Tag Archives: management

COMPLETE LIST OF COMPUTER PORTS

Port TCP UDP Description Status 0 UDP Reserved Official 1 TCP UDP TCP Port Service Multiplexer (TCPMUX) Official 2 TCP UDP CompressNET Management Utility Official 3 TCP UDP CompressNET Compression Process Official 4 TCP UDP Unassigned Official 5 TCP UDP … Continue reading

Posted in Network | Tagged , , , , , , | 3 Comments

( RJ45 ) How to Make them: Network Cables

( RJ45 ) How to Make them: Network Cables     Pin # Wire Color 1 White/Green 2 Green 3 White/Orange 4 Blue 5 White/Blue 6 Orange 7 White/Brown 8 Brown 568-A Color Code Pin # Wire Color 1 White/Orange … Continue reading

Posted in Network | Tagged , , , , , , | Leave a comment

POWER SAVER MODE OR POWER MANAGEMENT

PC power management refers to the mechanism for controlling the power use of personal computer hardware. This is typically through the use of software that puts the hardware into the lowest power demand state available. It is an aspect of … Continue reading

Posted in Network | Tagged , , , , , , | Leave a comment

ADDING A PRINTER TO ACTIVE DIRECTORY

ADDING A PRINTER TO ACTIVE DIRECTORY Lets try easy: PUBLISHING PRINTER IN ACTIVE DIRECTORY MANUALLY PUBLISHING A PRINTER IN ACTIVE DIRECTORY If that doesn’t work then below is hard: Deploy printers by using Group Policy Print Management (Printmanagement.msc) can be … Continue reading

Posted in Network, Print | Tagged , , , , , , , , , , , , | Leave a comment

Print Management Software

Print Management Software Why do you need print managemt software?  Lets say you have a campus with 4000 printers and you want software that will give you monthly meters for billing, alerts for toner low, alerts for service calls, alerts … Continue reading

Posted in Network, Print | Tagged , , , | Leave a comment

BIOMETRICS AND IDENTITY ACCESS MANAGEMENT

Biometrics (or biometric authentication) consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. RETINAL … Continue reading

Posted in Network | Tagged , , , , , , , , , , , | Leave a comment