• remote access in C#

    I am trying to copy a file to a folder on a server through C# application. If I have already had the folder open, it doesn't need the username and password to connect to it through the program, otherwise the program gives me error and says it cannot have access to the folder. I am using...

    Ellie145 pointsBadges:
  • Receive window shrinking

    Why does the size of the receive window cycle up and down and eventually fall to zero?

    Hefy jefy15 pointsBadges:
  • Exchange Server Dual Virtual Servers and SMTP Connectors

    I have and Exchange Org with 4 routing groups. I understand that SMTP connectors take precedence over virtual servers. Is that the case for the whole org or just the routing group. It would seem that is the case for the whole org as is whats happening in mine. I created an SMTP connector in one...

    Just Passing Thru5 pointsBadges:
  • Differeance b/w VPN and tunneling , REdirect remote PC traffic thorugh WAN

    how does VPN and tunnelling differ from each other ? , and what are the ways one can redirect a remote PC host traffic to other remote host traffic and then to server on WAN ? for example Node A in Alaska .. node B in New york .. node A is accessing some server C... i want all traffic of node A...

    Spidy10 pointsBadges:
  • SunSystems: How to set fonts setting for a printer when print report a report from SunSystems?

    Hi forum, Anyone can guide me how I can set a certain fonts setting (whether on size & type) when print report from SunSystems? Thanks!

    Emas15 pointsBadges:
  • Creating DNS entries

    Is it possible to create a DNS entry for a specific page on a website?

    Dagawu5 pointsBadges:
  • Circumnavigate ISA server (Which acts as gateway).

    Dear colleagues, I've a problematic workplace where an employee regularly disables internet access using either the ISA 2004 Server or the Win 2003 Active directory domain. Much as I do not log onto the domain (i.e. I log on locally to my machine as an administrator), I get my network settings from...

    Sampler15 pointsBadges:
  • Multiple Exchange server integration and interoperability

    Back Ground - We have 4 separate Microsoft domains and companies located in different parts of US. Some of the companies have multiple Exchange Servers. We have 3 Exchange 2000 servers, 2 Exchange 2003 servers and 1 2007 Exchange server. The Active Directory is 1 2000 AD and the other 3 are 2003...

    BrentSheets6,925 pointsBadges:
  • Restrict Access to PS Hours in a network

    Hi, does anyone know how to restrict the access to PS Hours, ie so that we can define the personnel that are allowed to book hours on the different network activities in a project?

    Mcgrata5 pointsBadges:
  • PL/SQL performance tuning…

    I need to move data between to schemas. I have a created packaged code to accomplish this. The problem is the execution time. When running the insert statements from the source schema to insert data into the target schema, it takes considerably longer to complete the statement than if I copied the...

    Jelewis0 pointsBadges:
  • How to capture emails with attachments from the POP server using Pl/SQL ?

    I am able to retrieve emails from POP server using UTL-TCP package of PL/SQL. I am also able to retrieve Attachment with the email, but the contents of the Attachment are displayed as some random string of characters. Can anyone tell me how can I access the contents of the Attachment in...

    Monk10 pointsBadges:
  • Deny DHCP and Network access to rogue wireless routers

    We are running a MS DHCP network and home wireless routers are finding their way in. I scan the DHCP scopes daily and thought I was denying their ability to connect by creating a reservation for the MAC address and modifying the configuration options for the device. I set the following options to...

    Twhite0 pointsBadges:
  • network cableing between rooms

    Currently we have an office conencted by cat5e. all stations are connected to one central location point where Cisco 2960 switches, servers, firewalls ect reside. we are expanding and will be taking over new space which is down the hall. ( which is not more than 100m). this space we are taking is...

    Dtooth7115 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • IBM 6400 firmware resetting

    Can someone help on steps required to reset an IBM 6400 firmware?

    Petit Dieu de 19765 pointsBadges:
  • Anybody out there using Microsoft OCS?

    I was curious if anyone was using Microsoft OCS to actually run unified communications in their shop. I've heard a lot of high-level discussion about its complexity, its capabilites, etc., but I haven't found anyone actually using it. Is it worth the hassle?

    Michael Morisy8,323 pointsBadges:
  • ‘You are not authorized to access that database’ error message for Lotus Notes user

    I have a Lotus Notes user who keeps receiving the error message: "You are not authorized to access that database." when working with his local copy of his email file. To my knowledge, he is not using a different ID file. The first two times this happened, we deleted the local copy of his email file...

    Domino Ask The Experts435 pointsBadges:
  • dhcp

    i ve configured dhcp server on my network, in which there are 200 pc's. all are having their dynamically arranged ip addresses. suppose i m disonnecting one of my pc from the network and again im reconnecting it, am i going to get the same ip address or not. i ve configured the scope also.

    Srikanth0810 pointsBadges:
  • DNS REVERSE LOOKUP ZONE

    i want to know how i ve to configure the reverse lookup zone so that by ping and ip address command i can get the name of the particualr computer on the network

    Srikanth0810 pointsBadges:
  • LAN AND CONDITIONAL FORWARDING

    I have a question in regards to LAN and subsequent access to the internet. If you wanted to protect your LAN from the internet would this scenario work as a sound measure. On the LAN delete root hints in DNS, provide a conditional forwarder to the router or ISP. I am a student and I am attempting...

    Golfer2110 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following