Implementation

Last Updated on 4 Dec. 2014, Total: 40 Blog Posts

  1. Migrating Printers in Windows Server 2008

    Moving services from server to another is an extensive job, especially if a resource has a long list of items to move such as, a long list of printers. With Virtualization migrating resources has been simplified in a way, however, some specific tasks remain the same. That is, they don't benefit from available tools at the virtualization layer. When performing... Read More

  2. PCI Publishes PCI DSS and PA-DSS Version 3.0

    On November 07, 2013 the PCI Security Standards Council (PCI SSC), an open, global forum for the development of payment card security standards, published version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS)... Read More

  3. Selection and Operation of Secondary DNS Servers

    There are always lessons to learn from major incidents. For instance, outages like the one that the global hosting provider GoDaddy has suffered yesterday should remind us of how best online resources are deployed! A must-read RFC about the selection and operation of secondary DNS servers defines the best practices to set up a secondary DNS server for your domain... Read More

  4. Teaming Network Cards

    Boost your server bandwidth... Read More

  5. UPnP Forum Invites Organizations to use UPnP+ Certification

    UPnP+ is an evolution of previous UPnP capabilities and provides an improved experience for the consumer and creates new values and opportunities for manufacturers leveraging existing UPnP protocols to take them into the Cloud and bridge IoT... Read More

  6. Understanding IPv6 Link-local Addresses Zone IDs

    As we have noted in a previous post all IPv6 Link-local Addresses (LLA) share the same network identifier (fe80::) hence, you can cannot determine which interface an LLA is bound to, if the computer has multiple network adapters connected to different network segments. In fact, it distinguishes the networks by using a numeric zone ID, following a percent sign after... Read More

  7. Weak security design in Fingerprint-reading software!

    The widely used fingerprint readers and software pre-installed on laptops sold by major vendors like Dell, Sony, and at least 14 others contains a serious weakness that exposes Windows passwords in seconds. Hackers are able to quickly recover account passwords if your laptop uses software from UPEK, according to security researchers. Apparently, laptops equipped with UPEK fingerprint readers and running... Read More

  8. When will you switch to Windows Server 2012?

    Windows Server 2012 has been released and many questions about the software have been answered. But there was still one question that was looming; when is the tech industry planning to integrate Windows Server into their network? To answer this question, Firebrand surveyed over a thousand Technology companies and created an Info-graphic to share the results: Read more here -... Read More

  9. Windows Server 2008 DNS deployments

    DNS implementations in Windows Server 2008 environments can have four types of deployments. The most productive is the dynamic DNS server which is integrated with every DC in the network. Read-write DCs will also contain read-write DNS servers. In remote sites where a DC may be present for availability purposes, read-only DCs will also include read-only DNS servers. External networks... Read More

  10. Windows Server 2012 Test Lab Guide

    This Microsoft Test Lab Guide (TLG) provides step-by-step instructions to create the Windows Server 2012 Base Configuration test lab, using computers running Windows Server 2012 and Windows 8. For a test lab based on physical computers, you can image the drives for future test labs. For a test lab based on virtual machines, you can create snapshots of the base... Read More

Featured Links