+ All Categories
Home > Documents > Www Pcrepairnorthshore Com (11)

Www Pcrepairnorthshore Com (11)

Date post: 24-Feb-2018
Category:
Upload: aravind-bhombore
View: 214 times
Download: 0 times
Share this document with a friend

of 10

Transcript
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    1/10

    About Tina Follow Tina Tina FAVS Contact Home General Insurance (Property & Casualty)

    TUESDAY, APRIL 24, 2012

    Quick Check Facts for Windows Server 2008, Active Directory Network Infrastructure

    IPv6

    IPv6 Addressing

    IPv6 addressspace is 128 bits (16 bytes)

    Large address space. Divided along 16-bit boundaries, converted to 4 digit hexadecimal

    numbers, separated by colons - known as colon hexadecimal .

    Simpler host configuration. IPv6 supports dynamic client configuration by using DHCPv6 and IPv6

    also enables routers to configure hosts dynamically.

    Improved routing efficiency. Reduces how many routes the Internet must process by supporting

    hierarchical routing.

    Built-in security. IPv6 ensures all hosts encrypt data while in transit by including native IPSec

    support.

    IPv6 address types

    Unicast. Packets delivered to a unicast address are delivered to a single interface, one-

    to-one communication

    Multicast.Packets are delivered to multiple interfaces, one-to-many. One-to-many

    communication between computers that are defined as using the same multicast address.

    Multicast addresses have the first 8 bits set to 1111 1111 or FF

    Anycast.Identifies multiple interfaces, but delivered to a single interface, the closest

    one. Used for locating services or the nearest router.

    Global Unicastaddress

    Equivalent to IPv4 public addresses

    Identified by the FP (Format Prefix) of 001 (globally routable and reachable on the IPv6

    Internet

    The scope of a global unicast address is the entire IPv6 Internet

    The address prefix of a currently assigned global addressis 2000::/3

    The combination of the first 3 high-order fixed bits and the 45-bit Global Routing Prefix

    is a 48-bit prefix assigned to an individual site

    The next 16 bits are the Subnet ID

    The Interface ID field is the next 64-bits

    Link-local Unicastaddress

    Used by nodes to communicate on the local network segment and for neighbor discovery

    processes

    Identified by the FP of 1111 1110 10

    Link-localaddresses are equivalent to APIPA IPv4 addresses and always automatically

    configured

    Link-local addresses always begin with FE80

    The prefix for link-localaddresses is always FE80::/64

    An IPv6 router never forwards a link-local address beyond the link

    Site-localUnicastaddress

    Equivalent to the IPv4 private site addressing

    Identified by the FP of 1111 1110 11

    The scope of the site-local address is the site/organization

    The site-local address must be assigned through stateless or stateful address

    configuration

    The first 10 bits of a site-local address are always fixed, FEC0::/10

    The next 54 bits is a subnet identifier (Subnet ID field)

    After the 54-bit Subnet ID field, is the 64-bit Interface ID field that identifies a

    specific interface in the subnet

    Special IPv6 Unicastaddress

    Unspecified address 0.0.0.0.0.0.0.0 or :: indicates the absence of an address

    Loopback address 0.0.0.0.0.0.0.1 or ::1 identifies a loopback interface, enables a node

    to send packets to itself; equivalent to the IPv4 loopback address of 127.0.0.1

    Compatibility Unicastaddress

    To aid in the migration of IPv4 to IPv6 and the coexistence of both types

    To enable ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)

    IPv6 transition mechanism to transmit IPv6 packets on top of an IPv4 network

    Disabled by default in Server 2008

    netsh interface isatap set state enabled

    IPv4

    IPv4 address space is 32-bit binary (Base 2)

    Divided along 8-bit boundaries called octets, converted to decimal,

    separated by periods called a dotted decimal notation

    Serving the North Shore of

    Long Island 516-313-1077

    CALL TINA AT PCREPAIRNORTHSHORE

    Search

    1

    Computer Repair

    SHARE

    Configure and

    Manage

    DistributedFile System

    (DFS)

    Internet

    Explorer

    encountered aproblem and

    needs to close

    Tips on How to

    Configure DNSZones

    Windows Hang

    and Crash DumpAnalysis

    Webcast Review

    About Routing

    and Remote

    Access inServer 2008

    Quick CheckFacts for

    Microsoft

    Windows Server

    2008 Active

    Directory,

    Configuring

    SQL Subqueries

    Need a Windows XP tuneup?

    The Case of

    theUnexplained

    2010SysInternals

    Review

    SQL Table

    Joins

    MOST POPULAR POSTS

    Access-Based Enumeration

    (2)

    Active Directory(31)

    ActiveX(3)

    Address Labels(1)

    AOL(1)

    Backup(4)

    Beep codes(1)

    BitLocker(3)

    Blogger(4)

    cabling(7)

    Certificates(6)

    CMAK(1)

