Free Essay

Configuring Windows 2000

In:

Submitted By zbhsmith
Words 346
Pages 2
Configuring Windows® 2000/XP networking

One of the most important things to remember when setting up a network is to keep it simple. This will help minimize any connection problems. The first thing to do is know what kind of network will be setup; wired or wireless. This will guide the configuration of the network. The use of tools such as the Network Setup Wizard is strongly recommended to new users. Windows 2000 and Windows XP have the Network Setup Wizard installed and can be located in the start menu.

The Network Setup Wizard is a easy to use tool to connect to any wired or wireless network connection. The first thing is to log in as an administrator and physically make all the connections to the computer in which is being connected to the network. Start the wizard and follow the onscreen guide to set up the network. The Network Setup Wizard will have options to setup a home network or a small office network. Once the network wizard finishes select which files to share and different printers to share on the network.

In Figure 2.1, it shows the Network Setup Wizard on the computer. During the wizard options to complete are: | * Share an Internet connection and configure all the computers on the network. | | * Enable and setup the Internet Connection Firewall. | | * If the computer has multiple network adapters installed, enable a Network Bridge on the Windows XP | | * Share Files and Printers on the networkFigure 2.1 (http://www.petri.co.il/images/xp_net_wiz1.jpg) |

Once the host computer has been configured, run the Windows XP Network Setup Wizard on computers using Windows 2000 or Windows XP. The Wizard will help make it easy for computers to talk to each other over the network.

Two ways to start the Network Setup Wizard | * Select Start, select Control Panel, select Network and Internet Connections, and then select Network Connections. Under Common Tasks, select Network Setup Wizard. * Select Start, in the start menu locate the All Programs Tab, select Accessories, select Communications, and select Network Setup Wizard. |

Similar Documents

Premium Essay

Hey This Is Werid

...Imation Data Storage and Information Management Document No.: M0-001-1408-8 Effective: 4-Dec-2009 Version: D Page: -0- Imation LOCK User Manual Security Application Program V2.0 - D Imation Data Storage and Information Management Document No.: M0-001-1408-8 Effective: 4-Dec-2009 Version: D Page: -1- Table of Contents A. B. C. D. E. Introduction ........................................................................................................................ 2 General Description............................................................................................................ 2 Features .............................................................................................................................. 2 Before Using the Security Application Program – Imation LOCK.................................... 3 Introduction to Imation LOCK........................................................................................... 4 E1. E2. Main Screen............................................................................................................ 4 Set Password / Change Password........................................................................... 4 F. G. H. E3. Disable Password ................................................................................................... 7 E4. Unlock Device........................................................................................................ 8 E5. Configure Partition...

Words: 2332 - Pages: 10

Free Essay

Sql Server Authentication

...Windows Authentication on Microsoft SQL Server Introduction Microsoft SQL Server offers two types of security authentication: SQL Server authentication and Windows authentication. SQL Server authentication authenticates the user to the database using a database user name and password. Windows authentication is also referred to as "Windows Integrated Security" or a "trusted connection" because it relies on the user being authenticated, or “trusted,” by the operating system. Windows authentication is the authentication mode recommended by Microsoft. Windows authentication takes advantage of Windows user security and account mechanisms. By allowing Microsoft SQL Server to share the user name and password used for Windows, users with a valid Windows account can log into Microsoft SQL Server without supplying a user name and password. In addition to a single login within a Windows domain, Windows authentication provides a more secure mechanism for logging into Microsoft SQL Server. Standard Windows security mechanisms also provide the added advantages of auditing, password aging, minimum password length, and account lockout after multiple invalid login requests. The DataDirect Connect® for JDBC® SQL Server driver is the only JDBC driver for Microsoft SQL Server that provides two methods for supporting Windows authentication, a Pure Java (Type 4) implementation and a Windows-specific (Type 2) implementation. The Windows-specific implementation requires minimal configuration to enable...

Words: 2311 - Pages: 10

Free Essay

Spur

...Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state vs. magnetic | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Optical drives | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * External CD-RW and hard drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Hot swappable devices and non-hot swappable devices | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage...

