Blogs

View All RSS Feed

Last Updated on 15 April 2014, Total: 1081 Blog Posts

479 George Chetcuti’s Blog 15 April 2014
602 Windows Networking Admin Blog 20 March 2014
  1. Recovery steps for computers that have installed security update 2823324 and are now failing to start!

    Microsoft recommends customers to uninstall update 2823324, which is provided in Microsoft Security bulletin MS13-036... Read More

  2. IASO Announces Latest Version of Award-Winning Online Backup Solution

    IASO Online Backup now includes Virtual Disaster Recovery and direct integration with ConnectWise... Read More

  3. CIA to build a "private cloud" using Amazon Web Services

    Although, the cloud computing giant Amazon is normally associated with public cloud provision, it does offer services related to private clouds such as, virtual private clouds and services that extend an organization’s on-premise private clouds... Read More

  4. Check your DNS Servers configuration!

    More DNS administrators need to understand the security risks implications related to Open DNS Resolvers... Read More

  5. How To Combat Online Surveillance

    Tools like TOR and Pidgin makes it more difficult for anyone to trace your Internet activity and content exchanged via Online chats... Read More

  6. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 2

    Part 2 of blog post 'Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know'... Read More

  7. IE 10 Group Policy template for mixed environments

    Administrative Template files are used to populate user interface settings in the Group Policy Object Editor... Read More

  8. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  9. MS 2012 Law Enforcement Requests Report

    How many times did Microsoft disclose the content of customer communications or data storage to law enforcement? Microsoft received requests from more foreign governments, and received them in greater volume, than other companies. Why?... Read More

  10. Malware traffic patterns

    A spreadsheet with GET and POST requests for different malware families with information from open sources... Read More

Featured Links