We'll need the exact, complete error to help out with this issue.
If you are using the 2003 domain controllers in their native mode (AD) then you won't have PDC/BDC but only DCs. Those of us who started out with...
Minor editorial note here. "The primary DNS on a workstation should be that of a domain controller for that domain. " The primary DNS...
Are you using system restore? That is, do you have it turned on? And for claification, what is happening to let you know it is back?
That stuff brought back memories. Been a while since I ran wfwg and I started it before M$ offered a TCP/IP protocol so we used several 3rd party...
Maybe This is the problem.
Interesting stuff. Thanks. I can now offer an explanation for at least a couple of folks on other forums. Hmmmmm. Sneaky buzzzards,...
Brandi Bond - that hotfix (039) is the one used for closing some of the holes the MSBlaster worm can use. Things that were missed on the first...
Sorry - I rarely look in this section. But How to Obtain TCP/IP-32 3.11b for Windows for Workgroups should point you to the download location...
Thanx Pete. I was just too tired at 0100 to go looking. Glad you posted those.
1. Run a cleanup on your system drive and if you happen to store temp files of any sort on another partition, cleanup on that/those partitions as...
Would it not be a requirement that that specific user be active and as always the Computer to be actually ON at the time of the scheduled task ?...
OK. I haven't asked before but are firewalls running on any of the PCs? If so, that could cause the failure. Otherwise: Next idea - and this...
Port 1 is often wired cross-over. If it is used to connect a hub it is almost certainly wired crossover.
martinr121 - the firewall part depends entirely on which device you are using as your router/switch. Some have a dedicated and full-featured...
aram755 - the word in blue and underlined in my earlier post, Internic, is a link to a site that includes a FAQ with the information you asked...
Glyn - glad you got it working. And no, you really aren't opening up any holes in your firewall that outsiders can exploit by simply allowing...
You should have a folder named Recycler with subfolders (having long, strange, mostly numeric names) that are the recycle bins for the various...
Add a user account (maybe schdmgr), give it a password, add it to the admin group, and use that for scheduled tasks. I'd be interested in...
If you just have the one user profile corrupted, probably easier to delete it and create a new one.
Separate names with a comma.