Premium Essay

It Server

In:

Submitted By butcher1428
Words 295
Pages 2
memorandum to: | James bond | from: | Donald hannahs | subject: | Network standards | date: | October 3, 2013 | cc: | joe blow | | |
Mr. Bond, Below you will find proposed device and usernames, as well as the IP addresses associated with each device. All user passwords will be set as Password1, and all users will be required to change their password at first login. All user email accounts will be defined as username@goldfinger.ecpi. Department: | Group: | EMP Name: | Username: | Hostname: | IP Address: | Customer Service | CUS | Frank Jones | fjones | Cus-dsktp-1 | 200.7.0.246 | Sales: | Sales | Bobby Boes | bboes | Sales-dsktp-1 | 200.7.0.245 | Sales: | Sales | Cole Williamson | cwilliamson | Sales-dsktp-2 | 200.7.0.244 | Sales: | Sales | Shawn Little | slittle | Sales-dsktp-3 | 200.7.0.243 | Sales: | Sales | Torey Dozier | tdozier | Sales-dsktp-4 | 200.7.0.242 | Sales: | Sales | Ian Fraiser | ifraiser | Sales-dsktp-5 | 200.7.0.241 | Sales: | Sales | Brad Pledger | bpledger | Sales-dsktp-6 | 200.7.0.240 | Sales: | Sales | Will Vernon | wvernon | Sales-dsktp-7 | 200.7.0.239 | Sales: | Sales | Lindsay Pope | lpope | Sales-dsktp-8 | 200.7.0.238 | Sales: | Sales | Brad Clark | bclark | Sales-dsktp-9 | 200.7.0.237 | Sales: | Sales | Rick Onorato | ronorato | Sales-dsktp-10 | 200.7.0.236 | Human Resources: | HR | Jon Manger | jmanger | HR-dsktp-1 | 200.7.0.247 | Management | MGMT | James Bond | jbond | MGMT-dsktp-1 | 200.7.0.248 | Network: | NTWRK | Server | dhannahs | Server-1 | 200.7.0.254 | Network: | NTWRK | Switch | | Switch-1 | 200.7.0.253 | Network: | NTWRK | Router | | Router-1 | 200.7.0.252 | Network: | NTWRK | WAP | | WAP-1 | 200.7.0.251 | Network: | NTWRK | B&W Printer | | Bwprinter-1 | 200.7.0.250 | Network: | NTWRK | Color Printer | | Colorprinter-1 | 200.7.0.249

Similar Documents

Free Essay

Servers

...own companies. Online banking make life simpler. You can check your account balance, deposit checks, pay bills, and make transfers. In order to make web applications more secure and less vulnerable, there are three top areas of risk to a company that wants to expand their systems web servers, databases server, and file servers. The web servers are applications that make information available on the internet. Web servers protect client information, client logins and passwords, and other client information that is not meant to be viewed by the public. Securing the database servers will keep persons or employees from accessing account holder contact information or changing account balances. Database servers are used by most companies. An unsecured database can have excessive and unused privileges. Keeping a database server secured will increase customer satisfaction and peace of mind. File servers are designed to keep out online threats from your Microsoft Windows documents safe and secure. Securing the file server would deny employees access from changing or viewing loan applications and other personal data to inflict damage. In closing, the web servers, database servers, and file servers are all designed to make customers feel at ease about online banking. They were built to keep hackers or identify thieves outside or inside a company from accessing information that is private. References www.imperva.com/docs/wp_TopTen_Database_Threats.pdf Unit 1 Discussion 1: Securing...

Words: 262 - Pages: 2

Free Essay

Dhcp Server

...DHCP
Server
(on
Debian
Squeeze)
 
 1. Pastikan
Login
sebagai
Root
 
 idris@debian:~$
su
 Password:

 root@debian:~#
whoami
 root
 root@debian:~#

 
 2. Persiapan
Repository
 Pastikan
Repositorynya
 
 root@debian:~#
cat
/etc/apt/sources.list
 deb
ftp://kebo.eepis­its.edu/debian
squeeze
contrib
main
non­free
 deb­src
ftp://kebo.eepis­its.edu/debian
squeeze
contrib
main
non­free
 root@debian:~#
 
 Jika
belum
edit
menggunakan
editor
seperti:
vim,
nano,
pico,
atau
lainnya.
 
