28 de jan de 2011

Use BGInfo to Build a Database of System Information of Your Network Computers

Use BGInfo to Build a Database of System Information of Your Network Computers: "

One of the more popular tools of the Sysinternals suite among system administrators is BGInfo which tacks real-time system information to your desktop wallpaper when you first login. For obvious reasons, having information such as system memory, available hard drive space and system up time (among others) right in front of you is very convenient when you are managing several systems.

A little known feature about this handy utility is the ability to have system information automatically saved to a SQL database or some other data file. With a few minutes of setup work you can easily configure BGInfo to record system information of all your network computers in a centralized storage location. You can then use this data to monitor or report on these systems however you see fit.

BGInfo Setup

If you are familiar with BGInfo, you can skip this section. However, if you have never used this tool, it takes just a few minutes to setup in order to capture the data you are looking for.

When you first open BGInfo, a timer will be counting down in the upper right corner. Click the countdown button to keep the interface up so we can edit the settings.


Now edit the information you want to capture from the available fields on the right. Since all the output will be redirected to a central location, don’t worry about configuring the layout or formatting.


Configuring the Storage Database

BGInfo supports the ability to store information in several database formats: SQL Server Database, Access Database, Excel and Text File. To configure this option, open File > Database.


Using a Text File

The simplest, and perhaps most practical, option is to store the BGInfo data in a comma separated text file. This format allows for the file to be opened in Excel or imported into a database.

To use a text file or any other file system type (Excel or MS Access), simply provide the UNC to the respective file. The account running the task to write to this file will need read/write access to both the share and NTFS file permissions.


When using a text file, the only option is to have BGInfo create a new entry each time the capture process is run which will add a new line to the respective CSV text file.


Using a SQL Database

If you prefer to have the data dropped straight into a SQL Server database, BGInfo support this as well. This requires a bit of additional configuration, but overall it is very easy.

The first step is to create a database where the information will be stored. Additionally, you will want to create a user account to fill data into this table (and this table only). For your convenience, this script creates a new database and user account (run this as Administrator on your SQL Server machine):

@SET Server=%ComputerName%.
@SET Database=BGInfo
@SET UserName=BGInfo
@SET Password=password
SQLCMD -S “%Server%” -E -Q “Create Database [%Database%]“
SQLCMD -S “%Server%” -E -Q “Create Login [%UserName%] With Password=N’%Password%’, DEFAULT_DATABASE=[%Database%], CHECK_EXPIRATION=OFF, CHECK_POLICY=OFF”
SQLCMD -S “%Server%” -E -d “%Database%” -Q “Create User [%UserName%] For Login [%UserName%]“
SQLCMD -S “%Server%” -E -d “%Database%” -Q “EXEC sp_addrolemember N’db_owner’, N’%UserName%’”

Note the SQL user account must have ‘db_owner’ permissions on the database in order for BGInfo to work correctly. This is why you should have a SQL user account specifically for this database.


Next, configure BGInfo to connect to this database by clicking on the SQL button.


Fill out the connection properties according to your database settings.


Select the option of whether or not to only have one entry per computer or keep a history of each system.


The data will then be dropped directly into a table named “BGInfoTable” in the respective database.


Configure User Desktop Options

While the primary function of BGInfo is to alter the user’s desktop by adding system info as part of the wallpaper, for our use here we want to leave the user’s wallpaper alone so this process runs without altering any of the user’s settings.

Click the Desktops button.


Configure the Wallpaper modifications to not alter anything.


Preparing the Deployment

Now we are all set for deploying the configuration to the individual machines so we can start capturing the system data.

If you have not done so already, click the Apply button to create the first entry in your data repository. If all is configured correctly, you should be able to open your data file or database and see the entry for the respective machine.


Now click the File > Save As menu option and save the configuration as “BGInfoCapture.bgi”.


Deploying to Client Machines

Deployment to the respective client machines is pretty straightforward. No installation is required as you just need to copy the BGInfo.exe and the BGInfoCapture.bgi to each machine and place them in the same directory.

