Archive for October, 2011:

Why I’ve finally had it with my Linux server and I’m moving back to Windows

This is a rant. But I’m so angry and frustrated right now that you’re just going to have to live with the rant. And, for you Linux people, you who know it all and look down upon the people who don’t spend day and night breathing in the insane arcana of all the little fiddly bits that make up modern distros, I have this to say: I don’t have your kind of time.

I’ve had it. I’ve had it with all the patched together pieces and parts that all have to be just the right versions, with just the right dependencies, compiled in just the right way, during just the right phase of the moon, with just the right number of people tilting left at just the right time.

I’ve had it with all the different package managers. With some code distributed with one package manager and other code distributed with other package managers. With modules that can be downloaded on Ubuntu just by typing the sequence in the anemic how-to, but won’t work at all on CentOS or Fedora, because the repositories weren’t specified in just, exactly, EXACTLY, the right frickin’ order on the third Wednesday of the month.

MCTS Certification, MCITP Certification

Microsoft MCTS CertificationMCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

I’ve had it with all the different shells and UIs. With builds and distros that won’t even launch into a UI until you’ve established a solid SSH connection, downloaded all the parts, recompiled the package manager, and then — while the network connection happens almost like magic — still need to completely set up a remote monitor screen by tweaking yet. Another. Frak-lapping. Ini. File.

I’ve had it with the fact that this stuff doesn’t work reliably. Oh, sure, if you work with Linux every hour of every day, if this is all you do, and all you love, if you’ve never had a date since you grew that one facial hair, if you’ve never had any other responsibility in your entire life, then you know every bit of every undocumented piece of folklore. You know which forums and which forum posters have the very long and bizarre command line that only. That. One. Guy. Knows.

And you know that if you type that command line in on, say, Distro version 4.3, it’ll work, but it’ll break miserably on version 4.3a, because THAT version requires a completely different entire program, packaged with a completely different package manager, and THAT command line sequence can be gotten by getting on just the right IRC channel, at just the right time of night, and talking just the right way, to that one incredibly self-absorbed luser who happens to know that you need to put the undocumented -lM in front of the fourth parameter.

And woe be it to the unfortunate fool who gets the capitalization wrong, because putting an -Lm in front of the fourth parameter does a completely different, and even further undocumented, and possibly dangerous-to-the-entire planet sort of thing, because, well, “you shoulda known!”.

Why have I had it, you ask?

I’ve had it because after spending months jumping through all those hoops, and more, feeling like I had to pass through all four levels of Ninja Warrior and climb to the top of Mount Midoriyama, just to be allowed to launch frickin’ VNC in a GUI or load the backup program I use on all the other machines on my network… after all that, the stupid, horrible, nasty, back-stabbing, disloyal, hodge-podge, disorganized, unsupervised, chaotic craptasm that’s called Linux… after I got the whole thing working, it crashed.

Oh, and it didn’t crash easy. See, I was done. I was getting ready to deploy my server. I just wanted to do a last-minute update because I’m a good frickin’ doobie and I do my updates. So when Gnome said there were updates to apply, I said okay.

Can you imagine my rank naivety here? I actually said Okay to a Linux update. I know I should have known better. I know I should have, instead, formatted another hard drive, dd’d my furry little pile of files over, downloaded the source tarball, compiled everything all over again, prayed to Linus, turned my back to Redmond, and built my entire operating system up from scratch, just to install some security updates.

But I didn’t. I figured that after all these years, Linux was finally robust enough to not rip me a new one because I just wanted to run a server and keep it up to date. Silly me! Silly, silly me!

So I ran the update process. And it died. Abnormal exception.

And there went all my work and all my time. Down the drain.

Now, it won’t boot.

Worse, the box is co-located at my ISP, so I had to make a begging plea, requesting they please rebuild my drives and please reinstall my OS. I’m fortunate it was still a box in staging, that I wasn’t running live systems on it, or I’d be completely and totally screwed, rather than just pissed off to the point of spitting.


Continue Reading

Why Microsoft’s vision of the future will really happen

Two videos from Microsoft show the future of technology. Here’s why I think they’re dead-on

Computerworld – Microsoft released a video in 2008 and another one this week that together predict the sleek, wireless, connected gadgets we’ll all enjoy by the year 2019.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

In one scene, two businesspeople each place a smart object on a smart table — a keychain fob and a flat phone or smartcard of some kind. From these devices, out spills their data, which can be manipulated on the table. The same thing happens at home, where a girl’s homework spills out onto the kitchen table, and cookbook instructions spill out onto the kitchen counter.

Data and documents can apparently be transferred from anything to anything else. One business-related example involves a drag-and-drop gesture from a desktop to a mobile device. In another scene, that same mobile device becomes a virtual keyboard for a desktop computer the user happens to be sitting at.

Another example shows a man “capturing” with a kind of take-a-picture gesture using a clear-glass remote control then moving data from a wall-mounted device and dumping it out onto his e-newspaper.

Videoconferencing has been perfected. What looks like a glass window into another classroom is actually a live, big-screen video chat connecting schools in India and Australia. In one scene, two children interact with each other, each speaking a different language instantly translated with cartoon-like speech bubbles.

Intelligent agents pay attention to what’s going on. The kids fingerpaint a dog onscreen, and the computer recognizes the image and animates it accordingly.

One very cool and versatile device shown in the video is a smartphone, a card-like gadget so thin that a woman uses it as a book marker. The card functions as a boarding pass, an airport map, a calendar, an augmented reality window, a 3D holographic display and more.

The phone splits into two halves about the size of playing cards, with one “card” displaying live video and the other held up to the ear for videoconferencing on the go. It even projects some kind of laser beam arrow on the ground, telling Mr. Future Businessman where to go.

Everything is connected to everything. Intelligent agents make decisions about when to inform the user about relevant data.
Why these are great predictions

Everything in this video is being worked on, refined and developed. If you follow current trends for compute power, display technology, networking speeds, device miniaturization, flexible displays, touchscreens, gesture technologies and others, you get this Microsoft future.

And Microsoft itself is working on much of this. The intelligent displays are really just advanced versions of what’s possible now with a Microsoft Surface table. The in-air gestures are advanced versions of what Kinect for Xbox 360 users are already doing.

Industrywide, displays are getting bigger while devices are getting thinner and lighter. Companies have already developed versions of clear displays, augmented reality systems and all the rest.

The past four years have ushered in thin multitouch tablets supporting gestures and intelligent agent voice technology.

Although breathtaking to look at and consider, everything in Microsoft’s videos are fairly conservative predictions based on existing products or technology actively being developed.
Why Microsoft won’t build it

There tends to be little connection between companies that envision the future clearly and those who build it.


Continue Reading

Microsoft: Android is standing ‘on the shoulder of companies like Microsoft’

Google is standing ‘on the shoulder of companies like Microsoft who made all these billions of dollars in investments‘ with its Android mobile OS, claims Horacio Gutiérrez, deputy general counsel in charge of Microsoft’s intellectual property group.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Gutiérrez makes this claim in an interview with SFGate.

 

Speaking in relation to the huge amount of litigation currently going on between mobile device players, Gutiérrez said that ‘there is a period of unrest and a period of readjustment, until the claims on the ownership of different pieces of technology are well known’ and that licensing and cross-licensing is required to make these problems ‘disappear into the background.’

Gutiérrez also believes that ‘licensing is not some nefarious thing that people should be worried about’ but instead ‘the solution to the patent problem that people are reacting so negatively about.’

Gutiérrez goes on to defend the software patent system, claiming that ’many things that earlier were implemented in hardware …  are now implemented in software’ and that the ‘patent system has actually played a role in securing the leadership that the United States has in this field.’


Continue Reading

Why no front-facing camera on first Windows Phones from Nokia?

As I noted in a Nokia World blog post from earlier today, there are no front-facing cameras on the Lumia 800 or 710 Windows Phones.

The big question among a number of attendees here is: Why not?

The answer, according to at least some Nokia representatives with whom I spoke at the show, is there just wasn’t enough time to add it to the handsets.