    BROWSE TINA'S BLOG BY CATEGORY

    1 More Next Blog Create Blog Sign In

    converted by Web2PDFConvert.com

    http://technet.microsoft.com/en-us/library/cc778502(v=ws.10).aspxhttp://www.pcrepairnorthshore.com/2011/03/case-of-unexplained-2010-sysinternals.htmlhttp://www.pcrepairnorthshore.com/2011/03/case-of-unexplained-2010-sysinternals.htmlhttp://www.pcrepairnorthshore.com/search/label/Address%20Labelshttp://www.pcrepairnorthshore.com/2011/09/quick-check-facts-for-microsoft-windows.htmlhttp://technet.microsoft.com/en-us/library/cc759104(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc781068(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc759208(v=ws.10).aspxhttp://www.pcrepairnorthshore.com/http://www.pcrepairnorthshore.com/p/general-insurance-property-casualty.htmlhttp://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://www.pcrepairnorthshore.com/search/label/CMAKhttp://www.pcrepairnorthshore.com/search/label/Certificateshttp://www.pcrepairnorthshore.com/search/label/cablinghttp://www.pcrepairnorthshore.com/search/label/Bloggerhttp://www.pcrepairnorthshore.com/search/label/BitLockerhttp://www.pcrepairnorthshore.com/search/label/Beep%20codeshttp://www.pcrepairnorthshore.com/search/label/Backuphttp://www.pcrepairnorthshore.com/search/label/AOLhttp://www.pcrepairnorthshore.com/search/label/Address%20Labelshttp://www.pcrepairnorthshore.com/search/label/ActiveXhttp://www.pcrepairnorthshore.com/search/label/Active%20Directoryhttp://www.pcrepairnorthshore.com/search/label/Access-Based%20Enumerationhttp://www.pcrepairnorthshore.com/2013/03/sql-table-joins.htmlhttp://www.pcrepairnorthshore.com/2013/03/sql-table-joins.htmlhttp://www.pcrepairnorthshore.com/2011/03/case-of-unexplained-2010-sysinternals.htmlhttp://www.pcrepairnorthshore.com/2011/03/case-of-unexplained-2010-sysinternals.htmlhttp://www.pcrepairnorthshore.com/2009/08/need-windows-xp-tune-up.htmlhttp://www.pcrepairnorthshore.com/2013/02/sql-subqueries.htmlhttp://www.pcrepairnorthshore.com/2013/02/sql-subqueries.htmlhttp://www.pcrepairnorthshore.com/2011/09/quick-check-facts-for-microsoft-windows.htmlhttp://www.pcrepairnorthshore.com/2011/09/quick-check-facts-for-microsoft-windows.htmlhttp://www.pcrepairnorthshore.com/2011/12/about-routing-and-remote-access-in.htmlhttp://www.pcrepairnorthshore.com/2011/12/about-routing-and-remote-access-in.htmlhttp://www.pcrepairnorthshore.com/2011/02/windows-hang-and-crash-dump-analysis.htmlhttp://www.pcrepairnorthshore.com/2011/02/windows-hang-and-crash-dump-analysis.htmlhttp://www.pcrepairnorthshore.com/2011/10/tips-on-how-to-configure-dns-zones-dns.htmlhttp://www.pcrepairnorthshore.com/2011/10/tips-on-how-to-configure-dns-zones-dns.htmlhttp://www.pcrepairnorthshore.com/2013/01/internet-explorer-encountered-problem.htmlhttp://www.pcrepairnorthshore.com/2013/01/internet-explorer-encountered-problem.htmlhttp://www.pcrepairnorthshore.com/2012/01/configure-and-manage-distributed-file.htmlhttp://www.pcrepairnorthshore.com/2012/01/configure-and-manage-distributed-file.htmlhttp://www.thumbtack.com/Computer-Repair-Sea-Cliff-NY/service/324417http://www.pcrepairnorthshore.com/http://technet.microsoft.com/en-us/library/cc778502(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc759104(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc781068(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/cc759208(v=ws.10).aspxhttp://technet.microsoft.com/en-us/library/dd392266(v=ws.10).aspxhttp://3.bp.blogspot.com/-bmiJ7eOAG1w/T5YhzehKwBI/AAAAAAAABB0/8aHCznsjTXg/s1600/Windows+Server+Active+Directory.jpghttp://www.printfriendly.com/http://www.pcrepairnorthshore.com/p/general-insurance-property-casualty.htmlhttp://www.pcrepairnorthshore.com/http://www.pcrepairnorthshore.com/p/contact-us.htmlhttp://www.pcrepairnorthshore.com/p/tina-favs.htmlhttp://www.pcrepairnorthshore.com/p/follow-tina-on-facebook.htmlhttp://www.pcrepairnorthshore.com/p/about-me.html
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    2/10

