• Wireless -Limited or No connectivity

    Hi all - I'm hoping somebody out there has some thoughts on this. I have a dell D410 that belongs to our COO, well due to lots of issues, I rebuilt it from scratch, installed xp sp2, all the dell drivers etc and tried to connect to our internal wireless network. It won't connect, it won't even pull...

    Lirria0 pointsBadges:
  • Implementing RUP in Retail business which runs on i-Series

    A retail company is planning to implement IBM Rational Unified Process for its business which runs on i-Series. Please let me know how well RUP can be implemented here. How well RUP works for i-Series software development? What are the tailoring to be done to this process for i-Series? Also, please...

    KiduHarish0 pointsBadges:
  • Security on a Network Share using SBS 2003 – NTFS Partition

    Hello colleagues; I am trying to accomplish the following task 1) Avoid users to delete and move folders and files on a network share They should only be able to create, read, execute,write files and folders I have already created the group and deny delete and delete subfolder and files. This...

    Musiquito20010 pointsBadges:
  • Limiting Internet Access

    Hi there, I am running a Windows 2k based Network with active directory. No Exchange and Proxy server. I was wondering if there are alternatives to proxy server as I need to allow only certain websites during working hours and then full access during none working hours. I was thinking Wingate 2.0...

    Sheldonrw0 pointsBadges:
  • Installing Printers Based on Active Directory Group

    Hi All, I'm looking to install all my printers based on security groups within active directory I was planning on using the script below: *** START SCRIPT PRINTERS.VBS *** Const IT_GROUP = "IT" Set WshShell = WScript.CreateObject("WScript.Shell") Set WshNetwork = CreateObject("WScript.Network") Set...

    Ladrick0 pointsBadges:
  • Change Telnet port in Linux (Debian)

    Hello everybody. I'm not a Linux expert, and am looking for a way to securely communicate with a Linux machine via Telnet. To avoid sending user and pwd without encryption I'm going to open a ssh tunnel (with putty or plink) forwarding port 22 (ssh) on the linux machine to another port, in which...

    carlosdl69,510 pointsBadges:
  • Cannot FTP from AS/400

    Hi, When I FTP from my PC, it goes OK but when I tried from AS/400 to my PC, screen is frozen and does not go anywhere. My PC is running on XP and my FTF is on on the PC side and FTP server in AS/400 is running. I can ping from AS/400 to PC and vise versa. Whatelse shuold I check or what am I...

    MFGSYS0 pointsBadges:
  • Group Policy…

    Hi, For designing AD,which of group policies force us to have more than one domain?(for example when we want to have two password policy we should have two domain) Could you please help me? Thank you. ---- Regards Mahnaz

    Aliyani265 pointsBadges:
  • Oracle Application or Database on its own server.

    Which would increase performance more. Moving an Oracle demand planning and forcasting application or an Oracle database onto its own server and or a faster server? There is some debate among myself and a couple of coworkers. I feel that the workhorse of Oracle is the database and that it should be...

    Ktharrell0 pointsBadges:
  • router for home network with cable connection

    I apologize in advance for asking such a beginner's question, but I am planning to get cable high speed internet and want to get a router before I do (to save money). I have an old desktop, running win98se, and a newish laptop, winxp with wireless capacity. Also an old mac which I'm not planning to...

    Elnodel0 pointsBadges:
  • Networking

    What impact has single sign-on technology had on enterprise systems?

    HawaiianIce0 pointsBadges:
  • Routing to VLAN

    I have setup a VLAN on a CISCO 3750 to our remote site and can communicate with PCs on both sides great. The problem arises when I want to route the remote site into our network to have access to servers and internet. I built a router to "route" the VLAN into our network but I have trouble...

    NetNewbie0 pointsBadges:
  • Multiple Network Adapters

    If there are multiple network adapters installed on the iSeries, isn't there a way to configure them to spread the load without physically wiring each adapter to the network?

    DataMail5 pointsBadges:
  • implementing LAN in mobile phones

    hi all, I am a final year Comp. Engg. seeking for a project related mobiles. I need help in implementing an appln. for mobiles which would be much similar to connecting PC's in LAN, i.e making mobiles to share data with the other in its network. According to my thinking this is possible in...

    Tampuraj0 pointsBadges:
  • Software Packaging

    I am currently trying to learn how to "push" Windows updates from Active Directory (MMC)and need a software packaging program. Is there a free or cheap program that fits this description? Any advice would be greatly appreciated.

    Scuba5820 pointsBadges:
  • Running a script at specified runtime

    I am creating an Oracle Developer form which will take the query created by the user and specified runtime (also by user) and saves it in two columns of a Oracle table. Is there a facility in oracle which can trigger off the saved query when the sysdate becomes equal to specified runtime? Thanks

    Columbus0 pointsBadges:
  • VOIP

    I was asked on an interview. Describehow you would approach a customer issue dealing with VOIP, I think my answer was right but I Just would like another opinion. James

    JMSV2J0 pointsBadges:
  • Unable to move mailboxes from Exchange 5.5 to Exchange 2003

    Here is my network setup: Exchange 5.5 Server running on a Windows 2000 Server Domain Controller. The DC is also running AD, DNS, DHCP and WINS. I've successfully introduced an exchange 2003 running on a windows 2003 server into my exchange 5.5 organization. I am trying to move user mailboxes over...

    Sdr071515 pointsBadges:
  • Email attachment filter – better than file extention.

    Does anyone know if there is some way to filter email attachements on a server that are a little harder to get past than simply renaming the file extention? I have people that rename file.exe to file.bob and my filter does not block this file. I know you can scan attachments for viruses in...

    Skepticals0 pointsBadges:
  • Group Policy-Internet Access

    I use the old trick of bogus settings for the proxy server in Group Policy. I have as an example: OU1-Internet Access OU2-No Access When I move anyone from the OU2 to OU1 to allow them access, the proxy address still remains in the settings. I can manually change it back, but cannot get it to do so...

    TheVyrys0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following