How to cover un-covered – the case of missing subnet

Few days ago my colleague at work pointed me out that I had not created a follow-up to my article about site location which was requested by some users in comments on my Polish blog. When one started this whole blogging thing one has to deal with consequences … time to write something few simples … Continue reading "How to cover un-covered – the case of missing subnet"

Internet Explorer 8.0 Resources

  Microsoft has released Windows Internet Explorer 8.0 to the web last Thursday. Besides improved reliability, security, performance and a handful of new features, Internet Explorer 8 introduces a new rendering engine, which is enabled by default. This new engine might break your mission-critical web based applications.

Reverse engineering attribute flows from server export

ILM (MIIS) allows management agent configuration to be exported in two ways: Management Agent export Server configuration export. Both options produces XML files, however in first case one will get single file which will contain only configuration for single MA. In second case series of XML files will be created, one for each MA and … Continue reading "Reverse engineering attribute flows from server export"

And you will keep your password updated …

Implementing effective password policy was always a hard task. Especially when additional accounts like: workstation local administrator account services account (look for W2008R2 new features) name whatever you want account … comes into equation and you have to make sure that all of them are in compliance with password policy of your company. Not always … Continue reading "And you will keep your password updated …"