Archive Page 42

It’s 12 Noon, Do You Know Who’s Using Your Network?

by Jason Frovich

The idea of reading email while lounging by the pool, text or instant messaging while doing the laundry, or lounging in the Jacuzzi listening to your MP3 collection is appealing to us all.

Unfortunately, many, or even most, wireless units don’t come with security features already functioning. This may not seem like a big issue to someone who is simply setting up a home network, but there are a number of potential problems you should consider.

Continue reading ‘It’s 12 Noon, Do You Know Who’s Using Your Network?’

Here's A Few More Related Posts:
  1. Do It Yourself: Roll Your Own Network Cables
  2. How to configure 2 way access to the “trusted” computers on your network
  3. What is your computer’s address?
  4. Know your networking vocabulary

How Do Wireless Networks Work?

by Gregg Hall

Wireless networks work using radio waves instead of wires to transmit data between computers. That’s the simple version. If you’re curious to know what’s going on in more detail, then it’s all explained in this article.
Continue reading ‘How Do Wireless Networks Work?’

Here's A Few More Related Posts:
  1. Get the Highest Speed Out of Your Wireless Computer
  2. It’s Easy: Setting up a wireless network
  3. Increasing the Range of your Wireless Access Points
  4. Wireless Networking Explained

XCACLS, SUNINACL, And Other Permissions Security Recovery Tools

by Darren Miller

You Have 50GB Of Data To Move Along With Permissions Security
—————————-
This article is about several tools that can save a Windows administrators you know what in the event of a large scale permissions security problem.
Here is a fictional scenario we can use to illustrate the use of the XCACLS tool. We need to move or copy 50GB worth of data that is comprised of several thousand directories containing hundreds of thousands of small files from one storage system to another. These systems happen to part of a Windows 2000 Domain and permissions are quite granular in definition. We start the replication of that data using a favorite replication or synchronization tool and walk away for the evening. When we return the next day, everything has copied and all looks well. That is until you try to access the data.
Continue reading ‘XCACLS, SUNINACL, And Other Permissions Security Recovery Tools’

Here's A Few More Related Posts:
  1. Data Recovery Procedures For Hard Drives
  2. Here’s the big picture on computer and network security
  3. PC Crash! How To Find The Best Data Recovery Consultant
  4. Data Recovery Services: What To Do When Your Hard Drive Fails