Home
Videos uploaded by user “Eli the Computer Guy”
The OSI Model Demystified
 
18:41
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2 Info Level: Beginner Date Created: July 9, 2010 Length of Class: 18 Minutes Tracks Networking Prerequisites Introduction to Networking Purpose of Class This class explains the OSI Model for technicians Topics Covered The OSI Model Class Notes Layer 7 -- Application Layer -- The layer users interact with Layer 6 -- Presentation Layer -- Generally the layer the Operating System is on Layer 5 -- Session Layer -- The layer that controls the communication session between two computers Layer 4 -- Transport Layer -- The layer that controls Windowing and other tasks related to communication Layer 3 -- Network Layer -- The layer that Routers and IP addresses operate at Layer 2 -- Data Link Layer -- The layer that Switches, MAC Addresses and ARP reside at Layer 1 -- Physical Layer -- The layer that cabling resides on Resources Wikipedia
Views: 1269770 Eli the Computer Guy
IaaS Introduction (Infrastructure as a Service)
 
12:44
IaaS, or Infrastructure as a Service, revolves around moving your core infrastructure equipment to the cloud. No longer do companies need to buy and maintain, Telephone Systems, Servers, Firewalls, Surveillance Systems on their premises. They can now purchase the services like any utility. This provides enormous benefit to the company, but is likely to result in lower requirements for IT staffing. For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
Views: 73229 Eli the Computer Guy
Creating and Administering Groups in Active Directory on Windows Server 2012
 
14:34
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: March 26, 2013 Length of Class: 14:34 Tracks Windows Server 2012 Prerequisites Building Your Own Network for a Computer Lab Introduction to Windows Server 2012 Installing Windows Server 2012 Navigation in Windows Server 2012 Introduction to Active Directory Directory Services Structure in Windows Server 2012 Introduction to Active Directory Infrastructure in Windows Server 2012 Basic DHCP Setup on Windows Server 2012 Introduction to Using DNS Server on Windows Server 2012 Adding Windows Computers to a Windows Server 2012 Domain Creating and Administering User Accounts in Active Directory on Windows Server 2012 Purpose of Class This class teaches students why Groups are important, how to create and edit them. Class Notes Groups are used to easily assign Security Policies and Sharing Permissions to numerous Users. Users, Computers and Groups can be added to Groups Groups are managed through Active Directory Users and Computers Windows has numerous Built In Groups that have predefined Security Policies for members to be able to work in predefined roles. Resources
Views: 299317 Eli the Computer Guy
Introduction to Security with Group Policy Objects and Organizational Units in Windows Server 2012
 
26:25
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 17, 2013 Length of Class: 26:25 Research Assistance: Tracks Windows Server 2012 Prerequisites None Purpose of Class Class Notes Organizational Units are used to Group Users and Computers together so that you can assign Security to them easily GPO's or Group Policy Objects are the actual Security Policies that will be assigned. Security and Permissions are different things. GPO's allow you to do things such as restrict the usage of Task Manager from some users regardless of which computer they log into, or to map a specific drive whenever a user logs in. Process to Create and Assign GPO's Create an Organizational Unit Move User or Computer Into OU Create GPO Assign OU to GPO Steps: Group Policy Management Right Click "Group Policy Objects" and Select "New" Give Name to GPO Click "OK" In Right hand Window Right Click new GPO and Select "Edit" Edit GPO to your needs In Left Pane Right Click your Domain Name and Select "New Organizational Unit" Give Name and Click "OK" In Left Pane Right Click new Organizational Unit and Select "Link an Existing GPO" Select GPO You want to be linked Open Active Directory Users and Computers from Server Manager dashboard Go to Users Folder Right Click the User you want to be controlled by the Organizational Unit and Select "Move" Select Organizational Unit from Folder Tree and Click "OK" Go to CLIENT Computer (Windows 8,7,Vista) Log in as User and GPO should be in Effect (If user is currently logged in, Log them Out and then back in) Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor VirtualBox Windows Server 2012 Machine Virtual Machine AD, DNS and DHCP have been setup Domain ETCG.com has been created Networking Configuration in VirtualBox = Internal Windows 8 Machine Virtual Machine Already a member of the Domain (Etcg.com) Networking Configuration in VirtualBox = Internal
Views: 417960 Eli the Computer Guy
Introduction to DNS (Domain Name Services)
 
19:18
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: March 13, 2013 Length of Class: 19:17 Tracks Servers Networking Prerequisites Introduction to Networking Purpose of Class This class teaches students the basic concepts for network DNS (Domain Name Services). Class Notes DNS is the Server Service that Maps Hostnames/ Domain Names to IP Addresses DNS and DHCP are different services that are generally hosted on the same server, but can be hosted on separate servers Dynamic DNS allows DHCP to automatically add Name and IP Address mapping to DNS tables. Most techs will work with DNS built into Small Business/ Home Routers or ISP Modems. Other variations of DNS are provided by Windows Servers or BIND which is used on Unix and Linux servers. A DNS implementation may be very simple or very complex. BIND and Windows DNS can have many configurations and options while DNS built into a Linksys Router will only have an On/ Off toggle. DNS Servers can be configured to query other DNS Servers if they cannot find a result in their tables. Reverse DNS maps IP Addresses to Hostnames/ Doman Names. This is done for security to verify a connection has not been redirected by hackers. Resources https://www.isc.org/software/bind http://en.wikipedia.org/wiki/Domain_Name_System
Views: 492576 Eli the Computer Guy
MX Record - What is...
 
