2.7.2 AppLocker (part 2)
By Val Bakh
In last month’s blog post about AppLocker, we covered the basics of using AppLocker. Now let’s consider a few examples of AppLocker use that might help you avoid unexpected and sometimes unpleasant situations.
MS Windows Tips and Tricks | 2.7.2 Miscellaneous Windows 7 Features
Mar 26, 2013 10:29:00 AM / by Kelson Lawrence posted in Windows 7, tips and tricks, Microsoft certification, AppLocker
A Few Bytes About 32-bit vs. 64-bit Processing
Mar 25, 2013 8:49:00 AM / by Kelson Lawrence posted in 32-bit Processing, 64-bit Processing
By Tim Charlton
What’s the difference between 32-bit and 64-bit computing?
If you’re in the market for a new computer, or perhaps just a new operating system (OS), you’ve likely noticed designations such as x86, x64, 32-bit, or 64-bit. What do these designations mean, and how do they relate to your next technology purchase? Simply put, these designations indicate the amount of data that a computer system can process at any given time.
An Administrator’s Guide to Popularity
Mar 20, 2013 9:34:00 AM / by Kelson Lawrence posted in Network Administrators guide, tips, assess, backup, repair, event logs
Boson Exam Environment Customization
Mar 19, 2013 8:47:00 AM / by Kelson Lawrence posted in practice tests, custom practice exam, Boson Exam Environment, answers, questions
By Glenn
When you use the Boson Exam Environment (BEE) for an ExSim-Max or a Marketplace practice exam, you can incorporate several available customization options – these deliver a customized exam experience and allow you to take the exam in a way that works best for your study goals.
Back to the Basics: Device Access Modes Part 2
Mar 13, 2013 1:05:00 PM / by Kelson Lawrence posted in Device Access Modes, Interface Configuration Mode, Line Configuration Mode, Router Configuration Mode, Global Configuration Mode
By Kailin Acheson
In Part 1 of the Device Access Modes blog, we looked at some fundamentals: switches, routers, and access modes. To recap those modes quickly, user EXEC mode is represented by the Switch> prompt (or similar) and does not allow configuration changes. Privileged EXEC mode is represented by the Switch# prompt (or similar) and does allow configuration changes.
Subnetting Demystified
Mar 7, 2013 8:37:00 AM / by Kelson Lawrence posted in Binary Math, CIDR Notation, Why Subnet?, Fast Subnetting, Subnetting Demystified, IPv4, IP Addressing, Address Classes, Subnetting How To
By John Oden
It is 2013, and the last of the unallocated IPv4 address space was handed out by the Internet Assigned Numbers Authority (IANA) several years ago. The IT industry has been contemplating the looming depletion of the IPv4 address space since the early 2000s. Back in 2003, one would have thought that by 2013, we would be well on our way with the deployment of IPv6, which would once and for all eliminate the scarcity of available global IP addresses. Except that we're not. Not well on our way with the global deployment of IPv6, that is.
Back to the Basics: Device Access Modes Part 1
Mar 4, 2013 3:03:00 PM / by Kelson Lawrence posted in Networking Basics, switches, user EXEC mode, Device Access Modes, routers, privileged EXEC mode
By Kailin Acheson
It's been said that legendary coach Vince Lombardi once stood in front of his team of professional football players and stated, "Gentlemen, this is a football." That is starting at the beginning, with the fundamentals. Today we are going to discuss some fundamentals of networking: switches, routers, user EXEC mode, and privileged EXEC mode.
“The Network is Slow” – An Introduction to EtherChannel
Feb 28, 2013 11:57:00 AM / by Kelson Lawrence posted in networking, preventing accidental loops, slow network, etherchannel, introduction to etherchannel
By Thomas Chipman
“The network is slow” … four little words that are the bane of every network administrator. You will find that no matter how well a network design meets an organization’s current or projected needs, the day will surely come when those four dreaded words will find their way into a trouble ticket. If anecdotal evidence is to be believed, you will most likely hear those four words about 12 minutes before you had planned to head out for a weekend getaway; and they are usually uttered by your CEO as she is standing in your doorway with her laptop. Well, today’s that day and she isn’t going to leave your office until you’ve worked your magic. After all, that IS why she made YOU senior vice architect of network engineering.
The Seven Layers of Networking – Part I
Feb 27, 2013 8:18:00 AM / by Kelson Lawrence posted in The ISO OSI Reference Model, The Data Link Layer, The Network Layer, The Physical Layer, The Transport Layer, seven layers of networking
By John Oden
It’s difficult to have a conversation about networking without hearing someone refer to this layer or that layer. If you talk for more than a few minutes, you’ll soon hear someone say this device operates at Layer X or that device operates at Layer Y. We often begin these conversations assuming that everyone knows what these layers are and how they relate to the issues being discussed.
MS Windows Tips and Tricks | 2.7 Miscellaneous Windows 7 Features
Feb 25, 2013 10:39:00 AM / by Kelson Lawrence posted in Windows 7, tips and tricks, Miscellaneous Windows 7 Features
2.7.1 AppLocker (part 1)
By Val Bakh
AppLocker is a new type of Group Policy; it has been introduced in Windows 7 and Windows Server 2008 R2 and supersedes legacy software restriction policies (SRPs). In the Group Policy object (GPO) namespace, Applocker is located in a folder named Application Control Policies (ACPs). There is nothing else in that folder. Perhaps Microsoft is planning to add other types of ACPs in future versions of Windows, but for now, AppLocker is the one and only ACP.