Saturday, June 21, 2014

Tech questions




1. According to the system requirement how do you convince the cx about using 1GB RAM if he is using 512 MB RAM.  Explain about RAM

Answer:
1)      Ram stands for Random Access memory
2)      It is a primary storage device, which helps you to save the accessed application programs temporarily within it.
3)      The more RAM you have on your computer, it will help you to access the computer applications to run smooth and fast.
4)      So we recommend upgrading your RAM to 1 GB to run Rosetta Stone without any issues.

2. How do you differentiate between USB Headset and Analog Headset?
Answer:
A) Analog Headset will have 3.5 mm pin and it is connected to sound card.

B) USB headsets are compatible with Voip calls. Because USB headset enables easy connection, delivers clear digital audio and minimizes background sound for clear audio transmission. Also, it doesn’t need sound card.

3. How can I configure the headset in flash player?
If you want Flash Player to use a different microphone. To display the Microphone panel:
  1. Right-click (Windows) or Control-click (Macintosh) the application image while it is playing.
  2. From the context menu, select Settings, and then click the Microphone tab.
How to configure Headsets in Windows and MAC?
On XP

1) Start > Control panel
2) Select Sounds and Audio devices
3) Click the Audio tab.
4) Under Sound playback, select and adjust your headset speakers.
5) Under Sound records, select and adjust your headset microphone.

On windows vista, 7 and 8.

To configure Sound settings in Windows OS
A) Select Control panel (In windows 8, select More settings)
B) Select Sounds or hardware and sound > Sound
C) Click the "playback" tab to select and adjust your headset speakers.
D) Click the "Recording" tab to select and adjust your headset microphone.

On Mac

A) Select Apple menu > System preferences > Sound
B) Click the Input tab to select and adjust your headset microphone.
C) Click the Output tab to select and adjust your headset speakers.



4. How do you find add-ons in Firefox and IE.
To open Add-ons on IE.
1) Open IE > Tools > Manage add-ons Or Press Alt + X (To open Gear symbol) or Press Alt + T , then click on Manage Add-ons.

In Mozilla.
Tools > Add-ons or press directly Ctrl +Shift + A.

5. How do you correct system time & date?
In windows
Click On start menu > Control Panel > Clock, language and region > Date and time > Set the time and date
Or
User can directly click on the Date and time which is present is present on at the bottom right corner to configure the settings.

On MAC
Click on the time indicator at the top right of your display.
On the dropdown menu click on the Open Date and Time to get to the next step.
Click on the analog clock to move the hands or use the up/down arrows next to the digital clock to adjust the time.
You can also click a new date if you need to change the date due to crossing time zones.
Now click on Save.
If you want, you can click on the Lock icon to prevent changes

6. How do you find services on Win7.  How do you configure RS services in Win7.

On Windows
Start > run > type Services.msc or
Start > Control panel > System and security > Administrative tools > Services. Or
Start > run > type Msconfig > services tab. Or
Launch Task Manager by pressing ctrl+ alt + Del on keyboard > Services.


7. How do you find the system spec on Win7 and Mac.
My computer > Right click > Properties or
Press Windows +Pause break key on keyboard.

On win8, Go to This pc > Properties.

Mac OS X

  • Click the Apple icon in the top left, and select About This Mac.
10. If the autorun doesn't work, where do you get it.
If Auto run doesn’t work. Open My computer > Right click on DVD drive > select Install or autoplay.

12. How do you open a hidden folder without un hiding it?
On windows to display hidden files and folders.
1.      Open Folder Options by clicking the Start button Picture of the Start button, clicking Control Panel, clicking Appearance and Personalization, and then clicking Folder Options.
2.      Click the View tab.
3.      Under Advanced settings, click Show hidden files, folders, and drives, and then click OK.
Or
Open My computer > Tools or At top right side Click on Organize > Folder Options > View

On MAC
1. Open Finder and navigate to Applications → Utilities → double-click “Terminal” to launch it.
2. Type the following command into Terminal without the quotation marks “chflags nohidden ~/Library”  ~means Tild.


13. How do you identify the O/S without checking the system Properties
a) Lock the computer to check the OS (Windows + L).
b) Type winver in run command.
3) type msinfo32 in run command.

