Articles

Find and Search for various articles and features about Information Technology

PIX Terminology and Background Information

Cisco PIX Firewall BasicsThe following diagram shows a multi-port PIX connected to various networks. Cisco PIX Firewall Basics PIX terminology: we generally refer to the user segment as the Inside subnet. The interface connected to the Internet router is the outside subnet. As shown, we probably have DMZ (De-Militarized Zone) subnet, the subnet where we(…)

How to Tune Nagios For Maximum Performance

Optimization Tips: 1. Graph performance statistics with MRTG. In order to keep track of how well your Nagios installation handles load over time and how your configuration changes affect it, you should be graphing several important statistics with MRTG. This is really, really, really useful when it comes to tuning the performance of a Nagios(…)

How to Secure Nagios – Best Practices

Best Practices Use a Dedicated Monitoring Box. I would recommend that you install Nagios on a server that is dedicated to monitoring (and possibly other admin tasks). Protect your monitoring server as if it were one of the most important servers on your network. Keep running services to a minimum and lock down access to(…)

How to create a /robots.txt file

Where to put it In the top-level directory of your web server. When a robot looks for the “/robots.txt” file for URL, it strips the path component from the URL (everything from the first single slash), and puts “/robots.txt” in its place. For example, for “http://www.example.com/shop/index.html, it will remove the “/shop/index.html“, and replace it with(…)

About WWW robots

What is a WWW robot? A robot is a program that automatically traverses the Web’s hypertext structure by retrieving a document, and recursively retrieving all documents that are referenced. Note that “recursive” here doesn’t limit the definition to any specific traversal algorithm; even if a robot applies some heuristic to the selection and order of(…)

What are DLL files?

Dynamic Link Library (DLL) files are dynamic code libraries that are used by Windows operating systems, device drivers, and various Windows-based applications to perform specific tasks on the computer. The popularity of DLL files is governed by the fact that it reduces the need to include the same code again and again in different applications.(…)

How to Find the Hottest Searched Keywords and Topics on Internet

What do people search for on the Internet? What Topics, Keywords and Phrases are being searched n the Internet right now? Finding this information may be easier than you think. Most search engines organize and keep track information regarding search history and publicize the results for anyone to view. The following are some resources that(…)

WordPress SEO Search Engine Optimization tips

Search Engine Optimizationor SEO works a bit differently for those of us using WordPress blogging software. In this article I will show you a few tips on how to optimize your personal WordPress blog to obtain a higher Pagerank. Pagerank is how search engines like Google, MSN and Yahoo rate your site compared to other(…)

Best Practices for User Profiles Windows 2003

To get the best experience possible from roaming user profiles, it is important to read all the documentation and plan your implementation thoroughly. This section presents best practices for using roaming user profiles. Turn off the fast logon enhancement With the fast logon enhancement in Windows XP when users change from a local to a roaming(…)

User Profile Structure in Windows

User Profile. Each users profile contains the following folders: Application data*. Application-specific data, such as a custom dictionary for a word processing program. Application vendors decide what data to store in this directory. Cookies. Internet Explorer cookies. Desktop. Desktop items, including files and shortcuts. Favorites. Internet Explorer favorites Local Settings*. Application settings and data that(…)

Introduction to SSL/TLS in Windows Server 2003

SSL/TLS is most widely recognized as the protocol that provides secure HTTP (HTTPS) for internet transactions between Web browsers and Web servers. It can also be used for other application level protocols such as FTP, LDAP, and SMTP. The SSL/TLS protocol enables server authentication, client authentication, data encryption and data integrity over networks such as(…)

Folder Redirection Overview Windows 2003

Folder redirection is a feature of IntelliMirror that allows users and administrators to redirect the path of a folder to a new location. The new location can be a folder on the local computer or a directory on a network share. Users have the ability to work with documents on a server as if the(…)