Windows User State Virtualization – Mixed Environments
Designing a User State Virtualization strategy for a mixed environment poses a number of different challenges. By mixed environment I’m referring to a client computing infrastructure that has:...
View ArticleCheating Email Retention
A retention policy determines the length of time emails are to be saved before final deletion. However enforcing the policy without leaving gaps may be trickier than expected. Today we look at how many...
View ArticleNIS (Network Inspection System) in Threat Management Gateway
Network Inspection System (NIS) is the vulnerability signature component of TMG’s Intrusion Prevention System (IPS). NIS is a brand new feature in TMG, and helps prevent zero-day attacks. This post...
View ArticleOffice 2010 can`t be targeted by New Zero-Day Flash Attacks
Microsoft weighed in today on the new, targeted zero-day attacks revealed by Adobe this week that hide a Flash Player exploit inside Excel spreadsheet documents — confirming that Office 2010 is safe...
View ArticleHow to spot bad SQL query performance
Once you’ve fine-tuned your databases’ indexes, maxed out your hardware and gotten the fastest disks money can buy, you’ll hit a limit on how much performance you can squeeze from your SQL Server...
View Article
More Pages to Explore .....