15.What are the basic differences between Win Vista and Win 7 ?
In windows 7 we have new six aero themes.
Vista
·  5 Graphics

In WIN 7

Contents




16. How do you select default audio device in Win 7 ?
Perform the task mentioned below to set speaker as default:
1. Go to Start and click on control Panel.
2. Click in Sound, then a new window will open up.
3. In the new windows click on the tab “Playback" and right click in the window and click on Show Disabled devices.
4. Now check if Speaker is listed there and right click on it and choose enable.
5. Highlight that speaker and click on "Set as Default"

18. How do you configure Adobe Flash settings in windows?
Start menu > Control panel > System and Security > Flash Player.

19. How do you adjust the volume for the headset in Win 7
Control Panel > Hardware and Sound > Sound > Adjust system Volume

20. How do you configure a headset?
Control panel > Hardware and sound > Manage audio devices > Recording > Select your Mike > configure > Set up microphone > Headset Microphone > now check the quality.

21. How do you un install the program.
Start > control panel > Programs > program and features > Select the application and click on uninstall.

On Mac
Just drag the application into your Trash -- then EMPTY the trash.

Or
·  Open the "Library" folder on your computer's hard drive.
·  2 Double-click the "Application Support Folder," then locate and delete the "Rosetta Stone" file.
·  3 Open the "Receipts" folder within the "Library" folder. Locate and delete the "Rosetta Stone" file.
·  4 Double-click your "Applications" folder on your computer's hard drive. Drag the "Rosetta Stone" file to the trash to delete it.

22. How do you turn on or turn off the firewall?
Control Panel\System and Security\Windows Firewall\Turn on or Turn off

On Mac
Applications folder>System Preferences>Security & Privacy>click on the "Firewall" tab to bring up the screen shown below>click on the little "Padlock"icon in the lower left hand corner and enter the Administrator password for the system to unlock it>turn the Firewall "Off":

23. How do you add an exception to antivirus
Open Antivirus > check for exclusion or allow programs options > Now browse for the application > Ok.

24. How do you download a file from a hyperlink 
Just click on the Link or copy and paste the link in the browser and press enter.

25. How to delete cache and cookies on all browsers ( IE, FF & Chrome)
Ctrl + Shift + Del will work in any browser.

28. What are windows services?
A Windows service is a computer program that operates in the background.

29. How do you open task manager and what are different ways
There are three ways to open Task manager.
Right click on Task bar and open task manager.
Ctrl + alt + del
Ctrl + shift + Esc

30. What is task manager and what is the function
Task Manager shows you the programs, processes, and services that are currently running on your computer. You can use Task Manager to monitor your computer's performance or to close a program that is not responding.

32. please specify the shortcuts related with the "windows" key on keyboard
Manage Multiple Windows?
Win+d
Minimize all windows on all Monitors. Press again to restore previous state
Win+m
Minimize all windows on current Monitor
Win+Shift+m
Restore previously minimized windows on current Monitor
Win+Home
Set all windows to Minimized on current Monitor except active
Win+Space
Preview Desktop / make windows transparent (May not work with all Settings)

Win+e
Start Windows Explorer (in My Computer)
Win+r
Open the Run window
Win+f
Open Windows Search. f3 on empty desktop works, too.
Win+l
Lock the keyboard/ computer
Win+F1
Display Windows Help
Alt+Shift
Change keyboard language layout if multiple language layouts are active*
shift when inserting CD or DVD
Prevent CD or DVD from automatically playing
Win+p
Choose Presentation Display Mode
Win+x
Open Mobility Center

win or ctrl+Esc
Activate Start Button. Then use arrow keys, space and enter to navigate within Start Menu
Win+t
Go to first item in taskbar, continue with arrow keys
Win+b
Go to first item in system tray

********************************************************
34. what are cookies what is RAM
A cookie is a text file containing information that can be remembered by a web browser between pages. When an individual uses a web browser to access the internet their browser can create cookies which are stored on the user's computer.
They are purely a string of text and numbers.
There are two main types of cookies - session cookies and persistent cookies.

39. What are add ons
Add ons are third party application which is installed on the browser to enhance and functionality of the browser.

45. Be prepared on what u have mentioned on your Resume

46. Headset, latest browsers and what is your Fav browser and why u like it so much.
Firefox 30.09 Beta
Google Chrome 37.09

---------------------------------------------------------------------------------------------------------------------------------------------------------------------
57.What is the physical difference between USB headset and an analog headset ?

