Wednesday , 22 May 2019
Breaking News

Turn on/off the firewall Windows Vista

There are cases when, for different reasons, you might need to disable or enable the Windows Vista’s firewall. In this short tutorial we will show you how this can be done. Just follow the steps described below and you will be done in no time. The easiest way to find the Windows Vista Firewall is to type the word firewall in the Start Menu search box. You will see these two results: Windows Firewall with Advanced Security and Windows Firewall. Click on the second result and the main window of Windows Firewall will open.

Read More »

Configure a Windows Server 2003 VPN on the server side

Sometimes, simplicity is the best choice for both a technology solution and the corresponding tutorial that explains how to use the new solution. In this document, I will provide a clear, concise, systematic procedure for getting a Windows Server 2003-based PPTP VPN up and running. I’m using Windows Server 2003 with Service Pack 1 for this guide. To add the Remote Access/VPN Server role, go to Start | All Programs | Administrative Tools | Configure Your Server Wizard. The first screen of this wizard is for informational purposes only and, thus, is not shown here. Click Next. The same goes for the second screen, which just tells you some things you need to have completed before adding new roles to your server. On the third screen of the wizard, entitled Server Role, you’re presented with a list of available roles for your server along with column that indicates whether or …

Read More »

Contact Center Indosat IM3 akan mulai berbayar

Contact Center merupakan service channel yang paling strategis bagi perusahaan sebagai garda depan pelayanan dan akses informasi bagi pelanggan maupun non pelanggan. Untuk itu Indosat terus mengupayakan perbaikan dan pengembangan Contact Center yang berkelanjutan guna mendukung setiap penanganan komplain. Dengan semakin banyaknya telepon yang berulang (repetitive call) dan telepon yang tidak perlu (junk call, unnecessary call) yang mengakibatkan menurunnya performasi dan layanan bagi pelanggan khususnya untuk berbicara dgn Agent Contact Centre, maka dirasakan penting untuk memberlakukan sistem pembayaran (service charging) untuk menghubungi Agent contact center. Dengan demikian pemberlakuan sistem pembayaran ini merupakan salah satu upaya untuk perbaikan dan pengembangan serta peningkatan kualitas contact center. Pelanggan yang akan dikenakan biaya adalah pelanggan yang langsung terhubung ke Agent Contact Center (Layanan Direct To Agent). Sementara pelanggan yang tersambung ke IVR (Interactive Voice Response) tidak akan dikenakan biaya (gratis). Service Charging ini akan dikenakan pada pelanggan IM3 mulai bulan Januari 2008. Nomor Akses …

Read More »

Office Communications Server 2007

Installing, configuring and beginning to use Microsoft Office Communications Server. Microsoft Office Communications Server turns Office Communicator into an indispensable conferencing, VoIP and messaging tool for Windows desktop. Find out how to install, configure and begin using Office Communications Server in this hands-on introduction. Microsoft has made it clear that they want in on the action in the telecommunications sector, and they are applying a familiar strategy: make a solution that runs on Windows, make it available en masse and for free, and then begin to displace established players in the space. OCS just happens to run on Windows—and that fact alone makes it preferable to many system administrators who have stronger data-networking skills than old-school telecom skills. But simply running on Windows is not a good enough reason to justify an enterprise’s wholesale switch to OCS from an Avaya PBX or a Cisco CallManager. Instead, OCS fills in some …

Read More »

Controlling Resource Permissions

Everyone knows that it is important to lock down the resources on the network. The resources that need to be locked down include folders and the files that are contained in them, as well as some Registry keys that are located on servers and workstations throughout the enterprise. We can’t forget those Active Directory objects that reside on domain controllers. All of these resources need to be locked down so that users that should not have access to them, can’t access them. To control the permissions on these resources, you have multiple options. Some options are more attractive than others, but a look at all options should be investigated. In order to have a decent discussion regarding resource permissions, I must clarify which resources I will attack and how the resources are protected with permissions. There are numerous resources on every network, so there is no way that I can …

Read More »

Ayahku Tukang Batu

Alkisah, sebuah keluarga sederhana memiliki seorang putri yang menginjak remaja. Sang ayah bekerja sebagai tukang batu di sebuah perusahaan kontraktor besar di kota itu. Sayang, sang putri merasa malu dengan ayahnya. Jika ada yang bertanya tentang pekerjaan ayahnya, dia selalu menghindar dengan memberi jawaban yang tidak jujur. “Oh, ayahku bekerja sebagai petinggi di perusahaan kontraktor,” katanya, tanpa pernah menjawab bekerja sebagai apa. Putri lebih senang menyembunyikan keadaan yang sebenarnya. Ia sering berpura-pura menjadi anak dari seorang ayah yang bukan bekerja sebagai tukang batu. Melihat dan mendengar ulah anak semata wayangnya, sang ayahnya bersedih. Perkataan dan perbuatan anaknya yang tidak jujur dan mengingkari keadaan yang sebenarnya membuatnya telah melukai hatinya. Hubungan di antara mereka jadi tidak harmonis. Putri lebih banyak menghindar jika bertemu dengan ayahnya. Ia lebih memilih mengurung diri di kamarnya yang kecil dan sibuk menyesali keadaan. “Sungguh Tuhan tidak adil kepadaku, memberiku ayah seorang tukang batu,” keluhnya dalam hati. …

Read More »

How Do You Know Your Data Encryption is Really Secure

There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP Desktop, which can perform whole disk, logical disk, file, and e-mail encryption. If you routinely deal with confidential or sensitive information, or if you are concerned about private information falling into someone else’s hands, encryption may be the way you want to go. However, there are a few things you should be aware of so you don’t have a false sense of security. First, What Is Data Encryption Throughout ancient and modern history people have come up with ways to mask, hide, and verify that information is secure or valid. For instance; the ancient Babylonians …

Read More »

Understanding E-mail Spoofing

Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys” is to “spoof” their return e-mail addresses, making it look as if the mail came from someone else. In effect, this is a form of identity theft, as the sender pretends to be someone else in order to persuade the recipient to do something (from simply opening the message to sending money or revealing personal information). In this article, we look at how e-mail spoofing works and what can be done about it, examining such solutions as the Sender Policy Framework (SPF) and Microsoft’s Sender ID, which is based on it. If you receive a snail mail letter, you look to the return address in the …

Read More »