I see that occasionally, but rarely. But I'm not running any DC's these days
- just a whole boatload of application servers.
Roger D. Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Thommes, Mic
Title: Domain Controller Consolidation utilizing Dual Core CPUs
Its a fairly simple equation.
Dual Core processors have 2 full CPU's per chip. Therefore,
they have two sets of cache, and can have two instructions being executed at the
same time.
Hyperthreading is a single CPU per chip that
Its really been a while since I laid hands on SBS, so I'm shooting from some
pretty dusty memories.
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley
Sent: Saturday, September 24, 2005 12:57
That's not the same net effect. Those settings are only applied at restart as
opposed to being applied every 90 minutes (or whatever your refresh interval
is). Its quite possible to remove the perms granted by that script and run like
that for months.
Roger Seielstad
E-mail
s the modification.
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Chuck Chopp
Sent: Friday, September 23, 2005 7:30 AM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Applications that extend the schema...
Given the
That's really what a TAM's job is. They're supposed to be advocates for
their customer within Microoft. If they're not beatting down (virtual) doors
within MS to get issues resolved for their customer, they're failing at what
they get paid to do...
Ro
Actually, the ideal would be the option to append or
override.
Sometimes you don't care if other's are in a specific
group, as long as a specific set of accounts/groups are in that group. Case in
point is IT shops where the user is granted/required to have local admin.
Ideally, you'd set t
have 100 machines, it was possible to get
a report of there being >200 CALs in use. One of the many reasons I force
disable the LicenseLogging service..
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley
package overall, but the requirement to do the wizard thing
makes it hard for people like us to deal with it..
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Michael B. Smith
Sent: Thursday, September 22, 2005 1:06 PM
To: Act
The bigger trick is getting yourself a client cert to get on Corpnet
wireless
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley, CPA
aka Ebitz - SBS Rocks [MVP]
Sent: Thursday, September 22, 2005 4:13
I believe you can do it through WMI, but I don't have any of that code
handy.
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kern, Tom
Sent: Thursday, September 22, 2005 11:06 AM
To: ActiveDir@mail.activedi
I know next to nothing about ISA. The last time I
touched it it was still called MS Proxy 2.0 I'm assuming there's a
security group somewhere that is used to control who can do what through the ISA
server. Actually, I know there is because I'm part of one at work (just don't
know how to
By default, the IIS app pool and (I believe) sharepoint
both run under Network Service. Therefore, when Sharepoint makes the request
outbound, it will be making it within the context of the NetworkService account,
which means its going to present the server's domain
credentials.
Ro
Honestly, I'd avoid perl like the plague. Its about the
least readable language on the planet - especially if you haven't touched a
script for a few months.
As was already suggested, python is a pretty good cross
platform option.
Roger SeielstadE-mail Geek
From: [EMAIL PROTECT
Monad docs are really not out in any sort of usable context right now.
Especially since Microsoft released a new beta at PDC this month and it's a
whole lot different than the previous version (different as in better).
Roger Seielstad
E-mail Geek
-Original Message-
From: [
So have you granted domain\IISServer$ access through
ISA?
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos
MagalhaesSent: Wednesday, September 21, 2005 8:16 AMTo:
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDir] Kerberos
Del
Speaking of being here next week - keep me informed on the
activities...
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Carlos
MagalhaesSent: Wednesday, September 21, 2005 5:39 AMTo:
ActiveDir@mail.activedir.orgSubject: RE: [ActiveDi
Why not run something like WSUS (Windows Software Update Services) and
manage it yourselves Seems kinda silly to outsource that piece
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Carerros, Charles
Sent
Trend Micro's products are fairly robust there too.
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mark Parris
Sent: Wednesday, September 14, 2005 11:40 PM
To: ActiveDir.org
Subject: Re: [ActiveDir] Sysvol a
Could be an MTU size issue. Its often an issue across
VPNs
Look up how to set the MTU to less than 1500 (or just set
the reg key to disable PMTU detection) for the box you're trying to bring
up
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On B
Yeah, but his MVP is in MSDS (as in Dining Services). We've got pictures to
prove it
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Susan Bradley, CPA
aka Ebitz - SBS Rocks [MVP]
Sent: Wednesday, September 14,
IIRC exception code 0xc005 is an access denied. Do normal users have the
right to install drivers on their workstations?
