Categories
News Technical

SkyDrive for Windows and Mac

SkyDrive is back, and full integration in Windows and Mac SkyDrive for Windows is the easiest way to access your SkyDrive from your PC. When you install SkyDrive, a SkyDrive folder is created on your PC. Everything you put in this folder is automatically kept in sync between your computers (PC or Mac) and SkyDrive.com, […]

Categories
News

Windows Server 8 named Windows Server 2012

A few days ago Microsoft has announced that the Windows Server 8 will be named Windows Server 2012. This was made known at MMS (Microsoft Management Summit) on April 17, 2012.  I just found out about it myself.  Not a big shocker for me.  I just wanted to share the news and keep the cycle of informaiton […]

Categories
How-To Software Technical

My thoughts on how to keep your data safe

I think that data security should be one of the top concerns for computer users. If your computer is stolen, often the impact of confidential or proprietary data being lost or compromised can be much higher than the cost of replacing computer itself. There are many easy ways of keeping your data out of the […]

Categories
How-To Technical

How to get your Dell Service Tag

There are those times you need the service tag from a system such as a noteboot, server, or pc and just can’t get to it.  Or… taking the “I’m not getting up for this method”. Using the Windows Management Instrumentation Command-line (WMIC) you can pull this information right from the command prompt. Simply type the following: […]

Categories
How-To Software Technical

Test your anti-virus product

I was thinking tonight about anti-virus programs used today.  And with the many malware attacks that aim to cripple your anti-virus solution, how can one test if its working or not. To get past that fale sense of security; because what we don’t know will hurt us.  That said I suggest using a test virus (known virus saved on […]

Categories
News Technical

Dynamic IP Restrictions in IIS7

The Dynamic IP Restrictions Extension for IIS provides IT Professionals and Hosters a configurable module that helps mitigate or block Denial of Service Attacks or cracking of passwords through brute-force by temporarily blocking Internet Protocol (IP) addresses of HTTP clients who follow a pattern that could be conducive to one of such attacks. This module […]