want to share
your desktop.

Remote desktop sharing:


Right click on my computer  Properties Click on remote  Allow user to connect
remotely on this computer  apply  ok.

Note : For this to be performed, both computers must have a LAN card with drive
installation and must have a same range of IP-addresses.
To access remote desktop of other computer :
Start  all programs  accessories  communicationsremote desktop connection.
Then in remote desktop connection ? window you have to type computer name / IP address
of next computer  then it asks for the user name and password of that next computer.

Telnet Configuration
Right click on my computer  manage  services & application  servicesstart the
telnet service.
For this telnet service to be activated we should know the user name and password
of both the computers, so initially run command and then with C:\telnet 192.168.10.5 [IP
address of next computer]
Then whether to from a connection Y/N? Y then enter.
Telnet is a program. It stands for terminal emulation program through which we can manage
networking device (router, wireless access point (WAP), PC, server switches firewalls, etc.)
Port no of TELNET is 23. It manages remote access through the commands given in
command prompt, where remote desktop only provides GUI of another computer.

Remote Desktop access through team-


viewer :
Open Google  team viewer download  click there  click on V4.1.6432 (English) and
download this version and save it at your desired location  Double click on team viewer
setup  run  select install option and next  continue and make it as (or any of your
choice) Personal
Company
Both of above.  Agreement  next  you can give password to your team
viewer or you can make next  now make it as “ Full access to the version”.
Now both the computers i.e. those which are involved in the remote desktop sharing are
ready to create session between each other by providing Id’s of each other and then choose.
Remote desktop support. (This option doesn’t allow you to transfer any data / file}
Presentation
File Transfer
VPN

Software restriction policy :


Start run gpedit .msc Local computer policy  computer configuration  window
settings  Security settings  s/w restriction policy  additional rules  restrict the s/w
which you wish to do.
Software restriction policy is used to block specific s/w on computer.
Whenever you block any s/w then you must bloc the .exe (executable file) of that particular
s/w which is available in the program file of C drive?

How to block a website?


My computer (double click) C drive (double click)  Windows folder (double click) 
system 32 (double click)  drivers (double click) etc (double click) open Host file with
note pad  now to block any particular website give the following commands at last line of
the notepad i.e. 127.0.0.1 www.orkut.com
To unblock that particular website give # before the underline command.
Step to block a USB:
Start run  cmdregedit  H key local machine  system  current control set 
service  USB store file Double click on start file  you have to make it value data 4 for
USB blocking  OK (by default the value data will be 3).

(1)Internet Explore:
Tools  internet options  contacts  contact advisor  enable  approved sites In
this types the any website (www.google.com) and make always  apply  ok .then it ask
for the password and also for hint and then make ok 3 times.It is used to restrict
unauthorized user to access web.
Tools  internet option  homepage  type the website of which you want to set the
homepage after opening internet explorer.
2nd tab in general:
Temporary internet file  Delete Cookies  OK delete files.
It remove the cookies which are automatically downloaded with the website.
3rd tab history :
It maintains the record of all those websites which we have visited and make the size of this
always short i.e. 1 or 2 website or also you can clear the history using clear history tab.
(A)Security Tab:
Tabs under security:
(1)Internet
Click on custom level.
If your web pages are not downloaded properly then make all the tabs in custom level as
enable.
Trusted sites-This contains those sites which you want to access.
Restricted sites:-This contains those sites which you want to restrict on access.
(B)Privacy Tab:
In privacy tabs, always make medium mode or you can just click on default through which it
will automatically become medium mode.
Pop up Blockers:-It is used to prevent most pop-up windows from appearing.
Block pop-ups. (It is used to restrict the unnecessary adds/ popup that is shown when a site is
accessed.)
If you want to block all popup then choose high option in Settings or low or medium as per
the requirement.
(C)Content tab:
Content adviser
Click on auto complete.
Auto complete removes all the stored ID’s and password which have been visited up to that
date. For this make clear ID’s & Clear password  apply OK
(D)Connection Tab:-
LAN Settings- This tab is used for proxy server and to share internet.

