Breaking News

Microsoft Plugs Critical Vista Hole

Microsoft has just patched another critical hole in Vista that it knew about as long ago as last Christmas. The delay was similar to its lag in patching the serious (and heavily targeted) animated-cursor flaw I told you about last month. The new problem involves the way that the OS’s Client/Server Run-time Subsystem (CSRSS) handles error messages, and it affects …

Read More »

Configuring Exchange Server 2007 Preview – Disaster Recovery with Exchange Server 2007

Disaster Recovery with Exchange Server 2007 Solutions in this chapter: Backing Up Exchange 2007 Using Windows 2003 Backup Restoring Exchange 2007 Storage Groups and Databases Using Windows 2003 Backup Repairing a Corrupt or Damaged Exchange 2007 Database Using Eseutil Restoring Mailbox Data Using the Recovery Storage Group Feature Recovering an Exchange 2007 Server Using the RecoverServer Switch Recovering an Exchange …

Read More »

Microsoft Invites Hackers Back for Blue Hat

Microsoft’s latest Blue Hat conference kicked off with talks on mobile security, hardware hacking, and Windows security tools Microsoft Corp. is once again inviting members of the hacking community into its Redmond, Washington, campus to show the software giant where it’s gone wrong. The company’s latest Blue Hat conference kicked off Wednesday with talks on mobile security, hardware hacking, Microsoft’s …

Read More »

Configuring the ISA Server 2006 HTTP Filter

In this article I will give you a high level overview of the ISA Server 2006 HTTP Filter. I will show how to use this HTTP Filter to protect your internal network from some types of attacks in Webserver Publishing scenarios. We will also see how to prevent users from using the Universal Firewall Bypass protocol (HTTP) to bypass the …

Read More »

The Greenest Laptop on the Planet

The One Laptop Per Child non-profit headed up by MIT’s Nicholas Negroponte is coming up against its self-imposed deadline of May 31 to secure three million orders for its little green computers.  Lots of developing countries have shown interest, but none have yet signed on the dotted line.  In a 60 Minutes segment, Negroponte accuses Intel of trying to scuttle …

Read More »

MENGHUKUM DIRI SENDIRI

Suatu ketika, Raden Permadi didatangi sekelompok “orang kampung” dalam keadaan cemas. Kelompok orang tersebut minta pertolongan sang ksatria untuk menumpas sekawanan perampok yang sedang merajalela di kampungnya. Terdorong rasa kemanusiaan yang mendalam, apalagi mentaati posisinya sebagai penjaga ketentraman, Raden Permadi tanpa pikir masuk ke gudang senjata, mengambil panah sebagai sarana untuk menghadapi pengacau. Betapa terkejutnya dia, karena didapati kakaknya, Raden …

Read More »

Menggunakan Software Legal, Sudah Siapkah Kita?

“Migrasi ke opensource” yach kata ini ini yang sering terdengar oleh kita jika menemui seputar polemik dalam pemilihan atau penggunaan sistem operasi yang akan digunakan di warnet, instansi baik swasta maupun pemerintah dan untuk keperluan pribadi. Antara menggunakan Windows atau Linux (Opensource), antara ramai atau sepi, untung atau rugi? Bagi user atau pemakai menggunakan windows merupakan hal yang baru karena …

Read More »

Apa yang salah dengan Windows Vista?

Windows Vista adalah langkah besar menuju kemunduran kebebasan anda. Biasanya, software baru memberikan kebebasan untuk melakukan sesuatu yang lebih dengan komputer anda. Vista didisain untuk membatasi apa yang dapat anda lakukan. Vista memaksakan bentuk baru dari DRM (Digital Rights Management). DRM ini lebih tepat disebut Digital Restrictions Management, karena dengan teknologi ini perusahaan besar mencoba untuk menekan kita semua, dengan …

Read More »

Inside Windows Vista User Account Control

UAC’s Goal UAC is meant to enable users to run with standard user rights, as opposed to administrative rights. Administrative rights give users the ability to read and modify any part of the operating system, including the code and data of other users—and even Windows® itself. Without administrative rights users cannot accidentally (or deliberately) modify system settings, malware can’t alter …

Read More »