SHAREPOINT

SHAREPOINT
Spotlight on share server 2010

Monday, December 24, 2012

HOW TO HOST AWEB SITE


WEB HOSTING:

1.       WEB SERVER: IIS7.0 SERVICES(INTERNET INFORMATION SERVICES)IIS7.0 SERVICES ARE USED FOR A WEB SERVER.IIS SERVICE MAINLY USED TO LAUNCH WEB SITESON THE INTERNET AND AS WELL AS ON

2.       INTRANET IIS6.0/IIS7.0 USE TO RUN SERVICES LIKE FTP SERVICE.IIS CAN BE INSTALLED IN WINDOWS 2000/2003/2008 SERVER COMPUTERS.WIN SRVER 2008 WEB EDITION IS SPECIALLY DESIGNED TO RUN IIS7.0 IIS IS ALSO AVAILABLE IN CLIENT OS.BUT THE SERVICES IN CLIENT OS IS LIMITED AND CAN SUPPORT ONLY 10 USERS AT ATIME.WEB SITE IS COLLECTION OF DOCUMENTS.THE PROTOCOL HTTP IS USED TO ACCESS WEB SITES BY THE CLIENTS FROM THE WEB SERVER.HTTP USE THE DEFAULT PORT NO 80.APACHE CAN ALSO BE USED TO CONFIGURE A WEB SERVER.

INSTALLATION OF WEB SERVER: GO TO THE SERVER MANAGER ----> ROLES---->ADD ROLES------>NEXT--------->ADD DNS AND WEB SERVER IIS -->NEXT-->NEXT--->NEXT--->CLICK ON THE CHECKBOX APPLICATION DEVOLPMENT---->SELECT ASP.NET--->NEXT----->INSTALL.

YOU ARE READY FOR HOSTING A WEB SITE WITH FULL FLEDGED RIGHTS.

BEST REGARDS

GURBINDER SHARMA

Cyber crime cell & digital forensics

MCITP/MCTS/MCP

 

Saturday, December 8, 2012

NEW SECURITY BULLTEIN RELEASED

NEW BULLETIN SUMMARY
Bulletin IDMaximum Severity Rating Vulnerability Impact Restart RequirementAffected Software*
Bulletin 1 CriticalRemote Code ExecutionRestart requiredInternet Explorer on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
Bulletin 2CriticalRemote Code ExecutionRestart requiredWindows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT.
Bulletin 3 CriticalRemote Code ExecutionMay require restartMicrosoft Word 2003, Word 2007, Word 2010, Word Viewer, Office Compatibility Pack, SharePoint Server 2010, and Office Web Apps 2010.
Bulletin 4CriticalRemote Code ExecutionMay require restartMicrosoft Exchange Server 2007 and Exchange Server 2010.
Bulletin 5 CriticalRemote Code ExecutionRestart requiredWindows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
Bulletin 6ImportantRemote Code ExecutionRestart requiredWindows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012.
Bulletin 7 ImportantSecurity Feature BypassRestart requiredWindows Server 2008 R2 and Windows Server 2012.
* The list of affected software in the summary table is an abstract. To see the full list of affected components please click and review the "Affected Software" section.
Regards
Microsoft Security Team
Gurbinder Sharma
Microsoft Certified IT Profssional
Although we do not anticipate any changes, the number of bulletins, products affected, restart information, and severities are subject to change until released.

Advance Notification Webpage: The full version of the Microsoft Security Bulletin Advance Notification for this month can be found at http://technet.microsoft.com/security/bulletin/ms12-dec.

Microsoft Windows Malicious Software Removal Tool: Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.

