Windows 2012 Hosting - MVC 6 and SQL 2014 BLOG

Tutorial and Articles about Windows Hosting, SQL Hosting, MVC Hosting, and Silverlight Hosting

Windows Hosting - ASPHostPortal.com :: Demystifying the Windows Registry

clock October 10, 2016 19:40 by author Armend

Demystifying the Windows Registry

The registry is a key component of the Windows operating system. It is so important, that without it, Windows would not even run. When a new piece of hardware or software is installed in Windows, it stores its configuration into the Registry. This allows Windows to retrieve that information at later dates such as when it is starting up. As Windows starts it will read the configuration in the registry and know what drivers need to be loaded, what settings to be applied, and what resources need to be allocated in order for this equipment to work. Because this information is stored in the Registry on your hard drive, Windows has this information available each time it boots up.

The registry, though, is not only for operating system settings. User preferences and application settings are stored in the Registry as well. When you change your desktop background or screen saver, these details are stored in the Registry. Now when you shutdown Windows and start it up again at a later date, your preferences are available and loaded automatically. Application settings such as what directory you would like to download files to or what your default font is in a word processor are stored here as well. As you can see the Registry contains information that is not only vital to the use of the operating system, but also essential in allowing you to customize Windows to your particular tastes.

Structure of the Registry

The Registry is a hierarchical structure similar to what you see when looking at a directory/file tree on your computer. You have a main key, or Hive, with Keys, Subkeys and then Values. Each of these are discussed below:
Hives - Hives are the top most portions of the hierarchical data tree with each Hive containing a certain category of information. For example one Hive may contain the configuration that applies to the particular user logged on, while another Hive will contain information about the hardware installed in the computer. Depending on the version Windows that you are running there will be 5 or 6 different hives. Below we have outlined the 6 possible hives:

  • HKEY_CURRENT_USER (HKCU) -
        This Hive contains the preferences and configuration for the particular user who is currently logged in. If a different user is logged onto the same machine, then the information in this Hive would change corresponding to that particular user's configuration.
  • HKEY_LOCAL_MACHINE (HKLM) -
        This Hive contains the configuration for the actual computer. The information in this Hive remains the same regardless of the user currently logged on.
  • HKEY_CLASSES_ROOT (HKCR) -
        This Hive contains the information which pertains to the core user interface such as file associations and shortcuts.
  • HKEY_USERS (HKU) -
        This Hive contains the user information for all the users that have ever logged onto this computer.
  • HKEY_CURRENT_CONFIG (HKCC) -
        This Hive contains the information about current hardware configuration. This Hive is linked to the HKLM Hive.
  • HKEY_DYN_DATA (HKDD) -
    This Hive is found only on Windows 95/98/ME. It contains information about hardware Plug and Play. This Hive is linked to the HKLM Hive.
  • Keys - Keys are an organizational unit in the Registry. Keys are containers that can either contain values or further subkeys. Subkeys themselves, can contain further subkeys. Keys are similar to folders in that they can contain further subkeys or the file, or what we call values in the Registry.
  • Values - Values contain the actual data that is being stored in a Key or a Subkey. There are quite a few different types of values that can be stored in the Registry, but the most common that you will see are binary, strings, and DWORD values.
    When visualizing the Registry you should look at the Hives, Keys, and Subkeys as the path that you will need to navigate in order to reach the final stored information which is the Value.

An example Registry key can be seen below. This Registry key controls what your initial start page will be when using Internet Explorer.

HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\\Start Page

When we break this Key down to its components we can see the following:

HKEY_CURRENT_USER is the Hive that this key is associated with.
Software is a Key
Microsoft - This is a Subkey
Internet Explorer - This is a Subkey
Main - This is a Subkey
Start Page - This is the Value that the actual data is stored in. For this particular Value, the data will be the start page that you want Internet Explorer to use.

Where the Registry is stored

The Registry itself is stored on your computer in certain files. Below we detail what files and their locations are used to store the Registry based upon the particular version of Windows.
For Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003, the Registry files are stored in the following directories:
%SYSTEMROOT%\System32\Config
%USERPROFILE%\ntuser.dat

The names for the registry files are:

Sam, Sam.log, Sam.sav
Security, Security.log, Security.sav
Software, Software.log, Software.sav
System, System.alt, System.log, System.sav
System, System.alt, System.log, System.sav, Ntuser.dat, Ntuser.dat.log
Default, Default.log, Default.sav
For Windows 98, the registry files are named User.dat and System.dat and are stored in the C:\Windows directory.
For Windows Millennium Edition, the registry files are named Classes.dat, User.dat, and System.dat and are stored in the C:\Windows directory.

