Last Updated on 5 May 2016, Total: 769 Blog Posts
With a career spanning more than 23 years in IT, George Chetcuti has hands-on experience on HP high-end UNIX setups, Windows high-availability clusters and cloud computing. He has overseen various network projects and managed IT departments. The aim of this blog is to address various network related issues and topics from networking concepts to hands-on tasks for the community of network administrators, where your comments and suggestions are always welcome. He also writes about Windows 7 in the little free time he has at www.windows7library.com.
| 9 | Command-line |
| 168 | General |
| 46 | Implementation |
| 27 | Monitoring |
| 299 | News |
| 99 | Products |
| 99 | Security |
| 5 | Troubleshooting |
| 16 | Virtualization |
Although, it's a recommended best practice to test and debug malware in an isolated and contained environment, this post by Marco Ramilli explains how crafty malware can eventually detect this environment and behave in a different way. Malware can detect virtualized environments, active debuggers and sandbox environments. Briefly, malware authors can easily insert code into their software that detects such... Read More
Create stunning presentations with Zoho's Show 3.0. The tool has what it takes to create and deliver attractive presentations while there's no need to carry with you any removable media, you just need an Internet connection – deliver presentations on the go. You can import presentations from different formats such as, PPTX and collaborate with remote users modifying the same... Read More
Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant... Read More
As we have seen in the previous post creating a customized Data Collector Set is pretty straight forward. Go here to read the post! In addition we have seen that the data sources defined were derived from a set template. In this post we are going to see how you can add your own data sources to a previously created... Read More
According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy... Read More