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://www.pcrepairnorthshore.com/search/label/System%20Restorehttp://www.pcrepairnorthshore.com/search/label/Sysinternalshttp://www.pcrepairnorthshore.com/search/label/Startup%20problemshttp://www.pcrepairnorthshore.com/search/label/Standby%20modehttp://www.pcrepairnorthshore.com/search/label/SQLhttp://www.pcrepairnorthshore.com/search/label/SMBhttp://www.pcrepairnorthshore.com/search/label/Slow%20Startuphttp://www.pcrepairnorthshore.com/search/label/Shutdown%20Problemshttp://www.pcrepairnorthshore.com/search/label/Shadow%20Copyhttp://www.pcrepairnorthshore.com/search/label/Securityhttp://www.pcrepairnorthshore.com/search/label/Screensaverhttp://www.pcrepairnorthshore.com/search/label/safe%20modehttp://www.pcrepairnorthshore.com/search/label/Roaming%20profileshttp://www.pcrepairnorthshore.com/search/label/Restorehttp://www.pcrepairnorthshore.com/search/label/Remote%20Desktophttp://www.pcrepairnorthshore.com/search/label/Remote%20Assistancehttp://www.pcrepairnorthshore.com/search/label/Remote%20Accesshttp://www.pcrepairnorthshore.com/search/label/Registerhttp://www.pcrepairnorthshore.com/search/label/Recovery%20Consolehttp://www.pcrepairnorthshore.com/search/label/Ready%20Boosthttp://www.pcrepairnorthshore.com/search/label/RADIUShttp://www.pcrepairnorthshore.com/search/label/Printerhttp://www.pcrepairnorthshore.com/search/label/PowerShellhttp://www.pcrepairnorthshore.com/search/label/power%20optionshttp://www.pcrepairnorthshore.com/search/label/Permissionshttp://www.pcrepairnorthshore.com/search/label/Performancehttp://www.pcrepairnorthshore.com/search/label/PC%20Repair%20North%20Shorehttp://www.pcrepairnorthshore.com/search/label/Passwordhttp://www.pcrepairnorthshore.com/search/label/Parental%20Controlshttp://www.pcrepairnorthshore.com/search/label/Offlinehttp://www.pcrepairnorthshore.com/search/label/NTFShttp://www.pcrepairnorthshore.com/search/label/NPShttp://www.pcrepairnorthshore.com/search/label/Network%20Policyhttp://www.pcrepairnorthshore.com/search/label/Network%20Monitorhttp://www.pcrepairnorthshore.com/search/label/Network%20Access%20Serviceshttp://www.pcrepairnorthshore.com/search/label/Networkhttp://www.pcrepairnorthshore.com/search/label/NAPhttp://www.pcrepairnorthshore.com/search/label/msconfighttp://www.pcrepairnorthshore.com/search/label/MS%20Accesshttp://www.pcrepairnorthshore.com/search/label/Mousehttp://www.pcrepairnorthshore.com/search/label/Memoryhttp://www.pcrepairnorthshore.com/search/label/Meeting%20Spacehttp://www.pcrepairnorthshore.com/search/label/Machttp://www.pcrepairnorthshore.com/search/label/Logonhttp://www.pcrepairnorthshore.com/search/label/Lenovohttp://www.pcrepairnorthshore.com/search/label/LCDhttp://www.pcrepairnorthshore.com/search/label/IPv6%20Subnettinghttp://www.pcrepairnorthshore.com/search/label/IPv6http://www.pcrepairnorthshore.com/search/label/IPv4http://www.pcrepairnorthshore.com/search/label/IPSechttp://www.pcrepairnorthshore.com/search/label/Iphonehttp://www.pcrepairnorthshore.com/search/label/Internet%20Optionshttp://www.pcrepairnorthshore.com/search/label/Internet%20Favoriteshttp://www.pcrepairnorthshore.com/search/label/Internet%20Explorerhttp://www.pcrepairnorthshore.com/search/label/Installationhttp://www.pcrepairnorthshore.com/search/label/Hardwarehttp://www.pcrepairnorthshore.com/search/label/Group%20Policyhttp://www.pcrepairnorthshore.com/search/label/Googlehttp://www.pcrepairnorthshore.com/search/label/FSRMhttp://www.pcrepairnorthshore.com/search/label/freewarehttp://www.pcrepairnorthshore.com/search/label/FireWirehttp://www.pcrepairnorthshore.com/search/label/Firewallhttp://www.pcrepairnorthshore.com/search/label/File%20Signature%20Verificationhttp://www.pcrepairnorthshore.com/search/label/File%20Recoveryhttp://www.pcrepairnorthshore.com/search/label/File%20and%20Folder%20Issueshttp://www.pcrepairnorthshore.com/search/label/Faxhttp://www.pcrepairnorthshore.com/search/label/Exam%2070-642http://www.pcrepairnorthshore.com/search/label/Exam%2070-640http://www.pcrepairnorthshore.com/search/label/Ethernethttp://www.pcrepairnorthshore.com/search/label/Elevation%20prompthttp://www.pcrepairnorthshore.com/search/label/EFShttp://www.pcrepairnorthshore.com/search/label/Drivershttp://www.pcrepairnorthshore.com/search/label/DNShttp://www.pcrepairnorthshore.com/search/label/Displayhttp://www.pcrepairnorthshore.com/search/label/DirectAccesshttp://www.pcrepairnorthshore.com/search/label/DHCPhttp://www.pcrepairnorthshore.com/search/label/DFShttp://www.pcrepairnorthshore.com/search/label/Device%20Managerhttp://www.pcrepairnorthshore.com/search/label/DBMShttp://www.pcrepairnorthshore.com/search/label/databasehttp://www.pcrepairnorthshore.com/search/label/Connection%20Request%20Policyhttp://www.pcrepairnorthshore.com/search/label/command%20linehttp://1.bp.blogspot.com/-7KDEwvKrYQ4/T5YjudQBdJI/AAAAAAAABCE/7d4EhxcFnUM/s1600/Remote+Desktop.jpghttp://3.bp.blogspot.com/-5nDlNYkmUpc/T5YlJyD8dJI/AAAAAAAABCM/HC__3OEX1ds/s1600/network+pic.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    3/10

    deleteto delete a route or several routes

    print to view routing tables

    -p to make persistent entries in the routing table by adding a static route directly to

    the registry

    route command parameters

    route[-f] [-p] [Command[Destination] [maskNetmask] [Gateway] [metricMetric]]

    [ifInterface]]

    Destinationis used to configure the network destination for a route

    maskNetmaskis used to configure the subnet mask

    Gatewayis used to configure the next hop address

    metricMetricis used to configure an integer cost metric for a route

    if Interfaceis used to configure the interface index on the interface for which the

    destination network can be reached

    Windows Firewall with Advanced Security

    Manage firewall and IPSec configuration settings

    Netsh advfirewall

    Windows Firewall with Advanced SecurityGroup Policy settings using GPMC

    Authenticate IPSec with domain user accounts using Kerberos

    Windows Vista or later OS

    Windows Server 2008 and later servers

    IPSec can be used for both

    Authentication and encryption

    Authentication bypass rule

    Lets traffic protected by IPSec bypass Windows firewall regardless of incoming rules.

    UDP ports 67 and 2535

    Support remote administration for DHCP servers

    Should be added to the Windows Firewall exceptions list on the target server

    Inbound rules

    Explicitly allow or block traffic directed to the computer from other hosts that match

    the criteria of the rule.

    Outbound rules

    Explicitly allow or block traffic originating from the computer if it matches the

    criteria of the rule.

    netsh firewall show state

    Displays the current firewall configuration

    DNS server

    Recursion

    By default, DNS performs recursion on behalf of its DNS clients and

    servers that have forwarded DNS client queries to it. DNS servers

    query other DNS servers for the requesting client to fully resolve

    the name and sends an answer back to the client.

    Attackers can use recursion to deny the DNS Server service. Unless

    recursion is needed, you should disable it. If you disable

    recursion, the DNS server will only resolve names for which it is authoritative.

    Conditional forwarder

    A DNS server used to forward DNS queries according to the DNS domain name in the query.

    Root hints

    Used to provide a list of names and addresses of DNS servers that are authoritative for

    the root zone of the DNS namespace. Root hints can be used for resolving external

    names that cannot be resolved from a DNS server or by sending the request to a forwarder.

    Root hints are contained in a file named CACHE.DNS that is located in the

    \\Windows\System32\DNS folder. It is a text listing of IP addresses with the matching

    root DNS servers.

    Stub zone

    A copy of a zone that contains only the resource records that are necessary to identify

    the authoritative DNS servers for the zone. A Stub zone consist of:

    Start of Authority (SOA) resource record, Name Server (NS) resource records, andglue A resource records for the zone.

    IP address of one or more master servers that can be used to update the zone.

    Stub zones help reduce the amount of DNS traffic on your network.

    dnscmd /clearcache

    Command to clear the DNS server cache. Name resolution problems can occur when a DNS

    server has cached a record that has changed. Clearing the cache removes the stale

    records.

    dnscmd /resetlistenaddresses

    Command to set the IP address to service DNS requests.

