2. Right click the local area connections > Properties.
3. Go to Internet Protocol TCP/IP and click properties
4. Click on “Use the Following IP address” and change the IP address as you need.
In the same way you can assign the IP address, subnet mask, DNS and gateway settings.
A user profile contains the My documents, desktop settings, cookies and favorites etc. when a user log on first time, the Windows automatically create a profile in this path %SystemDrive%\Documents and Settings folder. By default the owner of the profile is having the full control and access permissions on the profile. The following default naming scheme of the Windows modifies the name of the folders to avoid duplicating the original name of the folder.
If the username folder does not exist the new profile folder name will be:
If the username folder already exists then the user profile folder name will be:
If the username.computername folder already exists then the profile folder name will be
1. Log on as an Administrator.
2. Copy all the My documents files and files from the desktop from the corrupted folder and paste all the files to a new location.
Please note when you log on as an administrator, you will be able to access all the folders including the corrupted user profile folder because by default Administrators have full access to all the resources. You can also give full access of the user profile folder to anyone by the following method.
1. Open my computer
2. Open on C Drive
3. Double click on Documents and settings. (By default all the profiles are saved in this location and you can change the default location of the profiles.
4. Right click on any profile name and then click on properties.
5. On the security tab click on the user profile and click to select allow full control permissions.
How to Setup TCP/IP Filtering in Windows 2000
TCP/IP filtering method in Windows 2000 allows you to control the inbound access to the computer and network. TCP/IP is available in all Windows based operating systems that have installed TCP/IP. TCP/IP works in the kernel mode and it’s important from the security point of view. Some other methods of controlling the inbound access are IPsec policy and routing and remote access. You can configure TCP/IP filtering by the following method.
1. Start > Settings > Control Panel > Network and double click on Network and dialup connections.
2. Right click on any LAN/WAN connection icon on which you want to set TCP/IP filtering.
3. Go to Internet Protocols (TCP/IP) and then click properties tab.
4. Next click Advance tab.
5. Click properties on the TCP/IP filtering.
6. Select the enable TCP/IP filtering.
7. Here you have two options Permit all and Permit only and you can apply the filter on TCP, UDP and IP addresses. You have to apply the filters to all the network adapters individually.
TCP/IP filtering only controls the inbound traffic and if you want to control the outbound traffic then use IPSec Policies or packet filtering.
How to Block/Deny Access to Local Administrator Accounts in Windows 2000
In Windows 2000, the built in accounts cannot be disabled but access to these accounts can be denied and modified.
1. Log on as Administrator.
2. Start > Program Files > Administrative Tools > Local Security Policy
3. In the left side, expand the local security policy and then click the “User Rights Assignments”.
4. In right side, double click “deny access to this computer from network”
5. Click add in the local security policy settings.
6. In the users and group box click and administrator accounts and click add.
7. Click ok and close all the windows. Your settings will be implemented after you restart the computer.
Please note that this method is only applicable to the local administrator accounts and not the domain administrator accounts.
How to apply security Templates in Windows 2000
There are several predefined templates in Windows 2000 Professional and Server to increase the security of the computer. The security templates are text files and can be edited in the notepad. Normally, there are four types of the security templates such as basic, secure, high secure and miscellaneous. By using the security configuration and analysis you can apply these templates.
1. Type MMC (Microsoft Management Console) at the command prompt.
2. Go the File menu and click on Add/Remove snap-in.
3. Click add and then click security configurations and analysis and then click again add.
4. Right click on the security configuration and analysis to create a new security database.
5. Type the name of the database and click open
6. In the import template box, click the security template that you wish to apply and click open.
7. Right click the Security configurations and analysis and click configure computer now.
You can make the changes in the security templates, save templates with the different names and then import them to the database.
How to Configure Hibernation in Windows 2000
When a computer enters in the hibernation state, the snapshot of the memory contents, computer settings and open programs is taken and saved in the hard disk drive before the computer is turned off. All the documents, memory contents, settings are restored to its original state when a computer comes out of the hibernation. Following are the steps to configure the hibernation in Windows 2000.
1. Click start > Settings > Control Panel > Double Click Power options.
2. Click on the hibernation tab.
3. Select the enable hibernation support check box and click the power scheme tab.
4. In the System Hibernate tab, specify the period of time, in which compute remains inactive before entering the hibernate state.
Please note that your computer’s BIOS should support the hibernation options and you must be logged on as a administrator to apply hibernation settings. Hibernation should not be configured for the servers because servers have to be available all the time.