Upgrading from the DPM 2010 Beta to RC

Microsoft's Data Protection Manager 2010 RC has been out in the wild for a couple weeks now. DPM backup & recovery tool from Microsoft, for Windows environments If you are interested here is the link (check it out): Link....

02/22/2010

Will Windows Mobile 7 Succeed?

Well it has been announced and Windows Mobile 7 will soon be coming to a phone near you. However, I do believe the question that is on everyone’s mind is: “Will this release of Windows Mobile finally be a conqueror?” Granted, I’m...

02/17/2010

Whitelists / Blacklists and AppLocker Goodness

It so happens that the topic of Whitelists vs. Blacklists comes up a lot when I’m talking to clients. The questions seem to always revolve around the pros and cons between these two methods of protection. Sadly, for some reason,...

09/23/2009

What is TPM?

I was working on a chapter for the new Windows Server 2008 R2 Unleashed book. Anyhow, I was writing a bit about BitLocker. While trolling through that section it reminded me that I still get tons of questions about what a TPM is. ...

09/14/2009

Exchange Server 2010 and RPCClientAccessServer Madness!

“A déjà vu is usually a glitch in the Matrix. It happens when they change something.” Needless to say glitches happen a lot with new software and Exchange Server 2010 is no stranger. As we all know, there has been many fundamental...

08/28/2009

Exchange Server 2007: Doing a cross-forest migration with your hands tied behind your back.

How do people typically do an Exchange Server 2007 cross-forest migration using the basic set of tools provided by Microsoft? Well, to summarize the process, most people tend to perform Active Directory object migration via ADMT and...

08/17/2009

How does one audit NTFS permissions without rights?

A really good question recently came up on the SANS GIAC advisory board. Basically, someone needed to audit the NTFS permissions on a set of files and directories (I will refer to them as objects). Easy, right? Oh, I forgot to...

08/08/2009

The Move-Mailbox cmdlet, a Cross-Forest move, and a complex password

From time to time, I come across things that just frustrate the hell out of me. Today was no exception as I again stumbled across something that just boggles the mind.As the story goes… As of recent, I’ve been working on Exchange...

07/30/2009

Testing Exchange Web Services (without impacting your own Outlook settings)

It seems like every time I do an Exchange installation, the question arises around how to test remote connectivity. Yes, I could jump on a machine that is external to the network, and test away. But, what about being able to test...

07/26/2009

Taking pause in a wave of unyielding releases

It seems like every day there is some announcement about some new iconic technology that is going to revolutionize how we work (kinda, sorta, maybe, or not really). Hurray everyone, its Office 2010, Google OS, Bing, etc. However,...

07/17/2009

FullArmor's AppPortal/PolicyPortal and improving lives using technology - Part Two

In my last post, we started down the path of reviewing parts of the discussion I had with FullArmor's CTO Danny Kim. Throughout that post Danny was talking about FullArmor's background and how their Azure based solutions: AppPortal...

07/05/2009

FullArmor's AppPortal/PolicyPortal and improving lives using technology

A couple of weeks ago, I learned about a very interesting technology project that was going on in Africa. In short, the Ethiopian government was trying to improve the quality of life for their citizens by advancing the effectiveness...

07/02/2009

Fake Microsoft Update Email Scam - That almost looks professional!

I do not know about you, but for the past couple of days my inbox has received several emails claiming to be from Microsoft while touting links to updates for Microsoft Outlook and Outlook Express. :>) Naturally, I clicked on those...

06/25/2009

Using Windows 7 to do Good: Taking a closer look at AppLocker - Part One

For some time now there has been a really great security feature that was introduced in Windows Server 2003 and Windows XP. This feature was designed primarily to help administrators keep unwanted programs (like malware) off of...

06/21/2009

PowerShell Unleashed - Third Edition

Considering that PSH v2.0 is slowly making its way down the aisle it is fast becoming time that we started looking towards updating the 2nd edition of the Unleashed book. However, a lot has changed not only with PSH itself, but with...

06/17/2009

Using Exchange Server 2010 with Forefront Threat Management Gateway (TMG)

Yup, this is why I stopped throwing up Windows 7 postings. For the past two to three weeks, I have been testing and deploying an Exchange 2010 environment. Sadly, while doing this the RC came out. Yet, another thing I need to...

06/09/2009

Windows 7 vs. Linux: Thunderdome for desktops

It seems like the chatter around some impending Windows 7 vs. Linux faceoff has been exponentially increasing these past couple of weeks. I do not know about you, but I find it somewhat humorous. After all, the fan boys are getting...

06/05/2009

Configuring an Authoritative Time Server (the cool way)

The other day, I saw this really cool blog posting by the Directory Servers team titled: Configuring an Authoritative Time Server with Group Policy Using WMI Filtering. Basically, in our every ending quest to ensure time is sync'ed...

05/27/2009

PowerShell Summer Scripting Games 2009 (Announced)

I'm not sure if everyone saw this announcement on the PowerShell blog, but sharing and sharing again is always a good practice. Basically, the PowerShell Summer Scripting Games of 2009 have been officially announced. But... what is...

05/20/2009

Tearing apart the Certificate Lifecycle Manager 2007 database

Over the past couple of months I have been working a lot with CLM 2007. During this time, I wrote a bunch of custom reports, built a notifications module, and tweaked a number of other things to get CLM kinda of the way it should...

05/17/2009

Load More