The killer app for Mac is now even better than ever
Parallels Desktop for Mac enables you to run Windows, Linux, and more side-by-side with Mac OS X on any Intel-powered Mac, without rebooting. With Parallels’ award-winning virtualization technology, you can run Mac OS X and your favorite Windows applications at the same time. You can even drag-and-drop files between desktops! Leading the way with our trademark innovation, the latest release …
Read More »Iptables to specify a range of IP addresses or ports
Someone recently asked me a question: How can I save time and script size by specifying a range of IP addresses or ports using iptables? In old version of iptables IP address ranges are only valid in the nat table (see below for example). However newer version does support option that allows you to specify a range of IP addresses …
Read More »Setup a transparent proxy with Squid in three easy steps
I got a chance to play with Squid and iptables. My job was simple : Setup Squid proxy as a transparent server. Main benefit of setting transparent proxy is you do not have to setup up individual browsers to work with proxies. System: HP dual Xeon CPU system with 8 GB RAM (good for squid). Eth0: IP:192.168.1.1 Eth1: IP: 192.168.2.1 …
Read More »The Long-Term Impact of User Account Control
The problem with running as an administrator is obvious: any malware that attacks users, or the applications they run, will have full control over 90 percent of the computers it infects. The User Account Control (UAC) feature in Windows Vista is the Microsoft solution to a pervasive security challenge—the fact that over 90 percent of users currently on the Windows …
Read More »The “De-perimeterization†of Networks
The architecture of the network perimeter is changing. The wisdom of the past was to harden the perimeter as much as possible by layering multiple technologies to detect and protect against threat. The concept was to secure organizational borders and then, after that, the network. There were various business drivers that put this “perimeterization†in sync with the needs of …
Read More »Fundamental Computer Investigation Guide For Windows
Internet connectivity and technological advances expose computers and computer networks to criminal activities such as unauthorized intrusion, financial fraud, and identity and intellectual property theft. Computers can be used to launch attacks against computer networks and destroy data. E-mail can be used to harass people, transmit sexually explicit images, and conduct other malicious activities. Such activities expose organizations to ethical, …
Read More »Step-by-Step Guide to Getting Started with Microsoft Windows Server Update Services 3.0
Microsoft Windows Server Update Services (WSUS) 3.0 provides a comprehensive solution for managing updates within your network. This document provides instructions for basic tasks for deploying WSUS 3.0 on your network. Use this guide to perform the following tasks: Install WSUS 3.0. Configure WSUS 3.0 to obtain updates from Microsoft. Configure client computers to install updates from WSUS 3.0. Approve, …
Read More »File and Printer Sharing in Windows Vista
Microsoft® Windows Vistaâ„¢ has made some important changes to the way that file and printer sharing works. This article describes the changes and provides step-by-step instructions for sharing files and printers and connecting to shared files and printers from a computer running Windows Vista for a small-office or home office network that does not use the Active Directory® domain service. …
Read More »
SON SON