Original release date: July 26, 2013 | Last revised: July 31, 2013
Systems Affected
Any system connected to the internet running the Intelligent Platform Management Interface (IPMI) may be affected. IPMI is resident on many server platforms, and provides low-level access to a system that can...
I have to say, back when the career path for technology led through end user support I learned a lot right out of school. Most of what I learned I still carry with me today. Even so, time and bad habits can cause a person to forget some best practices.
When Windows 8 was forced upon my new...
anti-virus
backup utility
bestpractices
computer games
ea games
end user
it career
origin
performance
reboot
sims 3
software issues
stardock
support
system stability
tech tips
third party
troubleshooting
user experience
windows 8
Original release date: January 24, 2013 | Last revised: February 06, 2013
Systems Affected
Web-based Content Management Systems, specifically Joomla! installations.
Overview This Alert was developed as a collaborative effort between Public Safety Canada and the U.S. Link...
Severity Rating: Important
Revision Note: V1.0 (January 8, 2013): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker...
Security Updates
Today we released six security bulletins to help protect our customers - four Critical, one Important, and one Moderate – addressing 19 vulnerabilities in Microsoft Windows Shell, Windows Kernel, Internet Explorer, Internet Information Services (IIS), .NET Framework, and...
advisory
bestpractices
bulletin
compatibility
configuration manager
deployment
impact
internet explorer
microsoft
privileged access
risk
security
system center
truetype font
updates
visual basic
vulnerabilities
webcast
windows
windows kernel
Resolves a vulnerability in Windows that could allow denial of service if a remote attacker sends a specially crafted session request to the Kerberos server. Firewall best practices and standard default firewall configurations can help protect networks...
More...
There is some little software around to take ownership of files and folders in Windows 7. When I was installing Windows 7 Ultimate, I took ownership of all I could find. Then a few things no more worked and I had to reinstall... Luckily, I had almost only the basic installation done.
I and...
advice
basic installation
bestpractices
data recovery
file access
file management
folder control
guidelines
installation
ownership
permissions
reinstallation
security
software
system files
take ownership
troubleshooting
user control
utilities
windows 7
I've had quite a fight with my new computer build, mostly hardware related.
But, not being an expert in IT, I was surprised to hear the words of a person I highly respect, an expert here = in this area, not this Forum, that "You shouldn't fix what's not broken", meaning that you shouldn't...
Applies to Windows7 and Windows8
A few Tips - A (Potentially) Useful, Valuable Compilation
Many people miss Quick Launch in Windows 7. Although the new/redesigned Taskbar is what it is it can still be felt that there is a worthwhile purpose served by Quick Launch. It is (still) really a nice...
Severity Rating: Critical
Revision Note: V1.1 (March 13, 2012): Added a link to Microsoft Knowledge Base Article 2509553 under Known Issues in the Executive Summary.
Summary: This security update resolves a privately reported vulnerability in Windows DNS resolution. The...
This week on Channel 9, Not Dan and Not Brian (Larry and Charles) discuss the week's top developer news, including:
Link Removed SQL Server 2012 Virtual Launch Event, Roger Doherty: Introduction to SQL Server 2012, http://bit.ly/sql2012cookbook.
Link Removed Comparison Chart: New Project Types...
application development
bestpractices
bing maps
cloud computing
developer news
metro style
open source
performance
powershell
programming
project types
sample projects
sql server
techfest
user experience
user interface
visual studio
web development
windows 8
Starting in Windows 7/2008R2, domain user accounts should not end with the dollar sign ($). Managed service accounts are identified by ending in a dollar sign ($) and there can be confusion on a system when setting a service to run under an account...
Link Removed
Just a wee reminder... today, like the 2nd Tues. of every month, is 'Patch Tuesday'. Even if on 'Auto', always a Best Practice to make sure any & all (new) Updates are put in or get put in your computers.
Cheers,
Drew
I thought this was a thought provoking article I came upon recently. Here it is followed by the peice ofFeedback I had added to the others under the article.
Link Removed
Link Removed due to 404 ErrorThere are certain basics & best practices that must be met or exist... being/keeping current...
Looks like a brand new Worm called Morto is using RDP (Remote Desktop Protocol) and port 3389 (default listening port) as an attack vector to infect some machines and subsequently using some type of brute force password guessing mechanism to further compromise these computers.
A good reason why...
bestpractices
brute force
computer safety
cybersecurity
default port
infection
malware
morto
network security
password
rdp
remote desktop
security
tcp port
threats
updates
vulnerability
windows
windows server
worm
Bulletin Severity Rating:Critical - This security update resolves two privately reported vulnerabilities in the Microsoft Distributed File System (DFS). The more severe of these vulnerabilities could allow remote code execution when an attacker sends a specially crafted DFS response to a...
Bulletin Severity Rating:Important - This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an attacker created a specially crafted SMB packet and sent the packet to an affected system. Firewall best practices and...
Hi Everyone,
I'm trying to get a custom software package to work on my domain server.
BTW - it works just fine on a workstation.
I don't remember having this problem with a simple WG server.
What are the best practices for setting this up?
I created a folder on the server let's call it...
The National Security Agency (NSA) recently published a report, "Best Practices for Keeping Your Home Network Secure" (PDF) in which it makes numerous recommendations designed to help home computer users avoid malware and other common problems.
Link Removed