Our documents are based on successfully executed projects which save you time and money.
o-s

Windows 2008 Security Guide

October 3, 2010

Windows 2008 Security Guide Windows Server 2008 Security Guide https://www.bestitdocuments.com/Samples

Img
o-s

Linux System Administration Commands

October 1, 2010

Compression/decompression utilities (software installation): compress <file>                      compress -d <file>.Z (or uncompress <file>.Z) gzip <file>                                gzip -d <file>.gz (or gunzip <file>.gz) tar cvf <device> <files>         tar xvf <device>.tar System Shutdown: reboot halt shutdown [-h now] [-r now] User Management: 1.  To add a user  (a) adduser: add a new user...

Img
o-s

HP System Insight Port Usage

September 12, 2010

HP System Insight Port Usage

Img
o-s

Network Administration on Linux / UNIX

September 1, 2010

TCP/IP Networking origin: ARPANET by the United States Defense Advanced Research Projects Agency (DARPA), 1969 TCP/IP protocol suite ARP, IP, ICMP, UDP, TCP SLIP and PPP Socket Library Networking Hardware Configuration hardware: Ethernet, serial line (RS-232), point-to-point, parallel port device drivers: Ethernet: 3Com, Novell, WD/SMC, HP, D-Link, DEC, …...

Img
o-s

Linux / UNIX Basics

August 27, 2010

Login: login: <user account> password: <user password> Logout: logout exit Ctrl-D File Systems: pwd: print current working directory ls [-l] [-a]: List the contents of current directory File attributes: drwxr-xr-x  2 root  root  1024 Jun 4 17:01 bin/ d: [-dlsbc] -> [file,directory,link,special,block,char] permission modes: user (owner)       ...

Img
o-s

Excellent windows Tweaks and Internal Information

August 20, 2010

Great site for Tweaking Windows and understanding some of the internals. http://www.blackviper.com/

Img
o-s

Windows Service Checks

August 14, 2010

User mode services: Service name :Browser Display Name :Computer Browser Binary Path :E:WINNTSystem32services.exe Service is running in the security context of LocalSystem The Computer Browser contains a denial of service attack where many spoofed entries can be added. There are many occasions when the browse list is requested from...

Img
o-s

Active Directory Structure

August 7, 2010

To understand Active Directory, the reader should have some knowledge of object oriented concepts. It should be helpful to read the Object Guide on this site. Features: · Network resources are easy to find. · Uses group policies for easier administration · Scalability · Flexibility with the ability to...

Img
o-s

Active Directory Sites

July 12, 2010

A site is a grouping of machines based on a subnet of TCP/IP addresses. An administrator determines what a site is. Sites may contain multiple subnets. There can be several domains in a site. Active Directory replication to various sites is performed using Active Directory Sites and Services. (Make...

Img
o-s

Sample System Administration Guide

July 11, 2010

What should be in your System Administrator’s Guide that will help you deploy, support, and maintain applications in your organization. It will also help you create a schedule of maintenance tasks to ensure that systems, servers, databases, and printers, are proactively monitored, audited and secured by your System Administrators....

Img
o-s , visio-stencils

Sample Visio – Unix Kernal Exec Layout

July 9, 2010

Free Sample Document download Unix Kernal Visio Sample  Unix_Kernal.vsd https://www.bestitdocuments.com/Samples

Img
o-s

Active Directory Object Naming

July 3, 2010

Active Directory Naming is based on Lightweight Directory Application Protocol (LDAP) (RFC 1777) and Domain Name System (DNS). Distinguished Name A Distinguished Name (DN) is used to uniquely name an Active Directory Object. All objects can be referenced using a Distinguished Name. A DN has three components:    DC...

Img
o-s

Why Backups alone are not enough

June 3, 2010

Poor policy management No Standards or procedures No indexing or search capabilities Poor segmentation Data is “consolidated” on media haphazardly according to source time and place rather than according to policy Data sharing the same media cannot be truly expired Retrieval requests will bring back unrelated data Unworkable as...

Img
o-s , visio-stencils

Sample Visio – What is a File System?

June 1, 2010

The software used to organize and manage the data stored on disk drives. In addition to storing the data contained in files, a file system also stores and manages important information about the files and about the file system itself. Modern File Systems UFS:  The archetypal Unix file system...

Img
o-s

TOP Spot Directory

May 20, 2010

Excellent search reference. http://www.topspotdirectory.com/ 43 Popular search categories from Art to Weddings www.bestitdocuments.com

Img
o-s

Sample HPUX – AIX Backup- Recovery of User Files on Network Servers

May 10, 2010

Purpose To outline the use of network servers for storage, backup and recovery of user files. Scope Discussion: Employees who have Windows NT accounts also have a file storage folder allocated for their account on a network server.  This storage area is usually referred to as the user’s “U:...

Img
o-s

Big Bytes

May 5, 2010

When you start talking about lots of bytes, you get into prefixes like kilo, mega and giga, as in kilobyte, megabyte and gigabyte (also shortened to K, M and G, as in Kbytes, Mbytes and Gbytes or KB, MB and GB). The following table shows the multipliers: Name Abbr....

