Download PDF of slides at:
https://wcc.on24.com/event/77/66/47/rt/1/documents/resourceList1398776349230/bimforsmallpractices.pdf

Description:
how to make using virtual systems a reality for architect’s implementing BIM within a multidisciplinary project team. After a short introduction covering the key steps, we will also be covering the following points:

  • A real time BIM case study from a small practice
  • Managing documentation and business process
  • How architects should collaborate using BIM
  • What it means for design work-flow and productivity
  • Hear the lessons and pitfalls of BIM for small practices

Note: this event seems to be sponsored by Nemetschek Vectorworks.

Share link:
http://bit.ly/1pG05ms

Main page (click launch at the end of page):
Event Lobby (EVENT: 776647)

We run a Small Business Server box and it primarily provides our email via Exchange Server 2003.

Recently, our ISP indicated that our server was relaying or forwarding spam messages. I have tried a number of different things to correct this, and I would like to share a few of the steps of I have taken.

  1. Ensure that Exchange SMTP is not acting as an open relay. You can run a test at http://www.spamhelp.org/shopenrelay/
  2. Use SMTP Authentication (if you are forwarding mail through an SMTP smart host).
  3. Enable Recipient Filtering on the SMTP Virtual Server. Link here. KB Article here.
  4. Enable SMTP Tarpit Time. Link here.
  5. Enable Connection Filtering on the SMTP Virtual Server. You might use something like the Spamhaus ZEN list to start with.
  6. Enable Message Logging (so that you can get an idea of where spam is coming from).
  7. Disable Non Delivery Reports (NDRs). How to here.
  8. Don’t allow anonymous access to your Default SMTP Server.
  9. Run trojan/virus scans on your server and on your Client PCs (including remote Clients).
  10. Install and run the Exchange Best Practices Analyzer.


On a slightly unrelated note, some nefarious characters kept trying to login to our server via Remote Desktop. I have defended against these attacks by using a program called 2x SecureRDP. This ‘filters’ incoming RDP connections and stops repetitive RDP attacks before they occure.

I hope some of this information has been useful to you.