TechOnTip Weblog

Run book for Technocrats

Archive for December, 2009

Step by Step Guide to Windows 2008 R2 Installation

Posted by Brajesh Panda on December 31, 2009

Let me take you through a basic installation guide for Windows 2008 R2. For this documentation I have used a full blown Windows 2008 R2 Hyper-V box. In this Hyper-V box I have some other couple of test machines. Now I have created a Hyper-V Virtual Machine with 2GB of RAM & 127GB Expandable Virtual IDE Hard Drive.

If you are thinking to install Windows 2008 R2 Server on a physical machine like Dell, HP & IBM you can ignore Hyper-V stuff. However you may have to use OEM Server Build DVD to boot up your server to kick off the installation. OEM DVD software usually asks you to insert the OS DVD at the right time.

Okay… Let’s start our virtual machine. I am booting up my virtual machine from a Windows 2008 R2 ISO file. Here is the VM Booting Screen!

Read the rest of this entry »


Posted in WindowsServer | Tagged: , , | 2 Comments »

Configure Windows Network Load Balance (NLB)

Posted by Brajesh Panda on December 31, 2009

People used to keep me asking about “how to configure NLB for web servers?”. I will be releasing my step by step guide for the same. But for time being you can refer to a very good article over here. (

Here are some merits & demerits of Windows network load balancer & hardware load balancer!

Point 1:

WNLB:  broadcast the request to all the servers in the cluster and one of the servers says I receive it.

So Server must be connected to a network switch which allows Broadcast (at least in the same subnet) like Layer 2 Switches.

So if your switch is a layer 3 switch your cluster will never work. To make this work issue you need to create a Layer 2 VLAN in your Layer 3 switch.

HLB: No worries like this in

 Point 2:

WNLB: is not application aware. Means even if application is already dead but server is live, it will still send packets to the server.

HLB: You can configure application verification (by teleneting to 80/443 port etc) to see if application is live or not. If application dead it will assume server is dead.

Point 3:

WNLB:  Network Card GUID issue. If you deploy virtual machine or ghost copies some time you may end up with same network card guid in registry & it create conflict in windows load balancing technique.

HLB:  No issues because virtual is bonded to network IP

Point 4:

WNLB: No Web Acceleration

HLB: Web Acceleration by Caching

Point 5:

WNLB: No SSL or other encryption offloading

HLB:  SSL Offloading  & other firewall/security level configuration can possible

Another Good Link:

Posted in NetworkLoadBalancing | 1 Comment »

Configure MD3000i Virtual Disk on your computer

Posted by Brajesh Panda on December 31, 2009

Before I start writing about this post, will like to put a caveat over here i.e. you must have configured basic things for this storage device to get it accessed from Network. Some of the bullet points look like as follows;

– IP Address Configuration for Storage Management Controllers

– IP Address configuration for iSCSI Controllers

To accomplish this task we may be flipping between storage box & our server for some time. Bear me with that.

Open up Storage Client after installation. It will up to scan to find out new arrays in the network. Select “Automatic” click “OK

– It will scan for some time. It will detect the array for management. Now you can manage the array from the same server too.
Read the rest of this entry »

Posted in DELL MD3000i, Storage | Tagged: , | 3 Comments »

Free Anti Virus – Microsoft Security Essentials

Posted by Brajesh Panda on December 30, 2009

Microsoft has released a FREE antivirus solution for home PCs – Microsoft Security Essentials. It provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. The software supports Windows XP SP2+, Vista and 7. Security Essentials is a free download from Microsoft that is simple to install, easy to use and always kept up to date so you can be assured your PC is protected by the latest technology.

Posted in Uncategorized | Tagged: | 4 Comments »

Install MD3000i Storage Client on your computer

Posted by Brajesh Panda on December 29, 2009

  • For detailed instruction please visit or Installation & Configuration Guide in the CD/DVD
  • Download MD3000i Resource CD from Dell Site
  • Start installation by double clicking “Setup.exe” in the same server where you like to configure a Storage LUN.
  • I assume you have already configured basic things in MD3000i like
    • Assigning IP Address to Management Controller
    • Assigning IP Address to iSCSI Controllers
  • Make sure your logon ID has Administrative permission to install software & it don’t have a “!” icon before your user account. I spent 2days to figure out why my installation is failing due to “!” before my user ID. They have a standard to put “!” before consultants Domain ID.

  • Click on “Install MD3000i Storage Software

Posted in DELL MD3000i, Storage | Tagged: | 2 Comments »

Sending Active Directory Domain Password Expiration Notification to End Users

Posted by Brajesh Panda on December 27, 2009

Did you ever noticed some users always called you up that they can’t access Corporate Applications using their AD User Account? Probably their account may be get locked down or got expired!

If account was locked out we can see from ADUC console. But if it was expired no way you come to know that password has been expired! Microsoft has some interesting tool kit for this kind of troubleshooting i.e. Account Lockout Management Tools. Refer to next posting about this.

If account was expired we used to reset their password. Sometime after investigation we usually came to know these users are not logging into corporate domain. So they didn’t receive any kind of notification that their password is going to expire in so many days. By the way there is no in built notification facility available in Windows Infrastructure for this kind of users.

So now we have the requirement; we can achieve this using a customized VB Script which will scan remaining days for password expiration & will send out a sweet message(mail) to these users. For troubleshooting purpose we have to generate some kind of logs that to which users our application is sending notification.
Read the rest of this entry »

Posted in VBScripting | Tagged: , , , | 12 Comments »

Reality Check – Google Vs Bing

Posted by Brajesh Panda on December 25, 2009

Google Vs Bing

I think Bing have to go a long way to stand against Google! Today I was searching MS CRM 4.0 Update 5 to install in my lab. 1st tried searching in Bing, result is ZZZZZZZZZZZ. But Mr. Google did in a single shot, even Yahoo…

I hope MS will do a reality check regarding this product. At least they should able to point to their own products!!

Wake up guys.. wake up!!

Posted in Uncategorized | Tagged: , , , | 1 Comment »

Cloud Computing

Posted by Brajesh Panda on December 25, 2009

Way Back

Are we shifting to old days of technology?

Are we taking a backward step towards old days computing?

I think yes but in a refined manner. Today we are consolidating our computing infrastructure back to a Centralized Model, merely converting our commodity computers to a Thin Terminal. Remember those old computing era with a dump terminal telenting to a huge UNIX machine.
In current days computing has been commoditized brining more power in Server Computing and Home Computers. However in same time it increased the management & environment nightmares; of course CAPEX is also bringing a kind of stagnancy to the modern era computing. In the same time Service Oriented Architecture pushing the whole industry to adopt a refined modern era computing system called Cloud Computing!!

Although cloud computing is an emerging field of computer science, the idea has been around for a few years. However it still confuses most of technocrats to define it clearly. Cloud science is more similar to legacy Grid Technology which is based on parallel processing.

Let me try to keep it simple
Cloud computing is a way to deliver services rather than applications which is completely independent of underlying platform, infrastructure hardware & location. It is called could because services exist in a cloud of computers or servers which provide better resilience and on demand supercomputing capacity. These computers can be located in a same place or different place connected with private link circuit or public internet. Cloud computing can be used for;
Infrastructure as a service (Joynet, Amazon EC2, Nirvanix)
Platform as a service (Google Apps)
Software as a service (
Application, Data, Storage as Service

Read the rest of this entry »

Posted in Amazon EC2, CloudComputing, Hyper-V, SAAS, Software as a service | Tagged: , , , , , | 2 Comments »

%d bloggers like this: