Microsoft Press has released the final edition of Introducing Windows 8: An Overview for IT Professionals. This book covers topics such as Windows 8 deployment, security system recovery, delivering Windows apps, management, IE 10, and of course virtualization using Hyper-V for Windows 8.
This eBook is available in PDF (Adobe Reader), MOBI (Kindle), and ePub formats. You can download the book from the Microsoft Press MSDN Blog.
Thank you Microsoft for another free eBook!
Permanent link to this article: https://www.robertborges.us/2012/11/learning-resources/free-ebook-introducing-windows-8-an-overview-for-it-professionals/
In the Hyper-V world, lots of us talk about Live Migration. That is where a virtual machine (VM) is moved from one host to another with no perceived downtime. The caveat is that both hosts need be configured to use the same shared storage (such as a SAN or external drive array). Continue reading
Permanent link to this article: https://www.robertborges.us/2012/07/windows/windows-server-2008-r2/hyper-v-quick-migration/
In the Windows 2003/Windows XP days, printing on a Remote Desktop server was limited to those servers who have drivers for that particular server. Drivers for any locally attached printers would not only have to be installed on the PC that they were attached to, but also on the server you were remotely connecting to.
Now with Windows 2008 R2, Remote Desktop users have the ability to use printer redirection using Microsoft’s EasyPrint. Basically EasyPrint is part of Windows Server, and allows print jobs in a Remote Desktop session to be sent to the client for print job handling, instead of trying to print the job itself. While this is slightly slower than the old method, it allows for a much larger number of compatible printers without the need of installing drivers on the server.
Which printers will work? Well most printers that work with Windows 7 will work with Microsoft’s EasyPrint technology. If you are planning on purchasing a new printer and want to ensure that it will be fully compatible with any Remote Desktop servers you are connecting to, then check out Microsoft’s Windows Catalog database.
Any new printer you are considering should be certified for Windows 2008 R2 to fully ensure it will work well with a Remote Desktop server.
Permanent link to this article: https://www.robertborges.us/2012/06/windows/what-printers-work-best-with-a-windows-remote-desktop-server/
Often times printers do not work the way we expect them to. Sometimes when print jobs get stuck in the queue or cause the Windows printer spooler service to crash we need to step in to help. Here are a few quick steps that will take care of most scenarios that a simple reboot won’t fix.
On a side note, it is usually best if your computer is running the latest driver software from your printer’s manufacturer. This can generally be downloaded from the manufacturer’s website.
- Disconnect the printer from the PC. As long as Windows sees the printer connected it will try to print any jobs in the printer’s queue, including the job causing the problem. You can accomplish this by unplugging the printer’s data cable (usually USB) from either the back of the computer or from the back of the printer.
- Restart the Print Spooler service. Open a command prompt (with admin rights if using Windows 7) and type the following command followed by the <Enter> key:
net stop spooler & net start spooler
The spooler service should restart and bring you back to the command prompt.
NOTE: For more on this step, see my post on How to Open the Command Prompt with Admin Rights.
- Open the printer’s queue and delete any stuck jobs.
- Reconnect the printer to the PC. Windows will reconnect the printer and make it available. Try printing a test page to make sure it is working OK.
Permanent link to this article: https://www.robertborges.us/2012/06/windows/what-to-do-when-a-print-job-crashes-your-printer-spooler-service/
In Windows XP all programs were run with administrator rights if you were logged in to the computer with a user account with admin rights to that system. There are obviously some security concerns with this, as any piece of software can potentially do damage to your system. This all changes with Windows Vista and Windows 7 as long as you keep UAC (User Access Control) enabled. UAC prevents software that need to access certain parts of Windows from running without any checks and balances.
By default, all programs are run without administrative rights. There are some cases where it is necessary to escalate the rights of an application so that it runs with these admin rights. A good example of this is Windows’ built-in Command Prompt utility. If you launch the Windows Command Prompt from the Start Menu, it will run with normal user (not administrative) rights. When the Command Prompt is opened this way, you will be allowed to do things like run a directory search or copy files, but not more advanced functions such as restarting Windows services. To allow these commands to run, you’ll first need to open the Command Prompt with administrative rights.
Opening the Command Prompt in Windows 7 with Administrative Rights:
- Click on the Start Menu and browse for the command prompt (Start >> All Programs >> Accessories >> Command Prompt), or search for Command Prompt.
- Instead of clicking on the Command Prompt icon to open it, right-click and select Run as Administrator.
- You may get prompted to allow this action, if you do simply click on the Yes button.
