So you’ve got a brand new laptop at the office. Maybe you’re really lucky and got a Tablet PC. Whatever model or brand you got, it almost certainly includes wireless support. Now you can work from anywhere in the office or campus without having to find an available network plug. Your IT department will handle setting up your new laptop …
Read More »John Black
Optimize Windows Vista for better performance
No matter how fast or shiny computers might be when they are new, they all seem to get slower over time. That state-of-the-art PC you bought last year might not feel like such a screamer after you install a dozen programs, load it with antispyware and antivirus tools, and download untold amounts of junk from the Internet. The slowdown might …
Read More »Bid in online auctions and avoid ID theft
Online auctions are more popular than ever, enabling users to find everything from collectibles to car parts. Most auction transactions go smoothly. Auction fraud, however, is also more prevalent. You can choose LifeLock.com (Promotion Code) to be pro-active in protecting your identity and personal information. Simply reacting to identity theft isn’t enough anymore. Too many thieves have found out this …
Read More »10 tips home wireless security settings
1. ENABLE WIRELESS ENCRYPTION Enabling Wireless encryption is essential otherwise every one within your Radio Frequency (RF) range (and remember the Wireless network world record distance is 125 miles!), at best can capture your traffic compromising surfing habits, gathering usernames and passwords and at worst sharing illegal images or hacking over your Wireless network for which you are legally responsible. …
Read More »How to bypass Web Proxy service in ISA Server 2004 or 2006
In ISA Server 2006 or in ISA Server 2004, client Web requests are handled by the Web Proxy filter. This filter works at the application level on behalf of clients residing in networks that are behind an ISA Server-based server that requests HTTP and Secure Hypertext Transfer Protocol (HTTPS) objects. Web proxy client requests from client computers that have ISA …
Read More »Firefox 3 to get a Visual Refresh
The Mozilla team is working really hard to make sure that Firefox 3 will be the best browser we will ever see on this planet. Part of the plan is to enhance the UI of Firefox to make sure it blends with the host OS. Firefox 3 will come out with inbuilt skins that will integrate completely with Windows Vista, …
Read More »Recovering Mailboxes with Exchange Server 2003
If you would like to recover a single mailbox on your production Exchange Server 2003 you are able to do so. You just have to add and configure the fifth storage group on your server – known as Recovery Storage Group and you will not have to configure your separate recovery server in an isolated forest as you had to …
Read More »Exchange Server 2003 Mailbox Recovery
If an administrator has deleted a user and with that its mailbox and within 30 days (by default) he discovers that this mailbox should not have been deleted, there is an easy way to reconnect the orphaned mailbox to a new user. The time line for not deleting an unconnected mailbox from the storage is 30 days by default and …
Read More »Microsoft Search Server 2008 Express
Today Microsoft announced two new search servers: Microsoft Search Server 2008 and Microsoft Search Server 2008 Express. The interesting one is the Express version, since it’s free. A download is available warning: it’s beta software, although Microsoft says it’s close to final at www.microsoft.com/enterprisesearch/ Furthermore, the only difference between it and Search Server is that Search Server can be run …
Read More »
SON SON