...67891011
  • Restricted access to win XP professional

    I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks...

    BinooDas123410 pointsBadges:
  • Microsoft: Active Directory Migration Tool (ADMT)

    Hi, I want to migrate a couple of users, computers and groups from an Windows NT 4.0 Domain to Active Directory (Windows 2003 NATIVE MODE Domain). The migration is not for the entire NT Domain, is only a group of users and computers from this one. I had used ADMT on a single forest to reorganize...

    Schnell0 pointsBadges:
  • Information Security

    1. Could you please send me a portal policy template as we are about to rollout same. Thanks 2. Please send me FTP policy template. I wil then customize it to our environment

    Mofolo000 pointsBadges:
  • Network Design Development

    How do I create a network design for a large business? The following is the scenario and the requirements, I need so help please. An Ice Cream Factory with 5 stores, citywide and has connectivity to the corporate office in Austin. Each store is responsible for maintaining its inventory locally, but...

    ITgirl840 pointsBadges:
  • who integrated Domino Admin Server Monitoring in CA Unicenter NSM Console?

    We only want one monitor in our IT production environment: CA Unicenter NSM Console. Therfore we want that all irregular events of Domino Administrator Server Monitoring are sent to CA Unicenter NSM Console. Has anybody done this or can give hints or tips? Thanks a lot.

    Fred0 pointsBadges:
  • Wireless Security

    We are running an NT4 network in one building with about 50 users. I have recently installed a LinkSys WAP with a 32-bit WEP encryption key, so when our sales guys come in with their Thinkpads, they don't have to fight for network points. I have programmed the encryption key into their laptops, so...

    Tinners0 pointsBadges:
  • Network UserID Creation/Change

    Looking for White Papers, Best Practices, Your Practice...on UserIDs What should a Network UserID look like for strong security? I don't believe it should contain any part of the user's legal name. Agree? So what do you use to create a UserID? Should a user be able to change their UserID? Thanks...

    GPHdo60 pointsBadges:
  • High Availablility

    I would like to suggest the best standby, data Guard, or other High Availability solution to management. Specifically, I would like to compare Oracles Standby High availability solutions to Replistor -- I believe by EMC. Currently we have about 12 Windows based Oracle Servers, but the solution can...

    Paralogist0 pointsBadges:
...67891011

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following