Netmask Cheat Sheet

  Netmask Netmask (binary) CIDR Notes 255.255.255.255 11111111.11111111.11111111.11111111 /32 Host (single addr) 255.255.255.254 11111111.11111111.11111111.11111110 /31 Unuseable 255.255.255.252 11111111.11111111.11111111.11111100 /30 2 useable 255.255.255.248 11111111.11111111.11111111.11111000 /29 6 useable 255.255.255.240 11111111.11111111.11111111.11110000 /28 14 useable 255.255.255.224 11111111.11111111.11111111.11100000 /27 30 useable 255.255.255.192 11111111.11111111.11111111.11000000 /26 62 useable 255.255.255.128 11111111.11111111.11111111.10000000 /25 126 useable 255.255.255.0 11111111.11111111.11111111.00000000 /24 “Class C” 254 useable 255.255.254.0 11111111.11111111.11111110.00000000 /23 2 Class C’s 255.255.252.0 11111111.11111111.11111100.00000000 /22 4 Class C’s 255.255.248.0 11111111.11111111.11111000.00000000 /21 8 Class C’s 255.255.240.0 11111111.11111111.11110000.00000000 /20 16 Class C’s 255.255.224.0 11111111.11111111.11100000.00000000 /19 32 Class C’s 255.255.192.0 11111111.11111111.11000000.00000000 /18 64 Class C’s 255.255.128.0 11111111.11111111.10000000.00000000 /17 128 Class C’s 255.255.0.0 11111111.11111111.00000000.00000000 /16 “Class B”

Continue reading »

Vendor Acquisitions and Partnerships

Sometimes you just lose it these days. Who’s who and why or when. So I made, actually for myself, a diagram of vendors that come across my path. For starters, I hope it is at least a correct diagram and second I would like to keep it up to date when new info arrives. So feel free If you miss some important alliances to fill them up. Who’s Next? Offcourse It immediatly raises some questions. One of the most important questions (in this diagram) now is who is going to buy CITRIX? Is it going to be Oracle as it

Continue reading »

remote install of DPM 2010 agents

CASE: sometimes the deploy of DPM 2010 agents just failes. Most of the time it is just because the default firewall (of W2K8) doesn’t allow you to.do it. SOLUTION: you can do the installation manually but that implies you need to log on to every server. However; a lazy engineer is a good engineer so we will try to do this remote (from the DPMserver). PREPARATION: 1) on the DPM server, share your agents folder as \\DPMserver\DPMAgents (C:\Program Files\Microsoft DPM\DPM\ProtectionAgents\RA\3.0.7696.0). 2) install Sysinternals Suite (LINK) to C:\Windows\System32. Add the path to your system variables; go to Properties option in MyComputer,

Continue reading »

Disk cleanup via Scheduled Tasks for Server 2008

CASE: for basic maintenance such as disk defragmentation and disk cleanup we want to use Scheduled Tasks. Enable Disk Cleanup (not there by default): 1) Disk Cleanup for Server 2008: go to “Server Manager” – “Features” – “Add Features” 2) Select “Desktop Experience” 3) Reboot Server Create settings for disk cleanup: 1) go to start CMD (run as administrator) 2) create a registry key with your settings: C:> cleanmgr.exe /sageset:n (n – select a number) 3) check all options Create Scheduled task: 1) go to “Task Scheduler“ 2) go to menu “action” and select “create basic task“ 3) set name

Continue reading »

set ACTIVE USER to AutoAccept Meeting Requests when offline

CASE: we needed a resource that could be reserved for LiveMeetings (Microsoft Roundtable). This user also needed to be ACTIVE because the system will be provided with a mini-pc that is configured to automaticaly boot with that user and log on to Outlook Calendar. ISSUE: An active user cannot AutoAccept Meeting Requests when Offline. this would have the consequence that only when user is active, it will reply all pending meeting requests. BEWARE: UNSUPPORTED METHOD !!! 1) Change mailbox to an equipment type: set-mailbox -Identity “Mailbox Name” -Type Equipment 2) Change Access Rights on that mailbox for a different user:

Continue reading »

How to deploy the settings of your Wireless Network

CASE: when you have a Wireless Network in your environment you will have to deploy the settings of it to all notebooks. One of the most common known ways to do this is through Group Policy Objects (GPO) – (TECHNET: http://tinyurl.com/njqoc3 ). But there are some reasons why this is not the easiest way. One of them is that you can not provide your deploy with a static pre-shared key (WPAPSK). So we had to find another way. Solution: as for many solutions we found it in a command line tool: “NETSH WLAN” . This tool is actually the CLI

Continue reading »