MCTS Certification, MCITP Certification

Microsoft MCTS CertificationMCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

Nokia has been hustling for months, trying to get its first Windows Phone out the door before the end of 2011. Even though Nokia knew Microsoft was in the midst of acquiring Skype — making the need for a front-facing camera all the more urgent, one might think — there were only so many things Nokia could pull off if it wanted to get its first phones out this year, representatives from the company said. (There were only so many things the company could manage in a relatively short amount of time is how one Nokia rep explained it.)

I’ve asked via the official channels whether there is a corporate statement from Nokia as to why there isn’t a front-facing camera, but no word back yet.

Does the omission from the Nokia Lumia 800 and 710  mean there won’t be a front-facing camera on Windows Phones that are part of Nokia’s “portfolio” of products due in the U.S. in early 2012? No. But it also doesn’t guarantee that any of the next Nokia Windows Phones will include those cameras, either.

Given that the N9, which is very similar to the Lumia (except that it runs MeeGo) does have a front-facing camera located at the bottom of the phone), I wondered if there might be something in the Windows Phone operating system that hindered Nokia’s inclusion of a front-facing camera. That doesn’t seem to be the case, however — especially given the new HTC Titan and Radar Windows Phones do include front-facing cameras.

Neither Nokia nor Microsoft officials are sharing dates as to when the first Nokia Windows Phones will launch in the U.S., beyond saying it will be in early 2012. Nokia has said there will be CDMA and LTE Windows Phones next year but also won’t provide more specific dates or names of which carriers will be offering these phones here in the U.S.

A Nokia spokesperson did say that there are reason Nokia decided to roll out its first Windows Phones in Europe and Asia before the U.S. Those reasons include brand preference (i.e., Nokia has more loyalty/brand recognition in those areas than the U.S.); language support; and giving priority to “markets where we expect to be popular”).

I’ve also been wondering whether Nokia is planning its U.S. launch around Tango, the next version of the Windows Phone operating system that comes after “Mango.” No one from Microsoft — not even Windows Phone Corporate Vice President Joe Belfiore (pictured above) — is publicly acknowledging the Tango codename (beyond drinking Tango soda here at Nokia World). But given that Tango 2 supposedly will help Microsoft and Nokia get the Windows Phone OS on lower-priced handsets, perhaps there’s a connection there and Nokia is waiting for Tango before launching its full U.S. line-up….


Continue Reading

Mozilla and Microsoft release custom Firefox with Bing

Microsoft and Mozilla have announced a special release of Firefox that integrates with the Bing search engine. The build, which is called Firefox with Bing, is available for users to download from a Microsoft-hosted website.

 

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

When Firefox 4 was released last year, it added Bing as one of the available options in the browser’s built-in search box. Google remained the default, but Bing became easily accessible to users who prefer Microsoft’s search engine. Microsoft and Mozilla also took the opportunity to establish a revenue-sharing agreement around the search integration.

The new “Firefox with Bing” browser sets Bing as the default search engine and comes with Bing configured as the start page. These changes are tied to the special version of the browser and won’t impact the current defaults in regular Firefox releases. Users can also optionally install the Bing Search for Firefox add-on to get the same features in a regular Firefox build.

Mozilla has previously released a number of similarly customized Firefox builds in collaboration with various partners. For example, they released a special version of Firefox with Twitter integration earlier this year. Mozilla has been expanding its relationships with commercial partners over the past year, leading to some unexpected tie-ins. The release of Firefox with Bing is merely the latest development.


Continue Reading

Windows Media Center pops up in Windows 8

Windows Media Center has finally made its appearance in Windows 8.

Users at the My Digital Life forum apparently discovered the application in the latest pre-beta build of Windows 8, dubbed 8141. One poster said it seems to be the old Windows 7 version, while WinRumors noted that it appears to be a standalone desktop app.

The debut of Media Center in the latest Windows 8 build should comfort users who noticed that it was missing from the earlier builds. In response to concerned feedback sent to Microsoft, Windows Live President Steven Sinofsky confirmed in an early September blog that Media Center would indeed be part of Windows 8.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft decided to leave out certain features from the initial builds, including Media Center, games, DVD creator, upgrade setup, and .NET 3.5, to make sure they weren’t rushed out half-baked.

“Knowing how strong the support for Media Center is among pre-release testers, we still have work to do to make sure the quality and compatibility with add-ins is what you would expect even in pre-release,” Sinofsky noted.

Offering access to movies, music, photos, TV, and other content all in one place, Media Center seems to have its share of devoted fans. “The feedback about Media Center was predominantly ‘we will pay extra, just include it’ based on the input directly to me,” Sinofsky said, adding that Microsoft is as committed as ever to the feature.


Continue Reading

Black Duck refines its code search engine

Black Duck Code Sight 2.0 code search tool includes LDAP connectivity and the ability to filter results, and it can run on Linux and Windows servers

Black Duck Software has revamped its software code engine so that it indexes more quickly and filters the results, the company announced Wednesday.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Black Duck Code Sight 2.0, out now, is also the first version of the software to run on Linux servers, in addition to being able to run on Microsoft Windows servers.

[ Keep up with software development issues and trends with InfoWorld’s Fatal Exception blog and Developer World newsletter. ]

Using Code Sight “is like searching on a regular search engine, but the content and indexing is specialized to code. We parse and index the raw source in code-specific ways to identify things like method definitions and classes,” said Jim Berets, Black Duck vice president of product management.

Code Sight indexes all the code that is embedded in version control systems or that is otherwise available on an organization’s network. It offers an interface for developers to search for chunks of code that they could consult or reuse in their own projects. The company is marketing the software to organizations with code reuse initiatives put in place to save money and time.

Code Sight can index code within many different types of version control systems, including Git, CVS (Concurrent Versions System), Mercurial, Subversion, AccuRev, IBM’s ClearCase, and Microsoft’s Team Foundation Server. It can be accessed through the Eclipse or the Microsoft Visual Studio integrated developer environments, or with a browser.

This version of the software can index code bases four to six times as quickly as the old version did, according to the company. The improvement came about due to a number of reasons, Berets explained. When the company’s developers ported the software from Microsoft Windows to Linux, they optimized the code in a number of places in a way that should make the program run more efficiently. They also migrated to the latest versions of the underlying search software, Apache Lucene and Solr.

The new version also includes filtering technologies. It can filter results by the programming language, file names, method names, fields, or a number of other attributes.

The software’s ability to manage user roles has also been augmented. The software can now interface with user directories that can be accessed though the LDAP (Lightweight Directory Access Protocol). Users can be assigned roles, and administrators can then set the permission levels to the roles. One member of a group could be designated as the indexer, for instance, and would have greater access to code from other parts of an organization.

The new version comes in three editions. A Free Personal Edition can index up to 500,000 lines of code. The Free Team Edition can index up to 5 million lines of code. The Enterprise Edition, which has no limit on the lines of code it can index, starts at $9,500. The software is also a component of Black Duck Suite of development management tools.


Continue Reading

Take a peek at Windows 8 today

Did you know that you can install Windows 8, now, for free! It’s no lie, but don’t get overly excited, it’s just the pre-beta developers version freely available to you and me. As with all things of this nature, you can’t rely on this as stable or complete operating system, but hey, the PC enthusiasts that we are makes us want to tinker with this just for the larks.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Pick up issue 259 (on sale 24th October) and we’ll show you how to get Windows 8 up and running in no time. You’ll want to arm yourself with some of the software we’re running through today for preparing your drive and protecting your current installed operating system in case of an accident. You’ll also be wanting a blank DVD or 4 gig USB flash drive handy too.

