Keep your objects in order with a couple command-line tools.
Expand the size of a VMware virtual hard disk file when it runs out of space
The ability to embed malware in Office documents might provide a new avenue for hackers to exploit.
A few scripting goodies from JDH IT Solutions
Find out when your domain users last logged in to disable old, inactive accounts.
Here's how to increase the number of available virtual SCSI drives with VMware Workstation 5.0.
Microsoft is diligent compared to these vendors who release their fixes a year after the fact.
How to set up a custom user interface for computers used in kiosk mode.
- By Zubair Alexander
- 11/28/2005
Control what users can do on shared computers with this new Microsoft toolkit.
Overflow in the "content-type" field of the message header seems to be the culprit of the CDO vulnerability.
A nifty list of graphical-to-schema mappings for the ADUC console.
Freeware ProduKey helps you dig up software CD keys for your network's computers.
Configuring more than one default gateway on a multi-homed server can lead to trouble.
Admin wants to know how IPsec policies can be configured.
- By Zubair Alexander
- 11/14/2005
Various factors need to align for serious damage to be done.
Intel has chips that can hyperthread your dual core. Don explains what that, and AMD64, means.
How RoboCopy decides what to replicate.
With permissions configured correctly, you can make a script load and go on the server at your script's discretion.
An e-mail targetting the CDO for buffer overflow can cripple a secured Exchange Server.
Configure the time for new password changes to take effect in SP1.