Blog

Roller Coasters!

October 8, 2008

I had to go to Ohio this week to take care of some stuff for work, so I decided to go a couple of days earlier to check out the Cedar Point Amusement Park in Sandusky, OH.

It was on a Saturday so the park was packed, wait time for the rides is between 15 minutes to 2 hours. The really good rides usually have a wait time of at least 1 hour. One day …

Converting Physical Citrix Server to VMware Using VMware Converter

September 14, 2008

We converted one of our physical Citrix servers yesterday to VMware ESXi also and it went smoothly as well. No issues so far, so if you’re thinking of doing the same thing I can confirm that it works.

We also use RSA SecurID for authentication and it still works after the conversion with no changes made to the RSA Authentication Manager or RSA ACE Agent (using the same IP address after the conversion of course). …

Converting Microsoft Virtual Server 2005 Virtual Machines to VMware

September 14, 2008

We just converted 3 of our virtual machines running on Virtual Server 2005 R2 to VMware ESXi yesterday and it went pretty smoothly with just a couple of minor issues.

The first issue is the mouse cursor not working in VMware console after installing the VMware tools. The fix is just a simple registry edit:

  1. Open Registry Editor (regedit)
  2. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\Class\{4D36E96F-E325-11CE-BFC1-08002BE10318}
  3. Double-click on UpperFilters and delete msvmmouf.
  4. Reboot the VM.

Source: http://www.petri.co.il/forums/archive/index.php/t-19387.html …

How to query a Microsoft Office Access database from SQL Server

September 6, 2008

I was doing this yesterday to query our call logs which are stored in an Access database. I figured it would be really nice to be able to query our databases from one application. The software that came with our phone system to generate reports from the call logs is also not that flexible. It’s just much easier for me to run reports using SQL Server Query Analyzer plus we can join the tables from …

How to encrypt HTTP traffic (and bypass most firewalls) using SSH Tunneling with PuTTY on Windows

September 4, 2008

I’ve been using SSH Tunneling for a while now mainly to encrypt HTTP traffic when using public wireless access points. I won’t go into detail here, just Google for “SSH Tunneling” if you need more information. I’m also gonna assume you already have an SSH Server set up.

  • Download PuTTY and save it to C:/.
  • Open notepad, type in the command below and save it as securetunnel.bat (Note: removeusername@ and -pw passwordif you prefer to …