Breaking News

Configure a Windows Server 2003 VPN on the server side

Sometimes, simplicity is the best choice for both a technology solution and the corresponding tutorial that explains how to use the new solution. In this document, I will provide a clear, concise, systematic procedure for getting a Windows Server 2003-based PPTP VPN up and running. I’m using Windows Server 2003 with Service Pack 1 for this guide. To add the …

Read More »

Contact Center Indosat IM3 akan mulai berbayar

Contact Center merupakan service channel yang paling strategis bagi perusahaan sebagai garda depan pelayanan dan akses informasi bagi pelanggan maupun non pelanggan. Untuk itu Indosat terus mengupayakan perbaikan dan pengembangan Contact Center yang berkelanjutan guna mendukung setiap penanganan komplain. Dengan semakin banyaknya telepon yang berulang (repetitive call) dan telepon yang tidak perlu (junk call, unnecessary call) yang mengakibatkan menurunnya performasi …

Read More »

Office Communications Server 2007

Installing, configuring and beginning to use Microsoft Office Communications Server. Microsoft Office Communications Server turns Office Communicator into an indispensable conferencing, VoIP and messaging tool for Windows desktop. Find out how to install, configure and begin using Office Communications Server in this hands-on introduction. Microsoft has made it clear that they want in on the action in the telecommunications sector, …

Read More »

Controlling Resource Permissions

Everyone knows that it is important to lock down the resources on the network. The resources that need to be locked down include folders and the files that are contained in them, as well as some Registry keys that are located on servers and workstations throughout the enterprise. We can’t forget those Active Directory objects that reside on domain controllers. …

Read More »

Ayahku Tukang Batu

Alkisah, sebuah keluarga sederhana memiliki seorang putri yang menginjak remaja. Sang ayah bekerja sebagai tukang batu di sebuah perusahaan kontraktor besar di kota itu. Sayang, sang putri merasa malu dengan ayahnya. Jika ada yang bertanya tentang pekerjaan ayahnya, dia selalu menghindar dengan memberi jawaban yang tidak jujur. “Oh, ayahku bekerja sebagai petinggi di perusahaan kontraktor,” katanya, tanpa pernah menjawab bekerja …

Read More »

How Do You Know Your Data Encryption is Really Secure

There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP Desktop, which can perform whole …

Read More »

Understanding E-mail Spoofing

Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from …

Read More »

Configure Exchange 2003 Server Pop connector

Author : Claus Christensen Source : http://www.servolutions.com/support/config_exchange_2003.htm Configuring your new Exchange 2003 server for internet email with POPconnector for downloading the email from POP3 mailboxes isn’t hard if you just do it step by step as shown in this configuration sample. In this guide we will step through a sample installation of Exchange 2003 for a company we will call …

Read More »

Configure Web Chaining Rules ISA Server 2006

Web Chaining Rules allow you to chain downstream ISA firewalls to upstream ISA firewalls, or even non-ISA firewall-based Web proxy servers. Web proxy chaining allows you to configure a hierarchical caching solution. In contrast, a multi-server ISA firewall array allows you to create a parallel caching solution. You can combine hierarchical and parallel caching solutions to significantly improve performance and …

Read More »