Sunday, 9 June 2019

What is South Bridge and North Bridge in Motherboard.




What is North Bridge ?

  1.)    Northbridge is located in the northern section of the motherboard.

   2.)    It is also known as the host bridge.

   3.)  It is directly connected to the CPU, RAM, AGP, and PCI Express slots. If it is required for the CPU to communicate with AGP or PCI express slots etc.

   4.)   The communication occurs via the northbridge. Usually, northbridge operates at a faster speed as it connects to high-speed components in the computer.


   What is South Bridge ?

1.) Southbridge is located in the southern section of the
 motherboard.

2.)   It connects the components such as PCI bus slots, BIOS, SATA  and IDE connectors and USB ports.


Let's Takne an exmaple via Image:-


   

Is BIOS ROM?




ROM is hardware.
BIOS is software that has been stored in the hardware.
ROM (read-only memory) is the physical hardware component in which the BIOS (basic I/O system) software resides. The BIOS consists of machine instructions and data that are stored into the ROM memory device.
Modern systems might use a ROM as the BIOS storage device, or might use EPROM (erasable programmable ROM), EEPROM (electrically erasable programmable ROM), or some sort of NVRAM (non-volatile RAM) device (e.g., flash memory).
The BIOS instructions used to be frozen at the time the computer system shipped, but nowadays, many system and motherboard manufacturers release updates which can be downloaded and stored in the non-volatile memory device, to fix bugs or add features.
Firmware is a term that refers to the combination of the non-volatile memory hardware component, the software instructions stored in that hardware, and the data stored in that hardware. So, firmware is often used to describe BIOS software and the hardware device it’s stored in.

Wednesday, 26 October 2016

How to create a Windows 10 installer USB drive from a Mac Computer

Step 1:- Download Windows 10 Disc Image on mac computer with the help of Microsoft website, you can also use down below link to download the windws 10 media

https://www.microsoft.com/en-in/software-download/windows10

Step 2:-After downloading the ISO file, you'll need to use Boot Camp Assistant to move it to a bootable USB drive.


Step 3:- 


  1. 3.1# Insert a USB flash drive to your Mac. Make sure it's at least 8GB, which is usually marked on the USB stick. You can also check by right-clicking the USB drive on your desktop and clicking Get Info. Check if the number next to Capacity is at least 8GB. All the files in the drive will be deleted, so make sure there are no important documents inside.
  2. 3.2# Open Boot Camp Assistant. The easiest way to launch it is through Spotlight Search, which you can bring up by pressing Command and Spacebar. Press Enter to launch the app.
  3. 3.3# Check the box for "Create a Windows 7 or later version install disk" and deselect "Install Windows 7 or later version."
  4. 3.4# Click Continue to proceed.


Step 4:- 
  1. Boot Camp Assistant will automatically locate the ISO file from your downloads folder, but make sure it is the right file. Click the "Choose…" button and locate the ISO file. Make sure the destination disk is the USB thumb drive you've inserted.
  2. Step 5:- 
  3. Click Continue. It can take about 20 minutes to format and set up the USB installer on the Mac.



Step 6:- When Boot Camp Assistant is done, the USB drive will be renamed to WININSTALL. Click Quit to close the app and then Eject the USB drive.









Connect this Pen drive to windows computer and boot it

enjoy

    Thursday, 20 October 2016

    Recover Windows product key using Command Prompt

    Open Command Prompt as Administrator mode and type the given below command


    wmic path softwarelicensingservice get OA3xOriginalProductKey

    Press enter

    Tuesday, 13 October 2015

    BOOT PROCESS IN WINDOWS XP



    1). The first step in the Windows XP Boot Process is the POST (Power On Self Test) – All the important Hardware Components are checked during this process. At this stage, if any of your add-on cards have a seperate BIOS (example: your Video Card), that will also be checked.
    2.) Once the POST is done, your computer will look for the Bootable device as specified in the BIOS and will load the MBR into Memory.
    3). The BIOS then looks for and transfers control to a code in the MBR (Master Boot Record) – Windows XP takes over from here. This code starts up NTLDR.
    4). NTLDR then activates NTDETECT.COM which then reads the BOOT.INI file. Boot.ini contains information about the location of the Operating System.

