How Hackers Take Over Web Sites with SQL Injection / DDoS
Even if you’ve only loosely followed the events of the hacker groups Anonymous and LulzSec, you’ve probably heard about web sites and services being hacked, like the infamous Sony hacks. …
Even if you’ve only loosely followed the events of the hacker groups Anonymous and LulzSec, you’ve probably heard about web sites and services being hacked, like the infamous Sony hacks. …
Active Directory is essential to any Microsoft network built on the client-server network model–it allows you to have a central sever called a Domain Controller (DC) that does authentication for …
You have a new computer that came with Windows 7 pre-installed on it, and you want to create a dual boot system so you can run Ubuntu Linux as well. …
Here’s the problem. You’re cheap…huh? 🙂 … have one or two wireless laptops that you want to get connected to your LAN, and don’t want to buy an access point …
Introduction Wireless networks are wonderful things – when they work! But many consumers find that even if they manage to get their WLAN (wireless LAN) working, keeping it up and …
Today’s post will cover the basics of performing a bare metal restore on Small Business Server 2008. As you will see, a bare metal restore allows you to recover your …
Just as it was in SBS 2003, Remote Web Workplace (RWW) is an integral component in the SBS feature set for 2008. Its purpose is to provide a secure centralized …
SBS 2008 installation The installation process is split into two sections: Installation of the operating system and other files to the disk Installation of everything that makes it SBS 2008 …
The headers of an email message contain very useful information for Exchange Server administrators. Header information includes such things as which email servers were involved in the transmission of the …
About DNS (Domain Name System). This tutorial documents the steps needed to create an internal DNS Server that will allow you to use “friendly” names within your LAN (Local Area …