Server Glossary   access control A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object.   access control entry (ACE) An entry in an object’s discretionary access control list […]


Virtual Local Area Networks

Virtual Local Area Networks This paper describes virtual local area networks (VLAN’s) , their uses and how they work in accordance with the 802.1Q standard. Table of Contents 1.0 Introduction 2.0 What are VLAN’s? 3.0 Why use VLAN’s? 4.0 How VLAN’s work 4.1 Types of VLAN’s 4.2 Types of Connections 4.3 Frame Processing 5.0 Summary […]

Read More Virtual Local Area Networks

Individual Contributor Goals

Individual Contributor Goals:   1. Ensure that you do not contribute to change failures by thoroughly reviewing your change design, get it approved by SME’s NOMINATED BY YOUR MANAGER and follow the change process for executing the change. Strive to contribute for Zero failed change   2. Ensure no unauthorized change. Strive for Zero unauthorized […]

Read More Individual Contributor Goals

Windows Run Commands

To Access Run Command Accessibility Controls   access.cpl   Add Hardware Wizard hdwwiz.cpl Add/Remove Programs appwiz.cpl Administrative Tools control admintools Automatic Updates wuaucpl.cpl Bluetooth Transfer Wizard fsquirt Calculator calc Certificate Manager certmgr.msc Character Map charmap Check Disk Utility chkdsk Clipboard Viewer clipbrd Command Prompt cmd Component Services dcomcnfg Computer Management compmgmt.msc Date and Time Properties […]

Read More Windows Run Commands


15 netstat 11 systat 20 ftp-data 21 ftp 22 ssh, pcAnywhere 23 Telnet 25 SMTP 42 nameserv, WINS 53 DNS 67 bootps 68 bootpd/dhcp 69 Trivial File Transfer Protocol (tftp) 80 www-http 88 Kerberos, WWW 101 HOSTNAME 109 POP2 110 POP3 137 netbios-ns 138 netbios-dgm (UDP) 139 NetBIOS 143 IMAP 161 SNMP 220 IMAP3 443 […]