Sreeraj Nair
- ABE
- Active Directory
- Authentication Protocols
- automation
- boot into safe mode
- brontok
- Browser
- conficker
- Desktop Security
- Disk Space
- downadup
- File Server
- Financial Results
- folder options
- IBM
- infection
- Internet
- Internet Explorer
- IT Infrastructure
- Kaspersky
- Kerberos
- kido
- LM
- Logon Process
- Microsoft
- MS Office
- NTLM
- NTLMV2
- Online Security
- opensource
- Operating System
- Operating Systems
- RAID
- Redundancy
- Retail
- security vulnerability
- Services
- Shares
- Super Computers
- virus
- Watson
- Windows 7
Archives
May 2023 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 -
Recent Posts
Recent Comments
SutoCom on How to set the Default Excel V… Sreeraj Nair on WINSXS Mike on WINSXS ashish on WINSXS Vir on WINSXS kamendra chauhan on Watson Vir on Watson Kamendra chauhan on How Kerberos Works Sreeraj Nair on Windows 7 Supports RAID1 Evgenij Smirnov on Windows 7 Supports RAID1 Virsingh Rathore on Notebook Entry: Leftover of Co… Harish Kumar Sharma on Windows 7
Tag Archives: Microsoft
How to set the Default Excel Version when you have multiple versions on your server/PC
As per Microsoft, you need to install the oldest version first and the newest version last, if you intend to use multiple versions of MS Office on the same machine. There are KB articles for each version of Office that … Continue reading
How Kerberos Works
What happens at the windows logon screen between the time you press enter after entering your credentials and ‘Loading Your Personal Settings’ message appears It hardly takes a second for your password to be accepted at the logon screen but … Continue reading
Posted in IT Infrastructure
Tagged Active Directory, Authentication Protocols, Kerberos, LM, Logon Process, Microsoft, NTLM, NTLMV2
1 Comment
Notebook Entry: Leftover of Conficker/Downadup/Kido Worm
Another Leftover Story Talking about virus leftovers – I recently noticed a leftover of the Conficker worm which is used by the virus to reinfect the systems, they are scheduled tasks on windows systems. I have only noticed them on … Continue reading
Internet Explorer 8
Going beyond page loads is what Microsoft’s brand new browser, Internet Explorer 8, does (Originally posted at my previous blog address on 26 March 2009) It’s about getting things done in an faster, easier and safer manner. The idea is very novel but … Continue reading
Posted in IT Infrastructure
Tagged Browser, Internet, Internet Explorer, Microsoft, Online Security
Leave a comment