04:15
MX Records (Mail Exchange) are DNS records that are used to route email to email servers. You can have numerous MX Records posting to different email servers to prevent loss of email due to downtime. Email is sent to servers pointed to in MX records based on Priority which states that the lowest the Priority number the higher the priority of the server. Emails will be routed to MX records of 0 first.
Views: 5221 Eli the Computer Guy
VPN - Virtual Private Networking
 
27:42
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2
Views: 1868113 Eli the Computer Guy
PaaS Introduction (Platform as a Service)
 
16:15
For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
Views: 95500 Eli the Computer Guy
Introduction to DHCP
 
21:36
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: March 11, 2013 Length of Class: 21:35 Tracks Servers Networking Prerequisites Basic understanding of TCP /IP TCP/IP and Subnet Masking Purpose of Class This class teaches students what DCHP is and the core concepts of Dynamic Host Control Protocol. Class Notes DHCP stands for Dynamic Host Configuration Protocol DHCP is a Server Service Separate from DNS Can be found in Windows Servers/ Linux/ Unix and Home or Small office Routers DHCP Servers Assign: Dynamic IP Addresses Static Subnet Mask Static Default gateway Static Primary and Secondary DNS Servers Scope is the pool of addresses that the DHCP server can assign from. Such as192.168.1.100 to 192.168.1.200 Lease is the length of time that the DHCP server will reserve the IP address for the client. Clients will try to renew the lease periodically Lease length can be manually configured on a per server basis Reservations are IP Addresses that are reserved for systems that need Static IP Addresses Steps for Getting an IP DHCPDiscover -- Client Requests an IP from Any Available DHCP Server DHCPOffer -- DHCP Servers offer IP Addresses DHCPRequest -- Client Acknowledges which IP Address it has accepted DHCPAck -- DHCP Server Acknowledges Client has accepted IP Address Resources http://technet.microsoft.com/en-us/library/cc780760(v=ws.10).aspx
Views: 252588 Eli the Computer Guy
Adding Windows Computers to a Windows Server 2012 Domain
 
22:05
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: March 22, 2013 Length of Class: 22:05 Tracks Windows Server 2012 Prerequisites Building Your Own Network for a Computer Lab Introduction to Windows Server 2012 Installing Windows Server 2012 Navigation in Windows Server 2012 Introduction to Active Directory Directory Services Structure in Windows Server 2012 Introduction to Active Directory Infrastructure in Windows Server 2012 Basic DHCP Setup on Windows Server 2012 Introduction to Using DNS Server on Windows Server 2012 Purpose of Class This class teaches students how to add a Windows 8 Computer to a Windows Server 2012 Domain. Class Notes Windows 8 Business Version -- Only Business class Windows Operatings Systems can join a Domain (Windows 8 Pro/ Enterprise, Windows 7 Pro/ Ultimate, Windows Vista Business/ Ultimate, XP Pro) Go to Server Manager -- Tools -- Active Directory Users and Computers Verify Client Computer is receiving the DHCP IP Address from the Windows 2012 Server To add to Domain on Client Computer Go to: Search -- System -- "Change Settings" -- Network ID Wizard Resources
Views: 555786 Eli the Computer Guy
IIS (Internet Information Services) - What is...
 
03:34
IIS is Microsofts implementation of a web server for Windows. It's free to use with Windows Server and can even be deployed on a Windows 10 machine. IIS is an easy to use GUI and may be preferred over Apache or NGINX when building web apps that fully utilize the Microsoft Stack.
Views: 8339 Eli the Computer Guy
Software Defined Networking (SDN) Introduction
 
25:14
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: May 15, 2013 Length of Class: 25:14 Research Assistance: Tracks Networking Prerequisites Basic Understanding of Networking Purpose of Class This class explains why SDN (Software Defined Networking) is important Class Notes Software defined Networking pulls the Intelligence away from the hardware itself. SDN is to networking as SANs were to Data Storage, and Virtualization has been to Computers. SDN separates Networking into 4 "Planes": Control Plane, Data Plane,Services Plane,Management Plane Data Plane -- Forwards the actual Data Packets and includes what you think of as standard networking equipment Services Plane -- deals with Services such as Firewall Services and pulls them off of the "standard" networking equipment and handles them on "servers". Control Plane -- Controls all of the networking devices on the Data Plane and manages Services that are supported on the Services Plane. Management Plane -- Manages the setup Control Protocol's are used to communicate between the Control Plane and the Data Plane. OpenFlow is a popular Open Source Control Protocol SDN allows for easy Network Traffic Shaping based on current needs. Corrections Lab Setup Used in Demonstration N/A Study Guide Resources http://www.openflow.org/ http://www.juniper.net/us/en/dm/sdn/ http://forums.juniper.net/t5/The-New-Network/Decoding-SDN/ba-p/174651 http://www.cisco.com/web/solutions/trends/open_network_environment/index.html
Views: 170520 Eli the Computer Guy
Setting  Up Roaming Profiles in Windows Server 2012
 
