Premium Essay

Windows Server 2003

In:

Submitted By jokester40
Words 603
Pages 3
Windows Server 2003
This operating system was released in 2003.
Since this operating system was primarily designed for networking and not for personal computer use the user interface was basic and unchangeable. Do to updates, the OS is capable of utilizing some of the Windows XP plus themes and now has a Multilingual User Interface (MUI).
Some of the OS unique features are its use of a distributed file system, support for SAN and iSCSI, Virtual disk service, JBOD systems and Software and Hardware RAID. It also Internet Authentication Service (IAS), network bridging and connection sharing just to name a few.
This OS was primarily designed for setting up a server on large businesses or corporations focusing on file and print sharing, secure internet connectivity, centralized desktop policy management.
System requirements: * 133+ MHZ processor (a maximum of two processors is supported) * 1.25+ GB free hard disk space * 128+ MB of RAM (a maximum of 4 GB is supported) * VGA or higher resolution monitor * One or more network adapters (required for a network based installation) * 12x CD-ROM drive (not required for network based installations) * Mouse, keyboard

Key features * “Headless server operations” This is a feature that allowed you to run without a keyboard, mouse, or monitor. You are able to remotely control and restart the system via a serial connection. * Active Directory Domain Rename—Win 2003 lets you change domain 'DNS and NetBIOS names, This allowed you to create a new domain without having to transfer all of the old objects over. * “Microsoft Volume Shadow Copy Service (VSS)— A volume shadow copy is a point-in-time copy of a given storage location. You use either the Microsoft Management Console (MMC) Disk Management snap-in or the MMC Shared Folders snap-in to enable VSS. This feature provides a better

Similar Documents

Free Essay

Dns in Windows 2003 Server

...Introduction to DNS in Windows Server 2003 There are three scenarios in which your network needs DNS. • Firstly, to find Active Directory resources such as Global Catalog Servers and also Domain Controllers that authenticates Logon or Kerberos requests. • Secondly to locate pages on the internet, • Thirdly, mundane task for example, connecting to a printer share. DNS makes it possible for clients to access network resources using alphanumeric names rather than pure IP addresses. Unlike WINS, DNS is hierarchical, with advent of Windows 2000 DNS became dynamic DNS. In practical terms, it means that clients can update their own DNS Server records automatically, thus reducing the administrative load. The killer reason for implementing DNS is that Active Directory relies on DNS for finding Global Catalog, Kerberos and Logon Servers. Before you install DNS on a production network you need to answer a whole series of questions. For example Will your DNS name match our email domain? Who will be in charge of DNS, you or must you rely on a Unix department? One 'Litmus Test' for a difficult topic is the number of specialist terms a component uses. My rule is the more unusual words and acronyms, the more difficult the subject is to master. DNS passes this ' difficulty ' test with flying colours. For instance you need to understand, Namespace, Authoritative, Recursive, and Incremental to name just a few of the DNS keywords. As you learn about DNS Server watch out for ways...

Words: 336 - Pages: 2

Premium Essay

Comparing Windows Xp, Vista, and 2003 Server

...Comparing Windows XP, Vista, and 2003 Server Comparing Windows XP, Vista, and 2003 for Deployment in Riordan Manufacturing Introduction Riordan Manufacturing will require IT infrastructure upgrades in both server/workstation hardware as well as network and workstation operating systems in order to maintain a competitive edge in the market today. Current operating systems in use at Riordan will either not support or ineffectively utilize resources provided in newer hardware available for procurement. Transitioning to new infrastructure requires a detailed look at the applications required for business processes, the availability and pricing of upgraded software packages to replace current applications, and/or the feasibility of rewriting those applications for modern architectures. The upgrade plan should build as much backward compatibility for older applications as possible, while still maintaining progressive replacement cycles aiding in product support and reliability. Windows XP FEATURES Over the years Microsoft has produced many versions of Windows since 1985. Every version of Windows from 1985 to 1990’s can be considered as a testing phase until Windows 3.0 came out for personal computers. Windows XP Professional integrates the strengths of Windows 2000 Professional. Windows XP offers many enhancements and a reduced total cost of ownership over Windows 2000 while increasing your computer power. Windows XP Professional advanced management and support...

