Learn some helpful IT Administrator tips and tricks.

Welcome to the most comprehensive list of tips and tricks for IT field, you'll find anywhere on the internet. I hope these tips help you get the most out of your internet.

Showing posts with label Security practices. Show all posts
Showing posts with label Security practices. Show all posts

Friday, March 15, 2013

Enable Role Remote Desktop Web Access

This provides clients an interface to access their virtual desktop. Let's see how to set up Remote Desktop Services on Windows 2008 R2 by enabling Remote Desktop Web Access Role Service. Use the following steps to install the RD Web Access role service: Log on to the desired server with local administrator privileges. Click Start, and then click Run. In the Run dialog box, type in ServerManager.msc and click OK. In the Roles Summary section,...

DHCP design guidance for Small Sites (Less than 300 Users)

This article explains the DHCP Server recommendations especially for Small Site (Less than 300 Users). This guidance can be applied to your system. A small site is described as a site with less than 300 users in their facility. Your Management team could the following recommendation design for DHCP.  Option 1 - DHCP on the next uplink site  In most cases, the scopes configured to cover the mobile sites would include lease times...

Wednesday, July 18, 2012

How to Disable USB Storage Devices ports in Windows 7

      USB storage devices are so common these days almost everyone owns USB storage device in shape of small flash drives, external hard disks, mobile phones, cameras, and lots of other portable devices. So if you want to secure your computer from stealing data, viruses or any other risks then simply disable the USB ports for USB storage devices / disk drives. To block the USB storage devices just follow the given steps...

Friday, April 6, 2012

Data Center Rack Install

       I worte this to provides guidelines for the process of data center rack installations at your company(s). Server installation is addressed specifically in the Server Installation standard. This will be achieved by a workforce including, but not limited to, contractors, vendor partners and employees who consistently apply safe work practices. Safe work practices, including emergency procedures in the event of disasters....

Monday, April 2, 2012

Server Room Temperature Recommendation

       Server Room Temperature: Computer and networking equipment is designed to operate within a fairly narrow temperature range. To ensure reliable operation and the longest possible life from components you need to ensure that the temperature stays within that band.        Even a few degrees too hot can blow a server chip.        The cost of a catastrophic server failure can...

Tuesday, December 13, 2011

4 Lessons I Learned About Security

     In my years as a system administrator, I learned that security is much more complex than most people realize. You cannot get away with doing just one thing. One security measure will not save your company server or external server. Your security must be comprehensive and constantly adapting to defend against intruders.  The following are three lessons I have learned over the years.        1....

Monday, December 12, 2011

5 Password Tools for Servers

     Ideally, your server should be an impenetrable fortress, but recent DDoS attacks highlight the security problems even companies that pay thousands or millions to protect their websites face. Nevertheless, nothing is worse than having your server crippled by someone who simply guessed your password. In no particular order, here are five tools to help you have better, stronger passwords:       ...

Why Frequent Vulnerability Scans

     Why Frequent Vulnerability Scans Are So Important.. some server system administrators, especially those with little experience, may operate under the mistaken belief that they will find security through obscurity. In their minds, as long as their server is small and not hosting major big-name websites, those with malicious intent will leave them alone.      What these idealists fail to realize is that...

Sunday, December 11, 2011

Good network security practices

     Since the rise in popularity of the Internet, we have started to use our computers for a much wider range of tasks than ever before. At home, we buy our groceries, do our banking, buy birthday presents, send communications via email, write our life story on social networking sites; at work, our businesses provide e-commerce via websites, staff send and recieve emails, phonecalls and video conferencing are done through...

Saturday, December 10, 2011

netsh firewall show portopening

     A firewall is a software application, which is a gateway server on the network. It offers a unique level of protection against viruses and nasty infected with the virus that are based on unwanted incoming traffic to attack target computers. It does so by blocking communications to access your system without your permission. Some Microsoft operating systems like Windows XP and Windows Vista and Windows Server 2003...