Category: How To
-
How to configure Public Key Infrastructures
In today’s article we will discuss implementing a PKI (Public Key Infrastructure) on a Windows Server 2008. The PKI will be used to authenticate wireless users. Note that the steps indicated here can also be applied to Windows Server 2012 versions. Before proceeding to the actual practice example, we’ll have to get acquainted with the […]
-
3 Signs that Your Server Needs Upgrading
A company server failing can be disastrous, especially if it’s a web server and one that generates sales for the company, but it’s equally damaging if it’s an intranet server, as the cost to the business could prove to be massive. Server failure can lead to downtime for the entire business; if employees can’t access […]
-
Dell PowerEdge 2950: Quieting the Loud Fans! Part 2
Cont’d from Dell PowerEdge 2950 Server: Quieting the Loud Fans! When you have successfully placed the shrink tubes and soldered all the wires together, you should have something similar to the picture below now. You are now ready to fire up the grill lighter and shrink the tubes in place. Heating […]
-
3 Signs Your Web Server’s Security has been Compromised – Part 2
Code Project Cont’d from “3 Signs that your Web Server’s Security has been Compromised” #2: Check-out the Admin Interfaces Most web applications have some sort of administrative interface. These can be used as an ideal way of allowing hackers into your system. Hackers are often able to manipulate any inherent weaknesses when it comes to […]
-
Preparing a Disaster Recovery Plan for your Business – Cont’d
…cont’d from “How to Prepare a Disaster Recovery Plan (DRP) for your Business” Gaining Board Approval If the person compiling the DRP is not the owner of the business, then the owner’s approval and consent must be sought and gained. Whilst the IT professional will take into account all of the operational issues, things like […]
-
How to Prepare a Disaster Recovery Plan (DRP) for your Business
In the same way that formulating a business plan is essential when thinking of starting up a new business, formulating a disaster recovery plan (DRP) is essential once your IT infrastructure is in place, especially if you deal with data that requires auditing (such as customer credit card details, for example). The Basic Steps in […]
-
How to Choose the Best Antivirus Software for Your Situation
The Internet is littered with malware, viruses, trojans and other malicious pieces of software that could really ruin your day. That means it doesn’t matter if you’re a gamer or someone who uses an old family PC for browsing the web and checking email, you still need some sort of antivirus to keep yourself safe. […]
-
How Monitoring Software can Help to Protect Against CryptoLocker
If you spend a lot of time online, are pretty tech savvy or are in the technology sector, then there’s little doubt that you’ve come across the term ransomware here and there. In a nutshell, ransomware is a type of malware that infects a computer and effectively puts up a lock screen that holds the […]
-
3 Signs Your Web Server’s Security has been Compromised
More than ever, businesses have to be careful of attacks on servers and business networks to ensure that their data, and that of their customers’, are fully protected. This is especially true of sensitive data such as credit card and personal details, especially as a failure to protect this could incur a hefty fine when […]
-
Fixing a Buffalo LS-QV4.0TL/R5 NAS
We got a little NAS device to play around with, do some back ups to, etc. The Buffalo LS-QV4.0TL/R5 comes with 4 x 1TB drives, but we wanted some more space, so we replaced the 1TB drives with 2TB drives. Mistake 🙁 It turns out the OS is on those drives (duh!). What you’ll see […]