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Salandra, Justin A.
Sent: Friday, September
ExMerge supports doing select merging based on criteria like dates. That's
how I always approached that issue in the past.
You need to run ExMerge in batch mode with a config file to do it though.
Its all in the docs.
Roger Seielstad
E-mail Geek
-Original Message-
From: [
Again to clarify,
the ISA server often (but not always) resides in the semi-trusted network while
the SharePoint server should always reside on a fully-trusted network.
Actually - you really should look at that differently. It should
read:
ISA
server should reside in the semi-trusted
I *think* there's a policy setting to override that first connect to MS.com
- I just can't remember what it is right now
----
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Charlie Kaiser
Sent: Wednesday, Se
Last time I checked, you needed about 12-14 ports open to authenticate
against a domain.
It would make significantly more sense to put a proxy outside your firewall
and keep sharepoint inside.
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto
cal LAN
but in different subnet, will not be returned as first choice.I hope
it clears it a bit.
On 9/6/05, Roger
Seielstad <[EMAIL PROTECTED]
> wrote:
I'd
create smaller subnet records in AD (probably matching the /25 VLANs) and
as
I haven't done it on DC's yet (since I no longer run any...) but with
regards to member servers I'm finding it rock solid.
For a higher traffic DC or member server, I'd expect you'll see a relatively
large decrease in CPU utilization for network related things.
--
side
LAN)but, since client IP network is restrictive /21, the server
which is there in the same physical LAN but in different subnet, will not be
returned as first choice.I hope it clears it a bit.
On 9/6/05, Roger
Seielstad <[EMAIL PROTECTED]> wrote:
I'd
create smaller subnet recor
Title: Re: [ActiveDir] Moving forest root domains to child domains in another forest
Link speed really has nothing to do with the decision to
split into separate domains. You've got a LOT of control over replication and
really can build a topology that works for just about any WAN design you c
I'd create smaller subnet records in AD (probably matching
the /25 VLANs) and assign those to the sites which house the domain controller
which you want them to use. You can keep the /21 subnet entry as a catch all as
well, just in case.
Roger SeielstadE-mail Geek
From: [EMAIL
I had been looking at the backup files created by GPMC, which look like they
could be munged together, but that's a bit more manual than I'd like. I'll
have to look at them again to see if running them through something like
WinMerge would do the trick.
Roger Seiels
t probably didn't work with a template.
Roger Seielstad
E-mail Geek
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Charlie Kaiser
Sent: Friday, September 02, 2005 3:51 PM
To: ActiveDir@mail.activedir.org
Subject: [ActiveDir] Group
in to work with, and rather
than manually recreating them (since some are fairly involved) I'd love to
be able to select 2 or more and do for GPO's what WinMerge does for text
fles.
Roger Seielstad
E-mail Geek
List info : http://www.activedir.org/List.aspx
List FAQ: http://
Look out Detroit! Joe's hopped up on caffiene...
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of joe
> Sent: Thursday, May 05, 2005 4:32 PM
> To: ActiveDir@mail.activedir.org
> Subje
Definitely do the DMZ.
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Noah
EigerSent: Thursday, April 21, 2005 2:08 PMTo:
ActiveDir@mail.activedir.orgSubject: [ActiveDir] Locating FTP
Revisited
Hi –
A mont
The only place I've seen per user network rules is in the authpf code in
OpenBSD:
http://www.openbsd.org/faq/pf/authpf.html
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Kern, Tom
> Sent: T
t;
account - no domain admin access at all. Only explicit elevation of
privileges is having rights for our OU.
2. If you can't trust the admins, replace them. There are plenty (and I mean
PLENTY) of ways to validate that someone isn't doing something they
shouldn't - auditing is y
will be worthless.
You could sniff at 10Gbit, but I don't know of any server adapters for that
speed right now - and even if they did exist, I'm not sure what OS and
hardware could keep up with logging all of it.
