Rename standalone computers and also get all kinds of computer info with the free Compname.exe tool.
Configuring DNS suffix search order is a critical component of any multi-domain LAN without a WINS server.
A security researcher gets his 15 minutes of fame on a mixed signal of confusion.
How to connect with alternate credentials, this time with an ADSI twist.
ISA Server seems to be preventing outbound traffic to an external FTP server.
- By Zubair Alexander
- 09/26/2005
Change the command-line window mode with the free Fstoggle.exe tool.
Need to know exactly what’s included in a System State backup? Here’s how to find out.
Running an application or a batch file on a user's desktop with a different credential
- By Zubair Alexander
- 09/19/2005
The U.S. government looks for a few good hackers at the DefCon security conference.
Track registry changes with the free Keytimes.exe command-line tool.
When you suspect a performance problem is related to a network bottleneck, use this simple tool to verify your suspicions.
A recent Windows PnP vulnerability is hyped to be more dangerous than it really is.
Using alternate credentials in WMI connections.
Perform batch name-to-IP conversions and vice versa with these command-line tools.
The latest Microsoft vulnerabilities discovered affect a variety of things from IE and Remote Desktop to Plug and Play and Print Spooler.
Enabling automatic logon to the Recovery Console may get you access to a system with an unknown local administrator password or when portions of the Registry are corrupt.
A customer convenience is making it easier for criminals to forge ATM cards.
Exchange migration seems to be missing a step or two.
Microsoft beta products: A look at what's coming, when it's coming and why you should care.
Does Microsoft have the right Digital Rights Management (DRM) solution for you?
- By Joern Wettern
- 09/01/2005