    Example: dnscmd dns1 resetlistenaddresses 192.168.10.1

    netsh interface reset

    Command to reset an interface's configuration.

    netsh interface delete

    Command to delete an interface.

    start /w ocsetup DNS-Server-Core-Role

    Install the DNS Server Role in Server Core. Using the /w prevents the command prompt from

    returning until the installation is complete.

    oclist

    To discover the available server roles. It also lists the server roles and features

    currently installed.

    Task Manager(3)

    TCPIP(22)

    UAC(1)

    USB(6)

    virus(7)

    Vista(20)

    VMware(1)

    VPN(4)

    WCZ(1)

    Windows 7(9)

    Windows 98(3)

    Windows Aero(2)

    Windows ME(2)

    Windows Server 2008(33)

    Windows Sidebar(1)

    Windows version(3)

    Windows Virtual PC(1)

    Windows XP(28)

    WINS(2)

    wireless(13)

    WSUS(2)

    Followers (12)

    Follow this blog

    FOLLOW TINA'S BLOG

    DAISY

    DANNY

    12LikeLike

    DANNY AND DAISY

    NEW WORLD TRADE CENTER

    TINA'S BLOG ARCHIVE

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://networkedblogs.com/blog/pcrepairnorthshore/?ahash=bc234407c04548637b3f284119a69d88http://networkedblogs.com/http://www.pcrepairnorthshore.com/search/label/WSUShttp://www.pcrepairnorthshore.com/search/label/wirelesshttp://www.pcrepairnorthshore.com/search/label/WINShttp://www.pcrepairnorthshore.com/search/label/Windows%20XPhttp://www.pcrepairnorthshore.com/search/label/Windows%20Virtual%20PChttp://www.pcrepairnorthshore.com/search/label/Windows%20versionhttp://www.pcrepairnorthshore.com/search/label/Windows%20Sidebarhttp://www.pcrepairnorthshore.com/search/label/Windows%20Server%202008http://www.pcrepairnorthshore.com/search/label/Windows%20MEhttp://www.pcrepairnorthshore.com/search/label/Windows%20Aerohttp://www.pcrepairnorthshore.com/search/label/Windows%2098http://www.pcrepairnorthshore.com/search/label/Windows%207http://www.pcrepairnorthshore.com/search/label/WCZhttp://www.pcrepairnorthshore.com/search/label/VPNhttp://www.pcrepairnorthshore.com/search/label/VMwarehttp://www.pcrepairnorthshore.com/search/label/Vistahttp://www.pcrepairnorthshore.com/search/label/virushttp://www.pcrepairnorthshore.com/search/label/USBhttp://www.pcrepairnorthshore.com/search/label/UAChttp://www.pcrepairnorthshore.com/search/label/TCPIPhttp://www.pcrepairnorthshore.com/search/label/Task%20Managerhttp://3.bp.blogspot.com/-LO6BWj2dq9M/T5YlthI5UZI/AAAAAAAABCU/sbAUZU3Hd-I/s1600/server.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    4/10

    DNS zones

    GlobalNames zone

    Provides single-name resolution for networks withouta WINS server.

    Global Names zone resolution must have all authoritative DNS

    servers running Windows Server 2008 or later.

    Global Names zone must be integrated with Active Directory for

    deployment across multiple domains and forests.

    Active Directory Integrated zones

    Provide name resolutioneven when a WAN link is temporarily unavailable between domains

    if there is an authoritative DNS server installed on a domain controller.

    Stub zone

    A copy of a zone that contains only the resource records that are necessary to identify

    the authoritative DNS servers for the zone. This enables the DNS server hosting the

    parent zone to be aware of the authoritative servers for the child zones. A stub zone is

    kind of like a secondary zone because it obtains its resource records from other name

    servers, and a stub zone is read-only like a secondary zone. However, stub zones contain

    only three types of resource records: a copy of the SOA record for the zone, copies of NS

    records for all name servers that are authoritative for the zone, and copies of A records

    for all the name servers authoritative for the zone.

    Secondary zone

    A read-only copy of a zonethat was copied from the master server during zone transfer.

    Automatic scavenging

    Removes outdated DNS records that can accumulate in the zone over time. Disabled by

    default, must be enabled for a zone. DNS records that are manually created by an

    Administrator are NEVER scavenged.

    dnscmd

    Used to view and change the properties of DNS servers, zones, resource records, and zone

    types.

    Three zone types:

    Primary

    Secondary

    Stub

    Expiry field of the SOA record

    Determines how long the secondary zone server can service records without being able to

    contact the primary zone server for an update.

    DNS Records

    AAAA

    IPv6 resource record used to resolve FQDN host names to IPv6

    addresses.

    CNAME

    Sometimes called canonical name, the resource record enables you to

    register a different FQDN for a computer already registered with a

    host A record.

    HINFO (host information) record

    Contains recorded information about a host's CPU type and operating system.

    SRV records

    Used to locate computers running specific services.

    PTRrecords

    Used for reverse lookups.

    WKS(Well Known Service)record

    Identifies a server that hosts a well-known service, such as the FTP service.

    Includes the host, the IP address of the host, whether the protocol is TCP or UDP, and a

    list of services the host provides.

    DNS Replication

    Background zone loading in Windows Server 2008 R2

    Allows DNS to respond to queries more quickly because zone data is loaded in the

    background from AD DS while the DNS server restarts. Enables the server to respond to

    client requests by requesting data from other available zones.

    dnscmd ServerName /zoneupdatefromds ZoneName

    Use to manually update Active Directory Integrated zones.

    dnscmd /zonerefresh

    Forces a refresh of the secondary zone from the master zone.

    The minimum amount of time before a record can be removed is equal to the refresh

    interval plus the no-refresh interval

    RODC

    Read-only copy of a domain controller.

    The DNS Server Role provides primary read-only zones on RODCs.

    RODCs are good for branch offices that are not physically secure enough for a domain

    controller.

