Vol. 21, #33 - August 15, 2016 - Issue #1093

Ask Our Readers: Hard drive failures and VMWare ESXi

  1. Editor's Corner
    • HOT!!! Our NEW TechGenix website!
    • From the Mailbag
    • Ask Our Readers: Hard drive failures and VMWare ESXi
    • Send us your feedback
    • Recommended for Learning
    • Microsoft Virtual Academy
    • Quote of the Week
  2. Admin Toolbox
    • Admin Tools We Think You Shouldn't Be Without
  3. This Week's Tips
    • Virtualization - Virtual machines with a UPS
    • Windows 10 - Lock screen ads/tips
    • Office 365 - Backup
  4. Events Calendar
    • North America
    • Add Your Event
  5. New on TechGenix.com 
    • Recommended articles from TechGenix.com
  6. Tech Briefing 
    • Azure
    • Hyper-V
    • Security
    • Windows 10
    • Windows Server
  7. Other Articles of Interest
    • SAP cloud embrace helps feed the beast for AWS, Azure
    • Gene Kim Q&A: DevOps transformation is not just for devs and unicorns
    • Users give thumbs-up to lower-end versions of VMware's NSX
    • Five Citrix news items you might have missed at Synergy 2016
  8. WServerNews FAVE Links
    • Stunning Boeing 737 MAX Flying Display
    • 94-year-old Builds Gyrocopter And Gives Impressive Flight Demo
    • The Pen That Draws Electricity
    • Parrot Learned How To Be A Cat
  9. WServerNews - Product of the Week

Editor's Corner

A few weeks ago in Issue #1090 Is hybrid cloud dead? we included an Ask Our Readers item with some questions about monitoring VMWare ESXi servers for hard drive failures and about converting VMware virtual machines to run on Hyper-V. In this week's issue of WServerNews we will hear from one of our long-time readers, John Sadie, an IT consultant based in Auckland, Australia who has provided us with a guest editorial covering his own take on these topics. We also have a bunch more reader comments in our Mailbag on the topic of tech support scams and how to avoid getting snagged by them. And last but definitely not least, be sure to check out the new section titled New on Techgenix.com and also the short blurb below that has some hot-off-the-presses information about our brand new Techgenix.com website!! 

HOT!!! Our NEW TechGenix website!

TechGenix is pleased to announce that we have launched a brand-new website where we can bring you all the latest technology news and articles under the single banner of Techgenix.com. Our newly designed website is mobile-friendly and includes content created both by our existing team of talented technical experts but also some hot new tech writers as well! You can also add comments to articles and easily share them on social media using our new site. So take some time right now to explore some of the news, tips and tutorials currently available on our new site here:
And for readers of our weekly WServerNews newsletter, starting this issue we'll be adding a new section called New on Techgenix.com to each newsletter to highlight some of the hot new content available on Techgenix.com as it rolls off the presses!
Yes I know, metaphors like "hot-off-the-presses" and "rolls off the presses" sounds a little strange in the new age of e-publishing, but it's still possible to make a case for the importance of ink in our increasingly high-tech world. After all, as this Dilbert comic points out, who really likes squids?


Ask Our Readers: WServerNews has almost 100,000 subscribers worldwide. That's a lot of expertise to tap into. Do you need help with some issue or need advice on something IT-related? Got a question you'd like us to toss out to our readers to try and answer? Email us at [email protected]

From the Mailbag

Back in Issue #1089 Tech support scams your Editor shared a story of how he was almost tricked by a tech support scam that has been around a while but which he had not previously encountered. This generated a lot of comments from our readers and we published some of these comments last week in Issue #1092 Reader feedback: Tech support scams. Feedback continues to pour in however from our readers, so we're including another sampling here in the Mailbag of this week's newsletter. 

Let's start off with some comments from Bruce who runs a consulting business for small business IT in California, USA:

Always interesting to see reports about the various scams out there! I tried to reduce it to the basics a few months ago for my clients:


I was on the phone this morning with another client who had allowed a scammer to connect to her computer for 15 minutes. He used LogMeIn Rescue and a thorough search did not turn up any malware or anything else suspicious after he was disconnected. (Fortunately the client had not given up a credit card number.) But recently I was reminded how easy it is to extract saved passwords from Chrome, so even a remote session with no malware can have lasting consequences:


I've been trying to get my small business clients to take security seriously for years. I write about the latest scams and I mail them an article I update annually about basic computer security:


Some of them get it. But I still get calls every week about ransomware or malware or adware, as the bad guys get better at creating fake messages that look real. Tough times for end users!
Thanks for the newsletters! They're valuable resources.

