Why is ECC memory important?
You want to upgrade the memory in a database server, and the system documentation states that the motherboard requires ECC memory. Why is ECC memory important?
You want to upgrade the memory in a database server, and the system documentation states that the motherboard requires ECC memory. Why is ECC memory important?
You’ve powered on a laptop, but the LCD screen isn’t displaying any video. The laptop’s lights are working and you can hear the fan and hard drive running. Which of these options would be appropriate troubleshooting steps?
The intricacies of the Windows command line may seem difficult to grasp, but with a little bit of practice and knowledge you’ll begin to take advantage of some powerful functionality. In this video, we’ll use the Windows command line to manage files and directories, edit files, perform diagnostics and tune the operating system.
Some Windows diagnostic utilities aren’t used often, but they’re very useful when the right situation occurs. In this video, you’ll learn about Dr. Watson, the system restore utility, Windows security center, the task scheduler, and Windows Script Host.
The security of an organization is ultimately only as good as its people and its processes. In this video, we’ll discuss the importance of patching systems and training the user community. We’ll also learn about social engineering and discover ways to address social engineering situations.
Security systems are fantastic things, until they suddenly stop working. In this video, we’ll discuss some troubleshooting techniques for BIOS security, firewall issues, wireless clients, and encryption.
The practical implementation of security system impacts a wide range of systems, technologies, and processes. In this video, you’ll learn how to secure your BIOS, use smart cards, audit your system through event logs, and how NTFS can make your system more secure.
What are the most important aspects to remember for securing your organization’s important data? In this video, we’ll show you some useful best practices for securing data through such methods as access controls, event logging, encryption, password management, and incident reporting.
A wireless network provides excellent mobility, but it also creates a number of security concerns. In this video, we’ll discuss wireless encryption types and aspects of access point security that include MAC filtering, SSID management, IP addressing, and firmware.
Data security is the responsibility of everyone in the organization. In this module, we’ll examine some of the basic fundamentals of security such as authentication technologies, file system security, and social engineering.