IP
Enter a long URL to make Tiny!

What types of backup does NT Backup support?

NT backup utility supports five methods of backing up data on your computer or network.

Copy—Backs up the files you select, but doesn’t mark the files as backed up.
A copy backup copies all selected files but does not mark each file as having been backed up (in other words, the archive attribute is not cleared). Copying is useful if you want to back up files between normal and incremental backups because copying does not affect these other backup operations.

Daily—Backs up the files that changed that day, but doesn’t mark the files as backed up.
A daily backup copies all selected files that have been modified the day the daily backup is performed. The backed-up files are not marked as having been backed up (in other words, the archive attribute is not cleared).

 Differential—Backs up the files that changed since the last backup, but doesn’t mark the files as backed up. A differential backup copies files created or changed since the last normal or incremental backup. It does not mark files as having been backed up (in other words, the archive attribute is not cleared). If you are performing a combination of normal and differential backups, restoring files and folders requires that you have the last normal as well as the last differential backup.

Incremental—Backs up the files that changed since the last backup, and marks the files as backed up.
An incremental backup backs up only those files created or changed since the last normal or incremental backup. It marks files as having been backed up (in other words, the archive attribute is cleared). If you use a combination of normal and incremental backups, you will need to have the last normal backup set as well as all incremental backup sets in order to restore your data.

Normal—Backs up the files you select, and marks the files as backed up.
A normal backup copies all selected files and marks each file as having been backed up (in other words, the archive attribute is cleared). With normal backups, you need only the most recent copy of the backup file or tape to restore all of the files. You usually perform a normal backup the first time you create a backup set.
Backing up your data using a combination of normal backups and incremental backups requires the least amount of storage space and is the quickest backup method. However, recovering files can be time-consuming and difficult because the backup set can be stored on several disks or tapes.
Backing up your data using a combination of normal backups and differential backups is more time-consuming, especially if your data changes frequently, but it is easier to restore the data because the backup set is usually stored on only a few disks or tapes.

FAT vs NTFS

File allocation table (FAT)
A version of the file allocation table (FAT) available in Windows 95 OSR 2 and Windows 98. FAT32 increases the number of bits used to address clusters and also reduces the size of each cluster. The result is that it can support larger disks (up to 2 terabytes) and better storage efficiency (less slack space).

File allocation table (FAT32)
A version of the file allocation table (FAT) available in Windows 95 OSR 2 and Windows 98. FAT32 increases the number of bits used to address clusters and also reduces the size of each cluster. The result is that it can support larger disks (up to 2 terabytes) and better storage efficiency (less slack space).

New Technology File System (NTFS)
(pronounced as separate letters) Short for NT File System, one of the file system for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating systems such as DOS.

For large applications, NTFS supports spanning volumes, which means files and directories can be spread out across several physical disks.

Outlook Web Access – OWA in Exchange 2007:

The Outlook Web Access (OWA) is handy for many users in accessing their email when compared to the outlook client when they are out of their organization, probably when they are traveling different places. They will be able to access their email with ease even though they don’t have the laptop.

Key new Outlook Web Access features:

1.Web ready documents allow opening office docs.
2.Email headers view.
3.Customizable tool bars.
4.Out of Office configuration.
5.Deleted Item recovery.
6.Instant language options.
7.Cleaner Calendar reminders.
8.Multiple calendars and drag gable appointments.
9.Mobile device configuration options.
10.Change password interface.
11.Open other’s mailbox within OWA.

Light vs. Premium Client

Light Version:
1.For non-IE browsers.
2.For slow connections.
3.For older systems.
4.Most secure/best for kiosks
5.Contains basic access to all resource types.

Full Version:
1.More feature-rich.
2.Deeper interaction with mailbox content.
3.Drag and drop.
4.Access to file servers and Share Point.

Public folder in the exchange server 2007:

In Simple words, the Public folder is just like a general forum which is used for posting mails, documents and other common information. Actually, usage of public folder has been overcome by SharePoint portal services. Exchange server 2007 is de-emphasized i.e., there is no change or improvement in the public folder architecture in the 2007 version. Microsoft no more support public folders. This article explains the working of the public folders in the exchange 2007 server.

