Você está na página 1de 19

What is ping?

Ping is a program that sends a series of packets over a network or the Internet to
a specific computer in order to generate a response from that computer. The
other computer responds with an acknowledgment that it received the packets.
Ping was created to verify whether a specific computer on a network or the
Internet exists, and is connected.

Some have claimed that the word "ping" is actually an acronym for "Packet
Internet (or Inter-Network) Groper", deliberately contrived to play on the fact that
pinging with a computer is similar to what submariners do with sonar. Both the
computer and the submarine's sonar send out a "ping", in the form of either a
series of packets or a brief burst of sound. The ping "bounces" off the target and
then returns to let you know the target is there.

Ping is both a noun and a verb, e.g., "Ping that computer", or "the router didn't
return a ping".

Ping is built into almost every network-capable operating system. To ping a


computer, go to a command prompt and enter ping , a space, and then the
network or Internet address you wish to contact. For example, enter the following
at a Windows XP command prompt:

ping 66.218.71.198

You should get a response similar to this:

pinging 66.218.71.198 with 32 bytes of data: Reply from


66.218.71.198: bytes=32 time<1ms TTL=127 Reply from
66.218.71.198: bytes=32 time<1ms TTL=127 Reply from
66.218.71.198: bytes=32 time<1ms TTL=127 Reply from
66.218.71.198: bytes=32 time<1ms TTL=127 ping statistics
for 66.218.71.198: Packets: Sent = 4, Received = 4, Lost =
0 (0% loss), Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

Operating systems format their ping results differently. For example, following is
what the result looks like from a Linux computer:

ping 66.218.71.198 (66.218.71.198) 56(84) bytes of


data.

64 bytes from 66.218.71.198: icmp_seq=1 ttl=254


time=0.644 ms
64 bytes from 66.218.71.198: icmp_seq=2 ttl=254
time=0.510 ms

64 bytes from 66.218.71.198: icmp_seq=3 ttl=254


time=0.584 ms

64 bytes from 66.218.71.198: icmp_seq=4 ttl=254


time=0.535 ms

--- 66.218.71.198 PING statistics ---

4 packets transmitted, 4 received, 0% packet loss,


time 3000ms

rtt min/avg/max/mdev = 0.510/0.568/0.644/0.053 ms

Regardless of the operating system, the results will show the IP address of the
computer you're pinging, the round-trip time in milliseconds for each packet, the
number of packets sent and received, and the number and percentage of how
many packets got lost.

Technical information

Ping uses ICMP (Internet Control Message Protocol) packets. The packet from
the origin computer is called an "ICMP_echo_request", and the response from
the target is called an "ICMP_echo_reply". Each packet contains by default either
32 or 64 bytes of data and 8 bytes of protocol reader information, but ping can be
configured at the command line to use different sized packets. You can access a
list of switches and additional functions by invoking the help file for ping:

• In Windows, at the command prompt, enter ping /? .

• In Unix-based systems (e.g., Mac OS X and later, Linux, Solaris), at the


command prompt enter ping --help .

What is a loopback address?


A loopback address is a special IP address, 127.0.0.1, reserved by InterNIC for
use in testing network cards. This IP address corresponds to the software
loopback interface of the network card, which does not have hardware
associated with it, and does not require a physical connection to a network. The
loopback address allows for a reliable method of testing the functionality of an
Ethernet card and its drivers and software without a physical network. It also
allows information technology professionals to test IP software without worrying
about broken or corrupted drivers or hardware.
To test a network card using the loopback address, you can use the TCP/IP
utility Ping. The best way to do this is with the Ping utility that comes with most
operating systems. This is a simple command-line utility that will try to
communicate to an IP address.

To run Ping, first follow the appropriate instructions below for your operating
system:

• Windows XP: Click Start and select Programs or All Programs,


then Accessories, then Command Prompt.

• Windows 2000: Click Start and select Programs, then Accessories,


then Command Prompt.

