Office 365 for Small Businesses

Create, edit and share With Office 365, make documents and presentations that shine – anytime, anywhere – no matter what device you’re on, including Apple and Android phones and tablets.

Read More

Microsoft Skills Development Roadmap

Choose your path to success. Whether you’re an experienced IT professional or new to the field, we have the training and certification path that will help lead you to success. Our classes are taught by Microsoft Certified Trainers, so you can be

Read More

DNS server Root Hints Locations and Details

Server Location   IP Address a.public-root.net Amsterdam, The Netherlands   84.22.106.2 b.public-root.com Budapest, Hungary   79.172.201.120 c.public-root.com Paris, France   91.121.45.127 d.public-root.net London, UK   80.252.121.2 e.public-root.net Kelowna, British Columbia, Canada   209.97.212.120 f.public-root.com Melbourne, Victoria, Australia   84.22.100.250 g.public-root.net Chicago, Illinois,

Read More

Enable Active Directory Recycle Bin & Restore Deleted Objects

Once you have installed Windows 2008 R2 on all Domain Controllers and the Forest Functionality mode is set to Windows 2008 R2, the Recycle Bin is an available option. However, it is not automatically enabled.  In order to use it, it has

Read More

Enable Active Directory Recycle Bin & Restore Deleted Objects

Once you have installed Windows 2008 R2 on all Domain Controllers and the Forest Functionality mode is set to Windows 2008 R2, the Recycle Bin is an available option. However, it is not automatically enabled.  In order to use it, it has

Read More

How to Flush DNS Cache to Enable Privacy On the Internet

hances are, you have never flushed your DNS. You may not even know what DNS is. DNS stands for Domain Name System. DNS turns web sites like www.google.com into a numerical code called IP address. When you type in a web address,

Read More

Shutdown Syntax

shutdown [{-l|-s|-r|-a}] [-f] [-m [\\ComputerName]] [-t xx] [-c “message“] [-d[u][p]:xx:yy] Parameters -l : Logs off the current user, this is also the defualt. -m ComputerName takes precedence. -s : Shuts down the local computer. -r : Reboots after shutdown. -a : Aborts shutdown. Ignores other parameters, except -l and ComputerName. You can only use -a during the time-out period. -f : Forces running

Read More

Ping

What is the Ping Command?: The ping command is a Command Prompt command used to test the ability of the source computer to reach a specified destination computer. The ping command is usually used as a simple way verify that a computer can communicate over the

Read More

Difference between TCP and UDP

Difference between TCP and UDP TCP UDP Reliability: TCP is connection-oriented protocol. When a file or message send it will get delivered unless connections fails. If connection lost, the server will request the lost part. There is no corruption while transferring a

Read More

Download Windows Server 2012

Download Windows Server 2012 Windows Server 2012 is now available. It offers businesses and service providers a scalable, dynamic, and multitenant-aware cloud-optimized infrastructure. Windows Server 2012 helps organizations connect securely across premises and helps IT Professionals to respond to business needs faster

Read More