You're welcome! And thank you for the excellent resources you've made available here for our readers!
Another reader named Andy commented as follows:

Great article as usual.
I'm 100% positive Dell have been breached as I often get fake calls to my number asking to speak to my wife and know the make/model of the dell laptop that *I* purchased in her name. There is no other way anyone else would know the model of the laptop, my number and her name.
I have another tech support company call me all the time to say they have detected alerts from the security software installed on my computer last year. Unfortunately it's a robo call that calls at all times during the day and never has a person on the other end to yell at. The number is always faked and although I report them to the FTC. I'm not convinced it will do any good.
Finally Mark Minassi's solution of ps chrom* |killthis fails as killthis is not a built in command but should be:
ps chrome* | stop-process

Thanks for fixing that. 

In last week's issue we included this email from a reader named Merlin who works in the IT Department for a county office in New Jersey, USA:

The way we have encounter the screens are through articles on reputable sites. Someone will go to read an article that is link to another site and there it is. We have instructed all users to turn off the machine immediately and call us. As of yet we had only one person fall for it, but the funny thing was they told the user to call the help desk. When I arrived they already had a CMD box open and was typing. I immediately shut it down disconnected the machine from the network and ran some scans on her machine and the server she was attached to. I did not find anything but reimaged the machine anyway. The only thing that still puzzles me is them telling the user to call the helpdesk. If anyone has any ideas why let me know.

We asked our readers if they had any idea why this particular scammer might tell their mark to call the helpdesk of the mark's own company for assistance, and this week we received the following from an Attorney named Jay who works in Wisconsin, USA:

Why tell the victim to call his helpdesk?  The best reason that I could imagine would be that the scammer has somehow already installed some way of monitoring on the machine. The scammer can be fairly certain, after the help desk is called, that the next log in will be via an administrator password with higher level credentials on the system. Perhaps they can then learn the user name and admin password with some sort of a keystroke logger application, maybe?

Great insight, thanks! 

A reader named Patrick had this suggestion on how to identify when you're being scammed via a notification like the one I described in Issue #1089:

Generally, it is unwise to respond to a notification that you did not originate.  It is always less risky if you call the tech support people first. Another sign is that a message to "subscriber" or "user" or not to the designated network admin at your site, is likely to be a scam.

Tracy, the president of a professional computer consulting firm that specializes in small business solutions, sent us this information about another possible scam to watch out for:

I had a client call me today. She had bought a new Netgear wireless extender. To reach the extender, you are suppose to physically attach it via an Ethernet cable to your network and open your browser and type mywifiext.net. She mistakenly typed in FIXmywifiext.net and got a web page with pictures of Netgear equipment with a message that says "Support for Range Extender" and a phone number. She called them. The foreigner at the other end told her he could help. She installed their remote desktop software and let him remote into her computer. She had lost the password to her router, so he went to a command prompt and typed NETSTAT -A. He told her that her network had been hacked, and that each TCP connection was to other computers on her network. Luckily, she didn't pay the $99 to "fix" this issue; she called me. It took me a few minutes to piece together how all this happened, because I couldn't believe that a real Netgear employee would have said such a thing. The "About" section of the fixmywifiext.net site is a giveaway with its poorly translated English description of their "services". 

One reader sent us this humorous comment:

This is both funny and frustrating. I use a system running Linux but I get pop ups saying that my "windows" computer has major virus problems. I just delete it or close the window.

Joanne who is the Director of IT for a security solutions and identification services provider based in Ontario, Canada offered the following suggestions on how to help people to not fall for these kinds of scams:

Company wide we've had these pop up a couple of times but the employees have immediately stopped and called myself or the Helpdesk. Family who have had the problem (89 year old technically competent dad) who got one of the calls simply refused and said he had a daughter who was IT Support and therefore he didn't need his help.
The biggest way I know of to help people from falling for these scams is to try and ensure everyone you know has SOMEONE they can reach out to for help so that when this type of scenario happens they turn to their helper rather than the scammer. And if you are one of the helpers, ensure it is a positive experience for them. A previous IT person we had would berate employees who did something wrong as a result of which when I first took over people didn't want to "bug" me about weird things happening on their computer. Reminding them that the company was paying me to help them and that inexperience is not a crime I have found that I don't get that many questions any more, mainly because they now know to check URL's and mostly importantly how to hit delete.

