Wednesday , 15 May 2024
Home 4 John Black (page 26)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

How Do You Know Your Data Encryption is Really Secure

There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP …

Read More »

Understanding E-mail Spoofing

Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it, examining such solutions as the Sender Policy Framework (SPF) and Microsoft’s Sender ID, which is based on it. If you receive a snail mail letter, you look to the return address in the …

Read More »

Configure Exchange 2003 Server Pop connector

Author : Claus Christensen Source : http://www.servolutions.com/support/config_exchange_2003.htm Configuring your new Exchange 2003 server for internet email with POPconnector for downloading the email from POP3 mailboxes isn’t hard if you just do it step by step as shown in this configuration sample. In this guide we will step through a sample installation of Exchange 2003 for a company we will call “Mycompany”. Mycompany consequently owns the internet domain name “mycompany.com”. Actually it only takes these four steps: Adding your internet domain name to the recipient policies Configuring the SMTP server for inbound email Adding a SMTP Connector for outbound emails Configuring the email addresses of your users And this is how to configure the Exchange Server to accept email for mycompany.com and work with POPcon: First install the software from CD. You may have to go back to the “Add/remove Software” utility in the control panel to add NNTP support if …

Read More »

Configure Web Chaining Rules ISA Server 2006

Web Chaining Rules allow you to chain downstream ISA firewalls to upstream ISA firewalls, or even non-ISA firewall-based Web proxy servers. Web proxy chaining allows you to configure a hierarchical caching solution. In contrast, a multi-server ISA firewall array allows you to create a parallel caching solution. You can combine hierarchical and parallel caching solutions to significantly improve performance and reduce the total amount of bandwidth used on Internet links, WAN links, and even on the intranet. The most popular use for Web Chaining is to chain branch office ISA firewalls with main office ISA firewalls. This has several advantages: Content requested from all branch offices and the main office is cached on the main office ISA firewall array. This reduces overall Internet link bandwidth utilization Content requested from each branch office is cached on the local ISA firewall array. This reduces bandwidth utilization on the branch office WAN and/or …

Read More »

Packet fragmentation VS Intrusion Detection System (IDS)

Intrusion Detection Systems (IDS) have long had a problem with packet fragmentation. This was true five years ago and it is still a problem today. For years the IDS has suffered from several key ailments. Chief amongst them is in how they deal with packet fragmentation. There has been great progress made over the years in how an IDS will deal with packet reassembly, however the problem still remains. Over the past years IDS vendors have grown smarter when it comes to packet fragmentation, and how their IDS’s reassemble these fragments. During the course of this series I will use the following tools: Fragrouter Metasploit Framework Snort tcpdump.exe

Read More »

Enabling SSL OWA 2003 using Certificate Authority

Why spend money on a 3rd party SSL certificate, when you can create your own for free? In this article I will show you step by step how you create your own SSL Certificate, which among other things is needed in order to properly secure Outlook Web Access on your Exchange 2003 Server. The first thing to do is to decide which server should hold the Certicate Authority (CA) role, it could be any server as long as it’s at least a member server. If you have a single box setup, such as a Small Business Server (SBS), the decision shouldn’t be very hard. Note: In order to add the Certificate Service Web Enrollment component (subcomponent to CA), which we’re going to use in this article, the server needs to be running IIS, so if you haven’t already done so, install IIS before continuing with this article. If you plan …

Read More »

Managing Routing And Remote Access in Windows Server 2003

Windows Server 2003 provides the ability to act as a router on your network and to provide remote access services to users outside your network. Routing And Remote Access (RRAS) in Windows Server 2003 provides VPN, routing, NAT, dialup and basic firewall services. Here’s how to use and configure these services. Getting started To get started, open up the Routing And Remote Access configuration utility at Start | Administrative Tools | Routing And Remote Access. Initially, RRAS is not enabled on the server. To enable it, right-click the server on which you wish to enable the services and choose Configure And Enable Routing And Remote Access. In Figure A below, you can see that I am enabling the service on the server named RAS

Read More »

Installing Windows Rights Management Services

This step-by-step walks you through the process of setting up a working Microsoft® Windows® Rights Management Services (RMS) with Service Pack 2 infrastructure in a test environment. During this process you create an Active Directory® domain, install a database server, install RMS, configure the RMS cluster, and configure the RMS client computer. Once complete, you can use the test lab environment to evaluate RMS on Microsoft Windows Server 2003 and assess how it might be deployed in your organization. As you complete the steps in this guide, you will: ·      Prepare the RMS infrastructure. ·      Install and configure RMS. ·      Verify RMS functionality after you complete the configuration. The goal of an RMS deployment is to be able to protect information, no matter where it goes. Once RMS protection is added to a digital file, the protection stays with the file. By default, only the content owner is able to remove the protection …

Read More »