Public folder function:

  1. Public folder data is kept in the public folder database.
  2. Multiple replicas of a public folder can be maintained on separate servers.
  3. Any sort of folder data can be kept in a public folder.
  4. Public folders can be given their own email address.
  5. You can configure Send-as permission on a public folder.

Public folder Creation:

In the EMC, go to toolbox PFMC – Public folder management console.

#New-Publicfolder –name TESTPUBLICFOLDER –path ‘\’ –server ‘servername’

Assigning PF Permission and PF Email address:

1.Setting Permission can be done from Outlook or the EMS.

2.There are two ways to give admin permission via EMS:

a.Add-PublicFolderadministratorPermission - Per-PF.
b.Add-ExchangeAdministrator - General Admin rights, including to PF root.

3.The easiest way is to use Add-PublicFolderClientPermission to assign ownership

#Add-PublicFolderClientPermission –Identity \TESTPUBLICFOLDER –User USERALIASNAME –AccessRights FolderOwner

4.Check permission of the PF using the Outlook or in EMS with

Get-PublicFolderClientPermission
Set perms with Add/Remove/Set-PublicFolderClientPermission

#Get-PublicFolderClientPermission \TESTPUBLICFOLDER list

5.You can use either the EMC or the EMS to mail-enable a public folder.
#Enable-MailPublicFolder \TESTPUBLICFOLDER

6.Check whether a PF is mail-enabled

#Get-PublicFolder list mailenabled
#Get-MailPublicFolder

7.Send-As Permission can be done in the console.

Hope the above is informative.

Please feel free to contact me for any questions.

The 7 Layers of the OSI Model (PDNTSPA)

The Open Systems Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection (OSI) initiative. In its most basic form, it divides network architecture into seven layers which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data-Link, and Physical Layers. It is therefore often referred to as the OSI Seven Layer Model.

Description of OSI layers
The OSI Model is displayed from top-down (Meaning Layer 7-1) in order to show that the act of transmitting data is not a one-way trip. Once data reaches the Physical Layer (Layer 1) and reaches its destination, it must travel back up the OSI Model (1-7). The only exception to this is that on the way back up, it does not interact with the network layer.



Layer 7: Application Layer
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer.

Layer 6: Presentation Layer
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer.

Layer 5: Session Layer
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

Layer 4: Transport Layer
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

Layer 3: Network Layer
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing.














Get more details about IPv4 subnetting reference (Source - wikipedia)

Layer 2: Data Link Layer 
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking.

Layer 1: Physical Layer
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components.


RECOMMENDED READING:

Enable Telnet on Windows Server 2003

Windows Server 2003 has the Telnet disabled by default (and so good that it does!) To have the Telnet service running on Windows Server 2003 follow the next steps:

1. Go to the Services applet in Administrative Tools (or click Start, then Run, and type "services.msc" (without quotes) and click OK).
2. Find the "Telnet" service, right-click and select Properties, select "Automatic" instead of "Disabled" in the startup type box.
3. Click Apply.
4. Right-click the "Telnet" service and select Start.

5. Click OK.
You can also modify start state and start it from a Command Prompt console by using the following command: "sc config TlntSvr start= auto" and "sc start TlntSvr" or "net start TlntSvr"
Configuration for Pre-W2K/XP/2003 Clients:
The Telnet server requires NTLM authentication by default. To deactivate this and use only password authentication, use the tlntadmn command: "tlntadmn config sec=-NTLM"
Also, switching to streams mode may make display easier for Unix/Linux clients. Do this with the following command: "tlntadmn config mode=stream"

Enabling Telnet Client in Windows Server 2008
Enabling Telnet Client in Windows Vista

Enabling Telnet Client in Windows Server 2008

To install the Telnet client on Windows Server 2008 follow this procedure:
1. Open Server Manager by clicking Start > Server Manager, or by using the My Computer context menu.
2. From the left panel in Server Manager, click on Features.
3. Click on Add Features.
4. From the available list of features, scroll down and select Telnet Client, then click Next.
5. On the Confirmation page, click on Install.

