So you have a phone with a camera and an mp3 player, and now you would like swap data between it and your linux computer. There are a couple of ways of going about it. These should work, or at least give you a good start on a lot of phones (not just the Nseries),(…)
This is a really simple one, but can cause a lot of weeping and gnashing of teeth. You were given the default “ubuntu” hostname when you installed, and now you want something cooler that enhances your street cred. Heres how to change it: Edit /etc/hostname and change to the new value, you can use nano(…)
This document provides an example of how to use the static route tracking feature on the PIX 500 Series Security Appliance or the ASA 5500 Series Adaptive Security Appliance in order to enable the device to use redundant or backup Internet connections. In this example, static route tracking allows the security appliance to use an(…)
Usualy make from sys-devel/make is known as a tool for compiling applications. But it could also be used to provide often used commands so that they can be accessed easily.
After you create an Analysis Services project, you generally start working with the project by defining one or more data sources that the project will use. When you define a data source, you are defining the connection string information that will be used to connect to the data source. In the following task, you define(…)
On August 18, 2003, the Microsoft Product Support Services Security Team issued an alert to inform customers about a new worm. A worm is a type of computer virus that generally spreads without user action and that distributes complete copies (possibly modified) of itself across networks (such as the Internet). Generally known as “Nachi,” this new worm exploits the vulnerabilities that were addressed by Microsoft Security Bulletins MS03-026 (823980) and MS03-007 (815021) to spread itself over networks by using open Remote Procedure Call (RPC) ports or the World Wide Web Distributed Authoring and Versioning (WebDAV) protocol that is supported by Internet Information Server (IIS) 5.0.
Before Configuration Manager can publish site data to Active Directory Domain Services, the Active Directory schema must be extended to create the necessary classes and attributes, the System Management container must be created, and the primary site serverâ€™s computer account must be granted full control of the System Management container and all of its child objects. Each site publishes its own site-specific information to the System Management container within its domain partition in the Active Directory schema.
This document assumes working knowledge of the Windows Registry. It is possible to render your computer useless by incorrectly modifying the Registry. Caution is advisedâ€¦ Settings pertaining to Windows NT will say Win NT. All others refer to Win9x 1.Â Â Â Remove unwanted items from Control Panel | Add/Remove programs 2.Â Â Â Changing Icons for Desktop Items(…)
Change the default application install path Change the default Win2000 install path A warmer welcome Tell Win2000 where to find the service pack files Remove Unwanted programs from Add/Remove Programs Open My Computer icon in Explorer view Keep the Print Spooler service from displaying dialog boxes Stop Print Job Logging in the Event Log Disable(…)
How to check Windows NT, 2000, and XP Computers (workstations and servers) for missing security fixes.
Hfnetchk.exe – Is a utility from Microsoft that checks Windows NT, 2000, and XP Computers (workstations and servers) for missing security fixes. Â It is a command line utility that is run from a command prompt. Â For a full description of Hfnetchk see the MS links below. Note: A company called Shavlik Technologies is the company(…)
In a Windows 2000 domain environment, all of the domain controllers are piers. Â There are no PDCs and BDCs that you find in a Windows NT domain. Â All Windows 2000 domain controllers contain a writable replica (or copy) of the Active Directory Database, and unlike the hierarchical server structure in a Windows NT domain (the(…)
Basic steps: – Install OS (WinNT or 2000) on your Master build PC – Install Apps and configure PC – Run Sysprep (with the optional sysprep.inf file). You run Sysprep from a command line. – Shut down the PC – Run your PC imaging software (usually from a bootable disk) to create a disk image.(…)