segunda-feira, 31 de outubro de 2011

DirectAccess Configuration - Windows 7 Demo Screencast 1 of 5

http://technet.microsoft.com/en-us/edge/video/directaccess-configuration-windows-7-demo-screencast-1-of-5

Continue lendo >>

Using Windows PowerShell 2.0 - Windows 7 Demo Screencast 3 of 5

http://technet.microsoft.com/en-us/edge/video/using-windows-powershell-20-windows-7-demo-screencast-3-of-5

Continue lendo >>

Productivity Future Vision

In 5-10 years, how will people get things done at work, at home, and on the go? Watch the new vision video.


http://www.microsoft.com/office/vision/

Continue lendo >>

quarta-feira, 26 de outubro de 2011

Windows 7 - Virtual Private Network (VPN) - Enable Incoming VPN Connections

This will show you how to configure your computer to accept VPN connection and router settings to allow Point-to-Point Tunneling Protocol (PPTP) on your Network in Windows 7.


http://www.sevenforums.com/tutorials/4517-virtual-private-network-vpn-enable-incoming-vpn-connections.html


How to setup incoming vpn connection in windows 7




Continue lendo >>

VPN Reconnect - Windows 7

DirectAccess can replace the VPN as the preferred remote access method for many organizations. However, some organizations will continue to use VPNs side-by-side with DirectAccess. Therefore, Microsoft is improving VPN usability in Windows 7 with VPN Reconnect.


http://technet.microsoft.com/pt-br/library/dd637830(WS.10).aspx

 - Remote Access Step-by-Step Guide: Deploying Remote Access with VPN Reconnect

Step-by-step instructions for setting up VPN Reconnect in a test lab with three computers:


 - About Remote Access with VPN Reconnect: http://technet.microsoft.com/en-us/library/dd637803(WS.10).aspx

 - Understanding VPN Reconnect:  

Continue lendo >>

terça-feira, 25 de outubro de 2011

DirectAccess Early Adopter's Guide - Guia para usuários iniciantes do DirectAccess


Applies To: Windows 7, Windows Server 2008 R2

Continue lendo >>

segunda-feira, 17 de outubro de 2011

Windows Security Log Events


Encyclopedia Windows Security Log Events

http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx


Download the Free Windows Security Log Quick Reference Chart

Continue lendo >>

Effective Permissions on Files and Folders

Each object has a set of effective permissions associated with it. The Effective Permissions tab of the Advanced Security Settings property page lists the permissions that would be granted to the selected group or user based solely on the permissions granted directly through group membership. If you want to find out what permissions a user or group has on an object, you can use the Effective Permissions Tool.


http://technet.microsoft.com/en-us/library/cc772184.aspx

http://technet.microsoft.com/en-us/library/cc771586.aspx

Continue lendo >>

File and Folder Permissions - Windows 7 - 70-680


 - Full Control: When applied to folders, allows the reading, writing, changing, and deletion of files and subfolders . When applied to a file, permits reading, writing, changing, and deletion of the file . Allows modification of permissions on files and folders .
 - Modify: When applied to folders, allows the reading, writing, changing, and deletion of files and subfolders . When applied to a file, permits reading, writing, changing, and deletion of the file . Does not allow the modification of permissions on files and folders .
 - Read & Execute: When applied to folders, allows the content of the folder to be accessed and executed . When applied to a file, allows the file to be accessed and executed . 
 - List Folder: Contents Can be applied only to folders, allows the contents of the folder to be viewed . 
 - Read: When applied to folders, allows content to be accessed . When applied to a file, allows the contents to be accessed . Differs from Read & Execute in that it does not  allow files to be executed .
 - Write: When applied to folders, allows adding of files and subfolders . When applied to a file, allows a user to modify, but not delete, a file .

Permission                          Included
Full Control           Full Control, Modify, Read & Execute, List Folder Contents, Read, Write                       Modify                              Modify, Read & Execute, List Folder Contents, Read, Write
Read & Execute                Read & Execute, List Folder Contents, Read
List Folder Contents          List Folder Contents
Read                                 Read 
Write                                Write 


Quick Check

1. Which additional permissions are assigned when you assign the Modify (Allow) permission?


When you assign the Modify (Allow) permission, Windows also assigns the Read & Execute (Allow), List Folder Contents (Allow), Read (Allow), and Write (Allow) permissions automatically.


