Find how long since you last restarted:
systeminfo | find "Up Time"


InfoWorld GripeLine by Ed Foster | InfoWorld | The Adobe License Manager and Acrobat | September 25, 2006 12:26 AM | By Ed Foster: "September 25, 2006

The Adobe License Manager and Acrobat
Filed under: None
Up until now, corporate customers have generally been spared having to deal with product activation and other anti-piracy technology in the software products they buy in volume. With Acrobat 8, however, Adobe is rather quietly and somewhat tentatively introducing an embedded license control technology called the Adobe License Manager.
For reasons I'm not entirely clear on myself, I seem to be the first trade press person in a position to report on the Adobe License Manager (ALM). It's not that Adobe's been keeping it a secret that it planned to introduce an asset management tool that would track Adobe volume licenses for anti-piracy purposes. For months Adobe has been openly discussing it with some customers and analysts in various venues. There is now a FAQ page on ALM on Adobe's website, and the company is beginning a customer education campaign about it this week. Which makes it all the stranger that Adobe's press materials last week announcing Acrobat 8 were silent on the subject of ALM, considering that it seems like something corporate customers interested in the new Acrobat will want to know.
Perhaps that's where the tentativeness I referred to comes in. Prior to the Acrobat announcement, Adobe made the decision that for the first year of version 8 volume license customers will be able to 'opt out' from using ALM. At deployment time - after the volume agreement has been negotiated and approved, in other words - the customer will have the option until Fall of 2007 to deploy Acrobat 8 software that does not have ALM embedded.


Outlook::Windows XP SP2::Enable RPC Polling

The Outlook Find feature and the new mail notifications do not work after you apply Windows XP Service Pack 2: "SYMPTOMS
After you apply Microsoft Windows XP Service Pack 2 (SP2) on your computer, you may notice that the following behaviors occur in Microsoft Outlook:•When you connect to a Microsoft Exchange Server-based computer and receive a new e-mail message, you are not prompted with a notification, and the new e-mail message does not automatically appear in your Inbox. If you click Send/Receive or another Outlook folder, and then you click your Inbox folder to update the Outlook message pane, any new e-mail messages that you have will appear.
•When you try to send an e-mail message in Outlook, the e-mail message may remain in your Outbox folder longer than expected. Or, there may be a delay before the e-mail message is sent."
XADM: Description of the MAPI Client Connection Polling of an Exchange Server: "This article describes the MAPI client connection polling that is performed at regular intervals by a MAPI client to verify the connection with an Exchange server"


nonadmin - DropMyRights: "DropMyRights is a tool written by Michael Howard that allows administrators to run internet-facing applications (such as email clients and web browsers) as a non-administrator. You can read about it and download it from his MSDN article
Browsing the Web and Reading E-mail Safely as an Administrator



BriForum 2006 Video: Ron Oglesby on the feasibility of running Citrix in a VM: "Video: Ron Oglesby on the feasibility of running Citrix in a VM"
Network Monitoring, Free Network monitor, Woodstone Servers Alive, POPPager the best networking tools and services: "Servers Alive is an end-to-end network monitoring tool running on Windows 2000/2003/XP. It works agentless and across operating systems. Its checks and alerts are on the cutting edge of technology. "
Toolbars are locked - Unable to customize the toolbar: "Toolbars are locked - Unable to customize toolbar and tool band
When you right-click the standard toolbar in Internet Explorer, the Customize option is missing, and the toolbar options are grayed-out as seen in the picture. This is due to the restrictions set in the registry."
Click Start, Run and type Regedit.exe.
Navigate to the following locations one by one:
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer


HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

In the right-pane, delete these two values (if exists)


XSS, Cookies, and Session ID Authentication ? Three Ingredients for a Successful Hack > The Fixes: "There are a few things that the web developers could do to help prevent these types of attacks. First, all form fields should be filtered to prevent XSS attacks. This is typically as simple as filtering just the '<' and '>' characters, but can be extended beyond that to also include '&*^%%$#@!(){}[]\|';:/?.,>'. The point is to think about what characters are actually needed. Second, a user should never be allowed to upload a file that could be executed on the server. In other words, an upload script should be limited to just those files that are necessary for business. In addition to this, I would suggest uploading files to a non-executable directory on the webserver (e.g. /home/files vs. /home/www/files)."