Categories
How-To Software Technical

Problem Steps Recorder

A quick pffffft: The Problem Step Recorder (PSR) is a little known feature of Windows 7 which allows you to record your desktop along with applications and activities so you can later show someone such as a tech support person or even give a demo on how to use something in Windows.  This is very […]

Categories
News Software Technical

Microsoft iSCSI Software Target 3.3

The Microsoft iSCSI Software Target 3.3 provides storage (disks) over a TCP/IP network. It turns a computer running Windows Server into a storage device which provides shared block storage. You can use Microsoft iSCSI Software Target 3.3 to perform a variety of storage-related tasks, including the following: Provide shared storage for Hyper-V to enable high […]

Categories
How-To Software Technical

VHD! Booting Windows 8

Why wipe your system clean to preview Windows 8 developer preview when you can simply use the good old VHD to boot it up on your system. Here is the quickest method to do this.  <Warning — This is GEEK / not GREEK > Boot from the Win8dev DVD or USB When in setup the […]

Categories
News Personal Software

Windows 8

The folks at Microsoft made available a developer preview edition of Windows 8, which permits us to get a good hands on the new windows to operating system.    After some testing and attempts to get this to install on VMware products such as ESX and VMware Workstation 7 / Player I was able to test […]

Categories
How-To Software Technical

Install Updates on an EWF-Protected Image | Windows Thin PC

To update a run-time image that is protected by EWF RAM mode Use EWF Manager to disable the overlay by typing the following command:ewfmgr c: -disable Restart the system. Install the application or update. Wait for the install to complete and restart the computer if required. Re-enable the EWF overlay by using the following command:ewfmgr […]

Categories
News Software

Morto Worm Spreading via Remote Desktop Protocol

A new Internet worm has been reported that spreads via Microsoft’s Remote Desk Protocol (RDP). This worm scans an infected host’s subnet for other hosts running RDP and attempts access to them using a pre-configured set of user names (including “administrator”) and passwords. According to Microsoft, this worm can be remotely controlled and updated, such […]