2. Which permission should you assign when you want to allow a user to modify the contents of a file, but not delete that file?

The Write permission allows a user to modify the contents of a file, but not delete it.


Continue lendo >>

HomeGroup - Windows 7 - 70-680

homegroup is a group of computers on a home network that can share files and printers. Using a homegroup makes sharing easier. You can share pictures, music, videos, documents, and printers with other people in your homegroup. Other people can't change the files that you share unless you give them permission to do so. You can help protect your homegroup with a password, which you can change at any time.


http://windows.microsoft.com/en-US/windows7/help/homegroup-from-start-to-finish 


http://windows.microsoft.com/en-US/windows7/products/features/homegroup

Continue lendo >>

quinta-feira, 13 de outubro de 2011

An update to increase the maximum transfer size of USB storage devices in Windows 7 or in Windows Server 2008 R2

This article introduces a new feature that enables you to update the maximum transfer size of USB storage devices in Windows 7 or in Windows Server 2008 R2. After you install this update, you can increase the maximum transfer size from 64 kilobytes (KB) to 2 megabytes (MB) in the Usbstor.sys driver.


http://support.microsoft.com/kb/2581464

Continue lendo >>

quarta-feira, 12 de outubro de 2011

Help someone with a computer problem using Windows Remote Assistance

You can use the Windows Remote Assistance to connect to someone else's computer and help her solve a problem, even if it is not nearby.


http://windows.microsoft.com/pt-BR/windows-vista/Help-someone-with-a-computer-problem-using-Windows-Remote-Assistance


http://windows.microsoft.com/pt-BR/windows-vista/Windows-Remote-Assistance-frequently-asked-questions

Continue lendo >>

Quick Check - Remote Desktop - Windows Remote Assistance


1. What setting do you need to configure to allow Remote Desktop connections from computers running Windows XP Professional SP2?


You must configure Remote Desktop to allow connections from computers  running any version of Remote Desktop, rather than only allowing connections from computers running Remote Desktop with Network Level Authentication.


2. What protocol must be present on local computers running Windows Server 2008 if you are going to forward Windows Remote Assistance invitations using Easy Connect in a LAN environment?

The Peer Name Resolution Protocol feature must be installed on Windows Server 2008 for clients running Windows 7 on a LAN to be able to use Easy Connect.

Continue lendo >>

Managing WFAS with Netsh


To use Netsh .exe to create WFAS firewall rules, you need to be in the advfirewall firewall context . The following are some examples of using WFAS to create firewall rules:
 - To create a rule named WebServerRule that applies in the domain profile and allows inbound traffic on TCP port 80, issue the command:

netsh advfirewall firewall add rule name=”WebServerrule” profile=domain protocol=tCp dir=in localport=80 action=allow

 - To create a rule named AllowCalc that allows inbound traffic to the Calc .exe  application in all network profiles, issue the command:

 netsh advfirewall firewall add rule name=”Calc” dir=in program=”c:\windows\system32\calc.exe”

 - To create a rule named BlockFTP that blocks outbound traffic from the Ftp.exe  application, issue the command:
 netsh advfirewall firewall add rule name=”BlockFtp” dir=out program=”c:\windows\system32\ftp.exe” action=block

Continue lendo >>

Importing and Exporting Firewall Configuration - Windows 7


You can also export and import firewall policies in the same  .wfw format using the netsh advfirewall export or netsh advfirewall import commands .

Continue lendo >>

Windows Firewall with Advanced Security


Windows Firewall with Advanced Security (WFAS) allows you to create nuanced firewall rules .
For most users, the options available with Windows Firewall will be enough to keep their
computers secure .
If you are a more advanced user, however, you can use WFAS to:

 - Configure inbound and outbound rules . Windows Firewall does not allow you to create rules based on whether traffic is inbound or outbound .
 - Configure rules that apply based on protocol type and port address .
 - Configure rules that apply based on traffic that addresses specific services, rather than just specific applications .
 - Limit the scope of rules so that they apply based on traffic’s source or destination address .
 - Configure rules that allow traffic only if it is authenticated .
 - Configure connection security rules .

Continue lendo >>

Quick Check - rules for Windows Firewall (as opposed to WFAS)

On what basis can you create rules for Windows Firewall (as opposed to WFAS)?