• Windows NT 4.0: Click Start and select Command Prompt.

• Windows 95, 98, and Me: Click Start and select Programs, then MS-
DOS Prompt.

• Unix and Linux: Open a shell prompt.

• Mac OS X: Open the Terminal.

• Mac OS: Ping wasn't available as part of the OS in Mac OS 9 and earlier.
For information on three utilities you can use instead, see the Knowledge
Base document In Mac OS, how can I check to see if a computer is on the
network?

Once you are at a command prompt, enter the following:

ping 127.0.0.1

If the command is successful, the Ping utility will return results similar to the
following. The exact information returned will vary depending on your operating
system:

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128

Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply


from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from
127.0.0.1: bytes=32 time<10ms TTL=128 Ping statistics for
127.0.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0%
loss), Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms

This indicates that the network card and drivers are functioning properly. If the
Ping utility is not able to get a return on the network card, this may indicate either
a driver problem, or a physical problem with the card.

In Windows, how do I obtain the MAC address


(also known as the physical address) of
another network-connected computer?
Note: To obtain the MAC address of another computer on the network, you must
have TCP/IP installed.

The instructions below will work only for another computer on the same subnet. If
the computer you are pinging is on a different subnet, you will receive an error
message saying, "No ARP entries found". Also, if you try to run ARP without first
having pinged the computer at its IP address, you will often receive a "No ARP
entries found" error message.

To obtain the MAC address for another computer on the network, at the
command prompt, enter: ping computername Replace computername
with the name of the computer. Or, if you know the IP address, enter: ping
ipaddress Replace ipaddress with the IP address.
Then, at the same prompt, enter: ARP -A ipaddress

In Windows, what are some networking


commands I can use from the command
prompt?
Note: Windows 2000 and XP Professional are the only Windows operating
systems recommended for use on the Indiana University network. For more
information, see For Windows computers on the IU network, why does UITS
recommend Windows 2000 or XP Professional? Because of security
enhancements to the IU network in May 2006, Windows 95, 98, 98SE, and Me
computers can no longer authenticate to ADS, print to some network printers in
departments and campus housing, or map drives to other computers.

Some useful networking commands you can enter at the command prompt
include the following:

net Used to start, stop, and view many networking operations


Note: net is just the first part of the command; you'll need to
combine it with a second command, for example, net config or
net use . Available second commands vary depending on which
version of Windows you have. To get a list of available options, enter
net ? .
ipconfig Displays the IP address and other TCP/IP configuration information
for your workstation
hostname Displays the Microsoft networking computer name; available only in
Windows NT, 2000, and XP
lpq Displays the print queue status of an LPD printer; available only in
Windows NT, 2000, and XP
ping Verifies existence of remote host (connectivity)
nbtstat NetBIOS over TCP/IP; gives statistics and technical NetBIOS
information for the TCP/IP layer
netstat Returns protocol statistics and current TCP/IP connections
ipxroute Displays and modifies IPX routing tables
route Manipulates TCP/IP routing information
tracert Displays route taken by an ICMP to a remote host
finger Displays information about the user; finger is turned off in IU's ADS
Domain.
arp Displays or modifies information in the ARP (Address Resolution
Protocol) cache
getmac Lists the MAC (Media Access Control) Address on the computer
network interfaces; available in Windows XP only

