Search

Ads

Saturday, November 7, 2009

Beauty Wizard v3.3




















Beauty Wizard v3.3 | 8 MB

Are you looking for a whole new look? Before deciding to take a chance, use the software Beauty Wizard to try out a large selection of many hairstyles (short, medium, long, special and men’s), which can be colored dynamically. The program also helps you choose colors for contact lenses, lipstick, shades and blushes. How does Beauty Wizard work? – to input the face image in the program directly, you can use a web or digital camera, connected with your computer. You can also input the image scanned from a photo. If you have not such devices, you could beg a friend or consultant to do it. Then all you have to do is to use the user friendly interface of the program. All features and control are described in detail in the program help.

Download

Rapidshare | Megaupload

Cue Club (Snooker)

Cue Club (Snooker) | 32MB


















Cue Club includes 7 different pool game types will keep players occupied for some time. Play US or European 8 ball, one of the most popular pool game types. For variety, try out 9 ball, where the balls are placed in a diamond and you must sink the balls in numerical order.

Fans of Euro-style play will enjoy 2 different types of Snooker, one with 15 reds and one with 10. Play any of these game types on your own or against the computer.

When you feel confident enough, sign up for a tournament to compete for trophies or challenge other players in the chat room to compete for higher ranking memberships that will get you into different rooms.

The coolest feature of Cue Club are its great pool ball physics. The game is very realistic and balls move just as you would expect them to. Chalk up your cue, set the position where you want to strike the cue ball, set the power, and tweak other factors if you wish. With Cue Club, it is easy for a beginner to get going and full-featured enough for the pool master to find hours and hours of enjoyment.

DOWNLOAD

Click here: hotfile

Top Ten The Most Sexiest Eyes in India

Who has Most Beautiful Eyes in indian actress























































































Face Smoother 2.0















Face Smoother description:

A special software that allows anyone to edit images and make them smoother
Face Smoother is a special photo editing software that allows anyone to edit photos and make them smoother.
Sometimes the face skin on the photo does not look fine. Face Smoother smoothes the face skin in an easy and fast way and makes the photo more beautiful.
With Face Smoother, you can smooth the face skin on the photo in an easy way to make the it more beautiful. You can also adjust rotate and resize the photo with Face Smoother.

Download
http://hotfile.com/dl/16368788/0b6f6b0/Face_Smoother_v2.0_Portableinnocent_kid.rar.html

Chicken Invaders 3 Game









Chicken Invaders 3
Chicken Invaders 3 Full


Chicken Invaders Just when you thought it was safe to eat chicken again, the chickens have returned with an organized invasion to take over the entire solar system! Journey to each planet and fight your way through to save the world (again)!

16 MB | Rapidshare – Megaupload – Hotfile

Download Chicken Invaders 3

http://rapidshare.com/files/302018511/CI3-egydown.exe.html

http://www.megaupload.com/?d=VP5WKL5G

http://hotfile.com/dl/16561123/86f779a/CI3-egydown.exe.html


Installing And Configuation of SBS 2003 from Scratch

Installing and Configuring SBS 2003

Implementing Microsoft's small business full featured package from an Exchange 2003 perspective. This article will not detail all the countless features of SBS 2003. Instead, it will focus on installing SBS 2003 as an Exchange server that also features file and monitoring services.

Introduction

Microsoft put a lot of development efforts into producing SBS 2003 so that it will be really full featured and yet easy to configure product. Due to its low cost a lot of small and medium sized customers are buying it and using it primarily as a messaging server.

This article will not detail all the countless features of SBS 2003. Instead, it will focus on installing SBS 2003 as an Exchange server that also features file and monitoring services.

Wizardry

Having installed previous versions of SBS and countless Active Directory and Exchange servers, the experts amongst us will be tempted to install components manually, the trademark of a real expert.

I would really recommend against it. Microsoft put a lot of effort in determining what most SBS installations require so that if you follow the wizards you will get a fully working server with little use for extra tweaking. Also, SBS 2003 is restricted from a security perspective, so if you don''t follow the wizards to the end of the installation process, you will have to spend some time loosening these restrictions for some regular features to work.

Operating System

The first step in installing SBS is setting up the operating system in the same way that Windows 2003 is installed.

http://www.msexchange.org/img/upl/image0021093423300448.jpg

Having completed this you will get the SBS Setup Wizard welcome screen. At his stage you should not proceed with the wizard. Instead you should configure the server to support the rest of the installation.

Before commencing with the installation it is of utmost importance that you install all available patches at http://windowsupdat e.microsoft. com.

Otherwise, some components might not install properly.

