Terminal Services. Set it up using add/remove programs->add/remove windows
components. Select Ts, click OK and check Remote Administration. The user
needs to log in with a userid that's a member of the local Administrators
group, but that's what you seem to want anyway.
It can use encryption. Grad
I've had one server infected. Other than the description below, I used
NAI's removal-tool with no problems. It can be found at
http://vil.nai.com/vil/virusSummary.asp?virus_k=99209 (may be wrapped)
under the heading "Stand-alone removal tool".
The server was booted in between each step, the whole
AFAIK the PWS is "Workstation-IIS, version 2" which is outdated to say the
least. Installing IIS 4 from the Option Pack is a safer bet. It comes with
Technet, Visual Studio 6, etc etc or d/l it at
http://www.microsoft.com/ntserver/nts/downloads/recommended/NT4OptPk/default.asp
(may be wrapped)
HT
Use http://corporate.windowsupdate.microsoft.com
It lets you specify what to d/l regardless of what your current machine
*needs*.
Søren A
> OK this is getting kinda nasty. So I'll ask, because I'd
> love to. How does
> one download all the SP's, hotfixes, security updates, etc.
> other than