Monthly Archives: March 2013

If you’re a Firefox user, about:addons-memory will help you find the add-ons that are dragging your browser’s performance down.
about:addons-memory doesn’t need the browser to be restarted upon installation. It adds a new about page, about:addons-memory that gives you a summary of the memory consumed by all installed and enabled add-ons in Firefox. Memory usage is shown in MB, followed by an Add-on column that shows the add-on’s relative memory usage in comparison with the others enabled add-ons. A ‘Minimize memory usage’ button at the bottom of the page allows you to reduce the memory being used, but it is a temporary solution. Memory usage might also fluctuate depending on whether an add-on is actively working currently or not.addons-memory Erectiestoornis diabetes

Microsoft exchange server 2010 | part-2
Step 2 – Configure Active Directory.

At the Server Management screen you should now see that you have 1 role installed. The Active Directory Domain Services may indicate that it is installed but there are errors. This is because the software is installed but not configured.
Microsoft exchange server 2010
Viagra bloeddruk

Configure Your Static IP Address
Leave the IP v6 set to the default setting of DHCP.

NOTE: Exchange requires that IP V6 be enabled. Even if you do not use IP V6 you must leave it enabled. During the setup of Active Directory, the Active Directory Setup Wizard will check that both IP v4 and IP v6 have static addresses. As long as the IP v4 address is static you can continue the installation. DO NOT DISABLE IP V6 or else the Exchange Hub Transport Service will not start.
Continue reading

Is this machine the central log server for your organization? If so, edit the file /etc/sysconfig/syslog.

Add or correct the following line:
SYSLOGD_OPTIONS=”-m 0 -r -s “

Where is the name of your domain.
If the machine is not a log server, edit /etc/sysconfig/syslog, and instead add or correct the line:

By default, RHEL5’s syslog does not listen over the network for log messages. The -r flag enables syslogd to listen over a network, and should be used only if necessary. The -s flag strips the domain name from each sending machine’s hostname before logging messages from that host, to reduce the amount of redundant information placed in log files.

Edit /etc/syslog.conf. Add or correct the line:

Where is the name of your central log server.

It is particularly important that logs be stored on the local host in addition to being sent to the loghost, because syslogd uses the UDP protocol to send messages over a network. UDP does not guarantee reliable delivery, and moderately busy sites will lose log messages occasionally, especially in periods of high traffic which may be the result of an attack. In addition, remote syslogd messages are not authenticated, so it is easy for an attacker to introduce spurious messages to the central log server. Also, some problems cause loss of network connectivity,which will prevent the sending of messages to the central server. For all of these reasons, it is better to store log messages both centrally and on each host, so that they can be correlated if necessary.

Internet Explorer 10 is available worldwide in 95 languages for download. Auto updating Windows 7 customers to IE10 in the weeks ahead, starting now with customers running the IE10 Release Preview. With this final release, IE10 brings the same leading standards support, with improved performance, security, privacy, reliability that we enjoy on Windows 8, to Windows 7.

20% faster for real world Web sites


Sildenafil hennig

Edit the file /etc/login.defs to specify password expiration settings for new accounts.Add or correct the following lines:

For each existing human user USER , modify the current expiration settings to match these:
# chage -M 60 -m 7 -W 7 USER

Users should be forced to change their passwords, in order to decrease the utility of compromised passwords. However, the need to change passwords often should be balanced against the risk that users will reuse or write down passwords if forced to change them too often. Forcing password changes every 90-360 days, depending on the environment, is recommended. Set the appropriate value as PASS MAX DAYS and apply it to existing accounts with the -M flag.
Continue reading

Page 2 of 512345