 3. Update
repository
 
 root@debian:~#
apt­get
update
 Get:1
ftp://kebo.eepis­its.edu
squeeze
Release.gpg
[1672B]
 Get:2
ftp://kebo.eepis­its.edu
squeeze/contrib
Translation­en_US
 Get:3
ftp://kebo.eepis­its.edu
squeeze/main
Translation­en_US
 Get:4
ftp://kebo.eepis­its.edu
squeeze/non­free
Translation­en_US
 Hit
ftp://kebo.eepis­its.edu
squeeze
Release
 
 Get:5
ftp://kebo.eepis­its.edu
squeeze
Release
[104kB]
 Get:6
ftp://kebo.eepis­its.edu
squeeze/contrib
Packages/DiffIndex
 Hit
ftp://kebo.eepis­its.edu
squeeze/contrib
Packages
 Fetched
105kB
in
13s
(7586B/s)











































































 Reading
package
lists...
Done
 
 4. Pastikan
paket
DHCP‐nya
 
 root@debian:~#
apt­cache
search
isc­dhcp­server
 isc­dhcp­server
­
ISC
DHCP
server
for
automatic
IP
address
assignment
 isc­dhcp­server­dbg
­
ISC
DHCP
server
for
automatic
IP
address
assignment
(debug)
 isc­dhcp­server­ldap
­
DHCP
server
able
to
use
LDAP
as
backend
 
 
 
 5. Installasi
paket
DHCP
 
 root@debian:/home/idris#
apt­get
install
isc­dhcp­server
...

Words: 484 - Pages: 2

Free Essay

Server Management

...Analysis for Buying Servers for College As the Point Park is hosting a new IT program, starting with initially 50 students that may grow later up to hundreds. Generally to run an IT Program, a lot of software and hardware platform support is needed. There are many tasks to be performed by students, ranging from computer Programming Classes, Database Classes (Which involves a lot of computation job) to maintaining an online catalogue of the Course resource (like video lectures, documents, slides etc.). So since the need of the Point Park’ s IT Program is varying, there has to be optimized Hardware Support from the Servers which are providing these services. The Hardware required for the smooth running of this IT Program need to fulfill the following services: 1) 24 X 7 Availability with minimum Failure. 2) Data Redundancy in case of Failure (RAID Support) 3) Minimum Maintenance 4) Ability to run various services (Web Server, File Server, and Database Server etc.) together. 5) Multiple OS support, Virtualization Enabled and support for Cloud based apps. These are among the few services we expect from the Hardware Servers we are going to buy. Coming to the Hardware specific considerations of the servers, as with any other type of computer, a fast processor increases performance overall with any server. Several other key components in the computer affect the services even more than the CPU used in the server system. * Most modern dual-core and quad-core processors...

Words: 427 - Pages: 2

Premium Essay

Server Side

...Part 1 1. What is the difference between interactive processing and real-time processing? Interactive processing is when there is a continuous exchange of information between the computer and user whilst performing tasks. Examples include entering information into a query in a database or information into a word processor. Real time processing means that there is a continual input, process and output of data. It may be a situation whereby a user sends in transactions and awaits a response from a distant computer before continuing. We see this happening when we use telephone banking to transfer funds from our savings to our credit card and the money is accessible immediately. Real Time Processing [Online]. Available from http://www.answers.com/topic/real-time-processing-e-business-term. (Access 14 July 2010). Interactive Processing [Online]. Available from: http://linux.about.com/cs/linux101/g/interactiveproc.htm. (Accessed 14 July 2010). 2. What complications could arise in a time-sharing system if two processes require access to the same file at the same time? Are there cases in which the file manager should grant such requests? Are there cases in which the file manager should deny such requests? If two processes require access to the same file at the same time, two main situations could arise: 1. Both processes attempt to read the file in which there is no harm. If the file is used as merely input for the processes and is not being changed then...

