Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Use BIOS protection features
More things to do to protect a Windows computer. Continue Reading
Where do you draw the line on employee monitoring?
This article addresses employee monitoring and how to deal with the challenges of doing so. Continue Reading
How do I configure DNS in a child domain?
-
What are the valid charters in an SMTP user address?
Making sense of browser elections, part one
The first installment of a two-part series on browser elections. Continue Reading
Setup a Performance Monitor log using a binary circular log file
This tip allows you to configure Performance Monitor so that it will start at each boot and write to a circular log file.Continue Reading
Add a Notepad option to your right-click menu
Following this tip will allow you to use Notepad to open a file simply by right-clicking on the icon.Continue Reading
IIS memory leak? Use IISRESET
IISRESET is a command-line tool in Windows 2000 that stops, unloads, reloads, and restarts the IIS process.Continue Reading
What does "TTL expired in transit" mean?
Our expert demystifies the Time to Live (TTL) error and gives advice about what do you when you encounter it.Continue Reading
Using Group Policy Objects to control user logon
Learn how to use GPOs to control the login process for Windows XP and Windows 2000 clients in an Active Directory domain.Continue Reading
-
What is the difference between Functional Specification and Design Specification?
Receiving 'library not registered' error when I try to use Computer Management Local Users and Group
Set programs to run at startup
Registry hacks to set programs to run at startup.Continue Reading
Use the RUNAS Command for administrative tasks
The RUNAS command can be used to allow non-admins to do administrative tasks.Continue Reading
Recover a deleted Active Directory OU
How a user recovered an important OU in a mixed mode environment that had lots of sub-OUs and users.Continue Reading
Use Group Policy Objects to manage disk quotas
Learn to control the usage of disk space over your Windows network via Group Policy.Continue Reading
Command line options for Regedit.exe
This user-submitted tip provides a collection of Regedit command line options gathered from a variety of sources.Continue Reading
Delete print jobs jamming print queue in Windows 2000 and NT
Why certain print jobs can't be deleted in the conventional way and how to get rid of them.Continue Reading
Is it OK to use the Microsoft certification logos on a resume?
How many single-spaced typewritten pages will fit on a 3.5" floppy disk?
Can I save a Word file as a bitmap or jpeg?
Control incoming read receipts in Microsoft Outlook
Learn how to customize your Microsoft Outlook mailbox so that you can control incoming email messages with read receipts attached.Continue Reading
Managing user profiles via Group Policy Objects
There are three parameters in the GPO for an Active Directory container that make user profiles easier to handle.Continue Reading
The MMC won't close
Secure the All Staff distribution list
How to stop spurious e-mail to everyone.Continue Reading
The advantages of multiple partitions
This tip outlines the advantages of creating two partitions on your hard drive and using them for seperate purposes.Continue Reading
Administer AD users and computers in another forest or domain
Administer AD Users and Computers in another Forest or Domain with this tip.Continue Reading
Using Active Directory security principles
Details on what security principles are and what they do in Microsoft Active Directory.Continue Reading
What Windows CE-compatible VPN client would you recommend using to connect to a Nortal VPN switch?
Active Directory migration: Upgrade vs. restructure
Learn the key considerations every administrator should make before migrating Microsoft Active Directory.Continue Reading
Dos & don'ts: How to convince management to approve your project
Windows administrators can be dull as dirt when explaining their projects to management. Here's how to hone your pitch.Continue Reading
IIS authentication methods: What and when
What the authentication methods are and when they are used.Continue Reading
Dealing with Event ID 1022
How to react to, or maybe avoid, this error event.Continue Reading
Open a URL from a batch file
Ways to do open URLs from a batch file.Continue Reading
What's the difference between a peer-to-peer network and a workgroup?
The Microsoft Loopback Adapter
Test network settings and protocol without the network.Continue Reading
How can I monitor SMTP traffic coming from all machines?
How can we find the functions prototypes from DLL?
How to change the default 'Save As' folder
Use this tip to change your "Save As" location to whatever directory you want, including a network share or mapped drive.Continue Reading
Can you clarify what Design Time and Run Time components are?
What is the difference between 16-bit and 32-bit operating systems?
Where can I get free training materials for MCSE certification?
What's the easiest MCSE/MCSA elective exam?
Installing X.509 encryption certificates in Windows
The intricacies of installing X.509 encryption certificates in Windows.Continue Reading
Controlling the appearance of printers in Active Directory
Active Directory provides a way to hide the printer from all non-authorized users. Check out this trick for restricting access.Continue Reading
Prevent unauthorized software installs
How to prevent unauthorized software installs and why you should want to.Continue Reading
Simple registry edit improves TCP/IP performance
Here's a tip to enhance your TCP/IP's performance.Continue Reading
How can I restore my built-in administrator account?