58. Latest version of MAC and latest browser ?


59. Latest iOS on phones ?
iOS 7.1.1, released on April 22, 2014;

72.What are service packs available and why are they important for Windows?
A service pack (SP) is a Windows update, often combining previously released updates, that helps make Windows more reliable. Service packs, which are provided free of charge on this page, can include security and performance improvements and support for new types of hardware.


What are cache and cookies?
The cache stores data from websites so you can load pages faster but on occasion the cache gets full and needs to be emptied.

cookies are simply bits of software placed on your computer when you browse websites. Cookies will stores the information like username, password and your searches in a simple file in the browser.

77. kinds of windows operating system?
DOS, 95, 98, 2000,  win me,  Xp, vista, win 7, win 8, win 8.1

89. How do you check the Processor Speed?
Device manager, system properties


90. What is the use of Adobe Flash Player?

Adobe Flash also called as Macromedia Flash and Shockwave Flash.

* It is a multimedia and software platform used for creating graphics, animation, games and Internet applications (RIAs) that can be viewed, played and executed in Adobe Flash Player.
* Flash is frequently used to add streamed video or audio players, advertisement and interactive multimedia content to web pages.

91. What are the reasons for system crash and what you do if it's crashed?

There are various reasons for system crash:
1) It can be related to software not meeting system requirements OR Software or Antivirus conflicts OR Hardware device failure. I.e Ram, PCI Cards (Sound or Lan card) etc.

To resolve we can boot into safe mode by restarting the computer.

* At booting tap continuously  F8 key on keyboard and select SAFE MODE option.
* Once you get the desktop screen. You can restore the computer to an earlier time OR
* Uninstall the Recently added softwares, Unwanted softwares, Scan with antivirus (I.e with Malware or Spyware) for viruses or remove any recently added hardware devices.



92. We insert the App disc and there is an error reflecting on adobe Flash, what will you do?
If you are prompted with need flash pop-up message. Then it clearly states that you need Adobe flash player for that application.
** Download the Flash player by typing this link www.adobe.com/support/flashplayer/downloads.html 
in browser. OR open google and search for Adobe flash player download.
  
93.The headset is connected but we are getting the sound from speakers. 
Here we need to understand that Operating system selected other speakers as default. So, we need to change this setting and make the headset as default speakers.
For configuration please refer to Question # 16.
94.  Where would you find the crash logs and reason for crash?
We can find the reason for the crash by going into Event viewer or Reliability.
*Press the start button, type "reliability" in the search box, click on reliability history.

If that does not help then, click on the start button then right click on computer and select manager. Go to the event viewer and see if it lists the problem

 95. How to check your Computer Performance ( RAM and CPU Usage)?
Simply by going into TASK Manager (Ctrl+Alt+Del or Ctrl+shift+ESC or Right click on Taskbar, select task manager), click on Performance. There you can see exactly does your OS using total RAM and CPU.
96.How many Service Packs are there and their usage?  
For windows XP we have upto SP3.
For Vista we have upto SP2.
For WIN 7 we have upto SP1.
For WIN 8 we currently have 8.1 update.

But why Service packs are released:
Service packs is a bundle of patches, fixes, security, performance and other new features. 
* In detail A service pack (SP) is a Windows update, often combining previously released updates, that helps make Windows more reliable. 
* Service packs are provided for free of charge as update, which includes security and performance improvements and support for new types of hardware. Make sure you install the latest service pack to help keep Windows up to date.

If you have any more questions or need help or would like to provide any feedback please post in comments. Thank you :-)



Monday, June 2, 2014

AD Rights Management in Server 2008.

* What is Rights Management?
* Some Additional Notes abouts RMS

What happens with AD RMS?
1) User1 receives a "Client licensor certificate" the first time he rights-protect a word 2007 file he's created.
2) Then Users1 defines a set of usage rights and rules for his file. Word 2007 creates a "Publishing license" and encrypts the file.
3) User1 emails the file or puts in on share drive.
4) User2 clicks the file to open. Word 2007 calls to the RMS server which validates the user and issues a "use license."
5) Word 2007 opens the file and enforces whatever rights User1 put on int.

Additional Notes about RMS:
* The application that creates the file must be RMS-aware (Office 2007 is a good example).
* The rights assigned to the File travel alongs with the File.
* If somebody isn't on the list of users who can open a file, they can't get into the file.
* The Certificates that are used in RMS are not dependent on AD Certificate Services- they're created and issued by the RMS Server, not a Certificate Authority.
* AD RMS in Server 2008 supports AD Federation Services, and it can be used with SharePoint deployments as well.
* There's fantastic reporting Tools built into the AD RMS in Server 2008 for auditing who's accessed the document, who failed to access a document, etc.