Once in place, just run the command:

BGInfo.exe BGInfoCapture.bgi /Timer:0 /Silent /NoLicPrompt

Of course, you probably want to schedule the capture process to run on a schedule. This command creates a Scheduled Task to run the capture process at 8 AM every morning and assumes you copied the required files to the root of your C drive:

SCHTASKS /Create /SC DAILY /ST 08:00 /TN “System Info” /TR “C:\BGInfo.exe C:\BGInfoCapture.bgi /Timer:0 /Silent /NoLicPrompt”

Adjust as needed, but the end result is the scheduled task command should look something like this:


Download BGInfo from Sysinternals


27 de jan de 2011

Manage your VirtualBox VMs via the web with phpVirtualBox

Manage your VirtualBox VMs via the web with phpVirtualBox: "

Generally speaking, if it is a web-based tool that starts with “php” (such as phpMyAdmin or phpLDAPadmin) you know that tool is going to make your administrative life a lot easier. Such is the case with a php-based tool created to help you manage all of your VirutalBox VMs from a single tool, from anywhere (so long as said “anywhere” is accessible from, you guessed it, anywhere).

I do use VirtualBox and was thrilled to come across phpVirtualBox. This tool is an AJAX implementation of the familiar VirtualBox user interface, so the minute you log in you will be instantly at home. Let’s take a look at how this tool is installed and used.

First things first

You need to make sure you have the latest VirtualBox installed as well as the Extension Pack. You can run phpVirtualBox with the 3.x release of VirtualBox, but there are a lot more features available in the 4.x release. You can download both from the VirtualBox download page. You will also need to have the PHP Soap extension. This can be installed by searching for the package php-soap in your Add/Remove Software tool. Once you have that installed, you are then ready to install and configure the phpVirtualBox application.

You will also have to have a working Apache server on the target machine. If you do not have that, you can go ahead and do a full LAMP install (which will cover a lot of your basics).

Installing phpVirtualBox

First download the compressed installation file from the download page. Make sure you download the release that is correct for the version of VirtualBox you have installed. What you need to do is to move that file into your web server’s document root and then unpack it. When you unpack the file you will have a newly created directory /var/www/phpvirtualbox-XXX Where XXX is the release number. I highly recommend you rename that directory to just /var/www/phpvirtualbox.

After you have the file unpacked, you need to do a minor configuration. This minor configuration is in the /var/www/phpvirtualbox/config.php. NOTE: Depending upon your distribution, your document root will differ.

You really only need configure the following options:

  • var $username
  • var $password

Make sure the username and password are for the user that will actually run the virtualbox application (so this won’t be a root user).

You are now ready to fire up daemon. To run this simply issue the command vboxwebsrv. This will run the daemon that will allow you to log into your phpvitualbox machine. NOTE: If you are using VirtualBox 4.x you can start the daemon with the command /etc/init.d/vbweb-service. There is one catch with that, you still want to run the web service as the user that will run VirtualBox.

Log in

Open up a browser and point it to http://ADDRESS_TO_SERVER/phpvirtualbox. When you do this you will see the VirtualBox interface embedded into your web browser. You can then use VirtualBox from within that web browser as if it were on the local machine!


If you are running VirtualBox 3.x you will need to take one other step (prior to starting up the daemon). Open up your terminal window and issue the command:

VBoxManage setproperty websrvauthlibrary null

Once that command has run, you can then start up the daemon and use VirtualBox through your webbrowser.

© Jack Wallen for gHacks Technology News, 2011. | Permalink | Add to del.icio.us, digg, facebook, reddit, twitter
Post tags: , ,


26 de jan de 2011

How to Quickly Add Multiple IP Addresses to Windows Servers

How to Quickly Add Multiple IP Addresses to Windows Servers: "

If you have ever added multiple IP addresses to a single Windows server, going through the graphical interface is an incredible pain as each IP must be added manually, each in a new dialog box. Here’s a simple solution.


Needless to say, this can be incredibly monotonous and time consuming if you are adding more than a few IP addresses. Thankfully, there is a much easier way which allows you to add an entire subnet (or more) in seconds.

Adding an IP Address from the Command Line

Windows includes the “netsh” command which allows you to configure just about any aspect of your network connections. If you view the accepted parameters using “netsh /?” you will be presented with a list of commands each which have their own list of commands (and so on). For the purpose of adding IP addresses, we are interested in this string of parameters:

netsh interface ipv4 add address

Note: For Windows Server 2003/XP and earlier, “ipv4″ should be replaced with just “ip” in the netsh command.

