Enable Multiple Concurrent RDP Sessions in Windows 8

Posted on April 16, 2015 · Posted in Windows 8
Windows 8.1 enable multiple rdp connections

In Windows 8 and 8.1, like in previous Microsoft client OS versions, only one simultaneous incoming RDP connection is supported. It means that only one user (one session) can simultaneously connect to a Windows 8 computer using the Remote Desktop. In most cases it is enough, but sometimes it would.. read more

How to Remove an Inactive NFS Datastore on VMWare ESXi Host

Posted on April 15, 2015 · Posted in VMWare
Inactive NFS Datastore on VMWare ESXi

Several times I have come across the situation when the NFS datastore on the VMWare ESXi host becomes unavailable / inactive and greyed out in the host’s storage list. However, the NFS storage stays available on the network level. Usually, it can be solved by removing the NFS storage and.. read more

How to Increase Maximum Attachment Size Limit in Outlook

Posted on March 31, 2015 · Posted in MS Office
Increase max attachment size Outlook 2013

There is a 20 MB limit on the maximum attachment size in Outlook mail client (including the latest 2010 / 2013 versions). It doesn’t matter if a single large file or several small ones are attached — the total attachment size would not exceed 20 MB.

Windows Server 2012 R2 Licensing and Virtualization

Posted on March 24, 2015 · Posted in Windows Server 2012 R2
win-srv-licensing-virtualization

In this article we’ll consider licensing peculiarities of the new generation of server OS family — Windows Server 2012 R2 when using the new model of the dual-processor licensing. Also, we’ll tell about the rules and order of licensing to use virtual machines as a guest OS with the support.. read more

How to Move and Truncate Logs in Exchange 2013

Posted on March 18, 2015 · Posted in Exchange
Move database and logs to another disk in Echange 2013

After Exchange deployment, it turns out that in spite all requirements to the amount of free space for Exchange Server have been met, it is inevitably reducing… When trying to deal with it, we realize that different logs grow faster than we could expect. What can we do with them?.. read more

Port Forwarding in Windows

Posted on March 13, 2015 · Posted in Windows 7
Display all port forward rules

In Microsoft Windows, starting from Windows XP, there is a built-in ability to set up network ports forwarding (port forwarding). Due to it, any connection coming to any port can be forwarded to another local port or even to port on remote computer. Not necessarily that the system has a.. read more

SMB 1.0 Support in Windows Server 2012 R2

Posted on March 11, 2015 · Posted in Windows Server 2012 R2
Windows Server 2012 R2 support only smb 2 driver

A new version of SMB 3 protocol was presented in Windows Server 2012 R2 (technically, it is SMB 3.02,  since SMB 3.0 appeared in Windows Server 2012), the driver of the outdated SMB 1.0 is now disabled and its components are not loaded. Since SMB 1.0 is not supported, the.. read more

How to Restore Default Fonts in Windows 8.1

Posted on March 4, 2015 · Posted in Windows 8
Windows 8 broken fonts

If you accidentally delete or replace one or more system default fonts in Windows 8.1 / 8 you can try to restore them. The issue of missing fonts can manifest itself as follows: in system dialog boxes (and some other windows) instead of normal symbols something strange or unreadable symbols.. read more

Windows Protection Against Vulnerabilities in SSL v3

Posted on February 24, 2015 · Posted in Windows Server 2012 R2
IIS Crypto

In October 2014, Google engineers reported a critical vulnerability in SSL v3.0 that had obtained a funny codename POODLE (Padding Oracle On Downgraded Legacy Encryption). This vulnerability allows a hacker to get access to the information encrypted with SSLv3 using a “man in the middle” attack. Vulnerability affects both the.. read more

Configure Spam Protection in Exchange 2013 – RBL Providers

Posted on February 20, 2015 · Posted in Exchange
Install Connection Filtering agent on Exchange Server 2013

In this article we’ll talk about the peculiarities of functioning and setting RBL filters in Exchange 2013. Let’s remember what RBL is. RBL (Realtime Blackhole List) is a service that stores the database of IP addresses of mail servers detected as spammers. RBL is the most often accessed over DNS.. read more