They are no different in my opinion to physical systems. There should
be no compelling reason to reboot just to reboot.
gt
On 25/02/2014 7:35 AM, John Matteson wrote:
I'm trying to get some straight information on doing maintenance
reboots of virtual systems. Some people I've talked to
environment: W2K8 R2 member server
errors: 1500 and a couple of others on orginal SID 500 administrator account
We use SSH which requires keys stored in the profile
Normally, when things mess up we log in with a different account, delete the
SID 500 profile and then when logging back in
Ah! Run screamingpoke yourself in the eye with a sharp
stick..its better than suggested email.
Here are just some of the reasons:
1) Email does not have a followup and reminder system (automated
notifications of approvals, escalations etc)
2) Email will flood your mailbox and
...@lists.myitforum.com] *On Behalf Of *geoff taylor
*Sent:* Tuesday, October 28, 2014 2:02 PM
*To:* ntsysadm@lists.myitforum.com
*Subject:* Re: [NTSysADM] Change Management process and documentation
Ah! Run screamingpoke yourself in the eye with a sharp
stick..its better than suggested
Management process and documentation
Sysaid is pretty epic, we use it for our help desk. Have not used it
for change management.
*From:*listsad...@lists.myitforum.com
mailto:listsad...@lists.myitforum.com
[mailto:listsad...@lists.myitforum.com] *On Behalf Of *geoff taylor
*Sent:* Tuesday, October 28
...@lists.myitforum.com] *On Behalf Of *geoff taylor
*Sent:* Tuesday, October 28, 2014 2:49 PM
*To:* ntsysadm@lists.myitforum.com mailto:ntsysadm@lists.myitforum.com
*Subject:* Re: [NTSysADM] Change Management process and documentation
As I mentioned we being poor just adapted the helpdesk
Looking for opinions on how urgent this is, and your plan of attack.
No shortage of people crying Wolf. As usual SANs is balanced and sane
recognizing the possible severe implications and yet acknowledging that
a well thought out patching approach (expedited perhaps) is the best
defense.
I am trying to determine if v 2.0 of MS14-066 is necessary to stem the
vulnerability for Win2K8R2 and Win2012. We just got the first version with
KB2992611 installed and now MS says that to have the install completed I must
also install KB3018238. Fair enough. MS screwed up and now I need to
this is Microsoft crying wolf, but a tech
bitching about having to do his job.*
**
*From:*listsad...@lists.myitforum.com
[mailto:listsad...@lists.myitforum.com] *On Behalf Of *geoff taylor
*Sent:* Sunday, November 23, 2014 10:17 AM
*To:* ntsysadm@lists.myitforum.com
*Subject:* [NTSysADM
at 12:09 PM, geoff taylor
geoff_tay...@sympatico.ca mailto:geoff_tay...@sympatico.ca wrote:
Agreed.
So your take is like mine that KB3018238 is a bug fix, and is not
required to patch the vulnerability?
gt
Date: Sun, 23 Nov 2014 08:11:44 -0800
From
query session and query user
at the command line will give you the information you need
Then simply logoff the session you want to dispose of
For the console session use PSShutdown (carefully) with the -o option
Or am i missing what it is you want to do?
gt
On 09/12/2014 9:55 AM, Jesse Rink
My experience has been pretty good with Dell being able to rebuild arrays from
the drives. you say you will run a backup, so I presume it is still working?
For critical situations like this we always create an image of each drive as a
secondary possible recovery mode. P2V or your favourite
We used Sysaid for many years, at a school and liked it so well we
bought it. The free version is restricted to a single Administrator.
https://www.sysaid.com/free-help-desk-software
On 2016-06-20 8:56 AM, Jesse Rink wrote:
Anyone have suggestions or experience with any free
Look for a Volleyball next week
On 2017-12-19 2:41 PM, Micheal Espinola Jr wrote:
It's a Christmas miracle!
--
Espi
On Tue, Dec 19, 2017 at 7:57 AM, Charles F Sullivan
> wrote:
Somebody just came in and showed us a package
Mike is correct. For more details about the individual results see this
Microsoft release:
https://support.microsoft.com/en-us/help/4074629/understanding-the-output-of-get-speculationcontrolsettings-powershell
hth
gt
On 2018-01-09 5:08 PM, Mike wrote:
For CVE-2017-5754 [rogue data cache
15 matches
Mail list logo