Category Archives: Computing

DPM and disk volumes

If you make use of Microsoft DPM for disk-based backups, you may find yourself wanting to identify which data sources are protected on the logical volumes on the disks in your storage pool. If you open the Disk Management snap-in, you’ll see something like this: You can open the properties for the volume from the […]

Exchange and mailbox move requests

Came across an odd one today. I had a mailbox move request queued in Exchange: the mailbox was moving from one database on one server, to another database on another server. The move was local: no cross-domain migration or anything funky, just a straight-forward move to balance load across mailbox databases. The job had been […]

IIS and large file uploads

So you have IIS installed and your nice website is up and running, just ready and waiting for users. There’s just one problem… Whenever anyone submits a file upload they get a 404 error page… Which is a bit odd, because the pages are all there. And after a bit of testing, you spot that […]

File auditing

Suppose you want to find out which user account last modified a file. Why would you want to do that? Well, in cases where a user’s account has been compromised to run a crypto virus, or someone has done something malicious, administrators might need to be able to check which user account last made a […]

Moving your DPM Database

Microsoft Data Protection Manager (DPM) is part of the System Center suite of applications, and is Microsoft’s offering in the enterprise backup space. Like a lot of System Center applications, its designed to be installed, configured and largely left to its own devices. So what happens if you want to do something like move your […]

Website security

It seems strange to me that web servers don’t offer the highest levels of security they can by default, only stepping down to lower levels of security if the connecting client doesn’t support it. Obviously if the server is running on an older platform, such as Windows Server 2003, they may not support newer security […]

Public Folders

Public Folders are the bane of every Exchange administrator. They’re quite nice to have, from the point of view of a user, at least, but keeping control of them can be a serious pain. It would be so much easier if these things could be just picked up and lifted straight from Exchange and dumped […]

SQL Server database backup times

It seems to be a common issue for those in charge of databases. How to check when a database was last backed up. Well, you could always check the location of the backup files (if using SQL Agent jobs to create flat-file backups) or check the recovery points available in your backup software (such as […]

Making your websites more secure

Most web administrators will be familiar with the concept of certificates. Essentially, these are digital ID tags that clients and servers use to ensure the identity of communication partners, as well as the integrity of transmitted data. They are also responsible for the cryptographic exchanges which form the backbone of our secure digital communications. Most […]

Heartbleed

You may have heard quite a bit in the news recently about a security issue with something called OpenSSL: the exploit has been rather dramatically referred to as Heartbleed. So what is OpenSSL, and what is “Heartbleed”, exactly? OpenSSL is an open source – that is freely downloadable – security suite for providing security and […]