Monthly Security Bulletin Webcast: To address customer questions on these bulletins Microsoft will host a webcast next Wednesday, December 12, 2012, at 11:00 A.M. Pacific Time (U.S. and Canada). Registration for this event and other details can be found at http://technet.microsoft.com/security/bulletin/.
At this time, no additional information on these bulletins, such as details regarding the vulnerability or severity, will be made available until the bulletins are published on Tuesday.
REGARDING INFORMATION CONSISTENCY
We strive to provide you with accurate information in static (this mail) and dynamic (web-based) content. Microsoft’s security content posted to the web is occasionally updated to reflect late-breaking information. If this results in an inconsistency between the information here and the information in Microsoft's web-based security content, the information in Microsoft's web-based security content is authoritative.

If you have any questions regarding this alert please contact your Technical Account Manager.

Thank you,
Microsoft CSS Security Team

Thursday, November 29, 2012

Intrusion Detection Systems

Hi
Today, I want to share something about security . Everybody knows about Hackers & what they do.
So this is not our focus rather, we are talking about how to AVOID/DETECT and Trace the Bad Man.

IDS:
Is a Security sub-program programmed for intruders detection , so its may implemented freshly or could be a   part of an already existing system. So mainly work as a part of the security system.

PRESENTLY: Not widely known to much people and the cost of implementation/Configuration/Maintenance and an expert Admin.

Future: is bright become its rocking in near future .

Limitations:
1.   False alarming, due to some different behavior of the user , but to system its a unusual activity and trigger
 the alert. So ,  hope fully we should succeeded in making a PC which accurately caught the culprit by judging the exact behavior of the unauthorized user.

2.  DATA MINING:
Required lots of efforts to go deep inside to find the culprit i,e an enterprise database/centerilized repository.

suggestions are welcome from every one#

gurbinder.sharma@gmail.com

gurbindersharma@hotmail.com

Regards
Gurbinder

IT Specialist/Security/Professional and Healthcare Expert: IT Specialist/Security/Professional and Healthcare Expert: Rumors about Microsoft windows -8

click below the link provided or  go to  HTTP://www.technet.com 

www.msdn.com
IT Specialist/Security/Professional and Healthcare Expert: IT Specialist/Security/Professional and Healthcare Expert: Rumors about Microsoft windows -8

IT Specialist/Security/Professional and Healthcare Expert: Rumors about Microsoft windows -8

for more detailed info , pls visit my blog or Microsoft's website to eliminate your doubts.


IT Specialist/Security/Professional and Healthcare Expert: Rumors about Microsoft windows -8

Rumors about Microsoft windows -8

Dear Readers
greetings to all
I am Surprised to read some article that win-8 ends up the os product family.More over its about making forecast that in future Microsoft has nothing remain nothing to present in the future.Its ridiculous to think , that we are lost in the future.
I want to know on which ground , the statement is made.
Microsoft was/is/will remain the leader in this field,no  one is even near to us.However is someone wants to present this is welcome for the argument , but must with some concrete logic.
Windows eight is awesome .
All the IT pro's/Developer's and any tech savvy can download the 90 days free trial and free to evaluate what , i am saying/want to probe.
Regards
Gurbinder Sharma
Microsoft solutions provider associate/tech specialist and win-8 offerings provider. 
Investigator cyber crimes & Digital Forensics Expert.
91-9876023524

Friday, September 21, 2012

Programming in c



LOOPS in C Language
LOOPS:

To execute a set of instructions repeatedly until a particular condition is being satisfied.
Three types of looping statements are there
1)      For Loop
2)      While Loop
3)      Do while Loop
For Loop:-
In for looping statement allows a number of lines represent until the condition is satisfied
Syntax:
for(initialize counter variable ; condition ; increment/decrement the counter variable)
{
Statement1;
...
Statement n;
}
Flow chart:
See the flowchart of for loop in figure1