Words: 1067 - Pages: 5

Free Essay

Client/Servers

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 704 - Pages: 3

Free Essay

Server Analytics

...Thought Leadership White Paper 2 Reengineering IT discovery with analytics and visualization Contents 2 Introduction 3 The inevitable push towards greater efficiency 3 The need for better IT discovery 4 Building a more comprehensive snapshot of the data center 6 Changing the parameters for IT discovery 6 How ALDM works 8 Identifying issues that hinder operational efficiency and resilience 9 Compiling affinity groups automatically 11 Identifying the best candidates for virtualization 12 Extending insights with data visualization 12 The confluence of discovery analytics and human analysis 15 Conclusion 16 For more information Introduction An intimate knowledge of IT assets and dependencies has always been imperative to mitigating the risk of data center migrations and improving the resiliency of the IT environment. But the IT discovery process can be slow, costly and prone to error. And for all their value in helping organizations determine where and how to plan a migration or improve IT resiliency, traditional asset inventories and dependency maps provide only part of the picture. With modern IT infrastructures an intricate web of interdependencies, uncovering the total IT environment, including the logical relationships between physical, virtual and cloud elements, has never been more important—or more complex. IBM’s analytics for logical dependency mapping, ALDM, reengineers the IT discovery process...

Words: 5168 - Pages: 21

Premium Essay

Client Server

...CLIENT SERVER PROGRAMMING AND MULTIMEDIA Introduction Client/server describes the relationship between two computer programs in which one program, the client, makes a service request from another program, the server, which fulfills the request. Although the client/server idea can be used by programs within a single computer, it is a more important idea in a network. In a network, the client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. For example, to check your bank account from your computer, a client program in your computer forwards your request to a server program at the bank. That program may in turn forward the request to its own client program that sends a request to a database server at another bank computer to retrieve your account balance. The balance is returned back to the bank data client, which in turn serves it back to the client in your personal computer, which displays the information for you. The client/server model has become one of the central ideas of network computing. Most business applications being written today use the client/server model. So does the Internet's main program, TCP/IP. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely disappeared...

Words: 2053 - Pages: 9

Premium Essay

Server

...production of the infamous Microsoft software company? Windows Server 2008 is based off the Windows Vista codes which makes it more user-friendly and more universally known (Wikipedia.org/windowsserver2008). February 27, 2008 brought about a new meaning for many businesses both large and small. Feature Enterprise Datacenter Standard Web Itanium Web Agent Yes Yes Yes No No Sever Backup Yes Yes Yes Yes Yes Power Shell Yes Yes Yes Yes Yes Admin Pack Yes Yes Yes Yes No Tcp/Ip Servics Yes Yes Yes Yes Yes Windows Server 2008 comes in different versions for numerous reasons. Windows server 2008, also known as “Win2K8” or “W2K8”, has many versions to help fit the needs of the consumer/client that is using the system. They make different versions, which contain different features, to accommodate the usefulness to the different user. For example, a large business, with large profits, would be willing to pay more for a certain version, since the server would be able to accommodate thousands of users and certain supportive systems for numerous processors. (technet.com) The following are some new features and/or enhancements made to Windows Server 2008:  Domain Name System (DNS) enhancements o Background zone loading o IPv6 Support o Support for read-only domain controllers (RODCs) o Global single names  Quality of Service o New facilities to manage network traffic for both enterprises and home networks.  Server Message Block 2.0  Http.sys Enhancements The research that...

