Friday, August 19, 2011

Configure Dedicated Webhosting server in windows 2008


"Bonjour les gars" !!


Here i am going to Discuss about the Dedicated Web hosting Server

This task is divided in to two steps.
1.) Configuring Active directory and the DNS service in windows server 2008 .
2.) Editing in the Domain Name for Name server, Name Server Registration and DNS Record Management.

Start with installation of Active Directory and DNS together in one shot.
1.)Open the DNS and go to the Forward Lookup zone option.
2.)Create a New Zone by following up this procedure.







Once you done with this. go to the zone name and click on the Name Server (NS).

Create a host name with "servername " my server name is "win2k8"



In the Same way create a host name with "ns1".
then create a CNAME Record "www" then browse it to ns1.yourdomainname.com
Now, Open the Command prompt, its time to check whether DNS is working or not. just run these commands as mentioned in the image below:-
This is the test page which is working by opening the url or a zone name which we created
"www.yourdomainname.com"

"Please make sure you have IIS or Xampp installed in your computer to run this test page".

Currently our DNS Name Servers are working privately. to make it public we have to edit our domain name "yourdomainname.com"

For This,
Go to Your Domain Account of name.com, godaddy.com or one of the domain registrar you have for which you are using your domain name.

1.) Go to the Control panel.
2.) Select the Domain Name for which you want to configure the dedicate server.
3.) let the default Name Servers Remain same for the specific domain name.
It will be like :-
ns1.abc.com
ns2.abc.com
ns3.abc.com
ns4.abc.com

Assume abc.com as your registrar name.



4.) Now go to Name Server Registration option in the Right pane on no. 8.
Enter ns1 in the HOST NAME.
Enter Static IP in the IP Address and click register or sythe domain.



Now go to 2nd option DNS Record management.

Create Two Record Entry.
1st with blank Host Record and put your static IP in the Record Answer. Let the TTL value remain Same.
2nd with * Host Record and put the static Ip in the Record Answer. Let the TTL value remain Same.

Finished.

Now go over the WAN and open the url "yourdomainname.com
The domain is accessible now and will show you the same test page which you opened locally on the server.

Thanks!

Monday, May 24, 2010

Auto DATA Backup of the Network

Hi Everyone!

Here I am going to explain the process of Auto Data Backup of your critical data to the server from all the client computers of LAN with the help of Third party Softwares or the FTP Service (File Transfer Protocol). In this program we can schedule the backup timing according to the system clock.

These are SyncbackPro (which is used to install on the client side) and
Filezilla _Server (which is used to install on the Sever side).

Follow SynckbackPro and FileZilla_Server to get the downloads.

In this procedure We need to select the source to get the data or destination to synchronize the data to the Server.

Auto Data Synchronization Procedure:-

Sunday, May 9, 2010

Thin Client Network Installation or Configuration on WINDOWS


...Hi..!

Here i am going to explain brief introduction of Thin Client Network.
Basically it means a network environment in which a bulk of data processes occurs on the server on the bases of terminal server. In which A software named VDI( virtual desktop infrastructure) that creates the desktop images, stores them on servers and sends them over the network to the thin client. Or in simple wording it is a technology in which we use only 1 server which is used by 30 clients.

Here i am using Windows 2003 with its terminal services.

This Figures shows how the setup will be configured.As like we have to use 2 LAN cards. 1 is used for internet and another is used to connect to the Switch.After that wires get distributed to the terminals or clients from the switch which used to connect to the server as well.
Thin client doesn't contain any CD ROM, RAM, Hard Drive, Processor etc. That is why it is a cheaper technology than the Notebooks and Desktops environment to stand a network.

System Requirements :-1) Operating Windows 2003
2) 2 LAN Cards
3) PXE Boot ROM Boxes attached with Monitors.
4) Switch or HUB.


Hardware confoguration :-

Monitor with Attached PXE BOOT ROM
System With 2 LAN Cards



Please watch this video to know more about installation or its Configuration Procedure :-
Thin client setup
View more presentations from Atul Bhola.

We can share our server with 30 clients but server configuration should be enough. If we talk about normal configuration that it can still support 20 clients.