    5). The next file to be loaded is HAL.DLL, which passes control to the Windows XP Kernel by starting NTOSKRNL.EXE.

    6). NTOSKRNL.EXE is responsible to identify, load and activate all the device drivers in the computer. All device drives and Windows services will be available after this point. NTOSKRNL then activates WINLOGON.EXE. This file (Winlogon.Exe) starts LSASS.EXE which shows up the Windows Logon Screen.

    When you enter your Username and Password, your settings get loaded.

    Tuesday, 15 September 2015

    Top Interview Questions for a System Administrator (Microsoft) Position:
    All of the questions below are very common and must be prepared for before facing any interview for a System-Server Administrator position.
    Q: What is Active Directory?
    A: Active Directory provides a centralised control for network administration and security. Server computers configured with Active Directory are known as domain controllers. Active Directory stores all information and settings for a deployment in a central database, and allows administrators to assign policies and deploy and update software.
    Q: What is a Domain?
    A: A domain is defined as a logical group of network objects (computers, users, devices) that share the same Active Directory database. A tree can have multiple domains.
    Q: What is Domain Controller?
    A: A domain controller (DC) or network domain controller is a Windows-based computer system that is used for storing user account data in a central database. It is the centrepiece of the Windows Active Directory service that authenticates users, stores user account information and enforces security policy for a Windows domain.
    A domain controller allows system administrators to grant or deny users access to system resources, such as printers, documents, folders, network locations, etc., via a single username and password.
    Q: What is Group Policy?
    A: Group Policy allows you to implement specific configurations for users and computers. Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the following Active Directory service containers: sites, domains, or organizational units (OUs).
    Q: What are GPOs (Group Policy Objects)?
    A: A Group Policy Object (GPO) is a collection of settings that control the working environment of user accounts and computer accounts. GPOs define registry-based policies, security options, software installation and maintenance options, script options, and folder redirection options.
    There are two kinds of Group Policy objects:
    • Local Group Policy objects are stored on individual computers.
    • Nonlocal Group Policy objects, which are stored on a domain controller, are available only in an Active Directory environment.
    Q: What is LDAP?
    A: LDAP (Light-Weight Directory Access Protocol) determines how an object in an Active Directory should be named. LDAP is the industry standard directory access protocol, making Active Directory widely accessible to management and query applications. Active Directory supports LDAPv2 and LDAPv3.
    Q: Where is the AD database stored?
    A: The AD database is stored in C:\Windows\NTDS\NTDS.DIT.
    Q: What is the SYSVOL folder?
    A: The SYSVOL folder stores the server copy of the domain’s public files that must be shared for common access and replication throughout a domain.
    All AD databases are stored in a SYSVOL folder and it’s only created in an NTFS partition. The Active Directory Database is stored in the %SYSTEM ROOT%NDTS folder.
    Q: What is Garbage collection?
    A: Garbage collection is the online defragmentation of the Active Directory which happens every 12 hours.
    Q: When do we use WDS?
    A: Windows Deployment Services is a server role used to deploy Windows operating systems remotely. WDS is mainly used for network-based OS installations to set up new computers.
    Q: What is DNS and which port number is used by DNS?
    A: The Domain Name System (DNS) is used to resolve human-readable hostnames like www.intenseschool.com into machine-readable IP addresses like 69.143.201.22.
    DNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not accepted.
    Q: What are main Email Servers and which are their ports?
    A: Email servers can be of two types:
    Incoming Mail Server (POP3, IMAP, HTTP)
    The incoming mail server is the server associated with an email address account. There cannot be more than one incoming mail server for an email account. In order to download your emails, you must have the correct settings configured in your email client program.
    Outgoing Mail Server (SMTP)
    Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The outgoing mail server can belong to your ISP or to the server where you setup your email account.
    The main email ports are:
    • POP3 – port 110
    • IMAP – port 143
    • SMTP – port 25
    • HTTP – port 80
    • Secure SMTP (SSMTP) – port 465
    • Secure IMAP (IMAP4-SSL) – port 585
    • IMAP4 over SSL (IMAPS) – port 993
    • Secure POP3 (SSL-POP) – port 995
    Q: What do Forests, Trees, and Domains mean?
    A: Forests, trees, and domains are the logical divisions in an Active Directory network.
    A domain is defined as a logical group of network objects (computers, users, devices) that share the same active directory database.
    A tree is a collection of one or more domains and domain trees in a contiguous namespace linked in a transitive trust hierarchy.
    At the top of the structure is the forest. A forest is a collection of trees that share a common global catalog, directory schema, logical structure, and directory configuration. The forest represents the security boundary within which users, computers, groups, and other objects are accessible.
    Q: Why do we use DHCP?
    A: Dynamic Host Configuration Protocol assigns dynamic IP addresses to network devices allowing them to have a different IP address each time they are connected to the network.
    Q: What are Lingering Objects?
    A: A lingering object is a deleted AD object that still remains on the restored domain controller in its local copy of Active Directory. They can occur when changes are made to directories after system backups are created.
    When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. This can happen if, after the backup was made, the object was deleted on another DC more than 180 days ago.
    Q: How can we remove Lingering Objects?
    A: Windows Server 2003 and 2008 have the ability to manually remove lingering objects using the console utility command REPADMIN.EXE.
    Q: Why should you not restore a DC that was backed up 6 months ago?
    A: When restoring a backup file, Active Directory generally requires that the backup file be no more than 180 days old. If you attempt to restore a backup that is expired, you may face problems due to lingering objects.
    Q: How do you backup AD?
    A: Backing up Active Directory is essential to maintain the proper health of the AD database.
    Windows Server 2003
    You can backup Active Directory by using the NTBACKUP tool that comes built-in with Windows Server 2003 or use any 3rd-party tool that supports this feature.
    Windows Server 2008
    In Server 2008, there isn’t an option to backup the System State data through the normal backup utility. We need to use the command line to backup Active Directory.
    1. Open up your command prompt by clicking Start, typing “cmd” and then hit Enter.
    2. In your command prompt, type “wbadmin start systemstatebackup -backuptarget:e:” and press Enter.
    3. Input “y” and press Enter to start the backup process.
    When the backup process has finished you should get a message that the backup completed successfully. If it did not complete properly you will need to troubleshoot.