Password Policies:
Start  control panel  administrative tools  local security policy  account policy
password policy then.
Enforce password history
Maximum password age.
Minimum password age.
Minimum password length.
Password must meet complexity requirements
Store password using reversible encryption for all user in domain.
Minimum Max
0 passwords 24 password
42 days 999 days
0 days 998 days
0 characters 14 characters
Disabled enabled
Disabled enabled
Enforce password history : It will remember your previous & same password can’t be
assigned in case we are using limit more than password i.e. may be 1,2,3,……24.
Max password age: It means you can use your password only up to 42 days by default or if
you may increase the limit up to 99 days.
Min password age: It means you can use your password up to 1 less than max. password.
Here you can even change your password within 1 or 2 days the min limit has been given &
alerts will also be displayed for such a short period.
Minimum Password length: It describe the length of password, where by default policy is 0
char. i.e. you can login without giving password & max 14 characters would work only for
users and for administrators max limit is 128.
Password must meet complexity requirements:-It allows alphanumeric password as wall
as special symbols like * @ etc. by default, it is disable & if it is enabled then you have to
provide & if it is enabled then you have to provide min 3 things i.e. (from A to Z 1 character
from 0 to 9 from any special symbol) even though password length is 0 characters.
Store password using reversible encryption Whenever you create an account the password
is stored in SAM in text format in case this policy is disable but if this policy is enable then
the password is store in Sam in encrypted format.
Password Location - c:/windows/system32/config/sam

Account lock-out policies :


Start  control panel  administrative tools  local security policy  account policy
account lookout policy.
Account lookout duration
Account lookout threshold
Reset account lookout counter after.
Logon message
Unable to log you on because your account has been looked out please contact your
administrator.

LAN
[1] LAN : Structured Cabling :-

RJ45 LAN card- Readymade patch card-One end of this patch card goes to LAN
card of PC and 2nd end goes to I/O RJ45 Rack- In backside of I/O there is punching
by using punching tools. There we are using tags for cable identifications. By using
cascading through wall, cable goes in server room. In server room a cable goes in
rack. Then the cable is punched in jack/patch panel & at the second end of the
patch panel, there is RJ45 jack. Again we are using tags in patch panel for cable
identification & we are using readymade patch cards to connect switch to patch
panel.
Varieties of switches: 8,12,16,24,32,40,48.
LAN
[1] LAN : Structured Cabling :-

RJ45 LAN card- Readymade patch card-One end of this patch card goes to LAN
card of PC and 2nd end goes to I/O RJ45 Rack- In backside of I/O there is punching
by using punching tools. There we are using tags for cable identifications. By using
cascading through wall, cable goes in server room. In server room a cable goes in
rack. Then the cable is punched in jack/patch panel & at the second end of the
patch panel, there is RJ45 jack. Again we are using tags in patch panel for cable
identification & we are using readymade patch cards to connect switch to patch
panel.
Varieties of switches: 8,12,16,24,32,40,48.
[3]Wireless LAN:-

Wireless Frequencies:-
900MHz, 2.4GHz, 5GHz

Wireless Protocols:-
802.11a, 802.11b, 802.11g, 802.11n.

Wireless Reflections:-Sea-lings, wall, carpets on the floor, water, fire,


electromagnetic interference, rough plasters etc.
Enhanced ADSL Modem:-

ADSL means, it needs to have RJ11 jack for the internet.


802.3 is a LAN standard, i.e. defined by IEEE. (IEEE-Institute of Electronics &
Electrical Engineers).
Wireless access point should be placed at the center of that particular building in
which you want to establish the networking. There are two types of frequencies
Licensed frequency and Unlicensed frequency.
WAN

Wireless transmission has because for a long time to transmit data by


using infrared radiation , micro-waves , or radio waves , through a medium search
as air with type of connection no wires are used. Wireless LAN are becoming more
and more common in company network , specially small office and home office .
When you are choosing a wireless solution for your LAN or WAN ,
you should always consider the following things speed , distance , and number of
device connect. Some frequencies are used for wireless transmission they are 900
MHz , 2.4 GHz and 5 GHz.

Radio frequency transmission factor


Radio frequency are generated by antena’s that propagate the waves
into the air . As they are being propagated , various factor can reflect or deflect the
singal . affecting it’s quality and strength .

Sub major disturbances for wireless transmission:-

Walls , ceiling and floors rough plaster , carpet on the floor , drop
down ceiling tiles , metal and glasses etc .

