Tag Archives: IT Support
We have over 10 years of experience implementing, maintaining and supporting affordable IT solutions for Charities and non-profit organisations.
Social networking has become the most popular form of communication which has led to a modern version of Word of Mouth marketing. More and more people are choosing products/services based on what their friends “like” rather than opting to go for a “random” company they have found in the yellow pages or in a traditional advert.
To control printers through Windows 2008 & Group Policy in an XP client environment. 1. Download and install Group Policy Preference Client Side Extensions for Windows XP (KB943729) or/and Vista.
Usual course is to enable network discovery, in networking. In some instances you may enable network discovery and the change do not hold.
If your Exchange information store fails to mount due to corrupt or other errors, use the inbuilt eseutil and Isinteg tools, found in c:\program files\exchsrvr\bin\. Prior to running the eseutil, ensure you have enough disk free space on the said drive equivilent to the size of of your priv1.edb and priv1.stm. If not enough space is available copy the \bin folder to a drive with space and run the tools from this drive, the temp files will then be created here.
Microsoft Volume Shadow Copies protect against accidential deletion of files Microsoft Shadow Copies is a function on Windows 2003 & 2008 Servers, which gives users quick access to deleted, corrupt or previous versions of files. It can also give administrators a quick and easy method to roll back to previous versions of simple flat file ‘database’ applications. Be aware Shadow Copy will not protect complex database applications such as SQL, Exchange and the like.