Determine IP Address From a MAC Address

by File in: Featured Posts, How-To

Ever had to reverse lookup an IP address? Kind of like looking up a home address using a phone number? If you’re in IT, you might come across the occasional situation where you have a MAC address, but need to figure out what the IP address is. There are a couple of ways you can […]

Fix Generic Host Process for Win32 Services Has Encountered a Problem

by File in: Fixes

Last week, I turned on my computer running Windows XP and got the following error message when I would boot up the computer: generic host process for win32 services has encountered a problem This error can occur in different situations depending on the computer. For instance, you may see this message whenever you start your […]

Configure Message Size Limits in Exchange 2010

by File in: Exchange

If you’re running Exchange 2010 at your office, you may have noticed that the default incoming and outgoing message size limit  is 10,240 KB or 10 MB. These days, however, there are many attachments that far exceed this size. If you want to increase the maximum receive size and the maximum send size for emails, […]

Determining When a Local Windows Account Password was Last Changed

by File in: How-To

Our corporate policy requires us to change Windows server local Administrator passwords on a regular basis.  We have a script that accomplishes this, and after the change we do a QA check to validate the passwords were actually changed. To determine when a local account password was last set (administrator, in this example) , run […]

Counting the Number of Files in a Directory, Command Line Style

by File in: Script

Recently, I needed to count the number of files in a directory on a Windows server. Here’s the command that can easily be scripted. It can also be used on Windows client machines running Windows 10, etc. dir/b/a-d c:\directory | find /v /c “::” You can also specify a file share instead of a directory name: […]

AD Message: Object is a container and contains other objects. Are you sure you want to delete object and the objects it contains

by File in: Active Directory

I received the following message today when trying to delete a computer object from Active Directory: Object %COMPUTERNAME% is a container and contains other objects. Are you sure you want to delete object %COMPUTERNAME% and the objects it contains? This operation could take a long time if  %COMPUTERNAME% contains a large number of objects. To determine which sub-objects this […]

Script to Remotely List Windows Local Administrator Group Membership

by File in: Script

The following script can be run against remote Windows machines, and will enumerate the contents of the remote server’s local administrators group. It requires Sysinternals PSExec utility, and must be run with administrative credentials.  Set the four paths to the correct locations for your workstation. REM set path to PSexec on machine the script is […]

Fix: SQL Configuration Manager Connection to target machine could not be made in a timely fashion

by File in: Fixes

Things didn’t go too smoothly yesterday when I was trying to reconfigure our SQL 2005 cluster and it’s database locations.  At one point, I couldn’t even get SQL Configuration Manager to start up.  At various times I received both of the following errors. The request failed or the service did not respond in a timely […]

How to Automatically Change the CD-ROM Drive Letter After Running Sysprep

by File in: How-To

I’m finalizing a Windows 2003 R2 build that will become our gold image, which will be the source of all new server deployments within our organization.  One challenge I had to overcome was getting the CD-ROM/DVD drive to be set to drive Z: after the syspreped image is cloned and booted. Many people are familiar with changing […]

Network Card configuration Missing after P2V using VMware Converter

by File in: Virtualization

Last night I converted a physical Windows 2003 R2 server to a VMware virtual machine using VMware Converter Standalone version 4.0.1.  The entire process was extremely simple, only four steps.  After the P2V conversion completed, the physical machine powered off, and the newly created VM booted up.  Everything appeared to be normal, until I realized […]