We have a 9407 M15 without a HMC. On the odd occasion we have required it we have used a remote LAN console setup on a pc. However I have either forgotten the special Access id or it has expired and I am unable to connect the console pgm. To compound the issue I am [...]
Answer Question | October 18, 2010 9:42 PM
IBM 9407 M15, iSeries, Password recovery, QSECOFR, SST
i have a lease line with Huwaei SmartAX unit ,The ethernet interface directly connected to the firewall.The public IP’s assigned for this lease line not reaching the firewall after ISP .Is it compusory have a Router to have public IP’s .
Answer Question | October 11, 2010 6:52 PM
Ethernet, Firewalls, Leased line, Public IP, Routers
How to share lotus id amoung two different users
Answer Question | November 16, 2010 10:59 AM
Lotus, Lotus id sharing, Lotus Servers, Security in 2010
Since our college blocks access to p2p file sharing services (torrents, limewire, etc) the people on my floor in the dorms want to set up a server so we can share all of our media with each other. We came up with the idea of getting a server and just loading all of our music/video/etc [...]
Answer Question | October 11, 2010 8:26 PM
LAN, LAN Setup, Network Server, P2P blocking
My company runs a Citrix network on thin clients. Each user has a directory. Obviously in each directory are our folders. My company administrator has access to all aspects of our system. Since i own the company, i have certain folders & files that i consider proprietary. How can I password protect my directory or [...]
Answer Question | October 8, 2010 9:33 PM
Citrix Server, Folder security, Password, Security
We want to scan in bound and out bound web traffic from our company. We want to stop potential explosive data from leaving the network. How can we block code numbers and specific numbers/variables from being transmitted? Windows 2008.
Answer Question | October 8, 2010 7:22 PM
Security in 2010, Windows Server 2008, Windows Server 2008 Administration, Windows Server Security
I am trying to set up the network in my classroom to prevent students from stealing, renaming, deleting, etc. other students’ work on the shared folder. Before the teacher’s computer died, I was able to set up the permissions as write only, but the smart student could still rename someone’s file if it stayed in [...]
Answer Question | January 26, 2011 6:10 PM
Network security, Network Shared Folder, Permissions and settings, Security in 2010, Shared folders, Windows XP Professional
Is user cloning the only way to use windows authentication in sql server?
Answer Question | October 9, 2010 3:34 PM
SQL Server 2005, SQL Server 2005 connectivity, SQL Server Express 2005, Windows 7, Windows authentication
How do I stop my Email from being hijacked. Right now, having already started from “scratch” because my laptop had viruses from some outside source, I have again had both my aol and yahoo accounts’ email contact lists hijacked, whereby mails are being sent to dozens of my contacts and even myself, from outside sources…. [...]
Answer Question | October 15, 2010 3:25 PM
Anitvirus, Corrupted email, Hacking, McAfee, Windows 7, Windows Vista
How can I set up a Windows workstation that is used by many people, who are now using a group logon, to save files to one My Documents folder if they are forced to log on inidividually? I need to be able to track whom does what and when but cannot do it with group [...]
Answer Question | October 19, 2011 2:16 PM
Security management, Shared folders, User Permissions, Windows Login, Windows XP, Windows XP Group Policy
My VPN does not ask for a password when I logon. I have changed the password and if I let it time out it asks me for the name and password, but if I close and reopen my browser I can get back in without it asking for my password. I have changed the IP [...]
Answer Question | October 12, 2010 4:24 PM
NETGEAR FVS318, Password policy, VPN, VPN password, VPN security
i have 1 switch that i had install vlan 1 and vlan 2. i also have 1 router to connect to the switch through the server. how to make vlan 1 and vlan 2 can access each other? please help me. i’m still new in networking field..
Answer Question | February 16, 2011 3:26 PM
Networking, Switches, Switching, Virtual LAN, VLAN
Tell me how would it be possible for our organization to block password changes until our audit can find who has weak passwords? How can we find out current passwords using Windows 2003?
Answer Question | October 6, 2010 8:17 PM
Audit and compliance, Password management, Password policies, Windows Server 2003, Windows Server 2003 Group Policy
Hi all, I would like to seek your help on this as i can know how can i notify all domain users on the Password Policy Requirements when they change the password wrongly and a notification will notify the users for example below. Example : 1) total of 6 alpha numeric characters 2) 1 letter [...]
Answer Question | October 7, 2010 6:41 PM
Active Directory, Password policy, Windows Server 2008, Windows Server 2008 Administration, Windows Server Security
When a file is accessed on a file share where mcafee is scanning all files the server freezes up for a few seconds while the file is being scanned. How can I fix this issue on Windows Server 2008?
Answer Question | July 13, 2011 2:40 PM
File Shares, McAfee, McAfee Virus Scan, Windows Server 2008, Windows Server 2008 Administration, Windows Server Performance
We have a Windows 2000 server with IIS. When we give it a public IP address the system gets hacked almost instantly. Secure passwords full on firewall. How can we prevent this? Is this an exploit I can patch?
Answer Question | October 7, 2010 2:27 PM
Exploits, Firewalls, IIS, Public IP, Security in 2010, Windows Server 2000, Windows Server Security
Can we monitor SMART hard drive status via Active Directory or via SpiceWorks to know before a potential hard drive failure? How would this work. Client machines are XP and 7.
Answer Question | November 2, 2011 8:43 PM
Active Directory, HARD drive, Hard drive failure, Hard drives, Monitoring software, Spiceworks, Windows 7, Windows XP
We are donating 100 PCs. How can I quickly and effectively wipe all their hard drives? I have looked into Mban and it looks promising but would I be better doing that or pulling all the drives and formatting multiple ones at the same time? What are best practices for doing this?
Answer Question | October 13, 2010 2:22 PM
Backup hardware, Backup storage, HARD drive, Hard drive erasure, Security in 2010, Storage, Storage management
What are the appropriate thresholds for alerts on Windows 2008 R2 servers. I want to monitor disk space, memory, network throughput and processor usage. I want to be aware of any and all bottlenecks before they become a problem.
Answer Question | October 4, 2010 2:00 PM
bottleneck, Security in 2010, Windows Server 2008 R2, Windows Server Alert Service, Windows Server Security, Windows Server security compliance management
We have AS400, Active Directory, a bit SAP to. This means that some of our users have more than 5 passwords to remember – which they of course can’t. As a result we have many calls to the HelpDesk for support. We have looked at Single Sign On solutions, but we find them rather complicated. [...]
Answer Question | October 8, 2010 10:48 AM
AS/400, AS/400 passwords, Password management, SAP, Security in 2010, Single sign-on, Synchronization