Words: 3011 - Pages: 13

Free Essay

Student

...COURSE NUMBER: ________________________________ INSTRUCTOR: ________________________________ ITT COLLEGE: ________________________________ General Instructions: 1. This is a closed-book, closed-notes Exam. No reference material (including assignments and lab) will be permitted for use during the exam session. 2. The exam contains true/false and multiple choice types of questions. 3. Please use the separate answer sheet provided to you for marking your answers. 4. Each question is worth two points. Good luck! © ITT Educational Services, Inc. Date: 10/10/07 Exams & Answer Keys 1. The most common cause of security breaches is ______. a. no alarm system b. weak passwords c. untrained security guards d. poor perimeter lighting 2. Windows Server administrators should not use the Administrator account for everyday activity. They should use the ________ command, only when performing administrative functions. a. super user b. run as c. task manager d. power user 3. For organizations with wireless networks, deployment of ________ is necessary to vastly increase the security of the wireless access points. a. 802.11G b. 802.11A c. 802.16 d. 802.1x 4. Each object that is referenced in an NTFS system is marked by ________ that limits who can and cannot access a resource. a. an access control entry b. a share-level restriction c. an encrypted key d. an access identity limit © ITT Educational Services, Inc. Date: 10/10/07...

Words: 3277 - Pages: 14

Free Essay

Research

...PAVAN KUMAR Mobile: +1-201-936-2221 Email: partham@nyit.edu Professional Summary: * Having 2 years 5 months of experience as windows 2003/2008 server administrator. * Part of 7active team, responsible for over 50 Windows 7 and Windows 2003 server. * Installation and configuration of Windows 2003/2008 server * Installation of different applications, which are useful for developing for 3D digital content. * Managing Windows Server 2003/2008 product with Active Directory Integration. * DNS, WINS, Disk quota management in windows server 2003/2008. * Providing Active Directory and DNS support based upon request and issues * Creating groups, users and assigning share permissions. * Configuring the switch and assigning the IP to PCs on the network. * Managing the network at client places. * Routine maintenance and clean-up of server file and directory structure. Academic Profile: * B.Tech – Electrical and Electronic Communication Engineering, Vidya Jyothi Institute of Technology affiliated to JNT University, Hyderabad (2008-2012). Experience: Seven Active Technology Solution Pvt. Ltd. as a Admin from November 2012 – April2015. Technical Skills: * Languages : C , .Net, Core JAVA * Operating systems : Windows XP/7/Vista, Windows server 2003/2008 Professional Experience Project 3: Online portal data updating – Sciencetuts.com Project Description: Seven active technology solutions...

Words: 745 - Pages: 3

Premium Essay

Case Structure

... that you have a great deal of knowledge about this, so I’m wondering if you will act as a consultant for me. I have a dental office in town, and we’re running eight Windows XP workstations and a single server running Windows Server 2003. The person who installed this told me that the server is functioning as a domain controller and the eight workstations are members of an Active Directory domain. The workstations each have 1 gigabyte of memory and a 1.8-gigahertz processor. The video cards support DirectX 9 and have WDDM drivers available from the manufacturer. Three of the workstations are located in a warehouse across town, while the other five in the main office run Microsoft Office applications almost exclusively. The server is also located in the main office. There have been problems with sluggish performance on the warehouse computers when they attempt to access server files. My question is—can I upgrade? If so, what edition should I use? Thank you for help! Response: In this scenario, it would be best to utilize Windows 7 Ultimate 32-bit. This system meets all requirements: Windows 7 Ultimate 32-bit meets the required minimum of a 1GB processor, 1GB of system memory, and supports DirectX9. To overcome sluggish performance, Windows 7 Ultimate also has BranchCache. BranchCache is the new Windows 7 feature that is designed to reduce the wide area network (WAN) bandwidth utilized by branch office file sharing and provide branch office users with faster and more...