o at (windows XP/2000)
Scheduling utility.
o bootcfg (XP only)
This utility allows you to set up your boot options, such as your default OS and other
loading options.
o cacls (XP, 2000, & NT4.0)
Changes the ACLs (security Settings) of files and folders. Very similar to chmod in Linux.
o comp (XP & 2000)
This utility is very similar to diff in Linux. Use the /? switch to get examples of command
usage.
o contig (works with NT4.0 and newer)
A great defrag utility for NTFS partitions.
o control (XP only) - unpublished!
Allows you to launch control panel applets from the command line. control
userpasswords2, for example will launch a helpful local user admin utility.
o defrag (XP only - NT4.0 and Win2k use contig)
Yes, XP comes with a command line disk defrag utility. If you are running Win2k or NT4.0
there is still hope. Contig is a free defrag program that I describe on the defrag page.
o diskpart (XP only)
Use this command to manage your disk partitions. This is the text version for the GUI
Disk Manager.
o driverquery (XP only)
Produces a list of drivers, their properties, and their versions. Great for computer
documentation.
o eudcedit (XP only) - unpublished!
Private Character editor. Yes with this program built into Windows XP you can create
your own font!
o findstr
Find String - similar to Linux's Grep.
o fsutil (XP only) - unpublished!
This is a utility with a lot of capability. Come back soon for great examples.
o getmac (XP & 2000)
This command gets the Media Access Control (MAC) address of your network cards.
o gpresult (XP & 2000)
This generates a summary of the user settings and computer group policy settings.
o gpupdate (XP only)
Use this utility to manually apply computer and user policy from your windows 2000 (or
newer) domain.
o ipconfig (XP, 2000 & NT4.0)
This handy tool displays IP settings of the current computer and much more.
o MMC (XP, 2000 & NT4.0) - Microsoft Management Console
This is the master tool for Windows, it is the main interface in which all other tools use
starting primarily in Windows 2000 and newer systems.
o more
Utility used to display text output one screen at a time. Ex. more c:\windows\win.ini
o msconfig (XP only)
The ultimate tool to change the services and utilities that start when your Windows
machine boots up. You can also copy the executable from XP and use it in Win2k.
o msinfo32 (XP &smp; 2000)
An awesome diagnostic tool. With it you can get a list of running processes, including the
residing path of the executable (great for manually removing malware) and get detailed
information about hardware and system diagnostics.
o narrator (XP only)
Turns on the system narrator (can also be found in accessibility options in control panel).
Will will allow your computer to dictate text to you.
o netsh (XP & 2000)
A network configuration tool console. At the 'netsh>' prompt, use the '?' to list the
available commands and type "exit" to get back to a command prompt.
o netstat (XP)
A local network port tool - try netstat -ano.
o nslookup (all)
A DNS name resolution tool.
o openfiles (XP Only)
Allows an administrator to display or disconnect open files in XP professional. Type
"openfiles /?" for a list of possible parameters.
o Pathping (XP & 2000)
A cross between the ping and traceroute utilities. Who needs Neotrace when you can use
this? Type "pathping <ip address>" and watch it go.
o recover (XP & 2000)
This command can recover readable information from a damaged disk and is very easy
to use.
o reg (XP & 2000)
A console registry tool, great for scripting Registry edits.
o sc (XP & 2000)
A command line utility called the Service Controller. A power tool to make service
changes via a logon/logoff or startup/shutdown script.
o schtasks (XP only)
A newer version of the AT command. This allows an administrator to schedule and
manage scheduled tasks on a local and remote machines.
o secedit (XP & 2000)
Use this utility to manually apply computer and user policy from your windows 2000 (or
newer) domain. Example to update the machine policy: secedit /refreshpolicy
machine_policy /enforce
To view help on this, just type secedit.
NOTE: In Windows XP SP1 and news, this command is superceded by: gpupdate /force
o sfc (XP & 2000)
The system file checker scans important system files and replaces the ones you (or your
applications) hacked beyond repair with the real, official Microsoft versions.
o shutdown (XP & 2000)
With this tool, You can shut down or restart your own computer, or an administrator can
shut down or restart a remote computer.
o sigverif (XP only)
Microsoft has created driver signatures. A signed driver is Microsoft tested and approved.
With the sigverif tool you can have all driver files analyzed to verify that they are digitally
signed. Just type 'sigverif' at the command prompt.
o systeminfo (XP only)
Basic system configuration information, such as the system type, the processor type,
time zone, virtual memory settings, system uptime, and much more. This program is
great for creating an inventory of computers on your network.
o sysedit (XP/2000)
System Configuration File Editor. An old tool that was very handy for the Windows 9X
days. msconfig is what you want to use now.
o tasklist (XP pro only)
Tasklist is the command console equivalent to the task manager in windows. It is a must
have when fighting scumware and viruses. Try the command:
tasklist /svc
to view the memory resources your services take up.
o taskkill (XP only)
Taskkill contains the rest of the task manager functionality. It allows you to kill those
unneeded or locked up applications.
o tree (XP & 2000)
An amazing experience everyone should try! This command will provide a 'family tree'
style display of the drive/folder you specify.
o WMIC (XP & 2000)
Windows Management Instrumentation Command tool. This allows you to pull an
amazing amount of low-level system information from a command line scripting interface.
Windows Shortcut Keys
By Joshua Erdman & Travis Hasson
Digital Foundation, inc.

