Friday, January 8, 2010

How To Configure a Terminal Server

You can use a Terminal Server to perform many tasks. Users on the remote locations can run programs, save files and use network resources with the help of Terminal Server. If you install any program on the Terminal Server, then it is certain that all the users will utilize the same version of the installed program. If you configure a computer as a Terminal Server, then from this computer multiple users can access a program at the same time.

You do not have to install Terminal Server, in case you want to use this computer for remote administration on Windows Server 2003 operating systems. In this case, you can use Remote Desktop for Administration. Remote Desktop for Administration will provide you the facility to manage the servers remotely from any client over a LAN, WAN, or dial-up connection. This will happen after you enable the remote connections.

If you are completed the Configure Your Server Wizard, then you have to perform the following steps. You have to confirm about your Internet Explorer Enhanced Security Configuration settings. After this, you have to configure a Terminal Server License Server. You can install both the Terminal Server and Terminal Server Licensing service on the same physical computer, in case of small deployments. It is required that you should install Terminal Server Licensing on a separate computer, in case of large deployments. You have to install client access licenses (CALs) on the Terminal Server License Server.

It is required that you should configure Terminal Server Licensing correctly, so that your terminal server can continue to accept connections from the clients. Terminal Server Support offers a licensing grace period, during which no license server is needed. In this grace period, a terminal server can accept connections from unlicensed clients without contacting a license server. After you have completed both the Configure Your Server Wizard and these additional needed tasks, you will get a basic terminal server.

Wednesday, December 30, 2009

Connection of Clients to Terminal Services

This article will throw some light on how to connect a Windows Server 2003 based terminal services client to a terminal server by using Remote Desktop Connection.

For connecting clients to terminal services, you have to open Remote Desktop Connection. For doing this, click Start, select All Programs, click on Accessories. Then click on Communications and then click Remote Desktop Connection. After opening the Remote Desktop Connection, you have to create a terminal services connection. Follow these steps for doing this: Open Remote Desktop Connection on your Windows server. Then in the Computer box, type the computer name or the IP address of a terminal server or a computer that has Remote Desktop enabled. If you want to get connected to a remote computer from a console session, then type computer name or IP address /console. Then click on Connect. After that you will view a Windows dialog box. In this dialog box, type your user name, password and domain and then click OK.

After the creation of terminal services connection, you have to save this as a Remote Desktop protocol (.rdp) file. This .rdp file consists of all the information for connecting to a terminal server. This file also contains the optional settings that were performed at the time of saving this file. Follow these steps for saving your connection settings:

  • You have to open Remote Desktop Connection and then click on Options.
  • Then you have to determine the connection settings that you would like for this connection.
  • After that on the General tab, click Save As. In the File name box, type a file name for the saved connection file and then click on Save.
  • After saving the connection settings, you can also open any saved connection.
For doing this, follow these steps.
  • You have to open Remote Desktop Connection and then click on Open.
  • Then double-click the .rdp file for that connection which you want to open.

These are steps to connect clients to Terminal Services. For Terminal Server Support and related updates subscribe to our blog.

Friday, December 18, 2009

Windows Server 2008

Windows Server 2008 is a Windows server line of operating systems developed by the Microsoft. It was launched on February 27, 2008 and the successor of Windows Server 2003 which was launched nearly five years before. Its updated version, Windows Server 2008 R2, was launched on July 22, 2009. It is constructed on Windows NT 6.x as similar with Windows Vista and Windows 7.

It is developed from the similar code base like Windows Vista. So, because of code similarity, it automatically supports most of the technical, security, management and administrative features which are new to Windows Vista like the enhanced image-based installation, deployment and recovery and many more.

Windows Server 2008 comprises of a fluctuation of installation known as Server Core. In this all of the sustainment work is performed with the command line interface windows. Alternatively, this work can be performed by linking the machine remotely with the help of Microsoft Management Console.

