Cyber-criminals are becoming more adept at stealing credit card information all the time. Organizations that handle or process card data in any capacity must take the necessary precautions to protect that data. At the very least, they should ensure they’re in compliance with the Payment Card Industry Data Security Standard (PCI DSS), developed to encourage and enhance cardholder data security across the globe. The PCI DSS defines 12 requirements that companies should follow if they handle Read more...

Lepide is offering Up To 50% discount on the occasion of “Black Friday & Cyber Monday 2014″ on following software. Lepide Exchange Recovery Manager Lepide Active Directory Self Service Lepide Active Directory Cleaner Lepide User Password Expiration Reminder LepideMigrator for Documents Offer is valid from 1st Dec’2014 to 5th Dec’2014 For complete details, contact sales@lepide.com, keep the subject line as, “Black Friday & Cyber Monday 2014 offer from Read more...

Exchange designing is complex and involves innumerable analysis and calculation. These analyses and calculations are driven by various business and technical requirements, which should to be thoroughly understood, documented and agreed upon. Since, it involves too many calculations and considerations, we tend to miss out or overlook many things. Given below are some common mistakes that Exchange engineers tend to make while designing and deploying Exchange 2013. Understanding Current Read more...

Exchange Restore is one of the most common requirements for an Exchange admin on a daily basis and Disaster Recovery is the nightmare which no Exchange admin would want to face. Exchange Backup Restore: Traditional backup restoration is a tedious and time consuming process. It includes the steps like restoring the database, soft recovery, creating recovery storage and exporting the emails. Exchange has no graphical interface and it does not even provide many options to search and export the Read more...

The purpose of this post is to define the process to audit the successful or failed logon and logoff attempts in the network using the audit policies. “Audit Logon Events” and “Audit Account Logon Events”, meant for monitoring the logon/logoff events, are disabled by default. It is required to enable these policies manually. Before going to learn how to enable these policies, it is important to know in brief about them. Audit Logon Events policy defines the auditing of every user Read more...

In this IT age, networking is the key to most business operations. Every access to any system in a network domain is thus entrusted through user accounts and upon correct user password approval. Since, critical business data and transactions are shared on the network, illicit attempts for account access is an alluring prospect for trespassers who try to supersede in their own felonious intentions. Thus, account lockout and password usage helps to combat such malpractices. Microsoft recommends Read more...

We’re not talking about deploying a database for the mobile using SQL Server Compact rather we’re here by discussing any possibility to bring the SQL Management Studio to the handheld devices entirely or partially. The day when Apple’s iOS and Google’s Android transformed the existing world of handheld devices, everybody is talking about to bring the giant computer applications and facilities to the smartphones, tablets, PDAs, etc. Here, the thought to bring a mammoth sized Server Read more...

Microsoft has equipped the organizations with the Windows server operating system and other server tools like Exchange Server, SQL Server, SharePoint Server, etc. In addition, there are inbuilt server tools like DNS Server, DHCP Server, File Server, and Active Directory to create a complete networking infrastructure inside an organization. However, the server and networking management using the traditional Microsoft tools become obsolete at a level. In this blog post, we’ll discuss how Read more...

Android is the most widely used Operating Systems for smart devices like smartphones and tablets. Its popularity and usage to browse the World Wide Web had already surpassed that of Windows devices and computers. Seeking their popularity the IT professionals are already using the third party apps for connecting with their File Servers, taking remotes of their machines, and managing their servers. These apps are serving their purpose for which they’ve been created by the manufacturers and Read more...

Article Author: Peter Gubarevich (MVP – Enterprise Security), Certified Ethical Hacker Everything was just fine until yesterday. Usually, I’m managing local group membership using Active Directory Group Policies, either Restricted Groups node, or GP Preferences node. It’s quite questionable which node to choose, but anyway, Group Policy makes it easy to perform updates and enforce membership throughout a domain, and exactly fits my requirements. However, there’s another side of Read more...