Let's face it, using the mouse for commands is SLOW. With these shortcut keys, you will
be the most keyboard efficient user in the office.

o Windows-M
Minimizes all windows
o Windows-E
Opens File Explorer
o Windows-F
Find Files
o Windows-R
Opens The Run Dialog Box
o Windows-L
Instantly Locks your Computer
o CTRL-Esc
For those poor souls that do not have the a Windows Key on their keyboard, this
combination will open the start menu.
o CTRL-Shift-ESC
If you love Task Manager as much as we do, you will lvoe this quick key.
o Windows-Pause
Opens System Properties Dialog Box.
o Alt-Tab
Switch between running applications
o Alt-Enter
Open properties of the selected item
Windows Server and MS Exchange interview questions
Windows, Networking interview questions

1. What is DHCP? How we configure DHCP?


2. What are the ways to configure DNS & Zones?
3. What are the types of backup? Explain each?
4. What are Levels of RAID 0, 1, 5? Which one is better & why?
5. What are FMSO Roles? List them.
6. Describe the lease process of the DHCP server.
7. Disaster Recovery Plan?
8. What is scope & super scope?
9. Differences between Win 2000 Server & Advanced Server?
10. Logical Diagram of Active Directory? What is the difference between child domain
& additional domain server?
11. FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers?
12. What is Kerberos? Which version is currently used by Windows? How does
Kerberos work?

Microsoft Exchange Server interview questions

1. Distribution List?
2. GAL, Routing Group, Stm files, Eseutil & ininteg - what are they used for?
3. What is MIME & MAPI?
4. List the services of Exchange Server 2000?
5. How would you recover Exchange server when the log file is corrupted?
1. boot process in windows nt/xp/2000/2003
2. how do you configure memory dump if c:,d:,e: & paging file is configured so
and so way?
3. backups ? which is better, why and which to use when?
4. disaster recovery plan?
5. DHCP lease process
6. DNS zones, chronicle records what are they?
7. DHCP relay agent where to place it?
8. what is active directory compared to SAM?
9. what is GC? how many required for A Tree?
10. what is forest?
11. Group policies?
12. FSMO Roles?

Shri said,

I haved asked following question about Active directory 2000.

Can I changed password if my machince’s connectivity to DC who holds PDC


emulator role has been fails?

Vipin Bansal said,

Exchange 2000 Server Standard Edition limits the database size to 16 gigabytes.

Mohamed Azlan said,

What is the diffence between SD-RAM and DD-RAM ?

shaik said,

can i change my Dc ip(dns,pref dns,gateway) while dc is working.


and can i give another ip.

(what happend if i give that ip and what happend about the replication of ther dc
when i am in suspend mode) ?

mohd.sameer said,

i have been asked if there is set of 30 harddisk configured for raid 5 if two
harddisk failed what about data

Tech said,
i have been asked if there is set of 30 harddisk configured for raid 5 if two
harddisk failed what about data

Tech Interviews comment by mohd.sameer

Raj Narayan said,

Hi,
Can anybody give me the answer of the mention questions.

