11
Mar

Exchange and Certificates

 

16
Feb

Using Overhead Factors in the Exchange 2013 Server Role Requirement Calculator Tool

Deploying a successful Exchange 2013 messaging solution requires that the correct decisions are made when designing the server infrastructure. Whether using virtual or physical servers, it is vital that adequate allocations of CPU processing, storage space, disk system I/O and memory are provided. Sizing these components of an Exchange 2013 deployment is not only a technology challenge, but also an art.  Experience plays a large role in getting these design decisions right.

9
Feb

TCP Dump Tips

Often when troubleshooting an issue, running a TCPdump can be an invaluable form of diagnostic data. A recording of local traffic can help shed light on the connectivity issue that is occurring. Within the LoadMaster's Debug Options screen, there is a TCP dump utility that saves the traffic in a .pcap file. To access this option, in the main menu of the LoadMaster Web User Interface (WUI), select System Configuration > System Administration > System Log Files and click Debug Options.

9
Jan

How to Secure Your Loadmaster

Configuring Administrative Access

Locking down administrative access to your LoadMaster is important for several reasons, ranging from protecting your SSL certificate and private key to ensuring the continuation of uninterrupted Virtual Service traffic. There are several simple steps to secure your LoadMaster, many of which are discussed below. 

Tags: 

4
Dec

AFP Rule Writing

The ModSecurity Reference Manual should be used in all cases where questions arise over the syntax of commands: “https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual”.

In terms of rule writing, the main directive to know is SecRule, which is used to create rules and thus does most of the work.

Every rule defined by SecRule conforms to the same format, as below:

SecRule VARIABLES OPERATOR [ACTIONS]

The three parts have the following meanings:

9
Oct

Load Balancing Microsoft® Lync 2013

29
Sep

The Shellshock Vulnerability and What It Means For You

Tags: 

3
Sep

Useful Network Tools for Admins

Ping

Ping is one of the most used network tools to perform a basic connectivity test between a user and a destination host. This test is made possible by using the Internet Control Message Protocol (ICMP), which has the ability to send an echo packet to a destination host and a mechanism to listen for a response from this host. There are 3 responses returned from a ping command:

1. Success - shown by a reply from desired target (see below)

 

28
May

Secure Windows XP use after support Ends – Best Practices

If you have to continue running Windows XP in your IT environment even though Microsoft has ended its support, you are not alone. It is estimated that between 20%-25% of enterprise still run Windows XP and at least 10% of their systems.

One of the main reasons why rapid migration is not an option is because applications that include browsers cannot be migrated to a later OS, and this acts as an inhibitor to upgrading. Embedded XP systems such as POS devices can also be impacted as they cannot be rapidly migrated either.

Tags: 

11
Apr

The Heartbleed vulnerability and what it means for you

Tags: 

Pages