If DNS resolves a users system and that system is no longer at that IP then you may see a Event ID 10009 in the systems event logs. Check DNS for duplicate entries first… If you have the same computer name in DNS twice with 1 IP being correct and IP not, remove the wrong IP address.
This was a recurring error regarding a particular laptop on
When using GoDaddy UCC certificate with Exchange 2010 there are some termoil on how best to do it. Here is my quick how to on using the UCC Certificates with Exchange 2010.
You shoul edit the powershell command below to reflect your domain name and sub names. Remove all Squidworks.net from the command and insert your domain and sub domain names.
Set-Content -path “c:\temp\squidworks_net.csr” -Value (New-ExchangeCertificate -GenerateRequest -KeySize 2048 -SubjectName… Continue reading
Can you vMotion using local ESX host storage?
Oh man the VCPs out there are screaming “No!!! You can’t vMotion Local Storage!”. Oh to the contrary my friend, with a wee bit of ingenuity you can do many things. Now before I go any further I will state the obvious. As any VCP will tell you, you can’t vMotion the local… Continue reading
Synchronization with your iPhone failed for 1 items.
The following items couldn’t be sent to your mobile phone. They haven’t been deleted. You should be able to access them using either Outlook or Outlook Web App.
Item Folder: Inbox
Item Type: IPM.Schedule.Meeting.Resp.Pos
Item Created: 1/11/2010 2:34:18 p.m.
Item Subject: Accepted: MyMeetingTest
This problem may occurs when the Accepted: or Declined: email that come back
Here is a Visual Basics script I put together which will list all of the Access Control Lists (ACL’s) for all folders in a particular directory.
It allows you to specify a start point and a max depth to recurse.
Distribution Groups in Exchange 2010 are managed from the OWA or what it’s now know as Outlook Web App. Owners of a distribution list can manage there own distribution list if you have correctly set the feature RBAC (Role Based Access Control)in Exchange 2010. As you can guess Microsoft Exchange Server 2010 now comes with the new RBAC (Role Based Access Control) permissions model. This new permissions model allows you… Continue reading
Sometimes it is just simpler to run from CMD line control panel objects. It is even easier to get a user who does not have the menu items available to hand them a “RUN” CMD to open the correct control panel object you need them to. Below is a list of all the control panel objects just type the CMD in the RUN or DOS windows and you place a user right where you need them.
Accessibility… Continue reading
Winsock 2 accommodates layered protocols. A layered protocol is one that implements only higher level communications functions, while relying on an underlying transport stack for the actual exchange of data with a remote endpoint. LSP aka Layered Service Provider can be a security layer that adds protocol to the connection establishment process. An example of an LSP is the Microsoft Firewall Client Service Provider installed as part of the Internet… Continue reading
There are many symptoms that may arise when you are installing a new firewall on a network that is using a DSL circuit and the MTU is not set correctly. That’s right the MTU, Max transmission Unit as it is know is a happy 1500 bytes on any Ethernet, that medium makes up most endpoint networks on the Internet. Most admins never think about what the MTU is set at… Continue reading