How to enable the 75 gigabyte limit on Exchange 2003

So you’ve implemented Exchange 2003 and installed it with service pack 2. Your database grows up to 20 GB from all that migration suddenly the Information Store stops with an error. Well, don’t panic. In Microsoft Exchange 5.5 until 2003 standard editions , the database … “How to enable the 75 gigabyte limit on Exchange 2003”

Read More

Safari for Windows Beta 3 – Vulnerabilities found in found in mere minutes

Apple corporation released Safari 3.0 beta 3 and works on Windows as well. I downloaded and tested B3 after Frank sent an email of this release. Just cruising the web i found already 10s of vulnerabilities in this browser by far. This was further confirmed … “Safari for Windows Beta 3 – Vulnerabilities found in found in mere minutes”

Read More

Stirling- The fore front to Microsoft FOREFRONT

Its about time someone envisions something like this. Imagine, a centralized desktops and servers management platform, with anti-malware, email message protection, workstation access validation, centralized log correlation, personal firewall and what have you. It all spells ONE CONSOLE, ONE INTERFACE which equates SIMPLICITY. The key … “Stirling- The fore front to Microsoft FOREFRONT”

Read More

Security Showdown

Graph source, http://blogs.zdnet.com/security/?p=135 A recent study by ZDnet reveals Vista has way lesser vulnerabilities and high fixes rate as compared to other OSes like RHEL, MacOS. Vista, is what i would imagine, a begining to what will be of the security enabled operating systems, come … “Security Showdown”

Read More

Hashbreaker

5b69d4f5b5e7929b5c593e1d63cfc078 – Thats “password” in MD5digest. How to crack more hashes? Try www.hashbreaker.com. Register very quickly and use their free version. If you like it, use their paid service. They use Rainbowtables at the backend, which is an open source hash cracking tool available with … “Hashbreaker”

Read More

Windows IPSEC

I was doing lots of testing using IPSEC over the weekend (yea, don’t have a life). I must say, in Windows client and server environment, it’s really simple to implement it. Unlike popular application, IPSEC can be centrally deployed and managed in Windows through Group … “Windows IPSEC”

Read More

Top 5 reasons why i would like to implement ISA Server 2006 as my outgoing proxy/firewall

ISA Server is the ONLY FIREWALL THAT I KNOW today that supports authentication for almost all WINSOCK compliant protocols if you use Windows Operating System. 2. ISA Server stores frequently used caches in memory 3. ISA Server contain out of the box a bunch of … “Top 5 reasons why i would like to implement ISA Server 2006 as my outgoing proxy/firewall”

Read More

Multiple Vulnerabilities with Cisco’s PIX and ASA

There’s a possible bypass for authentication when LDAP is used for Chap/MsChap in Cisco’s VPN. An attacker can access your internal network without providing authentication at all. This is quite serious to those running LDAP on PIXes and ASAes. So far, as i can remember … “Multiple Vulnerabilities with Cisco’s PIX and ASA”

Read More