IT Knowledgebase Articles

Cannot Install Update for Windows Vista KB929777

Last Update: Nov 19, 2024

Trying to install Windows Vista on a computer with more than 3 GB of RAM might cause a BSOD (Blue Screen of Death, or more better known as a STOP error). Or at least that’s what Microsoft KB 929777 is all about. When you try to install Windows Vista, you may receive an error message…

View Article

Bypass the Welcome Screen in Windows XP Pro

How can I temporarily bypass the Welcome Screen in Windows XP? Windows XP uses that idiot proof welcome screen where all one has to do is click the stupid icon of a user and wham! He’s logged on. Not only does the welcome screen hog resources, but it’s bound to another XP feature – the…

View Article

Temporarily Bypass Windows Server 2008 Activation

Last Update: Sep 24, 2024

In Windows Server 2008 (and previous Microsoft operating systems) you must activate your computer in order to use it legally. You have 30 days after installing Windows to activate it online or by telephone. If this 30-day period expires before you complete activation, Windows will stop working. If this happens, you won’t be able to…

View Article

Business Desktop Deployment 2007 Tools for Vista

This package includes tools and best guidance documents to effectively deploy Windows Vista and Office 2007 across the enterprise.  This deployment package has leveraged the lessons learned from previous versions of Windows install scenarios to give you the best practices for quick and easy deployment plans including sample templates and software. These tools and practices…

View Article

Bug in the Intelligent Message Filter (IMF) interface

Last Update: Nov 19, 2024

Microsoft Exchange Intelligent Message Filter is a product developed by Microsoft to help companies reduce the amount of unsolicited commercial e-mail (UCE), or spam, received by users. You can read more about IMF on the Block Spam with Exchange 2003 Intelligent Message Filter page. When looking at the IMF interface in the Exchange System Management snap-in…

View Article

Brick Level Backup of Mailboxes by using EXMERGE

Last Update: Nov 19, 2024

How do I use EXMERGE to make Brick-Level backups of Exchange 2000/2003 mailboxes? One of the most important tasks for an Exchange administrator is the regular, day-by-day, backing up of all the Exchange databases. This can be easily accomplished by use of the built-in NTBACKUP.EXE software found on your Exchange 2000/2003 server. Note: You can…

View Article

MCSA/MCSE on Windows 2003

Last Update: Nov 19, 2024

Windows 2003 MCSA/MCSE track book recommendations I will keep this section updated as new titles appear on the market. For Windows 2000 MCSA/MCSE track related books and study guides see the MCSA/MCSE on Windows 2000 page. For Exchange 2000/2003 related books and study guides see the Exchange 2000/2003 page. More sections will follow. Book recommendations…

View Article

MCSA/MCSE on Windows 2000

Last Update: Nov 19, 2024

Windows 2000 MCSA/MCSE track book recommendations I will keep this section updated as new titles appear on the market. For Windows 2003 MCSA/MCSE track related books and study guides see the MCSA/MCSE on Windows 2003 page. For Exchange 2000/2003 related books and study guides see the Exchange 2000/2003 page. More sections will follow. Book recommendations…

View Article

Exchange 2000/2003

Last Update: Nov 19, 2024

Exchange Server 2003 book recommendations I will keep this section updated as new titles appear on the market. For Windows 2000 MCSA/MCSE track related books and study guides see the MCSA/MCSE on Windows 2000 page. For Windows 2003 MCSA/MCSE track related books and study guides see the MCSA/MCSE on Windows 2003 page. More sections will…

View Article

Block Web Browsing with IPSec

Last Update: Sep 17, 2024

How can I block a Windows 2000/XP/2003 computer from surfing on the Internet? Windows 2000/XP/2003 machines have a built-in IP security mechanism called IPSec (IP Security). IPSec is a protocol that’s designed to protect individual TCP/IP packets traveling across your network by using public key encryption. In a nut shell, the source PC encapsulates the…

View Article
Go to page