The ease, convenience, and speediness of e-mail has resulted in a massive quantity of these messages making their way through the tubes each day. In order to get yours noticed, you need to follow some simple guidelines that will make this means of communication efficient and understandable. Just because e-mail is similar to Instant Messaging and is the same medium used to talk … [Read more...]
Adobe’s Customization Wizard for creating transforms
If you're deploying Adobe Acrobat or Adobe Reader through Group Policy, there is one tool you need to know about. Adobe's Customization Wizard allows you to create a transform (modifies the installation of software when it is deployed) that will configure many elements of the Acrobat and Reader products. This 4.5 MB download allows you to enter the serial number, … [Read more...]
ThreatExpert
The ThreatExpert site has a few components that might be of some interest to those curious about malicious computer threats. Their blog is very good at explaining new forms of threats like click-jacking, flash exploits, and cracking attempts. Along with all the articles on their blog, they also host a "dictionary" of malicious threats so that you can look up everything from … [Read more...]
User Profile Hive Cleanup Service – Fixing log off problems
If you're frequently seeing a lot of warnings in your Application event log with this error message: "Windows saved user [user name] registry while an application or service was still using the registry during log off. The memory used by the user's registry has not been freed. The registry will be unloaded when it is no longer in use. This is often caused by services running as … [Read more...]
Unlocker – Trace ‘in use’ files to the process
If upon trying to delete, move, or open a file you get an error message about it being in use, you can try to close programs and kill processes that you think are using the file. "Cannot delete file: It is being used by another person or program. Close any programs that might be using the file and try again." You can use Process Explorer to track down the process, but an even … [Read more...]