Exchange

If you have to enable SMTP relay in Exchange 2007 or newer, be smart about it

Relaying: The easy way, and the secure way The best way to allow unauthenticated relaying, or certainly the more secure and recommended one, is to create or use a Receive Connector dedicated for this purpose. I recommended this approach even on Exchange Server 2003/2000 — it’s not a good idea to use your Internet-exposed SMTP virtual server to allow anonymous relaying, even if restricted to specified IP addresses. (more…)

By kconway, ago
Microsoft

Internet Explorer (IE) typed URLs can be modified without clearing the history or cache

Have you ever wondered if it was possible to clear the list of URLs (addresses) that you've visted in Internet Explorer (IE) without clearing the cache?  Or what if you only want to delete certain URLs and not the entire list?  Sure, you could delete each entry one by one by selecting each one from the address bar.  But there is another way, if you're not shy when it comes to modifying your registry.  Here's how:

  1. Start Registry Editor (Regedit.exe). (more…)

By kconway, ago
News in IT

PPTP VPN Connection Fails; Known Issue with Samsung 4G LTE Hotspot (firmware)

We recently came across an issue with a client we support that uses a PPTP VPN that we setup to connect remotely to their server.  The hardware being used to establish this connection is the Samsung 4g LTE Hotspot.  When the PPTP VPN connection attempts to establish a connection with the remote server, (PPTP VPN from Windows 7 to a Windows Server 2008) fails to complete the connection.  Prior to this, the client was able to tether succesfully using the Verizon Thunderbolt or other Verizon USB Wi-Fi (more…)

By kconway, ago
Tech Tips

Enabling Shadow Copy on Windows Server 2008 R2

Enabling shadow copies on a volume can be very straightforward. Administrators have more options when it comes to recovering lost or deleted data and, in many cases, can completely avoid restoring data to disk from a backup tape device or tape library. Additionally, selected users can be given the necessary rights or privileges to restore files which they have accidentally deleted. From a performance standpoint, it is best to configure shadow copies on separate disks or fast, hardware-based RAID (more…)

By kconway, ago
Tech Tips

Handy Google Chrome Commands

Google’s Chrome browser has special commands that can show you basic browser settings and info from within the browser’s main window. This can be helpful since it presents browser information in one neat page that can easily be searched. For example, to view bookmarks, type “chrome://bookmarks” in the search or URL box. To view downloads, type “chrome://downloads”, and to view (more…)

By kconway, ago
Archive Posts