When using an Office 365 public site and you create a document library or list, by default you have to be logged in to view it. Not great if you want to publish a bunch of documents out to the public…anonymously.
While doing an emergency wildcard SSL certificate replacement on a web server farm, most servers would allow me to select the certificate after the import but a handful wouldn’t. It was a bit random but the fix was simple enough.
Recently a customer reported that on some team sites that the “Add new user” link had disappeared off the Site Users web part.
Assumptions were initially that the permissions had somehow changed. This was quickly ruled out.
As a business we get a large chunk of our work through partner organisations who are looking to fulfil projects but they either have capacity shortfalls or lack a particular specialisation.
Recently we were asked to define our technical boundaries more formally and so started with a visual representation which is easy to understand at a glance.
Creating a virtual machine in SCVMM for the first time is easy and so is creating a virtual machine that will be on a cluster, but one little check box can cause it to fail and could have you scratching your head.
This post shows the process step by step and the check box you might miss if adding a VM to a failover VM cluster which causes the process to fail. Not the kind of mistake you will make twice.
This blog post covers the process you need to follow to accept an invitation to a SharePoint online site when you are an external user, e.g. being invited to your customer portal that we (The Full Circle) provide to our contracted services customers.
There is a particularly worrying piece of malware doing the rounds called ‘CryptoLocker’ – it’s in the ‘Ransomware’ category and sets the standard for what we should expect going forward with malware.
CryptoLocker infects your machine, encrypts yours files and then demands a $300 ransom, hence ‘Ransomware’
The really nasty thing is not only does it infect and render your local files useless, it also reaches out to any network shares the infected user has and encrypts those files too, turning documents into nothing more than a messy goop!.
This post focuses on symptoms of infection in a client/server scenario, finding the infected workstation through its behaviour with network shares and cleaning up the resultant mess. We considered the workstation disposable and restored a clean system image to it, we didn’t spend anytime trying to remove it – there are plenty of resources on the web that covers removal.