• Multiple Network Adapters

    If there are multiple network adapters installed on the iSeries, isn't there a way to configure them to spread the load without physically wiring each adapter to the network?

    DataMail5 pointsBadges:
  • implementing LAN in mobile phones

    hi all, I am a final year Comp. Engg. seeking for a project related mobiles. I need help in implementing an appln. for mobiles which would be much similar to connecting PC's in LAN, i.e making mobiles to share data with the other in its network. According to my thinking this is possible in...

    Tampuraj0 pointsBadges:
  • Software Packaging

    I am currently trying to learn how to "push" Windows updates from Active Directory (MMC)and need a software packaging program. Is there a free or cheap program that fits this description? Any advice would be greatly appreciated.

    Scuba5820 pointsBadges:
  • Running a script at specified runtime

    I am creating an Oracle Developer form which will take the query created by the user and specified runtime (also by user) and saves it in two columns of a Oracle table. Is there a facility in oracle which can trigger off the saved query when the sysdate becomes equal to specified runtime? Thanks

    Columbus0 pointsBadges:
  • VOIP

    I was asked on an interview. Describehow you would approach a customer issue dealing with VOIP, I think my answer was right but I Just would like another opinion. James

    JMSV2J0 pointsBadges:
  • Unable to move mailboxes from Exchange 5.5 to Exchange 2003

    Here is my network setup: Exchange 5.5 Server running on a Windows 2000 Server Domain Controller. The DC is also running AD, DNS, DHCP and WINS. I've successfully introduced an exchange 2003 running on a windows 2003 server into my exchange 5.5 organization. I am trying to move user mailboxes over...

    Sdr071515 pointsBadges:
  • Email attachment filter – better than file extention.

    Does anyone know if there is some way to filter email attachements on a server that are a little harder to get past than simply renaming the file extention? I have people that rename file.exe to file.bob and my filter does not block this file. I know you can scan attachments for viruses in...

    Skepticals0 pointsBadges:
  • Group Policy-Internet Access

    I use the old trick of bogus settings for the proxy server in Group Policy. I have as an example: OU1-Internet Access OU2-No Access When I move anyone from the OU2 to OU1 to allow them access, the proxy address still remains in the settings. I can manually change it back, but cannot get it to do so...

    TheVyrys0 pointsBadges:
  • “Siamese Twin” PCs?

    Hi Gentle People, I have something new and wonderful to share. One of my team members went to an office today to install software to old-fashioned way (by CD). The application uses ODBC drivers to access a shared database (engine & data files) on a server. The LAN is a Win2K AD domain with multiple...

    WorkBot0 pointsBadges:
  • Windows 2000 Server

    I get the following error on my Domain Server. Its used as a Frontend for our ERP and Common folder for users (around 130) in our Domain. Its a PIII 1 Ghz with Dual Processor with RAID 5. Searched the Net for the solution there is a solution of increasing MaxWorkItems in the Registry to 8192 (but...

    Mail2divyesh0 pointsBadges:
  • Can’t login as Administrator

    Hello Everybody, I can't login to adminstrator profile in my standalone win 2000 adv server. I use this system for my study purposes. What happened actually is when I was shuting my system, it got powered off because of some UPS problem and the next time when I logged in using Administrator, it...

    BinooDas123410 pointsBadges:
  • How to Limit what remote users can do

    Hi there, we use a Cisco VPN solution with windows IAS on 2003 servers. The clients connect via Cisco 4.x clients that authenticate to our Domain Controllers over RadiusIAS against their AD accounts. Problem is it's far too open. I am increasingly under pressure to allow 3rd party contractors vpn...

    Maclanachu0 pointsBadges:
  • Opinions about firewalls and VPN

    I currently have watchguard firewalls and IPSec tunnels between them and the other watchguard firewalls. We also have remote users VPN into the firewall for access to our network. Our firewalls are fine but we haven't been that happy with the support over the last 5 or so years. We are joining...

    Kevins740 pointsBadges:
  • Recommendations for OU and group policy design

    Hi, We are currently running a Win2003 AD and have been for some time. As is the usual with this sort of thing, the OU and Group Policy structure has evolved over time and it's currently in a bit of a mess. I'd like to get some input on how best to re-design the OU and GPO structure. Any ideas are...

    GregNottage0 pointsBadges:
  • Lotus Domino Everyplace

    Scenario: Lotus Domino Server 6.52 shop, Palm Treo 650 Smartphones (Palm OS 3.5). Trying to determine if Lotus Domino Everyplace is a solution for us to access Notes e-mail and calendar from the Treo 650 phones. Understand we need the Domino Everyplace client. 1) What is needed on the server side?...

    MikeJ19590 pointsBadges:
  • Exchange 5.5 to Exchange 2003

    Good Afternoon, I have an Exchange 5.5 running on a Windows 2000 Server Domain Controller. Active Directory is running on the network. I would like to migrate Exchange 5.5 to a new box running Windows 2003 Server and Exchange 2003. Winodws 2000 DC machine is also running DNS, WINS, DHCP and also a...

    Sdr071515 pointsBadges:
  • AD Integration and NetBIOS/WINS

    Hello. My question has two parts. First, the company I work for just merged with another company and we have now set up a trust between the two domains, ABC and XYZ, I will call them for illustration. The domains are connected via a T1 with Cisco routers on each end. The trust was set up as...

    Brosley0 pointsBadges:
  • Port 1894

    Hi, Our port scanner has detected '1894' as an open port. We know 1894 is an 'O2Server' port. Could you please throw some light on the port '1894'? Thanks kbs

    Hellokbs0 pointsBadges:
  • Laptop Security…

    Hi, I am the head of my department and by the nature of the job I hold some confidential information on my laptop. How do I ensure that 1. Nobody can access any files on my laptop from the LAN or the internet (not even sys admins) 2. If somebody tries to access, can I find out /trace who it is or...

    Blackmagic0 pointsBadges:
  • runnunig application from the web….

    Hi, I have an application server that is in my network and is a stand alone server,and I have ISA server 2004 in my domain with an valid IP address. Which access rule I should add to Isa that some external users can running application from the interner by typing our valid ip addressApplication...

    Aliyani265 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following