Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
business , networking

Sample PC and LAN Support Services Agreement

February 28, 2010

This is just a tempalte, always seek proper legal advise when doing consulting. Consultant: Client: Contract Date: PC and Lan Support Services Agreement (the “Agreement”), made as of this xxx day of Month, 2009 (the “Effective Date”) between client (“Client”), and xxxxxxxx, (“Consultant”).   (Client and Consultant are hereinafter collectively...

Img
business , compliances , networking , security

Personal Computer / LAN Security Guidelines

February 28, 2010

Incorporate the following tips into your daily routine to ensure that any pc or LAN you use is secure · Lock your pc with a power on password · Lock your pc with a keyboard password when away from your desk · Back up your work regularly · Store and lock diskettes...

Img
o-s

Computer Replacement Considerations

February 28, 2010

Options 1. Reseller / distributor agreement—subscribers afforded vendor commitment of best effort” to expedite sale of hardware if it is available at time of disaster 2. Pre-arranged rental agreement—subscribers assured that hardware will be readi­ly available for expedited shipment and can be used/rented for the recovery period 3. Dedicated storage /...

Img
business , compliances

Creating Customer Service

February 28, 2010

Everyone seems to agree customer service is critical but few practice what they preach.  The industry needs more than fancy rhetoric and catchy slogans to keep customers happy. What are needed is adequate service staffing, training, and supervision to make sure every effort is made to keep your customer’s...

Img
networking

How fast is a Cable Modem

February 28, 2010

There is no single answer to that one, depends who you ask… You connect your computer (Mac or PC) to the CABLE / DSL modem via your standard 10Base-T Ethernet connection. So, how fast does it really go? Well, I’ve seen it go over 650Kbytes / sec. Web pages...

Img
o-s

Keeping Operating Systems and Applications up to date

February 28, 2010

Develop and maintain a list of sources of information about security problems and software updates for your system and application software. The most common sources of current information include Web sites of vendors and computer- and network-security organizations. Lists and Web sites appear, disappear, and change frequently. You need...

Img
o-s , sample-it-spreadsheets

PC Preventive Maintenance Suggestions

February 28, 2010

Here’s a checklist of 27 things you can do to keep your users happy and online. 1) E-mail your computer users. Let your clients know in advance what will be happening on the preventive maintenance visit. Users get attached to their systems, and seeing something change can be upsetting to...

Img
projects , sample-it-spreadsheets

Project Management Methodology Summary

February 28, 2010

The “Program Office” is a project management methodology that provides a process for managing projects. As organizations continues to grow, so does the need for new projects that will provide new and exciting services to the end –user. The Project Management Methodology will assist project team leads and team...

Img
business , compliances , o-s

System Configuration Guidelines and Considerations

February 28, 2010

Hardware Inventory Complete evaluation of all existing hardware o   Configuration o   Date purchased o   Depreciated value o   Replacement cost o   Appropriateness of work Report by hardware item o   Present Cost o   Life expectancy o   New cost o   Depreciated value o   Repair costs o   Planned replacement date Software inventory o  ...

Img
compliances , security

What is a DoS Attack

February 28, 2010

A specific directed attempt by individuals to cripple or deny access to technology resources. Most Dos attacks are directed to Internet online services. Techniques: Resource Exhaustion Attacks Flood the victim (server) with packets Bandwidth Consumption Attacks Overload packet processing capacity Saturate network bandwidth Result of the attack Network starvation...

Img
compliances , security

Anatomy of a hack

February 28, 2010

1. Acquire target 2. Footprint the system 3. Gain entry to system 4. Escalate privileges 5. Exploit system resources 6. Leave backdoor for later 7. Clean up, get out, cover tracks Risk management · It’s not a matter of if a computer security breach will happen, it’s a matter of when, and how prepared will you...

Img
email

Isn’t Traditional Anti-Virus Protection Enough

February 28, 2010

If your desktops and file servers are protected with quality anti-virus software, why bother applying an additional tier of protection at your Notes or Exchange servers, and at your Internet SMTP mail server? Isn’t traditional anti-virus protection enough? In the vast majority of cases, the answer to this question...

Img
application , security , web-services

Useful SQL Commands

February 28, 2010

SQL Commands Begin Statements that make up the block. Built In functions Most SQL data functions are supported within PL/SQL blocks. Code storage Blocks may be stored within an Oracle database as procedures, functions, packages (a group of blocks) and triggers. Composite Datatypes Records allow groups of fields to...

Img
application , security , web-services

SQL Design Considerations

February 28, 2010

In order to assist us in designing your database, please have your applications and dba review and answer the following questions. SQL: • Has SQL been explained/optimized? • Have ‘bind variables’ been used? ie select * from my.table where name = :b1; Bind variables are not actually substituted until...

Img
business , o-s

Planning a Backup Strategy

February 28, 2010

Planning a Backup Strategy You should have a solid backup plan in place before any application is ever moved from a development/test environment into a production environment. In addition, just as you would never put an untested application into production, you should never go into production without testing your...

