Question about ASUS A8N-VM Motherboard

1 Answer

Network speed is very slove

I am using win2003 server my network speed is very slove my pc configuration is very high but when i copy some data on my server it take s more time

Posted by on

1 Answer

  • Level 1:

    An expert who has achieved level 1.

  • Contributor
  • 1 Answer

Helo

Posted on Dec 19, 2008

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

What is the handset configuration setting?


The Handset Configuration Manager is an OTA Configuration Solution in Telecom Consultancy, for all types of Mobile, enabling Mobile Device Configuration settings to be sent automatically at the right time this ensures that customers have access to Data Services immediately, always, no matter why or when they change Handset.

The Handset Configuration Manager will provision Device settings including GPRS, WAP, MMS and Email, using the industry standard OTA provisioning protocols enabling the delivery of settings for a broad range of Mobile Terminals.

Ensuring End-to-End QoS

Using the Reach server Subscriber Capability Management rules, Handset Configuration settings can be sent automatically based on the history of the Handset observed on the network. e.g. only when the Handset is used for the first time. The Reach Server checks to ensure all corresponding Network Services based on the capabilities of the used Handset are also activated.

May 04, 2011 | Computers & Internet

Tip

VPN in Microsoft Server 2003


The full form of VPN is Virtual Private Network. VPN gives extremely secure connections between private networks linked through the Internet. It allows remote computers to act as though they were on the same secure, local network. Allows you to be at home and access your company's computers in the same way as if you were sitting at work.

Almost impossible for someone to tap or interfere with data in the VPN tunnel. If you have VPN client software on a laptop, you can connect to your company from anywhere in the world. VPN goes between a computer and a network (client-to-server), or a LAN and a network using two routers (server-to-server). Each end of the connection is a VPN "endpoint", the connection between them is a "VPN tunnel".

When one end is a client, it means that computer is running VPN client software. You can use a virtual private network (VPN) to connect components to one network by using another network. VPN do this by "tunneling" through the Internet or another public network. With a VPN, connections across the public network can transfer data by using the routing infrastructure of the Internet, but to the user, the data seems to travel over a dedicated private link.

A VPN gives you the benefit of a dial-up connection to a dial-up server, plus the flexibility of an Internet connection. Using an Internet connection you can connect to resources all over the world. If you have a high-speed Internet connection at your computer and at your office, you can communicate with your office at full Internet speed. This is much faster than any dial-up connection that uses an analog modem.

VPNs use authenticated links to make sure that only authorized users can connect to your network, and they use encryption to make sure that others cannot intercept and cannot use data over the Internet. A Tunneling Protocol is a technology that helps make the transfer of information over the Internet more secure from one computer to another.

VPN technology also permits a corporation to connect to its branch offices or to other companies over a public network, such as the Internet, while helping to maintain secure communications. The VPN connection across the Internet logically operates as a dedicated wide area network (WAN) link.

VPN in Windows 2003 Server: You need a high speed Internet connection to configure and run VPN server. Two individual lan card must be present in a single system where you want to configure a VPN Server. The lan cards should ping each other. Also need a User which's Dial in allow access should be enable. Microsoft 2003 server two tunnelling protocols for a secure VPN connection, one is PPTP (Point-to-Point Tunnelling Protocol) which Provides data encryption using Microsoft Point-to-Point Encryption. The other is L2TP (Layer Two Tunnelling Protocol) which Provides data encryption, authentication, and integrity using IPSec.

Steps to create VPN Server in 2003 Server: At first I go to Start and point to Administrative Tools, then click Routing and Remote Access. Then I click the server icon that matches the local server name in the left panel of the console. If the Routing and Remote Access service was previously turn on, you may want to reconfigure the server.

To reconfigure the server Right-click the server object, and then click Disable Routing and Remote Access. Click yes to continue when you are prompted with an informational message. Then Right-click the server icon and then click configure and Enable Routing and Remote Access to start the Routing and Remote Access Server Setup Wizard. After that click Remote access (dial-up or VPN) to turn on remote computers to dial in or connect to this network through the Internet. Then I have Click to select VPN. In the VPN Connection window I click the network interface (Lan) which is connected to the Internet and go the IP Address Assignment window, then I click Automatically because there was present a DHCP server in network. However, if DHCP is not available, you must specify a range of static addresses.

