Skip to Content

Category Archives: Microsoft Windows 8

Microsoft Windows 8

Using the new Active Directory PowerShell Cmdlets on down-level and module-less systems

Written on December 29, 2014 at 7:48 PM, by

Last week, we discussed the new Active Directory Domain Services-related PowerShell Cmdlets in Windows Server 2012 R2. In the requirements I mentioned that you needed at least one system with the Windows Server 2012 R2 or Windows 8.1 version of the Active Directory Module for Windows PowerShell feature installed. However, as Aleksandar Nikolic (PowerShell MVP) […]

Security Thoughts: The Inconvenient Truth about CVE-2014-1776 (aka “The Windows XP Mega Vulnerability”)

Written on April 29, 2014 at 9:14 PM, by

Looking at the news these last couple of days, you’d think the XPocalypse has begun. A vulnerability has been discovered in Internet Explorer 6 through 11 and code has been made publicly available to attack it. Since, according to several websites, this is a critical vulnerability that was discovered after Microsoft officially ended support for […]

Five Must-Have Hardware components to get the most out of Windows 8 (and Windows Server 2012)

Written on December 14, 2012 at 1:12 PM, by

Windows 8 offers many new  features, compared to Windows XP, Windows Vista and even Windows 7. Some of these features are fantastic, but come with a top of the bill hardware price tag. In this blogpost I’ll explain why you’ll need to scour the specifications of your hardware components for these five acronyms

Pictures of the December 11 IT Camp with Tony Krijnen

Written on December 14, 2012 at 7:56 AM, by

As announced in an earlier blogpost, I hosted a Microsoft Netherlands Datacenter Virtualization IT Camp with Tony Krijnen on December 11, 2012. We had a lot of fun and in this blogpost I’ll try and share some of the fun.

New features in Active Directory Domain Services in Windows Server 2012, Part 20: Dynamic Access Control (DAC)

Written on September 24, 2012 at 6:30 AM, by

For the last years, we’ve been modeling the business into group memberships and their associated access control lists. For some organizations this has even led to changing the way they performed business from before they automated their business processes. For other organizations, this has resulted in token bloat. It’s time someone changed that and introduced […]