2008年11月26日 星期三

2008年10月28日 星期二

Can you shrink your SQL Server database to death?

Can you shrink your SQL Server database to death?

Microsoft releases Windows patch to stop worm attack

Microsoft releases Windows patch to stop worm attack

Video: Power & Cooling in the Data Center: Best Practices - Expert Videocast

Video: Power & Cooling in the Data Center: Best Practices - Expert Videocast

Screencast: How Tor improves Web surfing privacy and security audits

Screencast: How Tor improves Web surfing privacy and security audits

Making sense of Vista's Windows Experience Index

Making sense of Vista's Windows Experience Index

Why (or why not) switch from VMware to Hyper-V? — Server Virtualization Blog

Why (or why not) switch from VMware to Hyper-V? — Server Virtualization Blog

Email Archiving Implementation: Five Costly Mistakes to Avoid: White Paper

Email Archiving Implementation: Five Costly Mistakes to Avoid: White Paper: "Email Archiving Implementation: Five Costly Mistakes to Avoid"

Using ClusDiag for enhanced Windows server cluster reporting

Using ClusDiag for enhanced Windows server cluster reporting

How to rebuild the SYSVOL tree when none exists in Active Directory

How to rebuild the SYSVOL tree when none exists in Active Directory

Trends in enterprise identity and access management

Trends in enterprise identity and access management

Disk management basics for iSCSI deployments

Disk management basics for iSCSI deployments

Compliance in a virtualized world: Server virtualization and NAC security

Compliance in a virtualized world: Server virtualization and NAC security

DNS management becoming critical to businesses but poorly understood

DNS management becoming critical to businesses but poorly understood

Updating your Windows configuration management process

Updating your Windows configuration management process

Valuable lesson emerges from DNS flaw handling

Valuable lesson emerges from DNS flaw handling

Remote scripting tips and tricks -- Managing Windows networks using scripts, Part 10

Remote scripting tips and tricks -- Managing Windows networks using scripts, Part 10

Free VMware ESXi sparks call for the source code

Free VMware ESXi sparks call for the source code

How to prioritize wireless traffic

How to prioritize wireless traffic

The Windows manager's guide to iSCSI SANs

The Windows manager's guide to iSCSI SANs

Optimizing operating systems for virtual hosts — Server Virtualization Blog

Optimizing operating systems for virtual hosts — Server Virtualization Blog

Shifting defenses and dynamic perimeters challenge network security

Shifting defenses and dynamic perimeters challenge network security

How to look past information security vendor rhetoric

How to look past information security vendor rhetoric

The politics of VMware deployments

The politics of VMware deployments

Backing up virtual servers: Top methods for Windows machines

Backing up virtual servers: Top methods for Windows machines

Turn to collaborative tools for systems performance management

Turn to collaborative tools for systems performance management

Web advertising exploits: Protecting Web browsers and servers

Web advertising exploits: Protecting Web browsers and servers

New Windows Server 2008 backup tool improves disaster recovery

New Windows Server 2008 backup tool improves disaster recovery

How to patch Kaminsky's DNS vulnerability

How to patch Kaminsky's DNS vulnerability

New Windows Server 2008 backup tool improves disaster recovery

New Windows Server 2008 backup tool improves disaster recovery

Microsoft Baseline Security Analyzer: Do updates offer improved Windows security?

Microsoft Baseline Security Analyzer: Do updates offer improved Windows security?

Security certifications: Are they worth the trouble?

Security certifications: Are they worth the trouble?

Troubleshooting SAN performance issues

Troubleshooting SAN performance issues

Using blades as virtual hosts — Server Virtualization Blog

Using blades as virtual hosts — Server Virtualization Blog

Using blades as virtual hosts — Server Virtualization Blog

Using blades as virtual hosts — Server Virtualization Blog

Five Ways to Improve Your Wireless Security: A White Paper sponsored by Cisco Systems, Inc.

Five Ways to Improve Your Wireless Security: A White Paper sponsored by Cisco Systems, Inc.

Can you shrink your SQL Server database to death?

Can you shrink your SQL Server database to death?

QoE benchmarking: Unique approaches and environments

QoE benchmarking: Unique approaches and environments

Measure wireless network performance using testing tool iPerf

Measure wireless network performance using testing tool iPerf

Securing Wireless Systems -- 'Build Your Own Security Lab: A Field Guide for Network Testing,' Chapter 9

Securing Wireless Systems -- 'Build Your Own Security Lab: A Field Guide for Network Testing,' Chapter 9

Screencast: How to use Nipper to create network security reports

Screencast: How to use Nipper to create network security reports

Windows registry forensics: Investigating system-wide settings

Windows registry forensics: Investigating system-wide settings

Windows XP network performance tuning tweaks using TCP RFC 1323

Windows XP network performance tuning tweaks using TCP RFC 1323

Building IPsec VPNs with Cisco routers

Building IPsec VPNs with Cisco routers

Properties of Windows Management Instrumentation: Managing Windows networks using scripts, Part 12

Properties of Windows Management Instrumentation: Managing Windows networks using scripts, Part 12

Using MOF to resolve common Windows service desk challenges

Using MOF to resolve common Windows service desk challenges

Properties of Windows Management Instrumentation: Managing Windows networks using scripts, Part 12

Properties of Windows Management Instrumentation: Managing Windows networks using scripts, Part 12

Top five free Windows server management tools

Top five free Windows server management tools

2008年10月12日 星期日

iThome online : : 新聞內容

iThome online : : 新聞內容妥善保護網頁應用程式的2種作法

iThome online : : 新聞內容

iThome online : : 新聞內容大量安裝網路印表機,有沒有簡便快速的方法

2008年9月18日 星期四

Troubleshooting SAN performance issues

Troubleshooting SAN performance issues

Installing KVM virtual machines

Installing KVM virtual machines

More remote scripting tricks: Managing Windows networks using scripts, Part 11

More remote scripting tricks: Managing Windows networks using scripts, Part 11

How to achieve server virtualization in your network

How to achieve server virtualization in your network

How to plan and design a Windows IT infrastructure

How to plan and design a Windows IT infrastructure

Real-time location systems: Can you find me now?

Real-time location systems: Can you find me now?

Real-time location systems: Can you find me now?

Real-time location systems: Can you find me now?

Exploring Microsoft's Network Access Protection policy options

Exploring Microsoft's Network Access Protection policy options

How to configure NAP for Windows Server 2008

How to configure NAP for Windows Server 2008

Windows XP network performance tuning tweaks using TCP RFC 1323

Windows XP network performance tuning tweaks using TCP RFC 1323

Weaponizing Kaminsky's DNS discovery

Weaponizing Kaminsky's DNS discovery

Best of VMworld 2008 awards announced

Best of VMworld 2008 awards announced

Two, three, or more? How many data centers are sufficient for disaster recovery?

Two, three, or more? How many data centers are sufficient for disaster recovery?

Microsoft SharePoint planning and deployment best practices — Windows Week in Review

Microsoft SharePoint planning and deployment best practices — Windows Week in Review

2008年9月14日 星期日

iThome online : : 新聞內容

iThome online : : 新聞內容-推廣資訊治理師,資深主管10月底前可申請拿認證

2008年8月18日 星期一

2008年7月21日 星期一

iThome online : : 新聞內容

iThome online : : 新聞內容: "B2C服務戰開打 24小時到貨 B2C服務戰開打 24小時到貨"

2008年4月20日 星期日

Nipper - The Network Infrastructure Parser

Nipper - The Network Infrastructure Parser

檢查網路設備如router , firewall等設定檔
輸出參考報表的open source software