Alibabacloud.com offers a wide variety of articles about antivirus for windows 2000 server, easily find your antivirus for windows 2000 server information here online.
Solution for remote connection to SQL Server 2000 Server
a look at ping server IP can ping through.
This actually looks at whether the physical connection to the remote SQL Server 2000 Serve
Server| Raiders
to Beginners: (old bird will be free to see, don't laugh!) )
for users who have used SQL SERVER 2000, it is generally known that the version and the previous version of the larger difference between the system is also more picky, for the installation is indeed relatively simple, but often have to install the loser, in the forum to see a lot o
Server, see "Log on" in SQL Server 2000 online books.To make the description clear and easy to understand, the benchmark development and application platform used is Microsoft Windows? 2000 operating system and SQL Server
information about logging on to SQL Server, see the "Log On" section of the SQL Server 2000 online book.
To make the instructions clear, the baseline development and application platform used is Microsoft Windows? 2000 operating system and SQL
The common versions of SQL Server 2000 are as follows:
• Enterprise Edition (Enterprise Edition)
Supports all SQL Server 2000 features and can serve as a product database server for large Web sites, enterprise OLTP (online transaction processing), and data warehousing syst
In Microsoft's earlier Windows operating systems, we generally use proxy server software such as Wingate and Sygate for shared connections. Windows 2000 provides us with the Internet sharing feature, which is easier to use and easier to set. It is suitable for small office and home networks.
Setting up network sharing
GUID of GPO is listed by folder. Start ldp.exe from the support \ reskit \ netmgmt \ dstool folder of the retail Windows 2000 CD-ROM. On the connection menu, click Connect. Enter the server name, confirm that the port is set to 389, click the connectionless check box, and then click OK. Once the connection is complete, the data of the specific
Recently installed the server version of Windows 2000, when not installed Active Directory, access to Windows about 1.5 (my machine configuration is k6-2 64M memory hard disk is the West number of WD205BA). Because of DCOM, active Directory is installed. As a result, it took about 10 minutes to get into
As a network administrator, do you know what is happening on your host or server--who has visited it. What they have done. What is the purpose. What the. You don't know. In fact, Windows 2000 to provide us with a security audit function, we do administrator this line, the most need to be familiar with this function, otherwise you how to tube it. Security audits c
First, Introduction:
A security template is a new feature of Windows 2000. It is a physical representation of the security configuration, consisting of a file (. inf) of the security properties supported by Windows 2000. It organizes all existing security attributes into one location to simplify security management. Se
With the rapid development of the Internet and the increase of people's demand for mobile office, more and more people want to have remote access to the intranet within the company, and the remote access technology comes into being. Let's discuss how to implement the remote Access Service in a Windows 2000 network (remote Access Service-ras).
The remote Access service is a standard C/s mode (client/
Monitor and manage TCP/IP in Windows 2000 pro
Monitor and manage TCP/IP in Windows 2000 pro
Http://ct.techrepublic.com.com/clicks? C = 448961-55382566 brand = techrepublic Ds = 5 FS = 0
By Jim BoyceBy Jim BoyceTranslated by endurer 2005.09.13
Keywords:Operating systems | Windows
Oracle|window
How to Kill a single Oracle thread in a Windows 2000 environment
Source: http://metalink.oracle.com
Key word: Oracle Thread Kill
Description: This article describes the use of Orakill tools in Windows environments
Body:
Have you ever experienced anything like this? A user process that consumes resources for a long time without releasing it ca
when the system is not running. In the online use area, select the verification method used for online SQL Server. If you choose to use Windows Account Verification, you do not need to specify the user name or password, because Windows 2000 account will be used to verify access to SQL
Disk fragmentation is a process of reorganizing the data stored on the server's hard disk to make files more continuous and increase the speed of data access and retrieval. When you fragment a hard disk, you can improve disk performance and ensure that the servers in your organization, including those running Exchange 2000, are running smoothly and effectively. However, detailed disk fragmentation may cause performance problems, therefore, you may nee
The common versions of SQL Server 2000 are as follows:
• Enterprise Edition (Enterprise Edition)
Supports all SQL Server 2000 features and can serve as a product database server for large Web sites, enterprise OLTP (online transaction processing), and data warehousing system
Options command parameter to let SQL Server display all the options. To enable show advanced options, we use the following command format:
EXEC sp_configure ' show advanced options ', ' 1 ' reconfigure
To install an option, we must run the reconfigure command after using sp_configure to configure the server. The output of the above command is as follows:
Configuration option ' Show advanced options ' ch
Move Exchange 2000 to new hardware:
Complete backup of all Exchange 2000 storage groups and Site Replication Service (SRS) on an existing Exchange 2000 Server.
Take the existing Server offline.
Reset the Machine Account of the Exchange
Using ASP (Active Server page) to write personal web pages has become a dream of more and more personal web authors. ASP is a kind of web script language, its most important characteristic is database drive and dynamic interaction. The introduction of ASP will enable your personal site to have a strong data exchange and dynamic interaction capabilities.
Turn your personal computer into a personal Web server
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.