Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Virtualization Community Blog
Showing posts in English
riva11 | 22 Nov 2013 | 0 comments

Table2Text is a free tool helpful in case you want to export data from a database to csv file.

This program let you export the data to a CSV file from any OBDC database. Export operations can be performed via command line.

Usage example: 

table2text.exe DSN=odbcdsn;USER=username;PASSWORD=password;TABLE=table_name;FILE=c: est.csv


License : Freeware

Link :

riva11 | 15 Nov 2013 | 0 comments

Disk2vhd è un tool sviluppato e distribuito da Microsoft  Sysinternal e consente di convertire in pochi semplici passi una macchina fisica in una macchina virtuale nel formato VHD.
Questa utility di ridotte dimensioni,  solo 811 KB, non richiede alcuna installazione e può essere eseguita da una qualsiasi memoria USB.



Descrizione :

Disk2vhd è una tool che consente di convertire macchine fisiche in virtuali in formato file VHD. VHD è l'acronimo di Virtual Hard Disk ed è il formato usato da Microsoft Virtual PC, Virtual Server ed Hyper-V. I file VHD sono si possono utilizzare anche con programmi di virtualizzazione.

Disk2vhd per le operazioni di migrazione utilizza la funzionalità di “Volume Snapshot” di Windows e permette di generare una istantanea completa del...

riva11 | 31 Oct 2013 | 0 comments

Here is a Microsoft tool to disable Automatic Delivery of Internet Explorer 11. Available in download center an easy solution to disable automatic delivery of Internet Explorer 11 via Windows Update.

For computers running Windows 7 or Windows Server 2008 R2, the Blocker Toolkit prevents the machine from receiving Internet Explorer 11 via Automatic Updates on the Windows Update and Microsoft Update sites.
The Blocker Toolkit will not prevent users from manually installing Internet Explorer 11 from the Microsoft Download Center, or from external media.

OS : Windows 7 SP1 and higher for x64 and x86 and Windows Server 2008 R2 SP1 and higher for x64.

Link : Toolkit to Disable Automatic Delivery of Internet Explorer 11

riva11 | 24 Oct 2013 | 0 comments

What is Java
Java is a programming language and computing platform first released by Sun Microsystems in 1995. There are lots of applications and websites that will not work unless you have Java installed, and more are created every day. Java is fast, secure, and reliable. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!

How to check Java Version running in your computer

Check the link below to check the version of Java installed for your operating system.
Visit the following link : Verify Java Version

Java Downloads for All Operating Systems

Here the available Java versions available :

  • Windows 8 Desktop, Windows 7, Windows Vista, Windows XP, Windows Server 2008
  • MAC OS X
  • Linux
  • Solaris
  • ...
riva11 | 21 Aug 2013 | 0 comments

EventLogSourcesView is a simple portable tool that displays the list of all event log sources installed on your system.
For every event log source, the following information is displayed: Event Source Name, Event Type, DLL/EXE Files containing the event message strings, Registry Modified Time, and version information taken from the DLL/EXE file (Product Name, Company, File Description, File Version)
EventLogSourcesView also allows you to export the event log sources list into tab-delimited/comma-delimited/html/xml file.


License : Freeware

Link : EventLogSourcesView

Download : EventLogSourcesView (32 bit)  -...

ohzone - CherylPeterson | 15 Aug 2013 | 0 comments

Never attended a Symantec Vision conference?  We want to know why.  For the first 20 people (10 in the US and 10 in Europe) who sign up and participate in a 30-minute interview before August 22nd, we’ll award you 200 Connect points AND send you a custom Vision Hoodie.  To set-up a time, please click here or email your contact information to

ohzone - CherylPeterson | 30 Jul 2013 | 0 comments

We love our Connect community members and once again we're celebrating SysAdmin day. Check out this blog to find out how we are sharing the love with you!

Happy International Sysadmin Day!

Tell us something crazy that's happened in your world and we might make it worth your time!

riva11 | 12 Jul 2013 | 0 comments

If you have to install a .NET Framework software on a computer not connected to Internet or in case you have to install on many computers, don't want to waste time to download several time the online installer , the best choice is run a standalone installer of .NET Framework.

You can download the software from Microsoft using following these link:

Version Download
.NET Framework 4.5.2 Setup Download .NET 4.5.2
(Microsoft .NET Framework 4.5.2 (Offline Installer) for Windows Vista SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2008 SP2, Windows Server 2008 R2 SP1, Windows Server 2012 and Windows Server 2012 R2 )
.NET Framework 4.5 Setup

Download 32 bit & 64 bit versions...

riva11 | 03 Jul 2013 | 0 comments

If you need to find out who has logged onto a computer, there is a great freeware utility called WinLogOnView that can help you.

WinLogOnView is portable tool that scan the security event log of Windows operating system, and detects the date/time that users logged on and logged off.
For every time that a user log on/log off to your system, the following information is displayed: Logon ID, User Name, Domain, Computer, Logon Time, Logoff Time, Duration, and network address.


WinLogOnView also allows you to easily export the logon sessions information to tab-delimited, comma-delimited, html and xml file.

System requirements:
Windows Vista/7/8/2008. Both 32-bit and 64-bit systems

License : Freeware

Link : ...

Mike Maxwell | 12 Jun 2013 | 0 comments

This article originally ran on StateScoop on June 11, 2013

Whenever I ask state and local government IT managers if they're using virtualization, the answer is “yes” nearly 100 percent of the time.

But when I alter that question slightly and ask if they're virtualizing mission-critical applications, the “yes” percentage falls close to zero.

Essentially, these managers are saying: Sure, we're happy to leverage virtualization, just not for the operations we care about.

Logically, this is a bit of an odd position to take. If system components were children, would you really buy food for your youngest daughter Storage that you wouldn't feed to your eldest son Project Management?

Then again, government IT operations are to a large degree driven by risk tolerances. And when they run the...