----
Roger Seielstad
E-mail Geek
[1] Meaning all ports also for
By checking the working set size of by LSASS?
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Fugleberg, David A
> Sent: Thursday, April 14, 2005 2:22 PM
> To: activedir@mail.activ
Ethereal (and most other sniffers for that matter) use the host machine's
NIC drivers.
Of course, if you're doing a promiscuous sniff on a full GigE network - a
single Gig interface isn't going to cut it.
Roger Seielstad
E-mail Geek
> -Original Message--
I tend to use dig from *nix hosts for real DNS work. IIRC
there are windows ports available.
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Murray
WallSent: Tuesday, April 12, 2005 2:04 PMTo:
ActiveDir@mail.activedir.orgS
That's a cute marketing slogan - so it's a User Interface for a user
interface?
Ethereal is the User Interface for the WinPCAP library that actually does
the captures.
----
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[
Try changing it from a Cname to an A record. Chances are it gets fixed.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Cothern Jeff D. Team EITC
> Sent: Monday, April 11, 2005 1:32 PM
y? -anon
>
> ____
>
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Roger Seielstad
> Sent: Friday, April 08, 2005 11:17 PM
> To: ActiveDir@mail.activedir.org
> Subject: RE: [ActiveDir] SSL on OWA to change password
>
>
.org
> Subject: RE: [ActiveDir] SSL on OWA to change
password
>
> Not to sound naive but how do I do
that?
>
> -Original
Message-
> From:
[EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On
Behalf Of
> Roger Seielstad
> Sent: Tuesday
That only applies to creating the computer account, which
has already been done in the scenario described.
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of David
AragonSent: Friday, April 08, 2005 3:42 PMTo:
ActiveDir@mail.
Via the ADU&C GUI, there's a permissions page when you
create the computer account which corresponds to which principles have access to
associate a machine with the account, I don't, however, know what the specific
permission name is for that setting.
Roger SeielstadE-mail Geek
(but less elegant IMO) you could just cut an A record:
fs1 in a 192.168.0.1
----
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: Friday, April 08, 200
Do your clients have a dns suffix search order defined? Without it they
generally won't do host name to FQDN transitions for cnames.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Cothern
Hey Laura!
Yes - closest GPO will win in that scenario.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Hunter, Laura E.
> Sent: Friday, April 08, 2005 6:56 AM
> To: ActiveDir@mail.activ
rver...has anybody done
this? Can u help me?
Thanks a lot!Roger Seielstad
<[EMAIL PROTECTED]> wrote:
Taking a wag at it - you're dealing with an
impersonation issue. Take a look at the fourth question and answer
in:
http://msdn.microsoft.com/msdnmag/is
eriod.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Cothern Jeff D. Team EITC
> Sent: Thursday, April 07, 2005 3:56 PM
> To: ActiveDir@mail.activedir.org
> Subject: [ActiveDir] Filte
There's an ASP command called response.redirect that will do it, as well as
a static HTML meta tag for redirects - should be able to search pretty
quickly for the specific syntax.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
>
Really? This is what I'm afraid of and I'm having a hard time
confirming. Does anyone know for sure? Thanks
-Original Message-From: Roger Seielstad
[mailto:[EMAIL PROTECTED]Sent: Wednesday, April 06, 2005
10:57 PMTo: ActiveDir@mail.activedir.orgSubject: RE:
I think if you set that to 1 it basically forces TCP rather than UDP as
well. We do that with the hosts on our production network.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Becker, Jim
> Se
http://www.winguides.com/registry/display.php/280/
I'd suggest 1400 as a good setting.
The problem is that the VPN encapsulation adds size to the packets (like 60
bytes IIRC) and that can kick it over the top of the MTU of the links.
Roger Seielstad
E-mail Geek
> -Original
I don't believe you can block inheritance on domain
password policy.
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Francis
OuelletSent: Wednesday, April 06, 2005 12:09 PMTo:
ActiveDir@mail.activedir.orgSubject: RE: [Acti
Have you tried "gpupdate.exe /force" and "gpresult.exe
/scope computer /v" and looked at what's really happening?
