Monday , 20 May 2024
Breaking News

Office Communications Server 2007

Installing, configuring and beginning to use Microsoft Office Communications Server. Microsoft Office Communications Server turns Office Communicator into an indispensable conferencing, VoIP and messaging tool for Windows desktop. Find out how to install, configure and begin using Office Communications Server in this hands-on introduction. Microsoft has made it clear that they want in on the …

Read More »

Controlling Resource Permissions

Everyone knows that it is important to lock down the resources on the network. The resources that need to be locked down include folders and the files that are contained in them, as well as some Registry keys that are located on servers and workstations throughout the enterprise. We can’t forget those Active Directory objects that reside on domain controllers. All of these resources need to be locked down so that users that should not have access to them, can’t access them. To control the permissions on these resources, you have multiple options. Some options are more attractive than others, but a look at all options should be investigated. In order to have a decent discussion regarding resource permissions, I must clarify which resources I will attack and how the resources are protected with permissions. There are numerous resources on every network, so there is no way that I can …

Read More »

Ayahku Tukang Batu

Alkisah, sebuah keluarga sederhana memiliki seorang putri yang menginjak remaja. Sang ayah bekerja sebagai tukang batu di sebuah perusahaan kontraktor besar di kota itu. Sayang, sang putri merasa malu dengan ayahnya. Jika ada yang bertanya tentang pekerjaan ayahnya, dia selalu menghindar dengan memberi jawaban yang tidak jujur. “Oh, ayahku bekerja sebagai petinggi di perusahaan kontraktor,” katanya, tanpa pernah menjawab bekerja sebagai apa. Putri lebih senang menyembunyikan keadaan yang sebenarnya. Ia sering berpura-pura menjadi anak dari seorang ayah yang bukan bekerja sebagai tukang batu. Melihat dan mendengar ulah anak semata wayangnya, sang ayahnya bersedih. Perkataan dan perbuatan anaknya yang tidak jujur dan mengingkari keadaan yang sebenarnya membuatnya telah melukai hatinya. Hubungan di antara mereka jadi tidak harmonis. Putri lebih banyak menghindar jika bertemu dengan ayahnya. Ia lebih memilih mengurung diri di kamarnya yang kecil dan sibuk menyesali keadaan. “Sungguh Tuhan tidak adil kepadaku, memberiku ayah seorang tukang batu,” keluhnya dalam hati. …

Read More »

How Do You Know Your Data Encryption is Really Secure

There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP Desktop, which can perform whole disk, logical disk, file, and e-mail encryption. If you routinely deal with confidential or sensitive information, or if you are concerned about private information falling into someone else’s hands, encryption may be the way you want to go. However, there are a few things you should be aware of so you don’t have a false sense of security. First, What Is Data Encryption Throughout ancient and modern history people have come up with ways to mask, hide, and verify that information is secure or valid. For instance; the ancient Babylonians …

Read More »

Understanding E-mail Spoofing

Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it, examining such solutions as the Sender Policy Framework (SPF) and Microsoft’s Sender ID, which is based on it. If you receive a snail mail letter, you look to the return address in the …

Read More »

Configure Exchange 2003 Server Pop connector

Author : Claus Christensen Source : http://www.servolutions.com/support/config_exchange_2003.htm Configuring your new Exchange 2003 server for internet email with POPconnector for downloading the email from POP3 mailboxes isn’t hard if you just do it step by step as shown in this configuration sample. In this guide we will step through a sample installation of Exchange 2003 for a company we will call “Mycompany”. Mycompany consequently owns the internet domain name “mycompany.com”. Actually it only takes these four steps: Adding your internet domain name to the recipient policies Configuring the SMTP server for inbound email Adding a SMTP Connector for outbound emails Configuring the email addresses of your users And this is how to configure the Exchange Server to accept email for mycompany.com and work with POPcon: First install the software from CD. You may have to go back to the “Add/remove Software” utility in the control panel to add NNTP support if …

Read More »

Configure Web Chaining Rules ISA Server 2006

Web Chaining Rules allow you to chain downstream ISA firewalls to upstream ISA firewalls, or even non-ISA firewall-based Web proxy servers. Web proxy chaining allows you to configure a hierarchical caching solution. In contrast, a multi-server ISA firewall array allows you to create a parallel caching solution. You can combine hierarchical and parallel caching solutions to significantly improve performance and reduce the total amount of bandwidth used on Internet links, WAN links, and even on the intranet. The most popular use for Web Chaining is to chain branch office ISA firewalls with main office ISA firewalls. This has several advantages: Content requested from all branch offices and the main office is cached on the main office ISA firewall array. This reduces overall Internet link bandwidth utilization Content requested from each branch office is cached on the local ISA firewall array. This reduces bandwidth utilization on the branch office WAN and/or …

Read More »

Packet fragmentation VS Intrusion Detection System (IDS)

Intrusion Detection Systems (IDS) have long had a problem with packet fragmentation. This was true five years ago and it is still a problem today. For years the IDS has suffered from several key ailments. Chief amongst them is in how they deal with packet fragmentation. There has been great progress made over the years in how an IDS will deal with packet reassembly, however the problem still remains. Over the past years IDS vendors have grown smarter when it comes to packet fragmentation, and how their IDS’s reassemble these fragments. During the course of this series I will use the following tools: Fragrouter Metasploit Framework Snort tcpdump.exe

Read More »