Windows Server 2003

1. WINDOWS SERVER 2003 2. Windows Server 2003 different Versions 3. Hardware requirement for Windows Server 2003 4. HCL - Hardware Compatibility List 5. Keep following points in mind before Upgrade Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2003 INSTALLATION 8. Windows Server 2003 Activation 9. MANAGING LICENSING 10. Administrating License Logging Services 11. Managing Software Installation and Maintenance 12. Essential Administration Tools 13. Difference between RAID & WINDOW BACKUP 14. RAID – Redundant Array of Inexpensive DISK 15. Disk Mirroring & Disk Duplexing 16. Disk partition and File System – FAT, FAT32, NTFS 17. Remote Desktop for Administration & Terminal services 19. To connect to Remote Desktop Pc from Client PC do as follow 20. Remote Assistance 21. Difference between RAID & WINDOW BACKUP 22. SYSTEM STATE DATA 23. IP-ADDRESSING and IPV4 24. IPV6 [Internet Protocol Version 6] 25. Signed & Unsigned Driver 26. Hardware Profile 27. CHKDSK.EXE (Check Disk) 28. Disk Defragmenter(DFRG.MSC) 29. Introduction to AD [Active Directory] 30. Difference between WORKGROUP & DOMAIN 31. Operating System that support Active Directory 32. FSMO [Flexible Single Master Operation] 33. GC (GLOBAL CATALOG) Server 34. Site 35. Disk Defragmenter (DFRG.MSC) 36. AD replication 37. AUTHORITATIVE Restore 38. TOOLS to Troubleshoot Active Directory Installation 39. Understanding USER, GROUP & COMPUTER 40.GROUP ACCOUNTS 41. User Profile 42. Roaming User Profile 43. Mandatory User Profile 44. Attrib (Attribute) 45. Taking Ownership 46. Copying and Moving Files and Folders 47. Server Roles for WINDOWS SERVER 2003 48. AVAILABILITY & SECURITY 49. General Server Security Issues 50. OSI MODEL 51. Data Encapsulation 52. TCP/IP or DoD Model 53. Protocol Working at Host to Host (Transport) layer 54. NETWORK MONITOR 55. Internet Information Services 55. Monitoring Tools 54. DNS [Domain Name System] 55. DNS ZONE 56. Remote Access Authentication Process 57. Remote Access
Pr.Pg Next Pg

Copying and Moving Files and Folders tutorials

  • When you copy files or folders from one folder to another folder, or from one volume to another volume, permissions change.

  • When you copy a file within a single NTFS volume or between NTFS volumes:

    1. Windows Server 2003 treats it as a new file. As a new file, it takes on the permissions of the destination folder.

    2. You must have Write permission for the destination folder to copy files and folders.

    3. You become the CREATOR OWNER.

Note: When you copy or move files or folders to FAT volumes or to a floppy disk, the folders and files lose their NTFS permissions because FAT volumes and floppy disks do not support NTFS permissions.

When you move a file or folder within a single NTFS volume

  • The file or folder retains the original permissions.

  • You must have the Write permission for the destination folder to move files & folders into it.

  • You must have the Modify permission for the source file or folder. The Modify permission is required to move a file or folder because Windows Server 2003 deletes the file or folder from the source folder after it is copied to the destination folder.


BASIC overview of Public and Private key encryption

  • When a client wants to securely send data to server, the client obtain the server’s public key and uses it to encrypt the data & then securely sent to server over network

  • When server receives the encrypted data from client, the server decrypts it using private key.

  • When sever wants to securely reply to clients request, the server obtains the client’s public key and uses it to encrypt the reply & then securely sent to client over network

  • When client receives the encrypted data from server, the client decrypts it using private key.


Imp. Terms used in Certificates

  • CA Certificate Authorities are trusted agency responsible for issuing digital certificates. These agency confirm the identity of Server and Clients and then issue certificate that confirms these identity.

  • When any site want digital certificate one will go as follow

  • Request CA for Certificate

  • CA will verify all information, it ask for lots of information to verify who is who …

  • Depending upon above detail CA may Approve certificate or Deny it

  • If approved then CA will issue Digital Certificate.

  • After the expiry of Certificate one may either Renew it or

  • Revoke certificate i.e. cancel earlier issued certificate and any certificate that is revoked will be published in CRL (Certificate Revoke List)


Digital Certificate have (PKI) key pair i.e.

  • Private key Public Key

  • Usually data is encrypted with senders Private Key and then,

  • public key is assigned to client

  • Client uses Public Key to decrypt data using Public key.


Basic ‘Trust’ concept of CA working

  • When a client pc wants to interact with web site over internet and send some confidential data securely, the web server have web pages that uses SSL (Secure Socket Layers)

  • To use SSL, web server must have Web Server Certificate. This certificate will certify that server is genuine and safe to send confidential data. Lets assume that server is having certificate issued by ‘VERISIGN’ agency.

  • The client browser at this point do not send any confidential data but it check with the authentication of certificate issuing authority. It checks with browser ‘Trusted CA List’. Here ‘VERISIGN’ will be in trusted CA list.

  • Now as Client trusts ‘VERISIGN’ CA, Verisign trust Web Server for issued Certificate for SSL, and that way client trust web server. This way it is all based on trust.



  • Certificates enable clients and servers to authenticate each other prior to establishing a connection. Because certificate contain ‘Private’ and ‘Public’ keys, they are used to encrypt and decrypt data.

  • Lets try to “Encrypt” file with one user account and try to open if using other user a/c

  • You can open file using only user account who have encrypted it but can’t with any other user (even administrator) because the file is encrypted with user certificate.

  • If you want that file can be open by other user, you have to export encrypted user certificate and then import it to other user.

  • Export certificate and save it to file, then logon using other user account and then import that certificate.


Pr.Pg border                                              Next Pg