WLAN Standards

Typically the government agencies control the use of RF bands .


For eg :- in tha UNITED STATE , the Federal Communication Commissions
(FCC) regulates wireless transmission , which includes new transmission
methode , frequencies and modulation , in EUROP , the Europian Telly-
Communication Standard Institute (ETSI) is the regulator. However , one
international agency ,the International Telly-Communication Union Radio
Communication Sector (ITU-R) is responsible for managing radio frequencies ,
spectrum and satellite orbits for wireless communication . It’s main purpose is to
provide co-operation and co-existances of standard’s and implementation across
country boundary.
Two standard’s bodies are primarily responsible for implementive
WLAN’s , the Institute of Electrical and Electronic Engeenier (IEEE) and the Wi-
Fi Alliances . The IEEE defines the mechanical process of how WLAN’s are
implemented in the 802.11 standard’s , so that vendors can create compatible
products . the Wi-Fi Alliance basically certified company by insuring that there
product’s follow the 802.11 standard’s ,thus allowing customer to buy WLAN
products from different vendor’s without having to be consuled about any
compatible issues .

802.11 standards :-
Wireless is becoming more popular in todays LAN . since little
cabling is required . four basic standards are corrently in used 802.11a , 802.11b ,
802.11g , 802.11n. of the four IEEE 802.11 standards ,802.11b has been
developed the most , with 802.11g being the most common one sold today.
802.11n is very new and commonly found in company network’s

802.11a 802.11b 802.11g 802.11n

Data rate 54 mbps 11mbps 54mbps 248mbps


2*2 antena’s
Through put 23mbps 4.3mbps 19mbps 74mbps

Frequency 5GHz 2.4GHz 2.4GHz 2.4GHz/5GHz

Compatibility None With With 802.11a,802.11b


802.11g 802.11b and 802.11g
Range (35-120) (38-140) (38-140) (70-250)
(meters)

RF BANDS

Wireless communication can use various RF bands . some of this are


licenced (you have to pay a government agency use them ) and some are
unlicenced . For eg radio broadcast such as AM and FM are licensed through your
country government . Other bands , such as the 802.11 bands , are unlicenced . So
you don’t have to buy a licenced from the government use this frequencies .

WLAN are uses three unlicenced bands

1. 900MHz - use by the older codless phone .


2. 2.4GHz – use by newer codless phone , WLAN ,Bluetooth , Microwaves
and other devices.
3. 5GHz – use by the newest model’s of cordless phone and WLAN devices .
WLAN Security

One of the biggest problem of security .

a) SSID and MAC addess filtering (service set Identifier ) .


b) WEP (Wired Equivalent Privacy )
c) 802.1x EAP (extensible authentication protocol )
d) WPA (Wi-Fi protected access).
e) WAA 2.

WIRELESS ACCESS POINT ACCESS MODE

There are two types of wireless access


i. Ad hoc mode
ii. Infrastructure mode

Ad hoc mode is based on Independent Basic Service Set (IBSS) . In IBSS , client
can set up connections directly to the other clients without an intermediate Access
Point (AP ) . This allow you to setup peer to peer network connection’s .
Infrastructure mode was design to deal with security and scalibility issues .The
infrastructure mode , wireless client can communicate with each other via and
AP .Two infrastructure more are used .Basic Service Set (BSS) , Extented Service
Set (ESS) .

OSI ( Open System Interface )


Initially networking was established in 1963 that is through ARPA (Advanced
Research Project Agency) & that network is known as ARPANET. This
networking had used co-axial cable.
Need of networking:
To share and access Data, Applications & Resources we need networking.
In 1963, there were 2 drawbacks in networking:-
[1]Monopoly of a company.
[2]Flow control.
The names of companies are VAIO, DELL, COMPAQ, ACER, ZENITH,
SAHARA, PCS, LENEVO, IBM, HP, TOSHIBA, APPLE, and HCL.
The brands in 1963:-
INTEL, XEROX, DIGITAL
The monopoly of the companies is protested by 2 institutions:-
[1] IEEE (Institute of Electrical & Electronics Engineers)
[2] ISO (International Standard Organization)
OSI Launched in 1983 and it is divided into seven layers.