Monday, April 19, 2010

Install 100 computers in an hour or build a network

We can Stand 100 of computers in an hour in network by using multiple Windows Imaging programs. Which is always recommended by MNCs or many system Brands.

This programs can be used to clone the Hard Drive which results in instant installation of the Computer.For that you need to attach 2 Hard Disks. 1st is source and 2nd is destination.

Two of them are :-
1)
Norton GHOST 2003(Ghost is a software that can clone (copy) the entire contents of a hard disk to another computer's hard disk or to storage media or can creates the image of the windows)
Click HERE to download the setup for Norton Ghost 2003 . You can follow these screen shots to create an Image of Windows.




In this Figure there is 3 options in -
local -> Disk:- to Dis
k
is used to for by which we can clone the whole Hard drive or we say it Disk to Disk copy.
To Image is used to create the WINDOWS Image
From Image
is used to Recover the Windows Image
.


Select the source Drive.


Select the Destination Drive.


Select partition details


Click yes to proceed


After finishing the process Click to Reset computer.

As I discussed earlier this software can also be used to create an WINDOWS image which saves in .GHO extension and can longer be used for WINDOWS Recovery.

2.) Acronis True Image(is a disk imaging software, developed by Acronis, that creates backups and recovers PC systems)
we use it to Restore your PC from an image. Recover what you need, be it your entire system, a critical file, or application settings.

Click HERE to download the setup for Acronis True Image .
As like Ghost you can clone the Hard Drive or can create an WINDOWS Image by using bootable CD and by installing this software in WINDOWS.

HERE is the PDf file which collects all the features of Acronis and the steps we need to follow to use it for recovery and backup process.
D310217Fd01

GHOST VS ACRONIS :-
As per my experience i generally proffered the Ghost because there is no chance for curruption of .GHO file( backup File) While in Acronis sometime images become corrupt and can't be use longer. Ghost takes less timing to create image or to restore in compare of Acronis.
But the only benefit of acromins in compare of Ghost is We can Backup a single file as i mentioned earlier in its feature and we can go for incremental and Differential backup also.





visitors globe

Thursday, March 11, 2010

IIS (Web Server) installation over the WAN

Here I am going to discuss about the installation of IIS and its working.
It is a Web server provided by Microsoft Windows.
We Use it to host our Website locally or globally.
The best feature of this program is we can use our local system as a server which contains the Website contents and it can make a website to be accessible over the WAN with static or dynamic IP by forwarding the port From the router. I am sharing a link which contains all the steps i followed for the setup.


http://www.slideshare.net/abhola/configure-iis-webserver

Access your website from anywhere in the world by visiting your Hostname.
For more information you can visit the www.wikihow.com




counter map


_____________________________________________________________________________________

Friday, February 19, 2010

Js/Redirector Malware

Js/redirector.bk is a Malware(It is a malicious software which includes viruses,worm,trojan programming that collect the user's information like surfing and downloading without any permission) or we call it JavaScript Trojan detected by Quick Heal Antivirus. It is the detection for obfuscated JavaScript contained within Web pages. It generates dynamic JavaScript code in the files which results in website malfunctioning or website down.


Detection:- Trojan-Downloader.JS.Pegel.b (17th place on the Internet by Kaspersky)

JS_ONLOAD.SMF by (Trend Micro)


Symptoms:- Slow access of shared drives in the network and corruption of .js files.

Sometimes Quick Heal Antivirus removes the infected Java Script files which results in website malfunctioning.


Here is the screenshot of a website www.cssoftsolutions.com which is infected by the java script Trojan.









The virus can be removed by using Anti malwares: -

Microsoft fore front,

Microsoft security essentials

Windows defender (The computer must run the genuine Windows).


By following the link below you can browse the all type of Malwares which are a class of Js/redirector.

http://www.microsoft.com/Security/portal/Threat/Encyclopedia/Browse.aspx?L=R&Page=33


I asked for the support from Quick Heal three days before. Those people collected all the required reports to remove the bugs. So I am waiting for the response.


Resolution:- I had a discussion with Quick Heal providers and the problem of infecting Java Script files or removing them has been solved by installing the definitions of Quick Heal Antivirus for dated 10 March 2010.

Now all .Js files are safe and i am not getting any Unknown Error in my Website which is infected by Js/redirector.bk (Malware).