Articles

General Networking

Securing Wireless Network Traffic (Part 5)
In this article, I am going to continue my discussion of wireless security by addressing the question of whether or not a wireless network can ever be truly secure.
[08 September 2011]
Windows Admin Tips Update
Admin Tips that help you share files within Hyper-V, customize tasks in MDT 2010, find UUID of computers, update Windows Images and secure spooled print files.
[25 August 2011]
Securing Wireless Network Traffic (Part 4)
This article continues the series on securing wireless network traffic by discussing some more of the security mechanisms that are typically built into wireless hardware.
[24 May 2011]
Windows Phone 7 on Your Network
In this article, we'll review some connectivity and security features and concerns of deploying Windows Phone 7 on your network.
[15 February 2011]
Securing Wireless Network Traffic (Part 3)
This article continues the discussion of wireless network security by examining the pros and cons of SSID broadcasting and MAC address filtering.
[04 February 2011]
Direct Memory Access
This article discusses common architectures used to implement direct memory access.
[24 January 2011]
Storage Configurations
In this article the author explains three common network storage configurations.
[19 January 2011]
Overview of Microsoft System Center product line and how it can help you
This article shows what the Microsoft System Center product line encompasses and how it can help you manage your IT Infrastructure better.
[28 December 2010]
Securing Wireless Network Traffic (Part 2)
This article continues the series on securing wireless network traffic by examining the myths surrounding the use of default access point passwords.
[23 December 2010]
Intels Hyper-Threading Technology
Taking a deep dive into multi-core CPUs and Multithreading, building up on previous articles to discuss Intel technology called Hyper-Threading.
[10 December 2010]
Understanding Windows Logon Options
Taking a deep dive into Windows logon options.
[08 December 2010]
Securing Wireless Network Traffic (Part 1)
This article series will examine various techniques for securing Wi-Fi networks. This first article in the series deals with understanding the vulnerabilities associated with wireless networks.
[01 December 2010]
Certificate Revocation Checking in Test Labs
The steps towards a few procedures you can use to simplify CRL checking in your lab environment.
[25 October 2010]
Redundant Array of Inexpensive Disks
A short description of each of the six original RAID architectures. Introducing some of the common terminology associated with RAID and computer storage in general.
[20 October 2010]
Why is FusionIO so awesome?
An overview of solid state drive technology and an explanation on how innovation (specifically Fusion IOs innovation) is reducing some of these limitations.
[27 September 2010]
Under the Hood of Group Policy
Taking a deep dive into how the Group Policy engine works.
[24 September 2010]
The Importance of Network Redundancy
An in depth view of current technology and strategies used to create redundancy in your WAN and how to properly design, implement, monitor and test in case of any disaster that may occur as well as covering briefly other redundancy options.
[30 August 2010]
Understanding Virtual Networking in Microsoft Hyper-V
Working with Hyper-V virtual networks; Taking a look at how they work and some of the key features and limitations imposed by these networks.
[25 August 2010]
Specialized Router Operating Software
Various operating systems used on network routing hardware; focussing on large-scale implementations.
[13 June 2010]
What is Dynamic Virtual Client Computing? Or, Whats the Problem with VDI and Why XP Mode is a Good Thing
Taking a look at what Dynamic Virtual Client computing is, taking a look at the problems with VDI and why XP mode is a good thing.
[26 September 2009]

All articles.

Additional Links

Search

SurfCop

SurfCop Software solution designed for internet usage monitoring and controlling internet traffic in companies that uses Microsoft ISA Server 2004/2006 or Microsoft Forefront TMG software products as corporate Internet gateway (Firewall).
more…

ISA Server Toolkit

ISA Server Toolkit Set of free tools making the work of a Microsoft ISA Server administrator easier.
more…

Internet Access Monitor

Software for monitoring the efficiency of your company's Internet bandwidth usage. Using this product you can easily find out who, when, where to, where from and what accessed the Internet. Works with Microsoft ISA Server and other proxy servers.
more…

Mail Access Monitor

Software for monitoring the efficiency of your company's mail server operations. Using this product, you can easily determine the who, when, where and amount of e-mail that has been sent. Works with Microsoft Exchange Server and other mail servers.
more…

Printer Activity Monitor

Software for monitoring your company's printers. Using this product you can easily find out who, when and how many pages have been printed.
more…

News

Printer Activity Monitor 4.0 is ready for download
[29 October 2012] Printer Activity Monitor 4.0 just released. Added support for x64 operating systems, improved Data Center stability.
SurfCop 2.1 is ready for download
[23 January 2012] SurfCop 2.1 just released. Added support of SP1 and SP2 of Microsoft Forefront TMG 2010. Added new features. Improved filters stability.
SurfCop 2.0 is ready for download
[30 October 2011] SurfCop 2.0 just released. Finally added Microsoft Forefront TMG 2010 support. Added new features. Improved filters stability.

All news

RSS

Authorization

 
Forgot your password?
Register

Subscribe

Subscribe to company news