Follow these links for our other ‘issue 259’ web packs:
The gamers guide to online communications!
Take a peek at Windows 8 today!
Release the full potential of your broadband and Wi-Fi! (coming soon)
Issue 259 game demo roundup! (coming soon)

Windows 8 developers edition
We expect you’ve picked up on few stories on Windows 8 already and examined some of the radical changes, not withstanding it’s remarkable one size fits all from tablet to desktop approach; be prepared for some interesting changes 7 users should be ready for. Our friends at techradar have an interesting hands on review here, and now it’s time for yours! The Windows 8 developers edition is downloadable without fuss and no form to fill in, just grab the ISO. (free pre beta)
Download from here

Windows 7 USB/DVD Download Tool
Ignore the ambiguous title, this essential utility from Microsoft automates the process of writing the Windows 8 ISO to a DVD or flash drive, and takes care of the tricky stuff to make them bootable for the install process. (free version)
Download from here

VirtualBox
If you’d rather not commit Windows 8 to a dedicated drive or partition, you can still run the OS through virtualization. Download the Windows 8 ISO as already mentioned, and get yourself VirtualBox. OS installation is easy enough, just make sure that virtualization has been enabled in your bios before you begin otherwise it will throw out errors and halt during the Windows 8 install process. Couple of other tips: Within VirtualBox, select Windows 7 as the OS to be installed and 20 Gigs of virtual storage for the OS to live on. (free version)
Download from here

EaseUS Partition Master Home Edition
Unless you have a spare drive you don’t mind sacrificing the data, create a separate partition for Windows 8 to live on. This free partitioning tool will do the job for you and it’s non destructive, so you can create or change a partition size without deleting data. (free version)
Download from here

MiniTool Partition Wizard Home Edition
Another excellent free disk partitioning suite. Two versions are available here, an installer and live disc edition. (free version)
Download from here

Easeus Disk Copy
For complete piece of mind you may want to backup up your current version of Windows. Easeus Disk Copy is able to clone your system partition for backup purposes. (free version)
Download from here

Easeus Todo Backup Free
A more advanced and also free for home users step-up from Easeus Disk Copy, supporting drives up to 2 TB and functions for migrating operating systems from one drive to another. Includes a bootable disaster recovery disc creator. (free version)
Download from here

Macrium Reflect Free
Left sophisticated than Todo Backup, nevertheless an excellent user friendly approach to drive/partition backups and recovery.


Continue Reading

Make any Surface TouchScreen

We’ve seen how you can use your hand as TouchScreen. However, with the hack finally being mastered with Kinect technology, you can make just any surface touch screen, no matter what.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

Microsoft researchers have come up with a way to make devices sensitive to touch input through fabric — for silencing a phone or even entering text without taking the device out of a pocket or bag.

PocketTouch uses a custom sensor on the back of a smartphone that can detect multitouch gestures even through heavy fleece or a jacket pocket. The The first prototype is complete and we would see a demonstration sometime soon.

Microsoft uses “orientation-defining unlock gesture” that essentially tells the device which way is up, thereby removing the problem where device can be in a different orientation inside pockets. Grid of touch sensors can detect finger strokes through cloth and hence make it possible to have a specific unlock gesture that reorientates the screen each time you use it – avoiding the need to flip your phone upside down before using the interface.

OmniTouch

OmniTouch makes any surface touch compatible. OmniTouch uses a a pico projector and a depth camera (like Kinect) to let people interact with programs projected onto their skin or other surfaces. Users can define the size and location of their own interfaces, or let the system decide the best choice of display.

The researcher calls it a “mega Kinect hack” and an extension of his previous device which could only work on skin. While the prototype device is quite bulky, soon it would be possible to reduce the size of the equipment to the size of matchbox.

Both systems are being presented this week at the User Interface Software and Technology symposium in Santa Barbara, California.


Continue Reading

Why I’ve finally had it with my Linux server and I’m moving back to Windows

This is a rant. But I’m so angry and frustrated right now that you’re just going to have to live with the rant. And, for you Linux people, you who know it all and look down upon the people who don’t spend day and night breathing in the insane arcana of all the little fiddly bits that make up modern distros, I have this to say: I don’t have your kind of time.

I’ve had it. I’ve had it with all the patched together pieces and parts that all have to be just the right versions, with just the right dependencies, compiled in just the right way, during just the right phase of the moon, with just the right number of people tilting left at just the right time.

I’ve had it with all the different package managers. With some code distributed with one package manager and other code distributed with other package managers. With modules that can be downloaded on Ubuntu just by typing the sequence in the anemic how-to, but won’t work at all on CentOS or Fedora, because the repositories weren’t specified in just, exactly, EXACTLY, the right frickin’ order on the third Wednesday of the month.

MCTS Certification, MCITP Certification

Microsoft MCTS CertificationMCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

I’ve had it with all the different shells and UIs. With builds and distros that won’t even launch into a UI until you’ve established a solid SSH connection, downloaded all the parts, recompiled the package manager, and then — while the network connection happens almost like magic — still need to completely set up a remote monitor screen by tweaking yet. Another. Frak-lapping. Ini. File.

I’ve had it with the fact that this stuff doesn’t work reliably. Oh, sure, if you work with Linux every hour of every day, if this is all you do, and all you love, if you’ve never had a date since you grew that one facial hair, if you’ve never had any other responsibility in your entire life, then you know every bit of every undocumented piece of folklore. You know which forums and which forum posters have the very long and bizarre command line that only. That. One. Guy. Knows.

And you know that if you type that command line in on, say, Distro version 4.3, it’ll work, but it’ll break miserably on version 4.3a, because THAT version requires a completely different entire program, packaged with a completely different package manager, and THAT command line sequence can be gotten by getting on just the right IRC channel, at just the right time of night, and talking just the right way, to that one incredibly self-absorbed luser who happens to know that you need to put the undocumented -lM in front of the fourth parameter.

And woe be it to the unfortunate fool who gets the capitalization wrong, because putting an -Lm in front of the fourth parameter does a completely different, and even further undocumented, and possibly dangerous-to-the-entire planet sort of thing, because, well, “you shoulda known!”.

Why have I had it, you ask?

I’ve had it because after spending months jumping through all those hoops, and more, feeling like I had to pass through all four levels of Ninja Warrior and climb to the top of Mount Midoriyama, just to be allowed to launch frickin’ VNC in a GUI or load the backup program I use on all the other machines on my network… after all that, the stupid, horrible, nasty, back-stabbing, disloyal, hodge-podge, disorganized, unsupervised, chaotic craptasm that’s called Linux… after I got the whole thing working, it crashed.

Oh, and it didn’t crash easy. See, I was done. I was getting ready to deploy my server. I just wanted to do a last-minute update because I’m a good frickin’ doobie and I do my updates. So when Gnome said there were updates to apply, I said okay.

Can you imagine my rank naivety here? I actually said Okay to a Linux update. I know I should have known better. I know I should have, instead, formatted another hard drive, dd’d my furry little pile of files over, downloaded the source tarball, compiled everything all over again, prayed to Linus, turned my back to Redmond, and built my entire operating system up from scratch, just to install some security updates.

But I didn’t. I figured that after all these years, Linux was finally robust enough to not rip me a new one because I just wanted to run a server and keep it up to date. Silly me! Silly, silly me!

So I ran the update process. And it died. Abnormal exception.

And there went all my work and all my time. Down the drain.

Now, it won’t boot.

Worse, the box is co-located at my ISP, so I had to make a begging plea, requesting they please rebuild my drives and please reinstall my OS. I’m fortunate it was still a box in staging, that I wasn’t running live systems on it, or I’d be completely and totally screwed, rather than just pissed off to the point of spitting.


Continue Reading

70-270 Exam Q & A

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



QUESTION 1
You work as an administrator at CertKingdom.com. The corporate network consists of a single Active
Directory domain named CertKingdom.com. All client computers on the corporate network are configured
to run Windows 2000 Professional.
You are preparing to uABCrade the client computers to Windows XP Professional with zero impact
on productivity. You use a server named ABC-SR01 that has a shared folder named Data to save
the Setup files required for the uABCrade. You need to determine the appropriate manner in which
to start the Setup.
What is the first step to make sure the Setup files are installed in an unattended process on the
client computers?

A. You should create a test environment and run an unattended installation of the Setup Files.
B. You should execute the Winnt32.exe command and follow up with the xcopy command onABCSR01.
C. You should execute the Winnt32.exe command with the /dushare:\\ABC-SR01\data
parameters.
D. You should use an OEM installation package on the first client computer.

Answer: C

Explanation: Your best option in this scenario would be to use the dushare switch and indicate
the updates folder.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 2, Lesson 3
Microsoft Knowledge Base Article – Q312110, How to Deploy the Windows XP Dynamic Update
Package


QUESTION 2
You are the desktop administrator for CertKingdom.com. The CertKingdom.com network consists of a single Active
Directory domain named CertKingdom.com. All client computers on the network are configured to run
Windows XP Professional.
The CertKingdom.com users who are assigned laptop computers often work from home. These laptop
computers are set up specifically to make a connection to the network and the Internet without any
problems. After a few weeks several laptop users complained that they cannot access the shared
folders on the laptop computers even when working at the office.
You check and discover that these users have permission to access the shared folders. You thus
decide to make the necessary modifications in the local GPO on all laptop computers.
Which actions should you take to make sure of continued Internet protection and provide access
to the shared folders? (Choose Two.)

