• Default Gateway Ping Test?

    I'm having problems with connecting to the internet. I did an IPCONFIG/ ALL and got this; IPv4 address is, my subnetmask is, default gateway is, and the DHCP server is then pinged and all 4 packets were received fine, i then pinged my...

    amaziah5 pointsBadges:
  • Identifying someone from IP, hard part over?

    Ill try to make this short and sweet, but descriptive. I do tech support for a school. A teacher is getting lewd photos and emails from a fake twitter account and on school forums. We got the IP from an email, I googled, a lot, and connected this IP to a youtube channel, found a video of a student...

    Finn4045 pointsBadges:
  • VLAN and DHCP

    DHCP Server Windows 2012 and VLANs on Cisco router? How can I configure it? Here is my config: My Windows Server (DHCP Server too) is on VLAN 20 ( and my computers on VLANs 10, 20 and 30. How do I configure the whole to make DHCP packets reachable to my computers on VLANs 10 and 30?...

    gueug7815 pointsBadges:
  • Ping attack on my command prompt

    Why when I send a ping attack, it is working in my command prompt you know sending and receiving and on the computer I'm attacking there's no affect?

    Xelerater15 pointsBadges:
  • How to wirelessly extend a laptop display

    I want to wirelessly extend a laptop display so you can use both the laptop and the TV at the same time. Is that possible?

    jsench19945 pointsBadges:
  • Can switches, routers and servers be connected together?

    How can switches, routers and servers be connected together?

    isheja5 pointsBadges:
  • Open Source control in .Net application

    I have used an open source (GPL) control in my .Net application which I am hoping to sell commercially. If I reference this control in an assembly and use that assembly in my application am I only liable to disclose the code for the assembly or will I have to disclose the code for the full...

    Stevec1235 pointsBadges:
  • SQL Server log file is too big

    We are using SQL Server 2008 with full recovery model, the database size is 10 GB and the log file is 172 GB, we want to clear up the space of the log file internally, we did transaction log file backup it should be clear up , but it still 172 GB. What to do?

    mimiKh5 pointsBadges:
  • Start career in networking

    Hi, I am btech in Electronics and Communication passed out in 2011. I worked in online marketing, totally a different field. I want to go back in field engineering. Somehow, I developed interest in Networking. I have little knowledge in it though I keep learning/reading now about networks, network...

    aakritighai5 pointsBadges:
  • Regarding Nagios report generation

    I have been using Nagios, I took over it from a team member who installed it, so in order to take it further, I want to try and send mails to the respective email ids whenever the service or host goes down. Where can I start from?

    198719045 pointsBadges:
  • Can you FTP a STMF object?

    Can I FTP a STMF object?

    johnmeno15 pointsBadges:
  • Equipment needed to start as an ISP

    What is the equipment needed to start as an ISP, both outer and internal?

    kabba175 pointsBadges:
  • Can I turn network routing and switching into a career within the next five years?

    I am a network engineer and I want to proceed with routing and switching but I'm afraid that this career won't be a required Career with the new technology of virtualization and cloud computing. Many thanks in advance. Regards, Yirga Tareke,

    yirgas5 pointsBadges:
  • Restarting network services in Ubuntu

    In Ubuntu, how can I restart my networking service? I tried sudo service networking restart but it keeps crashing the Window Manager. What can I do? Is there a GUI method for this?

    ITKE376,465 pointsBadges:
  • Change log files on MacBook?

    I am a writer. I am trying to figure out the best scenario for adding something to someone's computer. If a person had physical access could they change the log files over a long period of time (2 or 3 years) to add files or emails to a computer with correct past timestamps)? Could this be done...

    RTaylor895 pointsBadges:
  • Which attacks can SIEM detect, but another security product can’t?

    I'm trying to prepare a proposal for a project. I must first find some attacks that security products can't detect and after that by SIEM and customer correlation rules detect them, is there anyone that help me?

    1234567890120 pointsBadges:
  • Steps for completing network integration of a company of 3 locations within 5 miles radius

    Assuming you have been task to network a bank which has 3 location within 5 miles radius, how can I complete the task of network integration?

    kenihe15 pointsBadges:
  • Laptop is refusing to connect to Wi-Fi

    My laptop now is refusing to connect to Wi-Fi but is under LAN. What should I do?

    Tasharue5 pointsBadges:
  • Setting up LAN and WAN network

    How can I write a networking project to my company on your intentions to set up a LAN and WAN network for a school?

    kenihe15 pointsBadges:
  • Wi-Fi in metal building

    I have a very strong duel band Wi-Fi router in the house. The computers in the house are cabled to it. The Wi-Fi is for our phones, tablets, tv..xbox.etc. I have build a new shop that is 200 feet from the house. It has metal roof and sides. When I stand outside, I get a good 4 bar Wi-Fi. when I...

    rigrandy19595 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.