Hacking Application Compatibility Toolkit 5.5 Logs

Disclaimer: The information in this article is for educational purposes only, provided "AS IS" with no warranties, and confers no rights. If you use it, you are actually hacking your ACT implementation, and therefore will be completely on your own, in an unsupported state. USE AT YOUR OWN RISK. After writing the needed disclaimer, today…

1

The Case Of… Windows 7 Network Connections empty folder

Well… this is not an Identity Management specific post, but I would like to make my blog more content wide and cover other areas of work and experience, so here it goes the first non-Identity post :). For some unknown reason, it happened to me that my “Network Connections” folder in Windows 7 x64 got…

28