Online auctions are more popular than ever, enabling users to find everything from collectibles to car parts. Most auction transactions go smoothly. Auction fraud, however, is also more prevalent. You can choose LifeLock.com (Promotion Code) to be pro-active in protecting your identity and personal information. Simply reacting to identity theft isn’t enough anymore. Too many thieves have found out this …
Read More »10 tips home wireless security settings
1. ENABLE WIRELESS ENCRYPTION Enabling Wireless encryption is essential otherwise every one within your Radio Frequency (RF) range (and remember the Wireless network world record distance is 125 miles!), at best can capture your traffic compromising surfing habits, gathering usernames and passwords and at worst sharing illegal images or hacking over your Wireless network for which you are legally responsible. …
Read More »How to bypass Web Proxy service in ISA Server 2004 or 2006
In ISA Server 2006 or in ISA Server 2004, client Web requests are handled by the Web Proxy filter. This filter works at the application level on behalf of clients residing in networks that are behind an ISA Server-based server that requests HTTP and Secure Hypertext Transfer Protocol (HTTPS) objects. Web proxy client requests from client computers that have ISA …
Read More »Firefox 3 to get a Visual Refresh
The Mozilla team is working really hard to make sure that Firefox 3 will be the best browser we will ever see on this planet. Part of the plan is to enhance the UI of Firefox to make sure it blends with the host OS. Firefox 3 will come out with inbuilt skins that will integrate completely with Windows Vista, …
Read More »Recovering Mailboxes with Exchange Server 2003
If you would like to recover a single mailbox on your production Exchange Server 2003 you are able to do so. You just have to add and configure the fifth storage group on your server – known as Recovery Storage Group and you will not have to configure your separate recovery server in an isolated forest as you had to …
Read More »Exchange Server 2003 Mailbox Recovery
If an administrator has deleted a user and with that its mailbox and within 30 days (by default) he discovers that this mailbox should not have been deleted, there is an easy way to reconnect the orphaned mailbox to a new user. The time line for not deleting an unconnected mailbox from the storage is 30 days by default and …
Read More »Microsoft Search Server 2008 Express
Today Microsoft announced two new search servers: Microsoft Search Server 2008 and Microsoft Search Server 2008 Express. The interesting one is the Express version, since it’s free. A download is available warning: it’s beta software, although Microsoft says it’s close to final at www.microsoft.com/enterprisesearch/ Furthermore, the only difference between it and Search Server is that Search Server can be run …
Read More »How to becaming IT Professional
Launching a new career, whether you’re just coming out of college or moving from another professional field, is daunting in itself. Combine that with moving into the technology industry, where everything seems to change every day, and the career aspiration can be viewed as both challenging and exciting. The key to career success is finding your niche and establishing career …
Read More »3 ways to protect your laptop on the road
The newest laptops are powerful, light, and thin enough to fit easily into the slenderest of carry-on baggage. This makes them a great accessory for flying or any other mode of travel, but also easier to lose or have stolen.It pays to be extra vigilant at airport security checkpoints where thieves know people can be flustered. You should also store …
Read More »
SON SON