How to catch a phish
I’ve received several phishing attempts, recently, this time masquerading as mail from Twitter. I thought I’d share how I recognized this as an attack. Many...
I’ve received several phishing attempts, recently, this time masquerading as mail from Twitter. I thought I’d share how I recognized this as an attack. Many...
It’s one of the first questions that we ask clients when we’re helping diagnose a problem with a network resource. There are several different ways to deter...
The situation: I’m working in Oracle Calendar as a person’s designate, managing his calendar on his behalf. We’ll call him Sam. I create a meeting for Sam...
Recently, I was asked to talk with our Help Line staff about strategies for troubleshooting problems with Microsoft Office. I spent some time addressing the act...
Microsoft Office volume license editions have used the Volume License 2.0 mechanism to manage activation since Office 2010. Microsoft Office will activate again...
Update: better yet, read about the -Join and -Split PowerShell operators. Live and learn. —Geoff Something I’ve found myself missing in PowerShell is a fu...
On Server 2008 and 2008 R2, if your Domain Controllers aren’t configured to require LDAP signing and disallow simple LDAP binds in plaintext, Active Directory...
I’m upgrading the components of the user provisioning system I built. Previously, I used ActiveState Perl and the UWinnipeg PPM repository to get the Net::LDA...
I’ve been working on deploying a load-balanced Remote Desktop Gateway service. I deployed the first farm member, then cloned it to create a second member. The...
http://video.google.com/videoplay?docid=2187719718781346355# [contains some adult language : f-word]