Batch Delete Issued Citrix User/Device Licenses with Udadmin Udamin.exe is a handy tool for managing Citrix user/device licenses. To get a list of currently issued licenses run it like this: C:\Program Files\Citrix\Licensing\LS>udadmin.exe -list Usage data is 15 minutes […] Read more
Lenovo T520 Maximum Memory: Not 8, But 16 GB! Contrary to what Lenovo wants to make you believe, the T520 laptop is not limited to 8 GB of RAM. I own this reliable workhorse and made the mistake of […] Read more
Citrix Profile Management Architecture – Why it is Not Based on a Mandatory Profile Any More Ron Kuper asked in a comment why the architecture of Citrix Profile Management was changed from being based on mandatory profiles to capturing the entire profile content by default. This […] Read more
Installing ESXi 4.1 on HP DL380 G8: No NICs Found This kept us occupied quite a bit: after having worked with HP’s G7 line of servers for a long time, we ordered our first DL380 G8 for use with VDI. […] Read more
XenApp and RDS Sizing Part 3 – Determining Farm Load This article is part of a mini-series. You can find the other articles here. In the previous part of this series we saw how to determine the capacity of a […] Read more
Solution to “Windows Cannot be Installed to this Disk” I encountered a strange error when I moved my laptop’s hard drive to another computer to make room for an SSD. When I tried to install Windows 8 on the […] Read more
The Sad State of Web Forums – and some Alternatives The software industry in general is a very fast moving business, but even in this sector there are niches that allow species to survive that should, by normal means, have […] Read more
Choosing a Laptop, 2012 Edition I have been using Lenovo laptops for more than seven years. They never failed me – not a single hardware fault or software instability in all those years. OK, not […] Read more
Show Me Your Start Menu and I’ll Tell You Who You Are A Windows 7 start menu tells a lot about the user that, indirectly, created it. This is what mine looks like: So what does that say about me? Background This […] Read more
XenApp and RDS Sizing Part 2 – Determining Farm Capacity This article is part of a mini-series. You can find the other articles here. As we have seen in part 1 of this series, when sizing a new farm the […] Read more
Knowledge Base Gems While I am generally satisfied with the quality of Microsoft Knowledge Base articles (many other vendors’ KBs are far worse), from time to time I encounter articles that either lack […] Read more
XenApp and RDS Sizing Part 1 – Methodology This article is part of a mini-series. You can find the other articles here. One of the first things you need to do after starting a XenApp farm upgrade project […] Read more
The SetACL Shirt Shop Has Opened What could be geekier than a t-shirt imprinted with actual source code from a tool that helps administrators around the world tame one of the most dreaded beasts in IT: […] Read more
What’s Missing in PowerShell 3 ISE On my quest for a decent PowerShell development tool I first tried out PowerGUI, but was not very happy with it. When the RTM version of PowerShell 3.0 along with […] Read more
Windows 7 Default HKCU Registry Permissions This is a complete listing of all Windows 7 HKEY_CURRENT_USER registry permissions. The list was generated on a 32-bit installation with SetACL. More default permission listings can be found here. Read more
AppLocker – Solutions to Common Problems This article is part of my small series about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Read more
Windows 7 Default File System Permissions Listing This is a complete listing of all Windows 7 file system permissions. The list was generated on a 32-bit installation with SetACL. More default permission listings can be found here. Read more
AppLocker – Security Problems This article is part of my small series about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Read more
Finding and Removing Orphaned SIDs in File Permissions, or: Busting the Ghosts Built Into Windows 7 Due to a lack of visibility permission cleanup is performed far less frequently than it could, and probably should. As a result, ghost ACEs (permissions from deleted accounts) linger in […] Read more
AppLocker – Fact Sheet This is the first in a small series of articles about AppLocker, a technology built into Windows that enables administrators to audit and optionally block application execution. Read more
HowTo: ReACLing a File Server in a Domain Migration with SetACL 3.0 When you are planning a migration of user accounts between domains one task always pops up pretty quickly: reassigning the permissions of the users in the source domain to the […] Read more
Benchmarking Windows 7 Offline Files Transparent Caching Windows 7 comes with several features that promise to greatly improve file access over a WAN. One of them is version 2 of the SMB protocol, another transparent caching. This […] Read more
Recommendation for a USB 3.0 JBOD Enclosure A drive enclosure for 4 SATA drives, connected to the host via USB 3.0 and presented as JOBDs is a great and inexpensive method of adding a lot of hard […] Read more
Benchmarking a $11,699 HP Enterprise Performance SSD [Update on 29/06/2012: added tests 5 and 6 with RAID controller cache and Atlantis Ilio] When a 400 GB SSD comes nearly at the price of a small car, you […] Read more
Solved: Deleting Copied Executable Files Fails – Temporarily I had a very interesting case recently where copied EXE files could not be deleted. They would simply remain in the folder like zombies, only to disappear a few minutes […] Read more
Setting up Mobile Broadband (WWAN) on HP Elitebook 8560p Configuring an HP Elitebook with integrated HS2340 mobile broadband module to use the 3G connection can be a little tricky. Here is how it works – without third-party dialer software! Read more
Authentication Fails Trying to Send Mail via Google Apps SMTP from PHP As you may know helgeklein.com also hosts a forum where I help people who have questions related to my software. The forum is configured to send out e-mails when new […] Read more
Removing “Eject VMware Virtual disk SCSI Disk Device” The HotPlug functionality of VMware ESX(i) 4 and 5 has the negative side effect that it is easily possible to “eject” hardware devices from inside the virtual machine, completely removing […] Read more
Solved: Disabling the BitLocker Service via GPP Fails If you want to disable the BitLocker service via Group Policy Preferences, you will find that you cannot. The service’s startup mode stays at “manual” and the following event is […] Read more
Walkthrough: Creating a UE-V Settings Location Template In this article I explain how to create a template for Microsoft User Experience Virtualization. For details on how UE-V works please see my earlier article Microsoft User Experience Virtualization […] Read more