RMS in a Nutshell:
* Rights Management Service requires an RMS Server, a SQL Server, and a AD DS Domain Controller, and an RMS-aware application (Office 2007).
* The Author of a document sets up who gets to do what on a Document, and they do that from inside of the RMS-aware App (like Word 2007 or Excel 2007) based on Users and groups from AD.
* You don't need an separate AD Certificates Services system for RMS.
* It works with AD FS and SharePoint.
* There's seriously cool tools to audit who's had access to the protected files.

Active Directorty Lightweight Directory Services in Server 2008

*What is AD LDS?
*What might it look like on a Network?
*What is an Instance of AD LDS?


*
Active directory lightweight Directory services (Formerly known as ADAM) - Active Directory Applications Mode) is a server role that provides LDAP services.
*You'll only need it if you're installing Applications, like network-aware commercial apps and open sources web apps that relly on LDAP to authenticate users and provide permissions to aspects of the specific application.
*It usually lives on a server separate from your AD DS (Sometimes the same server as your Application), and can also be installed on Server Core!

What is an Instance of AD LDS?
Think of it as a Copy in RAM
* An "Instance" of LDS is just a running copy of AD LDS that uses a particular "Store" of data.
* You can have multiple instances of LDS running on the same AD LDS Server, all with their own unique Schema definations.
* You could have multiple instances of LDS running for multiple applications, all instances being customized for the unique application requirements.
* Management Tools for LDS:
- ADSI Edit
- Event Viewer
- LDP.exe
- NTDSUTIL - Command Line
- LDIFDE - Command Line
- DSDBUTIL - Command Line
- DSACLS - Command Line

AD LDS in a NutShell.
* AD Lightweight Directory Services is a Server Role that allow LDAP Services.
* You'll only need it for applications that require it.
* You don't needs AD DS for it, although it can work with AD DS.
* When you install AD LDS, you need to also Create an Instance of LDS (A running copy)
* Most of the tools you would use for AD LDS are command line based, but there's a few that have a GUI, like ADSI Edit and Ldp.exe.

Friday, May 30, 2014

Active Directory Certifcate Services and Public key infrastructure in Server 2008.

In this class
*Lets talk Security
* Lions and Tigers and keys and Certificates
* Respect my Authority

*Security In networks is a huge area, but a good place to start is by using Certificate Services as a way to:
- Encrypt Data files
- Encrypt Remote communications
- Secure Email
- Secure Logons with Smart Cards
- Secure Servers with network Access protection (Require Certificates)
- Protect Data from Tampering

So, thats neat and all, but what is Certificate?
* A Certificate is a file that contains
- A public key for encryption
- A Digital Signature for identify verification
- A name, which can refer to a person, a computer or an organization.
- A validity period
- The location of a revocation center (Usally a URL)

* Its used to both encrypt files and communications as well as prove identify.
* A certificate is generated by a certificate authority (Thats a CA if you're cool) using a Private key, which part of a whole Public Key infrastructure.

The Certificates have to come from somewhere

1) Server 2008 Standalone Certificate authority
2) Server 2008 Enterprise Certificate Authority (Integrated into AD)
3) Third party certificate authority (I.e Verisign etc)

* Certificate Authority (CA) Servers that generates certificates are called "Root CA's"
* Certificates are generated from one of these three types of certificate and then passed on to users, devices, other servers and so on.
* Certificate authorities also can provide verification of a user's or organization identify with online responder services.

Multiple Tiers provide Multiple levels of protection
* Usually you'll have more than one machine actually doing certificate services.
* With a Standalone CA, you will create certificates and then pass them off to issuing servers. Then you will take the standalone offline.
* Pretty much all the work is done manually with a standalone CA. You can't just have it autoenroll users.

Enterprise CA's stay online, and need to be highly available
* With an Enterprise CA, it stays online all the time and is integrated with AD.
* Enterprise CA's can assign certificates automatically to uses in AD using Auto enrollment.
* At least a second tier is still a good idea, and you may have more depending on your security needs.

