-
Problem Removing Additional Mailboxes from Outlook 2010
In working with Outlook 2010, we had a client who had additional mailbox folders that were appended to his inbox within Outlook from using the File > Open Other User’s Folder functionalityย .ย When attempting to simply close the folder from…
-
Using WordPress As A Knowledgebase
remotely connecting to our hyper-v 2025 server using hyper-v manager
-
Joining ESXi to a Domain
Using domain credentials for your VMware environment only makes sense.ย It alleviates the hassle of having to keep up with two different sets of user credentials and makes for a much more centralized authentication model for users as well as…
-
Installing vCenter Server 4.1 Step by Step
Installing vCenter Server 4.1 update 1 is a fairly straightforward install. In preparation for this demo, we have built a Windows 2008 R2 64 bit server with all Windows updates, downloaded the ISO for vCenter Server 4.1 update 1 (which…
-
End to End .Wim Image Deployment with WDS
We want to take a look at the end to end creation of a .wim image and the deployment of this image via Windows Deployment Services. This will require several key components to be in place for your environment. Microsoft…
-
Virtualization Advantages and Disadvantages
Virtualization and cloud computing are the big buzz words in the the technology industry these days. If you are employed in the tech field, no doubt you have had experience with virtualization and cloud computing either directly or indirectly in…
-
Cloning a virtual machine without VSPHERE
If you have a single ESXi box and don’t have access to a VSphere box because of the lack of a license or hardware, you are missing some of the key functionality that makes virtualization great.ย The ability to clone…
-
Beware of Roaming Profiles and Malware Infection
Most admins have certainly had to take care of their fair share of spyware and virus infections . Many times Spam/Spyware/Virus filters in an environment do not catch all variants of maware unfortunately. However, using tools readily available such as…
-
Removing Exchange 2010 roles
The process to remove roles from Exchange 2010 is fairly straightforward.ย In order to remove a role or all roles from an Exchange 2010 server, you initiate the process from “Programs and Features. Right-click on “Microsoft Exchange Server 2010” The…
-
Windows 2008 R2 access denied adding TCP/IP printer
I ran into a pesky add printer access denied error message recently with a server that had been upgraded from Windows 2008 to Windows 2008 R2.ย In attempting to add a printer to the printer management console via the TCP/IP…