rodrigotrodrigues.wordpress.com
Lista de portas TCP/UDP usadas pelo Exchange 2010 e suas funções | Rodrigo Rodrigues .:. www.andersonpatricio.org
https://rodrigotrodrigues.wordpress.com/2011/04/11/lista-de-portas-tcpudp-usadas-pelo-exchange-2010-e-suas-funcoes
Rodrigo Rodrigues .:. www.andersonpatricio.org. Blog dedicado a Exchange Server e Lync Server. Lista de portas TCP/UDP usadas pelo Exchange 2010 e suas funções. Lista de portas TCP/UDP usadas pelo Exchange 2010 e suas funções. 11 de abril de 2011. Post excelente de 2 partes escrito pelo Mike Rede do www.theemailadmin.com. Ele ainda detalha os protocolos utilizados pelo sistema e suas funções. Veja aqui: http:/ www.theemailadmin.com/2011/04/tcpudp-ports-used-by-exchange-server- -part-1-of-2/. Lync 2013 We...
patrickhoban.wordpress.com
Links | Patrick's Blog
https://patrickhoban.wordpress.com/links
Just a bunch of I.T. Here are links to some sites I frequent. The Email Admin: http:/ www.theemailadmin.com/. Subject: exchange: http:/ msmvps.com/blogs/ehlo/default.aspx. Troubleshooting Exchange: http:/ exchangemaster.wordpress.com. Exchange Inbox – http:/ www.exchangeinbox.com. SMTP Port 25 – http:/ smtpport25.wordpress.com. Steve Goodman’s Exchange Blog – http:/ www.stevieg.org. Techincal Jedi Trials Blog – http:/ technicaljeditrials.info. Aidan Finn, IT Pro – http:/ www.aidanfinn.com. Windows Server...
ephemerallaw.blogspot.com
Ephemerallaw: April 2010
http://ephemerallaw.blogspot.com/2010_04_01_archive.html
A blog about the law surrounding information security and data privacy. Thursday, April 29, 2010. FTC TO CREATE GUIDELINES FOR INTERNET PRIVACY. If past experience is any indication, however, it will be months before we know definitively whether the FTC will choose to move in that direction. Posted on behalf of Jane Shea). Links to this post. Sunday, April 25, 2010. Distinguishing Quon and Stengart. A few weeks ago, I posted about Stengart v. Loving Care Agency. However, while I still think it is likely ...
ephemerallaw.blogspot.com
Ephemerallaw: March 2010
http://ephemerallaw.blogspot.com/2010_03_01_archive.html
A blog about the law surrounding information security and data privacy. Sunday, March 21, 2010. Is chasing cybercrooks worth it? That's the headline to this. The whole get-the-bad-guys effort, while it makes for good drama, is a futile way to secure the Internet, some computer security experts say. It would be smarter, Karygiannis said, to develop new anti-virus technologies and to teach people how to protect themselves from Internet crime. First, Karygiannis' proposed alternatives are, at best, highly i...
retrohack.com
RETROHACK | Tag Archive | cli
http://retrohack.com/tag/cli
Lest the tubes become overfull…. Howto:/ launch a webpage from a batch file. December 12th, 2013 · Ed Fisher. So there is a class I am trying to get into, and apparently it’s so full that the waitlist is massive. They sent an email blast out for the first open seat on a first to respond wins basis. I wasn’t first. If they happen to send another email blast though, I will win that time, because this is what I am doing. Create a register.cmd file that contains the following. START c: scratch reg.html.
ephemerallaw.blogspot.com
Ephemerallaw: November 2010
http://ephemerallaw.blogspot.com/2010_11_01_archive.html
A blog about the law surrounding information security and data privacy. Tuesday, November 23, 2010. I got an anonymous comment to my last post on the TSA's new security procedures saying that there has to be something we can do, rather than just submitting to whatever is advanced under the name of security. As it happens, there are several things that people can do to react to the TSA's new procedures. As a lawyer, my first thought was a declaratory judgment action seeking to preliminarily and permanentl...
ephemerallaw.blogspot.com
Ephemerallaw: Geolocation Bill Seeks to Unify Fourth Amendment Protections
http://ephemerallaw.blogspot.com/2011/03/geolocation-bill-seeks-to-unify-fourth.html
A blog about the law surrounding information security and data privacy. Wednesday, March 30, 2011. Geolocation Bill Seeks to Unify Fourth Amendment Protections. The following guest post is provided by Sonya Ziaja, J.D. Sonya is the co-owner of Ziaja Consulting LLC, a California based consulting group. She writes regularly for LegalMatch's. Law Blog and Ziaja Consulting's blog, Shark. Laser. Blawg. Over the past few years, law enforcement has increasing relied on geolocation techniques to track citizens w...
ephemerallaw.blogspot.com
Ephemerallaw: February 2010
http://ephemerallaw.blogspot.com/2010_02_01_archive.html
A blog about the law surrounding information security and data privacy. Sunday, February 28, 2010. Creepiest Privacy Violation of 2009? Imagine your child's school offered him or her a free laptop to do homework. That'd be pretty cool, right? Now, imagine that the school administrators used a built in web cam to surreptitiously take pictures of your children. According to the complaint. Of course, the school officials are denying any wrongdoing, and claim they have been unfairly portrayed (see here.