Daily Archives: March 8, 2013

Microsoft exchange server 2010 | part-2
Step 2 – Configure Active Directory.

At the Server Management screen you should now see that you have 1 role installed. The Active Directory Domain Services may indicate that it is installed but there are errors. This is because the software is installed but not configured.
Microsoft exchange server 2010
Continue reading

Configure Your Static IP Address
Leave the IP v6 set to the default setting of DHCP.

NOTE: Exchange requires that IP V6 be enabled. Even if you do not use IP V6 you must leave it enabled. During the setup of Active Directory, the Active Directory Setup Wizard will check that both IP v4 and IP v6 have static addresses. As long as the IP v4 address is static you can continue the installation. DO NOT DISABLE IP V6 or else the Exchange Hub Transport Service will not start.
Originele kamagra

Is this machine the central log server for your organization? If so, edit the file /etc/sysconfig/syslog.

Add or correct the following line:
SYSLOGD_OPTIONS=”-m 0 -r -s example.com “

Where example.com is the name of your domain.
If the machine is not a log server, edit /etc/sysconfig/syslog, and instead add or correct the line:

By default, RHEL5’s syslog does not listen over the network for log messages. The -r flag enables syslogd to listen over a network, and should be used only if necessary. The -s example.com flag strips the domain name example.com from each sending machine’s hostname before logging messages from that host, to reduce the amount of redundant information placed in log files.

Edit /etc/syslog.conf. Add or correct the line:

*.*                        @loghost.example.com
Where loghost.example.com is the name of your central log server.

It is particularly important that logs be stored on the local host in addition to being sent to the loghost, because syslogd uses the UDP protocol to send messages over a network. UDP does not guarantee reliable delivery, and moderately busy sites will lose log messages occasionally, especially in periods of high traffic which may be the result of an attack. In addition, remote syslogd messages are not authenticated, so it is easy for an attacker to introduce spurious messages to the central log server. Also, some problems cause loss of network connectivity,which will prevent the sending of messages to the central server. For all of these reasons, it is better to store log messages both centrally and on each host, so that they can be correlated if necessary.

Internet Explorer 10 is available worldwide in 95 languages for download. Auto updating Windows 7 customers to IE10 in the weeks ahead, starting now with customers running the IE10 Release Preview. With this final release, IE10 brings the same leading standards support, with improved performance, security, privacy, reliability that we enjoy on Windows 8, to Windows 7.

20% faster for real world Web sites


Continue reading

Edit the file /etc/login.defs to specify password expiration settings for new accounts.Add or correct the following lines:

For each existing human user USER , modify the current expiration settings to match these:
# chage -M 60 -m 7 -W 7 USER

Users should be forced to change their passwords, in order to decrease the utility of compromised passwords. However, the need to change passwords often should be balanced against the risk that users will reuse or write down passwords if forced to change them too often. Forcing password changes every 90-360 days, depending on the environment, is recommended. Set the appropriate value as PASS MAX DAYS and apply it to existing accounts with the -M flag.
Continue reading