Partitioning

The following screenshot shows my recommendation for partitioning of a server. I reserve a healthy chunk of disk space for the operating system, create a separate partition for the page file (an idea borrowed from Unix/Linux installations) . The rest is used for data such as databases and user files.

http://www.msexchange.org/img/upl/image0041093423843542.jpg

Having configured the server partitions, now is a good time to configure the page file itself accessible by right clicking My Computer and choosing "Properties" or from the control panel.

http://www.msexchange.org/img/upl/image0061093423851729.jpg

http://www.msexchange.org/img/upl/image0081093423860026.jpg

http://www.msexchange.org/img/upl/image0101093423867792.jpg

http://www.msexchange.org/img/upl/image0121093423877104.jpg

http://www.msexchange.org/img/upl/image0141093423884948.jpg

Networking

The logic of the setup wizard requires you to configure a network card with a private IP address and your ISP DNS servers. Once the domain controller installation part of the SBS installation proceeds, the primary DNS server will be changed to the server''s IP private IP address as is required in an Active Directory domain.

http://www.msexchange.org/img/upl/image0161093423893104.jpg

Installation Wizard

If you install SBS servers with a single network card, like I do, you might get the following notice:

http://www.msexchange.org/img/upl/image0181093423901229.jpg

It''s okay to disregard it and proceed with the rest of the installation.

http://www.msexchange.org/img/upl/image0201093423910511.jpg

http://www.msexchange.org/img/upl/image0221093423919323.jpg

http://www.msexchange.org/img/upl/image0241093423927479.jpg

http://www.msexchange.org/img/upl/image0261093423938089.jpg

My recommendation is to leave all of the installation on the default drive C: and create folders for all of the data folders on the large data partition.

http://www.msexchange.org/img/upl/image0281093423946011.jpg

http://www.msexchange.org/img/upl/image0301093423953979.jpg

At this point the server is installed as a domain controller and IP addressing is changed. Running the IPConfig command will show something like this:

Ethernet adapter Server Local Area Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . . : 3Com Gigabit LOM (3C940)
Physical Address. . . . . . . . : 00-0E-A6-8A- 90-0C
DHCP Enabled. . . . . . . . . . : No
IP Address. . . . . . . . . . . . . : 10.10.10.200
Subnet Mask . . . . . . . . . . . : 255.255.255. 0
Default Gateway . . . . . . . . .: 10.10.10.254
DNS Servers . . . . . . . . . . . : 127.0.0.1
10.10.10.200
192.116.202. 99
192.116.192. 9
Primary WINS Server . . . . . : 10.10.10.200

Post Installation

After installation completed you should follow most of the To Do List Wizards.

http://www.msexchange.org/img/upl/image0321093424424995.jpg

The E-mail and Internet Wizard, for example, follows some configuration that was already performed but have some important configuration dialog boxes that are relevant for Exchange access. The following screenshots show the common configuration for a network with a broadband Firewall/Router connecting such as Cable or ADSL.

http://www.msexchange.org/img/upl/image0341093424432558.jpg

http://www.msexchange.org/img/upl/image0361093424441011.jpg

http://www.msexchange.org/img/upl/image0381093424452386.jpg

http://www.msexchange.org/img/upl/image0401093424460011.jpg

The following screenshot configures remote access for OWA, OMA and Outlook using RPC over HTTPS.

http://www.msexchange.org/img/upl/image0421093424468245.jpg

http://www.msexchange.org/img/upl/image0441093424481229.jpg

The following screenshots show a common configuration for Exchange to send and receive Internet mail.

http://www.msexchange.org/img/upl/image0461093424489511.jpg

http://www.msexchange.org/img/upl/image0481093424496745.jpg

http://www.msexchange.org/img/upl/image0501093424504776.jpg

http://www.msexchange.org/img/upl/image0521093424512214.jpg

SBS 2003 allows you to filter attachment file types. If you have a decent Antivirus package you might choose to let it do this chore.

http://www.msexchange.org/img/upl/image0541093424519714.jpg

Configuring Users

Although you can use the Active Directory Users and Computers snap-in to set up users, using the Add Users and Computers wizard is preferred because it does more and is easier to use when you set up a lot of users.

http://www.msexchange.org/img/upl/image0561093424527761.jpg

http://www.msexchange.org/img/upl/image0581093424535276.jpg

http://www.msexchange.org/img/upl/image0601093424546136.jpg

Monitoring

SBS 2003 comes with a built-in monitoring components that you can set up by using the "Set up Monitoring Reports and Alerts" wizard.

http://www.msexchange.org/img/upl/image0621093424753245.jpg

http://www.msexchange.org/img/upl/image0641093424760995.jpg

http://www.msexchange.org/img/upl/image0661093424767448.jpg

http://www.msexchange.org/img/upl/image0681093424774761.jpg

http://www.msexchange.org/img/upl/image0701093424783058.jpg

The reports can show you both how your installed server is used and what errors are encountered and is useful to show you bosses what the server is doing.

