I would highly recommend strengthening the authentication/authorization on your wi-fi. WEP and WPA are no longer strong enough. WPA2 and other authentication methods (LEAP, PEAP, EAP) are better. Are your AP’s Cisco based or do they have command line access? It might be possible to script some type of scheduled task to shutdown the wireless [...]
View Answer | August 24, 2010 3:05 PM
Wireless access, Wireless in 2010, Wireless Internet, Wireless Network, Wireless networking, Wireless security
The same thing will happen to wireless clients that happen to wired clients which have duplicate IP addresses. Connectivity for those two systems with be problematic and will include unreliable connections and intermittent loss of connectivity. You can still use “static” IP addresses with DHCP – these are called reservations. DHCP reservations make it easy [...]
View Answer | August 19, 2010 5:04 PM
Network management, Static IP, Static IP Configuration, wireless adapter, Wireless in 2010, Wireless Network, Wireless network management
Hi Apple, I found this article on how to <a href=”http://support.microsoft.com/kb/870702″>troubleshoot wireless network connections</a> in Windows XP Service Pack 2.
View Answer | August 17, 2010 3:26 PM
Acer, Wireless in 2010, Wireless Network, Wireless network management, Wireless networking, Wireless router
Better u use Webmin or NX for that issue. Also try to tune kernel and network
View Answer | August 14, 2010 4:26 AM
Backup, Bandwidth limits, File replication, Linux, Linux servers, Remote users, Wireless in 2010
I would never hang a mission critical server off the end of a wireless connection. Reasons would include interference which can cause potential packet loss or latency or worse, security is an obvious issue. Personally I would move the server into the server room.
View Answer | August 12, 2010 10:19 PM
Active Directory, Active Directory Connector, Wireless connection, Wireless in 2010
Not many people use it, and it isn’t backwards compatible with N.
View Answer | August 12, 2010 9:31 PM
802.11, 802.11 networking equipment, 802.11g, Wireless in 2010, Wireless PC cards, Wireless standards
You would need to setup something to listen on the bluetooth connection for a request. By default pretty much nothing will do this. Is it more secure than your WiFi? If your WiFi is setup correctly then no, probably not. It will be much slower than your WiFi, and only have a range of about [...]
View Answer | August 12, 2010 9:30 PM
Bluetooth, MSTSC, Server connectivity, Telnet, Wifi, Wireless in 2010, Wireless security
In System i Access V6R1, a new option is available. The menu bar Options drop-down has item Allow Save Results. When checked, you can right-click the results panel and select Save Results… to save the result set as a .CSV, among other choices. Prior to V6R1, I’d only expect to run CPYTOIMPF through Run SQL [...]
View Answer | August 12, 2010 8:32 PM
Ad Hoc, iSeries Navigator, SQL Query, SQL Scripting
You can easily list the channels currently used by other APs by running a free <a href=”http://www.corecom.com/html/wlan_tools.html”>Wi-Fi discovery tool</a> (aka “stumbler”). Since you’re using a PC, try MetaGeek InSSIDer or Xirrus Wi-Fi Inspector or the infamous NetStumber. But keep in mind that those other APs may be automatically changing their channels too, trying to find [...]
View Answer | August 12, 2010 4:56 PM
Wireless, Wireless in 2010, Wireless interference, Wireless Internet, Wireless routers
For the SonicWALL TZ170, you can get the info you’re looking for right from the wireless router’s log. From the web admin page, go to Log / Categories and make sure that 802.11 Management is checked off – this will log all Wi-Fi connection events. You may also want to check off the DHCP Client [...]
View Answer | August 12, 2010 3:53 PM
SonicWALL TZ 170, Wireless, Wireless Access Protocol, Wireless in 2010, Wireless Network, Wireless network security
Most modern VPN systems will transmit credentials in a secured fashion. That is part of the session negotiation. I think you are more at risk of using a compromised system (e.g. password stealing trojan, keylogger).
View Answer | August 12, 2010 3:34 PM
Unsecured Network, VPN, VPN connectivity, VPN security, Wireless connection, Wireless in 2010, Wireless security
You know, you don’t have to have the repeater right next to the pool to provide service to the pool area. Check the range of the repeater and put it in a nearby location that is covered and safe. The specs of the repeater will tell you the range.