    2013 (9)

    2012 (18)

    12/30/12 - 1/6/13 (1)

    12/2/12 - 12/9/12 (1)

    11/11/12 - 11/18/12 (1)

    10/14/12 - 10/21/12 (1)

    9/9/12 - 9/16/12 (1)

    7/15/12 - 7/22/12 (1)

    6/10/12 - 6/17/12 (1)

    4/22/12 - 4/29/12 (1)

    Quick Check Facts for

    Windows Server 2008,Active ...

    4/1/12 - 4/8/12 (1)

    3/4/12 - 3/11/12 (1)

    2/26/12 - 3/4/12 (1)

    2/19/12 - 2/26/12 (1)

    2/12/12 - 2/19/12 (1)

    2/5/12 - 2/12/12 (1)

    1/22/12 - 1/29/12 (2)

    1/15/12 - 1/22/12 (1)

    1/8/12 - 1/15/12 (1)

    2011 (68)

    2010 (112)

    2009 (20)

    Enter a long URL to make tiny:

    Make TinyURL!

    TINYURL

    SUPPORT WIKIPEDIA

    Subscribe in a reader

    DEER VALLEY, UTAH

    ITALIAN ALPS

    PARK CITY, UTAH

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://feeds.feedburner.com/PcRepairNorthShorehttp://feeds.feedburner.com/PcRepairNorthShorehttp://wikimediafoundation.org/wiki/Support_Wikipedia/enhttp://tinyurl.com/http://www.pcrepairnorthshore.com/search?updated-min=2009-01-01T00:00:00-05:00&updated-max=2010-01-01T00:00:00-05:00&max-results=20http://void%280%29/http://www.pcrepairnorthshore.com/search?updated-min=2010-01-01T00:00:00-05:00&updated-max=2011-01-01T00:00:00-05:00&max-results=50http://void%280%29/http://www.pcrepairnorthshore.com/search?updated-min=2011-01-01T00:00:00-05:00&updated-max=2012-01-01T00:00:00-05:00&max-results=50http://void%280%29/http://www.pcrepairnorthshore.com/2012_01_08_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_01_15_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_01_22_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_02_05_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_02_12_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_02_19_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_02_26_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_03_04_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_04_01_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_04_22_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_06_10_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_07_15_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_09_09_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_10_14_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_11_11_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_12_02_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/2012_12_30_archive.htmlhttp://void%280%29/http://www.pcrepairnorthshore.com/search?updated-min=2012-01-01T00:00:00-05:00&updated-max=2013-01-01T00:00:00-05:00&max-results=18http://void%280%29/http://www.pcrepairnorthshore.com/search?updated-min=2013-01-01T00:00:00-05:00&updated-max=2014-01-01T00:00:00-05:00&max-results=9http://void%280%29/http://3.bp.blogspot.com/-0FzqZgmzUg8/T5YnoXU0GPI/AAAAAAAABCk/BYRfo5fkgP0/s1600/www.jpghttp://1.bp.blogspot.com/-F7Kl0iWdUMM/T5YmUrpv-MI/AAAAAAAABCc/QOSn33SPIdY/s1600/dns+zones.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    5/10

    Name Resolution for client computers

    Primary DNS server

    Should be thephysically nearest domain controller for a client.

    DNS server addresses listbox

    Used to specify the IP address of each DNS server.

    Priority is determined by the order. If the first DNS server is not

    able to respond to a name-resolution request, the next one is used.

    Caching-only DNS servers

    Also known asforwarding only servers

    DNS servers that build a local server cache of names learned while

    querying recursively on behalf of clients. The names are then

    available when answering subsequent queries.

    Caching-only DNS servers do not host any zones.

    Caching-only DNS servers are not authoritative.

    Good for remote sites with a slow network link where full zone transfers might consume

    too much bandwidth.

    Conditional forwarder

    DNS server configured to forward DNS queries, according to the DNS domain name in the

    query, to the authoritative DNS server.

    Helps to keep traffic generated by name requests to a minimum by limiting the number of

    DNS servers that have to connect to the Internet and other external networks.

    LLMNR (Link-local multicast name resolution)

    Provides host name resolution on the local subnet for IPv4 andIPv6 addresses.

    GNZ (Global Names Zone)

    Provides single-name resolution throughout the network, across forest boundaries.

    DNS records in a GNZ must be entered manually.

    HOST file

    Stored on a local computer.

    Contains a list of host names and IP addresses.

    Used for host-name resolution.

    The client first checks the local DNS cache (the Hosts file is loaded here), before

    querying the DNS server.

    Block name resolution for a computer onDNS

    Configure a global query block list

    All domain controllers must run Windows Server 2008 R2

    Remote Access

    Remote Desktop Gateway (RD Gateway)

    Formerly known as Terminal Services

    Provides Remote Desktop Services for authorized clients with access to internal

    resources.

    RD Gateway uses Transport Layer Security (TLS) to encrypt communications.

    RD Gateway uses Remote Desktop Protocol (RDP) over HTTPS to establish a secure, encrypted

    connection between remote users on the Internet and internal resources. You should get

    user certificates from the internal certificate authority and every server must be

    configured for Network Level Authentication to only allow Remote Desktop client computers

    access.

    When the Remote Desktop session is active, RD locks the target computer to prevent

    interactive logons for the session.

    Use Remote Desktop Services CAP (Connection Authorization Policy)to identify user or

    computer groups to secure access to the server resources.

    Define a Remote Desktop Services Resource Authorization Policy (RAP) to identify the

    resources for which they have access.

    Network Policy and Access Services (NPAS)role

    Network Policy Server (NPS)

    Replacement for Internet Authentication Service (IAS)

    Microsoft implementation of the RADIUSserver

    Must have a server certificate.

    Can use either Protected Extensible Authentication Protocol (PEAP) or

    Extensible Authentication Protocol (EAP).

    NPS performs centralized authentication, authorization, and accounting for

    network access, including:

    VPN

    Wireless.Wireless access points must support 802.1x to be configured

    as clients to NPS.

    Configure them as RADIUSclients to pass authentication

    requests to NPS.

    By default, Protected Extensible Authentication Protocol

    (PEAP) with Microsoft Challenge Handshake Authentication

    Protocol (MS-CHAP) version 2. PEAP helps to prevent rogue

    wireless access points on the network. MS-CHAPv2uses

    passwords for authentication.

