article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates

Sean Daniel

Thursday, January 14, 2010. Certificates provide two purposes: Authenticating the server to the client Providing encryption between the server and the client I will cover the authenticating the server to the client in this part 1 post, and will write a part 2 post that handles the second part of encryption. 5/10/2010 7:25 PM.

Windows 45
article thumbnail

SeanDaniel.com [tech]: Windows Phone 7 Add-in for SBS 2011.

Sean Daniel

View the backup status that every device last reported to the server. Start or stop a backup for any computer or the server (from the contextual menu). Online Backup. (5). Microsoft Office 2010. (1). Online Backup. Office 2010. Microsoft Office 2010. ► 2010. (41). Cloud Computing. (10).

Windows 48
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

SeanDaniel.com [tech]: How to use your Home Server as an AirPrint.

Sean Daniel

Hi Dave, My guess is you've somehow managed to add some authentication to who can print. Online Backup. (5). Microsoft Office 2010. (1). Online Backup. Office 2010. Microsoft Office 2010. ► 2010. (41). 9/10/2012 6:30 PM. Sean Daniel. I'd suggest looking in that direction. EBS 2008. (18).

How To 64
article thumbnail

SeanDaniel.com [tech]: Understanding SSL Certificates for client to.

Sean Daniel

Monday, May 17, 2010. In this post I talked primarily about how the server is authenticated to the client by using a “root” certificate that the client already trusts, thus establishing a trust relationship with a website you are at without actually having been there before. 7/06/2010 5:09 PM. Online Backup. (5).

Windows 45
article thumbnail

SeanDaniel.com [tech]: How to set the Default Printer for All Users in.

Sean Daniel

As a test, I like to make sure it works for one user first, so let’s find a guinea pig and go from there: With the new Default Printer Policy selected, remove Authenticated Users from the Security filtering and place in the guinea pig user. Select Authenticated Users , and click Remove. Online Backup. (5). Online Backup.

How To 51
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Halderman : In 2010, Washington D.C.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Halderman : In 2010, Washington D.C.

System 52