Breaking News

Using a Cisco Router as a DNS Server

The folks over at NIL have put together an excellent article on using a Cisco router as a central DNS server for your organization. They also include a new feature called DNS Views – it allows you to configure your Cisco router for split-DNS: giving private addresses to servers accessible to internal users but public addresses to anyone else asking …

Read More »

Keep Organized Crime out of Your Network

A couple of months ago we looked at the trend toward serious IT security breaches and organized crime’s involvement in those breaches. It’s estimated that the majority of these serious security breaches are coming about because of organized criminal activity – and yes, the Mafia is getting involved. In the original article we covered scams ranging from petty spam threats …

Read More »

10 Tips Security

Keamanan (security) merupakan masalah yang cukup penting dalam era informasi elektronik ini. Berikut ini adalah sepuluh (10) saran untuk meningkatkan keamanan di tempat anda. Gunakan password yang kuat. Paling sedikit gunakan delapan (8) karakter dan menggunakan karakter yang bukan huruf seperti contohnya: j&%9Hx. Jangan menggunakan katakata yang ada di dalam kamus atau merupakan bagian dari nama anda, nama perusahaan, dan …

Read More »

Konsep Subnetting

Subnetting adalah termasuk materi yang banyak keluar di ujian CCNA dengan berbagai variasi soal. Juga menjadi momok bagi student atau instruktur yang sedang menyelesaikan kurikulum CCNA 1 program CNAP (Cisco Networking Academy Program). Untuk menjelaskan tentang subnetting, saya biasanya menggunakan beberapa ilustrasi dan analogi yang sudah kita kenal di sekitar kita. Artikel ini di tulis untuk rekan-rekan yang sedang belajar jaringan, …

Read More »

Opening New Worlds for Everyone

Microsoft began with a dream of a PC on every desk and in every home. Thirty years ago this seemed impossible. Today, for the more than one billion people we’ve reached, life has changed profoundly. But for more than five billion people, the opportunity to learn, connect, create, and succeed remains elusive.”All human beings deserve a chance to achieve their …

Read More »

Insiden Laptop Meledak Terjadi Lagi

Insiden laptop meledak kembali terjadi. Kali ini mendera Toshiba, yang tahun lalu pernah menarik baterai laptopnya. Toshiba pun mendesak pelanggannya untuk segera mengganti baterai mereka menyusul meledaknya satu laptop Toshiba. Sayangnya Toshiba tidak merinci tipe laptop apa yang meledak tersebut. Pastinya, baterai tersebut adalah baterai buatan Sony. Vendor komputer yang berbasis di Tokyo itu hanya mengatakan bahwa insiden terbakarnya laptop …

Read More »

4 Security Technologies Every IT Organization Must Have

When it comes to IT security, most enterprises really have roughly the same issues to deal with. Microsoft is no exception. We spent two years on the Risk Management and Compliance team in The Risk Management and Compliance team is charged with defining, monitoring, and correcting the risk posture of all MMS environments (for both customer-facing services and infrastructure coordination). …

Read More »

Exploring The Windows Vista Firewall

Back in the days of the paleocomputing era, no one ever thought about installing firewalls on individual computers. Who needed to? Hardly anyone had heard of the Internet, TCP/IP was nowhere in sight, and LAN protocols didn’t route beyond your building or campus. Important data lived on the mainframe or file servers—the information people kept on their desktop computers was …

Read More »

Monitoring Active Directory with MOM

Management packs are the life-blood of Microsoft Operations Manager (MOM) 2005 and are what differentiate it from other management products. MOM uses management packs to put rules, reports, tasks, and views together and can be limited in scope to a specific application or service, such as Active Directory. Microsoft product teams create the management packs for the applications they develop, …

Read More »