Words: 743 - Pages: 3

Premium Essay

Server

...Research Assignment 1 1. The two current versions that are released for Windows Server 2008 are Service pack 2 and R2. The difference between the two versions is that Windows R2 includes enhancements and new functionality for Active Directory, new Virtualization and Management features that the original version does not have. 2. The difference between Windows Server 2003 and 2008 is that the 2008 version has a third party updated device driver and it consumes less power and it has additional feature such as virtualization. Also, 2003 is made to control WinXP networks and 2003 is made to control Vista networks. 3. Having the 64-bit architecture doubles the amount of data a CPU can process per cycle. 4. Server Core is a minimal server installation option for computers running on the Windows Server 2008 operating system or later. Server Core provides a low-maintenance server environment with limited functionality. Windows Server virtualization provides the service that you can use to create and manage virtual machines and their resources. Powershell is an installable feature of Windows Server 2008. You have access to an amazing command line scripting language. Unlike other scripting languages in Windows, Powershell is designed just for us system administrators. Powershell uses .NET and utilizes “cmdlets” (or “command-lets”) to do its job. 5. An RODC makes it possible for organizations to easily deploy a domain controller in scenarios where physical security...

Words: 269 - Pages: 2

Premium Essay

Web Server Security and Database Server Security

...Web Server Security and Database Server Security Databases involve distributed updates and queries, while supporting confidentiality, integrity, availability, and privacy (Goodrich, & Tamassia, 2011). This entails robust access control as well as tools for detection and recovering from errors (2011). When database information is masked, there is still a possibility of an attacker garnishing sensitive data from additional database information that is available, this can be achieved and called an inference attack (2011). For databases, strategies have been designed to mitigate against inference attacks. Cell suppression is a technique used to combat an inference attack, by removing various cells in a database, and are left blank for published versions (2011). The objective is to suppress the critical cells that have relatively important information in them from being obtained in an attack (2011). Another strategy is called Generalization, and this involves replacing published versions of database information with general values (2011). Such as stating a specific date of birth with a range of years, thus a person born in 1990 could be generalized as a range 1985-1992. The critical values are intertwined with the actual values, so they are less discernable in an inference attack (2011). A Noise Addition technique can also be utilized. This requires adding randomized values to real values in a published database (2011). This provides “noise” for all the records of the...

Words: 2494 - Pages: 10

Premium Essay

Dns Server

...“Birch” DNS Server The Mail server will be using fedora as the OS. First step will be to install fedora on the server. After successful install there are 3 packages that need to be installed. The first package will be the bind package. Next will be the bind-utils and bind-chroot packages. After successful install of all packages we will start with adding files to the chroot directory that will be implemented for security. We will do this in anticipation if anyone hacks into the server they will be confined to that directory. To do this a copy of the named.config, named.rfc1912.zones, and the named.root.hints files will made in the /var/named/chroot/etc directory.Also copy the default zone files from/user/share/doc/bind/sample/var/named into var/named/chroot/var/named directory. In the /etc/named.config file we need to add the DNS server Birch.company.com with the ip address 206.207.208.12, mail server Cedar.company.com 206.207.208.11, and web server Aspen.company.com 206.207.208.10 to the list of servers to be added to the DMZ zone.. In the /etc/resolve.config file we need to point the DNS server to quiry the ISP DNS 82.83.84.85 for unknown names or domains. This setup will allow clients on the Corp. side to query the DMZ DNS which will in turn query the ISP DNS for any name resolution and protect the internal network from being compromised. In addition to the using chroot we will also implement SELinux as addition security. To ensure DNS will run automatically at system boot...

Words: 295 - Pages: 2

Free Essay

Deploying a Ftp Server

...Lab 4-1 70-643 worksheet Deploying an FTP Server This lab contains the following exercises: Exercise 4-1-1 Installing the Web Server (IIS) Role Exercise 4-1-2 Creating an FTP6 Site Exercise 4-1-3 Configuring FTP6 Security Lab Review: Questions Lab Challenge: Creating a Combined Web/FTP Site Estimated lab time: 55 minutes BEFORE YOU BEGIN The classroom network consists of Windows Server 2008 student server A and B a connected to via an internal local area network. NT2670Srv##A the domain controller for the contoso##.com domain, is running Windows Server 2008. Throughout the labs in this manual, you will install, configure, maintain, and troubleshoot application roles, features, and services on the NT2670Srv##A. To accommodate various types of classroom arrangements, each lab in this manual assumes that the student servers are in their baseline configuration, as described in Lab 1-2, “Preparing an Application Server.” If you have not done so already, complete the initial configuration tasks in Lab 1-2-1 before beginning this lab. Your instructor should have supplied the information needed to complete the following table: Student computer name (NT2670Srv##A) | | Student account name (Student##) | | To complete the exercises in this lab, you must access a second student computer on the classroom network, referred to in the exercises as your partner server. Depending on the network configuration, use one of the following options, as directed by your instructor: ...

