System Administrators’ Code of Ethics

4 May

System Administrators’ Code of Ethics PDF suitable for framing: Poster version (vertical) or Diploma version (horizontal).   USENIX grants permission to reproduce this Code in any format, provided that the wording is not changed in any way, that signatories USENIX, LISA, and LOPSA are … Read More »

SQL backup

20 Apr

For details on how to use Windows Server Backup for application level recovery please look at the article http://technet.microsoft.com/en-us/library/cc725726.aspx Note: 1. The application needs to be registered with Windows Server Backup for showing it as a recoverable item in the recovery wizard. Please see details on … Read More »

Differences Between Cat6 and Cat6a Cables

12 Apr

Differences Between Cat6 and Cat6a Cables Digging Further Into the Mystery BY: Shane Weaver  http://www.cableorganizer.com/articles/what-is-difference-between-cat6-cat6a.html So hopefully by now you’ve checked out our article detailing the differences between Cat5, Cat5e and Cat6 cables. If not, I highly recommend it. But … Read More »

use of the TTL

28 Mar

The TTL Trick Or the importance of knowing networking fundamentals so you can blame the network 🙂 https://medium.com/@pjperez/the-ttl-trick-c78f1279817d#.auia1ug8s I have met several network engineers during my life. Most of them are very clever and pragmatic people. These engineers can solve the … Read More »

Top 20 Free Digital Forensic Investigation Tools for SysAdmins

14 Mar

Top 20 Free Digital Forensic Investigation Tools for SysAdmins http://www.gfi.com/blog/top-20-free-digital-forensic-investigation-tools-for-sysadmins/ Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access … Read More »