General

Last Updated on 30 June 2015, Total: 162 Blog Posts

  1. Register for free training - Windows Server 2012: First Look

    Learn how to cloud optimize your IT with Windows Server 2012 and how to take advantage of the skills and investment you have already made in building a familiar and consistent platform. With Windows Server 2012, you gain all the Microsoft experience behind building and operating private and public clouds, delivered as a dynamic, available, and cost-effective server platform. This... Read More

  2. Research IT as a Service

    I would like to share with you a couple of points taken from Ian Foster's presentation about the future of research computing and the current trend of moving the administrative load to the cloud. While, the big science projects are the ones that most often get the required funds and resources, the small to medium projects on the other hand... Read More

  3. Resolving Your PST Nightmares Once and for All!

    Join Microsoft MVP, J. Peter Bruzzese, and Sherpa Solutions Architect, Rick Wilson, on Thursday, November 14th, at1pm EST to explore the regulatory and operational challenges associated with managing PST files and gain insights into getting control of your organization's data once and for all... Read More

  4. Rights Protected Folder Explorer

    Rights Protected Folder Explorer is a Windows based application that allows you to work with Rights Protected Folders. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder. It works with Active Directory Rights Management... Read More

  5. Routers default passwords online database

    RouterPasswords.com provides quick access for technicians to default passwords used on routers, default web logins, CCTV systems and other electronic devices... Read More

  6. SSID Sniffer tool

    A tool called iSniff GPS is able to capture packets broadcasted by iPhones, iPads and other mobile devices as they connect to Wi-Fi networks and then queries the retrieved network names on wigle.net to determine possible locations... Read More

  7. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  8. Security implications of HDMI Ethernet Channel

    VGA is almost dead and with new PCs and laptops we get HDMI, but under the hood this brings many other capabilities than just displaying video. HDMI Ethernet Channel could circumvent corporate security in a number of ways, such as through the use of network-enabled display technologies and via HEC-enabled corporate laptops, but the technology is still largely unsupported. Often... Read More

  9. September Newsletters Teaser

    Some discussion points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com August monthly newsletters... Read More

  10. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

Featured Links