Download MP3s via Google Search

I start with a disclaimer: I do not advocate piracy nor support it. Whatever you learn from this and how you apply it to your benefit/misfit is completely beyond the purpose of this article. Be responsible for your actions or inactions 😛 OK. Sigh of … “Download MP3s via Google Search”

Read More

Firewall Considerations

A MERDEKA SHOUT OUT TO ALL MALAYSIAN! LONG LIVE MALAYSIA When purchasing a firewall long time ago, there weren’t many things to consider as it was really the lame ole’ packet and stateful filtering the few vendors boast about. Fine, that was then but these … “Firewall Considerations”

Read More

PDF and ECard Spam

Hi there, bet most of you are wondering why’s your mom (who’s perhaps computer illiterate btw) sends an e-greeting for an occasion that has nothing to do with you (e.g. Indonesia’s national day, today!). Well, the answer is simple, they’re just SCAMS!. Recently, i’ve received … “PDF and ECard Spam”

Read More

Top 5 reasons why you shouldn’t connect to an open wireless (WiFi specifically) connection

When you connect to, umph, say, Starbucks’s wireless networks and similar, you connect without even providing a username or password (some of these applies to web based authentication) think about these; 1. It’s open, therefore there’s NO encryption, everyone (can) see your traffic 2. Others … “Top 5 reasons why you shouldn’t connect to an open wireless (WiFi specifically) connection”

Read More

Accessing paid tech knowledgebase (for free!!!)

Its really frustrating sometimes that these communities like expert-exchange, event-id charge for a community response. I think it should be free! Anyway, i found a nasty way to access some of these information for free. How to?Firstly, you would probably do a search engine for … “Accessing paid tech knowledgebase (for free!!!)”

Read More

Running checklists

I am a big fan of checklists, besides “reminding” us of steps to do or take, it creates a kind of standardization for work being done. Pilots use checklists even they have thousands of flying hours and are highly experienced. Why? We are only human, … “Running checklists”

Read More

How to enable the 75 gigabyte limit on Exchange 2003

So you’ve implemented Exchange 2003 and installed it with service pack 2. Your database grows up to 20 GB from all that migration suddenly the Information Store stops with an error. Well, don’t panic. In Microsoft Exchange 5.5 until 2003 standard editions , the database … “How to enable the 75 gigabyte limit on Exchange 2003”

Read More

Safari for Windows Beta 3 – Vulnerabilities found in found in mere minutes

Apple corporation released Safari 3.0 beta 3 and works on Windows as well. I downloaded and tested B3 after Frank sent an email of this release. Just cruising the web i found already 10s of vulnerabilities in this browser by far. This was further confirmed … “Safari for Windows Beta 3 – Vulnerabilities found in found in mere minutes”

Read More

Stirling- The fore front to Microsoft FOREFRONT

Its about time someone envisions something like this. Imagine, a centralized desktops and servers management platform, with anti-malware, email message protection, workstation access validation, centralized log correlation, personal firewall and what have you. It all spells ONE CONSOLE, ONE INTERFACE which equates SIMPLICITY. The key … “Stirling- The fore front to Microsoft FOREFRONT”

Read More