1.How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
2.How to remove the $sharing through G.P. in 1000 PCs.
3.In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how
much space do i have for utilise.
4.How Can i Resolve the Svr name through Nslookup.

Thanks & Regards,


Raj Narayan

Debabrata Swain said,

What is difference between scope and superscope ?

Aarif Shaikh said,

Q) Can I changed password if my machince’s connectivity to DC who holds PDC


emulator role has been fails?
A) No You cant the password.

Q) i have been asked if there is set of 30 harddisk configured for raid 5 if two
harddisk failed what about data
A) It depends how u had configured ur RAID its only Raid5 or with with spare if
its only raid 5 then in raid5 if ur 2 nos of HDD goes then ur raid is gone.

Q) How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the
batch file through GP to all the pcs so the same should take affect after restarting
the pc.

Q) In Raid 5,Suppose i have 5 HDD of 10-10 GB, After configuring the Raid how
much space do i have for utilise.
A) -1 out of the total (eg- if u r using 5 u will get only 4 because 1 goes for
parity).
Q) How Can i Resolve the Svr name through Nslookup
A) what exactly u want to do, nslookup command will let u know through which
server u r getting routed, (eg- c:\nslookup then u will get ur domain name to
which u r getting routed. and if u want to get the name of the pc/server with the ip
address then u have to give the command c:\nbtstat -a ip xx-xx-xx-xx)

bart said,

How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the
batch file through GP to all the pcs so the same should take affect after restarting
the pc.

the answer to the above question is incorrect.

you cannot deploy a batch file using group policy.

you can only publish or assign msi packages or Zap files. They are the only two
valid file formats allowable when using “intellimirror”. in active directory.

Rehamn Shaikh said,

What are FMSO Roles? List them


ANS:Fsmo roles are server roles in a Forest
There are five types of FSMO roles
1-Scheema master
2-Domain naming master
3-Rid master
4-PDC Emullator
5-Infrastructure master

Imran Khan said,

What is Kerberos? Which version is currently used by Windows? How does


Kerberos work?

vamsi said,

what is the difference between 2k and 2k3?

what is the difference between dns and wins?

what is sysprep?

what is netlogon?
akshaya said,

how many types of server?


(2) what is hotfrix.
(3)what is the difrences btwen 2k , 2k3 and xp?
(4)how many types DNS
(5)hOW MANY TYPES NET ADDRES?
(1)WHAT IS T-VOLI.
(7) WHICH PROTOCOL USED FOR SENDING MESSAGE.
(8) TELL ME WHY WE R USEING EXCHANGE SERVER?
(9) WHAT IS THE FUNCTION OF DHCP?
(10) HOW DHCP CONFIGURE?
PLEASE SEND ALL ANS I NEED YOUR HELP .

usha said,

what is hotfrix.

It is hotfix, which microsoft realese whenever there is a bug or for updation of


Operating system.
(3)what is the difrences btwen 2k , 2k3 and xp?
Xp is a client operating system it cannot act as a server, 2k domain name cannot
be renamed, no shadow copying, 2k3 domain name can be renamed, shadow
copying is possible
(4)how many types DNS
I think there are about 7 types…
(1)WHAT IS T-VOLI.
Tivoli is montiroing tool
(7) WHICH PROTOCOL USED FOR SENDING MESSAGE.
SNMP
(9) WHAT IS THE FUNCTION OF DHCP?
for providing ip address dynamically

Varadarajam said,

*** What is the difference between Win2k Server and Win2k3?

1. We can’t rename domain in Win2k,u can rename in Win2k3

2. IIS 5.0 in Win2k and IIS 6.0 in Win2k3

3. No Volume Shadow Copying in Win2k, its available in Win2k3

4. Active Directory Federation Systems in Win2k3

Like that some other security features added in Win2k3, main features are above
***WHICH PROTOCOL USED FOR SENDING MAIL?

