Archive for 2014

It’s time to sip up coffee, welcome the New Year, and sneak peek some of the top futuristic technology trends for the year 2015. It’s not the first time that these technologies have come up for discussion here; we have been flirting with the idea of implementing them throughout 2014 as well. As the worldwide IT and telecommunication spending goes into trillions of dollars, a significant portion of this will … Read more

Well, you may think what security risk has to do with holiday season, but there exist a correlation, read on to know how! Most of the organizations small, medium and enterprise levels invest in security still many a time they find themselves at the receiving end. The reason could be, while they could be doing a lot at one end but they tend to ignore other security risks that they … Read more

Dynamic Access Control (DAC) is a new feature introduced in Windows Server 2012 and Windows 8. It allows to apply access control and restricted permission based conditional rules for accessing files and folders dynamically. For Example, if a new user joins a department or if an employee moves from one department to another department or his role changes, then the file and folder permissions changes are dynamically added and removed … Read more

Cyber-criminals are becoming more adept at stealing credit card information all the time. Organizations that handle or process card data in any capacity must take the necessary precautions to protect that data. At the very least, they should ensure they’re in compliance with the Payment Card Industry Data Security Standard (PCI DSS), developed to encourage and enhance cardholder data security across the globe. The PCI DSS defines 12 requirements that … Read more

Lepide is offering Up To 50% discount on the occasion of “Black Friday & Cyber Monday 2014” on following software. Lepide Exchange Recovery Manager Lepide Active Directory Self Service Lepide Active Directory Cleaner Lepide User Password Expiration Reminder LepideMigrator for Documents Offer is valid from 1st Dec’2014 to 5th Dec’2014 For complete details, contact sales@lepide.com, keep the subject line as, “Black Friday & Cyber Monday 2014 offer from Lepide”

Exchange designing is complex and involves innumerable analysis and calculation. These analyses and calculations are driven by various business and technical requirements, which should to be thoroughly understood, documented and agreed upon. Since, it involves too many calculations and considerations, we tend to miss out or overlook many things. Given below are some common mistakes that Exchange engineers tend to make while designing and deploying Exchange 2013. Understanding Current Environment: … Read more

Exchange Restore is one of the most common requirements for an Exchange admin on a daily basis and Disaster Recovery is the nightmare which no Exchange admin would want to face. Exchange Backup Restore: Traditional backup restoration is a tedious and time consuming process. It includes the steps like restoring the database, soft recovery, creating recovery storage and exporting the emails. Exchange has no graphical interface and it does not … Read more

The purpose of this post is to define the process to audit the successful or failed logon and logoff attempts in the network using the audit policies. “Audit Logon Events” and “Audit Account Logon Events”, meant for monitoring the logon/logoff events, are disabled by default. It is required to enable these policies manually. Before going to learn how to enable these policies, it is important to know in brief about … Read more

In this IT age, networking is the key to most business operations. Every access to any system in a network domain is thus entrusted through user accounts and upon correct user password approval. Since, critical business data and transactions are shared on the network, illicit attempts for account access is an alluring prospect for trespassers who try to supersede in their own felonious intentions. Thus, account lockout and password usage … Read more

We’re not talking about deploying a database for the mobile using SQL Server Compact rather we’re here by discussing any possibility to bring the SQL Management Studio to the handheld devices entirely or partially. The day when Apple’s iOS and Google’s Android transformed the existing world of handheld devices, everybody is talking about to bring the giant computer applications and facilities to the smartphones, tablets, PDAs, etc. Here, the thought … Read more

Lepide® is a Registered Trademarks of Lepide Software Private Limited. © Copyright 2017 Lepide Software Private Limited. All Trademarks Acknowledged.