Month: November 2013

  • How to Choose the Best Antivirus Software for Your Situation

    How to Choose the Best Antivirus Software for Your Situation

    The Internet is littered with malware, viruses, trojans and other malicious pieces of software that could really ruin your day. That means it doesn’t matter if you’re a gamer or someone who uses an old family PC for browsing the web and checking email, you still need some sort of antivirus to keep yourself safe. […]

  • How Monitoring Software can Help to Protect Against CryptoLocker

    How Monitoring Software can Help to Protect Against CryptoLocker

    If you spend a lot of time online, are pretty tech savvy or are in the technology sector, then there’s little doubt that you’ve come across the term ransomware here and there. In a nutshell, ransomware is a type of malware that infects a computer and effectively puts up a lock screen that holds the […]

  • PA Server Monitor Review at IT Training Day

    PA Server Monitor Review at IT Training Day

    The friendly folks over at IT training day recently started using our premiere product, PA Server Monitor. Dan has written about his experience so far using it here: http://www.ittrainingday.com/2013/11/my-first-interaction-with-pa-server.html He also said he is going to add updates to the blog as he uses the product more and becomes more familiar with it. Take a […]

  • PA Server Monitor Subscription Price Increase

    PA Server Monitor Subscription Price Increase

    We know, change can be rough! But sometimes it is inevitable. In the next few days the price of the PA Server Monitor Subscription will be increasing. We wanted to let you know that you will NOT be affected if you subscribe before Wednesday, November 27, 2013. Your account will grandfathered in to the same […]

  • 3 Signs Your Web Server’s Security has been Compromised

    3 Signs Your Web Server’s Security has been Compromised

    More than ever, businesses have to be careful of attacks on servers and business networks to ensure that their data, and that of their customers’, are fully protected. This is especially true of sensitive data such as credit card and personal details, especially as a failure to protect this could incur a hefty fine when […]

  • Fixing a Buffalo LS-QV4.0TL/R5 NAS

    Fixing a Buffalo LS-QV4.0TL/R5 NAS

    We got a little NAS device to play around with, do some back ups to, etc.  The Buffalo LS-QV4.0TL/R5 comes with 4 x 1TB drives, but we wanted some more space, so we replaced the 1TB drives with 2TB drives.  Mistake 🙁   It turns out the OS is on those drives (duh!).  What you’ll see […]

  • Pt. 2-How to implement DHCP (Relay Agent), ROAS & OSPF (Open Shortest Path First)

    Cont’d from Part 1… Now let’s test other VLANs to see if computers can obtain an IP address from the server or not. This time I add another scope for Accounting VLAN (VLAN10) to the DHCP scopes and set PC1’s IP configuration to automatic in Accounting VLAN. The result is shown below in Figure. 6. […]

  • How to implement DHCP

    How to implement DHCP

    In this article I am going to show how you can implement DHCP relay agent and inter-VLAN routing with OSPF (as shown in Figure. 1). Let’s start with a short description of the scenario and then we will proceed through the step by step configuration guide. Figure. 1   Scenario: A DHCP server in the […]

  • An Overview of the New Windows 8 Enterprise Edition

    An Overview of the New Windows 8 Enterprise Edition

    Not since the launch of the Windows Vista operating system has there been so much negativity about the latest upgrade of Windows for consumers. But is it really justified, or is it simply misinformation and/or the lack of information that has driven large swathes of the business community to avoid it thus far?   Setting […]

  • Encrypt Hard Drives Using BitLocker Drive Encryption-Cont’d

    Part 2… From previous experience I can tell you that this operation can take several hours if your hard drive contains a lot of data, so make sure that the laptop stays on until the encryption is complete. Upon finishing the operation, you will receive the following message:   If you are encrypting a system […]