17:48
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 22, 2013 Length of Class: 17:47 Research Assistance: Tracks Windows Server 2012 Prerequisites Comfortable working in the Windows Server 2012 Environment Be able to create User Accounts Be able to Share Folders on Windows Server 2012 Purpose of Class This class introduces students to Roaming Profiles in a Windows Server Environment. Class Notes Roaming Profiles allow users to be able to log into different machines and automatically be give their own Profile Shared Profile Folder can be on any File Server on the Network, but for small to medium sized environments it is usually on the Domain Controller. If network connection is down you will use the cached profile from the last time you logged in. Profiles encompass: files, folders, settings. Applications/ Programs must be installed locally on each machine.. Steps: Create a Share on Your Server called PROFILES and share is with Everyone with Read/ Write Permission Create New User (If Needed) Open User Profile Go to Profile Tab Type in Profile Path \\SERVERNAME\profile\%username% (Substitute SERVERNAME with your Server's Name) Login to a computer with User Account that will be made Roaming Profile in PROFILES folder will be automatically created. Caution Profile Information gets Cached on Local Machine (Hacking Vector) Cached Profiles take up hard drive space Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor Windows Server 2012 Virtual Machine AD, DNS, and DHCP ETCG.com Domain Created Internal Network Connection in VirtualBox 2 Windows 8 Virtual Machines Both machines are members of ETCG.com domain Internal Network Connection in VirtualBox Study Guide Resources http://technet.microsoft.com/en-us/library/jj649079.aspx
Views: 203680 Eli the Computer Guy
Basic DHCP Setup on Windows Server 2012
 
26:49
Attend Question/ Answer MEETUP: http://goo.gl/kPHGFw Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: March 14, 2013 Length of Class: 26:49 Tracks Windows Server 2012 Prerequisites Building Your Own Network for a Computer Lab Introduction to Windows Server 2012 Installing Windows Server 2012 Navigation in Windows Server 2012 Introduction to Active Directory Directory Services Structure in Windows Server 2012 Introduction to Active Directory Infrastructure in Windows Server 2012 Introduction to DHCP TCP/IP and Subnet Masking Purpose of Class This class teaches students how to configure a basic DHCP Server on Windows Server 2012. You learn to create a DHCP Scope and set the appropriate TCP/IP Options. Class Notes Make sure that the Routers DHCP Service has been turned off Determine your TCP/IP Address Scheme before you setup DHCP Make sure the DHCP Server has a Static IP Address configured Resources
Views: 641110 Eli the Computer Guy
Introduction to Kali - The Linux Operating System Built for Hacking
 
12:36
Follow Eli on the Vlog Channel: https://www.youtube.com/user/EliComputerGuyLive Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 1, 2013 Length of Class: 12:35 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Solid foundation in Linux, Networking and Computer Systems. Purpose of Class This class introduces students to the Kali Operating system that has been developed for hacking and penetration testing. Class Notes Kali is the replacement for Backtrack 5 Kali is based on Debian fork of Linux Kali contains a large number of useful Hacking Utilities to make penetration testing easier, but should not be thought of as "easy" to use. Kali can be installed onto 32bit, 64bit or ARM computers. Kali can be run as a Live CD, installed onto Hardware, or run as a Virtual Machine. Kali License is generally Open Source, but Professionals should review it. Resources http://www.kali.org
Views: 747697 Eli the Computer Guy
Introduction to TOR
 
18:48
For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
Views: 295656 Eli the Computer Guy
Leaving YouTube...
 
14:37
YouTube upheld a Community Guideline Strike against a 2.5 year old half assed video that I would have been fine with simply deleting. This means I lost the right for 6 MONTHS to upload long form vids, plus even be able to dispute other infractions. YouTube has made it clear it has not real concern about content creators. I will continue to upload small videos to this and the other channel, but YT will no longer be my primary focus. If someone with 626K Subs isn't worth a simple phone call there is no argument for why it's worth investing real effort to this platform.
Views: 478877 Eli the Computer Guy
Introduction to Active Directory Directory Services Structure in Windows Server 2012
 
46:31
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2
Views: 1327579 Eli the Computer Guy
Installing Active Directory, DNS and DHCP to Create a Windows Server 2012 Domain Controller
 
27:45
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2
Views: 1980783 Eli the Computer Guy
Introduction to Active Directory Infrastructure in Windows Server 2012
 