Damien from Down Under (Australia) shared this story with us:

Here in Australia I have constantly been bombarded by calls from "Microsoft" about the virus on my PC. Several times I have kept them on the line for about 30 minutes before calling their bluff. Occasionally they have called back within the hour using the same ploy. I even had a specific hard drive imaged just to let them in but decided against it. Finally they rang back again after many months and I was ready for them, but this time they said they were from "Telstra". Well, I let them have it. I can't believe they stayed on the line so long considering the language, I didn't hold back. I told them I had been waiting for 2 months for them to get back to my original query and I hadn't had internet for that time. I am actually with a different Internet provider. They said they could fix it all if I gave then $5.00 which could be paid using my credit card. I gave them a false number which obviously didn't go through and they even stayed on the line when I told them it was all a conspiracy and the banks had it in for me too. 3 times they put that credit card number through then I let them in on the joke. I was disappointed I didn't tape it all but it wouldn't be something you could let your children listen to. I almost got caught out earlier when they said the card had been rejected and asked me to repeat the card number. Thankfully they only required the last 4 digits which I was fortunate enough to remember. Have some fun with them but be warned, they do get narky when you've wasted their time and might call back to swear at you. 

A reader named Alex listed a few companies and phone numbers to watch out for:

I had the same situation with couple of my clients. I called and talked to them for more than an hour going from person to supervisor and calling them back, finally, they stopped answering the calls. few months later the same thing happened. I found out from them that they operate under many fake companies, and all of them are foreigners. Some say they are in California, some in Florida, some in New York,India, Malaria, and many other places with different websites.
These are some companies that they operate under:
• Tech matrix info solutions
• May Tech Bay
• PC Support
• Security Software Solutions
Phone numbers: 855-755-1855 and 866-287-9607

Tony from the UK offered these comments:

I have reluctantly adopted the approach that all phone calls from someone I don't know is a scam and start from that basis. The idea that Microsoft is actively monitoring my computer in order to protect me from viruses is fairly far fetched if you think about it. When you have an antivirus subscription from a company that specialises in it (e.g. Sophos) and they never call you when their software detects a virus, then why would someone you are not paying for the service spend time and money calling you? I normally turn off most of the facilities in Windows (and other programs) that send monitoring information back so that I know they shouldn't be tracking me and thus can more readily assume that any phone calls making such claims are a scam.
I have had one success in convincing people such as banks and tax authorities how to make help the customers not be duped and HMRC (UK tax) have adopted one suggestion. Some of their emails no longer have links in them to being able to log in to your account. After all, if they are emailing you about your account, you already know how and where to log in. OK, it is slightly less convenient, but once you know that they don't provide a login link, you know that any email with a link is a scam. Alas, my bank has failed to see the logic in this. I even gave them a method by which they could increase confidence in emails by 99% or more.

Finally here's 2 cents from Jim who works at Hughes Network Systems:

Mitch, well from time to time I get a cold call on the phone that my pc called support and informed it that there was a problem. LOL.
Since I have a LAN with 8 computers running with a firewall with rules, I just laugh. Knowing that none had called out. So I play along with this person, who by the way has a very heavy foreign accent. When he gets to the point of asking for a CC number and access to my computer, I ask him if he is qualified to work on Linux. I then get an immediate disconnect, not even a good bye.
By the way, my first computer was a Heathkit H8, 64k of memory and 2 - hard sectored
5 1/4 disk drives and 3 - soft sectored hard drives. All which I built.

The operating system was CP/M. Most of what I use I wrote in assembly language.
I just wish the phone companies would be held responsible for
these scammer, but alas all they want is the money. There is no effective way to block them, at least right now. Most of the numbers seem to be from Level 3 company. Maybe a fine in the millions might discourage them from selling phone number blocks.
My $0.02 cents

Ah, the good old days :-)

And now on to our guest editorial by John Sadie...

