Specifying a driver, for redirected printers
I guess I've not come across this before as most of the printers we deploy use the same driver name for client side and server side drivers, but it appears that you can force a Terminal Server to use a certain driver, in place of what the client is telling the server.
KB239088details the process. I found that the wizard wasn't much use at all - but it's not like the process is particularly complicated.
Farewell LUGRadio?
Given it's all over the forums and it's now the end of day after the release of the episode: “LUGRadio will be finishing after LUGRadio Live UK 2008” (so that's basically 2 remaining episodes, including LRL)!
There are various reasons for this, and if you're not already aware of them I'd suggest listening to S5E21yourself. To have a hovis moment, I discovered LUGRadio at the start of season 2, which culminated in LRL 2005.
Linux on Hyper-V
Unless you've been living in a hole for the past few days, or you're seriously anti-Windows or simply not into your virtualisation at all, you're probably aware that Hyper-V, the replacement for Virtual Server 2005, has gone “gold” (RTM).
There's all sorts of news on this, but little in the way of unix and unix-like related info on the web. Despite having 2 customers with it at work, I've not had the opportunity to try any of the unix-like systems on it either.
Black Windows logon screen?
We had a good one at work the other day. One of our customer's terminal servers, from their load balanced cluster, had run out of diskspace on C:, due to a rogue update of some bespoke software and a lack of quotas. This is something which was missed from the config, but we or the customer never noticed, as we're pretty good at monitoring this stuff and resolving the issue before it causes trouble.
Exchange 2007 transport rules
Transport rules are a new thing for Exchange, in it's latest incarnation (Exchange 2007), and it allows for some pretty interesting configuration and behaviour when a mail is in transit. If you're familiar with earlier versions of Exchange it's probably best to compare them to Event Sinks, only that they're much more friendly.
If you don't know what that means then a more apt description would be simple to create rules, that allow you to do anything from append text to the bottom of an email, to apply filters on messages between both internal and external users.
ZFS - Making file systems sexy again?
Ok, so maybe not again. After all there's not much you can get that happy about when it comes to filesystems these days - a lot of the really exciting stuff has been done so far.
Like Resier[3|4], ZFS is one I'd heard about, did some research on but never considered using at all. The fact that it currently only runs on Solaris or via FUSE under Linux (which in itself can be considered to be a benefit, as the filesystem is recoverable and separate from the kernel - performance supposedly sucks though), had kind of put me off a bit.
In Bath? Not disabling your Bluetooth when you don't need it? You may have been under surveillance..
I was going to go with “technologically raped”, but that's a bit sensationalist. Granted I'm probably going a bit over the top, but it looks like some researchers from the University of Bath, my home town, were let loose with various bluetooth tools and equipment. The aim of their research was to do some basic modelling and proof of concept work - mapping interactions, using bluetooth.
Astonishingly they captured 10,000 unique devices (supposedly) over 6 months, from various locations.
Automagically configuring Wyse thin clients running “blazer”
It's probably no secret to some people who read this that I do a fair bit of work with terminal servers and thin clients (dumb, low power machines that connect to a terminal or citrix server). However, most deployments I've been involved with at work at relatively small, our largest of which has recently gone up to a load balanced set of 5 Windows Terminal Servers, a few weekends ago.
MS ISA Server 2004 to Draytek Vigor 2800 IPSec Tunnel
A few weeks ago I had to setup my first IPSec tunnel between ISA 2004 and a non-Windows device, in this case a Draytek Vigor 2800, to create a site-to-site VPN. I had a few things that I hit on the Draytek which stumped me for a little bit (although probably could've been resolved much more quickly had I been more familiar with a Draytek Vigor I fear).
First thing I did was to head into the ISA console and setup an IPSec tunnel, using almost all of the defaults (this is important as the settings for the Draytek must match the ISA/Windows defaults).
Alternative sensors to aid intrusion detection
Lenny Zeltser wrote a few days ago, on the ISC handlers diary,about alternative sensors to aid intrusion detection on mobile devices, based on research by Grant Jacoby. Without wanting to ruin the content of the article (and it is worth at least a quick read over), it certainly made me think about just what could also be used in small-medium scale deployments and infrastructures; the number of physical entry attempts to a shared remote site/rack, for instance.