Alkisah, sebuah keluarga sederhana memiliki seorang putri yang menginjak remaja. Sang ayah bekerja sebagai tukang batu di sebuah perusahaan kontraktor besar di kota itu. Sayang, sang putri merasa malu dengan ayahnya. Jika ada yang bertanya tentang pekerjaan ayahnya, dia selalu menghindar dengan memberi jawaban yang tidak jujur. “Oh, ayahku bekerja sebagai petinggi di perusahaan kontraktor,” katanya, tanpa pernah menjawab bekerja …
Read More »How Do You Know Your Data Encryption is Really Secure
There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP Desktop, which can perform whole …
Read More »Understanding E-mail Spoofing
Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys†is to “spoof†their return e-mail addresses, making it look as if the mail came from …
Read More »Configure Exchange 2003 Server Pop connector
Author : Claus Christensen Source : http://www.servolutions.com/support/config_exchange_2003.htm Configuring your new Exchange 2003 server for internet email with POPconnector for downloading the email from POP3 mailboxes isn’t hard if you just do it step by step as shown in this configuration sample. In this guide we will step through a sample installation of Exchange 2003 for a company we will call …
Read More »Configure Web Chaining Rules ISA Server 2006
Web Chaining Rules allow you to chain downstream ISA firewalls to upstream ISA firewalls, or even non-ISA firewall-based Web proxy servers. Web proxy chaining allows you to configure a hierarchical caching solution. In contrast, a multi-server ISA firewall array allows you to create a parallel caching solution. You can combine hierarchical and parallel caching solutions to significantly improve performance and …
Read More »Packet fragmentation VS Intrusion Detection System (IDS)
Intrusion Detection Systems (IDS) have long had a problem with packet fragmentation. This was true five years ago and it is still a problem today. For years the IDS has suffered from several key ailments. Chief amongst them is in how they deal with packet fragmentation. There has been great progress made over the years in how an IDS will …
Read More »HACK your cell phone! Get free internet
Enabling SSL OWA 2003 using Certificate Authority
Why spend money on a 3rd party SSL certificate, when you can create your own for free? In this article I will show you step by step how you create your own SSL Certificate, which among other things is needed in order to properly secure Outlook Web Access on your Exchange 2003 Server. The first thing to do is to …
Read More »Managing Routing And Remote Access in Windows Server 2003
Windows Server 2003 provides the ability to act as a router on your network and to provide remote access services to users outside your network. Routing And Remote Access (RRAS) in Windows Server 2003 provides VPN, routing, NAT, dialup and basic firewall services. Here’s how to use and configure these services. Getting started To get started, open up the Routing …
Read More »