How to edit the Registry

In order to modify values in the Registry you need to use a program called a Registry Editor. Windows comes with a program called regedit.exe or otherwise known as Registry Editor. To launch this program you should click on the Start button, then click on the Run option, and in the field type regedit.exe and press the OK button. This will launch the Registry Editor.
When you open Registry Editor you will see two panes. The left pane is your navigation pane. By default it will list all the Hives with a + or - next to each one. You can click the + to expand the tree underneath that Hive revealing Keys and Subkeys. You would keep navigating the Subkeys until you reach the desired location and then click on it once to highlight it. Then you will see in the right pane a listing of the values associated with that key.
In the screenshow below you will see an image of the Registry Editor where I have navigated to the key:

HKEY_CURRENT_USER\Control Panel\Colors

In Figure 1 above, the Hive that we are in is HKEY_CURRENT_USER. They Key is Control Panel and the Subkey is Colors. The right hand portion shows all the Values contained in the subkey Colors.
To modify a Value, you would double-click on the value name and a screen similar to Figure 2 below would appear.

You then would type in the appropriate information into the Value data field and press the OK button.
To delete values, instead of double-clicking on a value name you would right-click on the value and then select Delete. This method can also be used to delete keys or subkeys. To add a value you click on the Edit menu option and then select New and pick the appropriate type.
It is also possible to export and import Registry values into your Registry. To export a particular Key or Subkey you would click once on the key you would like to export and then click on File and then Export. Then select a directory and filename to export the Registry key to. Likewise, you can also Import keys into the Registry by clicking on Import and then selecting the file that you had exported previously.

Backing up the Registry

Viruses, Spyware, and other Malware can cause corruption and damage to the Registry. With this in mind, it is important to backup your registry so that you know you have a clean copy stored safely on your hard drive in case of an emergency. Below we have outlined the steps to backup and restore your Registry under the various versions of Windows.

Backing Up the Windows 95 Registry

  • Reboot your computer and when you see "Starting Windows 95" press the F8 key. Then choose Safe Mode Command Prompt Only from the startup menu and press enter.
  • At the command prompt type the following lines, pressing ENTER on your keyboard after each line:
  • cd \windows

attrib -r -h -s system.dat
attrib -r -h -s user.dat
copy system.dat *.bak
copy user.dat *.bak

WARNING: These steps make the assumption that you do not have any files named system.bak or user.bak. If you do have files with these names, change the extension in the steps above to something else.

  • Restart your computer.

Restoring the Windows 95 Registry

  • Reboot your computer and when you see "Starting Windows 95" press the F8 key. Then choose Safe Mode Command Prompt Only from the startup menu and press enter.
  • At the command prompt type the following lines, pressing ENTER on your keyboard after each line:

    cd windows
    attrib -r -h -s system.dat
    attrib -r -h -s system.da0
    attrib -r -h -s user.dat
    attrib -r -h -s user.da0
    ren system.dat system.daa
    ren system.da0 system.da1
    ren user.dat user.daa
    ren user.da0 user.da1
    copy system.bak system.dat
    copy user.bak user.dat

WARNING : This will restore the previous backup that you had made. If you had chosen an extension other than .bak when you had backed up the Registry previously, then substitute that extension above.

Restart your computer.

Backing Up the Windows 98/ME Registry

  • Click the Start button, then click Run.
  • Type scanregw in the field and press the OK button.
  • When the program has finished scanning the Registry for errors it will ask if you would like to back up the Registry.
  • Click the Yes prompt and the program will create the backup.
  • When it is completed, press the OK button.

Restoring the Windows 98/ME Registry

  • For Win98, reboot your computer and press and hold the CTRL button. Then choose Safe Mode Command Prompt Only from the startup menu and press enter. For Windows ME, start your computer with a startup disk and select Start Computer without CD-ROM Support.
  • You will now be at a command prompt. Type c:\windows\command\scanreg /restore and press enter on your keyboard. A screen will will appear with a list of the previous Registry backups sorted by date. Using the arrow keys, select the Registry backup you would like to restore and press enter. A known previously working Registry backup will have the word Started next to the date.
  • Scanreg will now restore the Registry and check it for errors. When it is done you will receive confirmation and you should now press enter to reboot your computer. If you had booted your computer with a floppy, please remove the floppy first before rebooting.

Backing Up the Windows XP/2000/2003 Registry

  • Click on Start, then All Programs, then Accessories, then System Tools, and then click on Backup. If you do not see the Backup utility you will need to install it using your XP or 2003 CD.
  • When the program launches, if you are not in the wizard, select the Backup Wizard Option.
  • When the Wizard opens press the Next button.
  • Select "Only back up the System State Data". Keep pressing next until you see Finish.
  • Press the Finish button to start the Registry backup.
  • When it is completed you will see a report of the backup. You can then press the Close button and then exit the program.

Restoring the Windows XP/2000/2003 Registry

Option 1:

  • Click on Start, then All Programs, then Accessories, then System Tools, and then click on Backup. If you do not see the Backup utility you will need to install it using your XP or 2003 CD.
  • When the program launches, if you are not in the wizard, select the Backup Wizard Option.
  • When the Wizard opens press the Next button.
  • This screen will list all the known backups that were done previously. Select the System State backup that you would like restored.
  • Press the next button and then the Finish button.
  • When it is completed you will see a report of the backup. You can then press the Close button and then exit the program.