38:56
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: February 25, 2013 Length of Class: 38:56 Tracks Windows Server 2012 Prerequisites Introduction to Windows Server 2012 Purpose of Class This class teaches students the basic concepts in building out Active Directory Infrastructure for Windows Server 2012. Class Notes DC's or Domain Controllers are the server that control the Active Directory Service Domains are made up of Domain Controllers and Member PC's and Servers. There can be multiple Domain Controllers in a Domain for fault Tolerance and Load Balancing. DC's keep data synchronized through replication. The schedule for replication is called the "replication strategy". DC's can be grouped into Sites. Sites are comprised of Domain Controllers located at the same geographic location. Sites are used to reduce bandwidth consumption used due to Replication. DC's are normally set to be Read/ Write. For security purposes you can make DC's Read only. Read Only DC's are used at Remote Offices to lessen the danger of Hacking. Sites are connected through Site Links Sites can Replicate Through Site Link Bridges. Site Link Bridges are kind of like routers for replication. Global Catalog Servers store searchable Indexes of the Active Directory database. There should be at least one Global catalog server at each site. It is best to use Microsoft's built in DNS Server on a Windows Server 2012 network. You can use a Unix DNS Server, but... WINS (Windows Internet Naming Service) was Microsoft's attempt to compete with DNS. You will rarely ever see it, but if you have very old legacy systems you may need to create a WINS server. Using Microsoft's DHCP Server is usually the best bet on a Windows Domain. Using Windows DNS and DHCP allow for multiple servers for fault tolerance and increased security.
Views: 581464 Eli the Computer Guy
Manage Storage Spaces and Storage Pools in Windows Server 2012
 
21:06
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: May 30, 2013 Length of Class: 21:06 Research Assistance: Tracks Windows Server 2012 Prerequisites The student should be comfortable with Disk Management and Basic Administration within Windows Server 2012. Purpose of Class This class shows students how to use Storage Spaces to more easily and reliably store data on a Windows 2012 Server. Class Notes To Manage Storage Spaces go to Server Manager and then on Left Hand Column Select File and Storage Services Pools Group Physical Hard Drives into a Single Usable Resource. Virtual Hard Drives are created on Storage Pools and appear as Physical Hard Drives to Disk Management Virtual Hard Drives can be configured for maximum performance, or for redundancy. Volumes are Created on Virtual Drives the same as if they were on a Physical Hard Drive. To create a usable Volume: Create a Pool Create a Virtual Disk Create a Volume Shrink Volume can only be accomplished within Disk Management (Server Manager -- Tools -- Computer Management -- Disk Management) Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor Windows Server 2012 Domain Controller Virtual Machine AD, DNS, and DHCP ETCG.com Domain Created Internal Network Connection in VirtualBox Windows Server 2012 Member Server Virtual Machine Internal Network Connection in VirtualBox Study Guide Resources
Views: 131485 Eli the Computer Guy
Episode #321: Mapping Network Drives in Windows
 
09:19
In this episode Eli the Computer Guy shows you how to map a network drive in Windows using the GUI and the DOS NET USE Command.
Views: 65526 Eli the Computer Guy
What is Good Enough?
 
07:56
We discuss why trying to do too much, or too good a job can actually be bad.
Views: 5648 Eli the Computer Guy
Introduction to the Internet of Things
 
16:42
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: July 3, 2013 Length of Class: 16:41 Tracks Networking Prerequisites None Purpose of Class This class introduces students to the concept of the Internet of Things Class Notes The Internet of Things is the idea that items not commonly thought of as computers will be able to record and transmit data in an "Internet Like" fashion. Items may not use the standard TCP/IP stack to communicate. They may use RFID, NFC, Bluetooth or some other wireless communication technology. Items will record data using Input devices such as Accelerometers, Thermometers, GPS units or Other ways besides Keyboards and Mice. Power for devices can come from long lasting batteries that can last for a year or more, or from sources such as a persons body motion. Information from a device may be sent to another device that is connected to a TCP/IP Network and transmitted to the Internet from there. Corrections Lab Setup Used in Demonstration N/A Study Guide N/A Resources http://en.wikipedia.org/wiki/Internet_of_Things http://readwrite.com/tag/internet-of-things http://www.zdnet.com/topic-tapping-m2m-the-internet-of-things/
Views: 69892 Eli the Computer Guy
Wireless Bridges for Networking
 
12:53
Follow Eli on the Vlog Channel: https://www.youtube.com/user/EliComputerGuyLive Info Level: Beginner Presenter: Eli the Computer Guy Date Created: July 29, 2010 Length of Class: 12 Minutes Tracks Networking Prerequisites Introduction to Networking Purpose of Class This class shows students how wireless access points can be used to connect networks. Topics Covered Why Wireless Bridges Are Used Creating a Wireless Bridge Class Notes Wireless bridges can be used to connect networks in separate buildings, or inside of buildings where network cable cannot be run. You cannot use 2 wireless routers to create a bridge. One side HAS to be a dedicated Wireless Access Point In the Wireless Access Point set the access point to Bridge mode, and then enter the MAC address of the Wireless Router or Access Point it is connecting to. You can attach high powered antennas to the access points to make them work better. If you are going to use real time communication the bridge should be created with 802.11n equipment
Views: 814572 Eli the Computer Guy
Episode #317: Ping and Tracert for Network Troubleshooting
 
23:42
In this episode Eli the Computer Guy shows you how to use Ping and Tracert in the real world for troubleshooting.
Views: 98513 Eli the Computer Guy
Introduction to Using DNS Server on Windows Server 2012
 
