Resetting bulk Active Directory User Attributes (Properties) using PowerShell

Video tutorial on how to Resetting bulk Active Directory User Attributes (Properties) using PowerShell See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader … Continue Reading

Walk softly and carry a Router-on-a-stick! (ROS)

So you are maintaining a medium-sized network and you want to route traffic between your VLANs.   What are your options?  You can place one router interface in one VLAN and another router interface in each of the additional VLANs, but … Continue Reading

Multiple Joins Work just like Single Joins

Before reading this article, you should have a good understanding of single joins between two tables and be clear on the differences between inner and outer joins. Check out my previous post A Primer on Joins to help you accomplish this. Have you … Continue Reading

A Malware Recovery Scenario – Hacktool

A former student sent me an email requesting assistance with a computer issue. Microsoft Security Essentials continued to post the message “error warning: HACKTOOL:WIN32/Keygen”. Hacktool malware was quarantined. Other symptoms started to appear. Following appropriate guidance, the student looked into … Continue Reading

How to Reset a Windows Client Secure Channel Password – Video

Video tutorial on how to Reset a Windows Client Secure Channel Password by Rick Trader. The Secure Channel Password between the client computer and your Domain Controller has become a mismatch. See our class schedule for complete Course Schedule Training. … Continue Reading

Correcting Direct Access Configuration Errors

One of the labs within the Configuring Windows 8/8.1 course (20687D) enables students to experience Microsoft Direct Access. Admittedly the virtual environment is pre-staged and the experience is more truly designed to help participants understand the steps required to use … Continue Reading

Using the Low Orbit Ion Cannon for Denial of Service Testing

A very common attack technique in use today is the Denial of Service (DoS) attack. DoS attacks are effective in degrading the performance of targeted systems, effectively taking them offline and preventing legitimate system use. A typical DoS attack goes … Continue Reading

Good to Great and Project Management Parallels

Good to Great by Jim Collins (Harper Business, 2001) provides a statistical analysis of the characteristics that enable a good company to shift or change toward sustained greatness.  Several of the characteristics might be directly correlated to some of the … Continue Reading

A Primer on Joins

The golden rule of OLTP database design is that every table should represent one, and only one, entity-type. Without this rule, databases can exhibit three data anomalies (insertion, deletion, and update anomalies) that undermine data integrity. But adherence to the … Continue Reading

Yes, you can get IPv6 in your home!

If you read my recent blog regarding the availability of IPv6 in one’s home, then you will appreciate that I have followed through on my promise to blog about my experience.  After all that waiting, the end result was actually … Continue Reading

How to clone a Windows Server 2012 or 2012 R2 Domain Controller

Video tutorial on how to clone a Windows Server 2012 and 2012 R2 Domain Controller by Rick Trader. One of the coolest new features in Window Server 2012 and Windows Server 2012 R2 is the ability to clone a Domain … Continue Reading

Can I get IPv6 in my home?

32 bits, 64 bits, 128 bits, a dollar, all for IPv6, stand up and holler. Sounds like a snooty football chant, doesn’t it? Yet the cadence is off. Parts of it are way too long. But enough about the down … Continue Reading

SkyDrive to OneDrive. What’s new in OneDrive for Windows 7 and 8.1

Upgrading courseware from 20687C: Configuring Windows 8(.1) to the 20687D version. Acquire the new Skillpipe courseware and start updating instructor comments – check. Download the instructor content and updated virtual drives from the MCT Download site – check. Compare each … Continue Reading

How to configure gateway redundancy with HSRP in IOS

So you are moving from a small network to a medium network. Now it matters if the path from your clients to your default gateway is down. Or even more crucial, it matters if your clients’ default gateway can get … Continue Reading

Capture a Windows Image with ImageX – Simplified

A recent email from a former student asked, “ Is it possible to have you show me how to capture an image using Imagex?” My first thought was ‘Happy to aim you in the proper direction’. This is easy – … Continue Reading

Do Not Rely on PDF Document Security

The scenario is simple enough. You need to share some information, a document, with a friend or coworker. You want them to read the document, but not alter or print it. You don’t want them to copy the text or … Continue Reading

Schedule SFC scan NOW!

With the recent (May 2014) occurrence of a significant Windows Internet Explorer bug, we are reminded of the potential for Windows OS intrusion and damage. No matter how proactive we become, cyber criminals will continue to pursue efforts to intrude, … Continue Reading

How to configure your Cisco 3560 MLS to use EIGRP for IPv6

Do you have a 3560 switch and you want to run EIGRP for IPv6? Have you typed ipv6 router ? and you don’t even see eigrp as one of the options? I did some research on Cisco’s feature navigator in … Continue Reading

Using WHOAMI.exe to troubleshoot NTFS Permissions

Using WHOAMI.exe to troubleshoot NTFS Permissions See our class schedule for complete Windows 7, Windows 8 and Server 2012 Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick … Continue Reading

How to Force System Center Configuration Manager Client Updates

When working with System Center Configuration Manager 2007, 2012, or 2012 R2, you probably make changes to client configuration settings. Some of the changes don’t need to reach your managed clients very quickly, while others could be considered more important. … Continue Reading