Technology Made Simple
Friday October 15th 2021

Insider

Archives

‘Server 2003’ Archives

Windows Security Best Practices

Windows Security Best Practices

In todays age, you can not be too secure when it comes to your network it's better to be safe than sorry.  In the current economy I've seen many companies consolidate jobs and add new burden to already over-burdened admins.  One of the places where this will hurt companies is the network security departments. I've learned many security faux [...]

Effectively Erasing Files

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that's the end of it.  It's not just individuals, companies can also fall into this trap.  Just selecting delete does not mean that the [...]

Q&A Monday: Increase Simultaneous Downloads

Question: Because of my job I spent a lot of time downloading files from the internet, my productivity is killed by the simultaneous download limit in Windows.  Is there anyway to work around this limit or a nifty program that will let me easily download more? Joseph James Dallas, TX Answer: Now I have tried many programs that [...]

Security Alert: Shortcut file Vulnerability

Security Alert:  Shortcut file Vulnerability

This vulnerability is due to the failure of Microsoft Windows to properly obtain icons for LNK files. Microsoft uses LNK files, commonly referred to as "shortcuts," as references to files or applications. By convincing a user to display a specially-crafted LNK file, an attacker may be able to execute arbitrary code that would give the attacker [...]

Q&A Monday: Block Sites from Computer

Q&A Monday: Block Sites from Computer

Question: Hey Jim hope your doing well and having a good summer! I need a little help. My daughter has autism and she loves Youtube. However, some of the things on youtube are very disturbing. Is there anyway we can totally block Youtube from our computers? Media, Pa Answer: There is a simple an easy way to block sites from a computer, the [...]

Update Tuesday: July 13th 2010

Update Tuesday: July 13th 2010

    There wasn’t a huge amount of updates this month from Microsoft, but be aware that some of the problems being patched this month, were from publically reported exploits, so you want to make sure you get your updates applied as soon as you can. Update: KB2229593 -  Type: Critical (XP) and Low (2003) What is does: This is a fix that [...]

Enable RDP via Registry

Enable RDP via Registry

There may be times where a server is in a co-location and you forget to turn on Remote desktop on, there is a way to get RDP on a server just by making a change to the registry.  Either remotely connect to the server’s registry or make a batch script then will run when the server reboots.  As long as no firewall is enabled. The registry [...]

Top 5: Most overlooked configuration items

Top 5: Most overlooked configuration items

No matter how prepared and how well documented the network is, sometimes techs forget some basic configurations sometimes.  It’s never intentional, but sometimes there are small configurations that we just need to double check.  Below is a list of some things that I’ve seen (and have) forgotten to double check when doing a [...]

Best Practices for Password Policy

Best Practices for Password Policy

I’ve seen a lot of different companies send out a secure password when a user starts out, but when the user changes their password, they may make it something less secure.  That’s why I thought I’d go over some of the configurable Group Policy Settings with some of the best practices for password settings.  I feel like I need to mention [...]

Microsoft Security Updates: June 8th 2010

Microsoft Security Updates: June 8th 2010

Security Updates Update: MS10-032/KB979559 Type: Important Affected Systems: 2000, XP, 2003, Vista, 7, 2008, 2008 R2 What it does: A trio of bugs in the Windows kernel can allow the use of malformed fonts to allow escalation of privileges attacks. It would be a bit hard to sneak a font onto the system without some sort of install privileges [...]

 Page 1 of 3  1  2  3 »