Comparison between the UNIX and the Windows 2008 servers Instructor Keating ECPI University CIS305 Advanced UNIX Administration June 15, 2013 There are many reasons that I choose this speaking about the UNIX server verses the Window 2008 server but mainly it was the fact that I had no idea how this server worked and why it was so important. At first when I heard of UNIX it didn’t seem important at all in fact all I could remember is that it was the server that carried the weird names. Then
Words: 1747 - Pages: 7
Connection Sharing; Integration with UPnP, NAT traversal APIs; Software Restriction Policies; Credential Manager; smart card PKI 2. Windows Server 2008(resource management purpose) (Memory 1.6GHz; RAM 1GB;VGA (800X600 or higher); Hard Disk 20GB or higher) Features: Minimum installation for DHCP, DNS or print server; RODC; Network Access Protection; Server 2008; Role-based installation Application Softwares 1. GBanker: (Memory 1GHz; RAM 1GB; VGA (800X600 or higher); Hard Disk 5GB or higher) Features:
Words: 2489 - Pages: 10
single user accounts by the Group Policy that is a tool of Active Directory. The group policy determines whom and how much permission of resources access is given to a group or individual user. These policies are used to administer terminals and servers on a certain network. The user and computer preferences are determined by the Windows group policy. The Group Policy Object can also
Words: 621 - Pages: 3
Quiz Questions 1.) Which library is NOT in windows 7? Videos 2.) A new scripting feature that replaced VB script? Powershell 3.) Which version(s) of windows can be added to the Active Directory Domain? Professional, Ultimate, and Enterprise 4.) What replaced the MSDOS disk boot for windows? Windows PE Boot Disk 5.) A set of folders associated with a specific user is called? User Profile 6.) A program to run/see if Windows 7 is compatible with an upgrade is
Words: 709 - Pages: 3
Shell Scripting ITT Technical Institute Introduction to Programming The Linux and UNIX operating systems were built on shell scripting within its operating system, it’s the beating heart of the operating system. “Scripting is a way by which one can alleviate this necessity by automating these command sequences in order to make one’s life at the shell easier and more productive. Scripting is all about making the computer, the tool do the work” (The University of Birmingham, 2005). When working
Words: 385 - Pages: 2
The History of Visual Basic dates back to 1991 when VB 1.0 was introduced. The core of Visual Basic was constructed on the older BASIC language, which was the prevalent programming language throughout the 1980s. It's a computer programming system established and owned by Microsoft. Visual Basic was originally produced to make it easier to write programs for the Windows computer operating system. The basis of Visual Basic is an earlier programming language called BASIC that was invented by Dartmouth
Words: 409 - Pages: 2
Lab 1 Assessment Questions: 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA department LANs, departmental folders, and data. By establishing security principle within the Active Directory Domain. 2. Is it a good practice to include the account and user name in the password? Why or Why not? No it is not a good idea to include the account and user name in the password because there are Hackers out there who would use either a dictionary attack
Words: 469 - Pages: 2
stand-alone server in his company. The problem is that he can’t find an option to create a universal security group. What is the problem? a. He must first create the administrators’ personal accounts before it is possible to create a universal group. b. He needs to put the account creation tool into the Advanced Features mode. c. He must create a universal distribution group first and then create the universal security group. d. He cannot create a universal security group on a stand-alone server and
Words: 1179 - Pages: 5
can be set up for Windows Server 2003 folder and authentication? Authentication and Access Control 3. If you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of access controls and permissions are probably configured? What type of access control would best describe this access control situation? Folder Contents. The access control best fitting would be security policy. 4. What is the mechanism on a Windows server where you can administer granular
Words: 385 - Pages: 2
might need to consider running Windows Microsoft Server 2008 Datacenter Edition on XMP x64, which has the fastest processors. We will need to determine the amount of RAM that may be needed. The hardware requirements for Windows Microsoft 2008 Datacenter might exceed the capabilities of our current servers, so we will need to check to see if it is compatible with the servers we already have in use. We may need to upgrade
Words: 610 - Pages: 3