Our documents are based on successfully executed projects which save you time and money.
business , compliances , networking , o-s , security

IT administrators are not doing enough to patch vulnerabilities

March 7, 2010

Stringent patching and patch management is key to anti-virus security management 1. Protection from malware 2. Secure connectivity 3. Protection from Inappropriate Content 4. Maximization of Network Resources 5. Protection of Resources 6. Ease of IT administration 7. Maximization of performance 8. Budget Management How to Secure Malware Threat...

Img
o-s

Sample Server Configurations

March 5, 2010

Sample Server Configurations Server Type Reference Description Lab Implementation 1 Dual P3, with 2Gb of RAM, 2 18GB disks for OS 4 NIC ports, 1 Remote Mgmt Port HP DL360G2 (2 – PIII 1.266Ghz) with NC3134 dual port card, 2 10KRPM 18GB drives, iLO Mgmt Port 2 Dual P4,...

Img
compliances , o-s , security

Event Viewer Log Review

March 5, 2010

It is important to frequently check the XP / Vista and Server Event Viewer to review log files for possible security concerns. It is optimal to log a minimum of seven days of activity in the application, system, and security logs. In order to maintain the information for seven...

Img
o-s

Legacy – PC Various Hardware speeds

March 4, 2010

  Service Value Units ECP/EPP PC to PC Connection (Parallel Port) 2 Mbps ATA Hard Drive PIO Mode 0 3.33 Mbps ATA Hard Drive PIO Mode 1 5.22 Mbps Asymmetric Digital Subscriber Line (ADSL) Downstream 6 Mbps ATA Hard Drive PIO Mode 2 8.33 Mbps ATA Hard Drive PIO...

Img
o-s

Computer Replacement Considerations

February 28, 2010

Options 1. Reseller / distributor agreement—subscribers afforded vendor commitment of best effort” to expedite sale of hardware if it is available at time of disaster 2. Pre-arranged rental agreement—subscribers assured that hardware will be readi­ly available for expedited shipment and can be used/rented for the recovery period 3. Dedicated storage /...

Img
o-s

Keeping Operating Systems and Applications up to date

February 28, 2010

Develop and maintain a list of sources of information about security problems and software updates for your system and application software. The most common sources of current information include Web sites of vendors and computer- and network-security organizations. Lists and Web sites appear, disappear, and change frequently. You need...

Img
o-s , sample-it-spreadsheets

PC Preventive Maintenance Suggestions

February 28, 2010

Here’s a checklist of 27 things you can do to keep your users happy and online. 1) E-mail your computer users. Let your clients know in advance what will be happening on the preventive maintenance visit. Users get attached to their systems, and seeing something change can be upsetting to...

Img
business , compliances , o-s

System Configuration Guidelines and Considerations

February 28, 2010

Hardware Inventory Complete evaluation of all existing hardware o   Configuration o   Date purchased o   Depreciated value o   Replacement cost o   Appropriateness of work Report by hardware item o   Present Cost o   Life expectancy o   New cost o   Depreciated value o   Repair costs o   Planned replacement date Software inventory o  ...

Img
business , o-s

Planning a Backup Strategy

February 28, 2010

Planning a Backup Strategy You should have a solid backup plan in place before any application is ever moved from a development/test environment into a production environment. In addition, just as you would never put an untested application into production, you should never go into production without testing your...

Img
o-s , policies , security

Hotel Room Security

February 28, 2010

Security in your own hotel room should be a top priority, whether you are traveling for business or pleasure. In an attempt to make your valuables more secure, many hotels are tightening security by installing small safes in every room and issuing coded insert cards instead of numbered keys...

Img
o-s

Disk Write Methods

February 22, 2010

  Writing method Write / Read Passes Description Ref: Overwriting with Zero data. 1 Write each byte to 0x00.   Overwriting with Random data. 1 Write each byte to random data or pseudo-random data.   U.S. Government DoD 5220.22-M 4 Pass 1, Random data; Pass 2, Bit-wise complement of...

Img
o-s , virtual-vmware , visio-stencils

VMWare Examples and Visio Stencils

February 14, 2010

Free Sample Document download VMWARE Stencils: Virtual Template 1.vss VMWare_Templates.vsd Virtual Temples.zip AV_Connectors_1.02_drawing.vsd AV_connectors_ver1.01.vss AV_connectors_ver1.02.vss AV_connectors_ver1.02_Visio2002.vss AV.ZIP ActvDir.vsd BFlowcht.vsd BldgPlan.vsd Block Diagram.vsd BNetwork.vsd Brainstm.vsd Calendar.vsd Conference Room.vsd Database.vsd DNetwork.vsd EEctrl.vsd FluidPwr.vsd Meeting Room.vsd mind-map.vsd OrgChart.vsd ProcEng.vsd Project Server Setup Flowchart.vsd Rack.vsd Timeline.vsd UML.vsd Workflow Example.vsd SampleVisio1.zip SampleVisio2.zip SampleVisio3.zip Bunch...