18:48
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: March 20, 2013 Length of Class: 18:48 Tracks Windows Server 2012 Prerequisites Building Your Own Network for a Computer Lab Introduction to Windows Server 2012 Installing Windows Server 2012 Navigation in Windows Server 2012 Introduction to Active Directory Directory Services Structure in Windows Server 2012 Introduction to Active Directory Infrastructure in Windows Server 2012 Basic DHCP Setup on Windows Server 2012 Introduction to DNS (Domain Name Services) Purpose of Class This class gives an overview of the basic usage of DNS Server on a Windows 2012 Server. Class Notes Logs Show Events that may be important if your DNS Server is having issues Clear Cache -- Clears the local DNS cache of the server and may need to be done if you make changes to DNS, but they do not seem to be working Restart Service Scavenge Stale Resource Records -- Can be used to clean up old/ bad records in DNS You can create a Record Manually by selecting "New Host (A or AAAA)" after Right Clicking your Domain. Resources
Views: 450879 Eli the Computer Guy
Creating and Administering User Accounts in Active Directory on Windows Server 2012
 
16:10
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: March 26, 2013 Length of Class: 16:10 Tracks Windows Server 2012 Prerequisites Building Your Own Network for a Computer Lab Introduction to Windows Server 2012 Installing Windows Server 2012 Navigation in Windows Server 2012 Introduction to Active Directory Directory Services Structure in Windows Server 2012 Introduction to Active Directory Infrastructure in Windows Server 2012 Basic DHCP Setup on Windows Server 2012 Introduction to Using DNS Server on Windows Server 2012 Adding Windows Computers to a Windows Server 2012 Domain Purpose of Class This class teaches students how to create and administer User Accounts in Active Directory on Windows Server 2012. Class Notes To Create/ Administer Accounts go to -- Server Manager -- Tools -- Active Directory Users and Computers "User Must Change Password at Next Login" forces users to change their password when they login. This is used when IT people reset users passwords to a default to force users to create their own passwords. "User cannot change password" is used generally for systems that are used by multiple people and you don't want a user locking out the other users. "Account Disabled" allows you to disable and account without deleting it. You can set accounts to automatically expire, and allow access only during certain hours. Resources
Views: 447345 Eli the Computer Guy
Open Compute Project Introduction
 
23:19
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: May 21, 2013 Length of Class: 23:20 Tracks Servers Prerequisites None Purpose of Class This class introduces students to the Open Compute Project which is an Open Source hardware initiative focused on Data Center deign. Class Notes Started by Facebook in April of 2011 The Open Compute Project tries to find more efficient ways of building and running datacenters Components of Open Compute Project Server Storage Data Center Virtual IO Hardware Management Corrections Lab Setup Used in Demonstration N/A Study Guide Resources http://www.opencompute.org/
Views: 22117 Eli the Computer Guy
Building Your Own Network for a Computer Lab
 
17:05
NEW CONTENT ON: http://www.FailedNormal.com Info Level: Beginner Presenter: Eli the Computer Guy Date Created: February 15, 2013 Length of Class: 17:05 Tracks Networking Classes that Require a Computer Lab Prerequisites Setting Up Port Forwarding TCP/IP and Subnet Masking Understanding SOHO Routers Understanding Switches Introduction to Networking Physical Network Segmentation Purpose of Class This class teaches students why they should set up a separate Computer Lab network on their home network if they will be creating test servers and networks. It also explains the basic concepts such as; Port Forwarding to Multiple Layers of Routers, the Need for Different IP Subnets on the Same LAN, and that Conflicting Server Services can cause odd problems. Class Notes Reasons for a Separate Computer Lab Network-- DNS and DHCP issues, performance problems Lab Network must be on a different IP Network then other LAN Networks. 192.168.1.x, 192.168.2.x, 192.168.3.x For access to servers form outside world port forwarding on your ISP Router must be pointed at the Router for your Lab Network Any $60 Linksys Router can be used to create a lab network. Lab Network Router External Interface needs to be configured to be on the same network as the ISP Router's Internal Interfaces.
Views: 1035196 Eli the Computer Guy
Introduction to File and Share Permissions in Windows Server 2012
 
35:11
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 17, 2013 Length of Class: 35:11 Research Assistance: Tracks Windows Server 2012 Prerequisites Comfortably be able to use Windows Server 2012 and Windows 8. Be able to create Users and Groups on Windows Server 2012 Purpose of Class This class teaches students about the basic concepts of File and NTFS Permissions in a Windows Server 2012 Environment. Class Notes Permissions and Security are different things Permissions allow Users, or Groups access to Resources such as Files, Folders and Printers It is best to assign Permissions to Groups and not to Individual Users Share and NTFS Permissions are different Share Permissions only matter when Resources are being accessed over the network. If a User is Local the Permissions are ignored. NTFS Permissions are used whether Resources are access over the Network or Locally. Over the Network is there are both Share and NTFS permissions set on a Resource then the Most Restrictive Permission is the one that will be applied. In General it is best to set Share Permissions to a resource to Everyone with Full Control, and then use NTFS Permissions to grant or restrict access. Share Permissions allow you to access Resource through UNC (Universal naming Convention) \\SERVERNAME\SHARE The FAT, FAT 16 and FAT 32 file systems used in Windows 95 and 98 could only use Share Permissions. Inheritance means that Permissions set to parent Folders will be inherited by Child Resources Log in and Out for New Permissions to be applied By Default Creators of Resources are the Owners. Resource Owners can set permissions to Resources. Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor Windows Server 2012 Machine Virtual Machine AD, DNS and DHCP have been setup Domain ETCG.com has been created Created 2 Users and 2 Groups Networking Configuration in VirtualBox = Internal Windows 8 Machine Virtual Machine Already a member of the Domain (Etcg.com) Networking Configuration in VirtualBox = Internal Resources
Views: 388172 Eli the Computer Guy
Dynamic DNS - What is...
 
