• Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Remote Access Networking

    I am not too good with networking, and I have a question. I need to be able to access two seperate computers at a remote location. There is DSL internet. Right now I just have one connected to the internet, and have everything forwarded to that specific IP address. The Remote Access program I use,...

    Joeywells0 pointsBadges:
  • Dentrix 3G and router issues

    When I add a router to the dentrix configuration, suddenly my work stations don't recognize the database?

    Drgordenchin5 pointsBadges:
  • Delivery Failure Report for Email

    HI , not sure if anyone can help me but I sent an email in error and 30 minutes later recalled the message. 2 days later i received the below notififcation on both emails that i sent. DELIVERY FAILURE: Router: Unable to open mailbox file AUYHOA06/SERVER/XXX (company name was here) mail.box: The...

    Shilo5 pointsBadges:
  • Load balance on WAN interface using static router between two ISP

    By using static router, i need to configure two lease line of 3 mbps and failover

    Pranab12310 pointsBadges:
  • Quad NIC Port Sequence.

    On a 4-Port (Quad) NIC, how do you determine which is Port #1 vs. Port #4?   Do all manufacturers use the same numbering sequence, or will if vary by make & model.  Does the first port start w/ "0" (zero), or is it actually "1" (one).  Thanks....

    Marher20 pointsBadges:
  • Benefits of wireless router upgrade

    What are the benefits of upgrading my wireless router to dd-wrt open source firmware? Is it true I can boost my signal? Is it safe? Is there a chance I can brick my router?

    ITKE346,465 pointsBadges:
  • what command is used to configure the console port on a router

    what command is used to configure the console port on a router

    Funlvr196510 pointsBadges:
  • Locked out of Cisco Router – Password reset doesn’t work

    do work for a local non-profit group. Apparently some prior network admin left under unhappy circumstances and did something to the cisco router(s) there. We had no password access, so I went through the password recovery/reset procedure. Everything seemed to be fine except for two little details:...

    Bobkberg1,070 pointsBadges:
  • Can we use a Windows Server 2003 configured as a router to do qos when the switch does not support it?

    Can a Windows 2003 server be used as a QOS device to prioritize packets on the network to prevent VOIP latency? The current switch and gateway do not support qos.

    Karl Gechlik9,860 pointsBadges:
  • Sap Router ECC 6

    [strong]Hi Experts,[/strong] [strong]Currently Iam facing issue on SAP Router below i run from cmd command.[/strong] [strong] D:router>saprouter -n[/strong] [strong]Thu Oct 28 00:40:14 2010 SAP Network Interface Router, Version 38.10 Thu Oct 28 00:40:15 2010 ***LOG Q0I=> NiPConnect2: connect...

    Mairaj5 pointsBadges:
  • Windows Terminal Server 2008 timing out at client’s computer

    Terminal Server is timing out at the client's computer. Error says that to much time to connect to host. I see that the client's computer is getting to the router but nothing is coming back. I have spent three weeks trying to solve this problem can you please help?

    Mcsrta5 pointsBadges:
  • IT Book Giveaway: Unified Communications for Dummies

    This week's free IT book giveaway, Unified Communications for Dummies, will help you find out how to make communication effective, global and available through multiple technologies seamlessly. Want it? Simply answer one of the questions provided here, then leave a link to your answer in the...

    MelanieYarbrough6,345 pointsBadges:
  • How to configure encapsulation and bandwidth in D-link router

    I am going to upgrade my Internet Leased Line Connection to 2Mbps. I have a Dlink DRO-250i router. My ISP provided me the following configuration for me to configure router: WAN IP = 172.***.***.***                Numbered SUBNET = 255.255.255.252 LAN IP = 210.***.***.***      ...

    SearchEnterpriseWAN1,080 pointsBadges:
  • How to connect two computers to mobile broadband

    I need to know how to distribute my mobile broadband of usb type to another computers using a router(belkin f5d9230-4)

    Bobmasoud5 pointsBadges:
  • leased Line with public IP’s

    i have a lease line with Huwaei SmartAX unit ,The ethernet interface directly connected to the firewall.The public IP's  assigned for this lease line not reaching the firewall after ISP .Is it compusory have a Router to have public IP's .

    Leolink5 pointsBadges:
  • Do routers change packet IP info at each hop?

    I'm taking classes for CCNA certification and think my professor may be wrong about this... She says that at each hop, the router strips the source and destination IP and updates it to reflect its IP as the source and the next router's to be the destination. But it seems to me that if that's the...

    TJEnger5 pointsBadges:
  • How to enable suse linux as a router or how to enable call receive in suse linux via voice modem

    How to enable suse linux as a router or how to enable call receive in suse linux via voice modem !

    Subhendu Sen28,600 pointsBadges:
  • How to configure two default gateways to be 2 ISP (PIX 525)

    I have a network as follows: PIX Firewall 525 uses three network interface Ethernet1, Ethernet2, Ethernet3. E1 (10.0.0.1, Inside) connected to LAN E2 (117.16.126.35, Outside) connected to the modem (117.16.126.33) ISP1 (This address by the ISP level) E3 (192.168.1.2, Outside2) connected to the...

    Arowana200015 pointsBadges:
  • how to protect router to hacker’s

    actuaaly ask this question is .... if any user work in web or internet  that's hacker is trace the route by  ping how to protect this  actvity... my means is router is indicate by hacker's if hacker's is find the route that's means  hacker is find the packet accesing .. router to router. that...

    Johnyrawat15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following