It provides high-availability of services and applications with the Failover Clustering. In the Windows Server 2008 and 2008 R2, the manner in which the clusters are specified, is altering significantly with the insertion of the cluster validation wizard. The cluster validation wizard is a feature that is incorporated with the failover clustering in Windows Server 2008 and 2008 R2. If you want to execute a set of focused tests on a collection of servers, that you specify to use as nodes in a cluster, then you can perform this with the help of cluster validation wizard.

Wednesday, December 16, 2009

Alteration in Terminal Server's Listening Port

terminal server

As I have described earlier about Application Server Security that is securing your Terminal Servers now will describe how to alter listening port of your Server.

It is a well-known fact that TCP port 3389 is used by Terminal Server and Windows 2000 Terminal Services for client connections. Alteration in this port is not recommended by Microsoft. But you can change this port. You have to perform this task carefully, otherwise you will face serious problems.

  • You have to give more concentration while modifying the registry. If you want to change the default port, then you have to follow these steps:

  • You start with the task of running Regedt32 and go to this key, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp.

  • Then you have to find the port number subkey and notice the value of 00000D3D, hex is for 3389.

  • After this, you have to change the port number in Hex and save the new value

If you want to change the port for a particular connection on the Terminal Server, then follow these steps:

  • You have to run Regedt32 and go to this key, HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal Server\WinStations\connection.

  • After this, you have to find the port number subkey and notice the value of 00000D3D, here hex is for 3389.

  • Then you have to change the port number in Hex and save this new value.

  • After performing this, you have to make alteration in the Port on the Client Side.

Follow these steps to perform this:

  • You have to open Client Connection Manager.

  • Then on the File menu, click on New Connection and then create the new connection. After executing the wizard, you will view a new connection listed there.

  • Then you have to ensure that new connection is highlighted. After this, on the File menu, click Export.

  • Then you have to edit the .cns file using Notepad. You have to make modifications in the server port, Server Port=3389 to Server Port= new port number, that you had specified on Terminal Server.

  • Now import the file back into Client Connection Manager. Then you will be demanded to overwrite the current one.

  • If it has the same name, then overwrite it.

In this way, you will receive a client that has the correct port settings to match your Terminal Server settings. Hope it will help you out, Don’t Forget to subscribe to my blog for more tips and tricks on server and Microsoft Server Support Services

Tuesday, September 22, 2009

Why Reliable Web Hosting is Essential?

For those individuals who have web hosting needs where security and uptime are paramount, the world is a very happy place. Most webhosts can offer uptime guarantees which are above 99%. This figure is enough to make any business owner smile. It does not, however, mean that all of those webhosts that offer this figure are equally reliable. There are other factors involved in webhosting which may not frequently manifest as advantages or disadvantages but, when they do come into play, can make the difference between suffering and surviving an absolute disaster.

Webhosts generally operate out of what's called a "server farm". If one were to visit one of these facilities, they would find racks upon racks of servers humming away and serving up their client's web pages. These farms have certain requirements to ensure that they're reliable and safe. Most importantly, they need to be protected from human and environmental security threats that could compromise the well-being of the sites hosted on them. This is not a simple endeavor and any reputable webhosting company will be more than happy to answer any questions related to their facility. If they're not willing to offer straight answers about their facility, look elsewhere.

A server farm should have a backup system that allows it to keep functioning in the event of a local power outage. This is a basic question to ask of any webhost. It should also be insulated from other environmental threats such as floods, hurricanes and tornadoes. This is a basic measure for any company which does most of its business online. If the site goes down, the business goes down and customers on the Internet are notoriously unforgiving of downtime. To avoid downtime, there is a technology called "fail-over" which means that, essentially, if one's primary server should fail that another will take up the work. Ask about this feature.

Be sure to ask about server security where one's users are concerned. Any webhosting company should be willing to provide a secure server-called an SSL connection-to any one of their clients. This is needed for any exchange of personal data or financial information. Make certain that one's webhost not only supports the sale and installation of this feature but that their technical support can help clients setup and maintain this technology if need be. Oftentimes, solid reliability in a webhost means skilled technical support!

