In the ninth part of Robert Schifreen's SharePoint 2010 epic, he learns how one user can generate 16GB of logs in just three months. Creating a structure for our SharePoint 2010 installation was ...
When Socrates reportedly said the “unexamined life is not worth living,” the Greek philosopher didn’t imagine the modern internet with its seemingly unlimited ability to absorb data. Every mouse click ...
Transaction logs in Exchange Server are very important. These are not just logs of what happens, transaction logs act as a buffer between the database and the users. Data is temporary kept in ...
This is the third and final article of a three-part series which investigates the top five human threats to the data held by banks and financial institutions, and offers a fresh perspective on how the ...
Hello all,<BR><BR>I'm searching for this answer on Google but I guess I'm not asking the right question...<BR><BR>I have an Exchange server which is just going whacko on me. For whatever reason the ...
Despite the best precautions, it is impossible to protect your network against every attack. When the inevitable happens, your log data can be critical for identifying the cause of the breach and ...
There isn’t a week that goes by that I don’t hear or read about an organization seeing ginormous transaction log (.ldf) files, while the associated data (.mdf) file is at the size it should be when ...
A few years ago I switched to Miranda ICQ, and I really don't chat much on ICQ at all, but I used to talk quite a bit, and I still have all my old ICQ logs (dating back to 1997). in ICQ database ...
An unprotected and exposed server storing millions of call logs and text messages has been found by a security researcher. If you thought you’d heard this story before, you’re not wrong. Back in ...