Option 2 (Only for XP and 2003):

  • Insert your Windows CD into your computer and reboot.
  • When it prompts you to "Press Any Key to Boot from CD", press any key.
  • When the screen appears that gives you the options to Setup, Repair or Quit, press R on your keyboard to enter repair mode.
  • At the next screen select the installation of windows you would like to work on. For most people there will be only one option.
  • When prompted enter your administrator password and press enter on your keyboard.
  • When you get the prompt, type cd repair to enter the directory where a Registry backups is stored.
  • Type the following lines, pressing enter on your keyboard after each line:

    copy default c:\windows\system32\config
    copy sam c:\windows\system32\config
    copy security c:\windows\system32\config
    copy software c:\windows\system32\config
    copy system c:\windows\system32\config

NOTE: If it prompts you to overwrite the existing files, select Y for yes.

  •     When you are finished, type exit and press enter.
  •     Remove your Windows CD and reboot.

Conclusion

Understanding and knowing how to backup the Registry is an important part of keeping your computer secure and running efficiently. It must be stressed that modifying any portion of the Registry should be done with the utmost care as incorrect usage of the Registry could make your computer inoperable.

Best Windows Server 2012 Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2012. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2012 Hosting, we should be your best choice.



Windows Hosting - ASPHostPortal.com :: How To Fix Windows Script Host access is disabled on this machine

clock October 3, 2016 19:58 by author Armend

How To Fix Windows Script Host access is disabled on this machine

If you receive this Windows Script Host access is disabled on this machine, Contact your administrator for details message box, on your Windows 10/8/7 computer, then this post may interest you. Today we will see how you can enable or disable Windows Script Host.

Windows Script Host access is disabled on this machine

Windows Script Host or WSH, is a Microsoft technology that provides scripting abilities like batch files, but includes many more features. Such Scripts can be run directly from the desktop by double-clicking a script file, or from a command prompt. It can be run from either the protected-mode Windows-based host wscript.exe, or the real-mode command shell-based host cscript.exe.
Several “HTML malware” have been reported to use WSH objects as a result of which, those who do not require this feature, tend to disable it. But disabling WSH, will prevent users from running any scripts, including VBScript and JScript scripts, that rely on this technology – and some software may require this feature to be enabled.

Enable, disable Windows Script Host

To enable or disable Windows Script Host, type regedit.exe in Run box and hit Enter to open the Registry Editor.
Navigate to the following key:


    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Script Host\Settings

 

In the right panel, you will see Enabled. If you see the entry 0, it means that the Windows Script Host access is disabled on your Windows machine.

Double Click on it and give it Value Data 1 to enable it.

  •     A value of 1 will enable Windows Script Host
  •     A value of 0 will disable Windows Script Host.

Click on OK and exit the Registry. If you don’t see this entry, then you may need to create it, as it does not exist by default in Windows.
You will now, no longer receive the Windows Script Host access is disabled on this machine.

 

ASPHostPortal.com

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest SilverLight hosting, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2008. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2008 Hosting, we should be your best choice.

 

Save



Windows Hosting - ASPHostPortal.com :: Easy tips to protect your Windows from hackers and malware

clock September 26, 2016 20:20 by author Armend

Easy tips to protect your WIndows PC from hackers and malware

In the news recently there have been some high-profile security scares for computer users. Common sense alone isn’t enough to protect your Windows PC from malware – malicious software that disrupts your computer’s operations or gathers sensitive information about your online behaviour.
Hackers can attack your PC in so many different ways that employing several layers of anti-malware protection is the only way to keep your PC malware-free when it’s online.
Here are seven steps to protect your computer from Malware. Check out the video above to find out more.

Tip 1: Install, update and use anti-virus software

Installing antivirus software may sound like an obvious first step to protect against malware, but not everyone bothers to do it. With so many options now available, though, there really is no excuse. Microsoft offers its own free download in the form of Microsoft Security Essentials for Windows Vista and 7, while Windows 8/8.1 has Microsoft Defender built in.
Once installed, it’s vital to regularly update your anti-malware software’s database and run system scans at least once a month.

Tip 2: Keep Windows up to date

Hackers often discover new ways to bypass Windows’ built-in security features, which is why Microsoft issues small operating system updates every Tuesday and larger ‘service pack’ updates once or twice a year. These will be downloaded and installed automatically by Windows update, but only if this feature is properly configured.
To check that it’s working normally, type Windows Update in the Start menu search box in Windows Vista/7, or at the Start screen in Windows 8/8.1. Look on the left of the Windows Update window and click Change settings and use the drop-down list to check that Install updates automatically is selected - anything other than this risks a crucial update being missed.

Tip 3: Turn on the Windows firewall

Windows has a built-in ‘firewall’ that protects your PC from unwanted attention via the internet. This software firewall is enabled by default and works alongside any hardware firewall that’s built into your home broadband router. Check its settings by typing “check firewall” in the Start menu search box or on the Windows 8 Start screen and choosing Check firewall status from the results.
Two green tick marks mean the firewall is working normally, else you’ll need to select Turn Windows Firewall on or off on the left of the window and enable one or both options that appear.

