To find the physical machine name hosting your VM do the following: Start –> Run –> Regedt32 Then navigate to: HKLMSoftwareMicrosoftVirtual MachineGuestParametersPhysicalHostName
When deploying a new K2 Blackpoint or K2 Blackpearl you may get the following error: (K2Project) SmartObject Server Exception: Could not publish SmartObject Definition to server: Error refreshing Service Instance ‘WorkflowReportingService’. Service returned : ‘Workflow Reporting SO Service: Communication with the underlying transaction manager has failed. SmartObject: [Test – Process Instances] If you do checking … Continue reading K2 Blackpoint Blackpearl: Communication with the underlying transaction manager has failed
1. Open Command Prompt. 2. Type: netdom trustTrustingDomainName/d:TrustedDomainName/add TrustingDomainName – Specifies the DNS name (or NetBIOS name) of the trusting domain in the trust being created. TrustedDomainName – Specifies the DNS name (or NetBIOS name) of the domain that will be trusted in the trust being created. â€¢ To perform this procedure, you must be … Continue reading Sharepoint – How to setup a one way trust & required ports
RAID 0 (Stripe set without parity) â€¢No Fault Tolerance â€¢Best read and write performance â€¢I/O per disk calculation: (reads + writes) / number of disks RAID 1 (Mirrored Volume) â€¢Fault Tolerance: 1 Disk may fail â€¢Performance: Good read, Acceptable write â€¢I/O per disk calculation: [(Reads + (2 x Writes)] / 2 RAID 5 (Stripe set … Continue reading Characteristics of different RAID configs
Have you ever wondered exactly how Windows is assigning physical memory, how much file data is cached in RAM, or how much RAM is used by the kernel and device drivers? RAMMap makes answering those questions easy. RAMMap is an advanced physical memory usage analysis utility for Windows Vista and higher. It presents usage information … Continue reading RAMMap – How Windows manages memory, analyze application memory usage, how RAM is being allocated
Hi, it’s Adam Conkle again. Today Iâ€™d like to talk about an ADFS case I had recently where the customer ran into some limitations with their Federated WebSSO with Forest Trust setup. They had their environment set up similar to what is described in Read Adams complete post here
Uploading bulk files into Sharepoint can be a nightmare when file names contain illegal / reserved characters. A useful utility called Name Munger can assist you in renaming all your files quickly & easily so that they are Sharepoint compliant. Name Munger (pronounced “Name Munjer”) is a powerful, yet simple-to-use batch file renaming utility. Simply … Continue reading Bulk Uploading Files to Sharepoint – Illegal characters
No more fumbling with My Computer or Windows Explorer, wishing you could print information about all your files. Karen’s Directory Printer can print the name of every file on a drive, along with the file’s size, date and time of last modification, and attributes (Read-Only, Hidden, System and Archive)! And now, the list of files … Continue reading Useful tool for analysing your files to be migrated to your document management system / moss
Article ID : 946517 Last Review : August 7, 2008 Revision : 4.0 SYMPTOMS Consider the following scenario. You have a process that has more than one thread. Additionally, the process uses the Internet Information Services (IIS) Active Directory Service Interfaces (ADSI) provider to access IIS. Two threads access IIS at the same time. In … Continue reading Sharepoint MOSS 2007 Web Front End Server Event ID 6398 6482 7076
If you are running Windows Server 2003, you are running IIS 6.0 / ASP 3.0 (though some people like to call this ASP 4.0). If you are running Windows XP, you are running IIS 5.1 / ASP 3.0. If you are running Windows 2000, you are running IIS 5.0 / ASP 3.0.
Using the above & network performance is nothing short of shocking ?!? Broadcom TOE nics ? (all TOE enabled nics will prob need these edits) It looks like that due to the fact that SP2 includes Scalable networking pack, the Checksum offloading stuff and Receive Side Scaling might be causing some issues and the symptoms … Continue reading SBS 2003 SP2 Broadcom NIC’s & slow network !
After four frustrating days I have finally managed solve the “SBS 2003 SP2 Broadcom Event ID 1053 1054 RPC Error” problem ! OK basically we bought a new Dell server with Broadcom Extreme II NIC’s & SBS 2003 premium. Went through the basic setup & install all pretty straightforward, join the domain OK, DNS all … Continue reading SBS 2003 SP2 Broadcom Event ID 1053 1054 RPC Errors !!
