Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] Five blatant security mistakes you should avoid when setting up a wireless access point

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

TR Dojo

TechRepublic Member | July 12, 2011

Five blatant security mistakes you should avoid when setting up a wireless access point

Bill Detwiler shows you how to avoid five blatant security mistakes when deploying a new wireless access point. Read more

Resource of the day

BlackBerry Users: Never Leave Your Professional Network Behind

Discover how BlackBerry smartphone users can take their professional networks with them. Get an overview of the BlackBerry clients for IBM Lotus Connections and IBM Lotus Quickr and the technical details of how they work on BlackBerry.


Additional TechRepublic resources

 

Find unused computer accounts in Active Directory with dsquery

Bill Detwiler shows you how to find stale AD computer accounts using dsquery and suggest ways to handle the ones you uncover. Read more

Defrag and optimize your hard drive with the Windows defrag.exe command line tool

Bill Detwiler shows you how to defragment a hard drive from the Windows 7 command line, and use defrag.exe's hidden "boot optimization" switch. Read more

Follow up: Format Windows system information imported into Excel

Following up on a tip published just days before, Mike Radmore offers some example VBA code that will format system information imported into Excel into a more readable format. Read more

Challenge solution: Where's the message interval setting in Outlook 2010?

Last week, we asked you to help a user find an old favorite, setting the mail interval, in Outlook 2010. This week, we supply two ways to access this feature. Read more

10 reasons to stay in IT

Thinking about quitting IT? Alan Norton did -- more than once. See why he says there are 10 good reasons to hang in there. Read more

 

Cracking Open the HTC Flyer

Cracking open the HP TouchPad

Top 15 finalists from Google's international Science Fair

Id Software through the years



Today's recommended downloads

BlackBerry Users: Never Leave Your Professional Network Behind (IBM)

Storage Device Reliability and Endurance (Seagate)

Recommendations for Implementing Cloud Security (IBM)

New Storage Options to Tame the Information Explosion (IBM)

A Dashboard to Your Data


 

About this newsletter

TR Dojo is built around a philosophy of constant learning. Our bi-weekly newsletter is my chance to share real-world lessons, IT best practices, and advanced technical tips.

Bill Detwiler
Head Technology Editor

My Twitter feed: @billdetwiler

10 things I don't miss about Big Iron

Strolling down Memory Lane, you may hit the occasional pothole. Jaime Henriquez returns to his reflections on the age of Big Iron with a look at some things he's glad he left behind.



TechRepublic newsletters

 

Get IT advice and techniques, mobile news, Mac tips, and product reviews in these TechRepublic newsletters. Automatically sign up today!

Five Tips

10 Things

Smartphones

Macs in Business



Google+ coverage on TechRepublic

Why Google Plus is about to change the Web as we know it

Four ways Google+ will end up in your workplace

Google+: It's friending, with benefits (images)

7 Google+ essentials (photos)



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Storage Troubleshooting Flowchart

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

TR Pro Report

TechRepublic Member | July 12, 2011


Storage Troubleshooting Flowchart

If you're in the process of provisioning new storage -- or troubleshooting issues with existing storage -- this flowchart will help you resolve problems and sidestep future headaches. We've included the flowchart in both Visio 2007 and 2010 format and as a PDF.
Download it now >>


Resource of the day

New Storage Options to Tame the Information Explosion

Tame the information explosion with innovative technologies that improve storage efficiency, reduce cost, and minimize risk. Plus, get the news about a new storage offering that provides scalability, manageability, and enterprise-class capabilities.



 

More from TR Pro

 

Administrator's Guide to Linux in the Enterprise

As Linux continues to make inroads into the enterprise - and not just in the server room - this all-new collection of Linux tips will be a handy resource for any IT pro who is already working with the OS or who may be looking to implement more open source solutions.
Download it now >>

Web Servers: Applications and Vulnerabilities

This report from TechRepublic's research professionals will help you understand important Webhosting trends and see how others in the IT community are responding to the issues that arise from continued Web site attacks and the need to maintain and improve Web server performance.
Download it now >>

Support and Configuration Checklists for Small/Midsize Networks

This set of checklists will help you select, install, configure, and manage your networking equipment.
Download it now >>


 

Not a Member? Check out this free TR Pro sample download:

Learn your way around Outlook fast

You may know the basics of how to Microsft Outlook, but not how to use Outlook effectively. How do you get up to speed quickly without wasting time? If you had a TechRepublic Pro subscription, you could solve the problem quickly with exclusive downloads such as TechRepublic Pro's Quick Reference: Microsoft Outlook.

Discover other tools and downloads like this by becoming a TR Pro member today!


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter


10 things I don't miss about Big Iron

Strolling down Memory Lane, you may hit the occasional pothole. Jaime Henriquez returns to his reflections on the age of Big Iron with a look at some things he's glad he left behind.





Today's recommended downloads

Recommendations for Implementing Cloud Security (IBM)

Virtualizing When Lives Are at Stake (Citrix & WYSE)

7 Reporting Essentials for Independent Software Vendors

5 Steps to Telecom Transformation (ProfitLine)

Consolidating Your Network Storage Systems Auditing (Quest Software)




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Advanced Evasion Techniques -- what kind of threat are they?