Words: 6966 - Pages: 28

Premium Essay

Introduction to Computers

...Windows 7 Presentation APTECH COMPUTER EDUCATION What is an OS ? • Operating systems provide a software platform on top of which other programs, called application programs, can run. History of Microsoft Windows • 1980-MS-DOS • 1982–1985: Introducing Windows 1.0 • 1987–1992: Windows 2.0–2.11—More windows, more speed • 1990–1994: Windows 3.0–Windows NT—Getting the graphics • Windows NT • 1995–2001: Windows 95—the PC comes of age (and don't forget the Internet) • 1998–2000: Windows 98, Windows 2000, Windows Me Continue… • Windows 2000 Professional • 2001–2005: Windows XP—Stable, usable, and fast • 2006–2008: Windows Vista—Smart on security • 2009–Today: Windows 7(The version of Kernel is 7.0 or above 6.0) • Expecting Windows 8 Hardware Requirements Flavors of Windows 7 • • • • • • Windows 7 Starter Windows 7 Home Basic Windows 7 Home Premium Windows 7 Professional Windows 7 Enterprise Windows 7 Ultimate Editions of Windows 7 Windows 7 Ultimate Windows 7 Home Premium Windows 7 Enterprise Windows 7 • Standard Professional consumer edition Consumers Windows 7 Home • Does not include Premium Windows 7 Home Basic Windows 7 Starter business features Windows 7 Targeted for value PCs enthusiasts for want all all for accessing for edition in targeted markets, in environments, • Business-focused edition,emergingwhomanagedWindows 7 small factor PCs full Windows The Professional editioncustomer. and lowermeant markets7 standardtechnicalfor forWindows...

Words: 2139 - Pages: 9

Free Essay

Bait

...An Overview of Monitoring Microsoft Exchange 2000 Server with Microsoft Operations Manager 2000 ® Dale Koetke, Sean O'Brien Jyoti Kulkarni An Overview of Monitoring Microsoft Exchange 2000 Server with Microsoft Operations Manager 2000 ® Dale Koetke, Sean O'Brien Jyoti Kulkarni Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or...

Words: 2546 - Pages: 11

Free Essay

Application Security on Windows and Linux

... 4.1 Importance of the Written Business Security Policy 4.2 Considerations of Creating the Written Business Security Policy 5 Cross-Platform Security Configurations 6 Conclusion  Table of Figures Figure 1: Windows to Linux Authentication  List of Tables Table 1: Patch Management Applications  Patch Management Patch Management Defined Over the years common security practices have evolved. With these practices the view on patch management has evolved as well. Just a few years ago the common mentality regarding patches was to install and forget. Many systems were deployed and left to their own, few were ever updated. With the rise of worms and malicious code such mentality is no longer accepted. With the new threat levels comes a new focus on patch management. In today’s network environment different methods of deploying and managing patches exist. Networks are unique, like fingerprints, most often no two are identical, and for this reason patch management has to be just as unique. Two of the most common methods of patch management are application based and script based. Patch Management Applications Table 1: Patch Management Applications Application Description Platform Windows Software Update Services WSUS allows administrators to manage and distribute updates on servers running...

Words: 890 - Pages: 4

Premium Essay

Installing and Configuring Wds

........................ 19 R eferences ........................................................................................................................ 23 Appendix 1: Competency Matrix ....................................................................................... 24 Appendix 2: Installing Microsoft Windows Server 2008 ................................................... 26 Appendix 3: Conf iguring Domain Controller using DCPROMO ....................................... 36 Appendix 4: Installing Dynamic Host Configuration Protocol (DHCP) ............................ 49 Appendix 5: Inst alling Microsoft Windows Deployment Services .................................... 56 Appendix 6: Configuring Microsoft Windows Deployment Services ................................ 60 Appendix 7: Imaging client machine ................................................................................. 67 Page 1 Capstone Report Summary (Introduction) My Capstone Project is about Microsoft Windows Deployment Services (WDS). W DS is a service, installed on Microsoft Windows Server 2003, 2008, and 2008 R2, which allows administrators to deploy Microsoft Windows XP, Vista, and 7 to multiple client computers, using network-based installation. WDS can also be used to deploy applications while the system is being imaged. This project will accomplish the followin...

Words: 9702 - Pages: 39

Premium Essay

Network

...information that links a computer's fully qualified domain name (FQDN) to its assigned IP address(es). While DHCP provides a powerful mechanism for automatically configuring client IP addresses, until recently DHCP did not notify the DNS service to update the DNS records on the client; specifically, updating the client name to an IP address, and IP address to name mappings maintained by a DNS server. Without a way for DHCP to interact with DNS, the information maintained by DNS for a DHCP client may be incorrect. For example, a client may acquire its IP address from a DHCP server, but the DNS records would not reflect the IP address acquired nor provide a mapping from the new IP address to the computer name (FQDN). In Windows 2000, DHCP servers and clients can register with DNS to provide this update service if the DNS server supports DNS with dynamic updates. The Windows 2000 DNS service supports dynamic updates. A Windows 2000 DHCP server can register with a DNS server and update pointer and address (A) resource records on behalf of its DHCP-enabled clients using the DNS dynamic update protocol. The ability to register both A and PTR type records lets a DHCP server act as a proxy for clients using Microsoft Windows 95 and Windows NT 4.0 for the purpose of DNS registration. DHCP servers can differentiate between Windows 2000 and other clients. An additional DHCP option code (option code 81) enables the return of a client's FQDN to the DHCP server. If implemented, the DHCP server...

