Implementation

Last Updated on 23 Oct. 2014, Total: 38 Blog Posts

  1. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  2. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  3. Hardening Early Boot Components against Malware in Windows 8

    Windows 8, both client and server editions will provide additional security capabilities against malware. Specifically, Microsoft provides guidelines for anti-malware and other security solution developers to develop security solutions to protect early boot components from malware. For instance, the Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started... Read More

  4. Microsoft SharePoint Server on AWS Reference Architecture

    Amazon has published a White Paper on how to use SharePoint services on AWS. It provides detailed technical guidance on how to configure, deploy, and run a SharePoint Server farm on AWS. If you are an IT administrator contemplating of moving your SharePoint to Amazon's cloud then this paper will guide you on how to set up and deploy the... Read More

  5. Windows Server 2008 DNS deployments

    DNS implementations in Windows Server 2008 environments can have four types of deployments. The most productive is the dynamic DNS server which is integrated with every DC in the network. Read-write DCs will also contain read-write DNS servers. In remote sites where a DC may be present for availability purposes, read-only DCs will also include read-only DNS servers. External networks... Read More

  6. Installing the DNS role on a Server Core installation

    You can install a DNS server on a Server Core installation of Windows Server 2008 using the command line to perform the installation part and a remote connection to configure and manage DNS services. This option may become handy when your environment requires a separate DNS service and the use of a dedicated Virtual Machine (VM) is not justified. Also,... Read More

  7. IPv6 Unique Local Addresses

    IPv6 Unique Local addresses (ULAs) are equivalent of private addresses in IPv4 that is, 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. These addresses are routable between subnets on a private network but are not routable on the public Internet. They allow you to create complex internal networks without having public address space assigned. ULAs begin with the prefix "fd" and their structure is... Read More

  8. Understanding IPv6 Link-local Addresses Zone IDs

    As we have noted in a previous post all IPv6 Link-local Addresses (LLA) share the same network identifier (fe80::) hence, you can cannot determine which interface an LLA is bound to, if the computer has multiple network adapters connected to different network segments. In fact, it distinguishes the networks by using a numeric zone ID, following a percent sign after... Read More

  9. IPv6 Link-Local Addresses

    Pv6 Link-Local Addresses (LLAs) are similar to APIPA (Automatic Private IP Addressing) addresses in Windows IPv4 based systems. APIPA addresses are self-configured, non-routable addresses in the range of 169.254.0.0/16. But unlike APIPA addresses, LLA addresses remain assigned to an interface as a secondary address even after a routable address is obtained for that interface. An LLA address always begins with... Read More

  10. IPv6 Global Address Structure

    IPv6 global addresses are equivalent to Public IP addresses in IPv4 and are globally reachable on the IPv6 portion of the Internet. The global IPv6 address structure is divided into three parts, the Public and Private routing part, and the host identification within a LAN. These parts add up to 128 bits which are structured as follows: The first 48... Read More

Featured Links