• Using WordPress As A Knowledgebase

    Okay, so we know about and have read countless blog posts about using WordPress as a conten management system as well as for an intranet solution.  Have you thought about using it for your IT knowledgebase?  It is actually a…

  • Joining ESXi to a Domain

    Using domain credentials for your VMware environment only makes sense.  It alleviates the hassle of having to keep up with two different sets of user credentials and makes for a much more centralized authentication model for users as well as…

  • Installing vCenter Server 4.1 Step by Step

    Installing vCenter Server 4.1 update 1 is a fairly straightforward install. In preparation for this demo, we have built a Windows 2008 R2 64 bit server with all Windows updates, downloaded the ISO for vCenter Server 4.1 update 1 (which…

  • End to End .Wim Image Deployment with WDS

    We want to take a look at the end to end creation of a .wim image and the deployment of this image via Windows Deployment Services. This will require several key components to be in place for your environment. Microsoft…

  • Virtualization Advantages and Disadvantages

    Virtualization and cloud computing are the big buzz words in the the technology industry these days. If you are employed in the tech field, no doubt you have had experience with virtualization and cloud computing either directly or indirectly in…

  • Cloning a virtual machine without VSPHERE

    If you have a single ESXi box and don’t have access to a VSphere box because of the lack of a license or hardware, you are missing some of the key functionality that makes virtualization great.  The ability to clone…

  • Beware of Roaming Profiles and Malware Infection

    Most admins have certainly had to take care of their fair share of spyware and virus infections . Many times Spam/Spyware/Virus filters in an environment do not catch all variants of maware unfortunately. However, using tools readily available such as…

  • Removing Exchange 2010 roles

    The process to remove roles from Exchange 2010 is fairly straightforward.  In order to remove a role or all roles from an Exchange 2010 server, you initiate the process from “Programs and Features. Right-click on “Microsoft Exchange Server 2010” The…

  • Windows 2008 R2 access denied adding TCP/IP printer

    I ran into a pesky add printer access denied error message recently with a server that had been upgraded from Windows 2008 to Windows 2008 R2.  In attempting to add a printer to the printer management console via the TCP/IP…

  • Change password at next logon in Exchange 2010 SP1

    For those Exchange admins out there, most have made plans or at least are looking into upgrading their Exchange 2010 RTM environments to SP1.  The SP1 upgrade has many great improvements over the RTM version.  The feature list from Microsoft…