Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
Windows 2000 and cached credentials
Cached credentials in Win2k can be a security hazard. Learn more in this Tech Tip. Continue Reading
Troubleshooting tools for common Active Directory problems
Check out these helpful tools and utitlities for when things go awry with Active Directory. Continue Reading
A more elegant way to wait for InstallShield to terminate
Use the -SMS command line when using InstallShield. Continue Reading
-
Change OS system drive letter
Change the letter of your system drive. Continue Reading
View the Exchange service account name
Use the registry to see this account name, in case Exchange has stopped running. Continue Reading
Use SIGVERIF.EXE to ID unsigned drivers
How to find drivers that are not on the Microsoft HQL list.Continue Reading
Having problems with user name and password logon in Outlook Web Access
Can I succeed in computer science if I am weak in math?
Using the Microsoft Management Console: The basics
Just what exactly is the Microsoft Management Console? Find the basic details here, with info on how to use it to accomplish certain Windows management tasks.Continue Reading
Is there a script to auto-shutdown and restart Exchange Server before a nightly NT backup?
-
Can't use Windows authentication. Will anonymous authentication work?
Top 10 ways to improve desktop management
Following some common-sense principles can make desktop management easier for all parties involved.Continue Reading
Be careful with SNMP
Look out when you install the SNMP service. It can cause a host of security problems.Continue Reading
Use "alternate recipient," not rules
Why and how to use the alternate recipient feature of Exchange.Continue Reading
Change default ACL for Active Directory objects
It is possible to modify the default ACL that is created upon creation of a new Active Directory object. Here is the step-by-step process.Continue Reading
Script for remote synchronization of workstation's time with PDC
Here's a small batch file that allows the administrator to remotely synchronize a workstation's time with the PDC.Continue Reading
How can I move mail from one mailbox to another after an employee leaves?
CHKDSK reports "insufficient memory" -- What now?
What to do with one of the most perplexing of error messages -- the "insufficient memory" message from the Microsoft CHKDSK utility.Continue Reading
What does HKEY mean or stand for?
Why is the TTL for a loopback (127.0.0.1) 128 seconds, and yet it is relatively small (48 seconds) f
Best swap file locations
Some advice for gaining better swap file performance.Continue Reading
Append date to log file names
Here's a simple script for a batch file to append the current date to log files.Continue Reading
Configure backup static routes
How and why to configure backup static routes.Continue Reading
Permanent processor affinity
How to link a particular third-party program with a particular processor.Continue Reading
Windows Explorer shortcut to root drive with folders view
Learn step-by-step how to create a Windows Explorer shortcut on your task bar that opens directly to the root drive.Continue Reading
I can ping the SMTP server IP, but cannot send mail through it. What am I doing wrong?
What's the difference between 16 bit and 32 bit memory addressing?
Manage scheduled tasks remotely
How to manage scheduled tasks on a computer that isn't at your location.Continue Reading
Test your systems with a manual blue screen and memory dump
Wanna see if systems can survive a bluescreen?Continue Reading
Change your company's default screensaver and wallpaper
Learn how to change your company's default wallpaper or screensaver to be installed on all machines and enabled by default.Continue Reading
Why is the pagefile for crash dump failing?
Why am I getting an error when I try to run the Wizard in the AD migration tool?
Stop repeating e-mail messages
How to stop e-mail messages from looping on the Exchange server.Continue Reading
Assigning group policies to groups in Active Directory
Here is a great trick for making Microsoft Active Directory assign group policies where it doesn't want to.Continue Reading
Throttle network adapters
How to limit the bandwidth used by a system, or a specific adapter.Continue Reading
Customize remote installation services
How you can make up custom installation scripts for installation across a Windows 2000 network.Continue Reading
Quick Tips: Install Active Directory without a network card or network cable
You probably think you can't install AD if you've got a disconnected network card/cabe, but you can. Here's how.Continue Reading
Is there any way to change the physical address of the Microsoft Loopback Adapter?
Do I need to put my DNS server in the DMZ?
Disabling MIME format
Why you might want to, and how to, disable MIME format in your users' e-mails.Continue Reading
Performance monitoring methodology
Discussion of some basic information about performance monitoring for Windows based computers.Continue Reading
Installing Office 2000 on Terminal Server
Installing Office on Terminal Server isn't as simple as it might seem. Follow these directions to make sure you do it right.Continue Reading
Moving shares from one drive to another
Time-saving procedure for moving Windows NT shares from one drive to another drive in the same computer.Continue Reading
What is the purpose of LMHOSTS?
Is there a Sales Specialist certification for Microsoft products?
How to create and copy roaming user profiles
This tip shows how to copy a defined user profile to several users or to a group of users.Continue Reading
Securing the mobile PC - Windows 2000 style
Some tips on how to try to plug the security hole represented by mobile workstations.Continue Reading
Making HP JetDirect print servers secure on the network
Here are tips for securing an HP JetDirect print server on a network.Continue Reading
Stop users creating accounts
How to disable the ability of non-administrator users from creating accounts in Windows 2000 ProfessionalContinue Reading
How to reset the 90 temporary license with Terminal Server/Win2k
A workaround to for the 90 day temporary license that allows you to connect to Win2k server.Continue Reading
Speed up network browsing
When you view shared files in a Win2k LAN, you can experience up to a 30 second delay. Find out how one user speeds it up.Continue Reading
Test if relay is enabled
SearchWin2000 member Robert Muncy walks through a simple, step-by-step way to test if relay is enabled in Exchange.Continue Reading
How can I get login scripts to display in a pop up window?