You can create rules for Windows Firewall only for programs and Windows 7 features. You cannot create rules for Windows Firewall based on port address or service.

Continue lendo >>

Aprenda como Licenciar seu Ambiente - Learn how to license its Environment

Esta série de vídeos fornecem informações técnicas para aqueles que precisam fazer o licenciamento dos produtos Microsoft no ambiente.


http://technet.microsoft.com/pt-br/gg512812

Continue lendo >>

Microsoft Small Business Server 2011 Standard

Esta série de vídeos fornece conteúdos necessários para quem deseja implantar um servidor com o Microsoft SmallBusiness Server 2011 Standard.


http://technet.microsoft.com/pt-br/gg621146


Continue lendo >>

Aumentando a Segurança em Ambientes Microsoft - Enhancing Security in Microsoft Environments

Esta trilha fornecerá informações técnicas sobre como implementar e configurar diversas tecnologias da Microsoft para aumentar a segurança do seu Ambiente.


http://technet.microsoft.com/pt-br/hh295757


Continue lendo >>

terça-feira, 11 de outubro de 2011

System Center Configuration Manager 2007 SP2 e R3

Veja como a família de produtos System Center e principalmente o System Center Configuration Manager (SCCM) ajudará a gerenciar sua infraestrutura.


http://technet.microsoft.com/pt-br/hh264602

Continue lendo >>

segunda-feira, 10 de outubro de 2011

Automatically switch default printers between home, work, or school


Windows 7 offers the handy ability to automatically switch your laptop's default printer when it detects that you've moved from one network to another—from home to work, for example.
This feature, called location-aware printing, is only available in premium editions ofWindows 7. It's also only found on laptops and other portable devices that use a battery.
To use it, first set a printer as your default. That printer then becomes the default for the network you're connected to. Then, set Windows to change your default printer depending on where you are.

Continue lendo >>

Revista Canal System Center

Acessando algum site da Net descobri esse site http://www.canalsystemcenter.com.br/csc/index.php

Vale muito o acesso e leitura da revista. Parabéns pela iniciativa.

Em breve


Continue lendo >>

domingo, 9 de outubro de 2011

IPV6 - tips

Attention: open an elevated command prompt.
- Display the configuration of only the IPv6 interfaces on the local computer:

netsh interface ipv6 show address


- You can obtain a site ID by entering the command:

 netsh interface ipv6 show address level=verbose

 - Manually configure an IPv6 address:


netsh interface ipv6 set address "local area connection" fec0:0:0:ffee::2

 - The command to add IPv6 addresses of DNS servers is :


netsh interface ipv6 add dnsserver "local area connection" fec0:0:0:ffee::ff

 - The command to add a default gateway is Netsh interface ipv6 add route followed by the metric (the order of preference if there are multiple routes), as in this example:


 netsh interface ipv6 add route ::/0 "local area connection" fec0:0:0:ffee::1

 - Display the current contents of the destination cache:


netsh interface ipv6 show destinationcache

 - To flush the destination cache:


enter netsh interface ipv6 delete destinationcache

 - Identify the IPv6 address of your default router interface:

netsh interface ipv6 show route

 - Permit ICMPv6 traffic to pass through the firewall:


netsh advfirewall firewall add rule name=”ICMpv6” protocol=icmpv6:any,any dir=in action=allow

 - Show neighbors:

netsh interface ipv6 show neighbors













Continue lendo >>

sábado, 8 de outubro de 2011

Test your IPv6 connectivity.

Test your IPv6 connectivity.


http://test-ipv6.com.br/

Continue lendo >>

IPv6 ADDRESSING

RFC 2373

This specification defines the addressing architecture of the IP Version 6 protocol.  It includes a detailed description of the currently defined address formats for IPv6 [IPV6].

http://www.ietf.org/rfc/rfc2373.txt

RFC 2374

This document defines an IPv6 aggregatable global unicast address
   format for use in the Internet.  The address format defined in this
   document is consistent with the IPv6 Protocol [IPV6] and the "IPv6
   Addressing Architecture" [ARCH].  It is designed to facilitate
   scalable Internet routing.

http://www.ietf.org/rfc/rfc2374.txt

eXaM tIP
A global unicast address is the IPv6 equivalent of an IPv4 public unicast address, and it typically starts with a 2. A link-local IPv6 address is equivalent to an IPv4 APIPA address and it starts with fe8. A site-local IPv6 address is equivalent to an IPv4 private address and it starts with fec0. The special IPv6 addresses :: and ::1 are equivalent to the IPv4 addresses 0.0.0.0 and 127.0.0.1. Multicast IPv6 addresses start with ff. Anycast addresses are assigned only to routers and are beyond the scope of the 70-680 examination.


