Saturday, January 19, 2013

What is the best file synchronization software?

Q. I have a memory stick, a lap top on the go, and a desk top at home. I want to syncronize my files in such as way that all my duplicates are identical. I am looking for a software in this regard.

A. I would utilize Dropbox. First off, the basic 2GB service is free and perfect for syncing your documents between devices. You can install a portable version as well to install on your USB stick. Visit http://www.dropbox.com and set up a free account and it will take you through the steps of setting up a folder to sync with on your desktop. Install the same software from Dropbox on your laptop. Then visit http://wiki.dropbox.com/DropboxAddons/DropboxPortable and unzip that software on to your USB stick. As long as your USB is plugged in while connected to the internet, it will update your folder stored on there as well. Once setup, there is no extra work required. Just click and drag to the Dropbox folder. You can also visit the Dropbox website from any computer or device to retrieve the same files!

how do I configure a gpo to restrict users from stopping the terminal services service?
Q. I am looking in the group policy management console and I cannot find a way to keep users on the domain from setting the terminal services service to manual. The problem I am running into is we have some semi Microsoft savvy software engineers that think they are doing a good thing and blocking weaknesses, the problem is when they want us to remote into their pc to fix issues we have to wait until they are at their desks to start the terminal services service.

A. Simple: Open an existing GPO or create a new one. Edit it and under Computer/Windows Security/Services set the Remote Desktop service to automatic. Further restrict it by setting who can query the service by removing the Users rights to read it. The user will not be able to change their terminal service startup. One catch is if they are able to edit the registry, they can change the startup DWORD to 4 or 2 (disabled/manual respectively). You can prevent this by blocking users from being able to use registry editing programs (GPO). Then, if they're still able to get to edit the registry, block their rights to regedit.exe and regedt32.exe (GPO). That should hold them at bay.

If that's not good enough, edit the computer configuration Computer/Windows Security/User Rights Assignment (I believe) and set the "Users that can connect to this computer via Terminal Services" to trusted users only (or none).

Finally, don't allow anyone to have local administrative rights on the computers. If you do, you're not going to be able to stop them from blocking the GPO from being applied, as they can restrict this via the registry...

WG

What are non-conventional jobs for someone with a computer science degree?
Q. Obviously, there are "traditional" jobs for people graduating with a BA in Computer Science, such as jobs as a software engineer. I'm wondering - what types of "non-traditional" jobs are there for Computer Science BAs willing to get a graduate degree, either in computer science or another field?

A. The obvious CS degree jobs are programming related but there are many other IT jobs like these:

Computer Technician - Works on computer hardware at user location or in service center. (entry level IT Job)
Service Center Coordinator - Schedules the repair of user community computers, orders spare parts, schedules staff, establishes priorities, maintains loaner laptops and non-US laptops for travel outside of US.
Help Desk Staff - answer questions and resolve problems for the user community. (entry level IT Job - Tier 1 support)
Storage Administrator - in charge of mass storage servers and devices.
Network Administrator - Works on routers, switches, hubs, cables, load balancers and all the other hardware that handles LAN and WAN network traffic. Also, may be responsible for IP phone service.
Systems Administrator or Systems Engineer- Works with servers, laptops and desktop computers to keep them free of problems and secure the data they contain. Responsible for Security group creation and memberships, server patching, anti-virus protection updates, password changes and any automated mechanisms that make these changes. These positions may be divided into server and desktop teams. Tier 2 support.
Enterprise Administrator - Handles Enterprise support and design issues. Tier 3 support.
Active Directory Administrator - Designs and administers Active Directory infrastructure, AD policies, access permissions, roles, group policies, separation of duties.
Exchange and Messaging Administrator - maintains mail systems servers, other mail related devices and the company messaging infrastructure.
Backup Administrator - Maintains backup devices and determines backup strategies so data that was deleted accidentally or intentionally can be recovered. Design and control how and when data is backed up, where the backups are stored and how long the backups are retained. They will test to be sure backups are valid and usable.
Disaster Recovery Specialist - Plans for disaster events so the company data and infrastructure can be brought back online as quickly as possible after a fire, flood, earthquake, terrorism or other disaster event. Plans for failover of services to alternate locations, if the primary location is not available.
Database Administrator - Maintains the company databases which may include customer and sales records, billing information, inventory and other data.
Computing Security Specialist - A company's biggest asset is its data and the Computing Security Specialist will work to try to keep that data protected from loss. They may be dealing with and defending against viruses, hoaxes, malware, keyloggers, phishing attacks, internal attacks and domestic and foreign intrusion. Develops monitoring and interception systems, filters and strategies and works with appropriate government agencies.
Ethical Hacker â performs intrusion and vulnerability testing of systems. Works with Computing Security to insure intrusion prevention systems are working correctly.
Corporate IT Acquisition Specialist - Works with acquired outside companies to establish migration into the corporate computing infrastructure.
Data Center Administrator - Maintains the data center facilities where the company's servers and other devices reside. They are responsible for physical security and may review badge reader and camera information to be sure that only individuals with proper access are getting close to the company's servers and other critical devices. Also, maintain backup power devices (UPS or generators).

In a small business the list of jobs above might be performed by one or two people doing all these jobs. In a large Enterprise environment this could be hundreds of people.


Computer Technician, Service Center Coordinator, Help Desk Staff, Storage Administrator, Network Administrator, Systems Administrator, Systems Engineer, Enterprise Administrator, Active Directory Administrator, Exchange and Messaging Administrator, Backup Administrator, Disaster Recovery Specialist, Database Administrator, Computing Security Specialist, Corporate IT Acquisition Specialist and Data Center Administrator, just to name a few.

In a small business the list above might be one or two people doing all these jobs. In a large Enterprise environment this could be hundreds of people.

Best wishes!




Powered by Yahoo! Answers

No comments:

Post a Comment