A. You should configure the Windows Firewall on the laptop computers.
B. You should assign all laptop computers to a global security group.
C. You should change the local GPO by deselecting the Prohibit the use of ICF on your DNS
domain network option.
D. You should enable TCP/IP filtering.
E. You should enable the Allow users to connect remotely to this computer option.

Answer: A,C

Explanation: To ensure that users can access shared folders on the portable computers during
the day and to ensure that the portable computers are protected when they are connected to the
Internet in the evening, you need to enable Windows Firewall and then enable the Prohibit the use
of ICF on your DNS domain network setting in the local GPO.
The ICF should not be used on VPN connections as it interferes with file sharing and print
services. ICF can cause undesirable issues if clients in a network enable ICF on their LAN
interfaces. Instead, large network should use better alternatives such as dedicated firewalls.
Reference: Sharing (ICS) and Internet Connection Firewall (ICF)

http://www.techexams.net/technotes/xp/ics_icf.shtml


QUESTION 3
You are employed as an administrator at CertKingdom.com. The CertKingdom.com network consists of a single
Active Directory domain named CertKingdom.com. A server named ABC-SR27 is used as a file server that
hosts a shared folder. All network users store their files and documents on the shared folder.
The CertKingdom.com Finance department makes use of a custom application and save their files to the
shared folder on ABC-SR27.
You received a complaint from the Finance Department members that some of the custom
application files have become unusable resulting in productivity decrease when they have to
restore the application using the backup. You then find that the other network users configured the
shared folder to be available offline and all indications are that this is the cause of the problem.
You must make sure that the custom application files will remain unavailable when the users are
not logged on.
How can you achieve this without impacting on user access to other files in the folder? (Choose
TWO. Each answer forms part of the solution.)

A. You should change the network policy.
B. You should assign the Allow – Write permission to all users.
C. You should configure “My Documents” to be available offline in Windows Explorer on every
client computer.
D. You should include the custom application files in the Files not cached domain group policy.
E. You should select the Synchronize all offline files before logging off check box on the Offline
Files tab.

Answer: A,D

Explanation: The custom application files become corrupt due to the offline caching. In this
scenario we need to prevent this type of file being made available offline. We can do this by
configuring the ‘Files not cached’ setting in group policy.
Files not cached
Computer Configuration\Administrative Templates\Network\Offline Files
Reference:
Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide Second
Edition, Sybex Inc., Alameda, 2003, p. 344


QUESTION 4
You work as the network administrator at CertKingdom.com. All client computers on the CertKingdom.com network
are configured to run Windows XP Professional.
A CertKingdom.com user named Kara Lang is assigned a laptop computer named ABC-WS15. She
complains that she gets random error messages regarding missing .dll files on ABC-WS15 when it
is not connected to the docking station.
After some troubleshooting you discover that the device driver uses the .dll file mentioned in the
error messages as an external storage device. The storage device is in turn linked to the docking
station of Kara Lang. There are no random error messages when she works in docked mode. To
ensure productivity you need to make sure that this incident does not recur.
How can this be accomplished? (Choose THREE. Each answer forms part of the solution.)

A. By disabling the support for the docking station in the BIOS.
B. By creating a new hardware profile named KingUndocked by copying the default hardware
profile of ABC-WS15.
C. By disabling the server service in the Services Options.
D. by disabling the storage device in the undocked hardware profile.
E. By informing the user too restart ABC-WS15 using the undocked hardware profile.
F. by disabling the devices used by the docked hardware profile.

Answer: B,D,E

Explanation: Hardware profiles are used to load different sets of device drivers according to
which profile is selected. In this scenario, we have a docking station with an external storage
device attached. Therefore, we want to load the driver for the external storage device when the
computer is docked, but not when the computer is undocked. To do this, we can create another
hardware profile to be used when the computer is undocked. We can configure the undocked
profile to not load the driver by disabling the external storage device in Device Manager.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3 & Chapter 15, Lesson 6


QUESTION 5
CertKingdom.com has employed you as an administrator for their organization. All computers on the
network are configured to run Windows XP professional.
A CertKingdom.com user named Rory Allen is assigned a computer named ABC-SR12. ABC-SR12 is
configured to host a custom application to create huge databases.
A vast amount of disk space is occupied when databases are created with this application. At
present the ABC-SR12 configuration is as in Exhibit:

You receive a complaint from Rory Allen regarding an error message when he attempts to run the
application to create a database.
Which actions should you take to create a mount point on the ABC-SR12 C-Drive to make sure
that the application allows the creation of database without any error message?

A. You should point the mount point on the C-Drive to the D-Drive root directory.
B. You should convert both Disk A and Disk B to dynamic volumes.
C. You should convert both Disk A and Disk B to basic volumes.
D. You should configure an alternative file distribution system.

Answer: A

Explanation: Your best option in this scenario would be to create mount points. Volume mount
points permits a volume to be mounted on an existing folder rather than at the root of a new drive
letter. You are able to create a volume mount point for an empty NTFS directory in order to permit
an administrator to create new volumes without needing extra drive letters.
We create a mount point on the volume that needs more space, C-Drive, and points it to the
volume which has the required free disk space.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3


QUESTION 6
You work as a desktop administrator for CertKingdom.com. All computers on the CertKingdom.com network are
configured to run Windows XP Professional.
A CertKingdom.com employee named Rory Allen took over the duties of another employee named Kara
Lang. This move involved taking over files, documents and the workstation named ABC-WS02
that was used by Kara Lang. however, Rory Allen discovered that he cannot access the
documents and files on ABC-WS02. You then attempt to grant Rory Allen the required
permissions after logging on with a local administrator account, but only get an error message
stating “access denied”.
Which actions should you take to make the ABC-WS02 files accessible to Rory Allen? (Choose all
that apply.)

A. You should assign the files and documents stored on ABC-WS02 to you.
B. You should make Rory Allen a member of the Power Users group.
C. You should make Rory Allen a member of the Domain users group.
D. You should assign Rory Allen the Allow-Full Control permission.
E. You should assign Rory Allen the Allow – Read & Execute permissions.
F. You should assign Rory Allen the Allow- Modify permission.

Answer: A,D

Explanation:


QUESTION 7
You are employed as an administrator at CertKingdom.com. All client computers on the CertKingdom.com network
run Windows XP Professional.
You are preparing to install an OEM version of Windows XP Professional on a new client
computer named ABC-WS10. ABC-WS10 is equipped with the following components:
• A PCI network card and graphics card
• To accommodate the various drives including the hard drive, an industry standard architecture
(ISA) SCSI controller.
Just after initializing the Setup process on ABC-WS10 you get an error message that informs you
the “Setup is unable to find a hard disk’. However, even after checking for loose cables and
functionality of the SCSI hard disk, you get the same problem. To ensure productivity you need to
make sure that the installation process can run successfully on ABC-WS10.
How can this be accomplished? (Choose TWO. Each answer forms part of the solution.)

A. By restarting the Setup process.
B. By changing the Boot.ini file of ABC-WS10.
C. By running fdisk.exe /mbr and restart the installation.
D. By installing the driver for the SCSI adapter using F5 during the Setup process.
E. By restarting the installation from the Windows XP Professional installation CD.
F. By install the driver for the SCSI adapter using F6 during the Setup process.

Answer: A,F

Explanation: To ensure that the installation can run to completion you need to select options A
and F. During the early text-mode phase of the setup process, you are allowed to press F6 and
install the driver for the SCSI adapter.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 11, Lessons 1 & 2


QUESTION 8
You are employed as an administrator at CertKingdom.com. All client computers on the CertKingdom.com network
are configured to run Windows 2000 Professional.
You performed a successful migration to Windows XP Professional on all the client computers.
You receive a complaint from a user named Kara Lang stating that she is experiencing problems
while opening some of the Utilities that are available on the Control Panel.
You receive an instruction to restore functionality to Kara Lang’s computer. All indications are that
the error on her computer was caused by a dynamic linked library file (.dll file) that is located on a
corrupted area on her hard drive.
What actions should you take to accomplish this task?

A. You should execute the Sfc.exe command and command prompt.
B. You should execute the Sysprep.exe command at command prompt.
C. You should execute the Sysprep.exe command prior to installing the application.
D. You should execute the RIPrep.exe command prior to installing the application.
E. You should re-install Windows XP Professional.

Answer: A

Explanation: Your best option in this scenario would be to select Option
A. The Windows File
Protection (WFP) feature in Windows 2000 and Windows XP prevents overwriting or replacement
of certain system files, such as system .dll files. A command-line utility called System File Checker
(SFC.EXE) allows an Administrator to scan all protected files to verify their versions. SFC.exe
scans all protected system files and replaces incorrect versions with correct Microsoft versions.
In this scenario it seems likely that a system .dll is corrupted and should be replace or repaired-
Reference:
Windows 2000 Platform Development, Windows File Protection and Windows
Microsoft Knowledge Base Article (Q259283): How to Use the File Signature Verification Tool to
Find Third-Party Drivers


QUESTION 9
CertKingdom.com has employed you as an IT admin for their organization. The CertKingdom.com network consists
of a single Active Directory domain named CertKingdom.com.
You performed a successful migration of all Microsoft Windows 98 client computers to Windows
XP Professional. A CertKingdom.com employee named Mia Hamm informs you that she is unable to
access or restore her information from a tape device that was created before the uABCrade to
Windows XP Professional.
Identify the next steps for restoring the backup to a Windows 98 computer? (Choose TWO. Each
answer forms part of the solution.)

A. You should restore the information in a non-compressed mode.
B. You should establish a performance baseline and restore the information.
C. You should restore Windows 98 using Ntbackup utility and the most recent Automated System
Recovery (ASR) backup.
D. You should restore the information in a compressed mode.
E. You should restore the information on the computer of Mia Hamm.

Answer: A,E

Explanation: Your subsequent steps should be to restore the information in a non-compressed
mode. Thereafter the information should be restored on the computer of Mia Hamm. Windows XP
works only with the compression that is included with NTFS. For this to work you need to first
uncompress any drives that are compressed with DoubleSpace, DriveSpace, or any other drive
compression software. If you do not uncompress a drive, the data on the drive is not available in
Windows XP. The data on the drive is still intact, but it is not available in Windows XP. To be able
to use the data on the compressed drive, you must dual-boot with the operating system that
supports the compression method. When your C-Drive is compressed, you cannot install Windows
XP.


QUESTION 10
You work as an administrator at CertKingdom.com. All client computers on the network are configured to
run Windows XP Professional computers.
A CertKingdom.com user named Kara Lang informs you that she is unable to connect to the secure
intranet Web site at intranet.CertKingdom.com. She gets an error message that the digital certificate is not
from a trusted source as soon as she types http://intranet.CertKingdom.com into the Internet explorer
address bar.
You check and discover that the intranet Web server is using a digital certificate issued by your
company’s Enterprise Certificate Authority. The Enterprise Certificate Authority is located on a
server named certificates. CertKingdom.com.
Which action should you take to make sure that Kara Lang is able to access the secure intranet
Web site? (Choose TWO. Each answer forms part of the solution.)

A. You should install the certificate in the certificate store using the Certificate import Wizard.
B. You should open the Internet Explorer’s list of certificates on the Kara Lang computer.
C. You should enable Use TLS 1.0 option in order to configure internet Explorer for the Kara Lang
computer.
D. You should request a new certificate from the enterprise CA.
E. You should contact the support company to obtain a certificate and add it to the list of personal
certificates.
F. You should import a copy of the certificate into the Trusted Publishers certificates store of Kara
Lang.

Answer: B,E

Explanation: The Internet Explorer Certificate Manager permits you to install and remove trusted
certificates for clients and CAs. Many CAs have their root certificates already installed in Internet
Explorer. You can select any of these installed certificates as trusted CAs for client authentication,
secure e-mail, or other certificate purposes, such as code signing and time stamping. If a CA does
not have its root certificate in Internet Explorer, you can import it. Each CA’s Web site contains
instructions that describe how to obtain the root certificate. To install or remove clients and CAs
from the list of trusted certificates click Internet Options on the Tools menu, and then click the
Content tab. Click Certificates and then click the Trusted Publishers tab. To add other certificates
to the list, click Import. The Certificate Manager Import Wizard steps you through the process of
adding a certificate.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 13, Lesson 4

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


Continue Reading

Is the world ready for Facebook Timeline?

commentary In 1952, a TV host and producer named Ralph Edwards created a show that married the intoxicating power of nostalgia with the immediacy of television.
The idea was simple: celebrities and the occasional ordinary citizen would be surprised with the story of their own life, told through the words of a few influential people they met along the way. Their past was resurfaced, warts and all, to a studio audience and millions of viewers.
The result was sentimental, awkward, moving, heartbreaking, invasive, and hilarious depending on your perspective and the particular episode. “This is Your Life” was a new way of harnessing television and the past to package up lives into bite-size entertainment.
The world, or at least its 800 million Facebook users, is about to have its “This is Your Life” moment.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com

It’s a wonderful life

Facebook Timeline, a complete overhaul of personal profiles that is being rolled out in the coming weeks, is built around a similarly simple and powerful idea: what if you could see your whole life in one place?
Timeline is a way of visualizing your life (or rather your life as it has been lived on Facebook). You can easily scroll through and see the friends you made, the photos you uploaded, your relationship statuses, and even your illnesses and surgeries–if you choose to share them. You can see highlights from a particular year or bore down to individual months and days.
It’s a beautiful–and beautifully designed–vision, and it makes me wish my grandparents had magically used Facebook their entire lives so I could go back and scroll through their Timelines to learn more about them now that they’re gone. I could easily see photos of when my parents were born, what my hometown looked like 50 years ago, and what it was like to be a fledgling beekeeper in Eastern Oregon during the Great Depression.
If Facebook’s vision comes to pass, Timeline could be a visual catalog of every life ever lived, from the ordinary to the extraordinary. We could see the benchmarks in our friends’ lives, watch people age, see their old prom and wedding photos and the birth of their children.
In the words of Facebook co-founder Mark Zuckerberg, “It’s all here, it’s your whole life.”
Better than you know yourself

And if the idea of having your entire life online and easily scrollable sends chills down your spine…well, quite frankly Zuckerberg should be forgiven for not believing you.
Facebook has become a world-changing force by ignoring what people claimed they would be uncomfortable sharing online. Most famously, in 2006 users yelped at the introduction of the News Feed, which surfaced your activities on Facebook to your friends. People called it “creepy” and “invasive” and “social stalking.” The uproar forced Zuckerberg to issue a mea culpa.
Now the News Feed is such a part of everyday life even my mom posted a horrified message when Facebook merely changed the way it displayed status updates.
To be sure, Facebook has allayed some concerns over the years by enabling and simplifying privacy options (if belatedly and occasionally haphazardly), but make no mistake: Facebook thinks you actually want to share more than you say you want to share. What seemed creepy five years ago now seems mundane.
And this month Zuckerberg is upping the ante by betting that you really do want your entire life on Facebook. That you’ll get over your initial squeamishness when you see the fun of scrolling through your various hairstyles and the important milestones in your life. That no social network has gone broke overestimating what the public actually wants to share.
Is he right?

