Implementation

Last Updated on 22 May 2015, Total: 41 Blog Posts

  1. Teaming Network Cards

    Boost your server bandwidth... Read More

  2. When will you switch to Windows Server 2012?

    Windows Server 2012 has been released and many questions about the software have been answered. But there was still one question that was looming; when is the tech industry planning to integrate Windows Server into their network? To answer this question, Firebrand surveyed over a thousand Technology companies and created an Info-graphic to share the results: Read more here -... Read More

  3. Free Online Backup Solution

    Did you know that using your Windows 7 platform and subscribing to a free online storage account you could easily create a secure online backup solution for free? Windows 7 Enterprise and Ultimate editions allow you to use BitLocker to encrypt data; the encrypted data can be uploaded to a free cloud storage location for safe keeping. Check how to... Read More

  4. Windows Server 2012 Test Lab Guide

    This Microsoft Test Lab Guide (TLG) provides step-by-step instructions to create the Windows Server 2012 Base Configuration test lab, using computers running Windows Server 2012 and Windows 8. For a test lab based on physical computers, you can image the drives for future test labs. For a test lab based on virtual machines, you can create snapshots of the base... Read More

  5. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  6. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  7. Hardening Early Boot Components against Malware in Windows 8

    Windows 8, both client and server editions will provide additional security capabilities against malware. Specifically, Microsoft provides guidelines for anti-malware and other security solution developers to develop security solutions to protect early boot components from malware. For instance, the Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started... Read More

  8. Microsoft SharePoint Server on AWS Reference Architecture

    Amazon has published a White Paper on how to use SharePoint services on AWS. It provides detailed technical guidance on how to configure, deploy, and run a SharePoint Server farm on AWS. If you are an IT administrator contemplating of moving your SharePoint to Amazon's cloud then this paper will guide you on how to set up and deploy the... Read More

  9. Windows Server 2008 DNS deployments

    DNS implementations in Windows Server 2008 environments can have four types of deployments. The most productive is the dynamic DNS server which is integrated with every DC in the network. Read-write DCs will also contain read-write DNS servers. In remote sites where a DC may be present for availability purposes, read-only DCs will also include read-only DNS servers. External networks... Read More

  10. Installing the DNS role on a Server Core installation

    You can install a DNS server on a Server Core installation of Windows Server 2008 using the command line to perform the installation part and a remote connection to configure and manage DNS services. This option may become handy when your environment requires a separate DNS service and the use of a dedicated Virtual Machine (VM) is not justified. Also,... Read More

Featured Links