Launching InPrivate/Incognito ala CLI and InPrivate testing of its claims ;)

This is a by the way article since i’ve got nothing better to do sitting at a client after a network migration. Alright, a little history, Internet Explorer 8/Chrome comes with a feat called InPrivate/Incognito browsing. InPrivate and Incognito, as the name implies ensure whatever … “Launching InPrivate/Incognito ala CLI and InPrivate testing of its claims ;)”

Read More

Microsoft Exchange Alternative?

Quoted off http://www.eweek.com/c/a/Data-Storage/Cisco-Buys-PostPath-to-Compete-with-Microsoft-Exchange/ “Cisco Systems acquired PostPath, a Microsoft Exchange e-mail storage competitor, and heads down the path of a big-time “co-opetition” to handle enterprise e-mail against a longtime partner, Microsoft. PostPath uses augmented open-source software and an optional appliance that plugs directly into a … “Microsoft Exchange Alternative?”

Read More

Monitoring Exchange Unauthorized Mailbox Access (Exchange 360degree monitoring) PART: 1

This is one of the three part security auditing post for Exchange servers. Many implementers, system integrators, users and administrators implement Exchange servers as part of their collaboration infrastructure without knowing what’s going on in Exchange. For security conscious companies/people, its important to know that … “Monitoring Exchange Unauthorized Mailbox Access (Exchange 360degree monitoring) PART: 1”

Read More