Wednesday , 21 August 2019
Breaking News

10 tips home wireless security settings

1. ENABLE WIRELESS ENCRYPTION Enabling Wireless encryption is essential otherwise every one within your Radio Frequency (RF) range (and remember the Wireless network world record distance is 125 miles!), at best can capture your traffic compromising surfing habits, gathering usernames and passwords and at worst sharing illegal images or hacking over your Wireless network for …

Read More »

How to bypass Web Proxy service in ISA Server 2004 or 2006

In ISA Server 2006 or in ISA Server 2004, client Web requests are handled by the Web Proxy filter. This filter works at the application level on behalf of clients residing in networks that are behind an ISA Server-based server that requests HTTP and Secure Hypertext Transfer Protocol (HTTPS) objects. Web proxy client requests from client computers that have ISA Server specified as a proxy server in the browser settings are passed to the Web proxy filter.

Read More »

Firefox 3 to get a Visual Refresh

The Mozilla team is working really hard to make sure that Firefox 3 will be the best browser we will ever see on this planet. Part of the plan is to enhance the UI of Firefox to make sure it blends with the host OS. Firefox 3 will come out with inbuilt skins that will integrate completely with Windows Vista, OS X and Linux. The Mozilla team posted some screenshots on what we can expect, and here the screenshots of the theme for Vista and OS X in action :

Read More »

Recovering Mailboxes with Exchange Server 2003

If you would like to recover a single mailbox on your production Exchange Server 2003 you are able to do so. You just have to add and configure the fifth storage group on your server – known as Recovery Storage Group and you will not have to configure your separate recovery server in an isolated forest as you had to do with Exchange 2000 Server. You can create this storage group using your Exchange System Manager as seen in the following screen shot. Figure 1: Creating the Recovery Storage Group

Read More »

Exchange Server 2003 Mailbox Recovery

If an administrator has deleted a user and with that its mailbox and within 30 days (by default) he discovers that this mailbox should not have been deleted, there is an easy way to reconnect the orphaned mailbox to a new user. The time line for not deleting an unconnected mailbox from the storage is 30 days by default and can be increased using a private storage system policy. The administrator can have a look into the private storage of the private storage where he will find all orphaned mailboxes with a red cross. The cleanup agent is the piece of software that regularly scans all mailboxes and checks, if there is a connection between a user object in Active Directory and a mailbox in the private information store. If there is not, it marks the mailbox for deletion. The retention time for the tombstoned mailbox now begins to run. …

Read More »

Microsoft Search Server 2008 Express

Today Microsoft announced two new search servers: Microsoft Search Server 2008 and Microsoft Search Server 2008 Express. The interesting one is the Express version, since it’s free. A download is available warning: it’s beta software, although Microsoft says it’s close to final at www.microsoft.com/enterprisesearch/ Furthermore, the only difference between it and Search Server is that Search Server can be run on multiple servers for load balancing. This announcement is a game-changer, in terms of Microsoft’s relation to its arch competitor, Google, as well as the market in general. In several calls I had with reporters, I was asked, “Is this Microsoft playing catch up to the Google Search Appliance?” Sort of, but with a twist — while Microsoft is not offering a search appliance itself, it certainly expects its partners to do so. Interestingly, the Microsoft offering is more nuanced than the Google Search Appliance. The Google appliance pretty much …

Read More »

How to becaming IT Professional

Launching a new career, whether you’re just coming out of college or moving from another professional field, is daunting in itself. Combine that with moving into the technology industry, where everything seems to change every day, and the career aspiration can be viewed as both challenging and exciting. The key to career success is finding your niche and establishing career goals to strive for and accomplish. Today’s tech experts, whether it’s the help desk support team or the gurus designing advanced wireless networks, are playing critical roles in business. They are helping to expand the business, drive company efficiency and boost and enhance every aspect of a company. Along with the metamorphosis of the IT role in business, the continuing development and deployment of new technologies is creating new career roles as well. With the advent of the Web and e-commerce, the continual growth in communication capabilities and related networking …

Read More »

3 ways to protect your laptop on the road

The newest laptops are powerful, light, and thin enough to fit easily into the slenderest of carry-on baggage. This makes them a great accessory for flying or any other mode of travel, but also easier to lose or have stolen.It pays to be extra vigilant at airport security checkpoints where thieves know people can be flustered. You should also store your laptop in the seat in front of you, instead of in the overhead compartment when you fly. But even if you’re extra careful, it’s still possible to lose your laptop. If you spend some time securing your laptop before you go on the road, you could help keep your personal or financial information from falling into the wrong hands. Here are our top tips to help you secure the information on your laptop. Protect your information If you keep a lot of personal or financial information on your computer, …

Read More »

How to reset your password in windows vista

After you install Windows Vista on your PC or you change the password of your user account, it is a good idea to create a password reset disk. This disk will be of great help if you forget your password for some reason. In this tutorial we will show you how to create such a disk and how to reset your password when needed. How to create the password reset disk In the Start Menu search box type the word “user”. One of the displayed results will be User Accounts. Click on it and the User Accounts Panel will open.

Read More »