Conclusion

Once you understand the logic of SBS 2003 installation they can run smoothly and quickly so you could enjoy the many features this worthy package has to offer.

Friday, November 6, 2009

Installing And Configuring Windows Server 2003 Stand-alone Certification Authority

Installing and Configuring a Windows Server 2003 Stand-alone Certification Authority

Certification Authorities (CAs) issue certificates for a number of different purposes. In the context of your ISA Server firewall/VPN server, a CA can provide a certificate that allows:

  • L2TP/IPSec VPN connections from VPN clients

VPN clients can establish L2TP/IPSec connections to the ISA Server firewall/VPN server. A machine certificate is required to create the IPSec encrypted tunnel.

  • L2TP/IPSec VPN connections from VPN gateways (VPN routers)

Remote VPN gateways can call the ISA Server firewall/VPN server and establish a gateway to gateway link. These VPN gateways act as VPN routers and allow packets to be routed between networks through a the VPN tunnel established between the VPN gateways.

  • L2TP/IPSec VPN connections to VPN servers

The ISA Server firewall/VPN server may need to establish a VPN client connection to a VPN server. For example, some Internet Service Providers require that machines establish a VPN connection with their VPN server in order to obtain a public address to connect to the Internet. In this case the ISA Server firewall/VPN server is a VPN client to the ISP's VPN server.

  • L2TP/IPSec VPN connections to VPN gateways

The ISA Server firewall/VPN server may need to call a VPN gateway to establish a VPN gateway to gateway link. Packets from networks behind each VPN gateway and be routed to a remote network behind the opposite gateway. The ISA Server firewall/VPN server is a VPN router using the Internet as its transit internetwork.

  • Certificate- based user authentication using a certificate stored on the user machine

Users can obtain certificates and use those certificates to authenticate with the VPN server. The user certificate is stored on the user's computer and a VPN connectoid can be configured to present this certificate during the PPP user authentication process.

  • Certificate- based user authentication using a certificate stored on a Smart Card

Users can obtain certificates and use the certificate to authenticate with the VPN server. The user certificate is stored on a Smart Card and the VPN connectoid can be configured to present this certificate during the PPP user authentication process.

A Microsoft Certificate Server can take on one of four roles:

  • Enterprise Root CA
  • Enterprise Subordinate CA
  • Stand-alone Root CA
  • Stand-alone Subordinate CA

A Microsoft Stand-alone CA has the following characteristics:

  • The stand-alone CA does not require Active Directory. This makes the stand-alone CA the Certificate Authority of choice in environments where there is no Active Directory infrastructure
  • The stand-alone CA knows nothing about the user or computer account requesting the certificate. You must manually and explicitly include all details required to obtain the type of certificate you require.
  • The stand-alone CA isn't aware of the accounts in the Active Directory. If a user certificate is required, the user account must be in the local SAM of the stand-alone CA machine.
  • The stand-alone CA does not immediately issue a certificate after the certificate request is made. By default, an administrator must approve the certificate request and then the client must retrieve the certificate after an administrator approves the request. The reason is the stand-alone CA does not check the validity of the user account.
  • You cannot add or remove certificate templates to the stand-alone CA.
  • The stand-alone CA can not issue user certificates that are stored on Smart Cards that allow the user to log on to a Windows Server 2003 domain
  • The stand-alone CA's self-signed certificate is not automatically added to the requester's Trust Root Certification Authorities certificate store. You must add the CA certificate to the Root Store manually.
  • The stand-alone CA can receive limited support from the Active Directory when it is installed by a domain administrator in an Active Directory domain. When the stand-alone CA is installed by a domain administrator, the CA certificate of the stand-alone CA will be added to the Trusted Root Certification Authorities certificate store for all domain users and computers.

We recommend that you install a stand-alone CA only when:

  • You do not have an Active Directory domain, and/or
  • You do not require automatic deployment of certificates to users and computers

If you have users who require certificates and those users are not members of your Active Directory domain, then use a stand-alone Certificate Server. These users can obtain certificates from the stand-alone CA's Web enrollment site. The Web enrollment site runs on Internet Information Server 6.0. You need to install IIS on the stand-alone CA computer before installing Certificate Services.

This ISA Server 2000 VPN Deployment Kit document describes the following procedures:

  • Installing the Microsoft Internet Information Services World Wide Web service
  • Install a Windows Server 2003 standalone Certification Authority

Installing Microsoft Internet Information Services World Wide Web Service

Perform the following steps to install IIS 6.0 on the Windows Server 2003 computer. The machine can be a standalone server, a member server in an Active Directory domain, or even a domain controller:

  1. Click Start, point to Control Panel and click Add or Remove Programs.
  2. Click the Add/Remove Windows Components button in the Add or Remove Programs window (figure 1).

