Promote your NT-Server into an NT Domain Controller!
U-Promote is a Best Seller in the Sunbelt OnLineShop. Did you know
you can promote your NT Server into an NT Domain Controller? U-Promote
is the only software utility that can promote your NT server to an NT
Domain Controller (PDC or BDC) without having to go through the pain
of re-installing the whole OS.
Don't make the wrong choice! When you installed Windows NT Server,
you were asked if you wanted to create a domain controller (DC). Your
choice was permanent. If you declined, you could never create one
later (KB article Q193219). You can get it from the OnLineShop in less
than a minute.
With U-Promote you can:
Change a standalone NT server to a Primary Domain Controller (PDC).
Change a Primary Domain Controller to a standalone NT server.
Change a standalone NT server to a Backup Domain Controller (BDC).
Change a Backup Domain Controller to a standalone NT server.
The benefits are clear as daylight:
Save days of downtime.
Lose none of your applications or preferences.
Upgrade even NT Workstation.
Create new BDCs.
Demote a DC to a Standalone Server.
Move a BDC to another domain.
Move a BDC to a Windows 2000 domain.
Cost? Practically nothing. Single Computer: $99. Unlimited: $239.95.
Buy it here:
New Security Explorer V4 Has Cool New Features
Simplifying W2K's new NTFS inheritance model and extended permissions,
Security Explorer does the trick. Small Wonders Software released
SE4.0, a useful security assessment tool for managing permissions.
This latest release fully supports W2K's new NTFS inheritance model
and extended permissions. What that means? You can now modify any
permissions without affecting any other users, for both NT and W2K.
Unlike Windows 2000's native ACL editor, Security Explorer shows
progress as it is setting inherited permissions on child objects along
with any errors that occur. Additionally, this new version of Security
Explorer auto detects the target operating system, allowing you to
properly modify permissions on both Windows NT and Windows 2000.
Lots of your colleagues use Security Explorer for one-time lock downs
and security analyses, managing permissions on a daily/weekly basis,
backing-up security descriptors on folders and files and being able
to restore these when needed, as well as for web-based security
"Security Explorer does all this and more, it is simply much easier
to use than the new Windows 2000 permissions editor. Security Explorer,
version 4.0 offers noteworthy time and money savings for small, medium
and large enterprises," said Brian Small, President of Small Wonders
Software. Download your eval over here and see how this works:
Sunbelt Now Offers Double-Take Installation Service
To start in the USA, now you can have a Sunbelt System Engineer on-
site to help you install our Number One selling Double-Take product.
It is a High-Availability and Disaster Recovery solution in-one.
Recently, the developer also introduced its second product called
GeoCluster and this allows you to break two MSCS cluster nodes apart
and spread them from each other with their own separate storage to
make sure that disasters would not wipe your cluster (and business)
Double-Take is the industry's most popular utility for continuous
data availability and real-time data replication. It basically boils
down to just one career-saving concept: DOWNTIME-PREVENTION. Find out
why Compaq, Data General/EMC, Dell, HP, IBM, and Microsoft recommend
Double-Take and GeoCluster for their server solutions, and have it
installed for you.
Need To Monitor Exchange? NEW TOOL: Real-View
This tool allows you to control and visually display your Exchange
network health and usage. You can see the availability of servers,
queue levels, failed message transfers, user-defined thresholds
and much, much, much more. PROMOTIONAL PRICING UNTIL OCTOBER 31,
2000 IS ONLY $995 PER SERVER (Which is a steal for a tool like
Real-View gathers data directly from your Microsoft Exchange
Server and Windows NT system and displays them as an intuitive
Network Topology. Real-View dynamically places these objects
in its object store. With a simple mouse click and drag,
Administrators can place objects on the Network Topology view
and obtain data. The Dynamic animated changes of objects display
availability of servers, queues, failed message transfers and
- Real-Time Queue Management
Exchange Administrators can now monitor various connectors
including direct connectors to the Internet Mail Connector,
cc:Mail connector, Exchange Information Store statistics and
Exchange MTA Queue Monitoring.
- End to End Object Management
With Real-View, you can monitor all objects from point to point.
You can track the complete route of messages and view number of
messages coming both in and out of a specific server or connector.
- Trend Analysis - Real-Time Charting
Administrators can now monitor both peaks and valleys of messages
coming through their system to analyze where their bottlenecks
may arise. Real-View charting diagnoses message trends coming
through Exchange Servers, Internet Mail Connector, cc:Mail
Connector and the Exchange Information Store.
- Java Enabled Real-View Console
The Real-View java console allows you to view Real-View data over
the Internet and arrange objects on the network topology just
like they would arrange in the main Real-View Network Topology.
Take a look at the Java Console and click on node status for objects.
- Exchange Service Center
Administrators can now monitor which Exchange Services are running
on an NT server through the Service Center. Real-View will indicate
the services? current status and display the last time it checked
on the services? status.
- Exchange Event Management
When user-defined thresholds for message queues through connectors
(Exchange, Internet and cc:Mail) are exceeded and/or message transfers
fail, you will recognize visual changes in objects and flag them as
- Real-View Response Technology
From Real-View, you will be able to manipulate start/shut down services
for their Exchange servers. No additional tasks are placed on the
server. Real-View remains passive. This enables you to respond
proactively when there are bottlenecks or system failures within the