[7]Application Layer :-

Source name= ‘Manoj’


Destination name= www.google.com
Source of address= 192.168.1.135
Destination IP address =?
Help= DNS (Domain Name Service)
The function of DNS is to resolve name to IP address & IP address to name.
Destination IP Address = 74.125.127.100

[6]Presentation Layer :-

It converts user level language into machine level language by using ASCII &
EBCDIC code.
ASCII (American Standard Code for Information Interchange)
EBCDIC (Extended Binary Coded Decimal for Information Code)
Help=ASCII or EBCDIC
Each character is represented into 8 bit & that number from 0 to 255.
E.g. A=65
i.e. 01000001

[5]Session layer :-

It decides the transmission standard and it keep the different type of data
separately.
It uses following transmission standards.
Half duplex Communication can be established on both sides but only one sided at
a time.
E.g. Walky-talky.
Full duplex Communication can be established on both sides simultaneously.
E.g. Mobile, telephone.
Simplex communication Communication can be done in one way only.
E.g. TV, radio

[4]Transport Layer :- It keeps data ready for transmission. TCP is responsible for
adding transport layer header along with data and in Header there is information
about Breaking, Sequencing and Acknowledgement

Encapsulation: The process of adding header & footer is known as an


Encapsulation

3-Way Handshaking: TCP protocol is used for 3-way handshaking.


Window Size= No. of Initial breaks in data

[3]Network Layer :-
IP Function - IP creates a packet on network layer & attaches a source IP address
& destination IP address
In Network layer IP protocol is worked and it is responsible for adding Network
layer header along with data and in Header there is information about Source IP
Address and Destination IP Address and Network layer one more protocol is
worked that is ICMP and it is responsible for messaging services like as Name
conflicts, IP address conflicts, Destination host is unreachable and request time
out.

IP for windows.
IPX for Novell Netware.
AppleTalk for Macintosh.

.
[2]Data Link Layer
In Data link layer Ethernet protocol is worked and the job of Ethernet protocol is to
create Frame on Data link layer and in Frame there is data link footer in which you
will get CRC and in Data link Header you will get Source MAC Address and
Destination MAC Address.
Source MAC address – The source computers (from which the request is done)
LAN card’s physical address.
Ex. computer LAN card’s physical address.
DMA (Destination MAC Address)
Data link layer is again divided into 2 sub layers:-
MAC (Media Access Control)
LLC (Logical Link Control)
LLC performs CRC.
MAC is used in case of different types of transmission such as half duplex, full
duplex, simplex communication.
Full duplex has no problem.
Half duplex requires CSMA/CD protocol to transmit data into the network
ARP (Address resolution protocol)-It is used for MAC address to IP address
resolution purpose.

[1]Physical Layers :-

It converts a frame into a stream of bits & transmits it over the network.

Compression
Proper utilization of disc space is compression.
To compress any file, we use a third party s/w like WINZIP, WINRAR, etc.
To perform compression of any file, right click on that file & then choose add to
zip file & then perform the wizard of WINZIP (& perform same for WINRAR).
But without third party s/w, you can compress the file as
Right click on that file
Properties
Advanced
Compress that file
OK
Color of that file change to ‘blue color’ (this indicates that the compression has
been done).
Compression without WINZIP & WINRAR, doesn’t reduce the actual file size,
rather it manages the space in a hard disk.
On the compare WINZIP & WINRAR actually reduces the file size.
Compressing can be performed by any kind of uses.
Suppose a file size is 509 Mb & it takes a space in hard disk as 514 Mb, then why
does it so.
Encryption:-
By using encryption, you can personalize your data without using any third party
s/w.
To hide any folder, right click on that folder – properties – customize – change
icon – choose ‘blank space’ – ok.
Encryption & compression is only done on files & folders.
Steps for encryption.
RC on file & folders
Property

Advanced
Encrypt contents to secure
Data
Ok
Apply

Disadvantage of Encryption:-
Suppose you have encrypted any file or folder with one password, & if after some
time, you are changing your password/ user name then you won’t be able to
decrypt that file or folder.
Note-After encrypting any file / folder, its name appears in green color.
Note- At a time, you can perform only one task on any folder or file, either
encryption or compression.
Disk Quota
We can restrict a user for a specific amount of disk storage is known as disk quota
& it is implemented on partition & only administrative level privilege having
account can assign quota.
RC on any partition – properties – quota – Enable quota

Deny disk space to user exceeding the quota limit.