Img
o-s

Common DOS/Windows commands and their Linux counterparts

April 24, 2010

  Copy a file  copy path1filename1 path2filename2  cp path1/filename1 path2/filename2  Copy subdirectory  xcopy path1. path2 /s  cp -R path1 path2  Delete a file  del filename  rm filename  Move a file  move path1filename1 path2  mv path1/filename1 path2      Rename a file  ren filename1 filename2  mv filename1 filename2  List a...

Img
o-s , security

MS IE Advanced Settings (8.0.6001.18702)

April 21, 2010

  Accessability Always expand ALT text for images Unchecked Enable Caret Browsing for new windows and tabs Unchecked Move system caret with focus / selection changes Unchecked Reset text size to medium for new windows and tabs Unchecked Reset test size to medium while zooming* Checked Reset zoom level...

Img
compliances , o-s

Legacy Winlogon Initialization

April 16, 2010

During system initialization, before any user applications are active, Winlogon performs the following steps to ensure that it controls the workstation once the system is ready for user interaction: 1. Creates and opens an interactive window station (for example, aWindowsWindowStationsWinSta0 in the Object Manager namespace) to represent the keyboard,...

Img
business , compliances , o-s

Help Desk Support Service Process Analysis Part 1

March 18, 2010

Executive Summary  Purpose The purpose of this document is to outline the business objectives and scope of the Process Analysis effort within Help Desk Support Services (HSS). It is presented to ensure a mutual understanding of the project’s goals, responsibilities, requirements and milestones.  It will be reviewed and updated...

Img
business , o-s

Technology Sustainment

March 18, 2010

In sustainment, the system is in use and evolves through periodic and event-driven maintenance and upgrades. For software-intensive systems, Sustainment presents critical challenges to maintaining the security posture. Maintenance in the operational environment is essential to provide for system restoral in the case of failure and for rapid resolution...

Img
o-s , security

RIS Basic Desktop Framework

March 17, 2010

Purpose of this document: This standard desktop documentation is used in order to keep an on-going record of the software, hardware, and certified non standard software changes made to the IT Desktop Services.  Remote Installation Services Templates Desktop Images Image-name Dell with Windows 7 / Office 2007 Image-name Dell...

Img
o-s , security

Which User Files on your Windows 200x Workstation Should Be Backed Up?

March 13, 2010

Introduction: All PC users are provided with a hard drive in order to store their local data. To assure that important information is not lost in the event disk drive disaster, each person must establish a strategy to back up their own data. “Back up” is the process used...

Img
o-s , security

Startup Apps and Windows 2000-based Services

March 13, 2010

Excellent reference – Searchable, comprehensive list of the programs you may find that run when you switch on your PC: http://www.pacs-portal.co.uk/startup_content.php#THE_PROGRAMS – Full-list ZIP Windows 2000 startup services   Service Full Name Default Alerter  Alerter  Automatic  AppMgmt  Application Management  Manual  ClipSrv  ClipBook  Manual  EventSystem  COM+ Event System  Manual  Browser ...

Img
o-s , security

Assets

March 13, 2010

An asset is anything that has some value to an organization. Asset Identification • It is necessary to determine the assets that need protection, their value, and level of protection required • Two Types: » Tangible » Intangible Tangible Assets • Tangible assets are physical • Examples: » Personnel » Offices, workspaces, warehouses, etc. » Inventory, stores,...

Img
o-s

Help Desk System Assessment

March 13, 2010

Overall Objective [Vendor] Consultant will conduct a working session with all relevant personnel to review Customers goals and processes as they relate to their current Help Desk installation in order to provide specific system and process recommendations. [Vendor] Consultant will spend one day at client site and a second...

Img
o-s , security

How to Stop and Restart the Ace Service on the RSA Service

March 13, 2010

Analysis:             On the RSA Server do:                         ps – ef | greg ace  (lower-case)  – check to see if the ace process is running if not su –             su – ace   “provide password” To start from scratch (note the order):         /var/ace/prog/aceserver stop        1st (stops the ACE...

Img
application , o-s , web-services

Sample Application Server Consolidation

March 12, 2010

File / Print / Utility Servers Ability to provide a more predictable and dense application consolidation which will result in a further reduction of server footprint Save time and money by accelerating costs savings through deeper consolidation Lower the risks involved in a higher density of applications per server...

Img
o-s

Sample Help Desk Consolidation Project

March 12, 2010

The help desk consolidation project will start with an assessment of the existing Help Desk structure, and include the collection of the current staffing model, organization chart, the flow and management of incidents and reporting, review of the tiered support model, review of the volume and types of incidents,...

Img
o-s , security

Windows XP Host Assessment Checklist

March 9, 2010

· Are Physical Security measures in place? · Is the BIOS password protected? · Does the computer Boot from a CD? · Is AutoRun for the CD-ROM enabled? · Is it possible to run Programs from the CD? · Are Operating System Restrictions in place? · Is NTFS enabled on all partitions? · Is File Sharing...

Img