CRL's, NDES's, and OR's - Could I vague it up even more?
* When a certificate is presented by a user when attempting to access an encrypted file or whatever has been secured, the certificate is checked against a Certificate Revocation list (RCL) by a certificate Authority to make sure it hasn't been revoked.
* An Online Responder (OR) can be used in place of a Certificate Authority server. An Online Responder (*new* in server 2008) doesn't need to check the certificate against an entire RCL, and instead just checks to see if the certificate is valid. It's much faster and efficient.
* Network Device Enrollment Service (NDES) allows you to include routers and switches in yuor PKI hierarchy if you really think you need it.

AD CS in a Nutshell
* AD Certificates services allow you to secure just about anything in your network,.
* You need at least one Root CA to create certificates, and will probably have other subordinate servers issue them out to protect your Root CA from getting abused.
* Certification Revocation lists allow for validation of certificates by CA server when they are used, but the new online responder service available in AD CS as of Server 2008 is faster and more efficient.
* The new Network Device Enrollment Service (NDSE) allows you to include switches and routers in your PKI as well.



DNS Stuff in 2008

In this class
*A Quick Overview of DNS
* What are DNS Zones really?
* The Different kinds of DNS records
* Forwarders and Roots Hints
* Globla Names Zones : The WINS Killer (Kind of)

*Domain Name Servcie (DNS) is a server 2008 Role thats basically a big phone book allowing users and computers to look up a Hosts IP address by using a Host name.
* The process of locating a computer via an IP address by looking it up by name is called Name Resolution.
* When computers (or Hosts) get assigned IP address by DHCP or by an administrator, they register their name and IP address with a DNS Server.
* The computer can now be found through the process of Name Resolution, and AD can now find users, computers, and other hosts by working in Conjuction with the DNS server.

What are DNS Zones really?
* A DNS zone is basically a Text file or Database that defines what machines it knows about in the "Namespace".
* There are 4 basic types of Zones you need to know about :
- * Recommended for Server 2008*
AD integrated Zone : DNS database is stored as an AD Object. No need for secondary Zones if all your DNS Servers are also DC's.
- Primary : Used in a Standalone DNS Server, it acts as a Master DNS Server that records and reads info.
- Secondary : A read only copy of a primary Zone. Must copy zone files from a DNS Server that has a primary zone.
- Stub : Only contains informations about other DNS Servers.

Why An AD integrated Zone?

* Let AD manage a lot of the DNS stuff for you!
* AD integrated Zones allow for :
- Zone transfers during AD replication
- Multimaster Replication
- Secure Dynamic Updates
- Backwards compatible to Secondary Zones (If you have any in your network)
* Forward Lookup Zones : Looks up a host IP address by name.
* Reversse lookup Zones : Looks up a host name by Ip address - used mostly for security and error checking.
* Conditional Forwarders : Used in place of Stub Zones to forward DNS requests about other Domains.

The Different Kinds of DNS Records


What contains in a DNS Zone?
* A (Host) : Name and IP address of a Host (Computer, network printer, PDA, etc)
* PTR (Pointer) : A record in a Reverse Zone.
* SOA (Start of Authority) : The begining record of a zone.
* SRV (Service Locator) : For Servers and Service Providing hosts.
* NS (Name Server) : A record that points to a DNS Server.
* MX (Mail Exchanger) : For Email Servers
* CNAME (Alisas) A "nickname" record that allows for multiple names for the same machine.

Forwarders and Root Hints:
* Root Hints allow your DNS Server to communicate with Name Servers on the Internet.
* A Forwarder can act in the place of root hints if your security requirements are higher.
- you need two DNS servers for this - One on the inside of your network perimeter that doesn't use Root Hints and one on the permiter that does.
- Internet DNS requests are forwarded out to the perimeter DNS Server by the internet DNS and then brought back in.

WINS
* WINS is an older technology that allows you to use NetBIOS for some Resolution.
* Most WINS server technology is being replaced by DNS for speed, reliability, and security.
* Global Name Zones are a NEW feature of Server 2008 for Single label Name Resolution.
* Use it for easy access intranet websites, and a potential replacement for WINS if you have older network-aware software applications still running that require WINS (Especially if you're rolling over to IPv6)
* WINS is still available on Server 2008 as a Feature (Not a role) if you need it.
* On your primary DNS Server, run this command to prepare your  DNS for global names:
dnscmd/ config /enableglobalnamesupport1
* Then create a new forward lookup zone called GlobalNames.
*Add CNAME Records for any web site or machine you want to have single lable resolution for.