14
2010
McAfee Exclusions for Citrix
When using McAffe with Citrix ensure you EXCLUDE the following folders from the On Access Scan: %program files%citrix* %systemroot%system32spool*
11
2010
Extend NTFS Partitions Free
The ExtPart utility provides support for online volume expansion of NTFS formatted basic disks in stand-alone (or Dell cluster configurations with Dell OpenManage Array Manager installed.) http://support.dell.com/support/downloads/download.aspx?c=us&cs=19&l=en&s=dhs&releaseid=R64398&formatcnt=2&fileid=83929 USAGE extpart [volume size] volume – the volume to extend. e.g. f:, g:, etc (only basic volumes) size – the size in megabytes by which to extend the volume. Example: To extend the g: volume by 1 GB (1024 MB) use the following command: extpart g: 1024
8
2010
How to Uninstall a DNN Module
It should be simple, and it is, once you know where to look… To view or install and Module in DotNetNuke 5 you use the extension manager from the Admin module. BUT you cannot uninstall a module from there. For that you must: Go to the HOST menu Click on Module Definitions Click the red x to delete a module. It’s that simple…
5
2010
Implementing NLB (Network Load Balancing) in VMware
Link to PDF HERE Network Load Balancing is a feature of recent Microsoft server operating systems, including Windows 2000 Advanced Server, Windows Server 2003, and Windows Server 2008. This clustering technology enables you to improve the scalability and availability of Internet server programs, such as Web servers, proxy servers, DNS servers, FTP servers, virtual private network servers, streaming media servers, and terminal services servers. In addition, it can detect host failures and automatically redistribute traffic to servers that are still operating. In a VMware® Infrastructure 3 environment, you can create a cluster for Network Load Balancing using virtual machines on the same host or virtual machines on multiple hosts.



1
2010
How to fix orphaned SQL Server users
Summary When you restore a Microsoft SQL Server database on a different machine, you cannot access the database until you fix the permissions. Detail The problem is that the user in the database is an "orphan". This means that there is no login id or password associated with the user. This is true even if there is a login id that matches the user, since there is a GUID (called a SID in Microsoft-speak) that has to match as well. This used to be a pain to fix, but currently (SQL Server 2000, SP3) there is a stored procedure that does the heavy lifting. All of these instructions should be done as a database admin, with the restored database selected. First, make sure that this is the problem. This will lists the orphaned users: EXEC sp_change_users_login ‘Report’ If you already have a login id and password for this user, fix […]
18
2010
How to transfer the logins and the passwords between instances of SQL Server 2005 & SQL Server 2008
Introduction This article describes how to transfer the logins and the passwords between instances of Microsoft SQL Server 2005, and Microsoft SQL Server 2008, on different servers. For more information about how to transfer the logins and the passwords between instances of other versions of SQL Server, click the following article number to view the article in the Microsoft Knowledge Base: 246133 (http://support.microsoft.com/kb/246133/ ) How to transfer logins and passwords between instances of SQL Server Original Article can be found here More Information In this article, server A and server B are different servers. Additionally, both server A and server B are running SQL Server 2005. Note This information also applies to SQL Server 2008. After you move a database from the instance of SQL Server on server A to the instance of SQL Server on server B, the users may not be able to log in to the database […]



18
2010
How to manually remove ePO 4.0
Summary ePolicy Orchestrator (ePO) 4.0 setup is based on the Microsoft Windows Installer technology. When you attempt to install ePO 4.0, any failure during setup will cause the installer to roll back the changes. In some rare instances, the rollback might not occur successfully and your ePO installation may be left in an incomplete state. This can also happen when a Patch installation has failed. In such scenarios, you may want to reinstall ePO and restore the ePO 4.0 database. The following are manual removal instructions for ePO 4.0 if you are unable to remove ePO using the Windows Add or Remove Programs feature. Problem ePO 4.0 uninstallation fails from Add or Remove Programs. Solution These steps require the Microsoft MSIZap utility. This may already be present on the server from previous MSI-based installations, but if not it is part of the Microsoft Windows Install Clean Up Utility. After installation […]
18
2010
McAfee ePolicy Orchestrator
Useful tip to find the EPO database settings. https://localhost:8443/core/config for the database settings.
8
2010
What rights does the Backup Exec service account need?
Details: All Backup Exec ™ services on the media server run in the context of a user account configured for Backup Exec system services. This account can be created during the Backup Exec installation, or an existing user account can be used. To create a service account for Backup Exec during installation, supply a user name and password when prompted. If this computer is in a domain, enter a Domain Administrators account, or an equivalent account that is part of the Domain Admins group. In the Domain list, select or enter the Domain name. If this computer is in a workgroup, enter an Administrators account, or an equivalent account that is part of the Administrators group on the computer. In the Domain list, select or enter the computer name. The account designated for Backup Exec services – whether it is a new account or an existing user account – will […]



8
2010
How To Configure SSH Keys Authentication With PuTTY And Linux Server In 5 Quick Steps
This tutorial explains how you can replace password-based SSH authentication with key-based authentication which is more secure because only the people that own the key can log in. In this example, we’re using PuTTY as our SSH client on a Windows system. 1. Get the zip file with all PuTTY binaries http://the.earth.li/~sgtatham/putty/latest/x86/putty.zip 2. Generate a private and public key pair Open PuTTYgen.exe, press Generate button, move mouse. Once the keys are generated, type yourkey passphrase (choose a "hard to guess" one). Save Public key. Save Private key. 3. Configure your Linux server (create user, save public key) For this guide let’s assume you regular login name is autotimesheet (replace it with one that you use regularly). As root, on the shell, type: adduser autotimesheet –disabled-password You will be asked to fill in some details such as the user’s real name (empty string is fine). Now type: su autotimesheet cd /home/autotimesheet […]


