K2 Blackpoint Blackpearl: Communication with the underlying transaction manager has failed

Published on

When deploying a new K2 Blackpoint or K2 Blackpearl you may get the following error: (K2Project) SmartObject Server Exception: Could not publish SmartObject Definition to server: Error refreshing Service Instance ‘WorkflowReportingService’. Service returned : ‘Workflow Reporting SO Service: Communication with the underlying transaction manager has failed. SmartObject: [Test – Process Instances] If you do checking … Continue reading K2 Blackpoint Blackpearl: Communication with the underlying transaction manager has failed

Sharepoint – How to setup a one way trust & required ports

Published on

1. Open Command Prompt. 2. Type: netdom trustTrustingDomainName/d:TrustedDomainName/add TrustingDomainName – Specifies the DNS name (or NetBIOS name) of the trusting domain in the trust being created. TrustedDomainName – Specifies the DNS name (or NetBIOS name) of the domain that will be trusted in the trust being created. • To perform this procedure, you must be … Continue reading Sharepoint – How to setup a one way trust & required ports

RAMMap – How Windows manages memory, analyze application memory usage, how RAM is being allocated

Published on

Have you ever wondered exactly how Windows is assigning physical memory, how much file data is cached in RAM, or how much RAM is used by the kernel and device drivers? RAMMap makes answering those questions easy. RAMMap is an advanced physical memory usage analysis utility for Windows Vista and higher. It presents usage information … Continue reading RAMMap – How Windows manages memory, analyze application memory usage, how RAM is being allocated

Bulk Uploading Files to Sharepoint – Illegal characters

Published on

Uploading bulk files into Sharepoint can be a nightmare when file names contain illegal / reserved characters. A useful utility called Name Munger can assist you in renaming all your files quickly & easily so that they are Sharepoint compliant. Name Munger (pronounced “Name Munjer”) is a powerful, yet simple-to-use batch file renaming utility. Simply … Continue reading Bulk Uploading Files to Sharepoint – Illegal characters

Useful tool for analysing your files to be migrated to your document management system / moss

Published on

No more fumbling with My Computer or Windows Explorer, wishing you could print information about all your files. Karen’s Directory Printer can print the name of every file on a drive, along with the file’s size, date and time of last modification, and attributes (Read-Only, Hidden, System and Archive)! And now, the list of files … Continue reading Useful tool for analysing your files to be migrated to your document management system / moss

Sharepoint MOSS 2007 Web Front End Server Event ID 6398 6482 7076

Published on

Article ID : 946517 Last Review : August 7, 2008 Revision : 4.0 SYMPTOMS Consider the following scenario. You have a process that has more than one thread. Additionally, the process uses the Internet Information Services (IIS) Active Directory Service Interfaces (ADSI) provider to access IIS. Two threads access IIS at the same time. In … Continue reading Sharepoint MOSS 2007 Web Front End Server Event ID 6398 6482 7076

Basic xcopy backup script

Published on

@ECHO OFF @Echo Micross Backup – Please make sure all users are logged out Pause SET CMD_PATH=C:WINDOWSsystem32cmd.exe %CMD_PATH% /c “xcopy M:DATAmicross** f:”/c/h/d/i/e/k/r/y @ECHO Finished backups. @PAUSE

Windows could not start because the following file is missing or corrupt: WINDOWSSYSTEM32CONFIGSYSTEM

Published on

This error arises when the System registry hive is either deleted or corrupt. System registry hive contains configuration information necessary for the system to boot. The first thing to try is to run chkdsk command from the Recovery Console and then reboot the system. If chkdsk does not solve the problem, then the System file … Continue reading Windows could not start because the following file is missing or corrupt: WINDOWSSYSTEM32CONFIGSYSTEM

Planning a migration from Novell Netware to MS Windows Server 2003

Published on

If your planning a migration like me from Netware to Microsoft Windows Server 2003 then you will find this guide a very valuable resource! NetWare to Windows Server 2003 Migration Planning Guide This guide is intended for customers planning to migrate all or part of their Novell NetWare environment to the Windows Server 2003 operating … Continue reading Planning a migration from Novell Netware to MS Windows Server 2003

I am connected to the VPN but cannot access the Internet.