If you view the help information, you can see the full list of accepted parameters but for the most part what you will be interested in is something like this:

netsh interface ipv4 add address “Local Area Connection”

The above command adds the IP Address (with Subnet Mask to the connection titled “Local Area Network”.

Adding Multiple IP Addresses at Once

When we accompany a netsh command with the FOR /L loop, we can quickly add multiple IP addresses. The syntax for the FOR /L loop looks like this:

FOR /L %variable IN (start,step,end) DO command

So we could easily add every IP address from an entire subnet using this command:

FOR /L %A IN (0,1,255) DO netsh interface ipv4 add address “Local Area Connection” 192.168.1.%A

This command takes about 20 seconds to run, where adding the same number of IP addresses manually would take significantly longer.

A Quick Demonstration

Here is the initial configuration on our network adapter:

ipconfig /all


Now run netsh from within a FOR /L loop to add IP’s to this adapter:

FOR /L %A IN (10,1,20) DO netsh interface ipv4 add address “Local Area Connection” 192.168.1.%A

After the above command is run, viewing the IP Configuration of the adapter now shows:



16 Stable & Free IDEs For Designers/Developers

16 Stable & Free IDEs For Designers/Developers: "

For a productive development process, every web designer/developer needs tools that are functional and make you feel comfortable.

An IDE (integrated development environment) is possibly the most frequently used tool as it is your touch to the code whether you're building something from scratch or applying just a small update.

And, you don't have to use only a single IDE, maybe something complicated with a debugger, built-in FTP, etc. as the main code editor and something simpler for quickly making updates + viewing source codes.

Here are 16 free IDEs for designers/developers that are used widely and proven to be stable:

Aptana Studio (Windows, Mac, Linux)

Aptana Studio

Aptana Studio is a very impressive and open source development tool that supports HTML5, CSS3, JavaScript and Ruby, Rails, PHP & Python on the server side.

It has a "code assist" feature where you can find out details about functions, elements, etc.

You can stay synchronized with the server via FTP, SFTP and control your code with the help of an integrated debugger.

There are many other features that will ease the development process including Git integration or a built-in terminal.

Komodo Edit (Windows, Mac, Linux)

Komodo Edit

Komodo Edit is an open source application that has support for PHP, Python, Ruby, JavaScript, Perl, Tcl, XML, HTML 5 and CSS 3.

It has syntax coloring, folding, background syntax checking, auto-complete and calltips.

There are lots of extensions created by the community that will help you customize it more.

Code::Blocks (Windows, Mac, Linux)


A flexible IDE, focused on C/C++ code, that can be extended very easily with its powerful plugin support.

It has syntax highlighting, code folding, auto-completion and a tabbed interface.

There is also a task manager to simplify working on the same project for multiple users.

Aptana RadRails (Windows, Mac, Linux)

Aptana RadRails

Similar to Aptana Studio, RadRails is also a great code editor that is open source. With only one difference, it is focused on Ruby on Rails applications.

It includes support for project navigation, smart code assistance, visual debugging and structure outlining.

Eclipse (Windows, Mac, Linux)


Eclipse is a free, state-of-the-art Java development environment (there are also JS, PHP and C/C++ versions).

It has a very active community and many open source plugins + developer tools built around the ecosystem.

CodeLite (Windows, Mac, Linux)


An open source IDE for C/C++ which can be easily extended with plugins.

It has a XML-based syntax highlighting for most of the popular languages and has a powerful code-completion mechanism.

Visual Studio Express (Windows)

Microsoft Visual Studio Express

Express products are the lighter versions of the Microsoft's popular developer tools (but they are still powerful).

There are various programs provided under 4 categories:

  • Web

  • Desktop

  • Mobile

  • Database

Each program targets a Microsoft platform (Windows Mobile, SQL Server, etc.) and they are very handy if you're developing in these platforms.

NetBeans (Windows, Mac, Linux)


It consists of an open-source IDE and an application platform that enable developers to rapidly create web, enterprise, desktop, and mobile applications.

Java is the main platform and it also supports JavaFX, PHP, JavaScriptx, Ruby +Ruby on Rails, Groovy and Grails and C/C++.

Xcode (Mac)


Xcode is the "Mac way" of building for Apple-powered platforms.

It includes features to complete all the build, debug and test cycles.

A graphical editor (Interface Builder) helps designing every aspect of your iOS or Mac OS Xapplication’s graphical user interface.

