Windows Key Management Server or KMS as it is known is normally a very simple affair. You install the KMS server, the servers find KMS server via DNS and everything works. Most of the time…. I have read that sometimes when cloning is used the process does not go as smoothly. Recently I ran …
Hp wants you to remember this infographic, it will change the way you look at computer architecture…Over the years, we have see hints at the future of computing, but HP has just taken a big, big step toward bringing them all together. The company has unveiled The Machine (code name, or commercial product name?), a processing architecture designed …
I went to download TrueCrypt today and was greeted with this warning on the official site to download truecrypt: http://truecrypt.sourceforge.net/ WARNING: Using TrueCrypt is not secure as it may contain unfixed security issuesThis page exists only to help migrate existing data encrypted by TrueCrypt.The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of …
I recently became interested in using x-ray searches on linkedin to find people i am not connected with. Here is an example of a search for orange county area Citrix people you can read more here, it is rather intriguing what you can do with google… Using X-Ray Vision to Improve Your LinkedIn Searches I …
I recently had some issues logging into our netscaler appliances after a java update and decided to fix the issue instead of rolling back Java (frankly I am weary of Java and hope that Citrix wakes up and makes the admin HTML5 and ditches Java completely) The fix I used was found in the …
If you ever wondered how your SSL security stacks up, but were lacking the expertise or time to dive into this, I recommend you use the following tool to grade your servers SSL security: Qualys SSLlabs “scan your server” tool. Don’t let this happen to you If your server runs IIS for the web server …
HeartBleed The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual …
Found this today: If you use a Citrix Netscaler appliance for load balancing and you need to log the client ip address on IIS 7x, follow this article to capture this like you would with an ISAPI filter on windows 2003 / IIS6. http://support.citrix.com/article/CTX125526
I get this request from time to time, and usually start with this when taking on a new client with Citrix XenApp 6.5. Documenting the current state. This helps me understand what I am going to be taking on, and compare and contrast the configuration over time. In the old days different scripts using mfcom …
Ran across this issue today, User had unresponsive session in Citrx, support had tried to log off the user, or reset the session from appcenter. The session would appear to be gone, but reappear after a refresh. After digging a bit, we did not see a session on remote desktop manager, nor did it appear …