SMTP — Simple Mail Transfer Protocal is used to Sending mails.

***TELL ME WHY WE R USEING EXCHANGE SERVER?

This is a mail server.. we can use this Server to send mails in Intranet as well as
outside.

*** What is DHCP?

To assign ip addresses automatically.

*** DHCP relay agent where to place it?

DHCP Relay agent u need to place in Software Router.

*** what is forest?

Is a collection of trees. Tree is nothing but collection domains which is having


same name space.
domain contains domain controllers..
forest — Tree — Domain –

Don’t get confused.. Understand carefully.

*** what is GC? how many required for A Tree?

Global Catalog server is a Searchable Index book. With this we can find out any
object in the Active Directory.

Also it works as logon authentication for Group memberships.

We can have each domain controller in domain or only first domain controller in a
domain..

*** DNS zones, chronicle records what are they?

In Windows 2000 there are mainly 3 zones

Standard Primary — zone information writes in Txt file


Standard Secondary — copy of Primary
Active Directory Integrated– Information stores in Active Directory

in win2k3 one more zone is added that is Stub zone


–Stub is like secondary but it contains only copy of SOA records, copy of NS
records, copy of A records for that zone. No copy of MX, SRV records etc.,
With this Stub zone DNS traffic will be low

*** FSMO Roles?

Flexible Single Master Operation Roles

1. Domain Naming Master — Forest Wide Roles


2. Schema Master — Forest Wide Roles
3. RID Master — Domain Wide Roles
4. PDC Emulator — Domain Wide Roles
5. Infrastructure Master — Domain Wide Roles

RID Master — It assigns RID and SID to the newly created object like Users and
computers. If RID master is down (u can create security objects upto RID pools
are avialable in DCs) else u can’t create any object one its down

PDC emulator : It works as a PDC to any NT Bdcs in your environment

It works as Time Server (to maintain same time in your network)

It works to change the passwords, lockout etc.,

Infrastructure Master: This works when we are renaming any group member ship
object this role takes care.

Domain Naming Master : Adding / Changing / Deleting any Domain in a forest it


takes care

Schema Master : It maintains structure of the Active Directory in a forest.

*** FTP, NNTP, SMTP, KERBEROS, DNS, DHCP, POP3 port numbers?

FTP : 20, 21
(20 is for controlling, 21 is Transmitting)

NNTP : 119

SMTP : 25

Kerberos : 88

DNS : 53

DHCP : 67, 68
Pop3 : 110

*** What is Kerberos? Which version is currently used by Windows? How does
Kerberos work?

Kerberos is the user uthentication used in Win2000 and Win2003 Active


Directory servers

Kerberos version in 5.0

Port is : 88

Its more secure and encrypted than NTLM (NT authentication)

Sunit Suri said,

What is the new major feature introduced in Exchange 2003, which was not
included in Exchange 2000?

How can you recover a deleted mail box ?

what is the use of ESUtil.exe ?

What are the port Numbers for pop3, imap, smtp port, smtp over ssl, pop3 over
ssl, imap over ssl ?

Difference between Exchance 2003 and 2007?

what is RPC over Http ?

What is required for using RPC over Https with MS Outlook ?

If you have deleted the user, after you recreated the same user. How you will give
the access of previous mail box ?

What are the prequisite for installation of Exchange Server ?

What is the use of NNTP with exchange ?

If NNTP service get stoped, what features of exchange will be effected ?

Which protocol is used for Public Folder ?

How will take backup of Active Directory ?

What are the content of System State backup ?


there r more…. i’ll update soon…….

Harish P said,

Describe the lease process of the DHCP server.

Ans : A DHCP lease is the amount of time that the DHCP server grants to the
DHCP client permission to use a particular IP address. A typical server allows its
administrator to set the lease time.