Log events when user exceeds their quota limit.
Log events when user exceeds their warning level.
Quota Entry

Quota- New quota entry – advanced find now (to select the user from available
user accounts) –Limit disk space set warning level to
Workgroup Networking :-
Steps:-

[1]All computers must have a LAN card & drivers must be installed on that
machine. To check whether the machine has LAN RC on My computer – manage –
device manager –Network adapter

[2]All machines must be connected with each other, either via cables or switch.
To check whether the machine in a network is connected to switch or not.
RC on n/w places – properties – RC on Local Area connection – properties –
Show icon on notification area when connected.
If the symbol is showing Red Cross with
Then it indicates –
1. The cable may be faulty.
2. Connectors may be damaged.
3. LAN card may be damaged.
4. Switch may be powered off.
[3]Give the same range IP-address scheme.

Computer 1
RC on LAN connection – General-
IP address : 192.168.10.1
Subnet mask : 255.255.255.0
Default Gateway
Computer 2
IP address : 192.168.10. 2
Subnet mask : 255.255.255.0

[4] Check the connectivity between the computers. To check the connectivity, we
use the command as -

Ping 192.168.10.2.-t.
Packet internet groper
By default, it is 32 byte.
Suppose you are not getting a reply from both the machines. You have to check the
firewall settings. System may be infected with virus

[5]Now decide the workgroup name steps for assigning machine in workgroup:

RC on my computer – properties – computer name – change –


Computer name : XP
Workgroup name : CHESTER
OK – OK
OK – OK – Then it will restart the computer.
This same task must be performed on all machines. If your administrator account
has a password, then it will prompt / demand you for the user name & password.
Both the machines must have administrator password

Sharing & Security :-


To share any file folder / partition – RC on any file / folder / partition –
To get a security tab:
Tools – folder option – you will get a list which you have to drag till
end – uncheck the box use simple file sharing.

To share a remote desktop, run command a


\\ 10.0.0.2\ or \\ name of the machine in a network.
The resolution of name to IP is done by NetBIOS
Sharing & Security – Share this folder.

Share name:
This option will tell the name of the data to be shared in a network.
Maximum Allowed:
This option gives the max. Users numbers those will share the data in a n/w

Important Commands
[1]Too change the metric weights use the command
Router(config)#router igrp 100
Router(config-router)#default-metric bandwidth delay reliability load mtu
[2] To change the AD of IGRP
Router(config)#router igrp 100
Router(config-router)#distance <1-255>
[3] To change the default timers of IGRP
Router(config)#router igrp 100
Router(config-router)#timers basic update invalid holddown flush sleeptime
[Note]sleeptime-
It is the time at which triggered update will not send until the sleeptime
expires.
[4] To stop the hold down timers.
Router(config)#router igrp 100
Router(config-router)#no metric hold down
[5]To balance the load on the multiple paths [By default RIP uses by default 4
equal cost and maximum 6 equal cost load balancing and IGRP & EIGRP by
default 4 equal and unequal cost and maximum 6 equal and unequal cost load
balancing]
Router(config)#router igrp 100
Router(config-router)#maximum-paths <1-6>
Variance : - it is the multiplier i.e. used to determine what the excepatable
metric for a router is to be included in the routing table.
Router(config-router)#variance multiplier
Eg. :- the path with higher metric is 4 times greater than path with lowest
metric i.e. for every one packet i.e. sent across the higher metric path, 4
packets will have been sent across the lower metric path.
L = 500 H = 2000
Variance = 4
[6] to change maximum paths and hop count use command
Router(config)#router igrp 100
Router(config-router)#metric maximum-hops <1-255>
Everyone can access this information.
Change
Read
Full Control
OK Apply

To see the data shared in a network:

DC on network places – click on view workgroup computers.


By default every drive is shared for administrator, so to share any drive we need
not to perform sharing & security, rather just by giving command \\ 10.0.0.2 \ c $.
I.e. C drive will be shared.

How we will join machine in a domain?


