Author Archives: ~ Kam

Life Saver : Useful Image tools

By | 21 May, 2014

It’s not image editing tools that we talk about. It’s more to virtual environment (image). Virtual CD/DVD that we talking about. There are a lot of useful tool out there as life saver for admin. But for me below is the tools that I use for save my life!! Here are the list : 1)… Read More »

Telnet SMTP

By | 6 March, 2014

When using SMTP, we need to ensure either our application having issue or SMTP is the issue. For this purpose of testing, we use telnet as a simple tools to test SMTP. For those who are using anonymous SMTP, then below is the step by step to test : 1) telnet mail.test.com 25 2) EHLO… Read More »

Sender Policy Framework (SPF)

By | 29 October, 2013

Sender Policy Framework (SPF) is an email validation system designed to prevent email spam by verifying sender IP addresses. Sender Policy Framework allows administrators to specify which hosts are allowed to send mail from a given domain. Sender Policy Framework published by Internet Engineering Task Force (IETF) in RFC 4408. How Sender Policy Framework works… Read More »

Port.. how to check what application used?

By | 24 October, 2013

Port … It’s is important to know what port are currently used by your application. For who still don’t know what port it is, you can read at my article here . In this scenario, we will use default tools in Windows to perform the checking. We will use : 1) Netstat 2) Task Manager… Read More »

What is port?

By | 24 October, 2013

What is port? Port is important for application as a ‘door’ to access the application. Any network related application will assign one port to allow incoming or outgoing data. Port range from 1 – 65535 (port no 0 is reserved and can’t be used).The port numbers are divided into three ranges: 1) well-known ports (0… Read More »

Add new replica existing public folder

By | 9 October, 2013

Public folders, introduced in the first version of Microsoft Exchange, are designed for shared access and provide an easy and effective way to collect, organize, and share information with other people in your workgroup or organization. Public folders are hierarchically organized, stored in dedicated databases, and can be replicated between servers running Exchange. Below is… Read More »

Configure the Kerberos for SCSM 2012

By | 16 May, 2013

SCSM 2012 use the Kerberos protocol to authenticate clients and servers and encrypt data inside of communication channel. The of main concept of the Kerberos protocol regarding Windows services is a Service Principal Names (SPN) records. If your SPN records absent or configured for wrong account\service name then you can except what some function will… Read More »

Windows 2003 Service Pack Installation Log

By | 16 May, 2013

Windows 2003 Service Pack installation log is very important to find the issue when the installation failed. For example, when updating Windows 2003 service pack, we encounter failed update due to access denied. So, how to check further with this issue? Investigate Windows 2003 Service Pack Installation log When running a standalone Windows 2003 Service Pack installation,… Read More »

Send Quota Limit Change

By | 21 November, 2012

I came across this problem recently… A user had hit their Send Quota limit on their mailbox and was unable to send any emails (and refused to clean up their mailbox). So being the nice sys admin I am I upped their send limit and sent them away with the standard give that 15 mins,… Read More »

Usefull powershell command use in SCR

By | 8 November, 2012

Below is the useful collection of powershell command use in SCR environment. This command is tested on Microsoft Exchange 2007 SP1. 1) Check replication status 2) Enable SCR for storage group 3) Disable SCR for storage group 4) Suspend SCR for storage group 5) Resume SCR for storage group 6) View setting for StandbyMachine