Follow @passdb on Twitter
Monday, June 30, 2014
Sunday, May 18, 2014
ADDS_ACtive directory domain service windows server 2008 complete full Gorvam_Saddar
Introduction
Gaining an
understanding of the Active Directory™ directory service is the first step in
understanding how the Windows® 2000 operating system functions and what it can
do to help you meet your enterprise goals. This paper looks at Active Directory
from the following three perspectives:
- Store. Active Directory, the Windows 2000 Server directory service, hierarchically stores information about network objects and makes this information available to administrators, users, and applications. The first section of this paper explains what a directory service is, the integration of Active Directory service with the Internet's Domain Name System (DNS), and how Active Directory is actualized when you designate a server as a domain controller1.
- Structure. Using Active Directory, the network and its objects are organized by constructs such as domains, trees, forests, trust relationships, organizational units (OUs), and sites. The next section in this paper describes the structure and function of these Active Directory components, and how this architecture lets administrators manage the network so that users can accomplish business objectives.
- Inter-communicate. Because Active Directory is based on standard directory access protocols, it can interoperate with other directory services and can be accessed by third-party applications that follow these protocols. The final section describes how Active Directory can communicate with a wide variety of other technologies.
- for full knowledge about ....ADDS
rootkits_investigation_procedures_Gorvam_saddar
Rootkits
What is a rootkit?
A rootkit is a special variant of a Trojan, a.k.a. a RAT (Remote Administration Tool). What separates a rootkit from a regular Trojan is that a rootkit, by definition, occupies Ring 0, also known as root or kernel level, the highest run privilege available, which is where the OS (Operating System) itself runs. Non-rootkit trojans typically run in Ring 3, or user level, which is where ordinary applications run, though some sources refer to userland trojans as “rootkits” also. Usually, but not always, a rootkit will actively obfuscate and attempt to hide its presence from the user and any security software present......
What is a rootkit?
A rootkit is a special variant of a Trojan, a.k.a. a RAT (Remote Administration Tool). What separates a rootkit from a regular Trojan is that a rootkit, by definition, occupies Ring 0, also known as root or kernel level, the highest run privilege available, which is where the OS (Operating System) itself runs. Non-rootkit trojans typically run in Ring 3, or user level, which is where ordinary applications run, though some sources refer to userland trojans as “rootkits” also. Usually, but not always, a rootkit will actively obfuscate and attempt to hide its presence from the user and any security software present......
Monday, May 12, 2014
MCITP COMPLETE BY GORVAM SADDAR
MCITP
TOPICS
OF MCITP
WORKGROUP TOPICS
S.R.NO
|
PRACTICALS
|
PAGE NO
|
STATUS
|
|
1)
|
IP CONFIGRATION
|
2-23
|
OK
|
|
2)
|
REMOTE DESKTOP
|
24-41
|
OK
|
|
3)
|
REMOTE ASSISTANCE
|
42-54
|
OK
|
|
4)
|
OUTLOOK CONFIGRATION
|
|||
5)
|
DHCP SERVER
|
55-125
|
OK
|
|
6)
|
DHCP RESERVATION
|
126-134
|
OK
|
|
7)
|
DHCP RELAY
|
|||
8)
|
DNS MASTER
|
135-178
|
OK
|
|
9)
|
DNS SLAVE
|
|||
10)
|
FILE SERVER
|
Ok
|
||
11)
|
FILE SHARING
|
Ok
|
||
12)
|
PASSWORD PROTECTING
SHARING
|
Ok
|
||
13)
|
DISK QUATA
|
Ok
|
||
14)
|
FOLDER QUATA
|
Ok
|
||
15)
|
FILE SCREANING
|
Ok
|
||
16)
|
DFS (DISTRIBUTED FILE
SYSTEM)
|
Ok
|
||
17)
|
PRINT SERVER
|
|||
18)
|
IIS SERVER WITH HTTP
|
179-
|
OK
|
|
19)
|
IIS SERVER WITH HTTPS
|
|||
20)
|
FTP (FILE TRANSFER
PROTOCOL)
|
205
|
OK
|
|
21)
|
FTP DOWNLOADING &
UPLOADING USING
THE CMD LINE INTERFACE
|
Ok
|
||
22)
|
TERMINAL SERVER
|
Ok
|
||
23)
|
TERMINAL SERVER GATEWAY
|
Ok
|
||
24)
|
REMOTE DESKTOPS
|
Ok
|
||
25)
|
RDP SHARING ON MULTIPLE
SHARING
|
Ok
|
||
26)
|
RRAS
|
Ok
|
||
27)
|
NAT
|
Ok
|
||
28)
|
NAT
|
Ok
|
||
29)
|
VPN (VIRTUAL PRIVATE
NETWORK)
|
Ok
|
||
30)
|
ROUTING
|
Ok
|
||
31)
|
IP SECURITY
|
Ok
|
||
32)
|
SIMPLE FIREWALL
CONFIGRATION
|
|||
33)
|
ADVANCE FIREWALL
CONFIGRATION
|
|||
34)
|
WINDOWS BACKUP SERVICE
|
|||
35)
|
WDS (WINDOWS DEPLOYEMENT
SERVICE)
|
|||
36)
|
INTERNET EXPLORER
SECURITY PASSWORD
|
|||
37)
|
HIDDEN SHARING
|
|||
38)
|
USER MANAGEMENT
|
|||
39)
|
GROUP MANAGEMENT
|
|||
40)
|
LOCAL SECURITY POLICIES
|
|||
41)
|
DRIVE MAPING
|
|||
42)
|
HOME FOLDER
|
|||
DOMAIN TOPICS
1)
|
ADDS TERMS +INTRO+USE
|
|||
2)
|
PDC
|
|||
3)
|
RODC
|
|||
4)
|
ADC
|
|||
5)
|
CDC
|
|||
6)
|
JOINING SYSTEM INTO
DOMAIN
|
|||
7)
|
REMOVING SYSTEM FROM
DOMAIN
|
|||
8)
|
DOMAIN O U MANAGEMENT
|
|||
9)
|
DOMAIN GROUP MANAGEMENT
|
|||
10)
|
DOMAIN USER MANAGMENT
|
|||
11)
|
DOMAIN LOCAL SECURTIES
POLICIES
|
|||
12)
|
GROUP SECURITY POLICIES
|
|||
13)
|
SOFTWARE INTALLING USING
GROUP
POLICIES
|
|||
14)
|
FILTERS IN THE GROUP
POLICIES
|
|||
15)
|
AD BACK UP IN GRAPHICAL
MODE
|
|||
16)
|
AD BACK UP IN CMD MODE
|
|||
17)
|
FSMO POLICIES
|
|||
18)
|
LOCAL PROFILIES
|
|||
19)
|
MADATORY PROFILIES
|
|||
Subscribe to:
Posts (Atom)