Archive

Get Ready for the Intruder

by November 11, 2003

Security is not about simply investing in equipment; it’s about putting in a security life cycle that’s driven by your business needs

Read More [shareaholic app="share_buttons" id="15671367"]

After an Attack

by November 11, 2003

If your network has been hacked, first isolate the affected machine

Read More [shareaholic app="share_buttons" id="15671367"]

An Ideal Security Policy

by November 11, 2003

There is no one-size-fits-all security policy. To help you draft one that suits your organization, we have given a template that you can use 

Read More [shareaholic app="share_buttons" id="15671367"]

Do’s and Don’ts for Users

by November 11, 2003

We have created an Acceptable Usage Policy for the Internet and e-mail usage. On its basis, you can create one for your organization

Read More [shareaholic app="share_buttons" id="15671367"]

Internal Security 

by November 11, 2003

Creating and deploying Group Policies in Windows networks

Read More [shareaholic app="share_buttons" id="15671367"]

Prevent attacks On your Enterprise Network 

by November 11, 2003

Network security starts with educated users and a good security policy. Contrary to what many people think, investment in security equipment comes in only next

Read More [shareaholic app="share_buttons" id="15671367"]

Linux Firewalls

by November 10, 2003

Setting up three popular Linux firewall distributions

Read More [shareaholic app="share_buttons" id="15671367"]

Block Kazaa 

by November 10, 2003

Use a Linux-based firewall to block the most popular peer-to-peer file-sharing app from doing heavy downloads from the Internet

Read More [shareaholic app="share_buttons" id="15671367"]

Catch the Intruder

by November 10, 2003

Use an IDS to analyze and respond to possible intrusions

Read More [shareaholic app="share_buttons" id="15671367"]

Your Own Firewall

by November 10, 2003

You could buy a hardware or software firewall or build one as we did using open-source software 

Read More [shareaholic app="share_buttons" id="15671367"]

Patch Management 

by November 10, 2003

Manage and distribute Windows patches in your network effectively with MS SUS

Read More [shareaholic app="share_buttons" id="15671367"]

Updates in P2P 

by November 10, 2003

How to deploy service packs and patches in a peer-to-peer network

Read More [shareaholic app="share_buttons" id="15671367"]

FM Radio Streaming on Network

by November 10, 2003

Now enjoy FM while working on your PC

Read More [shareaholic app="share_buttons" id="15671367"]

Migrating Win 2K/NT to Win 2K3

by November 10, 2003

Transfer data and apps along with user accounts, profiles and groups

Read More [shareaholic app="share_buttons" id="15671367"]

Installing tarentella

by November 10, 2003

Using tarantella to control the applications that users are allowed to run 

Read More [shareaholic app="share_buttons" id="15671367"]

Troubleshoot Win XP 

by November 10, 2003

A few lesser-known ways to eradicate common Win XP problems

Read More [shareaholic app="share_buttons" id="15671367"]

Batch Scripts for Backup 

by November 10, 2003

The batch file takes a back up of your Document Settings folder, which contains all the important settings and data of your Windos machine

Read More [shareaholic app="share_buttons" id="15671367"]

Creating a Face in 3DS Max

by November 10, 2003

We will use the Polygon Technique to model a human face

Read More [shareaholic app="share_buttons" id="15671367"]

A face-lift in Photoshop

by November 10, 2003

Doesn’t the photo you just shot look so lovely? Well, look again!

Read More [shareaholic app="share_buttons" id="15671367"]

Choosing the Right tape drive

by November 10, 2003

While DVDs and CD-Writers are quick solutions for back up, there’s no replacing tape when it comes to large volume back up and archives

Read More [shareaholic app="share_buttons" id="15671367"]