In this IT age, networking is the key to most business operations. Every access to any system in a network domain is thus entrusted through user accounts and upon correct user password approval. Since, critical business data and transactions are shared on the network, illicit attempts for account access is an alluring prospect for trespassers who try to supersede in their own felonious intentions. Thus, account lockout and password usage helps to combat such malpractices. Microsoft recommends Read more...

We’re not talking about deploying a database for the mobile using SQL Server Compact rather we’re here by discussing any possibility to bring the SQL Management Studio to the handheld devices entirely or partially. The day when Apple’s iOS and Google’s Android transformed the existing world of handheld devices, everybody is talking about to bring the giant computer applications and facilities to the smartphones, tablets, PDAs, etc. Here, the thought to bring a mammoth sized Server Read more...

Microsoft has equipped the organizations with the Windows server operating system and other server tools like Exchange Server, SQL Server, SharePoint Server, etc. In addition, there are inbuilt server tools like DNS Server, DHCP Server, File Server, and Active Directory to create a complete networking infrastructure inside an organization. However, the server and networking management using the traditional Microsoft tools become obsolete at a level. In this blog post, we’ll discuss how Read more...

Android is the most widely used Operating Systems for smart devices like smartphones and tablets. Its popularity and usage to browse the World Wide Web had already surpassed that of Windows devices and computers. Seeking their popularity the IT professionals are already using the third party apps for connecting with their File Servers, taking remotes of their machines, and managing their servers. These apps are serving their purpose for which they’ve been created by the manufacturers and Read more...

Article Author: Peter Gubarevich (MVP – Enterprise Security), Certified Ethical Hacker Everything was just fine until yesterday. Usually, I’m managing local group membership using Active Directory Group Policies, either Restricted Groups node, or GP Preferences node. It’s quite questionable which node to choose, but anyway, Group Policy makes it easy to perform updates and enforce membership throughout a domain, and exactly fits my requirements. However, there’s another side of Read more...

There is no iota of doubt that Windows PowerShell gives more control than the traditional Windows tools to manage the Active Directory. This fact inspires the Administrators to stick with command line tool instead of using the Active Directory Users and Computers. Let us have a look at AD user management through Windows PowerShell. Here, we’ll learn how to create and remove the users using the PowerShell CMDlets. Creating a Single User - Following is the New-ADUser CMDlet for creating a Read more...

Account lockouts are one of the common problems that IT administrators have to deal with. As common as it may sound, the total loss of productivity in the organization due to account lockouts of all employees is a big issue, only if you can quantify it in monetary terms. Employees logging on to the system find that their account has been locked and all that they can do is find a means to inform administrators about it and then wait till their account gets unlocked. Administrators on their Read more...

Article Author : Dinesh Asanka (MVP – SQL Server) SQL Server Management Studio (SSSM) is an essential tool for DBAs and developers. But are you using it effectively? In this article, I will try examine a few tips and techniques which could well boost your efficiency using SSMS. Object Filtering :The below screen is probably familiar to most DBAs – it lists all tables under a database. If you want to check something on the Address table, you need search the entire list. Things will be Read more...

In the fast-paced frenzy world, who has the time to stop and look back? I do not, and I am pretty sure if you are like me then we have same echo of emotions! However, this fact that we, the people of 21st century, IT professionals and Wi-Fi crazy heads love to run and stay on our toes. This eventually creates health issues later in life. We want to think fast, create fast, implement fast and off course get the results super fast. This results in huge stress, hundreds of coffee or caffeine Read more...

In today’s modern era of cloud computing organizations are deploying wide range of network security tools to ensure foolproof security of network. The implementation of firewalls, antivirus, Network Intrusion Detection Systems (NIDS) etc. doesn’t mean that the network is fully secured. To keep any network’s security up to date it is must for administrators that they should keep analyzing the user generated, system generated, and security tools generated logs on regular basis. In any Read more...