Who joined a particular computer to your domain can be an annoying question which may go back beyond your logs. Even if you have captured the event, then you need to find the entry. WhoJoinedPC.cmd looks at the security descriptor for “SPECIAL ACCESS for Validated write to DNS host name”, which is granted when the account is…
Using DSQuery to get list of Domain controllers
The fastest way to get a list of DCs for Windows 2003 and later is: dsquery server -o rdn dsquery server gives you a CN output Tags: Active+Directory, DSQuery
HTA Runas Administrator Context Menu
I use a lot of HTA files, including Microsoft’s terrific Scriptomatic.hta, which writes vbscripts for you. On a Windows 2008 server you need to copy the HTA file down to the local machine before running. This REG file, HTA_RunAS.reg, gives you a context menu to RunAs Administrator. Rename to .REG to and merge. This is a subset of the…
How to run an IE shortcut with alternate credentials
If you are running XP as an ordinary user (a good security practice), you may be annoyed that you cannot run Windows Update. You can be prompted for alternate credentials with and IE shortcut. Here is how: 1)Create a new shortcut with the target “C:\Program Files\Internet Explorer\iexplore.exe” http://update.microsoft.com 2) Click on the Advanced button and choose…
Jackie Chan sell Anti-virus
http://gizmodo.com/5324651/what-the-hell-did-jackie-chan-just-make-me-watch. Pretty funny.
Vista: Epic Fail
Just so you know. I am not a shill for MS products. My next shirt: http://www.jinx.com/men/shirts/geek/epic_fail.html Tags: Vista
Can Windows 7 Resurrect Ancient PCs
Well, sort of…. http://gcn.com/articles/2009/07/27/gcn-lab-windows-7-performance-tests.aspx?s=green_110809
Apple Keyboards Hacked
Apple purists continue to insist how the Mac is superior to Windows because they have not been infected by malware. In my view, this is not because of any superiority in OS X (or Unix) but rather a function of market share. Malware is has been a for profit business since 2003, and the worldwide market…
Jesper on Microsoft
“If we [Microsoft] had actually met and interacted at length with real people at any point over the past 15 years, we probably would have realized already that designing a “program” that consists of 3,829 files, spread over 60 folders, is not how people expect it to work. That, by the way, is not a random…
Unlock Reset User Account
Unlocking user accounts and resetting passwords is an utter waste of time for system administrators. This is how I manage it: 1) Create a security group for users who will get the unlock/reset right. 2) Delegate the ability to unlock user accounts and to reset the password to that group using procedure here. 3) Give…