Verification of Active Directory users can sometimes be quite complicated. This is particularly the case when a user is unable to login to the Domain. It can be tough to assess the issue if the user is tied to the system and does not have rights to login to other computers. Changing the password or unlocking the account can only be useful if the password has expired, the user account Continue Reading →
Hashes or checksums are used for file integrity verification. Many a times files downloaded from the Internet are checked with MD5/SHA256 hash to verify if the file is tampered. Hashes are also used in encryption, password storage and to protect sensitive data. A HashGenerator helps in quickly computing or verifying the hash for a file. HashGenerator is a simple application (also available in portable form), which automates the generation of Continue Reading →
Remote Assistance is a Windows feature by which a client operating system can send request for help to an administrator or friend. The Helper can even be allowed complete control of the user’s desktop, provided its allowed by the assisted person. There are also features in Active Directory (Windows Server 2008) that can be configured to set preferred remote assistance settings. In this post we will explain remote assistance methods Continue Reading →
Windows UAC (User Account Control) provides many options in Windows 7 that has made user administration more easy. However, for people who still use pre-Vista Windows OS, or would like to simply have more control over user accounts, require certain software that may give them more advanced options. Recently, we came across one such software called the Accounts Tuner. It is a free app that allows easy management of user Continue Reading →
Shared computers that are used by a number of people at work and at home often suffer from rough use by users. This is because something as delicate as a DVD drive can be overused by a novice user which can result in damaging the lens. This is particularly the case when people start burning too many discs which reduces the life of the optical drive. Nero BurnRights is a Continue Reading →
To implement Domain policies for Active Directory users, it is first necessary for the client operating system to join a Domain. The policies are implemented after the client computer comes under the umbrella of the Domain itself and logs in from the Domain credentials. In this post I will tell you the two basic methods that can be used for joining a Domain from a Windows 7 client operating system.
It often happens that a user forgets his/her password and instead of asking the Domain Administrator to reset the password, they attempt to login by using the trial and error method. This results in the lock out of their account because of which a user cannot login again, (even with a valid password). An account can also get locked due to synchronization problems between the domain and other systems. Furthermore, Continue Reading →
When creating a user in Active Directory, there are several user account related options that can greatly enhance network security via user authentication and encryption methods. The choices range from a simple password change at first logon, to smart card support. In this post I will tell you what options are available to apply on Active directory users in a Domain environment in Windows Server 2008 and what can be Continue Reading →
Previously I provided you with a guide about “How To Create Windows Server 2008 Domain & Things To Consider”. In this post I will explain the procedure involved in creating Domain users from Active Directory in Windows Server 2008. It is worth mentioning here that the same method more or less applies in many pre-Windows Servers 2008 operating systems, for creating Domain users, (e.g. Windows Server 2003).
SysAdmin Anywhere is an Active Directory Domain administration software which provides information about resources such as the Domains, servers, client computers, users and groups, etc on a network and provides easy configuration options. Interestingly, it has a Windows 8 style Metro user interface which gives it a visually appealing look. With SysAdmin Anywhere you can create network software and hardware inventories, edit and manage users, groups, computers, etc and obtain Continue Reading →