06:12
Dynamic DNS allows you to dynamically update your DNS records if you have a Dynamic IP address from your ISP. You install an app on a computer on your network, and it checks your WAN IP address periodically and then updates your DNS records. NoIP.com and DynDNS.org are the most prominent Dynamic DNS Providers. You can either buy your domain name from them, or you can forward your domain name to a subdomain you create with them. i.e. FailedNormal.com --- FailedNormal.no-ip.com
Views: 5230 Eli the Computer Guy
API (Application Program Interface) - What is...
 
05:08
API's allow external application to connect to and use cloud based services such as Facebook and Dropbox. Platforms create API's for specific programming languages and use specific procedures to allow access to data and services. API's are not standard across platforms, and access to API's is completely at will by the platforms. API's can be changed or discontinued at any time.
Views: 3581 Eli the Computer Guy
NIC Teaming for Fault Tolerance and Load Balancing on Windows Server 2012
 
22:38
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: June 4, 2013 Length of Class: 22:38 Research Assistance: Tracks Windows Server 2012 Prerequisites Students should be comfortable working in the Windows Server 2012 environment, and understand basic TCP/IP Networking. Purpose of Class This class teaches students how to team NIC's in Windows Server 2012 for Fault Tolerance and Load Balancing of Network Traffic. Class Notes NIC Teaming makes it appear as if multiple Network Interface Cards are a single NIC to the Server NIC Teaming is used for Load Balancing NIC Teaming is used for Fault Tolerance To manage NIC Teaming Server Manager Local Server NIC Teaming NIC Teams can connect to Multiple Switches so that if one switch fails the Server can still communicate with the network Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor Windows Server 2012 Member Server Virtual Machine 3 Internal Network Connections in VirtualBox Study Guide Resources http://technet.microsoft.com/en-us/library/hh831648.aspx http://blogs.technet.com/b/privatecloud/archive/2012/06/19/nic-teaming-in-windows-server-2012-brings-simple-affordable-traffic-reliability-and-load-balancing-to-your-cloud-workloads.aspx http://blogs.technet.com/b/keithmayer/archive/2012/10/16/nic-teaming-in-windows-server-2012-do-i-need-to-configure-my-switch.aspx#.Ua4GJkCsh8E
Views: 111795 Eli the Computer Guy
It's OK to Fire Clients
 
09:50
Sometimes paying clients just are not worth enough to keep around. Learning how and when to fire clients is an invaluable skill for a small business owner. Just like an employee, or a server, if a client is not helping to grow you business they need to be replaced.
Views: 4444 Eli the Computer Guy
Introduction to Linux
 
48:08
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2 Info Level: Beginner Date Created: August 16, 2010 Length of Class: 47 Minutes Tracks Linux Prerequisites None Purpose of Class This class teaches students the basic concepts that they should understand before they start trying to work with Linux. Topics Covered What is Linux Distributions Open Source Licensing Shells Significance of ROOT Importance of Capitalization Server vs. Desktop versions What Linux is best at Class Notes Introduction Linux was created by Linus Torvalds between 1991 and 1994 Linux is not a version of Unix Distributions Once Linux was released to the public numerous institutions created their own versions of the operating system. These different versions are called Distributions, or Distros. Different Distros have different functionality. Open Source software is not necessarily free software Make sure you understand the licensing requirements for your Open Source software before you release it into a Production Environment. Defining The Shell The Shell is the interface you use to interact with the Operating System. Windows uses a GUI (Graphical User Interface) Shell, Linux primarily uses a LUI (Line User Interface) ROOT ROOT is the highest level of anything in the Linux world. ROOT user is the highest level user. The ROOT directory s the highest level directory. Capitalization matters in Linux (HOME is different then home) Server vs. Desktop Versions Server versions of Linux install the bare minimum number of components for the system to function. After installation you will be faced with a blinking cursor. Desktop versions of Linux come prepackaged with a GUI environment and numerous tools and applications. After installation you will be presented with an environment that looks a lot like Windows or the Mac OS. What Linux is really god for? Linux is great for server functionality Linux is still poor for every day desktop functionality for most users.
Views: 2078473 Eli the Computer Guy
Introduction to the Darknet
 
13:23
Description: The Darknet is a component of the Deep Web that is shielded from casual web surfing by systems such as TOR and Freenet. When speaking of sites on the Darknet people generally are talking about TOR Services. TOR Services allow you to create your own webserver and have it accessible only from users of TOR. TOR Services look like http://xizazy2kz32bo3ko.onion and are not routable on the standard Internet. The key components of the Darknet are: Uses standard Internet Technologies Requires a Special Client to Access the Network Anonymity for both Client and Server is maintained For more information: https://www.torproject.org https://freenetproject.org/ For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
Views: 563667 Eli the Computer Guy
TOR Security Concerns and Considerations
 
29:13
For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
Views: 170576 Eli the Computer Guy
Understanding Switches
 
