Implementation

Last Updated on 4 Dec. 2014, Total: 40 Blog Posts

  1. Free Online Backup Solution

    Did you know that using your Windows 7 platform and subscribing to a free online storage account you could easily create a secure online backup solution for free? Windows 7 Enterprise and Ultimate editions allow you to use BitLocker to encrypt data; the encrypted data can be uploaded to a free cloud storage location for safe keeping. Check how to... Read More

  2. Windows Server 2012 Test Lab Guide

    This Microsoft Test Lab Guide (TLG) provides step-by-step instructions to create the Windows Server 2012 Base Configuration test lab, using computers running Windows Server 2012 and Windows 8. For a test lab based on physical computers, you can image the drives for future test labs. For a test lab based on virtual machines, you can create snapshots of the base... Read More

  3. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  4. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  5. Hardening Early Boot Components against Malware in Windows 8

    Windows 8, both client and server editions will provide additional security capabilities against malware. Specifically, Microsoft provides guidelines for anti-malware and other security solution developers to develop security solutions to protect early boot components from malware. For instance, the Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started... Read More

  6. Microsoft SharePoint Server on AWS Reference Architecture

    Amazon has published a White Paper on how to use SharePoint services on AWS. It provides detailed technical guidance on how to configure, deploy, and run a SharePoint Server farm on AWS. If you are an IT administrator contemplating of moving your SharePoint to Amazon's cloud then this paper will guide you on how to set up and deploy the... Read More

  7. Windows Server 2008 DNS deployments

    DNS implementations in Windows Server 2008 environments can have four types of deployments. The most productive is the dynamic DNS server which is integrated with every DC in the network. Read-write DCs will also contain read-write DNS servers. In remote sites where a DC may be present for availability purposes, read-only DCs will also include read-only DNS servers. External networks... Read More

  8. Installing the DNS role on a Server Core installation

    You can install a DNS server on a Server Core installation of Windows Server 2008 using the command line to perform the installation part and a remote connection to configure and manage DNS services. This option may become handy when your environment requires a separate DNS service and the use of a dedicated Virtual Machine (VM) is not justified. Also,... Read More

  9. IPv6 Unique Local Addresses

    IPv6 Unique Local addresses (ULAs) are equivalent of private addresses in IPv4 that is, 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16. These addresses are routable between subnets on a private network but are not routable on the public Internet. They allow you to create complex internal networks without having public address space assigned. ULAs begin with the prefix "fd" and their structure is... Read More

  10. Understanding IPv6 Link-local Addresses Zone IDs

    As we have noted in a previous post all IPv6 Link-local Addresses (LLA) share the same network identifier (fe80::) hence, you can cannot determine which interface an LLA is bound to, if the computer has multiple network adapters connected to different network segments. In fact, it distinguishes the networks by using a numeric zone ID, following a percent sign after... Read More

Featured Links