Topics
Content Types
About 25 results
-
Repair corrupt Outlook PST files with two Microsoft utilities
Outlook PST file corruption is a fairly common occurrence. To help you troubleshoot PST failures, Microsoft provides two handy utilities: the Inbox Repair Tool and the Oversized OS...
-
Using risk management to develop a corporate security policy
Insurance companies use risk management to set rates and control how insurance policies are written. You can use the same basic techniques to create effective security policies for...
-
SolutionBase: Using the Deployment Workbench to install Windows Vista
Windows Vista creates all sorts of new challenges, including trying to figure out the best way to deploy it in the organization. To help speed deployments, Microsoft created the ...
-
Access SOAP applications natively in Windows XP
Brien Posey explains how to use Windows XP's built-in SOAP client to execute SOAP-enabled applications. He provides a brief introduction to SOAP and WSDL standards, and offers exam...
-
Build Your Skills: Make batch files more useful with branching and decision-making techniques
Tips on advanced branching techniques in DOS batch files
-
Checklist for deploying open sourced GroupWare
Consider these basic issues if you're contemplating an open sourced GroupWare deployment.
-
Checklist for deploying open sourced GroupWare
Consider these basic issues if you're contemplating an open sourced GroupWare deployment.
-
Build Your Skills: NETSH scripts add network functionality to batch files
Use NETSH scripts to manage a Windows information network
-
Disk compression through batch files
Even though hard drive prices are steadily declining, it's still important to squeeze all the space you can out of your hard drives. Brien Posey tells you about Windows NT's disk c...
-
Dealing with inaccurate real-time clocks
If you've ever checked the clocks on your servers, you may have noticed that they can vary widely from server to server. In this Daily Feature, Brien Posey shows you how to synchro...