Windows Server 2008

1. WINDOWS SERVER 2008 2. WINDOWS 2008 Editions 3. WINDOWS 2008 Server Core 4. APPROX. COST OF WINDOWS SERVER 2008 5. Upgrade / Migrate 6. Upgrade from previous OS 7. WINDOWS SERVER 2008 INSTALLATION 8. Windows Server 2008 Activation 9. Activation Method 10. RAID 11. BACKUP and RECOVERY 12. Wbadmin 13. BACKUP Utility 14. Windows Recovery Environment 15. Server Roles for WINDOWS SERVER 2008 16. IP-ADDRESSING and IPV4 17. IPV6 18. Remote Desktop Connection 19. Steps for Remote Desktop Pc from Client PC 20. Remote Desktops 21. MANAGING SERVER CORE 22. TERMINAL SERVICES (TS) 23. TERMINAL SERVICES MANAGER 24. MANGAING FILE AND PRINT SERVERS 25. Share Folder 26. Attrib (Attribute) 27. Windows Registry 28. Disk Quotas 29. Disaster Recovery Tools 30. MMC 31. Remote Assistance 32. Signed & Unsigned Driver 33. Hardware Profile 34. CHKDSK.EXE(Check Disk) 35. Disk Defragmenter (DFRG.MSC) 36. ACTIVE DIRECTORY REVIEW 37. Introduction to AD 38. TRUST 39. FSMO 40. GC (GLOBAL CATALOG) Server 41. Site 42. AD replication 43. Backup of Active Directory (DC) 44. Understanding USER, GROUP & COMPUTER 45. Create Local User & Multiple Users 46. GROUP SCOPE 47. Public and Private key encryption 48. Trust concept of CA working 49. ETHERNET CARDS 50. Availability and Security 51. General Server Security Issues 52. OSI MODEL 53. Data Encapsulation 54. TCP/IP or DoD Model 55. Protocol Working at Host to Host (Transport) layer 56. NETWORK MONITOR 57. Internet Information Services 58. Monitoring Tools 59. DNS [Domain Name System] 60. DNS ZONE 61. Remote Access Authentication Process 62. Remote Access Interview Question & Answer part 1 Tutorials Interview Question & Answer part 2 Tutorials Interview Question & Answer part 3 Tutorials Interview Question & Answer part 4 Tutorials Interview Question & Answer part 5 Tutorials Interview Question & Answer part 6 Tutorials Interview Question & Answer part 7 Tutorials
Pr.Pg Next Pg

Basic ‘Trust’ concept of CA working tutorials

  • When a client pc wants to interact with web site over internet and send some confidential data securely, the web server have web pages that uses SSL (Secure Socket Layers)

  • To use SSL, web server must have Web Server Certificate. This certificate will certify that server is genuine and safe to send confidential data. Lets assume that server is having certificate issued by ‘VERISIGN’ agency.

  • The client browser at this point do not send any confidential data but it check with the authentication of certificate issuing authority. It checks with browser ‘Trusted CA List’. Here ‘VERISIGN’ will be in trusted CA list.

  • Now as Client trusts ‘VERISIGN’ CA, Verisign trust Web Server for issued Certificate for SSL, and that way client trust web server. This way it is all based on trust.


  • Certificates enable clients and servers to authenticate each other prior to establishing a connection. Because certificate contain ‘Private’ and ‘Public’ keys, they are used to encrypt and decrypt data.

  • Lets try to “Encrypt” file with one user account and try to open if using other user a/c

  • You can open file using only user account who have encrypted it but can’t with any other user (even administrator) because the file is encrypted with user certificate.

  • If you want that file can be open by other user, you have to export encrypted user certificate and then import it to other user.

  • Export certificate and save it to file, then logon using other user account and then import that certificate.


Pr.Pg border                                             Next Pg