Columns


Syncing OUs to Groups

Keep your objects in order with a couple command-line tools.

Virtual Disk Dead End

Expand the size of a VMware virtual hard disk file when it runs out of space

More MS Buffer Image Vulnerabilities, but Are They Really a Threat?

The ability to embed malware in Office documents might provide a new avenue for hackers to exploit.

Getting an Assist with Scripting Tools

A few scripting goodies from JDH IT Solutions

Return to the Last Logon

Find out when your domain users last logged in to disable old, inactive accounts.

Supersizing Virtual SCSI Drives

Here's how to increase the number of available virtual SCSI drives with VMware Workstation 5.0.

Think Microsoft’s Slow? Check Out These Patches

Microsoft is diligent compared to these vendors who release their fixes a year after the fact.

Kiosks Under Your Control

How to set up a custom user interface for computers used in kiosk mode.

Be the Master of Your Public Domain

Control what users can do on shared computers with this new Microsoft toolkit.

MS05-048 Proof of Concept Code Released

Overflow in the "content-type" field of the message header seems to be the culprit of the CDO vulnerability.

Calling ADUC A Duck

A nifty list of graphical-to-schema mappings for the ADUC console.

Finding the Keys to Your Computers

Freeware ProduKey helps you dig up software CD keys for your network's computers.

Multiple Gateway Malfunction

Configuring more than one default gateway on a multi-homed server can lead to trouble.

Where in the World are the IPSec Policies?

Admin wants to know how IPsec policies can be configured.

Snort Vulnerability Overstated?

Various factors need to align for serious damage to be done.

Decoding Today's Processors

Intel has chips that can hyperthread your dual core. Don explains what that, and AMD64, means.

RoboCopy Reassurance

How RoboCopy decides what to replicate.

Remote Scripting Trick

With permissions configured correctly, you can make a script load and go on the server at your script's discretion.

Exchange Server Vulnerable to Buffer Exploit

An e-mail targetting the CDO for buffer overflow can cripple a secured Exchange Server.

A Window of Opportunity

Configure the time for new password changes to take effect in SP1.

Most   Popular