Harish P said,

7. Disaster Recovery Plan?

Ans: Deals with the restoration of computer system with all attendent software
and connections to full functionality under a variety of damaging or interfering
external condtions.

shan said,

Which protocol is used for Public Folder ?

ANS: SMTP

What is the use of NNTP with exchange ?

ANS: This protocol is used the news group in exchange.

shan said,

How will take backup of Active Directory ?

Ans: Take the system state data backup. This will backup the active directory
database. Microsoft recomend only Full backup of system state database

What are the content of System State backup ?

The cotents are


Boot fles,system files
Active directory (if its done on DC)
Sysvol folder(if it done on DC)
Cerficate service ( on a CA server)
Cluster database ( on a clsture server)
registry
Performance couter configuration inormation
Coponet services class registration database
shan said,

What are the prequisite for installation of Exchange Server ?

The pre requsite are

IIS
SMTP
WWW service
NNTP
.NET Framework
ASP.NET
Then run Forestprep
The run domainprep

Brian said,

bart said,
How Can i Deploy the Latest Patched in Pc through G.P. wihtout having the
Admin Right in Pc.
A) Create a batch file and place all the patches in the Netlogon, and deploy the
batch file through GP to all the pcs so the same should take affect after restarting
the pc.

the answer to the above question is incorrect.

you cannot deploy a batch file using group policy.

you can only publish or assign msi packages or Zap files. They are the only two
valid file formats allowable when using “intellimirror”. in active directory.

Actually you are incorrect as well. If you create a script and assign it to the
STARTUP script in a GPO applied to the COMPUTER and not the USER, then it
runs as a local administrator on the computer.

RE: What is the difference between windows server 2003...

A) In 2000 we cannot rename domain whereas in 2003 we can rename Domain

B) In 2000 it supports of 8 processors and 64 GB RAM (In 2000 Advance Server) whereas in
2003 supports up to 64 processors and max of 512GB RAM

C)2000 Supports IIS 5.0 and 2003 Supports IIS6.0


D) 2000 doesn’t support Dot net whereas 2003 Supports Microsoft .NET 2.0

E) 2000 has Server and Advance Server editions whereas 2003 has Standard, Enterprise,
Datacentre and Web server Editions.

F) 2000 doesn’t have any 64 bit server operating system whereas 2003 has 64 bit server
operating systems (Windows Server 2003 X64 Std and Enterprise Edition)

G) 2000 has basic concept of DFS (Distributed File systems) with defined roots whereas 2003
has Enhanced DFS support with multiple roots.

H) In 2000 there is complexality in administering Complex networks whereas 2003 is easy


administration in all & Complex networks

I) In 2000 we can create 1 million users and in 2003 we can create 1 billion users.

J) In 2003 we have concept of Volume shadow copy service which is used to create hard disk
snap shot which is used in Disaster recovery and 2000 doesn’t have this service.

K) In 2000 we don’t have end user policy management, whereas in 2003 we have a End user
policy management which is done in GPMC (Group policy management console).

L) In 2000 we have cross domain trust relation ship and 2003 we have Cross forest trust
relationship.

M) 2000 Supports 4-node clustering and 2003 supports 8-node clustering.

N) 2003 has High HCL Support (Hardware Compatibility List) issued by Microsoft

O) Code name of 2000 is Win NT 5.0 and Code name of 2003 is Win NT 5.1

P) 2003 has service called ADFS (Active Directory Federation Services) which is used to
communicate between branches with safe authentication.

Q) In 2003 their is improved storage management using service File Server Resource Manager
(FSRM)

R) 2003 has service called Windows Share point Services (It is an integrated portfolio of
collaboration and communication services designed to connect people, information, processes,
and systems both within and beyond the organizational firewall.)

S) 2003 has Improved Print management compared to 2000 server

T) 2003 has telnet sessions available.

U) 2000 supports IPV4 whereas 2003 supports IPV4 and IPV6

Você também pode gostar