SlideShare a Scribd company logo
Installing

Windows Server 2012
step by step

Sayyed Mehdi Poustchi Amin
India – Oct 2013
Speaker

Mehdi Poustchi Amin poustchi@yahoo.com
CCNA,MCTS,MCITP,MCSE, MCSA,MCP
Network Administrator
Founder of Iran’s honeynet project www.Honeynet.ir

Research Assistant
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Install Windows Server 2012 Step-by-Step
Ad

Recommended

Install Windows Server 2008 Step-by-Step
Install Windows Server 2008 Step-by-Step
Mehdi Poustchi Amin
 
Install windows 8.1 Pro
Install windows 8.1 Pro
Mehdi Poustchi Amin
 
Install Linux CentOS 7.0
Install Linux CentOS 7.0
Mehdi Poustchi Amin
 
VMware Workstation 7
VMware Workstation 7
Mehdi Poustchi Amin
 
VMware Server 2
VMware Server 2
Mehdi Poustchi Amin
 
VMware ESX 3.5
VMware ESX 3.5
Mehdi Poustchi Amin
 
Install Linux CentOS 6 x86_64 - minimum installation
Install Linux CentOS 6 x86_64 - minimum installation
Mehdi Poustchi Amin
 
Pascal-Armand-resume
Pascal-Armand-resume
visual_resume
 
Honeypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
How to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & Signing
Mehdi Poustchi Amin
 
How to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSL
Mehdi Poustchi Amin
 
Virtualization
Virtualization
Mehdi Poustchi Amin
 
All about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Configuring RAID 1 on CentOs
Configuring RAID 1 on CentOs
Mehdi Poustchi Amin
 
Installing Parsix 1
Installing Parsix 1
Mehdi Poustchi Amin
 
Installing Debian 4
Installing Debian 4
Mehdi Poustchi Amin
 
Installing Mandriva 2008
Installing Mandriva 2008
Mehdi Poustchi Amin
 
Installing Fedora 8
Installing Fedora 8
Mehdi Poustchi Amin
 
Installing Windows2008 Server
Installing Windows2008 Server
Mehdi Poustchi Amin
 
Proxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
 
Installing Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-Step
Mehdi Poustchi Amin
 
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Mehdi Poustchi Amin
 
Installing Linux RedHat Enterprise Edition
Installing Linux RedHat Enterprise Edition
Mehdi Poustchi Amin
 
Installing Ubuntu7.04 Linux
Installing Ubuntu7.04 Linux
Mehdi Poustchi Amin
 
Installing Mandriva Linux
Installing Mandriva Linux
Mehdi Poustchi Amin
 
Installing Windows2000 Server
Installing Windows2000 Server
Mehdi Poustchi Amin
 
Installing Debian Linux
Installing Debian Linux
Mehdi Poustchi Amin
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 

More Related Content

More from Mehdi Poustchi Amin (19)

Honeypots in Cyberwar
Honeypots in Cyberwar
Mehdi Poustchi Amin
 
How to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & Signing
Mehdi Poustchi Amin
 
How to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSL
Mehdi Poustchi Amin
 
Virtualization
Virtualization
Mehdi Poustchi Amin
 
All about Honeypots & Honeynets
All about Honeypots & Honeynets
Mehdi Poustchi Amin
 
Configuring RAID 1 on CentOs
Configuring RAID 1 on CentOs
Mehdi Poustchi Amin
 
Installing Parsix 1
Installing Parsix 1
Mehdi Poustchi Amin
 
Installing Debian 4
Installing Debian 4
Mehdi Poustchi Amin
 
Installing Mandriva 2008
Installing Mandriva 2008
Mehdi Poustchi Amin
 
Installing Fedora 8
Installing Fedora 8
Mehdi Poustchi Amin
 
Installing Windows2008 Server
Installing Windows2008 Server
Mehdi Poustchi Amin
 
Proxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
 
Installing Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-Step
Mehdi Poustchi Amin
 
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Mehdi Poustchi Amin
 
Installing Linux RedHat Enterprise Edition
Installing Linux RedHat Enterprise Edition
Mehdi Poustchi Amin
 
Installing Ubuntu7.04 Linux
Installing Ubuntu7.04 Linux
Mehdi Poustchi Amin
 
Installing Mandriva Linux
Installing Mandriva Linux
Mehdi Poustchi Amin
 
Installing Windows2000 Server
Installing Windows2000 Server
Mehdi Poustchi Amin
 
Installing Debian Linux
Installing Debian Linux
Mehdi Poustchi Amin
 
How to use OpenPGP for Email Encryption & Signing
How to use OpenPGP for Email Encryption & Signing
Mehdi Poustchi Amin
 
How to create Self-Sign Certificate by using OpenSSL
How to create Self-Sign Certificate by using OpenSSL
Mehdi Poustchi Amin
 
Installing Linux CentOs 5.0 Step-by-Step
Installing Linux CentOs 5.0 Step-by-Step
Mehdi Poustchi Amin
 
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Installing RHEL 5 Linux RedHat Enterprise Edition step-by-step
Mehdi Poustchi Amin
 
Installing Linux RedHat Enterprise Edition
Installing Linux RedHat Enterprise Edition
Mehdi Poustchi Amin
 

Recently uploaded (20)

cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
cnc-processing-centers-centateq-p-110-en.pdf
cnc-processing-centers-centateq-p-110-en.pdf
AmirStern2
 
Cyber Defense Matrix Workshop - RSA Conference
Cyber Defense Matrix Workshop - RSA Conference
Priyanka Aash
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
WebdriverIO & JavaScript: The Perfect Duo for Web Automation
digitaljignect
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
Curietech AI in action - Accelerate MuleSoft development
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Using the SQLExecutor for Data Quality Management: aka One man's love for the...
Safe Software
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Quantum AI: Where Impossible Becomes Probable
Quantum AI: Where Impossible Becomes Probable
Saikat Basu
 
You are not excused! How to avoid security blind spots on the way to production
You are not excused! How to avoid security blind spots on the way to production
Michele Leroux Bustamante
 
"Scaling in space and time with Temporal", Andriy Lupa.pdf
"Scaling in space and time with Temporal", Andriy Lupa.pdf
Fwdays
 
The Future of Product Management in AI ERA.pdf
The Future of Product Management in AI ERA.pdf
Alyona Owens
 
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
Priyanka Aash
 
2025_06_18 - OpenMetadata Community Meeting.pdf
2025_06_18 - OpenMetadata Community Meeting.pdf
OpenMetadata
 
Securing Account Lifecycles in the Age of Deepfakes.pptx
Securing Account Lifecycles in the Age of Deepfakes.pptx
FIDO Alliance
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
"Database isolation: how we deal with hundreds of direct connections to the d...
"Database isolation: how we deal with hundreds of direct connections to the d...
Fwdays
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
Securing AI - There Is No Try, Only Do!.pdf
Securing AI - There Is No Try, Only Do!.pdf
Priyanka Aash
 
Ad

Install Windows Server 2012 Step-by-Step