Windows Server 2008

1. WINDOWS SERVER 2008 2. WINDOWS 2008 Editions 3. WINDOWS 2008 Server Core 4. APPROX. COST OF WINDOWS SERVER 2008 5. Upgrade / Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2008 INSTALLATION 8. Windows Server 2008 Activation 9. Activation Method 10. RAID 11. BACKUP and RECOVERY 12. Wbadmin 13. BACKUP Utility 14. Windows Recovery Environment 15. Server Roles for WINDOWS SERVER 2008 16. IP-ADDRESSING and IPV4 17. IPV6 18. Remote Desktop Connection 19. Steps for Remote Desktop Pc from Client PC 20. Remote Desktops 21. MANAGING SERVER CORE 22. TERMINAL SERVICES (TS) 23. TERMINAL SERVICES MANAGER 24. MANGAING FILE AND PRINT SERVERS 25. Share Folder 26. Attrib (Attribute) 27. Windows Registry 28. Disk Quotas 29. Disaster Recovery Tools 30. MMC 31. Remote Assistance 32. Signed & Unsigned Driver 33. Hardware Profile 34. CHKDSK.EXE(Check Disk) 35. Disk Defragmenter (DFRG.MSC) 36. ACTIVE DIRECTORY REVIEW 37. Introduction to AD 38. TRUST 39. FSMO 40. GC (GLOBAL CATALOG) Server 41. Site 42. AD replication 43. Backup of Active Directory (DC) 44. Understanding USER, GROUP & COMPUTER 45. Create Local User & Multiple Users 46. GROUP SCOPE 47. Public and Private key encryption 48. Trust concept of CA working 49. ETHERNET CARDS 50. Availability and Security 51. General Server Security Issues 52. OSI MODEL 53. Data Encapsulation 54. TCP/IP or DoD Model 55. Protocol Working at Host to Host (Transport) layer 56. NETWORK MONITOR 57. Internet Information Services 58. Monitoring Tools 59. DNS [Domain Name System] 60. DNS ZONE 61. Remote Access Authentication Process 62. Remote Access Interview Question & Answer part 1 Tutorials Interview Question & Answer part 2 Tutorials Interview Question & Answer part 3 Tutorials Interview Question & Answer part 4 Tutorials Interview Question & Answer part 5 Tutorials Interview Question & Answer part 6 Tutorials Interview Question & Answer part 7 Tutorials
Pr.Pg Next Pg

BASIC overview of Public and Private key encryption tutorials

  • When a client wants to securely send data to server, the client obtain the serverís public key and uses it to encrypt the data & then securely sent to server over network

  • When server receives the encrypted data from client, the server decrypts it using private key.

  • When sever wants to securely reply to clients request, the server obtains the clientís public key and uses it to encrypt the reply & then securely sent to client over network

  • When client receives the encrypted data from server, the client decrypts it using private key.

Imp. Terms used in Certificates

  • CA Certificate Authorities are trusted agency responsible for issuing digital certificates. These agency confirm the identity of Server and Clients and then issue certificate that confirms these identity.

  • When any site want digital certificate one will go as follow

  • Request CA for Certificate

  • CA will verify all information, it ask for lots of information to verify who is who Ö

  • Depending upon above detail CA may Approve certificate or Deny it

  • If approved then CA will issue Digital Certificate.

  • After the expiry of Certificate one may either Renew it or

  • Revoke certificate i.e. cancel earlier issued certificate and any certificate that is revoked will be published in CRL (Certificate Revoke List)

Digital Certificate have (PKI) key pair i.e.

Private key Public Key

  • Usually data is encrypted with senders Private Key and then,

  • public key is assigned to client

  • Client uses Public Key to decrypt data using Public key.

Pr.Pg border                                              Next Pg