    Wednesday, 19 August 2015

    Recover Mac password Via singal user mode





    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

    ·         First you need to enter Single User Mode. Reboot/shutdown  the Mac and hold down Command+S and turn on your computer.


    this is picture shows singal user mode of a mac computer




    Now type the command :/ root#mount -uw / and press enter button

    see the picture 



    now you have to type in next command that is 
    :/ root#rm /var/db/.Applesetupdone then press enter

    see the image:-



    now the next command that you have to type in is Shutdown -h now and press enter 

    :/ root#shutdown -h now

    take a look
    ****************


    after that it will start shunting down and further 
    you will see the welcome screen it looks like it is a brand new mac computer....
    you will see the welcome screen after one minute

    take a look





    now next screen for wireless setup select your WiFi and continue 










    after that you will get an screen to fill your user name and all that 

    have a look


    your security questions


    now type your user name and password here and click continue 



    time zone selection 




    after finishing entering time zone and all that you will get your new user
    ************************************************************
    now you have to reset your original user password 

    *******************************************************

    now click apple icon go to the system preferences 



    it will appear like this then you have to click user and groups



    now screen will appear like this the very first one is your new user that you have created through recovery concole now click on lock symbol and put the password that you want

    then click on your old user and type your new password that is done 



    click your old account and click reset password



    now type in your new password and click reset the password logout this account
    and restart in your account by punching new reseted password..



    enjoy hacking......

    by roshan kumar

    What is South Bridge and North Bridge in Motherboard.

    What is North Bridge ?   1.)     Northbridge is located in the northern section of the motherboard.    2.)     It is also known...