Configuring a VPN

INFORMATION: Save money on long distance charges. Use the Internet to send and receive packets from your hotel while away on business. a VPN is a Virtual Private Network, not like the public Internet.Duration : 0:3:33

Posted on February 10th, 2008 by admin

Filed under VPN | No Comments »

Wireless Networks, Hard Drive Failures, Web Browsers

http://live.pirillo.com – Taking live calls on the 888-PIRILLO line is always fun, especially when the questions are so diverse! This one entails more than one question/topic, so it was three times the fun!Duration : 0:9:55

Posted on February 8th, 2008 by admin

Filed under Wireless | 14 Comments »

An Overview of the Configuration of ISA Server 2006

During the installation of ISA Server 2006 you were given relatively few options for configuring ISA Server therefore it is important to understand how to use the ISA Server Management tool. This video helps you understand the ‘big picture’ of ISA Server management.

Highlights from this video:

* Using the ISA Server Management tool to manage your firewall and more
* How you configure your firewalls, networks, sets and rules
* Monitoring ISA Server
* Best Practices for monitoring ISA ServerDuration : 0:5:15

Posted on February 8th, 2008 by admin

Filed under Firewalls | No Comments »

VIEWpoint — Jan. 23, 2008 segment 1 on Videoconferencing

Industry professionals Gary Kayye, CTS, a well known AV industry consultant and John Swoyer, general manager of Videré Conferencing, a firm that specializes in high-definition conferencing for high-end environments discuss Videoconferencing as it relates to the commercial AV systems integrator, contractor and consultant.

http://www.soundandcommunications.com/viewpointDuration : 0:9:34

Posted on February 5th, 2008 by admin

Filed under Video Conferencing | No Comments »

VIEWpoint — Jan. 23, 2008 segment 2 on Videoconferencing

Industry professionals Gary Kayye, CTS, a well known AV industry consultant and John Swoyer, general manager of Videré Conferencing, a firm that specializes in high-definition conferencing for high-end environments discuss Videoconferencing as it relates to the commercial AV systems integrator, contractor and consultant.

http://www.soundandcommunications.com/viewpointDuration : 0:6:55

Posted on February 5th, 2008 by admin

Filed under Video Conferencing | No Comments »

LHN-TAS-01.5 Microsoft SQL 2005 Backup and Restore VSS Snaps

LeftHand Networks Technical Application Series

TAS-01 VSS Scriptable Snapshots and the LeftHand SAN – SQL 2005 Backup and Restore
Part 5 of 6

Have you run Microsoft SQL Server 2005 in an iSCSI Storage Area Network (SAN) and wondered how to create a server-free backup policy through the use of hardware based snapshot leveraging Microsoft’s VSS in order to provide consistent point in time snapshots. Every SQL Database Administrator and Storage Administrator should know how to leverage VSS snapshots in backup and restoration. This tutorial will guide a SQL Server 2005 Administrator to locating Database and Log files on separate iSCSI Volumes. Utilize the LeftHand Networks VSS Hardware provider to perform offhost volume snapshots which are application consistent point in time copies of data. Demonstration of Microsoft Access ODBC client access to data and data restoration demonstrations.

For Additional Information, http://www.lefthandnetworks.com or 1.866.4.IPSANS (866.447.7267)Duration : 0:9:59

Posted on January 29th, 2008 by admin

Filed under Backups | No Comments »

how to use hamachi software+how to create + join networks

how to setup, join and create networks with hamachi lan software you can download hamachi here https://secure.logmein.com/products/hamachi/vpn.asp?lang=en

this is just one use for the software it is usually used by buisnesses to link computers togther and search their files easily so make sure you turn off file searching in the preferences if you join random games because people can access your files so only game with peope you trustDuration : 0:1:47

Posted on January 28th, 2008 by admin

Filed under SSL | 7 Comments »

How to Secure Your Wireless Network

http://live.pirillo.com – One community member wrote: “After years of mistrust about wireless networks and creative use of Ethernet cabling I have now adopted a wireless network in my home for a laptop to access anywhere in the house. I have over the past week, done a lot of research and have some tips the community might want to consider in relation to the setup and/or use of wireless networks.”Duration : 0:8:17

Posted on January 24th, 2008 by admin

Filed under Ethernet | 14 Comments »

RSA on Securing Enterprise Access to Network Resources

What are leading companies doing to secure internal access to network resources? Join Karen Kiffney, Product Marketing Manager at RSA, The Security Division of EMC, as she discusses the critical steps companies should take to secure internal access, protect network resources, and secure access points.
Whitepaper: Securing Internal Access to Enterprise Resources
https://www.rsa.com/go/wpt/wpindex.asp?WPID=8905
Confessions Survey: Sensitive Information at Risk https://www.rsa.com/go/wpt/wpindex.asp?WPID=9013Duration : 0:4:25

Posted on January 21st, 2008 by admin

Filed under SSL | No Comments »

RSA on Key Components of a Secure Remote Access Solution

Join John Masotta, Senior Product Marketing Manager at RSA, The Security Division of EMC, as he explores how leading companies are enabling employees, partners and customers to remotely access critical information and resources residing on the corporate network. Hear why companies are doing it and more importantly how they are doing it securely.
Solution Brief: Secure Remote Access
http://www.rsa.com/go/wpt/wpindex.asp?WPID=8606
White Paper: Securing SSL VPNs with RSA SecurID® Two-factor Authentication
http://www.rsa.com/go/wpt/wpindex.asp?WPID=4192Duration : 0:5:35

Posted on January 21st, 2008 by admin

Filed under SSL | No Comments »