Sunday, May 18, 2014

ADDS_ACtive directory domain service windows server 2008 complete full Gorvam_Saddar



Introduction
Gaining an understanding of the Active Directory™ directory service is the first step in understanding how the Windows® 2000 operating system functions and what it can do to help you meet your enterprise goals. This paper looks at Active Directory from the following three perspectives:
  • Store. Active Directory, the Windows 2000 Server directory service, hierarchically stores information about network objects and makes this information available to administrators, users, and applications. The first section of this paper explains what a directory service is, the integration of Active Directory service with the Internet's Domain Name System (DNS), and how Active Directory is actualized when you designate a server as a domain controller1.
  • Structure. Using Active Directory, the network and its objects are organized by constructs such as domains, trees, forests, trust relationships, organizational units (OUs), and sites. The next section in this paper describes the structure and function of these Active Directory components, and how this architecture lets administrators manage the network so that users can accomplish business objectives.
  • Inter-communicate. Because Active Directory is based on standard directory access protocols, it can interoperate with other directory services and can be accessed by third-party applications that follow these protocols. The final section describes how Active Directory can communicate with a wide variety of other technologies.
  •  
  • for full knowledge about ....ADDS

rootkits_investigation_procedures_Gorvam_saddar



Rootkits

What is a rootkit?

          A rootkit is a special variant of a Trojan, a
.k.a. a RAT (Remote Administration Tool).  What separates a rootkit from a regular Trojan is that a rootkit, by definition, occupies Ring 0, also known as root or kernel level, the highest run privilege available, which is where the OS (Operating System) itself runs.  Non-rootkit trojans typically run in Ring 3, or user level, which is where ordinary applications run, though some sources refer to userland trojans as “rootkits” also.  Usually, but not always, a rootkit will actively obfuscate and attempt to hide its presence from the user and any security software present......

Monday, May 12, 2014

MCITP COMPLETE BY GORVAM SADDAR

                                          
MCITP



TOPICS OF MCITP     
WORKGROUP TOPICS

S.R.NO
PRACTICALS
PAGE NO
STATUS
1)     
IP CONFIGRATION
2-23
OK
2)     
REMOTE DESKTOP
24-41
OK
3)     
REMOTE ASSISTANCE
42-54
OK
4)     
OUTLOOK CONFIGRATION


5)     
DHCP SERVER
55-125
OK
6)     
DHCP RESERVATION
126-134
OK
7)     
DHCP RELAY


8)     
DNS MASTER
135-178
OK
9)     
DNS SLAVE


10)                        
FILE SERVER

Ok
11)                        
FILE SHARING

Ok
12)                        
PASSWORD PROTECTING SHARING

Ok
13)                        
DISK QUATA

Ok
14)                        
FOLDER QUATA

Ok
15)                        
FILE SCREANING

Ok
16)                        
DFS (DISTRIBUTED FILE SYSTEM)

Ok
17)                        
PRINT SERVER


18)                        
IIS SERVER WITH HTTP   
179-
OK
19)                        
IIS SERVER WITH HTTPS


20)                        
FTP (FILE TRANSFER PROTOCOL)
205
OK
21)  
FTP DOWNLOADING & UPLOADING USING
THE CMD LINE INTERFACE


Ok
22)                        
TERMINAL SERVER

Ok
23)                        
TERMINAL SERVER GATEWAY

Ok
24)                        
REMOTE DESKTOPS

Ok
25)                        
RDP SHARING ON MULTIPLE SHARING

Ok
26)                        
RRAS

Ok
27)                        
NAT

Ok
28)                        
NAT

Ok
29)                        
VPN (VIRTUAL PRIVATE NETWORK)

Ok
30)                        
ROUTING

Ok
31)                        
IP SECURITY

Ok
32)                        
SIMPLE FIREWALL CONFIGRATION


33)                        
ADVANCE FIREWALL CONFIGRATION


34)                        
WINDOWS BACKUP SERVICE


35)                        
WDS (WINDOWS DEPLOYEMENT SERVICE)


36)                        
INTERNET EXPLORER SECURITY PASSWORD


37)                        
HIDDEN SHARING


38)                        
USER MANAGEMENT


39)                        
GROUP MANAGEMENT


40)                        
LOCAL SECURITY POLICIES


41)                        
DRIVE MAPING


42)                        
HOME FOLDER








DOMAIN  TOPICS

      1)
ADDS TERMS +INTRO+USE


      2)
PDC


      3)
RODC


      4)
ADC


      5)
CDC


      6)
JOINING SYSTEM INTO DOMAIN


      7)
REMOVING SYSTEM FROM DOMAIN


      8)
DOMAIN O U MANAGEMENT


      9)
DOMAIN GROUP MANAGEMENT


   10)
DOMAIN USER MANAGMENT


   11)
DOMAIN LOCAL SECURTIES POLICIES


   12)
GROUP SECURITY POLICIES


   13)
SOFTWARE INTALLING USING GROUP
POLICIES



   14)
FILTERS IN THE GROUP POLICIES


   15)
AD BACK UP IN GRAPHICAL MODE


   16)
AD BACK UP IN CMD MODE


   17)
FSMO POLICIES


   18)
LOCAL PROFILIES


   19)
MADATORY PROFILIES