Difference between windows 2003 and 2008

Difference between Windows 2003 and 2008   As I have already discussed about: difference between 2003 & 2008 cluster, New features of DNS 2012, 2008 up-gradation, New windows 2008 R2 DNS features, Difference between Authoritative and non authoritative AD restore. Now, I am discussing difference between Windows 2003 and windows 2008.   Difference between Windows 2003…

HP – Reset iLO Password within Windows

HP – Reset iLO Password within Windows Here, I am gonna tell you to reset HP iLO Password from within Windows if you have administrator login rights to the windows server. This is very useful in case you forget the ILO credentials. You should have HP Lights-Out Online Configuration Utility installed. Please follow the below steps to…

How to Export/Import Local Group Policy

How to Export/Import Local Group Policy Lets say you have a workgroup machine and that has configured some local GPO setting. And, You want to re-install the OS or copy the same policies to  other workgroup machine. So you need to export or save these polices so that it can be re-used. Make sure you…

How to add user in windows through command

How to add user in windows through command   We always get requirement to add multiple users to local or domain. So below are the domain name   To add a new user account on the local computer: net user username password /ADD Example: To add a new user account with the loginid John and with password…

Create windows 7 usb boot disk

Create windows 7 usb boot disk Today I gonna tell you to create a Windows 7 bootable USB drive it will help you to install windows 7/8/2008 without DVD or Disc.   1) Run command prompt (cmd). This can be done by clicking start and typing typing cmd in Windows 7. In Windows Xp, click…

Windows Event Logs Centralization

Windows Event Logs Centralization We always have a requirement to centralized the Event Logs collection so that at one place you can review the logs came from any Windows machine. So, here are the configuration steps we can use to centralized Event logs management through Windows Event forwarding Configuring the Event Collector(s) Configuring Event Collection…

Applying permissions to a Windows registry key

Applying permissions to a Windows registry key This article describes how to change permissions in the registry, in Windows NT/2000/XP/2003/Vista computers. Do not edit the Windows registry unless you are confident about doing so. Before you edit the registry, you are advised make a backup: At the taskbar, click Start|Run. Type ‘Regedit’ and press ‘Return’….

Upgrading your Active Directory to Windows Server 2008

Upgrading your Active Directory to Windows Server 2008 Here is in-place upgrading Windows Server 2003 and Windows Server 2003 R2 Domain Controllers to Windows Server 2008 Domain Controllers. It will also help to installing Active Directory 2008 R2. Installing active directory 2008 might seem like simply feeding the DVD and pressing Next> until your server reboots into Windows…

FSMO Roles

FSMO Roles What is AD FSMO Roles? A regular Interview Question explained below: Windows 2000/2003 Single-Master Model To prevent conflicting updates in Windows 2000/2003, the Active Directory performs updates to certain objects in a single-master fashion. In a single-master model, only one DC in the entire directory is allowed to process updates. This is similar…

How to check Windows Version remotely

How to check Windows Version remotely Oftentimes, we get the requirement to check the Windows Version remotely to reduce the manual work to login and check. So, here are some steps which can help you to check the windows version remotely.   HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion With this you can get only following Versions:Microsoft Windows 2000 (No different between…

List of Port numbers in Windows

  List of Port numbers in Windows Below is the list of TCP/UDP  port numbers being used in windows Port TCP UDP Description 9 UDP Wake-on-LAN 20 TCP UDP FTP data transfer 21 TCP FTP control (command) 22 TCP UDP Secure Shell (SSH) — used for secure logins,  file transfers (scp, sftp) and port forwarding 23 TCP UDP Telnet protocol—unencrypted text…