Published on

This occurs when “Use default gateway on remote network” in the TCP/IP settings is checked. To check for this in Windows XP: Click Start -> Control Panel Click on the Network and Internet Connections icon and then click “Network Connections”. If your Control Panel is in classic view, simply double click the “Network Connections” icon. … Continue reading I am connected to the VPN but cannot access the Internet.

Microsoft FileMon – monitors and displays file system activity on a system in real-time

Published on

FileMon monitors and displays file system activity on a system in real-time. Its advanced capabilities make it a powerful tool for exploring the way Windows works, seeing how applications use the files and DLLs, or tracking down problems in system or application file configurations. Filemon’s timestamping feature will show you precisely when every open, read, … Continue reading Microsoft FileMon – monitors and displays file system activity on a system in real-time

Setup has detected that unInstallShield is in use

Published on

This problem is caused by one of two things: 1) Verify that the user has administrator rights on the local PC. 2) Delete all versions on IsUninst.exe from the Windows directory and try running setup again. If it cannot be deleted because the file is in use, reboot the machine & try again.

How to report on users & groups in Active Directory domains

Published on

NET USERS /DOMAIN >USERS.TXT This command will return the user accounts from the Primary Domain Controller (PDC) of the current domain, and write them to a file called USER.TXT NET ACCOUNTS /DOMAIN >ACCOUNTS.TXT This command will return the account policy information from the PDC of the current domain, and write it to a file called … Continue reading How to report on users & groups in Active Directory domains

Users cannot send e-mail messages from a Blackberry mobile device through Exchange server

Published on

Active Directory users can receive email but not send through their Blackberry device Granting the Full Mailbox Access permission implicitly granted permission to send as the mailbox owner. This meant that another account that has the Full Mailbox Access permission could send e-mail messages that appeared as if they were sent by the mailbox owner. … Continue reading Users cannot send e-mail messages from a Blackberry mobile device through Exchange server

Useful Windows Config Tools

Published on

About Windows Shows the version of Windows currently installed on the system. Winver.exe Command Prompt Opens a Command-Prompt window. Cmd.exe Event Viewer Displays monitoring and troubleshooting messages from Windows and other programs. Eventvwr.msc Internet Options Internet Explorer Settings. Inetcpl.cpl Internet Protocol Configuration IPCONFIG is a command-line tool used to control network connections on Windows-based computers. … Continue reading Useful Windows Config Tools

Backup methods

Published on

Full backup A full backup, which Microsoft calls a normal backup, backs up every selected file, regardless of the status of the archive bit. When the backup completes, the backup software turns off the archive bit for every file that was backed up. Note that “full” is a misnomer because a full backup backs up … Continue reading Backup methods

How can I configure the system to let users change their passwords without logging on to the domain?

Published on

If you use a password policy in a Windows 2000 domain and you migrated some or all of the users to Active Directory (AD) with the AD Migration tool, users who attempt to change their passwords as soon as they receive the Password Change Notification message might receive the following error message: You do not … Continue reading How can I configure the system to let users change their passwords without logging on to the domain?

How to create a third-party Microsoft Installer package

Published on

SUMMARY This article describes how to create a Microsoft Installer Package (MSI) for installing third-party programs. If you want to install a third-party program by using this method, you must install a copy of Veritas Software Console by Seagate Software at a location that is accessible by the reference computer. This program is available on … Continue reading How to create a third-party Microsoft Installer package

Deploying and upgrading software in Active Directory

Published on

Deploying and upgrading software Updated: January 21, 2005   Deploying and upgrading software You can deploy and upgrade software to remote computers in managed environments by using Group Policy Software Installation to assign Windows Installer packages. Windows Installer packages are deployed and managed within a Group Policy object, which is in turn associated with a … Continue reading Deploying and upgrading software in Active Directory