    LONG ISLAND 2010 SNOW STORM

    FRENCH ALPS

    KILLINGTON, VERMONT

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://4.bp.blogspot.com/-m05DimcK7y8/T5Yomqr4aDI/AAAAAAAABCs/vlnVoOunqvY/s1600/remote+access.jpghttp://1.bp.blogspot.com/-HfDULN5BHiY/Tq1zk98CVWI/AAAAAAAAA3E/1NANUgJ_LRg/s1600/LogoColorTextBelow.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    6/10

    NPS as a RADIUS proxy

    NPS forwards authentication and accounting messages to other RADIUS

    servers

    NPS can be configured as a NAP policy server

    Acts as a health evaluation server for Network Access Protection (NAP)

    Configure connection request policies:

    Use the policies node of the Network Policy Server snap-in or use the

    netsh command-line utility to create connection request policies

    Routing and Remote Access Service (RRAS)

    Allows remote users or site-to-site connectivity to

    access your private network over:

    VPN.Routing and Remote Access tunnels data throughthe Internet and acts as a gateway to the internal

    network. Data transferred through a VPN is encrypted.

    RRAS includes support for three standards-based VPN

    protocols:

    1. A new VPN protocol Secure Sockets Tunneling

    Protocol (SSTP) allows Point-to-Point (PPP)

    protocol packets to be sent over Hypertext

    Transfer Protocol (HTTP) over SSL (HTTPS) using

    port 443.

    SSTP supported by Windows Vista and Windows Server

    2008.

    2. L2TP/IPSec allows end-to-end encryption and computer

    authentication on a VPN. L2TP/IPSec uses PPP for user

    authentication and IPSec for machine authentication.

    L2TP traffic is sent over UDP port 1701.

    L2TP/IPSec authenticates both the user and the

    computer.

    User and computer client certificates are

    required.

    3. PPTP

    Traffic uses TCP port 1723 to create a connection

    Uses IP protocol 47to send data.

    A PPTP control connection is established from a

    dynamically-allocated TCP port on the PPTP client to

    TCP port 1723 on the PPTP server.

    Uses Point-to-Point Protocol (PPP)for user

    authentication, and 128-bit Microsoft Point-to-Point

    Encryption (MPPE)for data encryption.

    Client computer is not authenticated with PPTP.

    EAP-TLS supports smart card authentication for VPN clients

    Dial-up networking

    Internet Protocol (IP) router for connecting subnets in a private

    network

    Network address translator (NAT)for connecting a private network to

    the Internet

    Dial-up and VPN site-to-site-demand-dial router

    Health Registration Authority (HRA)

    Host Credential Authorization Protocol (HCAP)

    Network Access Protection (NAP)

    NAP controls network access based on a client computer's health compliance requirements.

    Health checks make sure

    Firewall software is enabled.

    Antivirus is running and signatures are up to date.

    NAP Policy Server

    Evaluates statements of health that are sent by NAP-capable client computers attempting

    to communicate with the network.

    Remediation Server

    Placed on the restricted network and can be accessed by non-compliant clients.

    Remediation servers are added to the Remediation server groups

    Remediation server groups can be used with NAP only when you deploy DHCP NAP

    enforcement or VPN Nap enforcement

    Remediation server is responsible for

    Installing necessary patches, configurations, or applications to bring a non-

    compliant client computer to a healthy state.

    Direct Access

    Allows remote access to intranet resources using bi-directional connectivity

    Clients are able to access resources anytime they have an Internet connection without

    having to connect to a VPN.

    Administrators can restrict who has access and to what resources.

    Remote users are able to receive updates and be centrally managed as if they are local.

    Requirements for using DirectAccess

    One or moreDirectAccess servers with Windows Server 2008

    R2 with two NICs

    One for the internal network

    One for the Internet

    The NIC connected to the Internet must be

    assigned two public consecutive IPv4 addresses

    DirectAccess servers and clients are required to be domain members

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://3.bp.blogspot.com/-xQN_1l4WogE/T4Cspe2ZI2I/AAAAAAAAA-4/tEwQOiLb-dY/s1600/IMG_0734_2.JPG
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    7/10

    Clients require Windows 7 Enterprise or higher

    DirectAccess uses IPv6 over IPSec, so both client and

    server required to use IPv6 over IPSec

    Domain controller and DNS server running Windows Server

    SP2 or Windows Server 2008 R2

    Clients required to use the internal DNS server to locate

    intranet servers and resolve using a AAAA resource record

    PKIrequired because certificates are used for

    authentication

    DirectAccess Setup Wizardused to configure client computers for DirectAccess

    Add computers to a security group

    Configure a File Server

    File Services Resource Manager (FSRM) MMC has three components for managing storage resources on

    local or remote servers:

    Quota Management

    Can apply quota templates or can apply quotas manually on individual folders

    If you later change the settings in the template, the new quota will

    be reflected for all quotas created in the template

    Configure quotas by volume or folder (Windows Server 2008 R2)

    Quota Usage report shows quotas that have reached the specified level

    File-screening management

    Can apply screening templates to filter certain file types from being saved

    By volume or directory tree

    Configure Notification Types for exceeding quota limits or attempting to save an

    unauthorized file

    Email

    Event log

    Command

    Report

    Storage reports management

    Built-in reports to track quota usage, file screening, and storage management

    Distributed File System (DFS)

    DFS offers WAN-friendly replication and simplified access and high-

    availability to geographically dispersed files. Two technologies are

    available in DFS:

    DFS Namespaces lets you group shared folders located on different

    servers into one or more namespaces that appear to the user as one

    folder with a series of sub-folders

    dfscmd /add

    Add a shared folder as a target folder to an existing DFS

    folder

    Access-based enumeration.

    Enable so users will only see files and folders they have permission

    to access. Not enabled by default, though it is enabled by default on

    newly created shared folders in Windows Server 2008.

    dfsutil property abde enable \\

    dfsdiag

    Used to diagnose and help resolve namespace issues.

    dfsradmin

    Command-line utility for configuring and managing DFS replication.

    DFS Replication

    Replaces FRS as the replication engine for DFS.

    Uses multimaster replication engine to keep folders synchronized across servers

    for limited-bandwidth network connections.

    Replicates AD DS SYSVOL for domains using Windows Server 2008.