Tip 4: Use the latest version of your web browser

Web browsers are vital applications, but just like other software, they can contain bugs. Hackers are quick to capitalise on these and create bogus (or infect genuine) web sites with data designed to exploit them. Once a web browser has been compromised in this way, a hacker can monitor everything you type, including passwords to credit card numbers. That’s why it’s vital to use the latest version of your web browser - anything other than this may be a security risk.
Microsoft includes updates for Internet Explorer. Search for Windows Update and check its optional updates section to ensure you’re also using the latest version of the application - which is Internet Explorer 11, if you’re using Windows Vista, 7 or 8/8.1.

Google Chrome and Mozilla Firefox will also update themselves automatically, but don’t ignore their requests to restart the browser when such an update has been downloaded and is ready to be installed.
Emails that appear to be from a recognisable online service asking you to log into a site to confirm some personal details are always fake. These emails are usually caught by your email application’s spam filter, but if one does slip through and you click its link, your web browser should detect and block the site it takes you to. This does depend on your web browser being aware of the fraudulent site, though, which is another good reason to always use the most recent version.

Tip 6: Use the Windows Malicious Software Removal Tool

If you suspect your PC has succumbed to malware and your anti-malware software doesn’t detect it, there are two steps to take.
The first is to download and run the Microsoft Malicious Software Removal Tool from the Windows Download Centre. This will detect and remove specific types of malware and is very simple to use, although it isn’t a replacement for a full anti-malware application.

Tip 7: Still infected? Use a boot CD.

Some malware can hide within Windows and make itself difficult to detect and remove. If your own anti-malware software and the Windows Malicious Software Removal Tool fail to shift it, you’ll need to download and burn a free anti-malware boot CD – refer to your computer’s manuals for instructions on how to boot from a CD as the process varies from manufacturer to manufacturer.

ASPHostPortal.com

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2008. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2008 Hosting, we should be your best choice.



Windows Hosting - ASPHostPortal.com :: How to find the License Agreement for the Installed version of Windows

clock September 19, 2016 19:31 by author Armend

How to find the License Agreement for the Installed version of Windows

When you install Windows, you are shown the Windows license agreement that provides all the legal language about what you can and cannot do with Windows and the responsibilities of Microsoft. Recently I wanted to read the license agreement again for Windows and I surprisingly found it difficult to find it.
With that said, I put together this guide to show how you can find the license agreements for all editions of your currently installed Windows version and read it.
The first step is to identify the version of Windows currently installed on your computer. If you already know what version of Windows you are using, you can skip here. Otherwise, in Windows 7 and Windows 8, you can left-click on the Start Menu, then right-click on Computer, and then select Properties. For Windows 10, right-click on the Start Menu and then left-click on the System option.
You will now be shown the System control panel that provides information on what version of Windows you are running as shown below.

As you can see from the above image, I have Windows 7 Ultimate installed on my computer.
Now that we know what version of Windows we are running we can open the folder that contains all of the license agreements for this version of Windows. To do this, click on the Windows (Windows Key) key, and while holding it down, click on the R key to open the Run dialog as shown below.

When the Run dialog box opens, you want to paste the following into the Open: field so that it looks like the image above

  •     c:\windows\system32\en-US\Licenses\_Default

When ready, press the OK button and a folder will open that shows individual subfolders for every edition of the Windows version installed on your computer. Each of these folders contain the respective license agreement for that version of Windows.


Scroll through the list of folders and double-click on the one that corresponds to the edition of Windows that is installed on your computer. When the folder opens, it will contain a single file called license.rtf. This file is the license agreement for your version of Windows and you can double-click on it to view it in Wordpad or Word, if it is installed.

 

You can now read the agreement, print it, or email it as needed.

ASPHostPortal.com

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2008. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2008 Hosting, we should be your best choice.

 

 

 

 



SQL 2014 Hosting - ASPHostPortal :: Make Your SSAS Works Like a Private Jet!

clock December 10, 2015 19:54 by author Jervis

SQL Server Analysis Services (SSAS) Tabular is a popular choice as an analytical engine for many customers. With its state-of-the-art compression algorithms, multi-threaded query processor and in-memory capabilities, SSAS Tabular can provide super quick access to data by reporting client applications. However, as a consultant, I have been called by many clients to resolve slow query performance when accessing data from SSAS Tabular models. My experiences have taught me most, if not all, of the performance issues can be resolved by taking care of the following five subject areas. 

Estimate Current Size and Growth Carefully

Tabular models compress data really well and on an average, you can expect to see 10x the compression rates (though it can be much more or less depending on the cardinality of your data). However, when you are estimating the size of your model as well as future growth, a rough figure like this is not going to be optimal. If you already have data sitting in a data warehouse, import a subset of that data — say a month — to find the model size for that and then extrapolate the value based on the required number of rows / years as well as the number of columns. If not, try to at least get a subset of the data from the source to find the model size. There are tools like BISM Memory Report and Vertipaq Analyzer that can further help in this process.

It is also important to record the number of users who will be accessing the system currently as well as the estimated growth for the number of users.

