If I wanted to profile traffic associated with virtual machines using MAC addresses, what services would you suggest?
Answer Question | January 5, 2011 5:38 PM
Desktop virtualization, MAC address, Traffic management, Virtual machine manager, Virtual machine monitor, Virtual Machines
ie slow in DSL environment
Answer Question | February 21, 2011 2:43 AM
DSL, DSL routers, Valmsmith, Windows XP, Windows XP performance
Hi, on my desktop in the office i use outlook 2007 to send and recieve my works emails. I log onto this through windows server 2003. I have recently set up my laptop at home that uses winmail to also recieve my works e-mails. However when i retreive my e-mails via winmail on my laptop it [...]
Answer Question | January 4, 2011 2:21 PM
Outlook, Outlook 2007, Remote access, Windows Mail, Windows Server 2003
I had TP link switch of 5 port, but when I connect the ethernet from moderm to port 1 and two others computer in port 2 and 3, only 1 computer which turn on first can access to the Ethernet the other said no enthernet connection. Any one can help me how to test whether [...]
Answer Question | February 16, 2011 4:16 AM
DLink Switches, Ethernet Switches, Switches
What point / Knowledge transfer to be take care, while job transfer from resigned IT manager to new pointed IT manager for future smooth running of IT work?[o:p][/o:p] As CAL, ISO docs, all network passwords etc.[o:p][/o:p] Should we need to scan network for any unknown remote access installed software & take backup / image of [...]
Answer Question | January 19, 2011 2:25 AM
IT managers, Network access, Network security, Remote access policies
I’m looking to replace Windows XP client that’s used only for web applications & mail with Linux/Ubunutu virtual desktop using a thin client or old PC. I’d like to have failover and balancing capability and a simple UI. Any suggestions?
Answer Question | February 3, 2011 5:09 PM
Desktop virtualization, Failover, Linux, Linux Virtual Server, Thin clients, Ubuntu, Ubuntu Linux, Windows XP, Windows XP clients
This week’s free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a chance to win this thought-provoking series, [...]
Answer Question | February 3, 2011 2:43 PM
Active Directory, Auditing (compliance), Giveaways, IT Books, Network security, Network Security Management, Outlook 2010, Routers, USB drive, Windows Server 2008
Can we add an expiration date to a optical disk rendering it useless after a specific date? We also need to prevent users from rolling back the clock to fix the issue.
Answer Question | January 4, 2011 2:36 PM
Expired tapes, Network security, Optical Drives, Storage devices, Storage management
Can we have a APC device connected to a server via usb or serial cable alert other systems on the network and have them shut down?
Answer Question | January 5, 2011 2:35 PM
APC, Network applications management, Network connectivity, Network Controller, USB
Can we lock down the USB and Optical drives on a Windows Server 2008 R2 box for all users except the administrators group or even just the administrator?
Answer Question | February 2, 2011 2:32 PM
Network security, Network Security Management, Optical Drives, USB drive, Windows Server 2008 Administration, Windows Server 2008 R2, Windows Server Security
I need some advice from other security experts. I was recently hired to work for a small company where our data and infrastructure is at a managed hosting facility. The hosting service has a SAS 70 that is regularly audited. My company in the past relied – almost solely – on the managed service security [...]
Answer Question | January 5, 2011 3:49 AM
ISO 17799, Network security, Network Security Policies, SAS 70, SAS 70 Type II audit compliance, Security Program Management
I know how to run performace tools on Iseries but how can I download the Iseries performance files into Excel and create a graph on the data? Thanks
Answer Question | January 5, 2011 4:16 PM
excel, Excel Database, IBM 9406, iSeries performance, Performance management
I am having a problem with intel pc . Wehen it boots it gets to the client mac addr xxxxxxx Guid xxxxxxxxx then intel boot agent exitng and then windows starts. It keeps doing this over and over. Any suggestion as to what the issue may be?
Answer Question | January 1, 2011 1:39 PM
MAC address, MAC address authentication, Windows XP SP2
how I can allow in my network under the firewalla single ip where other external net IPs can enter?
Answer Question | January 6, 2011 6:00 AM
Authentication, External IP Addresses, Firewalls, IP Subnetting, Subnets
When I add a router to the dentrix configuration, suddenly my work stations don’t recognize the database?
Answer Question | January 5, 2011 5:39 AM
dentrix, Networking Equipment, Router Troubleshooting, Routers
I have a network with 250 pc’s using a 10.10.1.x with 255.255.255.254 mask. 1) How do I subnet? (I need a specific example) 2) Do I need another router for subnetting? 3) We have Cisco 2950 switches on the LAN. I know VLANS can be created on the switches. How do I do the VLANS? [...]
Answer Question | February 7, 2011 5:17 AM
Cisco 2950, Cisco switch configuration, Cisco switches, VLANS
Occasionally users can not log in to our 2008 Active Directory network. They get a failed to contact a domain controller. We have two AD boxes and when this happens no one can log on. It lasts a few minutes at most. How can we troubleshoot and resolve this issue?
Answer Question | January 5, 2011 5:00 PM
Active Directory, Active Directory 2008, Active Directory Administration, Active Directory errors, Network connectivity
We have a SQL 2005 Database. It is protected by Windows Authentication. Can we add another level of security – requiring a SQL username and password along with a valid user name and password on the domain?
Answer Question | January 12, 2011 4:17 PM
Network security, Network Security Management, SQL 2005 Database, SQL Security, SQL Server 2005, SQL Server security, Windows authentication
I have CCM 6.0 and have audio codes box, When i make an out going call from AC box it is working smooth but when i want to make an incoming call on AC box from an IP phone i m getting fast busy…were as call from ac box to IP phone is fine… PLease [...]
Answer Question | March 25, 2011 9:03 AM
CCM, Cisco Call Manager, Cisco IP phone, IP phones
Antivirus software and PC protection are comforts of the past. These days the biggest threats come from the Internet, and we’re wondering how you protect yourself and your hardware against Internet threats and the less knowledgeable users on your network. We’d love to hear about solutions you’ve tried and liked or disliked. As a thanks [...]
Answer Question | January 3, 2011 3:29 PM
Internet security, Internet Security Systems, Network security, Network Security Management, Open IT Forum