Links:

http://www.lacnic.net

http://www.ipv6.br/IPV6/MenuIPV6Introducao






Continue lendo >>

NETSTAT


Display current TCP/IP network connections and protocol statistics.


Syntax
   NETSTAT [options] [-p protocol] [interval]

Key
   -a   Display All connections and listening ports.
   -e   Display Ethernet statistics. (may be combined with -s)
   -n   Display addresses and port numbers in Numerical form.
   -r   Display the Routing table.
   -o   Display the Owning process ID associated with each connection.

   -b   Display the exe involved in creating each connection or listening port.*
   -v   Verbose - use in conjunction with -b, to display the sequence of
        components involved for all executables.

   -p protocol
        Show only connections for the protocol specified; 
        may be any of: TCP, UDP, TCPv6 or UDPv6.  
        If used with the -s option then the following protocols
        may also be specified: IP, IPv6, ICMP,or ICMPv6. 

   -s   Display per-protocol statistics.  By default, statistics are
        shown for IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6;
        (The v6 protocols are not available under 2k and NT4)
        The -p option may be used to display just a subset of these.

   interval     Redisplay statistics, pausing interval seconds between
                each display. (default=once only) Press CTRL+C to stop.

http://ss64.com/nt/netstat.html

Continue lendo >>

You need to add rules that enable ICMPv4 and ICMPv6 packets to pass through your firewall?


To permit ICMPv4 and enable you to ping other computers by their IPv4 addresses, enter the following in an elevated command prompt on all computers on your network:

netsh advfirewall firewall add rule name="ICMPv4" protocol=icmpv4:any,any dir=in action=allow

To permit ICMPv6 and enable you to ping other computers by their IPv6 addresses, enter the following in an elevated command prompt on all computers on your network:

netsh advfirewall firewall add rule name="ICMPv6" protocol=icmpv6:any,any dir=in action=allow



eXaM tIP
Remember that in Windows 7, you cannot ping other computers on your network by default.

Continue lendo >>

Ipconfig - Options

Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.



Syntax

ipconfig [/all] [/renew [Adapter]] [/release [Adapter]] [/flushdns] [/displaydns] [/registerdns] [/showclassid Adapter] [/setclassid Adapter [ClassID]]

Parameters

/all Displays the full TCP/IP configuration for all adapters. Without this parameter, ipconfig displays only the IP address, subnet mask, and default gateway values for each adapter. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dial-up connections.
/renew [AdapterRenews DHCP configuration for all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when you use ipconfig without parameters.
/release [AdapterSends a DHCPRELEASE message to the DHCP server to release the current DHCP configuration and discard the IP address configuration for either all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter disables TCP/IP for adapters configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when you use ipconfig without parameters.
/flushdns Flushes and resets the contents of the DNS client resolver cache. During DNS troubleshooting, you can use this procedure to discard negative cache entries from the cache, as well as any other entries that have been added dynamically.
/displaydns Displays the contents of the DNS client resolver cache, which includes both entries preloaded from the local Hosts file and any recently obtained resource records for name queries resolved by the computer. The DNS Client service uses this information to resolve frequently queried names quickly, before querying its configured DNS servers.
/registerdns Initiates manual dynamic registration for the DNS names and IP addresses that are configured at a computer. You can use this parameter to troubleshoot a failed DNS name registration or resolve a dynamic update problem between a client and the DNS server without rebooting the client computer. The DNS settings in the advanced properties of the TCP/IP protocol determine which names are registered in DNS.
/showclassid Adapter Displays the DHCP class ID for a specified adapter. To see the DHCP class ID for all adapters, use the asterisk (*) wildcard character in place ofAdapter. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically.
/setclassid Adapter [ClassIDConfigures the DHCP class ID for a specified adapter. To set the DHCP class ID for all adapters, use the asterisk (*) wildcard character in place of Adapter. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically. If a DHCP class ID is not specified, the current class ID is removed.
/?Displays help at the command prompt.

