Everything about Web and Network Monitoring

About Irina Tihova

I'm a Microsoft and CompTIA certified Security specialist with experience in networking and systems administration. I've been working for New Horizons Computer Learning Centers for quite a while as a Systems Administrator and as a Technical Trainer. I've led courses on Microsoft Windows Server systems and Microsoft Exchange Server. Currently I'm still practicing on Microsoft technologies as a consultant and I'm guest blog posting for Paid Monitor. 
windows-server-2012-logo11

Windows Server 2012 Security Enhancements

Microsoft has been putting in more and more effort to secure their systems in the time since the old Windows NT days. In this article we will focus on the new advanced features that they have introduced in their latest version – Windows Server 2012.   Dynamic Access Control Dynamic Access Control is a new… Read the full post

Drupal

7 modules that can improve your Drupal’s security

In our previous article, 13 Handpicked WordPress Plugins for Security, we focused on the ways you can make your WordPress platform more secure. In this article we will concentrate our attention on one of the other popular blogging platforms – Drupal. We will make sure that all the important steps for securing it and its most… Read the full post

ceh-logo

Scanning your business network

In our first article, Is Your Business’s Privacy at Risk?, we looked over the different not that technical methods for gathering information about a network you’re interested in. In this article, the second of the series, we will focus on the process of scanning computer networks to identify potential targets. As an ethical hacker you would… Read the full post

ceh-logo

Is Your Business’s Privacy at Risk?

Have you ever wondered how much information there is about your business on the web? Were you just curious or were you concerned? It’s great to have information on the web; it suits your marketing needs perfectly and it’s cheap. However, having more information on the web than your users need may compromise your security.… Read the full post

wordpress-security-plugins

13 Handpicked WordPress Plugins for Security

  When we were covering best blogging platforms for your business, one of the advantages of  Wordpress we mentioned  wass that it has a big developer community which results in a  variety of tools and plugins designed for the platform. There’s no doubt that WordPress’s content is its most valuable asset. However, there are some steps you… Read the full post

office365logo

Office 365 Overview

Office365 is the successor of Microsoft BPOS (Business Productivity Online Standard Suite) and it’s basically an online service allowing organizations’ employees to share information through the Internet. Office 365 consists of several Software-as-a-Service (SaaS) products, such as Exchange Online, Lync Online, and SharePoint online, together with the common Microsoft Office applications, such as Word, Excel,… Read the full post

forefront_v_web

Forefront TMG – The Successor of ISA

Forefront TMG – The Successor of ISA 1. Native 64-bit and IPv6 support Forefront TMG is installed on Windows Server 2008 64-bit edition and is able to function even on Layer 2 of the OSI model, which means it can support the upper-level IPv6. Forefront uses the Network Driver Interface Specification (NDIS) driver in order… Read the full post

LogoAspNet

ASP.NET Performance Tips

In this article you can find some easy steps you can follow to maximize the performance of your ASP.NET applications. 1. Use caching. When multiple users request the same content from your page, your server can respond with a cached copy of that content. This way, only the first user will have to wait for… Read the full post