Thursday , 16 May 2024
Home 4 John Black (page 38)

John Black

A professional fast learner, with experience in the IT management, capable of technical troubleshooting to identify and solve problems.

Identify e-mails trying to steal your identity

ATTACK OF THE PHISHERS You open your in-box and find e-mail from eBay or PayPal, warning that your account has been compromised by identity thieves and that you must log on immediately to verify your information. Sounds scary, right? But here’s the really terrifying part: that e-mail is a fake, and so is the Web …

Read More »

Quick search the Web with IE 7

Internet Explorer 7’s search tool is no longer limited to Microsoft’s search engine. Now you can use it with Google, Yahoo, eBay, Wikipedia, and many others. To do this: Click the down arrow labeled Search Options, which is located at the right of the search box’s magnifying glass in the upper right corner of the screen. Click Find More Providers, and then choose the one(s) you want. When the time comes to actually conduct a search, click the Search Options arrow again and select the engine you want from the pull-down list.

Read More »

Restoring the Vista Telnet Client

Why would Microsoft remove the good ol’ command-line telnet client from the default Windows Vista installation?!? Well, they did…but here’s how to get it back: 1. From the Start menu, click Control Panel 2. Select Programs and Features 3. From the menu of the left, select Turn Windows Features On or Off 4. Scroll down, and then check the “Telnet client” box 5. Click OK

Read More »

The Coolest Cisco Links of All

Okay, here’s my thought. I’ve got some links that I have found very handy in the Cisco world over the years…links that I typically forget about, but then someone shows me the same link months later and I get all excited about them again. Rather than continuing the cycle, I was hoping to enlist your help to create a post that has all sorts of great links. Eventually, we can compile a list and put them in some permanent place on the website. These links include cool resources, utilities (cheap or free), and “tips”. Please don’t include blogs in this list (not that they’re not valuable…just a different category). So, here’s what I’ve got so far:

Read More »

Using a Cisco Router as a DNS Server

The folks over at NIL have put together an excellent article on using a Cisco router as a central DNS server for your organization. They also include a new feature called DNS Views – it allows you to configure your Cisco router for split-DNS: giving private addresses to servers accessible to internal users but public addresses to anyone else asking from the Internet. Nice!!! Click here for the full story.

Read More »

Keep Organized Crime out of Your Network

A couple of months ago we looked at the trend toward serious IT security breaches and organized crime’s involvement in those breaches. It’s estimated that the majority of these serious security breaches are coming about because of organized criminal activity – and yes, the Mafia is getting involved. In the original article we covered scams ranging from petty spam threats all the way to violent extortion with potential damages ranging from inconvenience up to hundreds of millions of dollars. There are a few ways to protect yourself from organized crime — the best being not to get noticed or targeted in the first place. Traditional solutions include calling in the cops or just paying up, with the latter clearly being the least attractive scenario. IT security solutions can help, but IT systems are being targeted because behind that technology is real money and real secrets and real people. And where …

Read More »

10 Tips Security

Keamanan (security) merupakan masalah yang cukup penting dalam era informasi elektronik ini. Berikut ini adalah sepuluh (10) saran untuk meningkatkan keamanan di tempat anda. Gunakan password yang kuat. Paling sedikit gunakan delapan (8) karakter dan menggunakan karakter yang bukan huruf seperti contohnya: j&%9Hx. Jangan menggunakan katakata yang ada di dalam kamus atau merupakan bagian dari nama anda, nama perusahaan, dan nama-nama yang umum lainnya. Ganti password secara berkala. Disarankan untuk mengganti password dalam 90 hari. Dengan emikian jika encrypted password ada tercuri dan cracker berusaha memecahkannya maka cracker tersebut akan kecewa karena password anda sudah diganti. Gunakan anti virus dan data virus ang terbaru. Virus muncul secara berkala. Untuk itu perbaharui software anti virus anda dengan data-data yang terbaru dengan cara berlangganan (subscribe) kepadaservis anti-virus. Berhati-hati dengan mail attachment. Banyak virus, trojan horse yang dikirimkan melalui email attachment. Konfigurasi program email anda agar tidak menjalankan program secara otomatis apabila menerima …

Read More »

Konsep Subnetting

Subnetting adalah termasuk materi yang banyak keluar di ujian CCNA dengan berbagai variasi soal. Juga menjadi momok bagi student atau instruktur yang sedang menyelesaikan kurikulum CCNA 1 program CNAP (Cisco Networking Academy Program). Untuk menjelaskan tentang subnetting, saya biasanya menggunakan beberapa ilustrasi dan analogi yang sudah kita kenal di sekitar kita. Artikel ini di tulis untuk rekan-rekan yang sedang belajar jaringan, yang mempersiapkan diri mengikuti ujian CCNA, dan yang sedang mengikuti pelatihan CCNA . Sebenarnya subnetting itu apa dan kenapa harus dilakukan? Pertanyaan ini bisa dijawab dengan analogi sebuah jalan. Jalan bernama Gatot Subroto terdiri dari beberapa rumah bernomor 01-08, dengan rumah nomor 08 adalah rumah Ketua RT yang memiliki tugas mengumumkan informasi apapun kepada seluruh rumah di wilayah Jl. Gatot Subroto.

Read More »

Opening New Worlds for Everyone

Microsoft began with a dream of a PC on every desk and in every home. Thirty years ago this seemed impossible. Today, for the more than one billion people we’ve reached, life has changed profoundly. But for more than five billion people, the opportunity to learn, connect, create, and succeed remains elusive.”All human beings deserve a chance to achieve their full potential,” said Bill Gates, chairman of Microsoft. On April 19th, 2007 Microsoft unveiled its new commitment to help close the digital divide. Through the expansion of Microsoft Unlimited Potential, we are expanding our efforts with new business models, technology solutions, and advanced research, all focused on solving critical pieces of the economic development puzzle in developing and developed countries. The expansion of Unlimited Potential will focus on three areas; education, innovation, and jobs and economic opportunity, with particular emphasis on young people, as they represent the future of all …

Read More »