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Schmieder,
MarcSent: Wednesday, April 06, 2005 8:13 AMTo:
Ac
Some clown named Joe that runs a site called joeware.net has some tool
called lg that would handle it remotely.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> [EMAIL PROTECTED]
> Sent: Tu
Would it not make more sense to use the restricted group's functionality and
insert it that way?
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Medeiros, Jose
> Sent: Tuesday, April 0
What's to change? Put an http redirect page on port 80 and redirect to 443 -
they'll never know the difference.
----
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Salandra, Justin A.
>
Maybe to protect the data within the emails? Specifically company
confidential mail?
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Perdue David J Contr InDyne/Enterprise IT
> Sent: Tuesday,
Taking a wag at it - you're dealing with an impersonation
issue. Take a look at the fourth question and answer in:
http://msdn.microsoft.com/msdnmag/issues/05/04/WebQA/default.aspx
You might also have to set the computer account to be
trusted for delegation (I think that's the setting) - bu
I'd think that it would be considered expected behavior - I don't believe
one forest would have a concept of the other's sites and subnets.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf
It strikes me like the best way to handle that is to provide correct site
and subnet mappings across both (all) forests - especially when there are
cross forest processes happening.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mail
.
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Rick Kingslan
> Sent: Sunday, April 03, 2005 4:07 PM
> To: ActiveDir@mail.activedir.org; 'Jorge de Almeida Pinto'
> Subject: RE: [A
needs
to know EVERY record you want it to resolve in that zone. It won't forward
to another DNS server for records in a zone for which it is authoritative.
----
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Beha
Apparently its been found that the non-water based systems
are just as bad as the water based ones for the electronics, and generally much
worse for the living occupants of the room.
Preaction systems are a must - basically the water lines IN
the data center are dry - they are only pressuri
Title: Compelling arguments?
That should have said it shoudn't be that
hard to delegate
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Roger
SeielstadSent: Thursday, March 31, 2005 7:44 PMTo:
ActiveDir@mail.activedir.orgS
I'd rephrase Eric's question slightly differently - what will *you* do over
the next few months to get comfortable with it in your environment. That's
really the only question that needs to be answered prior to deployment into
your environment.
Roger
Roger Seiels
What I find interesting is some of the things that I know are in SP1 that
*aren't* listed on that page. Specifically a huge performance improvement in
the TCP stack for servers with more than a few thousand concurrent
connections.
Roger Seielstad
E-mail Geek
> -Original
What process, specifically, is running at 100% CPU?
Roger Seielstad
E-mail Geek
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Bernard, Aric
> Sent: Thursday, March 31, 2005 11:03 AM
> To: ActiveDir@mail.activedir.or
Title: Compelling arguments?
It should be that hard to delegate those - you should be
able to create a stub zone for them pointing back to your AD
servers.
Roger SeielstadE-mail Geek
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Isenhour,
JosephSent
Title: Compelling arguments?
What are you trying to delegate - PTR creation or the A
record creation?
Roger SeielstadE-mail Geek & MS-MVP
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Isenhour,
JosephSent: Wednesday, March 30, 2005 7:49 PMTo:
Act
It gets around the domain membership requirement for your non-domain boxes.
Of course, with the W32Time piece working correctly, there's no need to go
to a third party app.
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
&
True. But, the specific reference I used was for Dr. Who's companion, which
makes somewhat more sense in the context of discussions concerning time, as
time (travel, specifically) was Dr. Who's thing.
----
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message---
DC in the
Harbinger domain back in the NT4 days.
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Ken Cornetet
> Sent: Saturday, February 19, 2005 5:39 PM
> To: ActiveDir@mail.act
You could also grab a copy of K9 and sync time with it
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Charlie Kaiser
> Sent: Thursday, February 17, 2005 11:01
Title: Account policies and groups
Yes, the password policy will still apply to that user - it
applies to every object in the domain, regardless of block inheritance
settings.
Roger SeielstadE-mail Geek & MS-MVP
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Beh
ever use a virtualizing solution like this on anything that
has intensive hardware level requirements like file, network or memory.
----
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Fuller
Keep in mind you can run a DC for even a moderately sized org on a typical
desktop machine.