We’ll always (and I mean always) have Paris
If you happen to be a 27-year-old self-made billionaire who has never gone through a breakup during the time he was on Facebook, as seems to be the case with Mark Zuckerberg, it may not be so horrifying to have your past surfaced to all your friends.
But what about those of us who haven’t lived neat and tidy lives that lend themselves to Timeline and instead have gone through breakups or divorces during the Facebook era, or merely posted embarrassing status updates that we’d like to forget?
Right now, those old updates and relationships are mostly buried. It’s difficult if not impossible to go hunting for the early days on Facebook that you have now long forgotten about, and many of us breathe a sigh of relief that that’s the case.
Soon, unless you go back and delete or change the visibility settings for all those old posts (and Facebook will reportedly give you a grace period to do just that), your new significant other will be able to see exactly how great a time you had with your ex in Hawaii in 2007.
And more seriously, there are loved ones who have passed and dark times we don’t want to revisit and embarrassing things that we’d much rather stay hidden.
What if you want the past to stay in the past?
Your life, online
Timeline is a bet that the same formula that made “This is Your Life” a success in the ’50s holds true today: we’ll suffer through the occasional embarrassment and be willing, even happy participants in the erosion of our own privacy as long as the entertainment value is sufficient.
And make no mistake: Timeline is terrifically entertaining. In fact, Facebook is hoping that it’s so entertaining you’ll spend hours filling in all those gaps from your pre-Facebook life and provide still more information about yourself than what is automatically surfaced.
But a certain “ick” factor absolutely remains, and this is uncharted territory for many people. Between Timeline and new Open Graph apps like Spotify, which, if enabled, allows your friends to see what music you’re listening to in real time, we’ll soon find out precisely how tolerant we are of living our lives in semi-public view and exactly how much we’re comfortable with our friends (and Facebook) knowing about us.
World, this is your life. Are you ready?


Continue Reading

Samsung tries to stop iPhone 4S sales in Australia

Samsung just isn’t willing to go down without a fight.

After losing an important patent battle with Apple in Australia last week, the company has now fired back with Apple’s new iPhone 4S in its crosshairs.

Samsung today filed an injunction request in an Australia court, saying that Apple’s iPhone 4S, which launched on Friday, violates wireless patents it holds. According to ZDNet Australia, a CNET sister site, Samsung argues that Apple’s new smartphone (in addition to the iPhone 4 and iPad 2) violate three patents in Australia. In a similar suit filed today in Japan, Samsung argues that those devices violate four of its patents.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

In Australia, the patents relate to the use of wireless technology, including WCDMA and HSPA, in mobile devices. According to ZDNet Australia, the patents in the Japanese suit relate to HSPA and user-interface elements.

Apple launched its iPhone 4S on Friday. The device features the same exterior design as its predecessor, the iPhone 4, but comes with a host of improvements, including a dual-core processor and an 8-megapixel camera. The device is running Apple’s latest operating system release, iOS 5.

For months now, Apple and Samsung have been locked in a bitter patent battle over the Galaxy Tab 10.1 tablet. Apple argues that the tablet copies its iPad, while Samsung argues that this isn’t the case. However, last week, the federal court of Australia agreed with Apple, and barred the Galaxy Tab 10.1 from sale in that country until a full patent case can be heard.

That ruling came just before a U.S. District Court judge in Northern California said that Samsung’s devices violate patents that Apple holds in the U.S., but the iPhone maker must prove that the patents it holds are, in fact, valid. So far, no injunction has been ordered in the U.S.

Last week’s rulings are just the latest setbacks for Samsung and its mobile products. In the Netherlands, the company has been forced to rework its Galaxy S, Galaxy S II, and Ace smartphones, so it can continue selling the devices after a court ruled they violated Apple patents. In Germany, the Galaxy Tab 10.1 has been barred from sale due to alleged infringement on Apple patents.

But in Australia in particular, Samsung seemingly believes that the best defense is a good offense. Prior to this latest filing, the company took aim at Apple’s iPhone 3GS and iPhone 4, arguing that those devices violate patents it holds.

Neither Samsung nor Apple immediately responded to CNET’s request for comment on the latest lawsuit.


Continue Reading

70-643 Exam


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com



QUESTION 1
You work as the network administrator at Certkingdom.com The Certkingdom.com network has a domain named
Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008 and all client computers
run Windows Vista.
Certkingdom.com recently entered into partnership with Weyland Industries.
You create user accounts in the Certkingdom.com domain for some employees of Weyland Industries.
You place the user accounts into a global security group named WeySecure.
You want to provide members of the WeySecure group access to parts of the Certkingdom.com network
via a Terminal Services Gateway server named ABC-TS01.
What do you need to do to ensure that the WeySecure group is able to access ABC-TS01?

A. You need to configure a Remote Access Policy.
B. You need to create and configure a Connection Authorization Policy.
C. You need to configure Device redirection.
D. You need to configure a Network Access Protection Policy.

Answer: B

Explanation: To provide a security group access to ABC-TS02, you need to create and configure
a Connection Authorization Policy.
A connection authorization policy (CAP) allows you to control who can connect to the Terminal
Server through the Terminal Services Gateway. You can configure what groups can access the
Terminal Server through the TS Gateway.

Reference: Configuring the Windows Server 2008 Terminal Services Gateway (Part 2) / Create a
Terminal Services Gateway CAP
http://www.windowsecurity.com/articles/Configuring-Windows-Server-2008-Terminal-Services-
Gateway-Part2.html


QUESTION 2
You work as a network administrator for Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network either run Windows Server 2008 or
Windows Server 2003.
The Certkingdom.com network contains a Windows Server 2003 server named ABC-SR05 and a Windows
Server 2008 server named ABC-SR06. ABC-SR05 has Microsoft SQL Server 2005 and Microsoft
Windows SharePoint Services (WSS) 2.0 installed.
You receive instruction to uABCrade Windows SharePoint Services (WSS) 2.0 to Windows
SharePoint Services (WSS) 3.0 and have it run on ABC-SR06. You need to have Windows
SharePoint Services (WSS) 3.0 retain the content and settings from Windows SharePoint Services
(WSS) 2.0.
Which of the following steps would be the best way to accomplish this task? (Choose multiple
answers).

A. You should back up the SharePoint configuration as well as the content from ABC-SR05.
B. You should back up the SQL Server 2005 configuration as well as the Microsoft Windows
SharePoint Services (WSS) databases from ABC-SR05.
C. You should uABCrade ABC-SR05 to Windows Server 2008.
D. You should install Microsoft Windows SharePoint Services (WSS) 3.0 on ABC-SR06.
E. You should install Microsoft Windows SharePoint Services (WSS) 2.0 on ABC-SR06.
F. You should restore the backup from ABC-SR05 to ABC-SR06.
G. You should uABCrade Windows SharePoint Services (WSS) 2.0 to Windows SharePoint
Services (WSS) 3.0 on ABC-SR06.

Answer: A,E,F,G

Explanation: In order to migrate to SharePoint Services (WSS) 3.0 from ABC-SR05 to ABC-SR06
with all the configuration and content, you need to install WSS 2.0 on ABC-SR06. You need to
back up the WSS 2.0 configuration and content from ABC-SR05. Then the backup can be restored
from ABC-SR05 to ABC-SR06. Lastly an in-place uABCrade of WSS 2.0 to WSS 3.0 can be
executed on ABC-SR06.
When you run an in-place uABCrade, all content and configuration data is uABCraded in-place, at
one time. When you start the in-place uABCrade process, the Web server and Web sites remain
offline until the uABCrade has been installed. In-place uABCrades are best for a stand-alone
server and small installations as in this case

Reference: Install and configure Office SharePoint Server for an in-place uABCrade
http://technet.microsoft.com/en-us/library/cc263212(TechNet.10).aspx
Determine uABCrade approach (Office SharePoint Server)
http://technet.microsoft.com/en-us/library/cc263447(TechNet.10).aspx


QUESTION 3
You work as the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com Certkingdom.com has headquarters in London and branch office in Paris. All servers on
the Certkingdom.com network run Windows Server 2008 and all client computers run Windows Vista.
The Certkingdom.com network contains a member server named ABC-SR01. ABC-SR01 is configured as
the Key Management Service (KMS) server.
You are planning to roll out 20 new Windows Server 2008 computers on the network.
After installing Windows Server 2008 on three of the computers you discover that the servers are
unable to activate using ABC-SR01.
How can you ensure that the new computers are able to activate using ABC-SR01?

A. You should ensure that the new servers have a connection to the internet.
B. You should install the Key Management Service (KMS) on a dedicated Windows Server 2008
computer.
C. You should phone Microsoft Licensing House to Activate the servers by telephone.
D. You should install Windows Server 2008 on at least 7 of the remaining computers.

Answer: D

Explanation: To activate the new server through KMS server, you should complete the installation
of at least 10 servers. The Key Management Service is a Windows service. KMS is a trusted
mechanism that, once the KMS host is activated, allows volume client computers within the
enterprise to activate themselves without any interactions with Microsoft. KMS activation of
Windows Server 2008 follows a hierarchical structure. Each successive product group can activate
all the groups below it, and the KMS can be hosted on any edition that it can activate.


