Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
I'm opening an item on someone's calendar that I have permission to access I receive an error message saying "Cannot open this item. Cannot open the free/busy information. The folder already exists." What does this mean and how can it be fixed?
Hi, I've upgraded an iSeries machine from V5R4 to V6R1 and found the IDEVEXR product is in *ERROR status. Would anyone like to explain me what that product is, why it is in that status, and how to fix it, please? Many thanks! Marcos
Dear All, I need your contribution to help a small enterprise. The new Finance Officer (a friend) ask me to audit is Infrastructure and make proposal for immediate implementation in order to improve security and company equipment performance. Here is the actual infrastructure: -1 IT help desk...
I have been thinking about this for a while. A lot of my friends, family, and colleague ask me what is best as an antivirus. I would like to get some feedback from the community on what everyone thinks is the best antivirus they have used for personal and or business use and the reasons why. A lot...
I have a network of 10 computers: 9 Win XP & 1 server 2003 . I have enabled NAT on server 2003 for the purpose of sharing the Internet on all computers. The Internet is running well but all the computers can't access the server 2k3 machine from the workgroup and all the other computers are...
Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...
I have issues with a lot of my users surfing inappropriate sites. Is there a way to find out, what sites they are surfing without them knowing. I would like to add those site to my banned sites in my firewall to stop it. Thanks in advance.
Good day, We are using Windows 2000 Small Business Server in our organization with Exchange, DNS and ISA server configured. 1. I want to monitor the internet usage by the users. 2. I want to take a report on monthly or daily basis how much MB/GB utilized by each user. Thanks for your reply in...
Hey guys, Kind of a followup to a previous message. I had set up my server with SurgeMail, and able to send to the outside world. I am currently running it on a 2000 server box under a domain that is different than what the mail domain is on the mail server. My MX record is pointed in the right...
Hi everyone, I am trying to filter/manage a gateway through a Helius router for directway. We are running Windows 2000 Server with all XP clients, around 50 of them. We have active directory running with the domain controller handing out DNS and DHCP to clients. All clients are pointing to the...
In our company, the IT department set some policies to be able to control accessing inappropriate sites and other illegal sites. As an auditor, are we exempt from their policies because even accessing Yahoo mail is banned? There are times we need to research needed by the Top Management but we...
We have a UTM firewall for using a internet processing to our clients. How do we block the inappropriate sites i.e is unwanted URLs, and how to configure the same in my UTM firewalls.
Often times many consumers get these e-mails from Nigeria, Russia, China and so on purporting a long drawn out story about a deceased king and so on. They can be caught by looking at their headers, but I've been told sometimes they use fake e-mail addresses. Is their a fool proof way to identify...
Hi all, I have 30+ windows 2000 clients running of a NT4 Server. The clients are locked down via gpedit but due to teacher requirements need the right click enabled. What i want to do is either: Stop any changes to desktop, or set a default wallpaper that cannot be changed. We have no money despite...
Hello sir I want to know how to block different websites and messenger through ISA-Server 2004.
Hi, I need to export sender email address from public folders on our MS 2007 Exchange Server
Hi, I may have invented a new kind of inheritance in programming languages, I called it "deep inheritance". Suppose that Companies have Employees. Now Suppose that there are two kinds of Companies: privately held companies and publicly traded companies. Now, the employees from publicly traded...
Is there a way to print off all text messages from one user without having to save screen shots and printing the pictures? (iPhone4)
If the receiving dock receives every line item of a PO to the wrong account code, is there a way to change all line items at once instead of doing 1 line item at a time?
How can I get the system to print reports automatically without having to go in and change each queue for every report needing printed?