Continue lendo >>

News for IT Professionals in Office 2010 - Novidades para profissionais de TI no Office 2010


Microsoft Office 2010 provides new features and improvements that help IT administrators configure, validate, deploy, and protect their Office installations. This article describes some of the changes in these areas.
In this article:

Continue lendo >>

sexta-feira, 7 de outubro de 2011

Move datafile to different location - ORACLE

From time to time a DBA might need move an Oracle database datafile from one location to another. Reasons for this might include: I/O balancing for performance reasons, or to rectify incorrect naming standards.


http://www.orafaq.com/wiki/Move_datafile_to_different_location

More about tablespaces:

http://download.oracle.com/docs/cd/B19306_01/server.102/b14231/tspaces.htm

http://download.oracle.com/docs/cd/B19306_01/server.102/b14220/physical.htm

Books:

http://www.oracle.com/pls/db102/portal.all_books

http://www.oracle.com/pls/db111/portal.all_books


Continue lendo >>

quinta-feira, 6 de outubro de 2011

Setting an IPv4 configuration - netsh


For example, if you want to configure the Local Area Connection interface with an IPv4 address 10 .0 .0 .11, a subnet mask 255 .255 .255 .0, and a default gateway 10 .0 .0 .11, you enter the following command:

netsh interface ipv4 set address "local area connection" static 10.0.0.11 255.255.255.0
10.0.0.11

If you also wanted to set the DNS server address as 10 .0 .0 .11, you enter the following  command:

netsh interface ipv4 set dnsservers "local area connection" static 10.0.0.11


If you wanted the interface to obtain its IPv4 configuration automatically (dynamically),  you enter the following commands:

netsh interface ipv4 set address name="local area connection" source=dhcp
netsh interface ipv4 set dnsservers name="local area connection" source=dhcp

Continue lendo >>

Using ICS (Internet Connection Sharing) - works for Windows 7


How does ICS work?

First, you need one computer, called the host computer, that is connected to the Internet and that has a separate connection to the other computers on your network. You enable ICS on the Internet connection. The other computers on your network then connect to the host computer, and from there to the Internet through the host computer's shared Internet connection.

Continue lendo >>

Private Networks - The Definitive Document


This document specifies an Internet Best Current Practices for the
   Internet Community, and requests discussion and suggestions for
   improvements.  Distribution of this memo is unlimited.

http://tools.ietf.org/html/rfc1918


Continue lendo >>

Quick Check - 70-680 Exam



1. What is the binary number 00001010 11110000 10101010 01000000 in dotted
decimal notation?

10.240.170.64.

2. Are the IPv4 addresses 192.168.1.200 and 192.168.1.24 on the same subnet? Both
have a subnet mask of 255.255.255.0.


The subnet mask specifies that the final octet holds the host address. Therefore
the first three octets hold the subnet’s network address. In both cases, this is
192.168.1.0, so the computers are on the same subnet.


3. Is 10.0.0.130 a valid IPv4 address on the 10.0.0.0/25 subnet?
quick Check answers

No. The /25 subnet mask specifies 25 ones and therefore 32 – 25 = 7 zeros. Zeros
denote host address. Therefore, the host address is from 0000001 to 1111110
binary (0000000 is the network address and 111111 the broadcast address). In
decimal, this is 1 to 126. So the valid IPv4 addresses on the network are 10.0.0.1
to 10.0.0.126. 10.0.0.130 is not in this range and therefore is not valid on this
subnet. It is an address on another subnet (for example, 10.0.0.128/25).

Continue lendo >>

Supernet

supernet is an Internet Protocol (IP) network that is formed from the combination of two or more networks (or subnets) with a common Classless Inter-Domain Routing (CIDR) prefix. The new routing prefix for the combined network aggregates the prefixes of the constituent networks. It must not contain other prefixes of networks that do not lie in the same routing path. The process of forming a supernet is often called supernettingroute aggregation, or route summarization.


http://en.wikipedia.org/wiki/Supernet

http://searchnetworking.techtarget.com/definition/supernetting

http://www.youtube.com/watch?gl=BR&v=nmTafABRwgE

Continue lendo >>

Subnetting

Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic. In an Ethernet network, all nodes on a segment see all the packets transmitted by all the other nodes on that segment. Performance can be adversely affected under heavy traffic loads, due to collisions and the resulting retransmissions. A router is used to connect IP networks to minimize the amount of traffic each segment must receive.

