Technology Made Simple
Sunday April 23rd 2017

Insider

Archives

‘Server 2003’ Archives

Windows Security Best Practices

Windows Security Best Practices

In todays age, you can not be too secure when it comes to your network it's better to be safe than sorry.  In the current economy I've seen many companies consolidate jobs and add new burden to already over-burdened admins.  One of the places where this will hurt companies is the network security departments. I've learned many security faux [...]

Q&A Monday: USB Printer in DOS

Q&A Monday:  USB Printer in DOS

Question: I currently have a legacy software at my current job that runs in DOS and have printed to a printer that was connected via parallel cable.  Recently that printer has bit the dust and I bought a new USB printer to replace it, but now the program wont print, but the printer works in Windows, please help. Answer: This is a common [...]

Effectively Erasing Files

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that's the end of it.  It's not just individuals, companies can also fall into this trap.  Just selecting delete does not mean that the [...]

Q&A Monday: Increase Simultaneous Downloads

Question: Because of my job I spent a lot of time downloading files from the internet, my productivity is killed by the simultaneous download limit in Windows.  Is there anyway to work around this limit or a nifty program that will let me easily download more? Joseph James Dallas, TX Answer: Now I have tried many programs that [...]

Security Alert: Shortcut file Vulnerability

Security Alert:  Shortcut file Vulnerability

This vulnerability is due to the failure of Microsoft Windows to properly obtain icons for LNK files. Microsoft uses LNK files, commonly referred to as "shortcuts," as references to files or applications. By convincing a user to display a specially-crafted LNK file, an attacker may be able to execute arbitrary code that would give the attacker [...]

Q&A Monday: Block Sites from Computer

Q&A Monday: Block Sites from Computer

Question: Hey Jim hope your doing well and having a good summer! I need a little help. My daughter has autism and she loves Youtube. However, some of the things on youtube are very disturbing. Is there anyway we can totally block Youtube from our computers? Media, Pa Answer: There is a simple an easy way to block sites from a computer, the [...]

Update Tuesday: July 13th 2010

Update Tuesday: July 13th 2010

    There wasn’t a huge amount of updates this month from Microsoft, but be aware that some of the problems being patched this month, were from publically reported exploits, so you want to make sure you get your updates applied as soon as you can. Update: KB2229593 -  Type: Critical (XP) and Low (2003) What is does: This is a fix that [...]

Enable RDP via Registry

Enable RDP via Registry

There may be times where a server is in a co-location and you forget to turn on Remote desktop on, there is a way to get RDP on a server just by making a change to the registry.  Either remotely connect to the server’s registry or make a batch script then will run when the server reboots.  As long as no firewall is enabled. The registry [...]

Top 5: Most overlooked configuration items

Top 5: Most overlooked configuration items

No matter how prepared and how well documented the network is, sometimes techs forget some basic configurations sometimes.  It’s never intentional, but sometimes there are small configurations that we just need to double check.  Below is a list of some things that I’ve seen (and have) forgotten to double check when doing a [...]

Best Practices for Password Policy

Best Practices for Password Policy

I’ve seen a lot of different companies send out a secure password when a user starts out, but when the user changes their password, they may make it something less secure.  That’s why I thought I’d go over some of the configurable Group Policy Settings with some of the best practices for password settings.  I feel like I need to mention [...]

 Page 1 of 3  1  2  3 »