Standard Bank Account Statement – Internet Banking Cyber Crime Scams

Protecting your computer against hacking and virus attacks is your responsibility. Don’t be a victim of cyber crime or less you will lose your hard earned money.  Cyber criminals are really stepping up their game and are using advanced social engineering methods. I’m talking about high-level digital strategies to siphon off your bank account.  With so many people using… Read More »

ABSA Cyber Online Scams – Unauthorized login on your account

Don’t be a victim: This is another type of Cyber Online Scams doing the rounds you should definitely watch out for. This time the Cyber Criminals are targeting innocent ABSA clients. Below is an example of an email I received: Subject line: Unauthorized login on your account. NB: If you hover your mouse cursor over… Read More »

How to Install IIS and asp.net modules on windows 2012 r2 using Powershell

Open your Powershell in Run as Administrator mode: then run the following powershell Cmdlet Set-ExecutionPolicy RemoteSigned Import-Module ServerManager install-windowsfeature net-framework-core Add-WindowsFeature Web-Server, Web-Static-Content, Web-Default-Doc, Web-Http-Errors, Web-Asp-Net, Web-Net-Ext, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Http-Logging, Web-Log-Libraries, Web-Request-Monitor, Web-Http-Tracing, Web-Basic-Auth, Web-Windows-Auth, Web-Client-Auth, Web-Filtering, Web-Stat-Compression, Web-Dyn-Compression, NET-Framework-45-Core, NET-WCF-HTTP-Activation45, Web-Asp-Net45, Web-Mgmt-Tools, Web-Scripting-Tools, Web-Mgmt-Console, Web-Mgmt-Compat, Windows-Identity-Foundation, Server-Media-Foundation, BITS restart-computer

Standard Server Architecture that can be adopted for branch Offices

HP ProLiant DL380e Gen8 Server The HP ProLiant DL380e Gen8 Server delivers essential features and dense storage in a 2U, 2 socket server. Features like management, networking and serviceability along with different drive cage choices help applications meet their needs, including those with unique storage requirements. Also features enterprise-class uptime and HP Insight Control manageability,… Read More »

Hyper-V® Health Check

A scheduled inspection to review your existing Microsoft Hyper-V environment. Health Check for Microsoft Hyper-V is designed for customers who:  want to enhance their Hyper-V cluster or single installation  want to compare the performance of their environment against Microsoft best practices have identified performance issues or any other problems  want an assessment… Read More »

Active Directory-Based Network Security

What I can do for your organization? Active Directory Security focusing exclusively on change auditing to meet the need for this rising security technology, fast detection of security incidents, easy assessments of security, detailed forensic analysis of changes and reliable continuous compliance, while improving business continuity, decreasing system downtime and establishing accountability. File Server Security… Read More »

Granny sells bed for grandson’s studies

A grandmother sold her bed so her grandson could register to study at the Durban University of Technology, in South Africa. Sibiya, 70, sold her bed for R2 000 and also used some pension money to pay for her grandson’s registration. The university found sponsors to give Sibiya cash to help with the running of… Read More »

How To Install Exchange 2013 On Windows 2012 R2 Server Step by Step

This guide provides basic steps for installing the necessary Windows Server 2012 R2 operating system prerequisites for the Microsoft Exchange 2013 Mailbox and Client Access server roles on a single Windows 2012 R2 Server. This guide comes with comprehensive functional components that are required to deploy Exchange 2013 and based on practical design principles that… Read More »

How do I change timezone on Ubuntu Server

I recently moved some of my Ubuntu Dedicated Web Hosting Servers from offshore data centres to my Johannesburg Data Centre,  and I needed  to change the time zone to be in sync with South Africa Standard Time of Greenwich Mean Time (GMT+2). Howto? To accomplish this task, simply execute ‘dpkg-reconfigure tzdata’ to change time zone on… Read More »

Active Directory Security Checklist

As the very foundation of your organization’s security, your Active Directory is an extremely high-value organizational IT asset. It is most likely the largest and most critical distributed system in your enterprise. Along with disaster recovery, Active Directory® security is at the top of the list of topics that IT executives worry about protecting in… Read More »