Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
email

Common Spyware threats list

March 7, 2010

  http://www.spywareguide.com/product_list_full.php Common Spyware threats list Spyware and similar Keyloggers Dialers Usage tracks Hijackers AdBreak 2Spy! A.I.S. Ahead Nero Burning Rom AllCyberSearch AdvertBar AB System Spy Aconti HTMLedit Cool-XXX Alexa (6.0) Actions Monitor Action Liveshow Showtime Internet Explorer Duolaimi Attune Activity Logger All-In-One Telcom LogoManager IStartHere Aureate (3.15) Activity...

Img
email

Email Virus Outbreak Check List

March 7, 2010

Topic Questions to ask Description Identify the attack Virus, worm, or Trojan What kind of virus are you facing? E-mail viruses can take three forms. Knowing what kind of virus you’re dealing with will help you better figure out the severity. Don’t forget that some viruses are actually hoaxes....

Img
email

Sample Email Improvement Project Considerations

March 7, 2010

Summary of User, Technical and Institutional Requirements Reliable and resilient message delivery (<2 minutes for internal mail) Secure (including password, data encryption, enforcement of strong password) Open standards (i.e. IMAP, HTTP, HTTPS, SMTP) Integrates with current server, directory and workstation environment Interoperable with current systems (Exchange, Lotus Notes) Single-seat...

Img
application , web-services

Oracle Database Configuration & Performance Tips

March 7, 2010

Introduction This guide is aimed at those who wish to configure Oracle 10 – 11 databases to ensure that it can perform under large loads that may be placed upon it. SAP utilizes Oracle database technology to store SAP activity data, in form of transaction. It requires a transactional...

Img
compliances , security , web-services

What is an x.509 Digital Certificate Structure

March 7, 2010

X.509 certificates have the following fields. Version x.509 version:  0=v1, 1=v2, 2=v3 serialNumber Controlled by CA, assigned to each cert signature algorithm OID of the algorithm used for digital signature issuer name Ex “sha1WithRSAEncryption” or “dsa-with-sha1” validity period x.500 Distinguished Name (DN) of the CA subject name Expiration date...

Img
business , compliances , networking , o-s , security

IT administrators are not doing enough to patch vulnerabilities

March 7, 2010

Stringent patching and patch management is key to anti-virus security management 1. Protection from malware 2. Secure connectivity 3. Protection from Inappropriate Content 4. Maximization of Network Resources 5. Protection of Resources 6. Ease of IT administration 7. Maximization of performance 8. Budget Management How to Secure Malware Threat...

Img
email

Sample Vendor Virus Comparison Checklist

March 6, 2010

Vendor Virus Comparisons Virus detection   Platform   Malicious JavaScript detection   Malicious VBScript detection   Malicious applet detection   Applet filter                   Certificate                   Signature                   Trusted source                   All applets                   Detects unknown malicious applets   E-mail content filter   E-mail content...

Img
email

Companies That Should Consider Managed Messaging

March 6, 2010

Messaging is not the core competency of most companies, yet it is a fundamental business requirement that demands tremendous time and resources to manage. Outsourcing removes the headache of email administration from the internal IT staff, freeing up those resources to focus on IT initiatives that directly relate to...

Img
email

Spam Costs

March 6, 2010

Cost is perceived as a major driver in the desire to move towards a managed messaging solution and/or hosting of an email system. The reality is that in most organizations it is so difficult to ascertain the true cost of providing an email system that it is possible to...

Img
email

Fighting Spam

March 6, 2010

Spam is unsolicited email. It can range from a supplier’s newsletter to pornographic images to offers of products or services. On the face of it, this does not constitute a major problem as the user can “just delete it”. Many pundits predict that spam will die out from “natural...

Img
email

Virus Detection Considerations

March 6, 2010

What to look for in a virus product. Detailed descriptions of these technical attributes follow this bulleted list. 1. Battle-Tested Engine 2. Versatile Virus “Language” Detection Base 3. Advanced Heuristic Analysis 4. Expanded Scanning Capabilities 5. Auto Immune Virus Capture Battle-Tested Engine Technology Only through real-world testing across multiple...

Img
o-s

Sample Server Configurations

March 5, 2010

Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4,...

Img
compliances , o-s , security

Event Viewer Log Review

March 5, 2010

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven...

Img
application , web-services

Quick overview of HTTP Request messages

March 5, 2010

OPTIONS         Request information about available options GET                Retrieve document identified in URL HEAD              Retrieve meta information about document identified in URL POST              Give information (e.g., annotation) to server PUT                Store document under specified URL DELETE           Delete specified URL TRACE            Loopback request message CONNECT        For use by proxies HTTP response codes 1xx                Informational   Request...