Select or Upgrade Hardware Appropriately

Everyone knows SSAS Tabular is a memory intensive application, and one major issue I have seen is only the RAM is considered when hardware selections are made. However, just focusing on the RAM is not enough and there are a lot of other variables. Suppose all the other variables are constant and there is an unlimited budget, these are the recommendations:

CPU Speed – The faster, the better, will help in computing results faster especially when there is a bottleneck on the single-threaded formula engine.

CPU Cores – In theory, the more the better as it helps in managing concurrent user loads. However, in reality, a rise in the number of cores usually corresponds to a decrease in the CPU speed due to management overload. So a balanced approach has to be taken when determining the CPU Cores and Speed. Also, licensing cost increases with the number of cores for many software.

CPU Sockets – The lesser, the better as SSAS Tabular is not NUMA aware till SQL 2014. However, this is expected to change in SQL 2016 where some NUMA optimization has been made. For large tabular models, it might be a challenge to go single socket as the amount of RAM that can be supported on a system will depend on the CPU sockets.

CPU Cache – The more, the better. Retrieving data from CPU caches are 10-100x faster than retrieving data from RAM.

CPU Architecture – The newer, the better due to the hardware performance optimizations. For eg, Intel Xeon processors with Haswell architecture is always going to be faster than Sandy architecture keeping all other variables constant.

Amount of RAM – Should have at least 2.5x the model size, if the model is going to be processed on the same server. The amount of RAM can be lesser in cases of certain scale out architectures where the model is processed in a separate server.

RAM Speed – The faster, the better (yes, RAMs have speed too!) This is very important for a memory-bound application like Tabular and should always go for the faster speeds, if budget allows.

Storage – Not important at all as it does not have any effect on query performance. However, if budget allows, it might not be a bad idea to get faster storage like SSDs, as that will help in maintenance related activities like backup, storage or even getting the tabular model online faster when the service is restarted. Apart from this, there are other factors also like network latency, server architecture (scale out), etc that have to be considered, but depending on the budget and specific customer requirements, a balanced approach will have to be made.

Design the Data Model Properly

Tabular is really good at performance and in the case of small models, is extremely forgiving in terms of bad design. However, when the amount of data grows, performance problems begin to show up. In theory, you will get the best performance in SSAS tabular if the entire data is flattened into a single table. However, in reality, this would translate to an extremely bad user experience as well as a lengthy and expensive ETL process. So the best practice is to have a star schema, generally. Also, it is recommended to only include the relevant columns from the source tables, as increasing the columns will result in an increase in model size which in turn will result in slower query performances. Increase in number of rows might still be ok as long as the cardinality of the columns don’t change much.

Depending on the specific customer requirements, there could be deviations from the best practices. For e.g., we built custom aggregate tables along with the detailed fact table in the case of a very large production model for a client. The resultant measure had a conditional statement to retrieve data from the aggregate table if the detailed level dimension data was not used in the report. Since the aggregate table was only 1/10 the size of the detailed fact table, the query came out 10x times faster whenever the details were not used, which was almost 90% of the times.

Optimize the DAX Calculations

In case of small models, Tabular is extremely forgiving in terms of bad DAX code also. However, just like in the case of bad design, performance takes a hit for the worse as you increase the data, add more users, or run complex queries. DAX performance tuning is the most difficult to tune from the current list, and it is important to have a strategy for maintaining and tuning the performance. A good place to start would be the Performance Tuning of Tabular models in SSAS 2012 whitepaper.

Monitor User Query Patterns and Train Users

Once your model is in production, it is important to keep monitoring the user query patterns as well as the resources to see potential bottlenecks. Through this, you can find whether the performance issues are being caused due to inefficient DAX, bad design, insufficient resources or most importantly, whether it is just because a user is using the model inefficiently. For e.g., in one of the cases, we found out the slow performance for all users was due to a single user dumping the entire 100 GB model into spreadsheets so he could perform custom calculations on top of it. This blocked the queries for all the other users and made things really slow for them. With appropriate requirement gatherings, we ensured all the required calculations for that user were there in the model and then trained the user to use the model for his analytics.

The success of any tabular project depends on the adoption by the end users and it is needless to say the adoption would be much better if the system is fast. These 5 tips will ensure you already have a jumpstart on that journey.

Looking to Use SQL Server Analysis Services Hosting?

As this is intermediate service, you can get this SQL Server Analysis Services on our Windows Dedicated server plan. You can start from our Bundled Cloud Platinum Class to get this service running on your server. This plan has included

- Windows Server 2008/2012 license
- 2 x 2.0 Ghz Core
- 4 GB RAM --> FREE Upgrade to 8 GB RAM (Use Promo Code ‘DOUBLERAM’)
- 2 x 500 GB Storage
- 20000 GB Bandwith
- 1000 Mbps Connection speed
- 4 Static IP
- Full 24 x 7 RDP Access
- Full 24/7 Firewall Protection
- Standard ver. SQL 2008/2012
- Support MySQL db
- PLESK Control Panel
- Antivirus
- Unlimited of MSSQL dbs
- Unlimited of MySQL dbs
- FREE SmarterMail service if you register this December

Get a HUGE discount for this Christmas!! For more information, please visit our official site at http://www.asphostportal.com.