Ask Our Readers: Hard drive failures and VMWare ESXi

A few weeks ago in Issue #1084 Catching up on Windows 10 we received a request from Alain, the Director of a company in South Africa that provides procurement and training support to the construction industry, who asked us to reach out to our readership concerning the following issue:

Hi Mitch, thanks again (as usual) for a very informative newsletter. I have just experienced a series of unfortunate hard drive failures, that have left a large dent in my confidence with various platforms. One issue that I have experienced relates to VMWare ESXi Server (barebones install) and a hard drive failure that left two virtual machines that ran off that hard drive not only dead, but completely irretrievable.
Disk Drive programmes abound for monitoring HDD status especially regarding SMART parameters. These all run on a desktop or server environment, but when running within a VM, there is no real hardware for them to monitor since these machines only have virtual hard drives without SMART monitoring.
Do you have any tips on how to monitor drives for potential failure when running VMWare ESXi?

While we included some reader responses to Alain's original question in Issue #1088 and Issue #1089, he later came back to us with two more questions:

I have Windows 2008R2 server, which has one Virtual License, so would like to know now how to convert the VM's from ESXi format to Hyper-V…. If this is feasible, then I would gladly make the efforts to move over.
The setup proposed by John in New Zealand is very detailed, and allows for easy monitoring of the Hard Drives as well, since there is a platform for conventional tools such as CrystalDisk Info for monitoring and reporting on imminent hardware (HDD) failures. If possible, could you perhaps aim me at some tutorials on how to setup this platform on an almost step-by-step basis? Some of the jargon used by Techies (myself included) is beyond other mere mortals, and can become very daunting.

It's these additional questions that our guest contributor John Sadie responds to below...

Hard drive failures

Ever since SATA cables became popular, I have distrusted them. The reason is that they have such flimsy connectors compared to the PATA cables before them. Then I discovered the wonder of SATA cables with metal clips to hold the connectors in place!
Now I am back to disliking all SATA cables, especially the ones with metal clips! It seems that the connectors corrode and metal spring clips seem to force open the connection over time.
Virtually every hard drive failure I had to repair over the past few months, for myself and for clients, was fixed by merely swapping the SATA cable. And it seems newer SATA cables without clips actually grip tighter that the older ones. Even disks that showed SMART failures were fixed.
Hyper-V systems just started rebuilding the RAID without any assistance from my part. And again, the Hyper-V systems rebuild 2TB RAID1 sets in less than one hour – WHILE THEY WERE IN USE by virtual machines. Hardware or Linux raid systems will take about 12 hours for that same task.

ESXi to Hyper-V

The best way to convert those would be to do a cold backup with the VM's shut down. The best backup program I know is ShadowProtect from StorageCraft:


You can download a 30 day full version from them. You need to get the ISO version. Then you can boot from the ISO file or the actual CD to back up the ESXi or any other virtual machines.
The best would be to uninstall the VMware drivers from the virtual machine before you do the backup, although I have found that not to be always necessary.
Then use that same ISO or CD to boot from in order to restore those virtual machines into Hyper-V.
The Windows machines will often show you how happy they are to be on the Windows Hyper-V platform by re-activating themselves. And perform faster.


Hyper-V uses Storage Spaces for RAID. This hides the disks for standard programs. Most monitoring programs cannot find single disk failures when the disks are part of any type of hardware or software RAID setup. We have used quite a few free and paid for monitoring solutions over the past 20 years. All had limitations or were just plain difficult to use.
By far far far far-and-away the very best monitoring software is PRTG from PAESSLER:


We have been using this for over 2 years now. We appreciate PRTG's power, beauty and ease-of-use more and more every day. They are a German company and the German precision is obvious throughout the whole program. PRTG has a free full-function version that is limited to 100 sensors. Used correctly, that is more than enough for comprehensively monitoring up to about 10 servers and/or workstations. PRTG has 1000's of built-in sensors, and will auto-discover things you never even knew existed. You can set up more than the 100 sensors, and disable ones you do not often use. Once disabled, they do not get included in the sensor count. By limiting the sensors to only what you need, you can monitor larger networks.
PRTG's special features are the "SUNBURST" and/or TREEMAP" views, where you will see ALL your sensors in one glance on one screen. If anything turns RED, click on it, fix it or email PRTG for support. This software is seriously well thought out and well laid out. It is a work of practical art. Red means fail, green means OK, yellow means nearing parameter settings, blue means disabled.
PRTG can even monitor your backups, and even anything you can write most types of scripts for.
This software will be incredible for larger and even international companies of any size. The prices for the over 100 sensor licenses are definitely a bargain for what you get and what this can do. As well as for the free support you will get. There is support for all mobile devices to be monitored and / or to view the main console.
To see a quick overview go to:


There are many other PRTG videos on YouTube.
P.S. No, I do not get paid for this recommendation, nor am I associated with PRTG and/or PAESSLER. It just is good software that will make the world a more productive place and deserves to be mentioned.