Img
o-s , virtual-vmware

Alternative Desktop ROI Comparison

February 6, 2010

Environmental factors increasing pressure for new solutions Audit/Control requirements such as Sarbanes Oxley, etc. New legislation; i.e., eDiscovery Desire for ‘Green’ solutions Security and Identity theft grow Disasters Technology Improvements bringing forth new solutions today Server blades & virtualization (VMWare: ESX, GSX, VDI) Software virtualization (MS Softricity, Altiris SVS,...

Img
o-s , security

Download Windows 2kx Active Directory Properties

December 29, 2009

Active Directory Properties https://www.bestitdocuments.com/Samples

Img
o-s

Setting up your PC

November 11, 2009

The Configuration When you first set up a new PC, you should refer to the owner’s manual for all technical specifications. To start your PC Notebook, document the following basic configuration information:  Make, model, and speed of CPU Amount of RAM and what type the system uses The make,...

Img
networking , o-s

TCP/IP Address Resolution

May 10, 2009

Windows order of resolution: NetBIOS WINS Broadcast LM Hosts Hosts DNS Hosts Local Hosts DNS Cache WINS Broadcast LM Hosts https://www.bestitdocuments.com/Samples/

Img
o-s

Download PC – MacIntosh Documentation

May 1, 2009

AppleTalk Reference: Protocol Suite Macintosh.zip https://www.bestitdocuments.com/Samples/

Img
business , o-s , security

Legacy IE Browser Settings

April 11, 2009

Microsoft Internet Explorer 6.0 Advanced Properties Tab – within Internet Options (the ones that are checked) Browsing Always send URLs as UTF-8 Close unused folders in History and Favorites Disable script debugging Enable folder view for FTP sites Enable Install On Demand Enable Offline items to be synchronized on...

Img
o-s

From DOS, Windows, Windows 9x / XP Windows NT, and OS/2

March 1, 2009

You can use the following procedure to identify your video card. From a command prompt type the “debug” command and hit enter. You will leave the C:> prompt and be put in the debug’s “-” dash prompt. C:> DEBUG At the dash prompt type “d C000:0010” and hit enter....

Img
o-s

Moving an Off-Screen Window

February 1, 2009

Sometimes a window will get positioned off of your screen where you can’t see the title bar. It is possible to move the window, and it’s not that hard to do. Just open the program that is giving you the problem, and do the following:  Press Alt + spacebar...

Img
o-s

Monitors and best viewing distances

December 12, 2008

A general rule when deciding on monitor size is as follows: Audience size Monitor size Viewing distance 5 17” 2.1m (7.0ft) 10 21” 3.0m (9.0ft) 20 29” 3.5m (12.0ft) (Optimum viewing distance is usually calculated as 5 x the monitor screen size.) https://www.bestitdocuments.com/Samples

Img
o-s , security

Simple Shutdown script for an Exchange Server

May 2, 2008

@echo off net stop MSExchangeES net stop IMAP4Svc net stop POP3Svc net stop RESvc net stop MSExchangeSRS net stop MSExchangeMGMT net stop MSExchangeMTA net stop MSExchangeIS /Y net stop MSExchangeSA /Y ! ! net stop “Computer Browser”” net stop “Messenger” net stop “Net Logon” net stop “NT LM Security...

Img
o-s

Services deleted or modified in Windows 2000 that were in Windows NT 4

February 9, 2008

Services deleted or modified in Windows 2000 that were in Windows NT 4 Process Manager creates and deletes processes and also tracks process objects and thread objects. Local Procedure Call Facility using a client/server relationship provides a communications mechanism between the applications and the Environmental subsystem. Services added or...

Img
o-s , security

UNIX sed Commands

November 17, 2007

Unix sed Commands  sed ‘s/wizard/guru/g’ file1                   replaces every occurrence of the string wizard with the string guru sed -n ‘s/wizard/guru/gp’ file1              replaces and prints only those lines where the substitution was                                                              made  -n print only when command p is given sed ‘/Comment:/d’ file1                          deletes all the lines that...

Img