Windows Hosting - ASPHostPortal.com :: Which is better Online Or Offline Windows Server Backup?

clock June 25, 2015 06:23 by author Dan

The backup can also be initiated with certain scheduled activities or based mostly on time. A very good support will provide a total answer alongside with round the clock guidance and remote management functionalities. Knowledge forms the core of any company, and windows server backup plays a essential position in securing your data in the experience of all hazards and offers seamless recoverability following a catastrophe.

Backing up server (computer systems, numerous server plans and other apps) is essential in purchase to keep organization continuity. And offered the wants and scope of the IT nowadays, remote server backup for digital setup is getting to be increasingly crucial. Companies are deploying virtual servers into their IT atmosphere and so it is crucial to style and employ a disaster restoration prepare for digital setting.

Remote server backup equipment for digital surroundings

There are many choices accessible in the market place when it will come to backing up virtual servers, but when picking a 3rd party resource for distant server backup, it is essential o choose a instrument which can differentiate among a physical and virtualized atmosphere. A digital equipment (VM) exists as an picture file on a bodily server, housing the OS with configuration options, programs and the corresponding info. Say if a VM file is allotted 200GB on the difficult travel and only 100GB is utilized, the digital server backup will identify it as a VM file and will back again up only that 100GB of information in distinction to a standard backup instrument, which would back again it up as a 200GB file.

Assigning storage place for distant server backup (digital server)

Even though a virtual server setting may possibly have a storage area community (SAN) keeping the VM documents, it is advisable to execute disk-to-disk backup to economical storage disks. Digital server backup resources consider a level-in-time snapshot of the VM impression and only the changes manufactured in the original are stored in the backup copy. Consequently it is observed that storage needs for virtual backup would not increase substantially above the time period and receiving more disks would not confirm to be an high-priced affair. Nevertheless it should be remembered that deploying a SAN just for virtual server backup can be high-priced. Additionally introducing far more disks to fulfill the mounting storage calls for can additional incorporate to the costs.

Computing and networking prerequisite for remote server backup (in scenario of digital server)

In circumstance of a digital server backup that creates a backup VM, the adjustments produced to the first are synchronized with the backup duplicate. As a result it is important that you 1st decide the methods needed to take care of peak workloads throughout all VMs and then boost CPU allocation so that backups do not consume into the methods allocated to apps. Not like the bodily servers, every single of which is offered a committed network interface card (NIC) for I/O functions, I/O from all VMs is envisioned to use a one NIC creating an I/O bottleneck. For that reason determine the total I/O throughput necessity for backing up VMs and if it is discovered to be on the greater aspect go with SAN-based mostly digital backup that can assistance great LAN pace.

Best Windows Shared Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Our Shared Hosting. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows Shared Hosting, we should be your best choice.



WIndows Hosting - ASPHostPortal.com :: Windows Server Hosting Regarding Superior Productivity

clock June 5, 2015 06:22 by author Dan

Windows server is a chain of operating systems. Windows server can be used on business desktop, laptop, computers and servers. It is a widely acknowledged popular server operating system program. It is known for its ability under different application settings. Windows Server hosting bestows many benefits on the end user organization.

Anytime Anywhere Accessibility and Cost-Effective Solution

Using hosted dedicated Windows Server software ensures lot of time and capital saving. Windows Server hosting service provider enables users to access the hosted data at any time from any place. Users of a cloud computing and application hosting service provider only need an Internet connected device such as a laptop or personal computer or an iPhone, etc. This feature provides ease to the user.

It also allows multiple authorized users to access data simultaneously without any trouble. With this feature you can be far away from each other and still work together without any trouble. It improves collaboration between team members and enhances the ultimate output.

Reliable and Scalable

Windows Server host offers a scalable environment so that variations in business demands can be managed with no trouble. This helps user to save resources and improve return on investment. A cloud hosting service vendor provides high quality data center facilities for storing data. The data centers are situated at regions free from the risk of natural calamities. These data centers are well equipped with all the security tools required to keep the data safe.

Windows Server on Cloud Offers Acute Data Security

Windows Server hosting service providers host software via cloud computing technology, they deploy sophisticated security tools and technologies such as superb robust firewalls, top-notch antispyware, ultra sensitive antivirus software and much more. Windows Dedicated Server hosting service vendor also makes use of burglar and threat detection system, round the clock network checking, etc. The data centers are well equipped with highest possible standards.

The architecture of the threat discovery system provides a novel way of intrusion detection. It moves from identifying attacks to detecting threats and their properties. The architecture provides elasticity to the system so that it can be modified according to different environments. It is also able to use third party components when offered. The intrusion detection system detects the attacks on a network. Each attack is indicated by a warning that is forwarded to the threat classifier for further handling. There are many intrusion detection systems available such as Modsecurity, Snort, Bro, and OSSEC.

OSSEC is an open source and host based IDS. It executes log analysis, file integrity inspection, windows registry monitoring, real time alerting, rootkit detection, and active response. It runs on various operating systems, including AIX, Linux, MacOS, Solaris, HP-UX, and Windows operating system.