Words: 284 - Pages: 2

Free Essay

Computer

...Student: Winston Cummings Date: February 28, 2014 Course: NT2670, Email and Web Services Assignment: Week 4 Research Preparing an Organization for Exchange Server The Exchange setup requires a Windows 64 Bit Edition to initiate; therefore using Windows 32 Bit Edition isn't supported with installation on the Management Tools from the Exchange 2007 Installation disk. The 32-bit version is for testing only. Many people like to test server software in a virtual environment before making the production plunge, take note that Virtual Server 2005 R2 does not support 64-bit guest’s virtual machines. Even VMware ESX 3.0 only had experimental support for 64-bit guest operating systems. ESX 3.0.1 now includes full support for 64-bit guests, but this is a recent release. Sure, desktop virtualization packages have supported 64-bit guest OSs for a while now, but the enterprise-variety virtualization offerings are just catching up to this. A transition is the process in which you perform an upgrade to Exchange 2007 that is you move data from any legacy Exchange servers in your Exchange organization to new Exchange 2007 Servers, after which you decommission the legacy Exchange servers. A transition should not be confused with a migration, because unlike a transition a migration is the process in which you move data from a non-Exchange messaging system (such as GroupWise, Lotus Notes or Send Mail) to an Exchange organization...

Words: 489 - Pages: 2

Free Essay

Context

...A KMS C Key Management Service (KMS) 1 Install key 2 3 KMS Host KMS Reference 4 KMS Host Connected LAN (Corporate headquarters) More than 50 client computers One time phone or online activation with Hosted Activation Services For 50 or more computers, use KMS: · Medium organization (50 – 99 computers): 1 KMS host · Medium organization (100 - 249 computers): 1 or 2 KMS hosts · Enterprise (250+ computers): 2 or more KMS hosts The number of KMS hosts required depends on the computer hardware for the KMS hosts, network infrastructure, and products requiring activation. Lab and pilot testing is highly recommended. CMID/Date Stamp 5 · Default activation method for volume builds of Windows 7, Windows Server 2003, Windows Server 2008 R2, and Office 2010. · Each KMS key can activate 6 KMS hosts up to 10 times each. · Each KMS host enables unlimited number of activations. KMS Host setup A · KMS clients are activated for 180 days. · Configurable parameters for the KMS host include Renewal Interval (default 7 days), Retry Interval (2 hours), and Port (1688). · KMS is autonomous (no replication of data between hosts). · KMS activation threshold is cumulative between OS types. Install KMS key on KMS Host using SLMGR command. KMS host is activated with the KMS key using Microsoft’s Hosted Activation Services. KMS Service registers SRV resource records in DNS each time it starts. KMS Client interaction with KMS Host B C 1 Discover...

Words: 776 - Pages: 4

Premium Essay

Resume

...[pic] EXECUTIVE PROFILE Network System Analyst Network System Analyst position for mid-to-large sized company where my technical skills and proven management expertise will further enhance the firm’s reputation for excellence. Security Clearance SSSBI Clearance: Secret Highlighted Accomplishments ➢ Over 20 years experience in the Telecommunications & Information Systems management arena. ➢ Served as Information Systems Security Manager (ISSM/ISSO) and Physical Security Officer. ➢ Diversified technical knowledge in Data Processing Center operations, Information’s Security, COMSEC Security, administration and maintenance of Microsoft & Ubuntu 9.10 Linux client server computer networking. ➢ Retired from the U.S. Navy - Senior Chief Petty Officer Information Systems Technician. ➢ MICROSOFT CERTIFIED SYSTEMS ENGINEER (MCSE) . SPECIALTY COURSES/ TRAINING/ EDUCATION ➢ San Diego State University - Telecommunication Certification program. ➢ Navy's Telecommunication School. (Radioman “A” School} ➢ Communication Security Material System (CMS) School- INFOSEC/ISSM training courses. ➢ Microsoft Networking Engineer Courses, Middlesex County College ➢ ViaSat Linkway and LinkStar – Comprehensive Network Operations Training. ➢ Project Management Training courses. PROFESSIONAL EXPERIENCES Organization: DRS Technical Services, INC, Ft Monmouth, NJ (Deployed Kandahar, Afghanistan/ Baghdad/Tikrit, Iraq) Dates: 05/2005– 06/2009 Position: Network...