For iPhone developers, there is a full-featured simulator for a complete testing of the output and much more.

MochaCode (Mac)


A Java IDE that offers a complete "Mac" user experience with text editors, keyboard shortcuts, toolbars, etc., all behaving exactly as you would expect from a Mac application

There is a powerful code assistant with auto-complete and a library displaying any parameters related to the code.

Geany (Windows, Mac, Linux)


Geany is a simple-yet-powerful IDE that support all major filetypes.

It supports code-folding, auto-completion, code navigation and new features can be added with the plugin support

PSPad (Windows)


The editor supports many file types and languages, with syntax highlighting.

There are macros, clip files and templates to automate repetative tasks.

Other features include an integrated HEX editor, FTP client, macro recorder, code explorer and more.

Anjuta DevStudio (Linux)

Anjuta DevStudio

With a simple user interface, Anjuta has many features including project management, application wizard, interactive debugger, source editor, version control, GUI designer, profiler and many more tools.

Also, the functionality can be extended quickly with thanks to its plugin support.

KDevelop (Windows, Mac, Linux)


The IDE supports many programming languages like C, C++, Fortran, Java, Pascal, Perl, PHP, Python and Ruby.

It has built-in project management, debugger and can be extended with plugins.

Notepad++ (Windows)


Notepad++ is actually an advanced text editor and a must-have for every developer using Windows.

It has syntax highlighters for every popular scripting language and it is usually a perfect fit for a 2nd IDE, for small updates or simpler codes (however, there are many developers who only use it).

Multiple tabs can be created, macros can be used and there are many other features like code folding, advanced search, etc.

ConTEXT (Windows)

ConTEXT Editor

Similar to Notepad++, ConTEXT is an advanced text editor where you can work on unlimited files at the same time.

Besides features like syntax highlighting and multilanguage interface, it enables you to store code templates, record macros, compare files and more.

Also, it has customizable help files for each file extension.

Special Downloads:

Ajaxed Add-To-Basket Scenarios With jQuery And PHP

Free Admin Template For Web Applications

jQuery Dynamic Drag’n Drop



Professional XHTML Admin Template ($15 Discount With The Code: WRD.)

Psd to Xhtml

SSLmatic – Cheap SSL Certificates (from $19.99/year)


24 de jan de 2011

Evolving backup: From tape to disk to cloud or none at all?

Evolving backup: From tape to disk to cloud or none at all?: "

Evolving backup: From tape to disk to cloud or none at all?

Takeaway: Scott Lowe shares his thoughts about various data protection options. He also discusses why some organizations, including Microsoft IT, are eliminating backups altogether.

The backup market continues to expand with new options and capabilities, despite the fact that organizations tend to be pretty conservative when it comes to making large scale changes to backup infrastructure and processes. These backup options come with new processes and opportunities that can be exploited for improved disaster recovery or streamlined operations.

In a September 2010 TechRepublic article, I discussed Westminster College’s pending migration from Backup Exec to Microsoft’s Data Protection Manager 2010 and, more recently, I provided an update to that article that outlines where we are now. However, with the move from a 100% tape-based backup infrastructure to a disk-to-disk-to-tape system, we’ve only made the next logical step in the backup and recovery process; there are still lots of options at our disposal, but not all of them fit our needs. In this article, I discuss other data protection options I’ve seen and heard about and provide my thoughts about each one.

Tape-only backups

Yesterday’s legacy tape-only backup mechanisms are becoming obsolete, as organizations look for different ways to maintain highly available infrastructures that are also able to withstand disasters. I admit that Westminster has been behind the curve a bit in our backup/recovery processes, but we’d been served well by those processes until only recently.

We recognized the significant drawbacks that tape-only backups provide for growing organizations, including:

  • Limited opportunity for backup. Tape is slow. It’s common to see once per day incremental or differential backups that follow a once per week full backups. Organizations don’t want to see backup operations significantly impact production resources, so these backup operations are pushed to the wee hours of the morning and to weekends.
  • Slow recovery. Recovering from a tape backup is no fun. It’s slow, error prone, and can be difficult, depending on the number of tapes from which data has to be recovered.
  • Equipment challenges. It’s not uncommon for tapes to be usable only in the drives that wrote the data in the first place with the software that did it. So, recovering with a newer tape unit might not be possible.