Friday, August 28, 2009

How To Protect Your PC

In the current scenario where computer security issues have come front-and-center for small businesses of all types. And for good reason. Your company's computers contain valuable, irreplaceable data that make them a target for hackers, data thieves and others up to no good.

Keeping your computers and their contents safe and secure is crucial to continued business growth, as well as your personal sanity. A breach in security could be disastrous for you and your company.

Security slips can cause of :

  • Lose precious data

  • Leak company or trade secrets

  • Disclose sensitive customer information

  • Unleash viruses on your computers

  • Lead to unproductive downtime

  • Require time and money to correct

If you do the following following activity, then there is fair chances that your system would be free from virus, spyware or malicious stuffs:

Take Computer Security Seriously
Every business, no matter how small, has computer security needs. If you're operating a network, using email, conducting business through a Web site, using wireless equipment or planning to grow, your security needs can be wide ranging and complex, even for a one-person operation.

Connect with Security Product Vendors Online
A wide range of vendors supply computer security products and services designed specifically for small business.

Get a Firewall
A firewall is a program or hardware device that filters information coming through the Internet to your computer or network. If the firewall detects information that could be destructive to your computers or network, it blocks it. Most small business owners can get by with a software firewall or a firewall that's included in a router (a router is what connects several computers to one modem).

Prevent Viruses
Viruses can clutter your email inbox with virus emails, make your computer run slower than usual and in worst-case scenarios, erase your hard drive.

Monday, August 17, 2009

Install A Firewall [APF] : Secure Your Server

If you are concern about server security or your system. Then you mush have to install a firewall(APF) on your system. Now just follow me to how to install or configure it;

  1. To install APF SSH into server and login as root.

  2. At command prompt type: cd /root/

  3. type: wget http://www.rfxnetworks.com/downloads/apf-current.tar.gz

  4. type: tar -xvzf apf-current.tar.gz

  5. type: rm -f apf-current.tar.gz

  6. type: cd apf-0.9.4-6

  7. type: sh ./install.sh

  8. After APF has been installed, you need to edit the configuration file.
    At command prompt type: cd /etc/apf
    Then type pico -w conf.apf

  9. Scroll down and find

    USE_DS="0"

    change it to

    USE_DS="1"

  10. Now scroll down and configure the Ports. The following ports are required for CPanel Servers for example - this may not be exactly what you need, but you can change the list to what you do need.

    Common ingress (inbound) TCP ports
    IG_TCP_CPORTS="21,22,25,53,80,110,143,465,953,993,995,2082,2083,2084,2086,2087,2095,2096,3306,6666,7786,3000_3500"

    Common ingress (inbound) UDP ports
    IG_UDP_CPORTS="53,6277"

    Common ICMP (inbound) types
    IG_ICMP_TYPES="3,5,11,0,30,8"

    Common egress (outbound) TCP ports
    EG_TCP_CPORTS="21,25,37,53,80,110,113,#123,443,43,873,953,2089,2703,3306"

    Common egress (outbound) UDP ports
    EG_UDP_CPORTS="20,21,53,873,953,6277"

    Common ICMP (outbound) types
    EG_ICMP_TYPES="all"

    Save the changes then exit. To restart APF type: /usr/local/sbin/apf -s

  11. Open a new SSH Session to the server

    After you are sure everything is working fine, change the DEV option

    At command prompt type: cd /etc/apf

    At command prompt type: pico -w conf.apf


    Scroll down and find

    DEVM="1"

    change it to

    DEVM="0"


    Save changes, exit and then restart firewall,

    At command prompt type: /usr/local/sbin/apf -r

Still you are concern about more security, then we are 24/7 with you for all type of server secirity solutions and services.
So please call us at : 1-866-914-9838 or just login at: http://www.iyogibusiness.com