Run a Conficker removal tool before April 1 By Brian Livingston @ windows secrets Computers infected with the infamous Conficker worm will start scanning the Internet for instructions this April Fools’ Day, and the results won’t be a funny joke. I’m publishing a special news update today to correct some misinformation that’s been circulating and […]
The excitement has already started in anticipation of Q2 2009 l distro releases. As usual, the big names are Ubuntu 9.04 (a.ka. Jaunty Jackalope) and Fedora 11 (Leonidas). It’s time for a straight off comparison on the upcoming features of these two distros. I have not mentioned minor version numbers of most packages, since it […]
RichCopy is a free utility that comes to us from Ken Tamaru of Microsoft. The tool was first developed in 2001 and has been updated regularly to keep pace with evolving needs. Trust me when I tell you, this is the answer to all your file copying needs. What you’ll find most striking the first […]
EIGRP Configuring Cisco’s routing protocol EIGRP to use authentication follows similar steps as configuring RIP v2 authentication: 1. Enable EIGRP authentication on each interface with the ip authentication mode eigrp command. 2. Define the key chain to use under each interface with the ip authentication […]
Username Privilege Levels Finally, a username can have a privilege level associated with it. This is useful when you want specific users to default to higher privileges. The username privilege com- mand is used to set the privilege level for a user: Router#config terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#username […]
These new themes are pretty darn good, I especially like “Construction”, “Contoso”, and “OARP”. I could see them being changed up and used for a lot of company intranets. I do wish they would have packaged them as a WSP or something rather than just give us a solution file and have us make one […]
Mozilla officials admit Firefox continues to rely on a monolithic architecture that can lead to instability and memory leaks. By Thomas Claburn, InformationWeek March 25, 2009 Mozilla, faced with more insistent competition for Web browser market share from Apple, Google, and M*crosoft, is asking for help managing Firefox’s appetite for memory. In a blog post […]
Having dealt with the SoftMod Windows Vista activation crack, Microsoft will start hunting down and “killing” pirated copies of Windows XP Professional, the flavor of the operating system labeled by the company as most popular with pirates. The software giant has cooked and will release an update to Windows Genuine Advantage Notifications designed to sniff […]
get a lot of questions concerning the deployment of Windows XP on ESX. By default, ESX will use the LSI Logic driver when deploying a new Windows XP virtual machine. The LSI Logic driver is not found on the CD-ROM media, so Windows XP will not continue with the installation if this driver is not […]