Defragmenting the Active Directory object database
All Active Directory objects are stored in a database that you should periodically defragment; here's how.Continue Reading
Get into someone else's mailbox
How to set up the server and client to allow Exchange clients to access others' mailboxes.Continue Reading
Use caution when disabling the Windows Server service on your workstation
Use caution when disabling the Windows Server service on your workstation, says this searchWin2000 member.Continue Reading
List all your network printers to a file
Do you want to get a list of all your network printers and send them to a file? Find out how this user does it.Continue Reading
Add Notepad.exe to your Send To menu
One member finds it quite useful to add Notepade.exe to his Send To folder so he can view the raw content of any file.Continue Reading
Add a program to the right click menu
SearchWin2000 member Rick Ziminski shares a handy tip for adding any program to your right click menu.Continue Reading
Set router filters for HTTP, HTTPS, FTP and SMTP
What seems to be the problem? Slow server
Sooner or later, it happens to everyone. Slow server? Read on...Continue Reading
Auto logon for NT 4.0
Auto logon can easily be setup on any NT machine by adding two strings to the registry and modifying two others. Here's how.Continue Reading
Firewall terminology
Learn the terms you need to know to talk firewalls.Continue Reading
The Message Transfer Agent
The MTA can require some particular types of maintenance according to this tip from Adesh Rampat.Continue Reading
Take advantage of the Infrared File Transfer program
SearchWin2000 member Parthasarathy Mandayam explains some uses for an infrared port and how it works.Continue Reading
MIT or MCS? Which degree is best in the future?
Disable unnecessary services in Windows 2000 for better performance
Boost your system's performance by disabling system services with this step-by-step guide from user Parthasarathy Mandayam.Continue Reading
Using caching-only DNS servers
SearchWin2000 member Parthasarathy Mandayam explains the benefits of using a caching-only server.Continue Reading
Creating new Active Directory users with dial-in permission
Two parameters are needed for new user dial-in access. This Active Directory tip helps you cover all the bases.Continue Reading
Convert HTML to XML
You can use HTML and ASP coding to convert your HTML form entries to XML.Continue Reading
Force Windows 2000 to use a specific .inf file
A simple tip for using specific .inf files for particular reasons.Continue Reading
Procedure for installing IIS onto a different drive
Microsoft Exchange server tutorial
Learn about the best places to find Microsoft Exchange Server tutorials in this expert response.Continue Reading
Internet management software
Special access permissions
Instructions to assign permissions other than standard Full Control, Read and Write and how to assign advanced restrictions.Continue Reading
Unable to start the Netlogon service
Msconfig works in Windows 2000 too
User submitted tip: Msocnfig works in Windows 2000 tooContinue Reading
Take control of system folders using the CLSID
Using access control inheritance in Active Directory
Admins can increase productivity by using Active Directory to manage how objects inherit access control entities.Continue Reading
Create .MSC files to save time in MMC
Learn a better way to access Microsoft Management Console tools in Windows.Continue Reading
Publishing a folder in Active Directory
Step-by-step look at how to create and publish a shared folder in Microsoft Active Directory.Continue Reading
Rebooting the Exchange Server
Exchange Tip: Rebooting the Exchange ServerContinue Reading
The ethics of programming
Performing firewall maintenance
Adesh Rampat discusses firewall maintenance in this edition of Tech Tips.Continue Reading
Difference between MS Loopback Adapter and 127.0.0.1
Difference between CGI and ASP
Exchange transaction logs
When handling the storage of transaction logs, it is best to have separate mirrored disks that are dedicated to their storage.Continue Reading
Visual Basic add-ins
Setting NTFS security via group policies
User-submitted shortcut that uses plug-ins to help you increase security on system drives and the registry.Continue Reading
Turn off roaming profile caching
If you use roaming profiles on your network, the hard drive will become cluttered with cached copies.Continue Reading
Example of NBTSTAT switches
How ILS Server and ILS Account work with Netmeeting
Secedit to force GPO changes
Use this command line to trigger group policy application for a local computer or currently logged on user.Continue Reading
Print services for Unix
Learn about the two components in Windows 2000 that provide print services for Unix.Continue Reading
Problems with Active Directory and insufficient rights
Understanding the NBTSTAT command and how it works
Using Microsoft Loopback Adapter for static IP address
Troubleshooting a corrupted Exchange database
The steps to take when you need to troubleshoot a corrupted Exchange database.Continue Reading
Wrong time reflecting on Outlook email message headers - time on system is correct
Back up the registry with batch files
Find out how you can use a simple DOS batch file system to back up your registry with this member tip.Continue Reading