Example program using for loop:
main()
{
int counter,a[10];
for(counter=0;counter<10 counter="counter" span="span">
{
printf(“Enter a[%d]=”,counter);
scanf(“%d\n”,a[counter]);
}
printf(“Array elements:”);
for(counter=0;counter<10 counter="counter" span="span">
printf(“%d”,a[counter]);
}
Explanation:
In above program array a length 10.It occupies 20bytes in memory.
Counter is normal integer variable. It is used to read and display the array values.
First FOR LOOP is used to read the array values.
Second FOR LOOP is used to display the array values. In this second FOR LOOP using one line. So, no need of brace brackets
WHILE LOOP:
In While looping statement allows a number of lines represent until the condition is satisfied
Syntax:
while( condition)
{
Statement1;
...
Statement n;
}
Flow chart:
See the figure2
Example program using while loop:
main()
{
int counter,a[10];
counter=0;
while(counter<10 span="span">
{
printf(“Enter a[%d]=”,counter);
scanf(“%d\n”,a[counter]);
counter+=1;
}
printf(“Array elements:”);
counter=0;
while(counter<10 span="span">
{
printf(“%d”,a[counter]);
counter+=1;
}
}
Explanation:
In above program array a length 10.It occupies 20bytes in memory.
Counter is normal integer variable. It is used to read and display the array values.
Before using counter variable to initialize counter. Then use it in WHILE LOOP.
First WHILE LOOP is used to read the array values.
Second WHILE LOOP is used to display the array values.
DO WHILE LOOP:
In DO WHILE LOOP first execute the statements then it checks the condition.
Syntax:
do
{
Statement1;
...
Statement n;
}while(condition);
Flow chart:
See the figure3
Example program using for loop:
main()
{
int counter;
counter=0;
do
{
printf(“%d”,counter);
}while(counter>0);
}
CONCLUTION:
In FOR LOOP:
No need to initialize variable before the LOOP
In WHILE LOOP:
To initialize the variable before the LOOP
Increment/decrement the variable within the LOOP
In DO WHILE LOOP:
Once it execute If the condition is TRUE/FALSE.
If u want to see my full website please visit below link

Wednesday, September 19, 2012

HOW TO INSTALL DHCP ON SERVER 2008

Windows Server -2008 is very advanced and enhanced version of precedsors .
Steps involved.
1. Go To Server Manager
2. Click on Add roles.
3. This will show you , the list of roles and features present in the server.
4. Click Next
5. Choose DHCP from the list of available roles.
6. check the chkbox option ------ click next . this will show the features , which will be installed automatically with your DHCP server.
7. Collect the results and finish.
8. Reboot the server and goto the start btn.
. All Programs
9. Admin tools
10 Click on DHCP Server.
11. A new window opens and ask you for the configuration of the DHCP Server.
12. First of all authorize the server .
13. Create new scope now.
14. Give the start range followed by end range of ip's.
NOTE:
AD is Necessary to install with DNS server.
you  are ready to go.
Regards
gurbinder sharma
9876023524

