Intelligentedu
Best New Free Computer IT Training Tutorial Resources


March 19, 2010

Computer Learning and Support Docs

Here is the first of two posts of technical and computer learning and reference documents, located at admi-lan. Many of these cover Microsoft and Windows related topics, but there are also other areas covered such as Linux, Networking, Cisco, Wireless, Security, and computer Harware. The second post is here.


Active Directory
10 things you should know about Active Directory domain trusts
Design your Active Directory tree with security in mind
Manage computers in Active Directory with these quick and easy recipes
Simplify Active Directory administration by mastering these essential tools

Antivirus
Consider these low-costs antivirus solutions
Guide installation de Symantec AntiVirus Corporate Edition 9x a usage des administrateurs
Symantec Antivirus 10.0 installation walk-through for administrators
Symantec Client Security 3.0 installation walk-through for administrators

Backups
Develop an effective data backup strategy
Disk-Based Backup & Recovery - Making Sense of Your Options
How to create a Backup-to-disk folder in Backup Exec for Windows Servers
Recover from almost any registry error in Windows Server 2003 and Windows XP by using these backu

BIOS
bios_beep_codes_list_v3
bypass_bios_password
Crack a BIOS password in a flash

Cisco
Recover lost passwords using Cisco configuration registers

DHCP
Create a superscope to solve the problem of dwindling IP addresses
IP subnetting made easy

DNS
10 things securing dns
Build a DNS server on Linux using BIND
Build a scalable DNS infrastructure
Configurations and registry edits to help you secure your DNS servers
Configure a Win2K DNS server to forward external requests
Create a superscope to solve the problem of dwindling IP addresses
IP subnetting made easy
Lock down DNS with these tips
Manage the DNS client cache in Windows 2000 Pro
Nslookup screenshots - Troubleshooting DNS problems

Exams
Prepare for CompTIA's Network+ exam with more than 100 practices questions on network media and t

Firewalls
An Introduction to Client Firewalls
Best practices for managing firewall logs
Build a floppy-based router - firewall with Freesco
Configure firewall security on a SonicWALL device
Configure SonicWALL VPN Connections
Design the best security topology for your firewall

General Security
10 dumb things IT pros do that can mess up their networks
10 security problems unique to IT
10 ways to monitor what your users are doing with company computers
10+ e-mail best practices to share with your users
Configuring Windows Security
Debunking two myths about the Windows administrator account
file folder print rights
Investigate what hackers do, how they do it, and how you can protect yourself
Is encryption really crackable
securityresource2
See why even a simple firewall is better than nothing
The importance of an e-mail usage policy
Windows 101- Know the basics about NTFS permissions

Hardware
10 things you should know about deploying a UPS
10+ tools you should have in your support tech repair kit
A dead laptop battery doesnt have to be a disaster
Boost server disk I-O performance with a battery-backed write cache
Closely check those auto-detected BIOS settings
computer_hardware_inventory_list
CPU installation requires a delicate touch
Detect hard disk failures before they happen
Don't dismiss mechanical problems when troubleshooting CD-ROM drives
Duplicate a hard drive with a floppy disk
Extend the life of your printers with these tips
File systems 101 - FAT
Get the nitty gritty about SCSI
Get the pros and cons of Parallel ATA and SATA 1
Get the pros and cons of SATA II
Hard drive failure troubleshooting checklist
Learn about 'specialty' RAID levels
Monitor a UPS with the NUT package
Put your modem to work with Windows XP
Setup and troubleshoot Windows XP hardware components and device drivers
Understand 'single digit' RAID levels

IIS
Administer and customize FrontPage Server Extensions in IIS
Basic strategies for securing Internet Information Server
Configure and maintain the SMTP service in IIS 5.0
Lock it down - Windows 2000 IIS

Internet Security
10 reasons to use ISA Server 2004 as your remote access VPN server and VPN gateway
Another Microsoft security flaw threatens Internet users trust
Avoid getting blacklisted - stop relaying spam
Learn to surf the Web anonymously
Securing Your Online Data Transfer with SSL
Use DHCP Class to deny Internet access to unauthorized machines

Linux
Configure Linux to read your PC floppy disks
Create a Linux boot CD to recover a failed server
Decentralize Linux security with Sudo
Five steps to deploying Linux in the enterprise
Linux 101- Use ifconfig in Linux to configure your network
Set up a Linux VPN server by following these 10 steps

Network
10 commands you should master when working with the Cisco IOS
10 things you should know about AD domain trusts
100 things you should know about handling net admin tasks more effectively
10_things_netsh
Adaptec 1200a
Add Macs To A Windows Workgroup
Afficher les erreurs reseaux
An efficient and affordable network monitoring solution for SMEs
Automate networking tasks with Jarevas OpForce
cat_5_patch_cable_guide
Cisco administration 101- Routing redistribution
Common causes of network slowdowns
Configure network load balancing in Windows 2000
Configure TCP-IP graphically with Wntipcfg
Create an IP addressing plan that will grow
Enterprise Performance Management - A Framework for Optimizing Network and Application Performanc
IP subnetting made easy
Network_Documentation_Checklist
Router Configuration 101 - Setting up the router
Save time using batch files to perform repetitive tasks in a Windows environment
Speed up the switch port initialization process
Synchronize time throughout your entire Windows network
TCPIP_fundamentals
Unearthing the Openfiles command-line tool in Windows XP

Network Security
10 ways to monitor what your users are doing with company computers
10_things_wsus
AppSec can help restrict application access in Win2K
At last real wireless LAN security
Automate your network monitoring process
Cacls_exe_quikref
Centralize authentication with a Win2K RADIUS server
Centrally manage desktop security with Zone Labs Integrity
Disable NetBIOS and SMB to protect public Web servers
DoS protection
Essential steps to a secure network
Hacking the hacker - How a consultant shut down a malicious user
Help users create complex passwords that are easy to remember
Lock down SNMP traffic using IPSec
Monitor traffic on a network for free with Ethereal
NAP offers a network access control solution for SMBs
Resetting Windows XP Group Policy Refresh Interval
Secure your network for success with these resiliency best practices
security_policy_checklist

Palm
Connect your Palm or Pocket PC to a WLAN with these 802

SQL
10 common SQL Server problems and solutions
BLDR-QS-SQLServer
Configure Access and SQL ODBC connections for user databasà
Five tips to secure SQL Server 2000
Query more useful information by deploying SQL Server 2005 Reporting Services

Terminal Services
Check out these hidden extras for Win2K Terminal Services

VPN
10 things you should know about troubleshooting VPN connections
Configure Windows XP Professional to be a VPN server
Configuring certificates for an L2TP-IPSec VPN
Don't let VPN users be the weak link in network security
Join a domain during Windows logon using a VPN client

Wireless
10 things you should do to protect your network against wireless devices
ultimate guide to enterprise wireless LAN security



Tags for this post>> | | | | | |


Filed under: Best New Free Computer IT Training Tutorial Resources — computer_teacher @ 4:58 am


Powered by WordPress