About John Sadie

At university, John Sadie initially studied Electrical Engineering, then Business Economics and finally Philosophy, all to final year level. All this justifies the meaning of the word University – "universal" as in universal knowledge. After that he joined IBM as a mainframe engineer for 10 years. During this period he was twice awarded for excellence of service. He started his own company when the IBM PC first came on the market, and this has been his career and his joy ever since. He has been certified as a Novell Engineer and as a Microsoft Small Business Specialist. His hobbies include computers (especially helping clients getting maximum benefit from their computer systems), auto technology, building furniture, philosophy and music. According to John, the piano accordion is the easiest to learn and play of all instruments. And driving a car with a modern CVT (2010 on) is the greatest auto enjoyment possible. The CVT is always 100% in the right gear, cost the least to manufacture, has the fastest performance and is the most reliable and fuel-efficient of all types of transmissions. And you never have to change the CVT transmission fluid.
IntraLan website:


Computer Hospital:


You can also contact John by email.

Send us your feedback

Got anything more to add on this subject? Email us at [email protected]

Recommended for Learning

From the Microsoft Press Blog:

Free ebook: Windows 10 IT Pro Essentials Support Secrets
This ebook is for anyone whose responsibilities include training people to use Windows 10. That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endless stream of questions from friends, family, and coworkers. As Windows 10 moves into its second full year and begins to take over an increasing share of the installed base of PCs, many of those questions are going to begin "How do I…" That's where this ebook comes in...read more on the Microsoft Press Blog here:


Microsoft Virtual Academy 

Mastering Microsoft Certification Exam Prep 

Preparing for a Microsoft Certification exam? If you're thinking about becoming a Microsoft Certified Professional (MCP), watch this course! Join the pros who know, IT Pro and Microsoft Certified Trainer Timothy Warner and Microsoft Learning Senior Content Developer Christopher Chapman, for an informative course that explores proven test-taking strategies, as well as how to get requisite content knowledge and hands-on technology skills. Take a look at the Certification Study Pyramid, check out different kinds of questions, and learn how to be prepared for them.


 Quote of the Week

"Success breeds complacency. Complacency breeds failure. Only the paranoid survive." --Andy Grove

Until next week,
Mitch Tulloch

Note to subscribers: If for some reason you don't receive your weekly issue of this newsletter, please notify us at [email protected] and we'll try to troubleshoot things from our end.

Admin Toolbox

Admin Tools We Think You Shouldn't Be Without

GOT ADMIN TOOLS or other software/hardware you'd like to recommend? Email us at [email protected]

With a multitude of sensors and a vendor agnostic platform, PRTG Network monitor enables you to use ONE solution to monitor your entire infrastructure including applications, software, hardware, cloud & virtual environments. 


Veeam FastSCP for Microsoft Azure delivers easy-to-use, reliable and fast file copy between on-premises and Azure-based VMs—for free!


Surface Tools for IT gives you Microsoft tools to deploy, manage and secure a Surface device in your organization:


SQL Power Doc is a collection of Windows PowerShell scripts and modules that discover, document, and diagnose SQL Server instances and their underlying Windows OS & machine configurations: 


DBA Security Advisor is a powerful security tool that can assess SQL Server instances against a rich set of security checks and detect potential security risks:


This Week's Tips

GOT TIPS you'd like to share with other readers? Email us at [email protected]

Virtualization - Virtual machines with a UPS

Rod Trent's myITforum.com has an article by Joseph Yedid about some steps you should take if you're setting up an Uninterruptible Power Supply (UPS) for servers hosting virtual machines:


Windows 10 - Lock screen ads/tips

BetaNews has an article by Wayne Williams describing how you can disable the advertisements and tips that are now displayed on the lock screen of the Windows 10 Anniversary Update:


Office 365 - Backup

Have you thought about backing up your Office 365 data and content in the cloud? Check out this post by Lauren Fish on the Microsoft UK Small and Medium Business Blog that explains why it might be a good idea:


