Setting up a VPN or Virtual Private Network on Windows using PPTP protocol

With this, What we will achieve is, from a physically separate location to our company's LAN, house… connect to it and see all the computers on the network. It is a free connection that we will use once we are already connected to the Internet. You need to have these ports open and mapped against the routing server (VPN), Port 47 GRE (failing that, TCP) and the 1723 TCP.

Using Microsoft Virtual PC

This free Microsoft product is similar to certain VMware products such as Workstation or Player, is software for creating virtual machines on physical equipment. Logically Using Physical Host Resources, Virtualizes hardware so that it can be used by physical hosts, and we can also customize this hardware.

Using Microsoft Virtual Server

Microsoft's Virtual Server is a tool for emulating an operating system, unlike their enemies (including the VMWare Workstation) You don't have a console, rather, an administration is made via the web, normally to the port 80 (if not in use) and if not to 1024. The advantage of this software is that it is installed, for example, on a server dedicated to it and we have the virtual machines available from any PC; we would connect from our PCs via the web and load the virtual machines, the resources are eaten by the server but it shows us the virtual machine on the screen as if it were local., we could have a Linux, a Windows running on our PC/laptop and the image file would be on the server eating up the memory/processor…

Using Distributed Software in Active Directory

This document details how a network administrator can save time. It involves publishing a series of programs in the Active Directory of MS Windows 2000/2003 and install them to whomever we want fully automatically. A very simple example, if we have WinZip and we want the whole company to have it installed and with the key inserted and with the 'classic' style, because it is a nuisance to have to go PC by PC installing it and entering the key and configuring it as they wish (I said WinZip for saying, but works with any program, For example, MS Office, Outlook, Antivirus, Adobe Acrobat Reader…). The best, generate an 'image’ of that software in an MSI file and then with active directory policies assign those installations to whoever we are interested in.

Setting up Shadow Copy

As incredible as it may seem, Microsoft moves forward! Not bad, This small great utility will be of enormous use to the administrators of networks of 'dumbs' users. It's a way that will save us IT admins time, since it is so easy that end users have to know it. I will give you a practical example. A network of X computers, X servers and for example, One of them is a file server where users store their data (images, Office Files, CAD…), How many times have we been told that a file has been uploaded?? that they have crushed him with another, or that they have engraved something on top of it… and that we recover yesterday's copy… or they just don't tell us and start over with work again. Vale, in situation, No? GOOD, MS if you have a Windows MS based server environment 2003 has created […]

Configuring RPC over HTTP or HTTPS in Exchange 2003 – Connecting Outlook from the outside

This procedure is very useful and safe, serves to enable our Outlook clients 2003 can connect to our MS Exchange server 2003 via web, using the 80 or the 443 (In Safe Mode) using Outlook from the Internet, from your home/hotel/office… so you don't have to use OWA. To do this, we will need to install an AC, One component, Registry Modifications and Nothing More.