http://www.ralphb.net/IPSubnet/index.html

http://paginas.fe.up.pt/~pro05009/l-escola/index.php?title=Subnetting

http://www.subnet-calculator.com/ 

http://www.linhadecodigo.com.br/artigo/198/Tutorial-de-TCP_IPParte-7Subnettingdivis%C3%A3o-em-subredes.aspx

Continue lendo >>

quarta-feira, 5 de outubro de 2011

Private Cloud Solution Hub

Reference Architecture for Private CloudThe Reference Architecture for Private Cloud document collection helps the IT service provider make the transformational journey to the cloud. The materials have a solid foundation in key business drivers. They provide a structured approach to making architectural decisions. The aim is to improve the quality of private cloud infrastructure design while realizing the efficiency gains possible with cloud computing.


http://technet.microsoft.com/pt-br/cloud/private-cloud

Continue lendo >>

terça-feira, 4 de outubro de 2011

Device and Resource Redirection

This article saved me a situation that a customer has a legacy system. It was necessary to print directly to the LPT1 port for Terminal Server.


http://technet.microsoft.com/en-us/library/cc725887(WS.10).aspx#

Continue lendo >>

domingo, 2 de outubro de 2011

Visão geral executiva do AppLocker do Windows 7

Este tópico faz uma introdução ao AppLocker, um novo recurso de controle de aplicativos disponível no Windows 7 que ajuda a impedir a execução de aplicativos indesejados e desconhecidos na rede de uma organização ao mesmo tempo em que oferece vantagens operacionais, de segurança e de conformidade.


http://technet.microsoft.com/pt-br/library/dd548340(WS.10).aspx

Segundo o livro para a prova 70-680 só funciona em Windows 7 Enterprise e Ultimate. Porque não no professional? (Why do not the professional?)


Demonstração do Windows 7 - AppLocker (Essa apresentação é muito pobre de detalhes - Poor details).


http://technet.microsoft.com/pt-br/windows/Video/ff729401 



Configuring AppLocker - Windows 7 Demo Screencast 4 of 5 (Rich details)



Continue lendo >>

Windows 7 instalado pelo Pendrive usando o Diskpart

Com o Skydrive todo mundo está abandonando o Pen Drive. Porém nada mais justo que dar um bom uso a elas, ainda mais quem trabalha com infra que possui N mídias para instalar OS.

http://blogandomicrosoft.wordpress.com/2011/10/02/windows-7-instalado-pelo-pendrive-usando-o-diskpart/

Continue lendo >>

Instalando o Windows 7 Pelo Pendrive com Windows 7 USB/DVD Download Tool

Imagine uma situação em que você tem um computador ou um laptop sem uma unidadeCD/DVD e você deseja instalar o Windows 7 ou o Windows 8 que está em um DVD?
O que você faria?



http://blogandomicrosoft.wordpress.com/2011/10/01/instalando-o-windows-7-pelo-pendrive-com-windows-7-usbdvd-download-tool/

Continue lendo >>

sábado, 1 de outubro de 2011

Windows XP Mode

- Resources: http://windows.microsoft.com/pt-BR/windows7/products/features/windows-xp-mode

- Download: http://www.microsoft.com/windows/virtual-pc/download.aspx

- Install and use: http://windows.microsoft.com/pt-BR/windows7/install-and-use-windows-xp-mode-in-windows-7

Continue lendo >>

Microsoft Application Compatibility Toolkit 5.6


The Microsoft Application Compatibility Toolkit (ACT) version 5.6 contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows 7®, Windows Vista®, a Windows Update, or a new version of Windows Internet Explorer® in your environment.



Continue lendo >>

Scripts para Banco Oracle?

Este site é excelente: http://www.shutdownabort.com/

Continue lendo >>

Backblaze e sua estrutura

Pra quem está fazendo seu backup on-line, no caso com a Backblaze. Veja a estrutura deles http://blog.backblaze.com/2011/09/28/sean-has-a-new-friend-his-name-is-guido/ e acompanhe o blog http://blog.backblaze.com/ .

Continue lendo >>

  ©Blog do Tiago - Todos os direitos reservados.

Template by Dicas Blogger | Topo