Img
application , security , web-services

SQL Security Overview

February 28, 2010

SQL, maintains it own internal security umbrella including password encryption, password aging, minimum length restrictions on passwords and user account management resources. Integrated security relies on trusted connections, which are only available with both named pipes protocol and MS new RPC based multi-protocol net library. Because SQL Server supports...

Img
o-s , policies , security

Hotel Room Security

February 28, 2010

Security in your own hotel room should be a top priority, whether you are traveling for business or pleasure. In an attempt to make your valuables more secure, many hotels are tightening security by installing small safes in every room and issuing coded insert cards instead of numbered keys...

Img
business , compliances , security

Websense Web Filtering Software Overview

February 27, 2010

How Websense Works Websense is based on pass-through filtering technology, the most accurate, reliable and scalable method of Internet filtering. Pass-through filtering requires all requests for Web pages to pass through an Internet control point such as a firewall, proxy server or caching device. Websense is integrated with these...

Img
application , security

Database Security Assessment Overview

February 27, 2010

Oracle Security Assessment Checklist 1. Is the Oracle software owner account locked to prevent remote logins? 2. Are the Audit database user activities – logins and failures – logged? 3. Where is the Audit information stored? 4. Does the Oracle user own all of the files in $Oracle_root$/bin? 5. Are there any help and...

Img
compliances , policies , security

IT Auditing Standards Guidance

February 27, 2010

Guidelines provide guidance in applying IT Auditing Standards. The IT auditor should consider them in determining how to achieve Implementation of the standards, use professional judgment in their application and be prepared to justify any departure. The objective of the IS Auditing Guidelines is to provide further information on...

Img
email , policies

Email Retention Policy – Scope

February 26, 2010

Email A primary communication vehicle • An enterprise collaboration tool • A personal filing cabinet • An electronic record repository • A storage glutton • A legal and data management liability To start with most companies make when creating an email retention policy is not involving all areas of the company in the...

Img
business , compliances , security

IT Auditing Cobit Mapping

February 26, 2010

Linkage to COBIT COBIT Framework states, “It is management’s responsibility to safeguard all the assets of the enterprise. To discharge this responsibility as well as to achieve its expectations, management should establish an adequate system of internal control.” COBIT Management Guidelines provides a management-oriented framework for continuous and proactive...

Img
business , networking , security

Sample Cisco Options Matrix

February 25, 2010

  Networking Devices Description Type Comments Firewall (Internal) Embedded into internal switch   Load Balancer (Internal) Cisco CSS 11500 With SSL Termination/Fiber GigE Load Balancer (Perimeter) Cisco CSS 11500 With SSL Termination/Fiber GigE Router (Border) Cisco 7600 Router Fiber GigE Interface Switch (BOso) Cisco 2900   Switch (Internal) Cisco Catalyst...

Img
business

Vendor Management Considerations

February 25, 2010

Critical Vendors Are they critical to your organization continued viability? Do they capture, house, process, store or dispose of member or organization s confidential information? Are there regulatory requirements? What is our dependence on the vendor? Would they be difficult to replace? Contract Owner Responsibilities Critical Vendor Reviews Performance...

Img
email

Email Archiving Concepts

February 25, 2010

 (Author unknown) • Journaling email creates a real-time copy of all email flowing between the mail server and the secure email boundary, writing this copy to a journaling mailbox within the mail server • Archiving email empties the journaling mailbox at configurable intervals, moving the data to an archive container...

Img
application , security , web-services

Directx, Java and Activex runtime errors and diagnostics

February 25, 2010

52 Runtime Error This is a “bad file name or number” error in JavaScript. It means that the script cannot find a file it is looking for (web-page, course component) and is most likely a connectivity problem. Try to clear your temporary internet files which should resolve any further...

Img
business

Download The Best Research and Visualization Tools

February 25, 2010

Today more than ever it’s important to be able to view many different kinds of data, from many different sources, formats and view them in one perspective. This document represents the sum of many hours of research and conclusions. Enjoy. Research and Visualization Tools.doc https://www.bestitdocuments.com/Samples

Img
email

What the Anti-Spam Laws

February 24, 2010

California Spam Law (formerly SB 186)   Unsolicited commercial e-mail may not be sent from California or to a California address.  The law applies to senders as well as to advertisers on whose behalf messages are sent.  Damages may be up to $1000 for each message sent to an...

Img
email

Email Spam and Attachments

February 24, 2010

What is Spam? Spam is unsolicited email. From the sender’s point-of-view, it’s a form of bulk mail, often to a list culled from subscribers to a discussion group or obtained by companies that specialize in creating email distribution lists. To the receiver, it usually seems like junk email. In...

Img
email

The eMail Threat

February 24, 2010

Security Policy Item  Mail– SMTP (25/tcp) to all machines, which are not external mail relays, POP (109/tcp and 110/tcp), IMAP (143/tcp) Vulnerability  Mail vulnerabilities occupy two spots in the SANS Top Ten:  (sendmail) and (IMAP/POP), and the most common version, sendmail, has sent a constant stream of reports and...

Img
email

Sample eMail Disclaimers

February 24, 2010

Sample: Notice: The information contained in this email and in any attachments is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material.  If you have received this email in error, please notify us immediately by replying to the message...

Img