If you use from a specified range of addresses, open the Address Range Assignment dialog box and Type the first IP address in the range of addresses that you want to use in the Start IP address box. Type the last IP address in the range in the End IP address box. Windows calculates the number of addresses automatically. After that I have accept the default setting of No, use Routing and Remote Access to authenticate connection request and finally Click Finish to turn on the Routing and Remote Access service and to configure the server as a Remote Access server.
For the remote access server to forward traffic properly inside your network, you must configure it as a router with either static routes or routing protocols, so that all of the locations in the intranet are reachable from the remote access server. It also need for security purpose.<SPAN style="LINE-HEIGHT: 115%; FONT-FAMILY: 'Verdana','sans-serif

on Mar 22, 2011 | Microsoft Windows Server 2003 Enterprise...

Tip

Tricks for Keeping SQL Server Safely


Some simple ways to protect your SQL Server database

1. Using the Microsoft Baseline Security Analyzer (MBSA) to assess the server's security
MBSA is one of a variety of Microsoft products, which can scan unsafe configuration tools. It can be run locally; you can also run through the network.

2. Isolate your server and regularly back up
Physical and logical isolation would form the basis of SQL Server security. Database should be installed within the enterprise network security area, but not directly connected to the Internet. Back up all data regularly and store copies in a safe location outside the site.

3. Assign a strong SA password for a SA account
SA account should always have a strong password, even if Windows is configured to require authentication of the server. This will ensure that the server has been reconfigured in the future as Mixed Mode authentication; it will not appear blank or weak SA.

4. Restrict the permissions SQL Server service
SQL Server 2000 and SQL Server Agent is running as a Windows service. Each service must be associated with a Windows account, and derive from this account security context. SA log in SQL Server allows the user (sometimes including other users) to access the operating system features.

About reset SA password in SQL 2008/2005/2000

To secure our database we would like to choose create an intricate password. But even our selves would forget the SA password in SQL Server 2005/2008 sometimes. So here is a way for you to reset SQL Server 2005 password -- MS SQL Server Password Unlocker, which is a highly A Highly Technical and Safe SQL password 2005 Recovery tool. And following is a few features of the tool.

Features:

* Support SQL Server password recovery for MS SQL Server and MS SQL Server Express 2008/2005/2000

* No need to install MS SQL Server on your PC or lose data, the file master.mdf format is necessary

* Stop and resume MS SQL service automatically if the MS SQL Server on your PC is running

* Reset SQL password with ease no matter how long and complicated the SQL password is

* Easy to use

Feedback:

The most of people who encountered with SQL 2005 password losing problems are getting back to their SQL account now. We can also feel that ease and the hilarious mood when a hard nut has been cracked. Hope this MS SQL Server Password Unlocker would help more people and get their trouble erased.

on Nov 12, 2010 | Computers & Internet

1 Answer

How do I secure?


WIRELESS To configure the Router as a wireless access point for wireless clients (either stationary or roaming), all you need to do is define the radio channel, the Service Set identifier (SSID), and security options.ADVANCED SETUP 47 Channel and SSID You must specify a common radio channel and SSID (Service Set ID) to be used by the Router and all of your wireless clients. Be sure you configure all of your clients to the same values. SSID: The Service Set ID. This should be set to the same value as the other wireless devices in your network. SSID Broadcast: Broadcasting the SSID on the wireless network for easy connection with client PCs. For security reasons, you should disable SSID broadcast. (Default: Enable) Note: The SSID is case sensitive and can consist of up to 32 alphanumeric characters. Wireless Mode: Set the communication mode for the Router. Default: Mixed (11b+11g)Configuring the Wireless Barricade g Router 48 Transmission Rate: Set the rate of data transmitted from the Router. The lower the data rate, the longer the transmission distance. (Default: Fully Automatic.) Channel: The radio channel through which the Router communicates with PCs in its BSS. (Default: 6) Note: The available channel settings are limited by local regulations. g Nitro: In a crowded 2.4 MHz frequency, the connection speed is much lower than the promised 54 Mbps. The g Nitro implemented by Intersil's Prism Nitro technology dramatically enhances your wireless network speeds. It provides up to 50% more throughput in 11g only environment, and improves network throughput by 3 times in mixed mode.ADVANCED SETUP 49 Security If you are transmitting sensitive data across radio channels, you should enable wireless security. Configuring the Wireless Barricade g Router 50 WEP Wired Equivalent Privacy (WEP) encryption requires you to use the same set of encryption/decryption keys for the Router and all of your wireless clients. WEP mode: You can choose disabled, 64-bit or 128-bit encryption. Key Provisioning: Select a key type of static key or dynamic key. Static WEP Key Setting You may manually enter the keys or automatically generate encryption keys. To manually configure the keys, enter 10 digits for each 64-bit key, or enter 26 digits for the single 128-bit key. (A hexadecimal digit is a number or letter in the range 0-9 or A-F.) For automatic 64-bit security, check the box of Passphrase, enter a passphrase and click SAVE SETTINGS. ADVANCED SETUP 51 Four keys will be generated. Choose a key ID (1-4) from the drop-down list or accept the default key. If you use encryption, configure the same keys used for the Router on each of your wireless clients. Note that Wired Equivalent Privacy (WEP) protects data transmitted between wireless nodes, but does not protect any transmissions over your wired network or over the Internet. WPA Wi-Fi Protected Access (WPA) combines Temporal Key Integrity Protocol (TKIP) and 802.1x mechanisms. It provides dynamic key encryption and 802.1x authentication service. With TKIP, WPA uses 48-bit initialization vectors, calculates an 8-byte message integrity code, and generates an encryption key periodically. For authentication, it allows you to use 802.1x authentication for an environment with a RADIUS server installed on your network. Selecting the Pre-shared Key enables WPA to use the pre-shared key in a SOHO network.Configuring the Wireless Barricade g Router 52 Field Default Parameter Description Cypher suite TKIP One of the security mechanism used by WPA for frame body and CRC frame encryption Authentication 802.1X Select the authentication mode. • 802.1X: It is for an enterprise network with a RADIUS server installed. • Pre-shared Key: It is for a SOHO network without any authentication server installed. Pre-shared key type Passphrase (8~63 characters) Select the key type as in pass-phrase or in 64-Hex characters Pre-shared Key none Specify in pass-phrase style or in 64-Hex characters. Group Key Re_Keying Disable The period of renewing broadcast/ multicast keyADVANCED SETUP 53 802.1X Management access will be checked against the authentication database stored on the Router. If an authentication RADIUS server is used, you must specify the secret key of the Message-Authenticator attribute, i.e., Message Digest-5 (MD5), and the corresponding parameters in the RADIUS Server Parameters field for the remote authentication protocol.Configuring the Wireless Barricade g Router 54 • General Parameters • RADIUS Server Parameters Field Default Parameter Description Enable 802.1X Yes Starts using 802.1x security control. Session Idle Timeout 300 seconds Defines a maximum period of time for which the connection is maintained during inactivity. Re-Authentication Period 3600 seconds Defines a maximum period of time for which the RADIUS server will dynamically re-assign a session key to a connected client station. Quiet Period 60 seconds Defines a maximum period of time for which the Router will wait between failed authentications. Server Type RADIUS Selects the authentication server type. Field Defaults Description Server IP 192.168.1.1 The IP address of the RADIUS server. Server Port 1812 UDP port is used for RADIUS authentication messages. Secret Key none Defines a text string on both the RADIUS client and server to secure RADIUS traffic. The RADIUS server requires MD5 Message-Authenticator attribute for all access request messages. The 802.1x authentication scheme is supported by using the Extensible Authentication Protocol (EAP) over the RADIUS server. NAS-ID none Defines the request identifier of the Network Access Server
Source: http://www.smc.com/files/AK/2804WBRP-G_MN.pdf
Please leave feedback for this answer, thanks.

Mar 10, 2011 | SMC Barricade g SMC2804WBRP-G Wireless...

2 Answers

I have win2003 i want it serover what can i do


Hello,

You can do a lot with this operating system.

Some of his features are: DOMAIN Controller, Active Directory, Ftp Server, DHCP, Web Server, Terminal Server, File server etc.
Here i have some very useful links.

About Windows 2003 Server Editions: http://en.wikipedia.org/wiki/Windows_Server_2003
Futures: http://www.microsoft.com/WindowsServer2003/evaluation/features/default.mspx

Configuring DNS Server: http://www.petri.co.il/install_and_configure_windows_2003_dns_server.htm

Configuring DHCP Server: http://www.windowsreference.com/windows-server-2003/install-and-configure-dhcp-server-in-win-server-2003-step-by-step-guide/

Configuring File Server: http://www.windowsnetworking.com/articles_tutorials/File_Server_Windows_2003.html

Configure Printing Server: http://www.brightrev.com/how-to/enterprise/55-best-practices-for-setting-up-a-windows-print-server.html

Configure FTP Server: http://support.microsoft.com/kb/323384

Configure Active Directory: http://helpdeskgeek.com/how-to/windows-2003-active-directory-setupdcpromo/

Configure Web Server: http://support.microsoft.com/kb/324742

All these are only some of his features.

I hope is useful to you and your friends

Mar 13, 2010 | Microsoft Windows Server 2003 Enterprise...

Tip

How to choose a backup device


Hello all,

I work in data recovery and I'm always being asked what kind of backup device my customers should use. The fact is, there are a lot of choices and a lot of different situations with different answers.