Events Calendar

North America

2016 Microsoft Worldwide Partner Conference on July 10-14, 2016 in Toronto Canada


Ignite on September 26-30, 2016 in Atlanta USA


Add Your Event

PLANNING A CONFERENCE OR OTHER EVENT you'd like to tell our 100,000 subscribers about? Contact [email protected]

New on TechGenix.com

How to fix Windows 10 commonly known privacy issues


NIST: End two-factor SMS authentication


Tutorial: Goodbye DirSync, hello Azure Active Directory Connect


Office 365: How to back up and recover mailboxes


Visualizing your Azure enterprise costs with Power BI



Tech Briefing


How to setup Microsoft Azure RemoteApp with a custom image (step-by-step) (Robinhobo.com)


How to use Virtual Appliances in Azure (CloudComputingAdmin.com)



Hyper-V optimization tips (Part 3): Storage queue depth (VirtualizationAdmin.com)


Windows 10, Hyper-V and Wireless – a new way to make this all work (Ben Armstrong)



Product Review: NETsec Permission Reporter (WindowsNetworking.com)


New Microsoft Azure Security Capabilities Now Available (Microsoft Secure Blog)


Windows 10

Community Options For Migrating from BIOS to UEFI and Secure Windows 10 (myITforum)


Issues Deploying a Custom Windows 10 Start Menu Layout when using an image with a Default Profile (A Windows System Admin's Blog)


Windows Server

Configure VPN in Windows Server 2012 R2 (WindowsNetworking.com)


How to setup Azure VPN for Site-to-Site Cross-Premises or Create a Virtual Network for Point-to-Site (Robert Smit)


Other Articles of Interest

SAP cloud embrace helps feed the beast for AWS, Azure

SAP cloud certification for HANA on Azure and AWS extends the software giant's reach, but also provides another means for enterprises to port massive amounts of data to the two cloud platforms. Find out more in this complimentary piece by news writer, Trevor Jones:


Gene Kim Q&A: DevOps transformation is not just for devs and unicorns

One of the founding fathers of DevOps, Gene Kim, says his focus lately is on how enterprise IT 'horses' adopt agile practices, rather than on early adopter tech 'unicorns.' In this complimentary Q&A, our editors pick apart the brain of one of the industry's most influential figures.


Users give thumbs-up to lower-end versions of VMware's NSX

VMware looks to finally establish a foothold in corporate accounts with two low-end versions of NSX. But will the enterprise take the bait? Find out the answer from our Senior Executive Editor, Ed Scannel.


Five Citrix news items you might have missed at Synergy 2016

Citrix's relationship with Microsoft grew closer at Synergy 2016 -- which is no surprise given that CEO Kirill Tatarinov used to work there -- but it also touted several other product updates and strategic alliances. Discover the top five Citrix news items you might have missed at Synergy 2016 here:


WServerNews FAVE Links

This Week's Links We Like. Tips, Hints And Fun Stuff

GOT FUN VIDEOS or other fun links to suggest you'd like to recommend? Email us at [email protected]

Stunning Boeing 737 MAX Flying Display

Watch the elegance and power of Boeing's 737 MAX as it takes to the sky like a rocket during the Farnborough 2016 airshow:


94-year-old Builds Gyrocopter And Gives Impressive Flight Demo

94-year-old Ken Wallis demonstrates to his visitors how easy and safe it is to fly a gyrocopter which he built himself:


The Pen That Draws Electricity

The AgIC Circuit Marker pen uses conductive ink that allows working electrical circuits to be drawn on pieces of paper:


Parrot Learned How To Be A Cat

A parrot tries to infiltrate a group of cats by acting and talking like a feline:


WServerNews - Product of the Week


WServerNews - Editors

Mitch Tulloch is Senior Editor of WServerNews and is a widely recognized expert on Windows administration, deployment and virtualization. Mitch was lead author of the bestselling Windows 7 Resource Kit and has been author or series editor for almost fifty books mostly published by Microsoft Press. Mitch is also a ten-time recipient of Microsoft's Most Valuable Professional (MVP) award for his  outstanding contributions in support of the global IT pro community. Mitch owns and runs an information technology content development business based in Winnipeg, Canada. For more information see www.mtit.com.

Ingrid Tulloch is Associate Editor of WServerNews and was co-author of the Microsoft Encyclopedia of Networking from Microsoft Press. Ingrid is also manages research and marketing for our content development business and has co-developed university-level courses in Information Security Management for a Masters of Business Administration program.