Disk-only backups

The move to a disk-based backup and recovery architecture makes a lot of sense when you consider the potentially huge benefits, including easy expansion of available disk space, speed increases that result in more continuous protection, and very fast recovery.

The primary downside to a disk-only backup architecture is the possibility of failure. Organizations are not as likely to place the same availability importance on the backup system, so it’s more prone to failure than other production systems. If a backup system suffers a catastrophic failure that results in the loss of all protected data, an organization is left at significant risk. This is why I strongly believe that disk-based backup systems need to be augmented with tape-based or cloud-based backup systems that add an additional layer of protection to the mix.

Although the addition of disk to a tape-only backup infrastructure isn’t a silver bullet, it can solve, in many instances, the slow backup and recovery problems that plague tape-only installations. Disk is much faster than tape. When coupled with tape, organizations can get the best of both worlds — quick backup and quick short-term recovery, along with long-term backup to tape that doesn’t impact production systems.

The same physical equipment challenges around tape remain, but these challenges are often worth it to add another layer of protection to the environment.

Cloud-based backups

In a July 2010 TechRepublic article, I outlined five challenges that organizations will face when moving backup to the cloud, which are: cost, insufficient bandwidth, security issues, recovery challenges due to the aforementioned bandwidth shortage, and the reliability of the vendors providing the service.

The benefits of cloud-based backups include:

  • Simplicity. Many cloud providers offer a “set it ad forget it” operation when it comes to data protection.
  • Reduced infrastructure complexity. In theory, moving to an outsourced provider can reduce how much equipment is necessary to achieve a goal. This would include a backup service, depending on how that service is used.
  • An additional option or tier. Cloud backup is not likely to fully supplant on-premises solutions, particularly for medium and large businesses. It does, however, present an additional option or protection layer that did not used to be available.

Application-provided protection

I’m not going to describe all of the possible application-level protection possibilities out there; instead, I’ll focus on one option that I find particularly interesting: Exchange 2010 Database Availability Groups (DAGs). On the surface, DAGs are simply an availability mechanism, but then again, that’s sort of the role that backups play, too.

Microsoft IT has taken DAGs to a whole new level and made the decision to implement DAGs and eschew traditional Exchange backups altogether. Here’s an excerpt from the document entitled Exchange Server 2010 Design and Architecture at Microsoft:

Decrease costs. This included redesigning server architectures and backup solutions for high availability to meet challenging SLAs. In redesigning server architectures, Microsoft IT heavily focused on incorporating the features directly available in Exchange Server 2010, replacing continuous cluster replication (CCR)-based Mailbox server clusters with the new database availability groups (DAGs), and eliminating backups altogether. All of these considerations resulted in significant cost savings.

In short, Microsoft got rid of its backup infrastructure by carefully implementing DAGs to replace the role that was formerly occupied by backup software, hardware, and processes.

I’ll be surprised if I see a lot of companies eliminating traditional backups in favor of other availability mechanisms. I tend to look at availability mechanisms such as DAG as more dynamic protection schemes, while traditional backups offer some kind of “static expectation” on which I can depend. Dynamic and truly continuous is good, but I find that I like the safety that comes with some kind of point-in-time backup, even if it’s being taken as often as every 15 minutes.


The line between backup and availability is somewhat blurry, as evidenced by Microsoft IT’s decision to eliminate backups. The choice about what to use for backup depends on the organization’s needs and may include just one traditional option, such as tape, or it might continue to rely on local infrastructure that is then augmented with a cloud layer that provides additional protection.

Related TechRepublic resources


The 10 hottest 10 Things lists of 2010

The 10 hottest 10 Things lists of 2010: "

The 10 hottest 10 Things lists of 2010

By Jody Gilbert

December 20, 2010, 9:41 AM PST

Takeaway: Tools, tweaks, and troubleshooting strategies took top billing in the 10 Things blog this year. Here’s a look at the most popular lists of 2010.

In 2010, we posted roughly 160 lists in the 10 Things blog, covering topics that ranged from registry hacks, job search strategies, and database design to Windows 7 power tweaks, system slowdowns, and IPv6 addressing. The following 10 articles topped this list of lists.

1: 10 must-have Android apps

The Android Market is teeming with apps that can make your life easier in countless ways. These 10 are among the best.

