Blogs

View All RSS Feed

Last Updated on 28 Jan. 2015, Total: 1207 Blog Posts

603 George Chetcuti’s Blog 28 Jan. 2015
604 Windows Networking Admin Blog 6 June 2014
  1. Toshiba Adds New High Density SDHC Cards and microSDHC Card to Extensive Memory Card Line-up

    22 August, 2007- TOKYO--Toshiba Corp., a leading innovator in memory card solutions, today reinforced its line up of SD High Capacity (SDHC) cards with three new cards, including the worlds first 32-gigabyte (GB) memory card in this high density. Alongside the 32GB SDHC card, Toshiba also announced a 16GB SDHC card and an 8GB microSDHC card. All the new cards... Read More

  2. Toshiba External HD DVD ROM

    Newegg.com offers new portable HD DVD drive from Toshiba, not available officially yet. It has the following specs: Model Type External HD DVD ROM Brand TOSHIBA Model PA3530U-1HD1 WRITE Speed DVD+R 4X DVD+RW 4X DVD-R 4X DVD-RW 4X CD-R 16X CD-RW 10X DVD+R DL 2.4X DVD-R DL 2X DVD-RAM 3X READ Speed DVD-ROM HD DVD read 1X speed (maximum)DVD read... Read More

  3. Toshiba introduces industry’s first quarter-terabyte 1.8-inch hdd in high-performance configuration for mobile pcs

    IRVINE, Calif., Sept. 24, 2007 – Toshiba Storage Device Division (SDD), the industry pioneer in small form factor hard disk drives (HDDs), today announced expansion of its market-leading 1.8-inch lineup with the MKxx29GSG series which include three new high-capacity, high-performance Serial ATA HDDs for mobile PC applications, including the industry's first 250GB1 1.8-inch HDD. Toshiba's third-generation 5,400 RPM SATA 1.8... Read More

  4. Track Privileged Identities!

    If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would... Read More

  5. TransVault Compliance TimeMachine

    TransVault Creates Compliance TimeMachine for Email Records Moved into Office 365... Read More

  6. Trend Micro purchased HijackThis

    Apparently trend Micro purchased Hijack This utility. Here is the post on the official HijackThis homepage from the developer: As some of you might have seen several IT news websites are offering Trend Micro HijackThis 2.00 beta. An official statement will be posted on their website soon, but since this is a public beta of theirs I figured it'd be... Read More

  7. Trend Micro: [Vulnerability Confirmation] Antivirus UPX Parsing Kernel Buffer Overflow Vulnerability

    Solution ID: 1034289A recent system upgrade added a '1' or '2' to old solution IDs. You find these solutions by removing or retaining the extra '1' or '2'. Product: Scan Engine - 8.300, Scan Engine - 8.000 Operating System: N/A Published: 2/6/07 5:18 AM Problem: Trend Micro has become aware of a vulnerability in its Scan Engine, wherein a corrupted... Read More

  8. Trend Micro: [Vulnerability Response] Buffer overflow in ServerProtect

    Solution ID: 1034290A recent system upgrade added a '1' or '2' to old solution IDs. You find these solutions by removing or retaining the extra '1' or '2'. Product: ServerProtect for Microsoft Windows - 5.58, ServerProtect for Network Appliance Filer - 5.61, ServerProtect for EMC Celerra - 5.58 Operating System: Windows 2000 Professional Edition - SP4, Windows 2000 Server -... Read More

  9. Trial run Windows Azure

    Are you an MSDN subscriber? I can imagine that most of you somehow are connected to MSDN and enjoy the benefits it offers, however, Microsoft are now offering free compute hours on their Windows Azure infrastructure if you are an MSDN Premium or Ultimate subscriber. Check with your manager or superiors your subscription level and take advantage of this offer... Read More

  10. Troubleshooting DNS using NMCap

    Network Monitor is a free tool available from Microsoft. You can capture data using either the graphical Network Monitor or the command-line NMCap tool. Analysis of the captured data must be done through the graphical interface. As network traffic is in abundance especially on busy servers, you would need to use filters to reduce the number of packets collected and... Read More

Featured Links