Great PowerPoint presentations on Citrix Technologies from Barcelona 2012
For those who are not aware, Citrix has two Synergy events every year, one in the US and one in Europe. This year Citrix Synergy in Europe was presented in Barcelona, Spain. If you want to catch up on...
View ArticleWhat does App-DNA, ChangeBase’s AOK have in common?
They are tools used for migrating XP applications to Windows 7 and performing tests related to application compatibility against Windows 7, Microsoft App-V, Citrix XenApp, Windows Server 2008 R2 as...
View ArticleTen Important things to consider when troubleshooting Load Balancing Issues...
Ten Important things to consider when troubleshooting Load Balancing Issues in XenApp 6.0 and 6.5 1. Why are you troubleshooting Load Balancing? Keep in mind Load Balancing is turned on by Default in...
View ArticleDifferences between the two Citrix licensing models and a “secret” command to...
BTW (By the way), the “secret” command to release licenses is called: UDADMIN and it is explained further below (it applies for the User Device Licensing model only; you have to run it locally on the...
View ArticleComparing ports 1494 and 2598 in a Citrix Session
When a user connects to a Citrix Session using a Citrix ICA Client (Citrix Receiver, Online Plugin or PNA Agent), the ICA client will utilize either port 1494 or port 2598 on the server to establish...
View ArticleWhy Mobile Devices need the Citrix Services Site configured
XenApp has a component called Web Interface Management Console (let’s call it WIMC). The WIMC can be installed on the same server as XenApp, or it can be installed on a different server. In smaller...
View ArticleHow the ICA Java Client differs from the other Citrix ICA clients
As you probably know, The Citrix ICA Client needs to be installed on the end point devices in order to launch Citrix published applications and ICA Server desktops from these devices Example: Windows...
View ArticleBare minimum essentials of Citrix UPM
Citrix UPM or User Profile Manager is a component that was added to the Citrix line of products a few years back. Citrix UPM (C-UPM) has three distinct components: 1. The Administrative Component...
View ArticleCitrix XML service port 8080 conflicting with Tomcat port
Concepts first: What is a Tomcat server? “Apache Tomcat (or simply Tomcat, formerly also Jakarta Tomcat) is an open source web server and servlet container developed by the Apache Software Foundation...
View ArticleDifference between sleep and hibernate in a laptop
Quick mnemonics: The bear hibernate in the winter for months (therefore he saves more energy than if he was sleeping for a few hours like humans do) Here is the official answer from the horse’s mouth...
View ArticlePassthrough Authentication in Citrix – Five components to configure and check
Passthrough authentication is the the process in which user credentials are passed via web interface running on a Windows server with IIS installed, so the user doesn’t get challenged to enter his/her...
View ArticleSSL v2.0 and weak cipher suite – Netscape legacy
SSL v.2.0 and weak cipher suites are legacy socket layer security, developed by Netscape, circa 1995 (SSL 1.0 was also developed by Netscape, in 1994, but never released). According to Netscape, it was...
View ArticleXenMobile – Citrix bet on the mobile workspace
It looks like Citrix is in the mood to conquer the mobile workspace. Back in January 2013, Citrix acquired Zenprise, a player in the a MDM (Mobile Device Management)arena. On February 20 2013, Citrix...
View ArticleEnabling Num-Lock before users log on to Windows… and other hundreds of...
To enable NUM LOCK before a user logs on, follow these steps: 1.Run Registry Editor (Start-Run and type regedit; press [Enter]) 2.Locate the key: HKEY_USERS\.Default\Control Panel\Keyboard 3.Change the...
View ArticleChecking for Non Windows Software updates on your Windows Workstation
Kevin Mitnik, a well known security expert, advised during a Citrix TV interview of a new software program called PSI (Personal Software Inspector) that allows you to check for non-Windows software...
View ArticleDo we really use the Logonserver variable for anything? Actually we do!
If you are in a domain environment, using a workstation and you need to find out the Domain Controller that authenticated you into the domain when you logged in, here is how: Use the CLI command: SET...
View ArticleHappy 15th Birthday Mozilla!
Mozilla is celebrating 15 years of accomplishments. This is a collage of 15 facts that made Mozilla unique (pasted from Mozilla 15 page )
View ArticlePaying less for Internet phone service or VOIP
I am testing a new phone system called Ooma. The basic system costs less than 5 dollars a month for the government taxes (there are “NO” monthly service fees). The premier plan costs about 10.00 a...
View ArticleChecking if “Disable Popup windows” is set on the about:config file of Firefox
If you wish to disable any popups from the Mozilla browser plug-in, a strategy to bypass popup blockers use the about:config file. To enable this feature in firefox follow the below steps. Open Mozilla...
View ArticleDid you get you TED-ED lesson today?
http://blog.ed.ted.com/2013/03/14/1066/ top 10 lessons from Ted-Ed
View Article