Publishing Exchange Server Client Access with ISA Server should be a straightforward and easy task. Well, it isn’t. Although there are lots of resources on the Internet about the subject and Microsoft provides extensive technical documentation with more or less detailed steps, the truth is that every time I go through the process of providing access to Exchange for external …
Read More »DNS Publishing Topologies
DNS issues come up quite a bit on the ISAserver.org Web boards and mailing list. Recently there have been a flurry of questions related to DNS publishing. This spate of questions regarding DNS publishing intrigued me, since DNS publishing is a pretty straightforward process, and it’s hard to imagine that there could be many problems with the procedure. As it …
Read More »The Good, the Bad, and the horribly Ugly
I have no idea whether I’ll make it to entry #2. But the trials and tribulations of virtualizing my desktop system have been too many to chronicle in one blog post and it only seems fitting to break it up into a series of posts. I’m doing this because, for almost two years now, I’ve been extolling virtues of moving …
Read More »Do you know what’s leaking out of your browser
information seeping out of your Web browser could provide a gold mine for hackers doing reconnaissance for targeted attacks.At the ToorCon Seattle (beta) conference, Web application security specialist Robert Hansen (RSnake) demoed Mr-T (Master Recon-Tool), a new utility that combines information disclosure flaws in Internet Explorer and Firefox to collect information on a target’s computer system. For a basic idea …
Read More »How to repair an Outlook Express folder
An awful thing can happen to any Outlook Express user: you run Outlook Express and open the folder containing the necessary information just to find it empty. Outlook Express can’t read the folder and does not see your messages. It’s hard to imagine what you may feel at a moment like this. You ask yourself how to repair the Outlook …
Read More »Identify e-mails trying to steal your identity
ATTACK OF THE PHISHERS You open your in-box and find e-mail from eBay or PayPal, warning that your account has been compromised by identity thieves and that you must log on immediately to verify your information. Sounds scary, right? But here’s the really terrifying part: that e-mail is a fake, and so is the Web site it’s sending you to. …
Read More »Quick search the Web with IE 7
Internet Explorer 7’s search tool is no longer limited to Microsoft’s search engine. Now you can use it with Google, Yahoo, eBay, Wikipedia, and many others. To do this: Click the down arrow labeled Search Options, which is located at the right of the search box’s magnifying glass in the upper right corner of the screen. Click Find More Providers, …
Read More »Restoring the Vista Telnet Client
Why would Microsoft remove the good ol’ command-line telnet client from the default Windows Vista installation?!? Well, they did…but here’s how to get it back: 1. From the Start menu, click Control Panel 2. Select Programs and Features 3. From the menu of the left, select Turn Windows Features On or Off 4. Scroll down, and then check the “Telnet client” …
Read More »The Coolest Cisco Links of All
Okay, here’s my thought. I’ve got some links that I have found very handy in the Cisco world over the years…links that I typically forget about, but then someone shows me the same link months later and I get all excited about them again. Rather than continuing the cycle, I was hoping to enlist your help to create a post …
Read More »