Tuesday, September 18, 2012

c programming



Q1.      Explain the importance of C language.
Ans.    1. C is portable means program written for one computer may run successfully on other computers.
2. C is fast means the executable program obtained after compiling and linking run very fast.
3. C is compact i.e. the statements in C-language are generally short but are very powerful; several operators can be combined together in just one statement.
4. The C language has both the simplicity of high-level language and low-level language.
Q2.      What is the structure of ‘c’ program?
Ans.    i) Any C program is the combination of functions. main() is one such function.
ii) The set of statements belonging to a function are enclosed within a pair of braces.
iii) Any variable used in the program must be declared before using it.
iv) Any c statement always ends with a ;
The structure of c program is as follow:
# Preprocessor directives
....................................
....................................
void main ()
{          
body of the main function;
........................;
........................;    }
Q3.      What are the relational operators available in C?
Ans.    The various relational operators available in ‘C’ are: -
Operator
Description
Greater then
Less then
>=
Greater then and equal to
<=
Less then and equal to
==
Equal to
!=
No Equal to
Q4.      What is the purpose of adding comments in a program? Can comments span more then a line.
Ans.    Comments are non-executable statements. With the help of comments we can give description about the program or any particular statement. Comments are enclosed with in /* and */. Any number of comments can be given at any place in the program. Comments can't not be nested.
A comment can be split over more than one line, as in,
/* this is
comment  */
Q5.      What is the syntax of PRINTF function of  'C'?
Ans.    printf() is function, which is used to print on the screen the value contained in a variable.
The general form of printf statement is ,
printf ("format string",list of variable);
format string could be ,
%f for printing real values
%d for printing integer values
%c for printing character values
Q6.      What is the syntax of nested if statement?
Ans.    It is perfectly alright if we write an entire if-else construct within either the body of the if statement or the body of an else statement. This is called of 'nesting' of if statement. The syntax is as follow:
if (condition)
            {
                        if (condition)
                                    do this;
                        else
                        {
                                    do this;
                                    and this;
                        }
            }
            else
                        do this;
Q7.      What is the syntax of switch statement?
Ans.    The control statement, which allows us to make a decision from the number of choices, is called switch. Or more correctly switch-case-default, since these three keywords go together to make up the control statement. They most often appear as follows:
switch (integer expression)
{
            case constant 1:
                        do this;
                                    case constant 2:
            do this;
            case constant 3:
                                    do this;
            default:
                        do this;
}
Q8.      What is the syntax of FOR statement?
Ans.    The FOR loop allows us to specify three things about a loop in a single line:
a)    Setting a loop counter to an initial value.
b)    Testing the loop counter to determine whether its value has reached the number of repetitions desired.
c)    Increasing the value of loop counter each time the program segment within the loop has been executed.
The general form of for statement is as under:

for (initial counter; test counter; increment counter)
{
                        do this;
            and this;
and this;
}
Q9.      What is format specifier?
Ans.    Format specifier is used to specify the data type of the variable. The format specifiers for various data types are shown below:
%d-------Integer data
%c------Character data
%f-------Floating point data
%ld-----Long Integer
Q10.    What is the scope of local variable?
Ans.    The scope of local variable is that, the variable is accessible with the block where it is declared. Local variable can't be accessed outside of the block, which contains its declaration.
Q11.    Which are the conditional operators available in C?
Ans.    The conditional operators ? and : are sometimes called ternary operators since they take three arguments. In fact, they form a kind of foreshortened if-then-else. Their general form is,
expression 1 ? expression 2 : expression 3
If expression 1 is true then the value returned will be expression 2 otherwise the value returned will be expression 3.
Q12.    What are the formatted output statements of C?
Ans.    I/O functions can be of two types  (i) formatted and (ii) unformatted functions. The basic difference between them is that the formatted functions allow the input read from the keyboard or the output displayed on the VDU to be formatted as per our requirements.  For example, if values of average marks and percentage marks are to be displayed on the screen, then details like where this output would appear on the screen, how many spaces would be present between the two values, the number of places after the decimal points etc. can be controlled using formatted functions. printf() and fprintf() are formatted output functions in C.
Q13.    What is pseudo code?
Ans.    Pseudo code is programming code written in general English language, so that no programmers can understand the code properly.
Q14.    Write a short note on type casting?
Ans.    Type casting refers to enforcement of explicitly converting the value of an expression to a particular data type. It is used to convert the data type from lower data type to higher data type and converse for temporary period. So that calculation can be performed with both the data types. e.g.
void  main()
            {           int a=5;float b;
printf(“value of a %d”,a);        
                        b=(float)a;
            printf(“value of b %d”,b);
}
Q15.    What do you mean by type conversion?
Ans.    In an expression there might be cases when you need to involve different types of variable in a single expression. For example, an expression may contain addition of two integers and the result is required to be multiplied by a float. The expressions that contain variables and constants are evaluated using the following methods, known as Type conversions. The data types are required to be converted for easy calculation of the expression. These conversions are implicitly done by the system.
Q16.    What are the derived data types used in C?
Ans.    The derived data types are
Arrays (array[10])
Functions (function())

