How to determine why a user has failed to logon
By looking at the Security Event Log, and Event ID 529 In the above example, the user tried to logon to the computer while it was disconnected from the network. …
By looking at the Security Event Log, and Event ID 529 In the above example, the user tried to logon to the computer while it was disconnected from the network. …
You might have heard of the five stages of grief. It’s a model devised by Elisabeth Kübler-Ross. It doesn’t apply in all instances of loss and grief, but it’s a…
“Grief, I think, is not something you get over. I think, instead it’s something you travel through. And now I’ve travelled to the other side, I won’t forget the journey.”…
I’m currently doing another deployment of Acrobat Reader, this time with VBScript. I wrote about using Visual Basic to do that here. Function CheckForPro ' returns TRUE if Acrobat…
You might have seen this cartoon here before, but it’s worth repeating, as it’s that time of month. Some organisations require passwords that are longer than the 12 digit codes…
Back in October 2006, I wrote that I used Copernic and Google Desktop. Search Time has moved on and now I use Agent Ransack. Google stopped supporting Desktop Search in…
I've never owned a phone case/cover with an "Owner's Guide", so the Griffin Survivor + Catalyst Waterproof (GSC) case is a first for me. The folks over at MobileZap were…
I was looking though some OH&S training notes, and this explanation of how Australian Standards are used with OH&S laws in Victoria, seems quite useful: Australian standards outline the minimum…
I’m getting ready to deploy Office 2010 Service Pack 2 out to my customers desktop fleet. I’m going to journal the list of problems I find along the way. Issue…
It was time to replace my iPhone 4s, with the newer iPhone 5s. The sales chap at Telstra had a Nixon Carded case. The beauty of the Carded case is…