• Accessing Standby Laptop via network

    Hi there.. I want to know if there is any way that i make my laptop standby and still i can access it via remote desktop over network, i.e. my laptop doesnt lose its IP address or close its network interfaces in standby mode. Is there any wake-up call for standby laptop over network to achieve this...

    Khawar0 pointsBadges:
  • NT Domains

    Hey, We have 2 domains. Let's say domain 1 and 2. Both NT4 (yes, i know). Domain 1 has a range of 160.1 subnet 255.255.0.0, domain 2 162.1. . I'm situated in domain 1 and i want to make a BDC for domain 2. In the NT-server setup i can give IP or DHCP, DNS , WINS, .... Normally on our PC's we use...

    IvoCandries0 pointsBadges:
  • Locked Windows document files

    I recently reinstalled Windows on a user's computer. They were /are using WinXP Home and set their documents directory with security. I reinstalled the PC with their same user name and passwords, but they cannot open these files any longer. Is there a way to remove the security? Some of these files...

    Jonsimon0 pointsBadges:
  • Windows 2000 system tray problem

    I rebuilt a Windows 2000 from scratch. All installs are new. The icons in the system tray, next to the clock are very small (about the size of a pinhead). In addition for all windows the minimize, maximize, and close buttons the top right corner of the screen are also very small. There is no effect...

    Midnight67740 pointsBadges:
  • Merging Domains

    The company I work for is acquiring another company and I have been tasked with making the two domains coexist. Let's say the domains are abc.com and xyz.com The abc.com domain is a mixed mode environment (Windows 2000 and 2003 DCs). The xyz.com one has Windows 2000 native. Here are my questions....

    Brosley0 pointsBadges:
  • Folder Security

    We have a folder containing lots of confidential docs that supposedly accessible to all employees that should have read permission only. They should not be able to Print/Copy/SaveAs/E-Mail and do other docs stuff. Our IT staff had made the folder read only though people could still re-save the...

    ALVXSE870 pointsBadges:
  • Blocking pop access over http

    Dear you, How can I exactly block the following: 1- Hotmail pop access over http 2- Block skype phone calls 3- Block sites like gotomypc.com etc 4- Block internet file share drives like yousendit.com google drive Thank you Kindi

    KindiA0 pointsBadges:
  • NetBIOS-ssn (port 139)

    I got attacked thru NetBIOS-ssn port 139 according to Norton Worm Protection The intrusion is MS ASN1 Interger Overflow TCP The intruder's IP is always alternate thru the last two sets: 72.235.134.133(4223) Protocol is TCP I have no idea how to block the intrusion or trace the intruder so can...

    EEEEE50 pointsBadges:
  • Start-up Needed for DB design for workflow for BPO company

    Can any one give some usefull and urgent tips about database design example where i get for designing BPO company work flow parts...

    Malaikanirr0 pointsBadges:
  • Penetration Testing Career

    Hi Friends I want an advice from you guys. I have work exp in Web Developement and Quality Assurance. But my interest lies in security and penetration testing. Could you guys guide me where to start from. If there is any good material which can help me doing the same or some site where I can...

    DrDevil0 pointsBadges:
  • Printer default issue in XPPRO

    Good client presented this problem to me. We tried several tactics, and now are at a loss. His latest words to me: "I'm running Windows XP Pro, build 5.1, SP2. The printer that the system defaults to at reboot/startup is an HP 6210 "All In One", while the older workhorse that I want to use most is...

    EDtHeAd0 pointsBadges:
  • DDos traffic generator

    Hi all, We are testing SERVICE CONTROL ENGINE of Cisco. I would like to test the SCE for detecting and preventing DDOS traffic. For testing SCE, I need DDOS traffic generator software. I searched in the Google but i didn't get. Can anybody help me to find out a DDOS traffic generator software. Can...

    Mraj270 pointsBadges:
  • AD Migration or Domain Split?

    We currently have a customer with a single Windows 2000 Active Directory forest and a single domain that contains approx 2000 users spread across several geographically disburse locations worldwide. All locations have a domain controller located locally. We also have Exchange 2003 deployed. The...

    Cevans0 pointsBadges:
  • Capture screen w/scrolling marquee

    My company uses a 3rd party software. There's one screen that has a few graphs and a few lines that scroll across the screen. Similiar to a Screen Saver's Scrolling Marquee. They redesigned the software and this screen will no longer exist. I would like to capture this screen w/scrolling marquee....

    Drew65220 pointsBadges:
  • Check FTP

    Hi, We have a situation where the external Vendor wants us to test if a site is live and then transmit data. This needs to be done via FTP. We cannot use PING. Is there some sort of Check FTP connection command that is available so we can issue the command, check the return code and based on that,...

    Srajag0 pointsBadges:
  • fail over

    can someone give me an idea on how to create fail over... thanks and God bless!

    Desktopmed0 pointsBadges:
  • How do you manage Private Email Address for CEO in Exchange 2003

    How would YOU handle this? We have the CEO that wants a more private email and doesn't want to deal with all these people from the outside guessing his email and sending messages. We don't want that, if he uses a ceoPrivate@domain.com secondary mailbox, people can see his private email address. We...

    Ocarmona0 pointsBadges:
  • Ad Hoc in the corporate environment

    I am the LAN/WAN/WLAN administrator for a division of a very large corporation. I just received a Dell Latitude D-600, which has a built-in Intel Pro Wireless 2200BG. We have quite a few D-600's and D-610's. Looking through the wireless security alerts on my switch, I noticed that there were a lot...

    Larrythethird0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • one way trust NTFS permissions

    We have set up a one way trust with another company. Our domain is trusted by their domain. When they attempt to grant permissions on shares to our users, they receive a pop-up requiring logon credentials of a domain administrator in our domain. Is this by design or should the trusting domain be...

    Antistatic0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following