Img
email

Exchange Disaster Recovery Plan/Restoration of Individual Mailboxes

March 4, 2010

In the event that the Exchange Server (5.5 / 2000) might fail, the following is a proposed solution for restoring the database files while minimizing system downtime. This process can also be used in case there is a need to restore the contents of an individual’s mailbox. I have...

Img
email

Sample – simple Steps to Exchange 55 – 2k in the same domain

March 4, 2010

These steps worked for this project. Not all projects details can be generalized this way. Always research your environment and rationalize you solutions based on your facts and requirements. 1. On the target domain controller cleanup and any existing DNS records for the target domain. 2. Backup the DC...

Img
networking , security

Switching Analysis Check Considerations

March 4, 2010

1. Scale-able Speeds 2. Bandwidth & Connection Management 3. Congestion Control & Switch Capacity 4. Industry standards 5. Internetworking 6. Fault Tolerance 7. Modularity 8. Common Manageability § Common Console § Common Alerting o Trap implementation across all products o Importing new MIBs § Your customers § Other vendors o Start Sniffer Trace File Capture o Quarantine (AV from enterprise) 9.   Common Reporting 10. Common...

Img
o-s

Legacy – PC Various Hardware speeds

March 4, 2010

  Service Value Units ECP/EPP PC to PC Connection (Parallel Port) 2 Mbps ATA Hard Drive PIO Mode 0 3.33 Mbps ATA Hard Drive PIO Mode 1 5.22 Mbps Asymmetric Digital Subscriber Line (ADSL) Downstream 6 Mbps ATA Hard Drive PIO Mode 2 8.33 Mbps ATA Hard Drive PIO...

Img
data-center-soc-noc , networking

Network Connection Speeds detailed.

March 4, 2010

   Carrier Technology Speed Physical Medium Notes Dial-up AccessPlain Old Telephone System (POTS) 2400 bps to 56 Kbps Twisted Pair On demand access. Switched 56 Requires modem and POTS line. Slow and varies with line quality. Switched 56 2400 bps to 56 Kbps   Requires modem and POTS line....

Img
networking

Voice Encryption Overview

March 3, 2010

Built from three components Speech Compression – Encryption – Modem – Hardware Based . DSP with GSM or CELP Speech compression . DSP modem Software-based . GSM or CELP in software . External modem or TCP/IP network connection Mostly built from off-the-shelf-part (GSM DSP, modem, DSP, software building blocks)...

Img
information-rights-management

What is Single Sign-On

March 2, 2010

With Single Sign-On a user needs only one user ID and password this eliminates the security headaches and vulnerabilities associated with multiple IDs / passwords. This solution simplifies and frees security administrators from the mundane task of assigning passwords, enabling them to perform much more important tasks that directly...

Img
information-rights-management , security

IAM Useful Glossary

March 2, 2010

Access Control An access control limits the use of a resource. Only those people, programs or devices that are specifically permitted to use the resource will have access. In addition, an access control will usually limit use to specific types of access; someone can read a file but not...

Img
information-rights-management , security

Sample SSO Deployment

March 2, 2010

Process / Functional Requirements Functionality: Users should login only once to their PC.  Then be able to access all applications without logging in again. If integration of Single Sign On solution is not possible with NT domain/AD, users should be able to log into one application and be automatically...

Img
information-rights-management , security , visio-stencils

Sample Visio – IAM Deployment Process

March 2, 2010

The first step in implementing an identity management solution is identifying business objectives, policies and strategies both current and future.  next, a complete evaluation of the identity repositories, current identity management implementations (i.e., synchronizing messaging and desktop Ids), political boundaries and current vendor capital investments and loyalty.  This is...

Img
application , projects

Use Case to Relational Mapping Sample

March 2, 2010

  The following table describes shortly the single relations between the information entities (it’s worth to note that in principle each relationship is a many-to-many relationship): Source Destination Relationship Description Features Vision & Scope Rational A feature is traced back to a goal stated in Vision & Scope, i.e....

Img
security

Knowledge Management Key Points

March 2, 2010

Regulators have updated Contingency Planning guidance since 9-11.  Financial institutions should ensure that Disaster Recovery and contingency include any new requirements. Financial institutions should compare federal and state regulatory requirements to ensure more stringent requirements are adequately addressed. Review existing plans to ensure natural area, building complex and terrorist...

Img
business , networking

Computer Lab Design Considerations

March 1, 2010

IT is often asked for advice by departments planning a computing facility. This document outlines the considerations that should be made when planning such a facility. If you need additional information, or want details on the implementation of a specific IT computing facility, please send e-mail to IT team....

Img
projects

Project Definitions

March 1, 2010

Objectives: To examine specific processes and procedures used by the Systems group and / or other operations groups.  Measurements and evaluations of these designated processes will be used to determine items that could be revised or upgraded to increase efficiencies or enhance operational support systems. Scope: Processes from the...

Img