6. Installation of the selected feature will be initialized and started. Once installation is completed, click on Close.
This can easily be done also by typing the following command in the command prompt: "Servermanagercmd –I Telnet-Client"

Telnet is now recognized by Windows Server 2008 and you can start using it to connect to your telnet servers.

How can I disable the Spell Checking option in OWA 2003?

OWA 2003 comes with a built-in spell checker that can help you spell check your outgoing mail in various languages like: English,French,German,Italian,Korean,Spanish. Service Pack 1 for Exchange Server 2003 adds even more language support, including the long-awaited Hebrew spell checking.

1. Open Regedit and navigate to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSExchangeWeb\OWA
Find or create a key called DisableSpellCheckOnSend with the type REG_DWORD.

a. If the value is set to 0x00000001 then users will not be able to select the option to automatically spell-check every e-mail that they send from OWA.

b. If the value is set to 0x00000000 then users will be able to select the option to automatically spell-check every e-mail that they send from OWA.

Note: As with many of the OWA registry parameters, setting this parameter takes immediate effect, no service restarts required.

Configure OWA 2003 Attachment Blocking

How do I configure attachment blocking in Outlook Web Access on Exchange Server 2003

There are 2 levels of file attachments for Outlook Web Access. Level1 attachments have file extensions that are prohibited from accessing by OWA. Level2 attachments have file extensions that can be accessed, but only if saved to the client's file system first.

OWA is installed with a default set of file extensions for the two levels as shown in the following registry keys:

Level 1 attachments
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSExchangeWeb\OWA
Value: Level1FileTypes
Type: REG_SZ
Value Data:
ade,adp,app,asx,bas,bat,chm,cmd,com,cpl,crt,csh,exe,fxp,hlp,hta,inf,ins,isp,js,jse,ksh,lnk,mda,mdb,mde,mdt,mdw,mdz,msc,msi,msp,mst,ops,pcd,pif,prf,prg,reg,scf,scr,sct,shb,shs,url,vb,vbe,vbs,wsc,wsf,wsh
Level 2 attachments HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSExchangeWeb\OWA
Value: Level2FileTypes
Type: REG_SZ
Value Data:
ade,adp,asx,bas,bat,chm,cmd,com,cpl,crt,exe,hlp,hta,htm,html,htc,inf,ins,isp,js,jse,lnk,mda,mdb,mde,mdz,mht,mhtml,msc,msi,msp,mst,pcd,pif,prf,reg,scf,scr,sct,shb,shs,shtm,shtml,stm,url,vb,vbe,vbs,wsc,wsf,wsh,xml,dir,dcr,plg,spl,swf
Attachments listed should be separated by a comma with no space.

How to Restore .BKF Files Using NTBackup in Windows 7

Microsoft haven’t released the NT Backup Restore Utility for Windows 7 yet (should be out soon), as they released for Windows Vista. If you have critical data contained in a NTBackup image (.BKF) and want to restore it in Windows 7, then then followe the below steps.

Restoring a .BKF File Using NTBackup

1. Download nt5backup.cab from Plugins by STSanford. ( or http://www.stsanford.com/pebuilder)
2. Extract the files inside the cabinet file to a folder of your choice.
3. Run the file NTBackup.exe from the folder.
4. NTBackup will indicate that Removable Storage service (removed in Windows Vista & Windows 7). Never mind! This is only required for tape backups. Click OK.

5. In the Welcome to Backup or Restore Wizard page, click Next
6. Select Restore files and settings, and click Next
7. Click Browse. Locate the .BKF file that you want to restore, and click OK.

8. Expand the catalog, select the files/folders you want to restore, and click Next.

9. Click the Advanced button

10. Select Alternate location from the dropdown, and mention the destination path.
 Configure the restore options accordingly.Click Next, and then click Finish.

Note : I have got this solution from winhelponline.com, posted by  Mr. Ramesh Srinivasan. For more details please visit www.winhelponline.com.
    Additional Information | | | |

   #Odisha.Club @everything is here!
   Registry Edits for Windows XP
   How to remove .net software and installation
   Computer Screenshot sites : gur.in ! screenshots.leeindy.com
   Home | Contact Us| RSS | About US | Mail Us | Bookmark this page

Copyright © 2015 ranjanmantri.blogspot.com. All Rights Reserved.