Technical Support Services

A cloud hosting service provider which offers Windows server Hosting solution provides round the clock support services to its users. The technical support service is generally free of cost. In case of any problem or query users can contact the certified technical experts and get their issue resolved. This feature eliminates the requirement of hiring in-house IT staff.

Rolling Data Backup

Users of cloud computing service provider get thirty days of rolling data backups. So users with Windows server hosting services don’t have to worry about data storage. If data gets lost or damaged then it can be easily retrieved via host’s server.

Best Windows Shared Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Our Shared Hosting. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows Shared Hosting, we should be your best choice.



Windows Shared Hosting - ASPHostPortal.com :: Right Solution For Small Business

clock May 29, 2015 06:39 by author Dan

Today the vast reach and popularity of internet has forced most of the businessman to use it as a strong medium for promotion and increasing the sale of their products and services globally. Since windows is the most popular OS in the world, and has captured more than half of the world's market, Windows Hosting is widely in demand. Such type of web service is compatible on both dedicated servers as well as shared hosting.

The user-friendly nature and simple working of Windows has made hosting highly affordable, reliable, worthy and feature rich. Sites that are created using different Microsoft applications and scripts can only be hosted on Windows servers. The corporate hosting for small and medium enterprises is ideally done on shared web servers whereas for large organizations dedicated servers will be the best. The streamlined working of MS system allows SQL, ASP and other similar scripts to run easily on dedicated and shared web hosting services.

A professional, eye-catching web site can effectively increase the sales and services of organization. Any growing company would like to get a state of the art website to promote its business in the best possible manner, but at the most reasonable price. And since Microsoft provides the best and simple developing platform, the site designed using MS specific resources are highly customized and attractive.

In order to be on web, one needs to host the site either using dedicated server or shared web server. But as compare to dedicated web hosting, shared one is economical and a good choice for firms having limited budget to spend on hosting their business site. Shared hosting done on windows platform stands for a web-hosting service in which one server is inhabited by many websites. Connected to the Internet, the web server is divided into different parts. Each part or section is occupied by one website so that it is separated from the other websites. The maintenance of the web server is shared by many users or website owners; therefore a system administration is a must requirement for proper maintenance.

The advanced web-based control panel system like Plesk, cPanel, Interworx, DirecAdmin and H-sphere are used for Windows Shared Hosting. There are many companies round the globe engaged in web services with different hosting packages.

They offer a complete plan that includes:

- Installing server on Windows OS
- Managing servers
- Regular security updates
- 24/7 Technical support

On the whole the advantages of Windows Shared Hosting are that it is very cost-effective and highly reliable. These email server are provided with sufficient resources to meet the requirements of professional websites that get restricted within a given time period. Because of the scalable feature the required amount of space on these web hosting servers can be increased in accordance with the requirements of the users.

Best Windows Shared Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Our Shared Hosting. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows Shared Hosting, we should be your best choice.



Windows 2008 Hosting with Free ASP.NET :: 9 Steps to Solve Login Failed Error : 18456 in Microsoft SQL Server 2008

clock April 23, 2015 07:31 by author Dan

In this posting, I'll coach you on how you can figure out what user features administrative legal rights within the server along with walk you Step-By-Step how you can configure SQL Server permitting some other end users to sign in as Administrators to SQL Server. This simple information “Login Failed for User (Microsoft SQL Server, Error: 18456)” indicates anyone came into unacceptable recommendations as soon as logging into SQL Server. Inside the beneath display screen chance, We are logging into 'microsoft' SQL Server Managing Facilities which has a user that will not have administrative permissions for connecting to the server.

You must to decide what user is equipped with privileges to SQL server. Normally this can be a user which you logged with having once you put in SQL Server or the user that is the default owner on computer. To obtain a set of user on the unit (Assuming Microsoft windows Server 2012 or above).

Step-By-Step

Launch Server Manager – Start – Click Server Manager



In the upper right corner, click Tools, then Computer Management



Expand Local Users and Groups (Under Computer Management-System Tools) then click Users

Notice under Description… There is a Built-in account for administering… This is very likely an account that has access to SQL server.  Try logging onto windows with that account that is Built-in account for administering then we can grant rights to the user you want to use to login to SQL Server.



Now that you are logged into Windows with an account that has access to connect to SQL Server, Let’s go in and grant rights to the user that you want to be able to use to access SQL Server.

Step-By-Step

Launch SQL Server Management Studio again and you should be able to Connect

Expand your ServerName, then Expand Security, then Logins.  Click Logins

Right-Click Logins Select New Login



Click the Search Button

Type in the Windows User Name you would like to add as an SQL Administrator then click Check Names  (or you can click advanced and select from a list)



Click Server Roles in the left pane; then turn on the sysadmin checkbox, then click OK



You can then confirm you have sa rights by double-clicking the user name in the left Object Explorer and clicking on Securables



Now you can log out of Windows, login as the user you just granted rights to and all should work fine.

Best Windows Server 2008 Hosting Recommendation

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2008. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2008 Hosting, we should be your best choice.