Permanent link to this article: https://www.robertborges.us/2012/06/windows/how-to-open-the-command-prompt-in-windows-7vista-with-administrative-rights/
There is no shortage to the number of methods one can use to remotely access another computer. Now I’m not talking about any kind of Spyware, but rather remote control software or services which are perfectly safe, legal, and on the up and up. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/05/mobile-computing/how-to-remotely-access-you-home-or-office-pc-2/
May 14, 2012
May 14, 2012
It is very common for laptops to be lost or stolen. When this happens any data on the laptop could fall into the wrong hands. That is unless you have encrypted your device using BitLocker or another drive encryption technology.
If you’re not already familiar with it, BitLocker is the drive encryption technology introduced with Windows Vista and Windows Server 2008. The latest version has increased functionality and security. BitLocker is now available with Windows 7 Enterprise, Windows 7 Ultimate, and some editions of Windows Server 2008 R2.
By default BitLocker requires that your computer have a TPM chip built-in. This is a secure component which can securely keep your encryption key information. But what if you don’t have a TPM chip built-in to your computer? Continue reading
Permanent link to this article: https://www.robertborges.us/2012/05/windows/using-bitlocker-to-encrypt-computers-without-tpm-hardware/
In my previous post (Preventing Spyware or Virus Infections) I explained how to help protect yourself from virus and spyware infections. If you still do contract a spyware or virus infection, there are a few things you can do to clean up your PC or laptop. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/05/it-security/recovering-from-a-spyware-or-virus-infection/
The best way to fight malware or viruses is to prevent them from infecting your computer in the first place. You can help keep your computer protected by: Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/preventing-spyware-or-virus-infections/
As you may have noticed, even the fastest computers tend to get slower as they age. These performance issues could be because either the hardware is no longer sufficient for the programs now running on it, or because it needs a little maintenance. Here are a few steps you can take to help speed up your system. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/windows/easy-steps-to-increase-your-computers-performance/
IT Pro Tech Update 2012
On Wednesday May 2nd 2012, the IT-Pro User Group is hosting Tech Update 2012 an all day FREE event. Come join us for this FREE event and discover the next phase of Information Technology as we discuss Windows 8 in the business environment, Virtualization, Security, Interoperability, and Systems Management. Here is your chance to learn what the impact of Windows 8 server and desktop will have and how you can leverage them to your advantage. We all know that Virtualization is huge but are you sure your virtual machines are secure enough? Will Windows 8 make a difference in the Virtual world? How does virtualization in the cloud work? Come learn the answers to these questions and more from some of the top experts in these fields.
This is a multi-session, multi-track event so it will draw a crowd of the right people. These are primarily IT Professionals in southern New England that are interested in advancing their knowledge and use of system management, virtualization, and cloud computing in an effort to know how to move their companies forward.
Open Wi-Fi and power will be available at seats.
Event Type: Tech Fest
1408 Division Rd.
East Greenwich, RI, 02818
Best for: Developer and IT Pro and Public Sector and Student.
Permanent link to this article: https://www.robertborges.us/2012/04/uncategorized/tech-update-2012-free-event-on-wednesday-may-2-2012/
On many occasions I have had people ask me “Where can I learn about Microsoft’s product X”, or “Is there anywhere I can go to get free training”. Well, here is a list of just a few of the resources Microsoft provides to us all so we can get educated and try out many software titles before making an investment. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/learning-resources/learning-tools-resources-from-microsoft-2/
In Parts 1 and 2 I discussed securing your network perimeter and server environment. But as I said in the beginning, IT security is like an onion. Let’s take a look at the 3rd layer of that onion… securing your end-user environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/04/it-security/it-security-is-like-an-onion-it-security-basics-part-3-end-user-security/
In Part 1 I discussed securing your network perimeter. But as I said in the beginning, IT security is like an onion. Let’s take a look at the next layer of that onion… securing your server environment. Again, this is not meant to be a complete list, but instead a starting point to help you think through your own IT security strategy. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-2-server-security/
In this day and age, every organization should have a good firewall at the perimeter of their network. There are firewalls all over the spectrum and many good options for businesses small and large. For small businesses there are great firewall units designed for the SMB market from companies like Cisco, Sonicwall, and Astaro. For medium to enterprise size organizations, or if you just want that extra capacity, there are some really fantastic devices from Cisco, Fortinet, and Astaro that should give you the functionality and flexibility you need. Regardless of the manufacturer, there are key components which are critical to your network’s security. Continue reading
Permanent link to this article: https://www.robertborges.us/2012/03/it-security/it-security-is-like-an-onion-it-security-basics-part-1-perimeter-security/