Figure 1 (fig111)

  1. On the Windows Components window, click on the Application Server entry and click the Details button (figure 2).

Figure 2 (fig112)

  1. On the Application Server page, click on the Internet Information Services (IIS) entry and click the Details button (figure 3).

Figure 3 (fig113)

  1. In the Internet Information Service (IIS) dialog box, put a checkmark in the World Wide Web Service checkbox and click OK (figure 4).

Figure 4 (fig114)

  1. Click OK on the Application Server dialog box (figure 5).

Figure 5 (fig115)

  1. Click Next on the Windows Components dialog box (figure 6).

Figure 6 (fig116)

  1. Click Finish on the Completing the Windows Components Wizard page (figure 7).

Figure 7 (fig117)

Installing Microsoft Certificate Services

Perform the following steps to install and configure a stand-alone CA on a Windows Server 2003 computer:

* Note: We recommend that you install the stand-alone CA on a member server or domain controller on your internal network. This will allow the stand-alone CA's certificate to be placed automatically into the Trusted Root Certification Authorities certificate store for all users and computers.

  1. At a member server or domain controller in your internal network, log on as a domain administrator. Click Start, point to Control Panel and click Add/Remove Programs.
  2. In the Add or Remove Programs window (figure 8), click the Add/Remove Windows Components button.

Figure 8 (fig100)

  1. In the Windows Components dialog box (figure 9), click on the Certificate Services entry and click the Details button.

Figure 9 (fig101)

  1. In the Certificate Services dialog box, put a checkmark in the Certificate Services CA checkbox (figure 3). A Microsoft Certificate Services dialog box appears and informs you that you can not change the machine name or the domain membership of the machine while it acts as a certificate server. Read the information in the dialog box and click Yes.

Figure 10 (fig102)

  1. Both the Certificate Services CA and Certificate Services Web Enrollment Support checkboxes are checked (figure 11). Click OK in the Certificate Services dialog box.

Figure 11 (fig103)

  1. Click Next in the Windows Components dialog box (figure 12).

Figure 12 (fig104)

  1. Select the Stand-alone root CA option on the CA Type page (figure 13). Click Next.

Figure 13 (fig105)

  1. On the CA Identifying Information page (figure 14), type in a Common name for this CA. The common name of the CA is typically the DNS host name or NetBIOS name (computer name) of the machine running Certificate Services. In this example, the name of the machine is WIN2003DC, so we will enter WIN2003DC in the Common name for this CA text box. The default Validity Period of the CA's self-signed certificate is 5 years. Accept this default value unless you have a reason to change it. Click Next.

Figure 14 (fig106)

  1. On the Certificate Database Settings page (figure 15), use the default locations for the Certificate Database and Certificate Database Log. You do not need to specify a shared folder to store configuration information because this information will be stored in the Active Directory. Click Next.

Figure 15 (fig107)

  1. Click Yes on the Microsoft Certificate Services dialog box (figure 16) informing you that Internet Information Services must be stopped temporarily.

Figure 16 (fig108)

  1. Click Yes on the Microsoft Certificate Services dialog box (figure 17) informing you that Active Server Pages must be enabled on IIS if you wish to use the Certificate Services Web enrollment site.

Figure 17 (fig109)

  1. Click Finish on the Completing the Windows Components Wizard page (figure 18).

Figure 18 (fig110)

  1. Close the Add or Remove Programs window.

The standalone Certificate Server is now ready to accept certificate requests.

Approving Certificate Requests to a Standalone Certificate Authority

The stand-alone CA does not automatically issue a certificate when a certificate request is made. The reason is the standalone CA is not able to confirm the validity of the request. It does not check the information provided by the requestor against a directory, such as the enterprise CA does when validating credentials against the Active Directory.

You should keep this default behavior for your published standalone CA in order to prevent users on the Internet from obtaining certificates without your review. Perform the following steps to approve a certificate request:

  1. Click Start and point to Administrative Tools. Click on the Certification Authority link (figure 19).

Figure 19 (fig701)

  1. In the Certification Authority console (figure 20), expand the server name and then click on the Pending Certificates node. You see a list of pending certificate requests in the right pane of the console. You can see who requested the certificate by scrolling to the right and looking under the Requester Name column (not shown). Right click on the certificate request in the right pane of the console, point to All Tasks and click Issue. The certificate request is removed from the Pending Requests node.

Figure 20 (fig702)

  1. Click on the Issued Certificates node in the left pane of the Certification Authority console. The certificate request you approved appears in the right pane of the console. This indicates the certificate request was approved. It does not indicate the machine issuing the request has returned to the Web enrollment site to retrieve the certificate (figure 21).

Figure 21 (fig703)