Enumerated (enumerated_variable)
Pointers (*pointer)
Structures (structure.member)
Union (union_name.member)
Q17.    What do you mean by local and global variables?
Ans.    Local variables: Local variables are defined with in the pair of braces or between the body of the function. The scope of the variable is with in the function when function finished they will obsolete.
Global variables: These variables defined out side all the function. And can be used to any function with in the file because the scope of these variable are global to the file.
Q18.    Explain various programming techniques?
Ans.    Programming techniques are used to make the program simple, efficient, understandable and easy to maintain. The three programming techniques commonly used are:-
Top down design: - Using this design program is divided into the smaller blocks, which can be linked and called whenever needed. The programmers design the program in different levels and can be called any level at any time.
Bottom up design: - It is also designed in the same manner and divide the whole program into the smaller blocks, but when it is called it begins from the smaller block to the bigger till the program end.
Modular design: - A level consists of one or more modules. The first level is a complete main program and the module of the successive level contains sub modules Execution is controlled by the main program
Q19.    What is sizeof operator?
Ans.    The sizeof operator returns the size, in bytes, of given operand.
            Syntax is: -     
sizeof (exp)
Example: -     
 sizeof (float)
Result: -          
returns value 4
Q20.    Differentiate between expression and statement.
Ans.    An expression refers to variables, constants and operators. It represents a single data item, such as a numbers or characters. One or more operators may interconnect these variables or constants. In C, very complex expressions can be solved easily. An algebraic expression in C is represented as follows:
Algebraic expression: a x b – c x d
Its relative C expression will be written as: a * b – c* d.
Q21.    What is the use of #define directives statement?
Ans.    Define directives are used to define macro and the constants. This preprocessor starts with #(hash) symbol.
Q22.    What is a macro? How is it different from preprocessor?
Ans.    The macro is substitution string that is placed in a program. It is replaced by the definition when program is compiled. It is different from preprocessor as preprocessor links the files with the object code.
Q23.    What do you mean by ternary operator?
Ans.    Both if and ? : (Ternary operator) perform the same conditional operation, but ?: process fast as compare to the 'if' statement. The ? (ternary condition) operator is a more efficient form for expressing simple if statements. We can also nested the ternary operator. It has the following form:
  Condition? True: False
Q24.    Distinguish between unary and binary minus.
Ans.    Unary operators work on one operand and binary operators work on two operands. The unary operators negate the value of the operand
For example
            Int a=5;
a=-a;
            Then the value of a is now –5
            In case of binary minus it perform arithmetic subtraction on the given operands
            For example
                        Int a,b,c;
                        a=90;
            b=80;
                        c=a+b
Q25.    Differentiate between comparison and equality operator.
Ans.    A character or symbol indicating a relationship between two or more values or expressions called an operator. These operators include less than (<), less than or equal to (<=), greater than (>), greater than or equal to (>=), not equal (<>), and equal (==).
Q26.    Explain various types of errors with examples.
Ans.    Syntax errors: The errors, which occur due the incorrect way to write the code. It may be due the missing comma, semi colon etc.
As the line:
                        printf(hello);
will show the error because string is not enclosed in "  " .
Logical error it is not due to any syntax mistake, but due to incorrect logic. The compiler will not show the error due to this. The programmers himself have to find and correct it.
As:  for(I=10;I<5 span="span">
Here the logic is wrong as I is already 10 which is never less then 5.
Q27.    What is the syntax of while statement?
Ans.    initialization of looping variable;
            While (conditional expression)
            {
body of the loop
....................
....................
....................
Increment/decrement;
}
Q28.    What do you mean by conditional execution?
Ans.    When execution of set of commands is based upon some condition. This is known as conditional execution. Depending upon true or false path we can have different set of instructions to execute.
Q29.    What is difference between if and ? : (Ternary operator)?
Ans.    Both if and ?: operator perform the same conditional operation , but ?: process fast as compare to the 'if' statement.