Posts

Showing posts from January 3, 2010

Image-based Installations with Windows Imaging Format [70-680 General Information]

by Jason Zandri Image-based deployments of Windows 7 and prior desktop operating systems like XP Profession and Windows Vista are done to streamline the roll out process and to better allow small to large businesses as well as OEM manufactures the ability to quickly build and deploy their systems in an assembly line fashion. After installing an operating system on reference system and setting it up with specific settings and configuring other applications they would leverage an imaging solution to capture an image based on a sector-by-sector copy of the reference computer. Sector-by-sector copying can be effective in only so many scenarios and has a number of limitations. Imaging systems with tools available in Windows Server 2008 and Windows 7 that leverage image-based installations allow for easier initial setup, overall system deployment, and an improvement to image storage and management. Read my entire article online at the Petri IT Knowledgebase Technorati Tags: 70-68

Brad's TechTips - Social Networking and Security Risks [GENERAL NEWS]

A MUST READ for anyone that uses Facebook, Twitter and / or LinkedIn. These sites are without a doubt very popular and very useful when used with care and thoughtfulness with respect to computer system security and data / information confidentiality. The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook , Twitter and LinkedIn .  They can be used for professional networking and job searches, as a means to increase sales revenue, as a tool to keep the public informed of safety and other issues or as a way to reconnect with friends from way-back-when. However, as with any new tool or application, it is always important to keep a close watch on its security implications.  Each of these tools comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect