Blogs

View All RSS Feed

Last Updated on 1 Sept. 2014, Total: 1144 Blog Posts

540 George Chetcuti’s Blog 1 Sept. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. The Dcdiag tool

    The Directory Service Diagnosis tool Dcdiag.exe, performs a number of tests and reports on the overall health of replication and security for Active Directory DS. If you run the tool without any parameters it performs the basic tests and gives you a summary report while with the option /c it runs almost every test. As with most command-line tools you... Read More

  2. The Dude 2.0 beta 7

    Documenting is a part of the day-to-day duties of most systems administrators. We all know that it is kind of boring and pesky task. Still it has to be done to ensure that fellow sysadmins, managers and others would be able to understand what is happening on the network. Network documentation is easy in case of small network with only... Read More

  3. The Dude v. 2.0 Beta 11

    The Dude 2.0 Beta reached 11 version. The Dude is a nice network monitoring and discovery utility that simplifies mapping of the network. You can download this version from this url: http://www.mikrotik.com/download/dude-install-2.0beta11.exe Technorati : monitoring, network Del.icio.us : monitoring, network Ice Rocket : monitoring, network... Read More

  4. The Dude v.2.0 Beta 12

    The Dude v.2.0 reached new version, Beta 12. You can download it from this link: http://www.mikrotik.com/download/dude-install-2.0beta12.exe Technorati : dude, monitoring, windows Del.icio.us : dude, monitoring, windows Ice Rocket : dude, monitoring, windows... Read More

  5. The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies

    Stuart Schechter (MIT Lincoln Laboratory) , Rachna Dhamija (Harvard University & CommerceNet), Andy Ozment (MIT Lincoln Laboratory & University of Cambridge), Ian Fischer (Harvard University) published an interesting report on security. They evaluated "website authentication measures that are designed to protect users from man-in-the-middle, "phishing", and other site forgery attacks." I think this report shows pretty well that quite frequently... Read More

  6. The European Cloud Computing Strategy

    The European Commission aims at enabling and facilitating faster adoption of cloud computing throughout all sectors of the economy in order to boost the productivity, growth and jobs in Europe. The strategy includes three key actions which are Standards & Certification, Contract terms & Conditions, and European Cloud Partnership Read more here - http://ec.europa.eu/information_society/activities/cloudcomputing/cloud_strategy/index_en.htm... Read More

  7. The First Trillion Objects stored in Amazon S3

    Late last week the number of objects stored in Amazon S3 reached one trillion (1,000,000,000,000 or 1012). That's 142 objects for every person on Planet Earth or 3.3 objects for every star in our Galaxy. If you could count one object per second it would take you 31,710 years to count them all. Read more here - http://aws.typepad.com/aws/2012/06/amazon-s3-the-first-trillion-objects.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+AmazonWebServicesBlog+%28Amazon+Web+Services+Blog%29... Read More

  8. The HTC Advantage X7501

    HTC announced Advantage X7501, a monstrous PDA with huge number of features. Here are the highlights: Microsoft® Windows Mobile® 6 Standard with Direct Push Technology 624 MHz CPU Built-in 8GB hard drive with miniSD™ expansion slot Laptop-style experience with a huge 5-inch touch screen display and detachable QWERTY keyboard Always "on", connect to your office, watch videos or listen to... Read More

  9. The KEMP ESP - Edge Security Pack

    KEMP has built a large and loyal install base across a range of market segments, applications and geographies. These include a large number of customers who have deployed KEMP's LoadMaster load balancers in conjunction with Microsoft workloads. As a part of the solution for Exchange, Lync or SharePoint a key component has historically been Microsoft's Forefront Threat Management Gateway (TMG)... Read More

  10. The Motherboard with Powerful Graphical and CPU Options for SOHO or Power Users

    Taipei, Taiwan, February 12, 2007 - The ASUS P5NT WS is built on the NVIDIAC55+MCP55PXE chipset structure which supports a LGA775 Socket for running Intel Dual-core™/Quad-core™ CPUs and two NVIDIA SLI graphic cards with Dual x16 speeds on the same platform. This allows the user to enjoy the best CPU and graphics for the system build. With the addition of... Read More

Featured Links