Since DC's (except the FSMO role holders) are scale-out redundant, there's
no reason not to add additional capacity by using desktop class machines.
----
Roger Seielstad
E-mail Gee
So. the other option is to take a little bit of your time
and do some investigation.
Go grab Regmon and Filemon from Sysinternals (both free)
and watch what the app is trying to access. Chances are its doing something in
%systemroot%\system32 or in the registry that is generally not accessi
I think you're confusing DOS with a text based interface.
Two separate things entirely.
Roger SeielstadE-mail Geek & MS-MVP
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Carerros,
CharlesSent: Friday, February 11, 2005 2:18 PMTo:
'ActiveDir@mail.
I think you're confusing DOS with a text based interface.
Two separate things entirely.
Roger SeielstadE-mail Geek & MS-MVP
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Carerros,
CharlesSent: Friday, February 11, 2005 2:18 PMTo:
'ActiveDir@mail.
Win95 only "required" DOS as part of the installation on a
bare machine, IIRC.
Roger
Roger SeielstadE-mail Geek & MS-MVP
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Perdue David J
Contr InDyne/Enterprise ITSent: Friday, February 11, 2005 2:36
PM
I've alway described Win95 as a 24 bit operating system
myself...
Actually, the OS (i.e. the kernel) is (was) definitely
32-bit code. Rick backed into the correct answer with that damn logic thing
again.
However. explorer.exe (i.e. the GUI) was most definitely a
16-bit app, because at th
I've alway described Win95 as a 24 bit operating system
myself...
Actually, the OS (i.e. the kernel) is (was) definitely
32-bit code. Rick backed into the correct answer with that damn logic thing
again.
However. explorer.exe (i.e. the GUI) was most definitely a
16-bit app, because at th
Title: Message
In the user config section of the applicable GPO, you can
assign the server(s) which hosts the application(s) in the Trusted Zone for IE.
That should fix the issue.
Roger SeielstadE-mail Geek & MS-MVP
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
Let's just say that there's a fix in Win2k3 SP1 that does away with what was
a linked list In my current environment, n= 45000-ish...
----
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On
I bet you're right. Based on some other design decisions I've seen in
Windows lately, I bet they do load scopes as a linked list.
----
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf
a Win2k3 implementation.
Personally, I never got the 80/20 split jazz. I always do 50/50 (or 100% on
one server in my current config, but that's a whole other story - redundancy
isn't terribly important for DHCP with the boxes I manage).
----
Roger Seielstad
E-mail Geek & MS-
think there's perl code that will do most of that for you - I know
we've got a MAC hunter app at work that does something similar to this to
find the name of machines when all we have is a MAC address.
----
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message
list.
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Tim Sutton
> Sent: Thursday, December 23, 2004 8:48 AM
> To: ActiveDir@mail.activedir.org
> Subject: RE: [ActiveDir] Permissions to
size..
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Ken Cornetet
> Sent: Friday, November 19, 2004 8:56 AM
> To: [EMAIL PROTECTED]
> Subject: RE: [ActiveDir] OT: Why no AD in
Correct. The generally accepted principle is that DNS source ports should be
53 as well. Regardless, the by default UDP behavior requires separate
firewall rules to allow responses back to the DNS servers.
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
The next corporate relocation requires my employer to include payment for a
divorce attorney.
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of
> Charlie Kaiser
> Sent: Wednesday,
As opposed to my previous employer. I'm done moving for a while. The last 5
months made me feel like I was in the witness protection program, minus the
mob.
Roger Seielstad
E-mail Geek & MS-MVP
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[E
I think they're dependent more on the existance of and the rate of change of
dynamic registrations. In my previous company, we were about 80% laptops, so
I ran short DHCP leases, short DNS TTLs and scavenged daily. In a more
static environment I'd lengthen those significantly.
NS
servers fail over to TCP and more often than not are able to complete the
lookups.
Now - I also know some people block all TCP traffic to their DNS servers so
if you're DNS servers can't do UDP, you can't resolve from their servers.
Roger Seielstad
E-mail Geek &
1 - 100 of 967 matches
Mail list logo