58:10
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2 Info Level: Beginner Date Created: July 12, 2010 Length of Class: 57 Minutes Tracks Networking Prerequisites Introduction to Networking Purpose of Class This class discusses the purpose of network switches and their functions. Topics Covered Switches vs. Hubs Managed vs. Unmanaged Switches Speeds and Duplex Quality of Service Power Over Ethernet VLAN Spanning Tree Protocol Class Notes Basic Switch Concepts A hub simply splits the Ethernet signal like a cable splitter Broadcast storms happen when too many computers are trying to talk at once Switches allow multiple computers to be able to talk at the same time. Switches are OSI Model layer 2 devices and use network devices MAC Addresses for identification Managed vs. Unmanaged Switches Unmanaged switches are completely automatic Managed switches can be configured Speed Speeds -- 10Mbps / 100Mbps / 1000Mbps Full Duplex means a device can send and receive traffic at the same time Half Duplex means a device can either receive or transmit traffic Backplane determines how much total data a switch can handle Trunk Connection allow multiple switches to be tied together VLANs are separate LANs on the same switch POE -- Power Over Ethernet allows you to power network devices using cat5 cable QOS/ COS -- allows you to prioritize network packets so that real time communication is not interrupted by file transfers. Spanning Tree Protocol is a networking protocol that helps prevent network loops
Views: 1203383 Eli the Computer Guy
Setting Up Port Forwarding
 
16:30
Follow Eli on the Vlog Channel: https://www.youtube.com/user/EliComputerGuyLive Info Level: Beginner Presenter: Eli the Computer Guy Date Created: February 1, 2013 Length of Class: 16:29 Tracks Servers Networking Prerequisites Understand TCP/IP and Networking Purpose of Class This class shows students how to setup Port Forwarding on a Small Business Router and explains why Port Forwarding is important. Class Notes All networking protocols use specific pots. HTTP uses Port 80. FTP uses Port 21. Port Forwarding is telling the router to forward traffic on specific ports to specific computers on the network. You can only forward one port to one computer. You would use other technology for load balancing or fault tolerance. One Router can port numerous different ports to different computers. All small Business Routers have different configuration screens. If you are using Residential Internet Service your ISP MAY block certain ports such as Port 80. Make sure to hit SAVE. If you don not save the configuration the Router will not forward the ports. Do not mistake Configuration for Physical Ports with the Configuration screen for Networking Ports. Resources http://en.wikipedia.org/wiki/Port_forwarding
Views: 813992 Eli the Computer Guy
PHP - Why Coders Hate...
 
09:00
PHP is great for being able to easily create web apps that work. The problem is that it also easy to create code with major vulnerabilities that is a mess to read and try to audit. Many times PHP is used by desktop support technicians to create apps to track department inventory, or work orders that after a few years get coopted by the rest of the company and are being used at a scale never envisioned when the technician was copy/ pasting from a dummies book to make the code work.
Views: 7919 Eli the Computer Guy
Users, Groups and Permissions in Linux
 
37:00
Note: We Demonstrate Linux using Ubuntu Server 10.04 Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: September, 16 2010 Length of Class: 37 Minutes Tracks Linux Prerequisites Introduction to Linux Installing Linux Basic Linux Tasks VIM for File Editing Navigation in Linux Purpose of Class This class teaches students how to manage users, groups and permissions in a Linux enviornment. Topics Covered Adding and Deleting Users Editing the passwd File Which Contains User Configurations Changing User Passwords Adding and Deleting Groups Adding and Deleting Users from Groups Editing the group Configuration File Understanding Permission Numbering System Changing User and Group Ownership for Files and Folders Class Notes Users Add User = sudo adduser username Change User password = sudo passwd username Delete User = sudo userdel username Edit Users Configuration File = sudo vim /etc/passwd (shows usernames, names of users, home directories) Groups Sudo groupadd groupname Sudo groupdel groupname Sudo vim /etc/group (shows groups and users) Permissions Numbers = owner/group/everyone else 4 = read, 2 = write, 1 = execute To Chanege Permissions of a File or Folder = sudo chmod 777 file/folder (-R for recursive) Changing Ownership To Change User Ownership = sudo chown -R username file/folder To Change Group Ownership =sudo chgrp --R groupname file/folder -R for Recursive for Folders
Views: 416445 Eli the Computer Guy
Learn to Code - #LearnToCode #SorryNotSorryYourJobWasWorthless
 
09:16
GeekVid: http://www.GeekVid.com iTunes GeekVid: https://itunes.apple.com/us/podcast/geekvid-com/id1449998640 Failed Normal Videos: https://www.FailedNormal.com The Daily Blob Podcast: http://thedailyblob.com
Views: 18271 Eli the Computer Guy
Introduction to Solid State Drives (SSD)
 
28:38
Description: Solid State Drives are Quieter, Cooler, and generally more reliable and faster then standard platter type hard drives. But because SSD's come in many different types you need to know what to look for when buying one. In this class we talk about: IOPS = Input/ Output Operations per Second Sequential Read/ Write Speed Random Read/ Write Speed Interface = SATA/ PCIe/ USB / IDE For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
Views: 157656 Eli the Computer Guy
Episode #328: Introduction to Type 1 Hypervisor Virtualization - Bare Metal Virtual Servers
 
