Your Results

Top 5 Knowledgebase

Install VB6 on Windows 7

After surfing around the net, I've found very little information regarding installation of VB6 on Windows 7. Most of the information out there is for Vista, and most of it is queries for assistance.

Install VB6 on Windows 10

So if you don't know it, the technical preview version of Windows 10 is available. Being the good maintenance guy, you'll want to know about installing VB6 on Windows 10. This article shows how I got it running on Microsofts latest OS.

How VPN Creates a Secure and Private Tunnel between the Users Device and the Distant Server

VPN creates a secure and private tunnel between the user’s device and the distant server which is connected to Internet, thus securing your outgoing and incoming data from interception and snooping. The tool was majorly used by employees to access remotely their company network through a secure channel. Now, this tool can be used by anyone for securing their private network or a coffee shop connection etc.

Troubleshooting DNS with NSLookup and dig

To be proficient at troubleshooting name server problems, you'll need a special tool to make DNS queries, one that gives you complete control. We'll cover nslookup in this tutorial because it's distributed with Windows Server 2003 and with many other operating systems. We'll also cover another query tool, dig, that isn't part of Windows. It provides similar functionality and doesn't suffer from nslookup's deficiencies.

Giant Windows Registry Hacks List

Looking to change the behavior of your Windows 7 computer? Maybe you need to enable or disable some functionality, make it run faster, lock it down from prying eyes? This post contains a pile of great registry hacks.

Click Here for full result set

Five Latest Forum Posts

When setting up a certificate authority ...

Make sure you have your CDP paths set up correctly.

Outage Today

Due to a DDoS attack against 1and1 DNS servers, was unavailable for a few hours today. My apologies for any inconvenience this may have caused.

Files attempted to access

Just an FYI: the following path/filenames are targeted by folks attempt to exploit certain vulnerabilities in particular applications or plugins. Things like WordPress, FCKEditor, and others.

List of Shady Characters

This is a list compiled from the last 90 days of data, showing the IP addresses and hostnames of computers on the internet who:

Security Measures

I've had to add a Captcha field to the NSLookup. Sorry about that

Click Here to go to the forums

Top 5 Links

Dual booting Windows Server 2008 R2 with Windows 7 using VHD booting

Steps to move a DHCP database from a Windows Server 2003 or 2008 to another Windows Server 2008 machine

Setup IIS on Server Core Windows Server 2008 R2

Install and Configure IIS 7 on Server Core

IIS Manager - Connect to Another Server

Click Here to browse the links section

Top 5 Questions

VLAN Trunking allowed vlan issue


Click Here to see the full list of results

Code Links