Windows Server Archives - RickyGao Pty Ltd
132
archive,category,category-win-server,category-132,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-child-theme-ver-1.0.0,qode-theme-ver-11.2,qode-theme-bridge,wpb-js-composer js-comp-ver-5.2.1,vc_responsive

Windows Server

When it comes to Windows application proxy settings, people always confused with IE proxy settings. And when it comes to IE proxy settings, the options processing order is confusing people again. Apparently Microsoft didn’t documented all of the proxy settings in Windows very clearly,...

TPM (Trusted Platform Module) is always the must have hardware chips on Windows platform. And VM (Virtual Machine) is always the easiest way for testing. However, when it comes to specific security testing which rely on TPM, we need to start talk about TPM...

Virtual Machine Manager can manage four types of Hyper-V host Windows Server computers in a trusted Active Directory Domain Windows Server computers in an untrusted Active Directory Domain Windows Server computers in a perimeter network Physical computers to be provisioned as...

The default Windows event log maximum file size is 20MB, and once it reach the maximum size, new events will overwrite old events which is the default behaviour in any Windows operating systems. Most of the IT Pro may have the similar scenario where...

I was trying to enable SR-IOV for my lab to in Windows Server 2012 Hyper-V to improve the performance and play around with the new technologies. So What is SR-IOV? http://msdn.microsoft.com/en-us/library/windows/hardware/hh440148%28v=vs.85%29.aspx How much performance improvement by...

 There are several ways you can find out which application/program is using/listening what port in your Windows system1. Old fashion commandnetstat -abnetstat -abnoYou can find out the detail parameter by type in netstat /?2. Windows Sysinternals - PortmonSystem Internals has a series great tools there...

From the Microsoft PKI hierarchy best practise, we all know that a good PKI hierarchy design should include an Offline Root CA and multi-tiers of online enterprise subordinate CA. Actually two tiers or three tiers, single server or multi-servers are pretty much the same configuration,...

I know the Hyper-V nested under another hypervisor using VMware is already out on Google for a long time, but I just want to point out some key parts to make more people success.This idea sound ridiculous but it's really useful for test purpose, especially...