How to troubleshoot problems with the startup of Windows Event Log service
Instructions on how to remove the BetterSurf (aka WebCake, Media View, Media Playear adware).
Kerberos error codes as per RFC 4120.
Kerberos Ticket Options
This short article describes how to convert a negative error code to its hex equivalent
A paper outlining best practices for responding to security incidents. Recommended reading for anyone who will be handling security incidents.
Recommendations in implementing a security event log monitoring.
If you work with computers, in many occasions you have heard about binary, decimal and hex numbers. This article provides a description of these numbering systems in layman terms as well as how to convert them using the "Calculator" application that ships with Windows.
Most probably you have used Auditing policies set via the group policies. Do you know what do they mean and how to configure them?
TCP/IP protocol is now de facto standard for almost any organization. Network administrators need to manage the allocation of various IP subnets used within their organization. This document provides a summary of our methodology in dealing with this issue as well as an Excel spreadsheet template that we recommend to our customers.
A description of the ticket options field that appear in certain Windows security event logs
A list of logon processes that appear in Windows security event logs
A description of various Windows authentication packages that are listed in security event logs
Many Windows security events contain a field indicating the "logon type". This article explains what those numbers mean.
A template that can be used by network support people in their troubleshooting process and interaction with their customers
Ethernet terms like Half-duplex or questions like "Is 100 Mbs ten times faster than 10 Mbs?" are given oversimplified descriptions or answers as their intention is to give somebody
an "idea" on what these terms mean by using comparisons with "non-technical"
Information about event sources and how to obtain more information about them.
A short description of the most common types of errors encountered in the IT world.
As a firewall or VPN administrator, one may use the term "DES" or "3DES" daily. Cryptographers surely know what's behind it and Senior Security Consultants understand the principle. But have you ever wondered just how are the bits (1s and 0s) manipulated during the DES encryption? Just how are they moved around? Well, this article is just an attempt to provide a simple example of such encryption process.
A review of responsibilities taken by firewall administrators
This article describes the process of unlinking vs. deleting a Windows 2000 Group Policy.
Information about obtaining fixes listed on various Microsoft Q articles.
7 Principles On Troubleshooting Like A Pro
Obtain additional information about Windows NT/2000 network error codes
A discussion about the Security 677 Failure Audit Events.
Description of NT/2000 event logs and event types
Why do you see "The description for Event ID (....) in Source (...) could not be found." as event description and how to fix that.
How are the event log entries structured
Learn to use the proper keywords when searching the Internet