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | July 12, 2011

Advanced Evasion Techniques allow stealthy perimeter attacks

Network perimeters are under attack. That's not news, but the techniques now being used are. Michael Kassner reports on AETs -- Advanced Evasion Techniques. Read more

Resource of the day

New Storage Options to Tame the Information Explosion

Tame the information explosion with innovative technologies that improve storage efficiency, reduce cost, and minimize risk. Plus, get the news about a new storage offering that provides scalability, manageability, and enterprise-class capabilities.


Cryptographer and computer scientist Robert Morris dies at 78

One of the men instrumental in early work on Unix, and the retired chief scientist of the NSA's National Computer Security Center, passed away this summer. Read more

Dropbox update (Updated): Terms of Service are in flux

If you're one of the 25 million people using Dropbox, expect an email from Dropbox management. Policies concerning you are changing. Read more

Additional TechRepublic resources

 

Background check companies scrutinize your online presence

A background check company can drill down into your social networking practices, going so far as to make note of what you 'like' in Facebook. Read more

Five password reset options for online apps

Programmer Justin James presents five common ways to reset passwords for online applications and explains which two of the options provide the most security. Read more

Poll: What kind of bug tracking do you use?

Do you use Team Foundation Server, Bugzilla, a homebrew, a shared document, or nothing at all for bug tracking? Let us know by taking this poll. Read more

Geek toolbelt: App monitors vulnerabilities on iOS

Derek Schauland reviews an app that helps you monitor iOS vulnerabilities from your iPhone or other iOS device. Read more

Save big bucks without risk: Get the most from Windows Server 2008 Backup Utility

John Joyner demonstrates how the built-in backup utility in Windows Server 2008 can be used for multiple scheduled daily backups and for off-site archiving in case of disaster. Read more

Featured multimedia

 

Inside AVG's virus lab (photos)

On a recent visit to the Czech Republic, CNET editor Seth Rosenblatt toured the AVG offices to see how antivirus protection gets made. See some of what he saw in this slideshow. View on site


Google+ coverage on TechRepublic

Why Google Plus is about to change the Web as we know it

Four ways Google+ will end up in your workplace

Google+: It's friending, with benefits (images)

7 Google+ essentials (photos)


Today's recommended downloads

Five Calls To Make When Developing a Mobile Learning Strategy (SkillSoft)

How to Remove Administrator Rights and Control Privileges (Viewfinity)

Build a Solid Strategy for Security and Risk Management (IBM)

Mitigate Vulnerabilities with Lockdown and Privilege Management (Viewfinity)

Recommendations for Implementing Cloud Security (IBM)


10 things I don't miss about Big Iron

Strolling down Memory Lane, you may hit the occasional pothole. Jaime Henriquez returns to his reflections on the age of Big Iron with a look at some things he's glad he left behind.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is techsubscriptionss@cesabarre.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

[TechRepublic] Advanced Evasion Techniques -- what kind of threat are they?

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | July 12, 2011

Advanced Evasion Techniques allow stealthy perimeter attacks

Network perimeters are under attack. That's not news, but the techniques now being used are. Michael Kassner reports on AETs -- Advanced Evasion Techniques. Read more

Resource of the day

Help Diverse Platforms Play Well Together

Allow your diverse platforms to play well together--all you need is a solid Active Directory (AD) bridge. But how do you choose the right one? Learn what questions to ask when choosing the right AD bridge solution.


Cryptographer and computer scientist Robert Morris dies at 78

One of the men instrumental in early work on Unix, and the retired chief scientist of the NSA's National Computer Security Center, passed away this summer. Read more

Dropbox update (Updated): Terms of Service are in flux

If you're one of the 25 million people using Dropbox, expect an email from Dropbox management. Policies concerning you are changing. Read more

Additional TechRepublic resources

 

Background check companies scrutinize your online presence

A background check company can drill down into your social networking practices, going so far as to make note of what you 'like' in Facebook. Read more

Five password reset options for online apps

Programmer Justin James presents five common ways to reset passwords for online applications and explains which two of the options provide the most security. Read more

Poll: What kind of bug tracking do you use?

Do you use Team Foundation Server, Bugzilla, a homebrew, a shared document, or nothing at all for bug tracking? Let us know by taking this poll. Read more

Geek toolbelt: App monitors vulnerabilities on iOS

Derek Schauland reviews an app that helps you monitor iOS vulnerabilities from your iPhone or other iOS device. Read more

Save big bucks without risk: Get the most from Windows Server 2008 Backup Utility

John Joyner demonstrates how the built-in backup utility in Windows Server 2008 can be used for multiple scheduled daily backups and for off-site archiving in case of disaster. Read more

Featured multimedia

 

Inside AVG's virus lab (photos)

On a recent visit to the Czech Republic, CNET editor Seth Rosenblatt toured the AVG offices to see how antivirus protection gets made. See some of what he saw in this slideshow. View on site


Google+ coverage on TechRepublic

Why Google Plus is about to change the Web as we know it

Four ways Google+ will end up in your workplace

Google+: It's friending, with benefits (images)

7 Google+ essentials (photos)


Today's recommended downloads

Build a Solid Strategy for Security and Risk Management (IBM)

Diagnose and Resolve AD Performance Issues Faster (Quest Software)

Cloud Computing Implementation: Learning From Others Mistakes (IBM)

Recommendations for Implementing Cloud Security (IBM)

Active Directory: Tricks to Maintaining a Healthy Network (Quest Software)


10 things I don't miss about Big Iron

Strolling down Memory Lane, you may hit the occasional pothole. Jaime Henriquez returns to his reflections on the age of Big Iron with a look at some things he's glad he left behind.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.