Words: 429 - Pages: 2

Premium Essay

Drd45Gvg

...PHStat2 readme file. PHStat2 is Windows software that assists you in learning the concepts of statistics while using Microsoft Excel. PHStat2 allows you to perform many common types of statistical analyses working with and using the familiar Microsoft Excel interface. PHStat2 is an enhanced version of the original PHStat statistical add-in system. If you have used PHStat previously, read the "What's New?" section to discover the improvements that PHStat2 contains. (In your textbook, you should interpret any general reference to "PHStat" as a reference to PHStat2.) The rest of this document is organized into sections to assist you in setting up and using PHStat2. The “What’s New in PHStat2” section of this file can also be found in the PHStat2 help system (select Help for PHStat2 from the PHStat menu in Microsoft Excel and look in the “Welcome to PHStat2” topic). Table of Contents 1PHStat2 technical requirements 2Configuring Microsoft Excel for PHStat2 3Setting up PHStat2 4Using PHStat2 5Updating PHStat2 6Troubleshooting PHStat2 7What's New in PHStat2? 1 PHStat2 technical requirements To set up and use PHStat2 successfully, your computer system must meet the following technical requirements. -Windows 95, Windows 98, Windows 98 SE, Windows ME, Windows NT 4.0, Windows 2000, or Windows XP operating systems. -Microsoft Excel 97 or later, including Excel 2000 and Excel 2002 (Excel XP). If you are using Microsoft Excel 97, you must have previously applied at least the...

Words: 2040 - Pages: 9

Premium Essay

Business

...and troubleshooting information, please visit http://www.microsoft.com/games/halo/support.asp. CONTENTS A. System Requirements B. Installation Installing Halo Installing DirectX 9.0b SafeDisc Issues C. Getting Help Viewing the Online Print Pieces D. Command Prompt E. Configuration Issues F. 3D Card Issues G. 3D Card Drivers and Manufacturers H. Audio Troubleshooting I. Additional Multiplayer Information Default Ports Network Settings Direct IP Connection Checking for Updates J. Multiplayer Troubleshooting A. System Requirements Halo requires a personal computer with the following minimum requirements. · Multimedia personal computer with a 733 MHz or higher processor. · Windows 98 Second Edition, Windows Me, Windows 2000 Service Pack 1, or Windows XP. · 128 Megabytes (MB) of RAM. · 1.3 GB of available hard disk space. · 8× CD-ROM drive. · 32 MB 3D hardware-transform-and-lighting-capable video display. · Keyboard and Microsoft Mouse or compatible pointing device. · Sound card and speakers or headphones. · DirectX 9.0b (included on CD; see below for installation instructions). · 56 Kbps modem or LAN for online network play. Broadband required to run a server. B. Installation If your computer...

Words: 3041 - Pages: 13

Free Essay

Securing Windows Xp

...Securing Windows XP By Johnise Felder Professor Dawn Smith CMIT 364 Windows XP operating system sets new standards for optimal performance and system reliability. Whether you are a network administrator or just an end-user you can expect to get the most from this system due to its dependable computing and efficient uses. Windows XP operating system was built on Windows NT/2000 technology, which was proven to be more stable than previous operating systems such as 95, 98 or Me (Millennium Edition). Windows XP has a much brighter look and better GUI (graphical user interface) technology. This operating system automatically keeps your PC up to date with the latest security enhancements such as windows firewall that helps to protect your computer from viruses and worms that are spread throughout the Internet. Windows XP also allows quicker access to wireless networks from your laptop and with the built-in Encrypting File System (EFS), found only in Windows XP Professional this provides an additional level of file protection from hackers and data theft by encrypting files with a randomly generated encryption key based cryptographic scheme that encrypts all files in a folder. Users with itinerant profiles can use the same key with trusted remote systems. EFS have some key features that it offers such as, transparent encryption, strong protection of encryption keys, integral data-recovery system and secure temporary and paging files. Most end-users with...

Words: 2078 - Pages: 9

Free Essay

Phd Candiate

...Profile: I'm a researcher in the faculty of graduate studies, Albalqa’ Applied University, Jordan. Also I'm working as Systems Operator in Computer Department and administrate over 22 branches of the company at Jordanian Electric Power Company (JEPCO). I hold B.Sc Degree in Management Information Systems (MIS), Also Master Degree in Business Administration (MBA) from Albalqa' Applied University (BAU). My research interest in the areas of e-Government, eServices, web analytics and business management. I have authored and co-authored several journal papers joint with professionals™ researchers in Ballarat, and Deakin University. Australia. |Personal Data |: |Name |: | | | |Nationality |: | | | |Birth Date |: | | | |Marital Status |: | | | |Gender |: | | | |Address |: | ...