View Answer | August 11, 2010 6:50 PM
Wireless Access Points, Wireless in 2010, Wireless Internet, Wireless Repeater, Wireless router configuration, Wireless routers
First, I’d never use a wireless connection for a server. I’ll always hard wire the server to at least a switch and use that for other machines that are stationary as well. I still believe that wireless connections are not stable enough, nor secure enough to be used for a valuable resource such as a [...]
View Answer | August 10, 2010 1:45 PM
Domain Controller, Windows Server 2003, Wireless connection, Wireless in 2010, Wireless Internet
An alternative would be to use ICS (internet connections sharing). Its been around since Windows 98 and still exists in Windows 7. Have a google for it. There are loads of guides already out there.
View Answer | August 6, 2010 4:00 PM
Dial-up, EVDO, LAN, Windows 7, Windows 7 Administration
maybe your start up option u can put to try to boot up using USB devices and see if it can work..
View Answer | August 6, 2010 11:00 AM
MacBook Pro, Windows 7, Windows XP, Windows XP Partitions
Thanks to everyone who participated in the Xbox 360/Amazon contest. And a big congratulations to our winners: <a href=”http://itknowledgeexchange.techtarget.com/profile/Mattmather/”>Mattmather</a> and <a href=”http://itknowledgeexchange.techtarget.com/profile/RichS/”>RichS</a> take home the Xbox 360s and <a href=”http://itknowledgeexchange.techtarget.com/profile/Carlosdl/”>Carlosdl</a>, <a href=”http://itknowledgeexchange.techtarget.com/profile/Technochic/”>Technochic</a>, and <a href=”http://itknowledgeexchange.techtarget.com/profile/Mrdenny/”>Mrdenny</a> take home the Amazon gift cards. Everyone else, keep earning points by <a href=”http://itknowledgeexchange.techtarget.com/itanswers/ask_question/”>asking</a> and <a href=”http://itknowledgeexchange.techtarget.com/itanswers/?tab=unanswered#questions”>answering</a> questions and taking [...]
View Answer | August 5, 2010 12:47 PM
DataCenter, DataManagement, Development, Exchange, ITKE Community, ITKE Contests, ITKE Feedback, ITKnowledgeExchange, Linux, Lotus Domino, Microsoft Windows, Mobile, SQL Server, VoIP
I know there is a version of <a href=”http://www.opera.com/mobile/download/versions/”>Opera </a>that works on the black berry. It probably won’t work any better though. ++++++++++++++++++++++ You can try the blackberry version of Opera, Blackberry’s own Browser, and in addition you can try utilizing “Bolt Browser” since it utilizes Java.
View Answer | August 2, 2010 7:02 PM
BlackBerry email, Blackberry email certifications, Browser security, Certified browser, Email security, Netscape Mail
Hi, Is this still and issue or have you managed to solve it? When you say the email is not inter-company, could it be the the non-company email is another POP3 setup which has a rule to forward to his Blackberry account? If it is a standard Exchange Server with BES installed and configured then [...]
View Answer | August 2, 2010 4:32 PM
BlackBerry Professional Software, Exchange 2003, Outlook 2007, Outlook Forwarding
NAC would simply be a security solution for your network while a WLC would assist in the actual deployment and operation of your wireless network. If you’re in the market for Cisco products, check out their descriptions of <a href=”http://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html”>Network Admission Controllers</a> and <a href=”http://www.cisco.com/en/US/products/ps6302/Products_Sub_Category_Home.html”>Wireless LAN Controllers</a>. Hope this helps!
View Answer | July 29, 2010 8:39 PM
Cisco Routers, Cisco Wireless LAN Controller, NAC, Wireless, Wireless LAN controller
I think Plaxo has a plug-in that would allow Outlook syncing (calendars included). www.plaxo.com.
View Answer | July 27, 2010 7:00 PM
Exchange, iPhone, Outlook, Outlook 2007, Outlook 2007 calendar, Outlook permissions