A New look to Windows Command line tutorial

Feb 22, 2009

Windows PowerShell is a new command line shell and task-based scripting technology that provides information technology (IT) administrators comprehensive control and automation of system administration tasks, increasing administrator productivity.

Windows PowerShell includes numerous system administration utilities, consistent syntax and naming conventions, and improved navigation of common management data such as the registry, certificate store, or Windows Management Instrumentation (WMI). Windows PowerShell also includes an intuitive scripting language specifically designed for IT administration.

Supported Platforms:

  • Windows XP Service Pack 2,
  • Windows Server 2003 Service Pack 1,
  • Windows Server 2003 R2,
  • Windows Vista,
  • and Windows Server 2008.

The main advantage of PowerShell ISE is that you can work within two panes:

  • one for typing commands
  • and one where the output results are displayed.
  • There is a third pane for editing scripts, but you can disable it, so as to have more space for the output pane.

Download Link

READ MORE - A New look to Windows Command line tutorial

Protect your Computer from Virus

  • Use a high-quality anti-virus program, and be sure to update it regularly. Use it to scan any files, programs, software, or diskettes (even new software from a commercial company) before you use them on your computer.
  • Make back-up copies of important documents or files and store them on separate diskettes. Making backups will also protect your information against accidental file deletion, diskette failure, and other damage.
  • Whenever you use a computer in a campus lab, be sure to reboot or run “cleanup” before you start your session and log out when you end your session.
  • Do not share commerical software with anyone. It is a violation of the author’s copyright to distribute such material, and it is a way to spread viruses.
  • When you get public domain (PD) software for which the author has granted permission to make copies, get it from a reliable source. (For example, and individual you do not know is not a reliable source.) Before you run PD material, use an anit-virus program to inspect for known viruses.
  • Always scan your disks and files after using them on another computer.
  • Always scan all files you download from the Internet.
  • Always scan Word or Excel file email attachments before you read them.


READ MORE - Protect your Computer from Virus

Why to Move From One functional level to another

Domain Functional Level

  • Windows 2000 mixed (Default)
  • Windows 2000 native
  • Windows Server 2003 interim
  • Windows Server 2003

Windows 2000 mixed:

  • Supported domain controllers: Microsoft Windows NT 4.0, Windows 2000, Windows Server 2003
  • Activated features: local and global groups, global catalog support

Windows 2000 native:

  • Supported domain controllers: Windows 2000, Windows Server 2003
  • Activated features: group nesting, universal groups, SidHistory, converting groups between security groups and distribution groups, you can raise domain levels by increasing the forest level settings

Windows Server 2003 interim:

  • Supported domain controllers: Windows NT 4.0, Windows Server 2003
  • Supported features: There are no domain-wide features activated at this level. All domains in a forest are automatically raised to this level when the forest level increases to interim. This mode is only used when you upgrade domain controllers in Windows NT 4.0 domains to Windows Server 2003 domain controllers.

Windows Server 2003:

  • Supported domain controllers: Windows Server 2003
  • Supported features: domain controller rename, logon timestamp attribute updated and replicated. User password support on the InetOrgPerson objectClass. Constrained delegation, you can redirect the Users and Computers containers.


READ MORE - Why to Move From One functional level to another

Disaster recovery Plan

Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster.

Disasters can result from events such as

  • hacker attacks
  • computer viruses
  • electric power failures
  • underground cable cuts or failures
  • fire, flood, earthquake, and other natural disasters at a facility
  • mistakes in system administration

An IT disaster recovery plan takes into account the need to

  • detect the outages or other disaster effects as quickly as possible
  • notify any affected parties so that they can take action
  • isolate the affected systems so that damage cannot spread
  • repair the critical affected systems so that operations can be resumed


READ MORE - Disaster recovery Plan

 
 
 
free counters 
HTML Hit Counter