Problem solve
Get help with specific problems with your technologies, process and projects.
Problem solve
Get help with specific problems with your technologies, process and projects.
How can I prevent users from changing settings without affecting admins rights?
How can I set up a BIOS password on my PC?
Using Windows XP/Windows 2003 Server's SYSTEMINFO utility
XP and Win2003's SYSTEMINFO utility allows an admin to query a local or remote system for detailed system configuration information. Continue Reading
-
Where is the 'User Profile' file, and how can I access and view its contents?
I can't open files that I encrypted -- is there a way to decrypt the files?
What are TCP/UDP ports 9, 11 and 13 used for?
Do I need to install Certification Authority on a domain controller?
Can I allow users to modify but not delete?
DOS printing from Windows XP
Allow DOS apps printing access on networked printers that do not use LPT1, such as IP printers.Continue Reading
How does decryption work?
-
Exactly how is a SID created?
What are the advantages and disadvantages of patch management?
How can I bypass the password to Windows 98?
What is SAM in network security?
Quickly resolve unknown Event IDs
Quickly resolve unknown Event IDsContinue Reading
Create ODBCs from a command line
Create ODBCs from a command lineContinue Reading
How to manage autocompletion lists found on Web forms
Internet Explorer has a feature that saves previous entries you've made for Web addresses, forms and passwords on Web pages you have used in the past.Continue Reading
Create custom shortcuts on Start button's right-click menu
Step-by-step instructions on how to create shortcuts on your Start button's right-click menu.Continue Reading
Windows XP's built-in administration tools
Take a look at the various administration tools built into Microsoft's latest desktop OS.Continue Reading
Using GPO to give power user rights
Speed up GPO processing during logon
How logons get bogged down by the synchronus policy application. And how you can change that.Continue Reading
What is the function of the SID?
How can I restrict access to a DNS server?
Cut and paste to/from a DOS window
Using cut-and-paste in the command prompt is easy. Here's how you do it for Win2k Pro and Win2k server.Continue Reading
Put a command line shortcut in your mouse's right click menu
Create a command line shortcut in your mouse's right-click menu that will open the command line window in a specific folder that you select.Continue Reading
Default and predefined security templates
What's in the Windows-supplied templates.Continue Reading
Setting up dual administrative controls for tighter security
How can we restrict the ability to edit group policies to a subgroup of domain admins (just senior a
How do I restrict access to certain sections of our company's intranet?
How do I set up a DMZ?
Which is safer: Domains or workgroups?
Can the 'net user' command be used to find the admin account names on a network?
How can I remove 'delete a user account' permissions from an account operator?
How do I set audit permissions to a folder by command prompt in NT 4.0?
How to enable or disable the command prompt extension
Step-by-step instructions for enabling or disabling the command prompt in Windows 2000.Continue Reading
EFS recovery agent cannot export private keys
Valentine's Day virus
A look at one of the more nasty viruses out there.Continue Reading
When I execute Netstat, I see over 20 unidentifiable ports connected or listening.
What are elevated privileges and why do they make my systems vulnerable?
The difference between hackers and crackers
The difference between hackers and crackers.Continue Reading
Are you getting a 'file not found' error for a shared network file?
How one IT pro figured out what was causing a user's file not found error and how she fixed it.Continue Reading
Group policy won't let me delete disk quota entries for old users
Can a password be changed remotely through a VPN?
Fix a login screen stuck in a loop
If your login screen is stuck in a loop, and you cannot log in to Windows 2000, dust off your old Windows 9x disk.Continue Reading
Disable the caching of SSL sites
By default, Internet Explorer will cache all sites in your temporary Internet folder -- but you can prevent this.Continue Reading
EFS benefits and limitations
Continuous ping
Continuous pingContinue Reading
How can we restrict user installs but still allow certain programs to write files to the registry or
How can I determine who created or modified a file on Win2k server without using detailed auditing?
Consider the security risks before integrating new technology
Here are some tips about preparing a risk management strategy.Continue Reading
What is the difference between an ACL Router and a firewall?
AutoCAD will only work if users are given Power User permissions
Find those missing Control Panel icons
How to solve the disappearing icon bug.Continue Reading
Antivirus hardware?
Here's a look at antivirus appliances.Continue Reading
Is there an alternative bypass for AutoAdminLogon than using Shift at startup?
What is the purpose of 'Restricted Group' in Group Policy?
Using honeypots to fake out an attacker
Honeypot systems attract hackers like bees to honey. If implemented correctly, they offer the network administrator a way to discover unwanted activity on a network.Continue Reading
Understand the KERNEL_STACK_INPAGE_ERROR
How to figure out what a KERNAL_STACK_INPAGE_ERROR means and how to fix it.Continue Reading
What is C2 certification and what does it mean?
How can I find and print a company's digital certificate?
Virus on three .CAB files on my computer
What is CHKNTFS?
Most admins are familiar with CHKDSK, but what about it's lesser known cousin, CHKNTFS?Continue Reading
Can I leave PC on overnight to receive faxes without leaving network vulnerable?
How to prevent a Smurf attack
A Smurf attack is a very unique but popular method of attack. This member-submitted tip tells how to guard against them.Continue Reading
Access logs in Excel format
Obtain an Exce-readable, comma-delimited security logon/logoff/lockout log file (.csv) of a server.Continue Reading
Benefit from Windows file encryption
What you can do with file encryption.Continue Reading
Create a shortcut to lock your computer
Create a shortcut to lock your workstation.Continue Reading
Disable or restrict Internet access
Settings to disable or restrict Internet access with Internet Explorer.Continue Reading
Connect Mac to Windows 2000
How to connect Mac to Windows 2000Continue Reading
What are the advantages and disadvantages to having users logon to the domain vs. the local machine?
Access was denied to pagefile.sys
Local Security Authority or LSA basics
Labeling your computer: Add a "welcome" message to your logon screen
Member Giovanni Davila shows a trick for customizing your Windows login screen with a label/phrase of your choice.Continue Reading
Remove a user or a group from the Everyone group
File system security
This tip describes some basics of the Windows 2000 file system security apparatus.Continue Reading
Bypassing password logon in Windows 2000
Access
is for IT professionals, business leaders and developers who want to take a strategic approach to end-user computing. We cover the forward-thinking tactics and technologies needed to provide users with the tools they need to do their jobs.Continue Reading