Words: 766 - Pages: 4

Free Essay

General Resume

...| | |Spencer Childress | |OBJECTIVE |Young, hardworking, and energetic individual that’s fast learning and seeking new and different job | | |opportunities. Looking for the excitement of traveling around while being part of a team and working with | | |others. | |EMPLOYMENT |International Truck School |January 2010 – | |History |101 North Alameda, Suite 18 |February 2010 | | |Las Cruces, NM 88005 | | | |Phone: 575-523-2266 (Attn: Alex Castro) | | | |CDL Training | | |International Truck school provided...

Words: 736 - Pages: 3

Premium Essay

Management

...Passing | Board/University/ Institute | Obtained Division/Class/Grade | Diploma in Computer Engineer | 2009 | Technical Education Board | 3.19 | S.S.C | 2005 | Barisal Board | 4.69 | Professional Training Courses Name of the Training Course | Duration/Date | Name of the Institute | Headwear Course | Sep 11,2008-Dec 11,2008 | WAAP IT &TELECOM SYSTEM88,East Tejturi Bazar,Tejgon, Dhaka -1215.Akash Nila,(3rd Floor) | Networking (Windows Server 2003) | Sep 11,2008-Dec 11,2008 | WAAP IT &TELECOM SYSTEM88,East Tejturi Bazar,Tejgon, Dhaka -1215.Akash Nila,(3rd Floor) | LANGUAGE SKILL * English (Fluent in Reading, Writing and good in Speaking) & Fluent in Bengali as mother tongue * * CURRICULUM VITAE OF RONI DAS COMPUTER SKILL Operating System: Windows 95/98/XP/2000/7 (Professional/2003 Server/NT). Office Applications: Microsoft Office 97/2000/2003/XP/7. Programming Languages: C++, Visual Basic. Database: Microsoft Access, Microsoft SQL Server. Networking: Windows 2003 Server. Graphics & Design: Adobe Photoshop, Adobe Illustrator, Macromedia Flash, Macromedia Dreamweaver. Setup Package: Install Shield, Setup Factory, Install...

Words: 523 - Pages: 3

Free Essay

Course Project Rough Draft

...September 13, 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course. Course Project When dealing with one main building and six surrounding offices it’s best to decide to keep it as simple as possible. By locating everything in one place, since everyone is on the same domain there’s no need to have more than one of anything except when it comes to redundancy. By adding more mail servers and a more domain controllers it has allowed you to have a backup solution in place in case of server failure. All sites will send and receive messages through the Edge Transport Server this will help control the flow of messages coming and going from the internet. The edge transport server also plays a huge role in protecting the users from spam and viruses. Then from within the hospital, deployed inside of the Active Directory Forest the Hub Transport role much like a mail sorter will be handling all flow of messages from within the domain. Also this is where transport rules and journaling rules are applied and it makes sure all the right recipients receive their mail. All messages going back out through the internet to any recipient of one of the six locations will first have to be relayed by the hub transport server to the edge transport server. All messages being submitted to the transport hub server will be SMTP. Simple Mail Transfer Protocol is used to send messages over the internet or from server to server, by using Outlook users are able to receive these messages. Since...

