Last Updated on 23 Sept. 2015, Total: 46 Blog Posts
To deploy shared printers to multiple client computers in a domain environment, the fastest method is using a Group Policy. Follow these steps: In Server Manager, select Roles\Print and Document Services\Print Management\Print Servers\<Server Name>\Printers and in the details pane, right-click the printer, and then choose Deploy with Group Policy. - if the Print and Document Services node is not available,... Read More
Using the Quota Management Console to administer disk quotas is definitely your first choice but there are instances when you may need to automate some admin tasks and would therefore need a command that can be used in scripts or in small applications. The dirqouta command-line tool allows you to configure disk quotas from a command prompt or a script... Read More
"Migrating archives is not a trivial undertaking," reads an Osterman Research report on the subject... Read More
Following last week Google’s announcement of changes in Gmail, lifehacker.com has published a post on how to disable Gmail's new feature that let Google+ users email you... Read More
Amazon AWS Directory Service allows you to connect to an existing on-premises directory... Read More
Some industry experts estimate that there are more than 10 million servers running Microsoft Windows Server 2003 today... Read More
Did you know that using your Windows 7 platform and subscribing to a free online storage account you could easily create a secure online backup solution for free? Windows 7 Enterprise and Ultimate editions allow you to use BitLocker to encrypt data; the encrypted data can be uploaded to a free cloud storage location for safe keeping. Check how to... Read More
reCAPTCHA is a free service to protect your website from spam and abuse... Read More
Windows 8, both client and server editions will provide additional security capabilities against malware. Specifically, Microsoft provides guidelines for anti-malware and other security solution developers to develop security solutions to protect early boot components from malware. For instance, the Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started... Read More
How to use Hyper-V replica's in Windows Server 2012... Read More