25:11
In this episode Eli the Computer Guy explains what Type 1 Hypervisors are and why they are useful. He demonstrates VMware ESXI and gives you an overview of how Management Software controls the Type 1 Hypervisors.
Views: 78785 Eli the Computer Guy
TCP/IP and Subnet Masking
 
01:09:35
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2 Info Level: Intermediate Date Created: November 19, 2010 Length of Class: 69 Minutes Tracks Networking Prerequisites Introduction to Networking Purpose of Class This class teaches students about the components and concepts in a TCP/IP network. Chapters TCP/IP Overview (2:32) How TCP/IP Works (16:53) TCP/IP Numbering (43:00) Subnet Masking (48:17) Final Thoughts (64:03) Class Notes 1. TCP/IP Is technically a Protcol Suite IP Routes Traffic Layer 3 OSI Model Network Routable Networks (sub networks) TCP controls transmission between connected systems Layer 4 OSI Model Transport Windowing is the process of sending data from one computer to another in TCP/IP version 4 2. How TCP/IP Works IP Addresses -- Every device on a TCP/IP network needs an individual IP Address DNS (Domain Name Service/Server) resolves Domain names into IP Addreses DHCP (Dynamic Host Control Protcol) Servers automatically assign IP information to clients for a specific time period (Lease). Clients try to renew leases at 50% expiration point. Default Gateway (Router) connects networks. If an IP Address cannot be found on the local network the computer tries to use the Default Gateway to find the target. Subnets and Subnet Masking -- Subnets are individual networks. Subnet Masks divide IP Addresses in Subnet Number and Host Number What the Number Mean IP Addresses and Subnet Masks are made of 4 Octets of Bits 128-64-32-16-8-4-2-1 Subnet Masking IP Addresses contain the Subnet Number and Host Number. The Subnet Mask tells you where the subnet number ends and the host number begins. Classful Networks A, B, C,D,E Gone now use CIDR The Highest Address in a Subnet Range is the Broadcast address To determine the number of subnets (n is the number of bits used)= 2n To determine number of Hosts = 2n -2
Views: 2927676 Eli the Computer Guy
Introduction to Programming
 
32:46
Follow the Insanity at: https://www.FailedNormal.com Downloadable Podcasts at: https://failednormal.podbean.com iTunes: https://itunes.apple.com/us/podcast/failed-normal/id1349818284?mt=2
Views: 1929265 Eli the Computer Guy
PHP - What is...
 
06:34
PHP is a Hypertext Preprocessor. This essentially means that PHP dynamically writes web pages for you. So it can query a database and print a report from it, or change CSS and such based on specific criteria. PHP is very easy to learn, and functions as a secretary for web sites.
Views: 8070 Eli the Computer Guy
Introduction to Virtualization
 
58:58
Attend Question/ Answer MEETUP: http://goo.gl/kPHGFw Follow Eli on the Vlog Channel: https://www.youtube.com/user/EliCompu... Info Level: Beginner Presenter: Eli the Computer Guy Date Created: February 2, 2012 Length of Class: 59 Minutes Tracks Virtual and Cloud Computing Prerequisites Introduction to Cloud Computing Purpose of Class This class teaches students the basic concepts that required to deploy Virtualization in the real world. Chapters Introduction (00:00) Overview (01:10) Type 1 Hypervisors (13:45) Type 2 Hypervisors (33:31) Converting to Virtualization (40:51) Final Thoughts (47:05) Class Notes Introduction Virtualization allows you to separate the Operating System from the underlying hardware Virtualization is NOT the same as Cloud Computing. Virtualization is a Type of Cloud Computing. Hypervisors are the software that Operating System "Instances" run on. Overview Virtualization allows you to easily migrate servers between pieces of physical hardware Virtualization allows you to consolidate multiple cheap physical servers into one server An "Instance" is a "Virtual Computer" installed on a Hypervisor. Type 1 Hypervisors Called Bare Metal Hypervisor Installs directly on to hardware You use Management Software installed on a different computer to manage a Type 1 Hypervisor box. Based on XEN. Generally the Hypervisor is free, but you pay for the Management software Over Allocation allows you to allocate more total resources to the Instances of the operating systems then the physical server has. At any one time all Instances CANNOT use more resources then the total amout that the server has. Type 2 Hypervisors Called Hosted Hypervisor Type 2 Hypervisors are installed onto an Operating System such as Windows 7, OSX or Linux. (VirtualBox, Virtual PC) Be careful allocating resources to virtual machines. You have the ability to allocate so many resources to the virtual machines that you crash the host machine. Networking can start acting "weird" on the host machine when Virtual Machines are running Converting to Virtualization Vendors of Virtualization software have "conversion" software that will convert an Operating System that installed on a Physical Computer into a Virtual Machine Many pieces of Backup Software no backup servers directly into a Virtual Machine. Final Thoughts... Be careful of licensing!!! Per Server/ Per Socket/ Per Core Virtualization software is stable, and not "cutting" or "bleeding" edge technology. Resources Xen Citrix VMWare VirtualBox Virtual PC
Views: 780627 Eli the Computer Guy