Words: 836 - Pages: 4

Free Essay

Comptia a+ Answers at a Glance701

...Answers CompTIA A+ 220-701 1. A and B 2. B 3. A 4. C 5. C 6. B 7. A 8. C 9. D 10. B 11. C 12. D 13. C 14. A 15. A 16. C 17. D 18. C 19. B 20. C 21. C 22. B 23. A and B 24. C 25. B 26. C 27. D 28. B 29. A 30. D 31. A 32. C 33. B 34. A and C 35. B 36. A 37. C 38. B 39. A 40. A 41. A 42. B 43. A 44. C 45. B 46. A 47. A 48. B 49. C 50. A Answers with Explanations 1. A and B. Peripheral Component Interconnect (PCI) and PCI Express (PCIe) are the most common expansion busses on today’s motherboards. Audio Modem Riser (AMR) was phased out years ago, and Accelerated Graphics Port (AGP) has been succeeded by PCIe x16 expansion bus slots, although you will still see some AGP devices in the field. 2. B. Standard PCI has a 32-bit data path, allowing it to send 32 bits of data simultaneously across the bus. USB sends only 1 bit at a time (serially) and does not work with adapter cards. PCIe is much faster than PCI and behaves in a serial fashion. ISA is an older legacy bus architecture that sends data at 16 bits max. 3. A. While on the job site, limit phone calls to emergencies or if your employer calls you about another customer. 4. C. If it is not life threatening, consult the MSDS to determine the proper first aid (if any). 5. C. 1/8” TRS jacks (also known as mini-jacks) are the most common for speaker connections. Parallel ports are normally used for printers or scanners. VGA is a type of video port. The...

Words: 2377 - Pages: 10

Free Essay

Chapter 7 Solutions

...Review Questions 1. You have just installed a new disk on a Windows Server 2008 server. Which of the following do you do first to prepare the disk for use? Answer: a. partition the disk 2. The _____ partition or volume contains the operating system files, such as the files in the \Windows folder. Answer: boot 3. You have just upgraded from Windows Server 2003 to Windows Server 2008. Now you are trying to recover a set of databases that you backed up on DVDs in Windows Server 2003 before you started the upgrade, but the Windows Server Backup tool gives you an error message. What is the problem? Answer: c. The Windows Server Backup tool is not compatible with backups made from the Windows Server 2003 Backup tool. 4. Your company is considering installing an iSCSI SAN, but one of the department heads mentions that he has heard Windows Server 2008 does not have a management tool for an iSCSI SAN. What is your response? Answer: d. This is not true because you can install Storage Manager for SANs. 5. You are consulting for a company that has been performing full backups every night for its Windows Server 2008 servers. A problem they have been experiencing is that the backups are taking longer and longer. What is your recommendation for this company? Answer: b. Use a custom backup that enables you to use a combination of full and incremental backups. 6. Dynamic disks support RAID levels _____, _____...

Words: 2918 - Pages: 12

Free Essay

Expected Value of a Uniform Distribution

...All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A A PPENDIX Mapping to the CompTIA A+ Objectives A CompTIA A+ Essentials Objectives Map Topic Chapter(s) Domain 1.0 Hardware 1.1 Categorize storage devices and backup media FDD 3 HDD 3, 11 Solid state vs. magnetic Optical drives CD / DVD / RW / Blu-Ray Removable storage 11 3, 13 3, 13 11, 13, 17 Tape drive 17 Solid state (e.g. thumb drive, flash, SD cards, USB) 13 External CD-RW and hard drive 13, 11 Hot swappable devices and non-hot swappable devices 13 1.2 Explain motherboard components, types and features Form Factor 9 ATX / BTX, 9 micro ATX 9 NLX 9 I/O interfaces 3, 18, 20, 22, 23, 25 Sound 3, 20 Video 3 1219 AppA.indd 1219 12/9/09 5:58:26 PM All-In-One / CompTIA Network+ All-in-One Exam Guide / Meyers & Jernigan / 170133-8 / Appendix A CompTIA A+Certification All-in-One Exam Guide 1220 Topic Chapter(s) USB 1.1 and 2.0 3, 18 Serial 3, 18 IEEE 1394 / Firewire 3, 18 Parallel 3, 22 NIC 3, 23 Modem 3, 25 PS/2 18 Memory slots 3, 6 RIMM 6 DIMM 3, 6 SODIMM 6 SIMM 6 Processor sockets 3, 5, 9 Bus architecture 5, 8 Bus slots 8, 9, 21 PCI 8, 9 AGP 8, 9 PCIe 8, 9 AMR 9 CNR 9 PCMCIA 21 PATA 11 IDE 11 EIDE 11 SATA, eSATA ...

Words: 4550 - Pages: 19