My Chellam.....

Difference between IPv4 and IPv6

IPv4 IPv6 Addresses are 32 bits (4 bytes) in length. Addresses are 128 bits (16 bytes) in length Address (A) resource records in DNS to map host names to IPv4 addresses. Address (AAAA) resource records in DNS to map host names to IPv6 addresses. Pointer (PTR) resource records in the IN-ADDR.ARPA DNS domain to map IPv4 addresses to host names. Pointer (PTR) resource records in the IP6.ARPA DNS domain to map IPv6 addresses to host names. IPSec is optional and should be supported externally IPSec support is not optional Header does not identify packet flow for QoS handling by routers Header...

Activating Windows 2003 Terminal server license on end user system

Many of us face challenges while we activate the terminal servers licenses from the remote system. Recently I faced the same issue and I followed the below steps and the problem was resolved. The Terminal Services Licensing Server must be configured properly and it must be up and running fine on the same network environment. For example, we will consider this server Frank2k3 (192.168.150.100) as a Terminal services licensing server and this server is reachable to the End user system. If the Terminal Services Licensing Server is present in a different network then we have to enable the required communication ports between two environments. For example if we have the Licensing server present in the network 192.168.150.X and the End user system present in the network 10.50.10.X then we need to enable the following ports from...

Avoiding performance issues with Linked Clone VMware View Desktop through fully deployed (thick) desktop

              Optimal design of a VMware View environment must take several factors into consideration. One of the most important factor is the Storage design. When proper storage design planning is not done, it invariably leads to performance issues in the environment. The most prominent example would be having linked clones in an environment in multiple SATA drives with very little cache space. There is a solution for avoiding such performance issues and that is to have fully deployed (thick disk) desktop. Having fully deployed desktops means spreading the I/O over many spindles instead of crowding all requests to one spindle. This can be done in two methods: Cloning the Desktop VM Storage VMotion the Desktop VM Cloning the Desktop VM Steps:   1. From VCenter, right click on desktop VM. Select ‘Clone’   2. Keeping...

Tips for strong password in server hardening

The need for a highly secure Strong Password is felt more these days due to increased hacking and phishing. With Microsoft integrating windows logon to many online transactions, the need is further more important. The password policy setting is one of the most important steps in server hardening procedure. This is usually done in 99% of the environments. But if in any environment it was overlooked, there are methods how one can enforce the strong password policy there. The steps to enable password security policy in Windows 2003 Domain server is presented in this post: Step#1: Start—> Program –> Administrative Tools –> Domain Security Policy Step#2: From the Domain Security Policy Window, enable the “Password must meet complexity requirements” under Password policy in Account Policies Once these steps are done,...

Restoring corrupted windows OS files without affecting the existing configuration files

Many a times we have the difficulty of having to restore some corrupted OS files. But this is always scary as there is a high chance of the other existing configuration files getting corrupted as well. Well, in one of my tight situations I found that Microsoft was a life saver yet again! Microsoft provides a command line tool System File Checker “SFC” which can be used to recover the corrupted windows operating system files. Since the discovery of this tool, I have used SFC in many production windows server environment successfully and the problem got fixed every time! When you are not really sure that all the OS files are good and you doubt that system files have been somehow corrupted, do use SFC. This tool will validate the digital signatures of all the Windows system files and if there are any incorrect files, they are restored. During the recovery process if possible it will use the on-disk cache files. But...