Removal from IM list?Fri, 21 Dec 2012 00:50:20 You have been automatically removed from the IM list (im) as a result of repeated delivery error reports from your mail system. This decision was based on the list’s automatic error monitoring policy and has not been reviewed or otherwise confirmed by a person. If you receive [...]
Answer Question | December 26, 2012 8:43 AM
AIM, Instant Messaging
I need to run AIM on a terminal server, problem is that when 1 user saves the screen name and password, others get that loaded when they log in.
Answer Question | November 13, 2008 4:09 PM
AIM, Terminal Server
Can instant messages be intercepted on corporate networks? Basically, do programs exist that network folks can use to intercept instant messages while logged on to a corporate network? Is Big Brother watching? Thanks.
Answer Question | June 22, 2006 5:05 PM
AIM, Instant Messaging
i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and [...]
Answer Question | April 27, 2006 3:30 PM
Access, Access control, AIM, Application security, Availability, backdoors, Backup & recovery, Bandwidth, Biometrics, Brightmail, Browsers, Budgeting, Business/IT alignment, Career development, CipherTrust, ClearSwift, CLP, Compliance, configuration, CRM, Current threats, Data analysis, Database, DataCenter, Desktops, Digital certificates, Disaster Recovery, Encryption, Ethernet, Exchange, Exchange security, FDDI, filtering, Firewalls, Forensics, Frame Relay, Hacking, human factors, Identity & Access Management, Incident response, Instant Messaging, Intrusion management, Laws, Management, McAfee, MessageLabs, Microsoft Office, Microsoft Windows, Network protocols, Network security, Networking, OS, Outsourcing, Patch management, patching, PEN testing, Performance management, Ping, Platform Security, Policies, Postini, Project management, provisioning, Regulations, Risk management, Rockliffe, ROI & cost justification, Secure Coding, Security, Security Program Management, Security tokens, Servers, Single sign-on, Spam, SpamAssassin, Spyware, SQL Server, SSL/TLS, standards, Storage, Symantec, TrendMicro, Trojans, Vendors, Viruses, VPN, vulnerability management, Web development, Web security, Web services, Web Services Standards, Wireless, worms
What is messaging and collaboration,how does it works,how to set it up ,where can it be implemented and how
Answer Question | January 12, 2008 8:40 AM
AIM, Availability, Bandwidth, Billing and customer care, Billing Support Systems, Brightmail, Budgeting, Business Objects, Business/IT alignment, Career development, Certifications, Cognos, Compliance, CRM, Crystal Reports, Data analysis, Data mining/analysis, Data warehousing applications, DataCenter, DataManagement, Development, Enterprise Desktop, ERP, Exchange, Instant Messaging, Laws, Lifecycle development, Linux, MySQL, Network monitoring, Network protocols, Networking, Outsourcing, Regulations, Spam, standards, Training, Web development
I am running Exchange 2003 and Win2k3 servers. we get a ton of spam, and I want to stop it. What in your opinion are the best SPAM softwares and why? (such as strong points and weak points) let’s hear it….
Answer Question | November 21, 2005 11:11 AM
AIM, Application security, Availability, backdoors, Bandwidth, Budgeting, Compliance, CRM, Current threats, Database, DataCenter, Desktops, Development, Disaster Recovery, Encryption, Exchange, Exchange security, Firewalls, Forensics, Hacking, Hardware, human factors, Incident response, Instant Messaging, Intrusion management, Management, Microsoft Windows, Network monitoring, Network security, Networking, OS, Patch management, Performance management, Policies, Risk management, Secure Coding, Security, Security Program Management, Servers, Spyware, SQL Server, Trojans, Viruses, VPN, Wireless, worms