QUESTION 4
You are the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008 and all client
computers run Windows XP Professional. Certkingdom.com currently makes use of two computers named
ABC-TS01 and ABC-TS02 which runs the Terminal Server Session Broker role.
Certkingdom.com recently entered into partnership with Weyland Industries who make use of two
computers named WEYLAND-TS01 and WEYLAND-TS02. During the course of the day you
receive instruction from Certkingdom.com and Weyland Industries to configure their Terminal servers for
load balancing whilst ensuring ABC-TS02 is configured as the preferred server.
What program would you use to configure the load balancing?

A. You should use the Terminal Services Resource Authorization policy (RAP).
B. You should use the Terminal Services Configuration utility.
C. You should use the Terminal Services Connection Authorization policy (CAP).
D. You should use the Group Policy Manager utility.

Answer: B

Explanation: In order to configure load balancing for the four terminal servers you need to make
use of the Terminal Services Configuration utility. This will also make ABC-TS02 the preferred
server for TS sessions. Using NLB with Terminal Services provide increased availability,
scalability, and load-balancing performance, as well as the ability to distribute a large number of
Terminal Services clients over a group of terminal servers.


QUESTION 5
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a server named ABC-SR22 which hosts Windows SharePoint
Services (WSS). ABC-SR22 hosts a WSS site for each department in the company.
The Sales department WSS site contains a document library. The Sales manager asks you to
configure the WSS site so that Sales users can send email to the document library. To this end,
you configure ABC-SR22 to accept incoming email.
What else is required to enable users to send email to the document library?

A. You need to modify the incoming email settings for the WSS site in IIS Manager.
B. You need to modify the incoming email settings the Application pool in IIS Manager.
C. You need to modify the incoming email settings for the Sales WSS site
D. You need to modify the incoming email settings for the document library.

Answer: D

Explanation: You need to change the incoming mail settings for the document library. This will
allow the users to send email to the document library.

Reference: http://technet.microsoft.com/en-us/library/cc262947(TechNet.10).aspx


QUESTION 6
You work as the network administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008. Half the client
computers run Windows XP, and the rest run Windows Vista.
You are responsible for a Terminal Server named ABC-TS01. ABC-TS01 is used to allow remote
users to run the necessary applications required for their daily tasks from their workstations. You
receive instruction to install a Terminal Service application named KingSalesApp2 on ABC-TS01.
KingSalesApp2 does not make use a Microsoft Windows Installer package for the installation and
modifications are made to the current user registry during installation.
Which two of the following steps should you perform to install KingSalesApp2?

A. After installing the application, run the change logon /enable command on ABC-TS01.
B. Before installing the application, run the change logon /enable command on ABC-TS01
C. Before installing the application, run the change user /install command on ABC-TS01.
D. After installing the application, run the change user /install command on ABC-TS01.
E. Before installing the application, run the change user /execute command on ABC-TS01.
F. After installing the application, run the change user /execute command on ABC-TS01.
G. Before installing the application, run the change logon /disable command on ABC-TS01 before
running the application.
H. After installing the application, run the change logon /disable command on ABC-TS01 before
running the application

Answer: C,F

Explanation: In order to install the application to support numerous user sessions in the above
scenario, you need to first run the change user /install command on ABC-TS01because you need
to put a Terminal Services server in Install mode to be able to install or remove programs on the
server. You can put a Terminal Services server in Install mode using the Add/Remove Programs
tool in Control Panel in order to add or remove a program or by using the change user command
at a command prompt. Thereafter you can install the application.
After the installation of the program, you need to return the Terminal Services server to Execute
mode, to be able to execute the application. Therefore, to return to the Execute mode, you need to
run the change user /execute command on ABC-TS01.

Reference: HOW TO: Use the CHANGE USER Command to Switch to Install Mode in Windows
2000 Terminal Services
http://support.microsoft.com/kb/320185


QUESTION 7
You work as a network administrator for Certkingdom.com The domain contains four Windows Server
2008 domain controllers. All domain member servers run Windows Server 2008 and all client
computers run Windows Vista or Windows XP Service Pack 3.
You receive instruction to assign the Terminal Services and Terminal Services Gateway roles to a
server named ABC-TS02.
In order to protect the network you want to make sure that all client computers that connect to
ABC-TS02 have antivirus software and up to date security patches installed.
How can you enforce the security requirements?

A. You should implement a Network Access Protection (NAP) server in the domain and configure
the client computers to send a health option statement in the Terminal Services client access policy.
B. You should configure a Remote Access Policy with the required security settings.
C. You should install Microsoft Baseline Security Analyzer (MBSA) on ABC-TSO2 and configure it
to scan the client computers when they connect.
D. You should install Microsoft Security Assessment Tools (MSAT) on ABC-TSO2 and configure it
to scan the client computers when they connect.

Answer: A

Explanation: Explanation
To ensure that all client computers have firewall, antivirus software and anti-spyware software
installed, you need to set the Request clients to send a health option statement in the Terminal
Services client access policy. You also need to install and configure Network Access Protection
(NAP) on a server in the Certkingdom.com domain.


QUESTION 8
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network has a domain named
Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008. Half the client
computers run Windows XP Professional, and the rest run Windows Vista.
The Certkingdom.com network contains a server named ABC-SR22 which hosts Windows SharePoint
Services (WSS). ABC-SR22 hosts a WSS site for each department.
You receive instruction to ensure that CertK ing .com users are able to create distribution lists from
the SharePoint site.
How would you configure ABC-SR02 to accomplish this?

A. You need to install the Exchange System Manager software on ABC-SR02.
B. You need to enable IMAP4 on ABC-SR02.
C. You need to enable the SharePoint Directory Management Service on ABC-SR02.
D. You need to modify the incoming email settings on the SharePoint site on ABC-SR02.

Answer: B

Explanation: In order to configure the WSS server in such a way that it permits users to create
distribution lists from a SharePoint site, you need to enable the SharePoint Directory Management
Service on ABC-SR02. A distribution list contains the e-mail addresses of existing address lists as
well as the e-mail addresses of other site members. Distribution lists are available only if the
SharePoint Directory Management Service is enabled in Central Administration.
All new subsites that are created in an e-mail-enabled site collection are automatically e-mailenabled
also. If you choose to use an existing group during site creation, the distribution list for the
parent site (if available) will be associated with the new site

Reference: Introduction to incoming e-mail/ New site creation walkthrough
http://office.microsoft.com/en-us/help/HA100823061033.aspx


QUESTION 9
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a member server named ABC-SR11 that has the IIS server role
installed. ABC-SR10 hosts a Web site called ABCWeb.com. ABCWeb.com is configured to use
both HTTP and HTTPS connections. An SSL certificate is configured to enable the HTTPS
connections.
There are multiple virtual directories configured within the Web site. Some virtual directories allow
HTTP connections and some require encrypted connections using SSL.
You add another virtual directory named to the Web site. The virtual directory can be accessed at
ABCweb.com/accounts/.
The Certkingdom.com security policy requires that /accounts/ must be accessible to authenticated users
only and to allow authentication types to support all browsers. However, the CIO wants the
authentication traffic to be encrypted by using HTTPS.
How should you configure the /accounts virtual directory without affecting the other virtual
directories? Choose three

A. By enabling Basic Authentication for ABCWeb.com.
B. By enabling the Basic Authentication setting for the /accounts virtual directory.
C. By enabling disabling the Anonymous Authentication setting for ABCWeb.com.
D. By disabling the Anonymous Authentication setting for the /accounts virtual directory.
E. By configuring the Web site to the Require SSL setting.
F. By configuring the /accounts virtual directory to the Require SSL setting.
G. By enabling Digest Authentication setting the /accounts/ virtual directory.

Answer: B,D,F

Explanation: You need to enable the Basic Authentication setting, because it is supported by
mostly all the browsers.
You need to disable the Disable the Anonymous Authentication setting, so that only authenticated
users can access the virtual directory.
You also need to the /accounts/ virtual directory to the Require SSL setting. This will only allow
that the authentication traffic is encrypted and all other directories of the Website must be
accessible to anonymous users and be available without SSL.
You also need to configure the virtual directory for the Web site and not the website.