    DFS Manager

    Used to check DFS replication efficiency

    Backup and Restore * Windows Server Backup feature

    Non-authoritative restore.

    Default method for restoring Active Directory.

    Start the domain controller in DSRM (Directory Services Restore Mode) and restore to a

    state at the time of the backup and then normal replication overwrites that state with

    any changes after the backup.

    Wbadmin in Windows Server 2008 R2

    Replaces Ntbackup for backing up from the command line.

    Windows Server 2008 R2 supports backing up directly to removable media, including DVD.

    Scheduledbackups must go to a second local volume or a shared folder.

    Windows creates a WindowsImageBackup folder in the root of the backup media. Inside that folder, it

    creates a folder with the current computer name. The backup is stored in

    \\WindowsImageBackup\FileServer\

    Start the Windows Recovery Environment:

    Boot from the Windows Server 2008 R2 installation CD

    Choose Repair Computer

    Once in the Windows Recovery Environment, use the wbadmincommand to

    recover volumes.

    Use the wbadmin start sys recovery command to recover volumes

    Specify -restoreallvolumesto recover all volumes. Otherwise,

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://4.bp.blogspot.com/-2esAUsqUUhA/T5YqCYseqAI/AAAAAAAABC8/6AqLqXyv4Mo/s1600/remote+access+lady.jpghttp://2.bp.blogspot.com/-iLgSlQsBR9w/T5YphP3abDI/AAAAAAAABC0/JVozpGHh5Jw/s1600/direct+access.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    8/10

    only the operating system will be restored.

    systemstaterecovery option restores only system state. It

    does not recover the operating system files or data files.

    Manage File Server Resources

    Shadow copiesshould be written to a volume on a different hard disk

    than the shared files.

    Maintain up to 64 copies of each shared file.

    Enabled at the volumelevel (enabled for all shared folders or none

    of the shared folders).

    vssadmin create shadowcreates a shadow copy

    vssadmin add shadowstorage adds a volume shadow copy storage

    association

    File Service Resource Management (Quotas)

    Can apply quota templates or can apply quotas manually on individual folders

    If you later change the settings in the template, the new quota will be

    reflected for all quotas created in the template

    Configure quotas by volume or folder (Windows Server 2008 R2)

    Quota Usage report shows quotes that have reached the specified level

    NFS Network File System.

    Services for NFS provides UNIX and Linux clients with access to resources on a file

    server running Windows Server 2008 R2.

    Print Services

    Printer Management

    A single interface administrators can use to administer multiple print servers and

    printers

    A GUI utility not supported on Server Core Installs. Located in Administrative Tools.

    Add a printer in Printer Management lets you search for network printers.

    Print filter can be used to manage a set of printers

    Send notification when a print condition occurs.

    Run a script when a printer condition occurs.

    Printbrm.exe

    Command-line utility used to migrate printer settingsfrom one print server to another .

    Can export printer settings as a backup.

    Cannot migrate directly from older operating systems to Windows Server 2008 R2.

    Lpq Line Printer Queue

    View print jobs queued through the Line Printer Daemon (LPD). The LPD is a network

    protocol for submitting print jobs to a remote printer.

    Publishing printer in Active Directory

    Controlled by the List in Active Directorycheck box on the Sharingtab of the

    Properties sheet for each printer.

    Windows Server Update Services (WSUS)

    WSUSutil.exe

    Command-line management utility for WSUS.

    When you create a WSUS Website during WSUS install, the Website is configured to use HTTP port 8530

    for unencrypted communication.

    Open port 8530 to enable communication with the servers.

    Port 443 is used for secure communication.

    Upstream server

    Server on which updates are approved.

    Downstream server

    Receives updates from the upstream server.

    WSUS allows you to approve updates before they are made available to the WSUS clients

    You can create a group of computers and approve updates only for specific groups (WSUS

    3.0)

    Performance Monitoring

    Performance and Reliability Monitor

    Reliability Monitor (Windows Server 2008 R2)

    Computer required to have been running for at least 24 hours

    RACAgent, Reliability Analysis Component, a hidden scheduled

    task that must be running on the computer. It is automatically

    configured during system install. Responsible for gathering

    the reliability data and displaying in the chart view.

    System Stability report shows a graph of these events:

    System clock changes

    Successful and failed software installs

    Server failures due to hardware problems

    Server failures due to operating system problems

    Application failures

    Reliability and Performance Monitor Resource View

    Provides detailed info about system resource use and how the resources are

    allocated

    Data collector set

    Can be created with the performance counters you want to log

    Choose the default creation settings to have the data collector set based on the

    currently selected performance counters.

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://3.bp.blogspot.com/-JhF5QgoMghM/T5YrKe8vJuI/AAAAAAAABDM/Js0Cdc1lTGg/s1600/Peformance.jpghttp://1.bp.blogspot.com/-kLxQJstWNk0/T5Yqa1_Gm0I/AAAAAAAABDE/KbIE9wyJcNI/s1600/File+Server+Resources.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    9/10

    Posted by Tina Thorsen

    Event Logs

    Wevutil (Windows Event Logs)

    Command-line utility lets you view and manage Windows Event Logs

    wevutil qe

    The ge or query-event command is used to retrieve a list of events in the

    Windows Event Logs

    wevutil gl

    The gl or qet-log command is used to retrieve info about the log, such as its

    location

    Wecutil (Windows Event Collector)

    Command-line utility lets you view and manage info about event subscriptions like

    hardware events that are forwarded from a remote computer which support WS-Management

    protocol

    You can use the wecutil utility to automatically configure a computer to collect events

    Audit events

    Written to the Windows Security Event Log

    Windows Server 2008 R2 Active Directory audit policy (auditpol.exe) supports:

    Directory Service Access

    Directory Service Changes

    Directory Service Replication

    Detailed Directory Service Replication

    Gather Network Data

    Task Manager

    Gives a quick overview of total network bandwidth usage.

