Technology Made Simple
Sunday August 1st 2021

‘Server 2008’ Archives

Q&A Monday: 64 bit Print Driver on 32 Bit System

Q&A Monday:  64 bit Print Driver on 32 Bit System

Question: I'm trying to add a 64 bit driver, for our existing 32bit printer shares on our Windows 2008 Server.  When I try to add 64 bit drivers for the printer, I browse out to the 64 bit driver, and I get a prompts stating: "the specified location does not contain the driver for the requested processor architecture".  Another coworker tried [...]

Q&A Monday: Dell PowerEdge 2970 Install Problems

Q&A Monday: Dell PowerEdge 2970 Install Problems

Question: I have a Dell PowerEdge 2970 server, and I'm trying to install Windows Server 2008 R2 with the Dell CD that came in the package.  It boots off the CD and loads the install GUI, and then stops before installing everything asking for drivers.  I tried putting the RAID array drivers on a USB and letting it search there, but it doesn't [...]

Q&A Monday: Event Viewer Problems in Server 2008

Q&A Monday:  Event Viewer Problems in Server 2008

Question: I have a Windows Server 2008 64Bit Standard and I am having problems getting the Event Viewer to display on the server.   When I click on the Event Viewer, I get the following Error Message - Event Log Service is unavailable. Verify that the service is running. I went into the Windows services and tried to start "Windows Event Log" [...]

Windows Security Best Practices

Windows Security Best Practices

In todays age, you can not be too secure when it comes to your network it's better to be safe than sorry.  In the current economy I've seen many companies consolidate jobs and add new burden to already over-burdened admins.  One of the places where this will hurt companies is the network security departments. I've learned many security faux [...]

Helpful Powershell Commands to Know

Helpful Powershell Commands to Know

Recently I was talking with a colleague about our histories of working in the computer field, all the ways from the early days of DOS to where we were currently.  I remember the early days of working on the computers and using the DOS commands to get stuff completed, today Microsoft has started using PowerShell for the admin commands of todays' [...]

Q&A Monday: Disable IE Enhanced Security in Server 2008

Question: In previous incarnations of Windows Server, when I wanted to remove the Internet Explorer Enhanced Security Configuration, I've gone into the add/remove programs and removed the security component, but in Windows Server 2008 that isn't an option, can you please help me remove this annoyance. Joseph Hart Jackson, [...]

Q&A Monday: USB Printer in DOS

Q&A Monday:  USB Printer in DOS

Question: I currently have a legacy software at my current job that runs in DOS and have printed to a printer that was connected via parallel cable.  Recently that printer has bit the dust and I bought a new USB printer to replace it, but now the program wont print, but the printer works in Windows, please help. Answer: This is a common [...]

Effectively Erasing Files

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that's the end of it.  It's not just individuals, companies can also fall into this trap.  Just selecting delete does not mean that the [...]

Q&A Monday: Increase Simultaneous Downloads

Question: Because of my job I spent a lot of time downloading files from the internet, my productivity is killed by the simultaneous download limit in Windows.  Is there anyway to work around this limit or a nifty program that will let me easily download more? Joseph James Dallas, TX Answer: Now I have tried many programs that [...]

Security Alert: Shortcut file Vulnerability

Security Alert:  Shortcut file Vulnerability

This vulnerability is due to the failure of Microsoft Windows to properly obtain icons for LNK files. Microsoft uses LNK files, commonly referred to as "shortcuts," as references to files or applications. By convincing a user to display a specially-crafted LNK file, an attacker may be able to execute arbitrary code that would give the attacker [...]

 Page 1 of 3  1  2  3 »