Words: 2059 - Pages: 9

Free Essay

Computers Senciec

...Curriculum Vitae [pic]   Personnel Information  Name : Hamzah Ali AL-Tbour Address : Amman – Jordan Telephone : 00962796967704 Date of Birth : 20 June 1982 Civil state : married   Education  Secondary High School Section Sicence From Mutah High School BSC in Computer Science From Mutah University in 2004  Training • Network ( windows server 2003 and 2008 , ISA server 2004 and02006 , Exchange server ) • Design of Internet sites on Programming Languages of ASP.NET and PHP  Experience • hava designed a web Site for mutah university registration • from 1 November 2004 till 30 June 2005 instructor at Ram training Center . My job to give training in ICDL , VB.Net , C++ and fornt Page • from 1 October 2005 till Now instructor at Madar training Center.My job to give training in QBasic , C++ , Visual Basic. Net , and Data Base .. • A Technical at CCS , Amman – Jordan , For Two Month • 5 year as a teacher at Public School. • I have 7 years experience in the installation and maintenance of computer equipment from the center of seeped net • Acquired sufficient experience in the installation of computer networks of various kinds, and to identify mistakes and address them. • 3 years experience in the construction of  SERVIR download, and download special programs for SERVIR • Design of Internet sites on Programming Languages of PHP , Three years experience • now work technician Computer networks in al-raad...

Words: 384 - Pages: 2

Free Essay

Network Research Proposal

...Proposed Topology Select one or more topologies to use for this design. This section should be used to provide details of the selected infrastructure or equipment. Include the model, manufacturer, features, and cost. In order to develop a good network layout plan, we have to first understand the layout of the building. The Library and Communication Center is a 50-year-old building. The specifications of the building is as follows: Area | Measurements | Length | 240 ft | Width | 90 ft | Height | 30 ft | The layout of the building is designed to provide the optimum use of the facility in the following way: 1st Floor | 2nd Floor | | | Computer Lab (Room 1,2,4) | Computer Lab (Room 1,2,5) | Server Room (1 server room) | Server Room (1 server...

Words: 1674 - Pages: 7

Free Essay

Bsa/310 Wk 3 Indiv

...consideration should be the inventory focus within Kudler Fine Foods. Inventory remains essential in balancing all spherical points within the Kudler organization. [pic] Characteristics of the System In the opinion of this accounting firm, Kudler Fine Foods needs to purchase software to record, maintain, and report their information. Every organization has several processes with some experiencing more complex than others. If Kudler wants to remain competitive they must make this transition. The current software at the Kudler headquarters is outdated and many of the systems can be automated just by switching use of the current software. Changing the software allows the main location to communicate directly with the central server, back up information, and process payroll direct deposits through the bank for their employees. Customer...

Words: 1103 - Pages: 5

Free Essay

Effectiveness and Efficiency Mobile-Based Applications Provide to Capture Geolocation Data

...Pennsylvania Correctional System Network Project Daniel Stanley Strayer University Pennsylvania Correctional System Network Project This proposal is for a data communication network to serve the Pennsylvania Correctional system. The Pennsylvania legislature recently approved funding sufficient to pay for the development of this proposal. Pending proposal acceptance by the Pennsylvania State Correctional Office of Technology (a department within the state Office of Corrections), funding will be sought to implement the proposal. The proposed network is designed to serve the state Office of Corrections and two of its local district offices. The state office, located in Pennsylvania, contains five departments to be served by this network. Each correctional office contains four departments to be served. The Correctional facilities located in York, 50 miles from the state office. The Correctional facilities located in Harrisburg, about 75 miles from the state office. This network is for administrative purposes and is specifically designed to be independent of officers computing facilities. Objectives of the Network The network is designed to achieve several specific business/operational objectives: 1. Secure Service: The main objective of this network is to provide secure administrative computing service to the State Office and two districts. It is designed to be functionally and physically isolated from access by people not employed by Pennsylvania Correctional...

Words: 1672 - Pages: 7