    Network Monitor

    Collect and save detailed network usage statistics like individualpackets transmitted across the network (note: log file would be

    huge)

    Create an address database first to specify address pairs in a

    capture filter

    Must be an Administrator or member of the netmon users group

    Must be downloaded from the Microsoft website (free)

    nmcap /? command line

    Carefully choose the location to install Network Monitor

    To capture all traffic switch on promiscuous mode (p-mode)

    SNMP. Simple Network Management Protocol, is supported by Windows Server 2008

    SNMP is an Internet standard protocol for managing devices on an IP network

    3rd party software required to analyze SNMP data

    Netcap

    Network Monitor Capture command-line utility can capture network traffic using the

    Network Monitor driver

    Netcap installs the Network Monitor driverand binds it to all adapters when you first

    run the Netcap command

    Monitors traffic on a LAN and write the information to a log file

    Can consume lots of system resources. Not recommended in a production environment, best

    to use netcap.exe command line version to monitor production.

    Data Collector Set.

    You can create a data collector set with the network performance counters you want to

    monitor, and schedule Windows Reliability and Performance Monitor to start automatically

    and log counter values at various times during the day.

    Networking and Access Technologies

    Microsoft Server and Cloud Platform

    Windows Server 2008 R2

    Microsoft Support

    The Precision Guide to Windows Server 2008 Active Directory Configuration: MCTS Exam 70-640 Study Guide

    [Kindle Edition]

    IPv6 Addresses

    Layer 2 Tunneling Protocol

    http://www.windowsnetworking.com/articles_tutorials/DNS_Stub_Zones.html

    Configure Network Level Authentication for Remote Desktop Services Connections

    converted by Web2PDFConvert.com

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttp://technet.microsoft.com/en-us/library/cc732713.aspxhttp://www.windowsnetworking.com/articles_tutorials/DNS_Stub_Zones.htmlhttp://en.wikipedia.org/wiki/Layer_2_Tunneling_Protocolhttp://msdn.microsoft.com/en-us/library/aa921042.aspxhttp://www.amazon.com/dp/B005OMWZ9I/ref=as_li_ss_til?tag=wind011-20&camp=213381&creative=390973&linkCode=as4&creativeASIN=B005OMWZ9I&adid=1MW26BB4FBSSJTDDVKWV&&ref-refURL=http%3A%2F%2Fwww.pcrepairnorthshore.com%2Fsearch%3Fupdated-max%3D2011-11-09T21%3A20%3A00-05%3A00%26max-results%3D15http://support.microsoft.com/http://technet.microsoft.com/en-us/windowsserver/bb310558http://www.microsoft.com/en-us/server-cloud/windows-server/default.aspxhttp://technet.microsoft.com/en-us/network/bb545442.aspxhttp://4.bp.blogspot.com/-BrWOrWT7Ns8/T5Yi9VNLArI/AAAAAAAABB8/ixKdou7BwrE/s1600/Windows+Server+2008+R2.jpghttp://3.bp.blogspot.com/-4UkWcBgd9JE/T5YsQ2gvd4I/AAAAAAAABDU/axq220ux23c/s1600/gather+network+data.jpg
  • 7/25/2019 Www Pcrepairnorthshore Com (11)

    10/10

    Newer Post Older PostHome

    Subscribe to: Post Comments (Atom)

    Related Posts: Access-Based Enumeration, Active Directory, Certificates, DFS, DHCP, DirectAccess, Exam 70-642, IPSec,

    IPv4, IPv6, NAP, NPS, Performance, RADIUS, Remote Access, System Restore, VPN, Windows Server 2008, WSUS

    Enter your comment...

    Comment as: Select profile...

    Publish

    Preview

    "Comment As:" anonymous if you would rather not sign into an account!

    Create a Link

    1 comment:

    Pickme india April 24, 2012 at 6:12 AM

    Your thought processing is wonderful. The way you tell the thing is awesome. You are really a master.

    Great Blog!! That was amazing

    http://www.pickmeindia.com/

    Reply

    LINK this post in your blog

    208,396

    TOTAL PAGEVIEWS 12LikeLike

    Computer Repair

    Powered by Blogger.

    http://www.web2pdfconvert.com/?ref=PDFhttp://www.web2pdfconvert.com/?ref=PDFhttps://www.blogger.com/http://www.thumbtack.com/Computer-Repair-Sea-Cliff-NY/service/324417http://takeaction.animalleague.org/site/Donation2?1640.donation=form1&df_id=1640?s_subsrc=DON_3001_DonatetoALwidgethttp://www.pcrepairnorthshore.com/feeds/6869047162252645373/comments/defaulthttp://www.pcrepairnorthshore.com/http://www.pcrepairnorthshore.com/2012/04/how-to-secure-windows-7-desktops.htmlhttp://www.pcrepairnorthshore.com/2012/06/how-i-got-my-macbooks-cracked-lcd-panel.htmlhttps://www.blogger.com/blog-this.ghttp://www.pcrepairnorthshore.com/2012/04/quick-check-facts-for-windows-server.html?showComment=1335262337683#c6069238612643875775https://www.blogger.com/profile/17325734057027741610http://www.pcrepairnorthshore.com/search/label/WSUShttp://www.pcrepairnorthshore.com/search/label/Windows%20Server%202008http://www.pcrepairnorthshore.com/search/label/VPNhttp://www.pcrepairnorthshore.com/search/label/System%20Restorehttp://www.pcrepairnorthshore.com/search/label/Remote%20Accesshttp://www.pcrepairnorthshore.com/search/label/RADIUShttp://www.pcrepairnorthshore.com/search/label/Performancehttp://www.pcrepairnorthshore.com/search/label/NPShttp://www.pcrepairnorthshore.com/search/label/NAPhttp://www.pcrepairnorthshore.com/search/label/IPv6http://www.pcrepairnorthshore.com/search/label/IPv4http://www.pcrepairnorthshore.com/search/label/IPSechttp://www.pcrepairnorthshore.com/search/label/Exam%2070-642http://www.pcrepairnorthshore.com/search/label/DirectAccesshttp://www.pcrepairnorthshore.com/search/label/DHCPhttp://www.pcrepairnorthshore.com/search/label/DFShttp://www.pcrepairnorthshore.com/search/label/Certificateshttp://www.pcrepairnorthshore.com/search/label/Active%20Directoryhttp://www.pcrepairnorthshore.com/search/label/Access-Based%20Enumerationhttps://www.blogger.com/email-post.g?blogID=5991632940914606440&postID=6869047162252645373

Recommended