Reference: How to configure IIS Web site authentication
http://support.microsoft.com/kb/308160


QUESTION 10
You work as an enterprise administrator at Certkingdom.com The Certkingdom.com network consists of a domain
named Certkingdom.com All servers on the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network contains a member server named ABC-SR25 that runs the Web Server
(IIS) role and hosts multiple Websites.
You have received instruction to configure ABC-SR25 to run a new company Intranet Web site.
You want to configure ABC-SR25 to release memory to the new company Intranet Web site
automatically.
How should you configure ABC-SR25 without affecting the other Web sites?

A. The best option is to associate the Intranet website with the Default Application Pool.
B. The best option is to decrease the connection timeout for the Intranet website.
C. The best option is to modify the settings on the Default Web Site.
D. The best option is to configure the settings on the Performance tab of Default Application Pool.
E. The best option is to associate the website with a new application pool.

Answer: E

Explanation: The best option is to create a new application pool and associate the Web site to the
application pool. This will automatically release memory for a single website without affecting the
other Web sites. An application pool is a group of one or more URLs that are served by a worker
process or a set of worker processes. Application pools set boundaries for the applications they
contain, which means that any applications that are running outside a given application pool
cannot affect the applications in the application pool.

Reference: IIS 7.0: Managing Application Pools in IIS 7.0
http://technet2.microsoft.com/windowsserver2008/en/library/1dbaa793-0a05-4914-a065-
4d109db3b9101033.mspx?mfr=true

Reference: IIS 7.0: Configuring Recycling Settings for an Application Pool
http://technet2.microsoft.com/windowsserver2008/en/library/0d5770e3-2f6f-4e11-a47c-
9bab6a69ebc71033.mspx?mfr=true

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


Continue Reading

iOS 5: Excellent, Awesome and Somewhat Confusing

Apple claims there are something like 200 new feature in iOS 5, so it’ll probably be a long time before most users happen to find all or even most of them. The biggest standouts, though, include improvements to the Camera app, a new Notifications Center, and of course, iCloud. That last one is one of the biggest things to hit iOS for a while, and for now it’s still a little tricky to figure out.

The world’s leading SSL certificates now offer more protection and security. Now from Symantec. Download your free trial of the world’s leading SSL certificates at verisign.com/ssl/free-30day-trial.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

After learning that it would cost me US$449 to upgrade from my iPhone 4 to an iPhone 4S, I pushed the pause button on those plans and decided to see how iOS 5 on my iPhone 4 shakes out first. After all, it’s not as if I don’t appreciate my iPhone 4. It’s a great phone, quite serviceable, and now, with iOS 5, it’s better than it was just a few days ago.

Where do I start? Apple (Nasdaq: AAPL) boasts 200 new features in iOS 5, and for sure, I haven’t found or noticed more than a fraction of them. Sure, some of them, like Siri, the new intelligent assistant app that listens to voice commands and then implements them, belong only to the iPhone 4S and the wicked-fast hardware packed inside. Other features have to do with iCloud integration, which in fact seems to be mostly what iOS 5 is all about — providing users with easy access to files and communications services from the sky.

First, the New Camera App

Just because iPhone 4 owners can’t get the sweet new 8 megapixel, 1080p-HD-video-shooting camera like the one in the iPhone 4S doesn’t mean Apple doesn’t know how to spread the love: Now, finally, I can use the up or “+” volume button to snap a photo or start a video. Better yet, when my iPhone 4 is asleep, I can double-tap the home button, which will bring up a lock screen that offers a camera icon button that will launch the camera app. The big deal? I can go from iPhone-in-my-pants-pocket to snapping-a-photo faster than ever before. (That’s right, Bigfoot should be afraid, very afraid.)

Before iOS 5, after you snapped a photo, cropping it to make it ready to send to another phone or email it meant that you had to move it into a separate image-editing app. For most of my cropping needs, this little hoop-jump meant that I didn’t bother cropping at all. In addition, Apple offered up a magic editing wand to help automatically clean up some photos, along with a red eye correction feature. Since I rarely blind my portrait victims with the iPhone’s harsh LED flash, this is a rare need for me.
Next, Reminders

The one app I was really looking forward to was Reminders, a handy and clean little task manager app. It’s pretty lightweight compared to some of the robust and feature-rich task managing applications on the market, but where it compensates is the notifications features: You can quickly and easily set the iPhone to remind you about something — whatever you jotted down — on a particular day at a particular time, or when you leave or arrive at a particular place, or both: on a day at a time and if you leave or arrive at an address.

I set a real reminder with a fake notification, and as I was driving out of my neighborhood early in the morning, I heard a weird notification noise come from my iPhone. Sure enough, I had left the area, so it was reminding me to do what I wanted to do. What makes this cool? Say, for example, you want to buy a special item from a store at the mall, but you’re not going to make a special trip to your local mall just to get this item. You can create a reminder and set it to holler next time you drive by or arrive at the mall. Boom. No more forgetting esoteric little tasks — as long as you use Reminders, of course.
No More Android Envy, We Get a Notification Center Too

Some of the features that I most appreciate on other smartphones are the notification centers and the ability to consolidate the latest action on your phone into your home screen. Now, with Apple’s Notification Center feature, we get that sort of option, though it’s all based on alerts.

As new email, text messages, voicemail, stock tickers, weather reports, or notifications from your favorite compatible apps come in, you can see them at a glance on your iPhone lock screen. Swipe them and you can jump right into the application — for instance, right into a text message. If you’re working in an app and get some notifications, a bar will appear at the top. Swipe from it down, and boom, you’ll see all your notifications in a well-designed, swipeable layout. It’s gorgeous, actually. Get some notifications and you can enjoy it too.

Figuring out all the apps and the notifications can be a bit daunting, though, but at least Apple lets you decide how you want to let the apps (and which apps) notify you via notifications.

Another big new feature (of the 200) is iMessage, which is Apple’s new messaging service that lets you avoid your cellular service provider’s text messaging service in favor of using WiFi or iPhone Internet data access. If someone has an iPhone, iPad or iPod with iOS 5, you can send instant messages through Apple’s iMessage, which is built into the messages app.

This is a little confusing because it requires registering users with iMessage, and so far, I haven’t been able to put it to work much because no one I know and want to message with has their iGadgets on iOS 5 yet! When they do, I can “text” them with photos, videos, locations, contacts and funny sentences from my WiFi-only iPad 2 — or vice versa. I can see parents texting their young children on their iPod touches — or letting kids who aren’t yet old enough for cellphones to “text” each other through their Apple iGadgets.

Sure, it feels like cellular service companies are ripping us off by charging freakish prices for texts, but then again, I still think it’s magic when I’m driving across the country with desolate tumbleweeds blowing around … and I can still call my mom. So thank you cellular service providers. Meanwhile, I really like the ability to text any device no matter how it’s “connected” and not have to have everyone shell out for traditional texting plans.
Safari and iCloud

Another handy feature of iOS 5 is a much-improved Safari. On my iPad 2, I can now use tabbed browsing (but not on the iPhone), and on both I can save URLs to my Reading List (like on Mac OS X) for easy access later. I can also use the Reader feature to zoom into just the relevant text of an article online for easier, clutter-free reading. This last bit is awesome when you’re holding a small screen in your hand.

Last of all, the big new feature that I’m still learning is iCloud and the ability for me to avoid syncing through iTunes on my MacBook. There’s a lot here, and iCloud warrants plenty of special looks by writers and users alike.

For starters, it’s a synchronization service that keeps all your data synced up on each of your iOS devices — documents, photos, your @me.com email. Apple’s individual apps can use it, and third-party app developers will be able to also. It’s also an online storage locker, and apparently I’ll be able to access anything I’ve purchased through my iTunes account via iCloud. Nice. Haven’t really tried it yet, but I’m sure I will.

I’ll like this especially because it means I won’t have to plan out my media before I leave for a big trip. There’s also Photo Stream, which I’m not sure I’ll like or not. I take plenty of photos on my iPhone that I don’t really want to appear anywhere else. So I’ll have to see how that shakes out.

In the meantime, iOS 5 appears stable, looks cooler in subtle ways like green bubbles in Messages or new rocker switches, and offers up a lot of promise for more fun and better productivity.


Continue Reading

Follow Us

Bookmark and Share


Popular Posts