Change and configure pagefile.sys remotely
When you're out of virtual memory, and you find yourself offsite, it helps to know how to adjust "pagefile.sys" remotely.Continue Reading
Wireless LAN Security 101
This tip demonstrates keys to securing your WANs.Continue Reading
What is the difference between TCP/IP and NetBEUI?
Fix a corrupt Add/Remove Programs panel
Some programs, when installed or removed, may cause the Add/Remove Programs Panel to display incorrectly or not at all. Here's how to fix it.Continue Reading
What are the differences among SGML, HTML and XML?
Markup languages came into use in the 1980s as a method to markup electronic documents and gained prominence with the creation of the World Wide Web.Continue Reading
Boost performance through the Task Manager
Use Task Manager to increase performance by eliminating CPU-consuming processes.Continue Reading
No NDR generated when someone sends e-mail to an empty Distribution List
File and Print Sharing: An Active Directory gotcha
Disabling File and Print Sharing (FPS) for security may cause problems down the road wth your Active Directory.Continue Reading
DHCP on the gateway or server? And is PPTP the best way to perform offsite administration?
How can we remove vendor/company logos from PC bootup screens?
What if deleted calendar items reappear?
What to do if deleted calendar items reappear.Continue Reading
Boosting the performance of a print server
A few things you can do to ease your print server's burden and increase performance.Continue Reading
Keeping a domain profile as a local machine profile after DC is removed
Keep applications from stealing focus
How to cure system ADD.Continue Reading
Should I transfer the FSMO role with DCPROMO or MMC?
Planning a network management system: Six easy steps
By planning your system, you'll avoid spending hours of fruitless time trying to manage it later.Continue Reading
The difference between REGEDIT and REGEDT32
What you can do with them.Continue Reading
Check out the new MCP transcript format
The new transcript is here, now here's how to get it.Continue Reading
Will a switch improve network performance in my network?
Introduction to steganography
Mark explains steganography, the basics and uses of this security technology, and how it differs from encryption.Continue Reading
Stop users creating shared folders
Procedure for eliminating shared folders.Continue Reading
Manage Plug-and-Play devices from the command line
How to use a command-line utility to handle Plug-and-play devices.Continue Reading
Use the registry to enable services
Use the registry to enable services.Continue Reading
Shortcut to ipconfig /all
A quick shortcut to find the ipconfig /all settings in a wink.Continue Reading
Create a DOS boot disk for Windows 2000
How to create a DOS boot disk.Continue Reading
Removing the "everyone" group in AD
What you have to remember if you remove the everyone group from drive permissions under Active Directory.Continue Reading
Can the variables %homepath% and %username%. be used in a login script file?
What CPU scheduling algorithms are used in Windows?
How do I restore system.ini on Windows 98?
Configure opportunistic locking
A way to allow concurrent read operations on open files.Continue Reading
Roaming profiles don't update, can't access user profile folders
When to use Active Directory containers
Active Directory offers five basic containers: forest, tree, domain, site and OU. Find out how they work and what their differences are.Continue Reading
Single forest vs. multi-forest Active Directory design
Learn how single forest compares to multi-forest Active Directory (AD) design when it comes to security.Continue Reading
Mirror to increase capacity and more
Advantages of mirroring, a form of Web caching.Continue Reading
Simple VPN authentication choices
Pros and cons of different authentication protocols.Continue Reading
Methods to improve CPU utilization
How do I create an MS-DOS boot partition with HPFS or NTFS?
Perimeter security explored: Firewalls
The foundation of your perimeter security should be firewalls.Continue Reading
Domains vs. organizational units in Active Directory
Learn the key differences between Microsoft Active Directory OUs and doamin, plus exactly why you should care.Continue Reading
Shortcut to Offer Remote Assistance
Here's a shortcut to the Offer Remote Assistance feature of the Windows XP Help and Support Center.Continue Reading
Locking a workstation vs. logging off
Why locking a workstation is better, and what to do if you cannot.Continue Reading
Use Outlook tasks for help desk operations
Tricks for using Outlook as a task scheduler for help desk operations.Continue Reading
What are the advantages and disadvantages of the FAT32 file system?
Can I defrag a SCSI drive?
Setting a default DIR command (using an environment variable)
The environment variable DIRCMD can be used to set default "dir" command options.Continue Reading
Stack overflows versus stack overruns
What is an .SWP file and can I safely delete it?
Stripe and cluster your RAID
How to set stripe and cluster size in a Win2K RAID.Continue Reading
Troubleshooting slow connections to SQL Server
If your attempts to connect to a SQL Server 7.0 or SQL Server 2000 take an extreme amount of time, try this workaround.Continue Reading
Manually changing MAC addresses
How to do it, if your email adapter is programmable.Continue Reading
Do all hub ports have MAC addresses associated with them?
HTTP basic authentication
Pros and cons of this widely used authentication method.Continue Reading