Whatever device you choose for backup, remember the most important part of backing up is to always have more than one copy. Your backup device does you little good if it holds the only copy of your files.

USB Flash drives:
Pro's Cons
Most Inexpensive Easy to damage
Easiest to Transport Easy to Lose
High Compatibility Difficult to recover
Fast copy speeds

External Hard Drives:

Pro's Cons
Inexpensive Some are bulky
Higher Capacity Greater damage if dropped
Easy to transport Can be expensive to recover
High Compatibility Some require external power
Faster Copy Speeds
Easier to recover
More rugged

Secondary Hard drive(internal)

Pro's Cons
Inexpensive Not optional on most laptops
Higher Capacity Not optional on all Desktops
Fully compatible Can fail simultaneously
Fastest Copy Speeds Does not protect data if PC Stolen
Easy to Recover Requires some knowledge to install
More Rugged
Less risk of damage

NAS Box or Small Server

Pro's Cons
Higher Capacity Higher Cost
Redundancy is Optional Requires more knowledge to setup
Accessible to all PC's
on your network at once
Fast Copy Speeds
Low risk of damage
Compatible with most PC


RAID5 NAS or Server

Pro's Cons
Highest Capacity Highest Cost
Highest Redundancy Requires most knowledge to Setup
Fastest Copy Times Requires specialized equipment or software
Accessible to all PC's Most expensive to recover if failed
on your network at once
Ability to survive single
drive failures without
data loss.


Now, armed with that short list of options, let's help you decide which option best suits you. If you move around a lot, you go to school, work out of the office or travel for work a USB flash drive is often the simplest form of backup and allows you to move data between home, office or school without lugging a large drive around. we recommend these as a part of most peoples backup solution. Next you will want a more stable form of backup(harder to damage).

For your tougher backup device you will have to decided what kind of budget you have, how much data will need to be backed up and how often. If you have a great deal of data from several computers in your home or office you will likely want to use a NAS box or setup extra drive(s) in one of your existing desktops to use as a server. If you only have one or two computers or the budget just won't cover a RAID or NAS solutions you can simply purchase an external USB or eSATA hard drive, usually less than $100. This can be moved between computers and used for backing up.

Now remember to Sync your data. This means anything you update or create while away that is saved on your USB flash needs to be copied into your computer and your computer needs to be backed up onto the external drive or server.
For more information on backing up, verifying backups and different types of backup devices, visit my blog at http://www.aitsavemyfiles.com/armor-itrecoveryblog.php or search through the other tips available here on FixYa.

on Mar 19, 2010 | Computers & Internet

1 Answer

How to install Win2003 on HP ML150 G2?


u need to have Win2003 install disk...
insert the disk in the CDROM drive
let it boot and load all system files and then it will ask u to format the disk
let it format the disk
and it will auto install the win2003 os
before u do this take a backup of ur data...

Dec 25, 2009 | HP ProLiant ML150 G5 Server

1 Answer

Geovision gv-800 network server issue


Logically you should not configure the server when the network is running. Reason being that some network node may be engaged in data transfer or some such work and if you configure the network their data may get lost or corrupted. To avoid such a situation you must stop all networks so that those working that time will be given a warning that network is going down and they should finish their work and save the data. On a network due consideration has to be given to data security.

Dec 06, 2009 | Geovision GV-800-16 Video Capture

1 Answer

Slow login problem on domain


It could be the clients dont have sufficient hard ware specs ..... or there is a script that is running for the log in that could cause the delay...?? there could be the two ways to handle it... so you need to trouble shoot where the problem lies first then dig in deeper... :0

Jul 29, 2008 | Microsoft Windows Server Standard 2003 for...

3 Answers

SOLUTION OF WIN2003 ?


With all due respect, if you have not set up this type of system/network before, I strongly suggest you get an experienced professional to do it. It is not a trivial exercise that could be explained here. If everything were to go well, it would not be too difficult but that is rarely the case and if/when it does go wrong without experience one stands very little chance of fixing it.

If you use Small Business Server 2003 (much easier to set up than Server 2003) then you would probably be able to configure it successfully yourself. However, still be prepared to pay for outside help if you encounter difficult problems :)

Dec 20, 2007 | Microsoft Windows Server Standard 2003 for...

Not finding what you are looking for?
ASUS A8N-VM Motherboard Logo

Related Topics:

56 people viewed this question

Ask a Question

Usually answered in minutes!

Top ASUS Computers & Internet Experts

Les Dickinson
Les Dickinson

Level 3 Expert

18384 Answers

David
David

Level 3 Expert

778 Answers

Tony

Level 3 Expert

2600 Answers

Are you an ASUS Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...