Words: 964 - Pages: 4

Premium Essay

Case 2.1 Server Downtime

...TO: FROM: DATE: February 15, SUBJECT: Server Downtime Problem Statement: This report contains my findings and recommendations as a result of my research. This is a look into the server downtime and problems with the primary network servers here at Widget Company. First we will be looking into the numbers and statistical results I have found. Statistical Results: Based on the data I was given during the month of April the network experienced 5 different problems, they are lockups, memory errors, weekly virus scan, slow startup, and manual restart. The results of these issues are. 22 times the server was down 735 Minutes of total time server was down * * Of those 22 times the server was down the breakdown of how frequently each one occurred is as follows. * * * * This shows that memory errors were the most frequent reason the server was down. Memory errors were also responsible for the most time at 34% or 250 Minutes. What is interesting is that while there were only 4 times the server was down for its weekly virus scan it was responsible for about 33% or 240 minutes of the server downtime. * * * * Aside for the 4 planned weekly virus scans of 60 minutes each. The server was down 18 times for 495 Minutes. Memory errors contributed to over half of this downtime. Next we will take a look at my recommendations based on the data. * * Conclusion * * The server was down for a total of 735 Minutes during...

Words: 323 - Pages: 2

Free Essay

Web Server

...A web server is a crucial element in most company’s infrastructure. Every corporate company has to have a web presence. Some companies use it for marketing, some use it for sales, and some use it just to share information. It doesn’t matter why they use it, because they need it either way. Most customers want to check out products online before they decide what they want. Computers provide an easy and flexible way to research for the best products that are available for the customer. Depending on what you are going to use your web server for, you have to select an appropriate solution for yourself that will satisfy your needs. There is no “clear cut” way to create and configure a web server. If you are looking for the answer: “Ok! This is the best web server!” You are out of luck. I wish there was an easy way to figure this stuff out, but there are many questions to answer and needs to satisfy before you can declare that you have a great web server. There is a lot of information out there that will “help” you chose a solution for your company or organization. Unfortunately, I think in this case there is a little too much information available and it could be overwhelming. There is a lot of biased information available on the net. Some people say Apache is better than IIS, but it really depends on what your needs are. If you have your own company, you have to sit down with your IT staff and marketing staff and preferably every member of your company to come up with a “picture”...

Words: 1165 - Pages: 5

Premium Essay

Windows Server

...CMIT 369 7981 Installing and Configuring Windows Server Windows Server Proposal Worldwide Advertising Inc. Summary Wordwide Advertising Inc. is a newly established advertising firm will require a server environment to manage a starting staff of 90 employees and various roles required to manage their network. Windows Server 2012 will be installed to manage the following server roles. Exchange to manage company email, Active Directory to manage the domain to include users, computers, groups, sub domains, DHCP and DNS, file and print sharing, cloud storage, as well as backup solutions. There will be two locations which will require inter-site connectivity through a secure tunnel. The site in Los Angeles will house the majority of the employees while the New York location will have a smaller staff consisting of at least one employee from each department. New Features in Windows Server 2012 There are new features in Windows Server 2012 that Worldwide Advertising will be able to take advantage of. Some of these new features are as follows: You can leverage new features in Active Directory to enable employees and partners to access protected corporate data from their personal devices and at the same time manage risk and govern the use of corporate resources. Active Directory Domain Services (AD DS) in Windows Server 2012 includes new features that make it simpler and faster to deploy domain controllers (both on-premises and in the cloud), more...

Words: 1086 - Pages: 5