Paul Thurott on his website has a page that is constantly updated on this subject: http://www.winsupersite.com/showcase/longhorn_preview_2005.asp
This is an oldie but a goodie- Process Explorer from Sysinternals.This application displays the running processes and the files they are using. Download it from:http://www.sysinternals.com/ntw2k/freeware/procexp.shtml
I do feel proud-I had my first article published on msexchange.org .The article deals with the cosy situation in which a system’s log disk runs out of space,I called the article: “Exchange log disk is full, Prevention and Remedies” .It can be found at:http://www.msexchange.org/articles/Exchange-log-disk-full.html Hope you enjoy it!
That was the day my life changed… 🙂Ok, so that does sound a bit drastic but I finally took the step andconnected the systems around the house using wireless network-WOW!!! The comfort is a bit hard to describe-I guess once you try it you can’t give it up…
From the article: “Microsoft has released the Microsoft Windows Malicious Software Removal Tool to help remove specific, prevalent malicious software from computers that are running Microsoft Windows Server 2003, Microsoft Windows XP, or Microsoft Windows 2000. The Malicious Software Removal Tool supersedes all virus-cleaner tools that were previously released by Microsoft. You can download the Malicious Software Removal Tool from the Microsoft Download Center. You can also run an online version of the tool from the Malicious Software Removal Tool Web site on Microsoft.com. To run the Malicious Software Removal Tool from either location, you must log on to your … Continue reading The Microsoft Windows Malicious Software Removal Tool
Take a look at: http://www.microsoft.com/security/bulletins/200501_windows.mspx
I always have an odd feeling when buying a technical book- should I buy it or not?Will it help me better my technical skills or will it simply repeat information I already read?I am happy to say that my search for the ultimate Active Directory book is finally over!! The best AD book I found is called:Inside Active Directory (Second Edition): System Admin Guide (Sakari Kouti,Mika Seitsonen)http://www.amazon.co.uk/exec/obidos/ASIN/0321228480/qid=1105115274/ref=sr_8_xs_ap_i1_xgl/026-5923926-5704448 This book is actually the second edition and it covers and compares AD2000 and AD2003, if you were ever interestedin in-depth information this is the book you are looking for.
While verifying AD replication it may be useful to compare the directory informationstored on different domain controllers. There is a toold that can compare the informationand it is called DSASTAT.EXE. The tool can be found among the Windows Support Tools. For additional information take a look at:http://www.microsoft.com/resources/documentation/WindowsServ/2003/all/techref/en-us/Default.asp?url=/Resources/Documentation/windowsserv/2003/all/techref/en-us/dsastat.asp
A couple of days ago Microsoft started the public beta phase of their new AntiSpywaresoftware. The software can be downloaded at: http://www.microsoft.com/athome/security/spyware/software/default.mspx Seems like an interesting path to take.
When you receive an NDR(Non Delivery Report) from Exchange the original message will be attached to it. This may be annoying or problematic if the message was large.It it possible to configure Exchange to strip the “attachment” from the NDR message by configuring the following registry entry:HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SMTPSVC\QueuingValue name: MaxDSNSizeValue type: REG_DWORDValue data: (value in bytes)There is some vague documentation of this feature in the following article:Q323484