Home  News


mardi 8 septembre 2015 Data Breach: Guidelines to Plan Incident response

A data breach befalls when delicate data is exposed to the world. A sensitive data can be compromised by various means like spiteful attacks, unintentional mistakes, employee ineffectiveness, etc. Hacking mostly happens during electronic file transfers, accessing lost or stolen devices, or as a result of hackers’ permeation into a company’s server. Besides these ways, sending an unsecure email holding business data can also turn out to be a cause of data fissure...

See More

lundi 16 février 2015 Apply BgInfo using a Group Policy Logon Script (EN)

BgInfo is a very useful tool that allows having a background Wallpaper showing some information about your system. This usually saves time when collecting details about systems you manage or when troubleshooting issues on them...

See More

vendredi 13 février 2015 How to use Windows Azure as Traffic Manager for Web portals hosted in multiple on-premise datacenters (EN)

Windows Azure has WATM (Windows Azure Traffic Manager) feature that is capable to manage traffic Load Balancing and Failovering for Endpoints within Windows Azure Datacenters. Combining this feature and IIS Reverse-Proxy allows implementing an intelligent management and caching of traffic for Web portals hosted in multiple on-premise datacenters. This shares the way to achieve that...

See More

vendredi 23 janvier 2015 Active Directory Replication Issues – Basic Troubleshooting Steps (Single AD Domain in a Single AD Forest) (EN)

Most of Active Directory Replication issues are usually caused by one of the following...

See More

mercredi 29 janvier 2014 Comment obtenir le nombre d'ordinateurs par système d'exploitation Windows dans un domaine Active Directory en utilisant Powershell (FR)

Dans un domaine Active Directory, les détails sur la version d'un système d'exploitation sont stockés dans deux attributs sur les comptes d'ordinateurs...

See More