Learn some helpful IT Administrator tips and tricks.

Welcome to the most comprehensive list of tips and tricks for IT field, you'll find anywhere on the internet. I hope these tips help you get the most out of your internet.

Friday, May 25, 2012

Windows Server 8 will be named Windows Server 2012

      Microsoft officials said during the opening keynote of the Microsoft Management Summit (MMS) 2012 in Las Vegas that the final name of Windows Server 8 will be “Windows Server 2012.”       Windows Server 2012 will include Microsoft's new Resilient File System (ReFS) to handle large volumes, resiliency to corruption, and shared storage pools across machines. ReFS will only be available inside...

Configure IP Address and DNS using Command Prompt

In order to configure TCP/IP settings such as the IP address, Subnet Mask, Default Gateway, DNS and WINS addresses and many other options you can use Netsh.exe. The requested operation requires elevation (Run as administrator). The IP address of your computer can be set from the command prompt by running the following commands at an administrative level prompt: netsh interface ip set address name="Local Area Connection" static 146.40.202.222...

Enable Telnet with only one command

Enable Telnet with only one command... Starting with Windows Vista, Windows 7 and ....., Microsoft no longer includes the telnet command installed by default. It is still available but must be installed or enabled by the user. The normal way to enabled additional features is through the “Turn Windows features on or off” window found in Control Panel. This accomplishes the task but can be annoying when you are working in Command Prompt and need...

Monday, April 23, 2012

Solving the Problem

       Many device or network problems are straightforward to resolve, but others yield misleading symptoms. If one solution does not work, continue with another. A solution often involves: Upgrading software or hardware (for example, upgrading to a new version of agent software or installing Gigabit Ethernet devices) Balancing your network load by analyzing:• What users communicate with which servers• What the user...

Sunday, April 22, 2012

Identifying and Testing the Cause of the Problem

      After you develop a theory about the cause of the problem, test your theory. The test must conclusively prove or disprove your theory. Two general rules of troubleshooting are: If you cannot reproduce a problem, then no problem exists unless it happens again on its own. If the problem is intermittent and you cannot replicate it, you can configure your network management software to catch the event in progress.      ...

Understanding the Problem

      Networks are designed to move data from a transmitting device to a receiving device. When communication becomes problematic, you must determine why data are not traveling as expected and then find a solution. The two most common causes for data not moving reliably from source to destination are: The physical connection breaks (that is, a cable is unplugged or broken). A network device is not working properly and...

Saturday, April 21, 2012

Recognizing Symptoms

       The first step to resolving any problem is to identify and interpret the symptoms."Recognizing Symptoms" The first step to resolving any problem is to identify and interpret the symptoms. You may discover network problems in several ways. Users may complain that the network seems slow or that they cannot connect to a server. You may pass your network management station and notice that a node icon is red. Your...

Troubleshooting Strategy

How do you know when you are having a network problem? The answer to this question depends on your site's network configuration and on your network's normal behavior. See"Knowing Your Network" for more information. If you notice changes on your network, ask the following questions: Is the change expected or unusual? Has this event ever occurred before? Does the change involve a device or network path for which you already have a backup solution...

Friday, April 20, 2012

Best Practices for Change Management Process

This is to provide Best Practices for Change Management Process. Change requests for Mission Critical or Significant applications, systems that contain or access High Integrity or Very High Integrity data, systems that contain or access Classified or Confidential-Restricted Access information, and infrastructure components that support these applications and systems must be documented via a Reporting Unit approved change request form. That change...

Thursday, April 19, 2012

How To Prioritization for Incidents

What is a incident?An Incident is a system bug or error, user question, or routine administration request. Defect Categories Defined – High      Incident of highest relative urgency. Essential Suite may be severely impacted and end-users require immediate assistance. The situation meets one or more of the following criteria:      1. Any issue that significantly increases the likelihood of a safety...