Windows 2008 Hosting with Free ASP.NET :: 3 Tips Best Practices windows cloud server security

clock April 21, 2015 06:27 by author Mark

Windows Cloud Server Security: 3 Useful Best Practices

More and more we are helping people get set up on  Windows cloud servers here at windows2008hosting.asphostportal.com .  While dedicated server solutions are the right choice for certain situations, clients are finding the benefits of cloud servers or, in many cases, a hybrid hosting solution to be the perfect fit for their hosting needs. With all this cloud talk, there are several technologies supported on Windows cloud servers that you may not have realized. These options can make the difference when configuring a cloud server solution that will best optimize your site or application.

Firewalls, VPN & SSL in the Cloud

The best practices of leveraging Virtual Private Networks (VPN), Secure Sockets Layers (SSL) and Firewalls to protect sensitive information on a Windows Cloud Server are recommend and also supported just as they would be with a physical dedicated server. If you’re unsure as to what any of these are and why they are necessary, the following will serve as a summary of each and their benefits.

What is VPN?

Virtual Private Networking is a secure and controlled method of connecting remote networks and users for the purpose of dealing with sensitive information. When using a VPN, all data is encrypted at the source, sent securely to the destination, then decrypted at the destination – assuring that only the previously approved source and destination people or systems can access the data. This is often a necessary element to incorporate in your hosting solution if you are an eCommerce company accessing sensitive back-end data like credit cards or orders, require PCI compliance, or simply need to securely work with remote clients or coworkers regarding sensitive information. A VPN connection allows you to guarantee identity through point-to-point connections and user authentication. While Windows cloud servers are virtual, they retain all the same VPN encrypting capabilities as a dedicated server, giving you complete control over security and privacy of your data. (For more information on Virtual Private Networking, get our free download: Introduction to Virtual Private Networking.

What is an SSL Connection?

The Secure Socket Layer protocol (SSL) ensures secure transactions between Windows cloud servers and browsers. This is particularly important anytime sensitive information must be transmitted over the open Internet. For example, any sign-up process where personal information is needed, (credit card information, personal data, etc.) would justify use of an SSL connection. You can recognize the use of an SSL connection when you see an “S” included in the URL (https://).
While the technical breakdown of an SSL can be somewhat complicated, it’s important to understand the basic concept of an SSL connection and how important it is in
maintaining security with sensitive information. 

What is a Firewall?

A firewall is a security solution designed to only allow safe and trusted connections to whatever it is set to protect. It does this by identifying several pieces of information for all incoming connections, thus blocking access to any unfamiliar or unauthorized sources looking to access that data. The difference between a firewall and an SSL connection is that SSL is used to ensure your sensitive information can be securely sent from a webpage to a server, while a firewall is designed to control direct access to the cloud server itself. A firewall can be used to lock down ports and allow only certain information to be accessible, while keeping other information secure.

Firewall in a Windows Cloud Server

In order to set up a firewall in a Windows cloud server configuration, various steps must be taken to optimize the firewall for the cloud – but depending on your hosting provider, these steps will be covered for you. Once these steps are taken, it is no different than a firewall configured for a dedicated physical server.
Note: In addition to base intrusion detection and firewall protection offered at our network core, our Windows Cloud Servers come with free built-in Windows Firewall service that can be used to lock down ports and restrict access with a focus on the specific needs of your server – assuring that only the ports needed are opened and only available to the users or systems that need the sensitive access.

Cloud Server Security Best Practices

The above security steps are important in and of themselves, but they also serve as a baseline for achieving PCI Compliance, something in which we at ASPHostPortal.com are well versed. So, whether you’re looking to sure up your security as a best practice, or find yourself needing to implement the above steps in accordance with the PCI Security Standard Council, Windows cloud server hosting offers all the tools available on a dedicated server configuration, but often with several added benefits.

Best Windows Server 2008 Hosting Recommendation

ASPHostPortal.com

ASPHostPortal.com provides our customers with Plesk Panel, one of the most popular and stable control panels for Windows hosting, as free. You could also see the latest .NET framework, a crazy amount of functionality as well as Large disk space, bandwidth, MSSQL databases and more. All those give people the convenience to build up a powerful site in Windows server 2008. We offers Windows hosting starts from $5/month only. We also guarantees 30 days money back and guarantee 99.9% uptime. If you need a reliable affordable Windows server 2008 Hosting, we should be your best choice.



About ASPHostPortal.com

We’re a company that works differently to most. Value is what we output and help our customers achieve, not how much money we put in the bank. It’s not because we are altruistic. It’s based on an even simpler principle. "Do good things, and good things will come to you".

Success for us is something that is continually experienced, not something that is reached. For us it is all about the experience – more than the journey. Life is a continual experience. We see the Internet as being an incredible amplifier to the experience of life for all of us. It can help humanity come together to explode in knowledge exploration and discussion. It is continual enlightenment of new ideas, experiences, and passions


Author Link


Corporate Address (Location)

ASPHostPortal
170 W 56th Street, Suite 121
New York, NY 10019
United States

Sign in