Pre-requisites to join machine in a domain:
[1]Your machine must be assigned IP-address scheme that is related to domain IP-
address range.
[2]You must know the domain name.
[3]To join machine in a domain, you must know the password & user name of the
domain. User name & password must be highest level privilege.
[4]You need to check the connectivity between your machine & server machine by
using ‘ping’ command. To know the IP-address of any computer the command is
as- Run –cmd-IPconfig / all.
Suppose a reply is not received from a domain (i.e. server computer) to your
machine or from your machine to domain, and then there may be several reasons.
Windows firewall may be on which might be avoiding (outside attacks) outside
access.
Antivirus firewall may be on.
To solve this problem:
You can make widows firewall off or by retaining firewall on just check all the
services checked i.e.
Check antivirus firewall & make it off. .
[5]To join a machine in a domain:-

RC my computer of client m/c – properties – computer name – change – domain


HCL.COM
Name of the domain to which your machine belongs.
Before joining any machine in a domain, you need to know the user name &
password of domain server.

APPLY OK OK OK YES
Now your machine would be restarted. After restart, the system now asks for
User name :
Password :
Log on to :
‘Log on to’ indicates whether your machine is to be restarted in domain or that
computer itself.

Press Control + alt + Del for fast shut down.


If you log on to that computer itself then your user name & password would be
checked in c:/windows/system32/sam database, & if you log on to domain then
your user name & password would be checked in active directory database of
server computer, which is there in c:/windows/ntds.

Steps to create groups & assign priority


to these groups
[1]Create a group named sales.
[2]Create a group named admin.
[3]Create users named sales1, sales2, sales manager & all these users under sales
group.
[4]Create users named admin1, admin2 & admin manager & add all these under
admin group.
[5]We have two folders say sales data & admin data in any partition in my
computer.
[6]Right Click on sales data folder click on
Sharing & Security Sharing
Click on share this folder
Click on permission tab
Select everyone & remove it
Apply OK.

[7]Click on security tab


Add the sales group to access sales data & give full control to it.
Again select admin manager & give this user full control
Select admin 1 & admin2 users who will have deny to sales data
Apply OK
[8]Right Click on admin data
Click on sharing & security
Sharing tab
Click on share this folder
Permission tab
Select everyone & remove it
Apply OK.
[9]Click on security tab
Select admin group & provide this group full control access admin data
Select sales manager & give this user full control
Select sales1 & sales2 who will have denied to admin data
Apply OK.
Steps for Finding Effective Permission to
any user on any particular folder file

Right Click on that folder file


Click on sharing & security
Security tab
Click on Advanced tab
Click on Effective Permission tab
Click on select tab
Advanced
Click on find now
Select the user of which you want to find an Effective Permission
OK –OK.
How we will assign a Special Permission
to any particular user for any folder or
file
Right Click on Folder File
Sharing & Security
Security Advanced
Select a particular user to which a special permission is to be provided
Click on Edit
Provide an appropriate Permission which you want to provide.
Steps for Assigning Audit Policy
Start – Control panel – Administrative tools – Local Security Policy – local
Policies – Audit policy – Double Click on Audit Object Access

Audit these attempts

Click on Start – Run –gpupdate /force to save the policy which we have provided.
Process for Assigning Auditing on Folder or File :-
RC on folder or file
Sharing & Security
Security
Select Advanced
Click on auditing

Add select the user by clicking advanced


Find now select user
OK OK
Now select the task like
Success Failure
Full control
Read
Write
OK Appl OK OK
y

Step to view audits on users :-

Log on through the administrator or administrator level privilege user


Click on start
Control panel
Administrative tools
Event viewer
Security
View audits.
Steps to remove all audits :-

RC on security tabs & clears all events then you will be asked whether to take back
up of these audits as

YES
NO

Removing and then Reinstalling NetMeeting

1. Copy the Msnetmtg.inf file from the %SystemRoot%\Inf folder to your desktop.
2. Click Start, click Run, type the following command, and then press ENTER:

%SystemRoot%\System32\rundll32.exe setupapi,InstallHinfSection NetMtg.Remove 132


msnetmtg.inf

NOTE: This command is case-sensitive so you must type it exactly as it appears.


3. Right-click the Msnetmtg.inf file that you copied to your desktop, and then click Install.
If you are prompted, insert your Windows 2000 CD-ROM into your CD-ROM drive.

After the installation procedure is finished, restart your computer

Você também pode gostar