2: 10 ways you might be breaking the law with your computer: UPDATED

Legislation that affects the use of Internet-connected computers continues to grow in its reach and its complexity. To help you avoid any infractions, we’ve revised this list to include new and pending laws and recent rulings.

3: Top 10 Windows 7 desktop gadgets

Windows 7 gadgets offer added functionality and convenience in a variety of ways. Here are a few you may want to add to your desktop.

4: 10 tech tasks you should be able to do in your sleep

Nearly all the jobs you tackle will require you to handle certain fundamental tasks. Make sure these essential skills are part of your repertoire.

5: 10 Linux rescue tools for recovering Linux, Windows, or Mac machines

When you’re dealing with a system that won’t boot, you need a robust and dependable recovery tool. These Linux tools might save the day.

6: 10 iPad business apps worth loading

How business-friendly is the iPad? Pretty darn friendly, says one IT consultant — as long as you load the right apps.

7: The 10 best IT certifications: 2010

The certification landscape changes as rapidly as the technologies you support. Here’s an updated list of certs that currently offer the most value and validity for IT pros.

8: 10+ mistakes Linux newbies make

You can make things a lot less frustrating for your new Linux users by helping them avoid these typical rookie mistakes.

9: 10 things you should never do on a consulting job

There are plenty of ways to shoot yourself in the foot when you’re out on a job. See whether you’ve committed any of these offenses.

10: The 10 best cross-platform applications

In this cross-platform world, you need apps that can handle whatever systems you’re supporting. Jack Wallen lists the cross-platform applications he thinks are indispensable.

Next year?

What technologies, issues, and solutions would you like to see covered in the 10 Things blog during 2011? Please post your suggestions below and help us develop content that targets your needs.

The 10 hottest checklists, forms, and templates of 2010

The 10 hottest checklists, forms, and templates of 2010: "

The 10 hottest checklists, forms, and templates of 2010

Takeaway: TechRepublic published nearly 400 original downloads in 2010 — from cost calculators to cheat sheets to logs, templates, and PowerShell scripts. Here’s a rundown of some of the most popular items of the year.

This year, we added hundreds of resources to the TechRepublic downloads library, including PDFs detailing the latest technologies, problem-solving techniques, and tips for handling tasks efficiently. We also updated a few favorite custom tools and introduced some new ones. Among the biggest crowd-pleasers were several checklists designed help you systematically address tasks ranging from server deployments to virus removal to project risk management. Here’s what you liked best in 2010.

1: Workstation Tune-up Checklist

Optimizing a slow-performing system requires a number of diagnostic and repair steps, often with interruptions along the way. This basic checklist will help you cover all the bases.

2: Virus & Spyware Removal Checklist

Eliminating malware requires a systematic process with no missed steps. This checklist will make it easier to do an effective, thorough job.

3: Definition Template for Smaller Projects

The first step in project planning is to define the work. This template will help you create a definition document to guide you through small to medium-size projects.

4: Project Action Item Log

Tired of meetings where the follow-up actions fizzle? Want to see a little more accountability so your projects actually get done the right way — and on time? This simple form will help you keep track of who’s supposed to handle what.

5: Network, PC, and server audit checklist

IT consultants can complete the fields within this checklist to catalog critical client network, workstation, and server information, identify weaknesses and issues that must be addressed, prioritize the issues the checklist reveals, and assign cost estimates to needed upgrades and repairs.

6: Server Deployment/Migration Checklist

One configuration error or overlooked step can send your server deployment off a cliff. This simple checklist will help you complete the process efficiently and avoid costly mistakes.

7: Computer Hardware Inventory List

When you’re troubleshooting hardware problems, you need to know the make and model of the equipment you’re dealing with. But if you’ve never worked on the PC before, that can be a challenge. This update of our hardware inventory list will make it easy to record the necessary details for quick reference.

8: Telephone Interview Cheat Sheet

Speed up the hiring process by making the most of phone interviews. This cheat sheet can serve as a template for all your phone interview needs.

9: Daily Security Checklist

Hacking is a 24/7 business, but not everyone can afford 24/7 security managers. This checklist covers tasks you can perform every day to help safeguard your network even without a round-the-clock security staff.

10: Project issue submission form

Attempts to track the problems that arise in the course of a large project can quickly get out of hand. This simple form makes it easy to record the key aspects of a problem so that everyone knows how it may affect the project, who’s in charge of fixing it, and how and when it’s resolved.