@ECHO OFF @Echo Micross Backup – Please make sure all users are logged out Pause SET CMD_PATH=C:WINDOWSsystem32cmd.exe %CMD_PATH% /c “xcopy M:DATAmicross** f:”/c/h/d/i/e/k/r/y @ECHO Finished backups. @PAUSE
By default, the firewall is disabled on SBS SP1 because the SBS uses the Basic Firewall in RRAS to protect the LAN and the SBS itself. Also, since SBS host many services, if you enable the Windows firewall on SBS, it will result in many problems. When you enable the option, then a Windows Firewall … Continue reading Cannot open firewall on SBS 2003 ipnat.sys
This error arises when the System registry hive is either deleted or corrupt. System registry hive contains configuration information necessary for the system to boot. The first thing to try is to run chkdsk command from the Recovery Console and then reboot the system. If chkdsk does not solve the problem, then the System file … Continue reading Windows could not start because the following file is missing or corrupt: WINDOWSSYSTEM32CONFIGSYSTEM
If your planning a migration like me from Netware to Microsoft Windows Server 2003 then you will find this guide a very valuable resource! NetWare to Windows Server 2003 Migration Planning Guide This guide is intended for customers planning to migrate all or part of their Novell NetWare environment to the Windows Server 2003 operating … Continue reading Planning a migration from Novell Netware to MS Windows Server 2003
This occurs when “Use default gateway on remote network” in the TCP/IP settings is checked. To check for this in Windows XP: Click Start -> Control Panel Click on the Network and Internet Connections icon and then click “Network Connections”. If your Control Panel is in classic view, simply double click the “Network Connections” icon. … Continue reading I am connected to the VPN but cannot access the Internet.
FileMon monitors and displays file system activity on a system in real-time. Its advanced capabilities make it a powerful tool for exploring the way Windows works, seeing how applications use the files and DLLs, or tracking down problems in system or application file configurations. Filemon’s timestamping feature will show you precisely when every open, read, … Continue reading Microsoft FileMon – monitors and displays file system activity on a system in real-time
This problem is caused by one of two things: 1) Verify that the user has administrator rights on the local PC. 2) Delete all versions on IsUninst.exe from the Windows directory and try running setup again. If it cannot be deleted because the file is in use, reboot the machine & try again.
NET USERS /DOMAIN >USERS.TXT This command will return the user accounts from the Primary Domain Controller (PDC) of the current domain, and write them to a file called USER.TXT NET ACCOUNTS /DOMAIN >ACCOUNTS.TXT This command will return the account policy information from the PDC of the current domain, and write it to a file called … Continue reading How to report on users & groups in Active Directory domains
Most Internet connectivity problems arise out of corrupt Winsock settings. To reset, at the command prompt (Start > Run, type cmd, click ok) type: netsh winsock reset This command resets the Winsock catalog to the default configuration. This can be useful if a malformed LSP is installed that results in loss of network connectivity. While … Continue reading How to reset your TCP/IP ~ Winsock stack in Windows XP
Active Directory users can receive email but not send through their Blackberry device Granting the Full Mailbox Access permission implicitly granted permission to send as the mailbox owner. This meant that another account that has the Full Mailbox Access permission could send e-mail messages that appeared as if they were sent by the mailbox owner. … Continue reading Users cannot send e-mail messages from a Blackberry mobile device through Exchange server
About Windows Shows the version of Windows currently installed on the system. Winver.exe Command Prompt Opens a Command-Prompt window. Cmd.exe Event Viewer Displays monitoring and troubleshooting messages from Windows and other programs. Eventvwr.msc Internet Options Internet Explorer Settings. Inetcpl.cpl Internet Protocol Configuration IPCONFIG is a command-line tool used to control network connections on Windows-based computers. … Continue reading Useful Windows Config Tools
Full backup A full backup, which Microsoft calls a normal backup, backs up every selected file, regardless of the status of the archive bit. When the backup completes, the backup software turns off the archive bit for every file that was backed up. Note that “full” is a misnomer because a full backup backs up … Continue reading Backup methods
If you use a password policy in a Windows 2000 domain and you migrated some or all of the users to Active Directory (AD) with the AD Migration tool, users who attempt to change their passwords as soon as they receive the Password Change Notification message might receive the following error message: You do not … Continue reading How can I configure the system to let users change their passwords without logging on to the domain?
SUMMARY This article describes how to create a Microsoft Installer Package (MSI) for installing third-party programs. If you want to install a third-party program by using this method, you must install a copy of Veritas Software Console by Seagate Software at a location that is accessible by the reference computer. This program is available on … Continue reading How to create a third-party Microsoft Installer package
Deploying and upgrading software Updated: January 21, 2005 â€ƒ Deploying and upgrading software You can deploy and upgrade software to remote computers in managed environments by using Group Policy Software Installation to assign Windows Installer packages. Windows Installer packages are deployed and managed within a Group Policy object, which is in turn associated with a … Continue reading Deploying and upgrading software in Active Directory