• Sponsor Post: Secure End Point Live Expert Chat – Tomorrow @ 11am ET

    Join this expert chat tomorrow, July 13th from 11am-2pm ET, to learn how Microsoft Forefront solutions protect client and server operating systems from emerging threats and information loss, while enabling more secure access from virtually anywhere. Click here for reminder email to access the...

    ITKE347,940 pointsBadges:
  • Installing an IOS on a Cisco router or switch

    I would like to know the process of installing an IOS on a cisco router or switch. What are the steps and commands for installing the IOS.

    Kartikc920 pointsBadges:
  • blocking internet access for certain computers/users on a windows domain

    How I Can block internet access for certain computers/users on a windows domain

    Jpganesh5 pointsBadges:
  • SSL for OWA (outlook web access)

    After installing the SSL for OWA I am unable to open the OWA with https:// while before with the http:// I can not face any problem

    EXC25 pointsBadges:
  • Can’t VPN using Vista to Windows 7 OS using SonicWall Global VPN.

    I seem to be able to remote into Win XP and lower, but major issues when i try to remote into my PC which has Win 7 installed. Not specific error message - just that user authentication failed. I have checked the remote settings on my Win 7 PC and Allow access to lower network encryption is...

    ITKE347,940 pointsBadges:
  • Determine Bluetooth Specification Versions Supported by your hardware

    I understand there are a number of versions of the Bluetooth Specification, recently V2.1 with EDR and V3.0 and 4.0 perhaps on the horizon. How do I determine what versions are supported by my bluetooth hardware? (PC USB dongle or internal Laptop H/W) Can I test that my v2.0 or v2.1 device supports...

    Pagan5 pointsBadges:
  • Sponsor Post: Cloud Migration Pros and Cons Live Chat Today

    Today's live chat from 1-3 pm EST provides an exclusive opportunity to get your cloud migration questions answered directly from industry experts. Get tips on how to improve your ability to recover in any type of loss or disaster while keeping your budget in check and gain insight into: Data...

    EmNichs3,250 pointsBadges:
  • How can I track where an audit comes from?

    I have 4 systems - all new installed - which have many entries of event id 560 in the seclog. All systems have been checked for viruses/malware. None found. Running Windows XP Pro SP3 on these systems in a windows 2003 Server enviroment. Domain policy contains an audits for local policy....

    KL09575 pointsBadges:
  • communication between two different routing protocols

    is it possible to form adjacency between two routers running different routing protocols?

    Saurabh6chandra5 pointsBadges:
  • Which VPN would be optimal and scalable for large enterprise network

    I have two core sites and 400+ branch network through Layer-2 Data Connectivity. Which VPN solution will be best for this network   Basic WAN Information: [ULIST type="disc"> [ELEMENT class="MsoNormal">Have two core sites (Different Location)             Data Centre...

    Towhidhassan10 pointsBadges:
  • 2048-bit key in Domino 6.5

    How can I create a keyring and CSR for my 3rd party vendor in Domino 6.5? The largest key ring or CSR I can create is 1024. I know it can be done in Domino 8.5, but  we haven't upgraded yet. Thanks for your help!

    GailVan175 pointsBadges:
  • what is the wep key for wlan (NOKIA E63)

    what is the wep key for wlan (NOKIA E63)

    Dhelandiain5 pointsBadges:
  • Sponsor Post: Join Us for Endpoint Security and Identity Access Management Live Chats with Microsoft

    Today’s workforce faces a constantly evolving landscape of threats to information and infrastructure—even regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, resulting in lost productivity and real financial losses worldwide.  Join us this...

    EmNichs3,250 pointsBadges:
  • routing of traffic between two NICs

    I have two network card on my pc one is used for company's web based applications applications configured as ip        10.132.63.168 subnet 255.255.255.224 Default Gate way 10.132.63.161 2nd Nic is used for Broadband internet connection with DSL Modem when i connect to the Broadband...

    Sdonws5 pointsBadges:
  • Routing of traffic between separate compainies both using private 10 net addresses

    We have two different networks in two towns that wish you route traffic using existing 10.x.x.x network traffic. There is no conflict with the addresses we wish to use. There is of course a firwall in place on both sides. Is it possible to route all 10 net traffic between sights using one VPN, or...

    Bunny115 pointsBadges:
  • Web Links that are Password Protected

    Is there a way to put documents on the Web site and put a password on them so only certain people can open them?

    Rufojr5 pointsBadges:
  • Two routers and Two internet connections on one network

    Trying to setup a network, with my friends because we are going to be renting a house together, they will be sharing an internet connection, but I torrent alot so I figured I should pay or my own.  Wanted to maintain a lan b/c I made a system that allows them to add torrents they want me to...

    Anc3s25 pointsBadges:
  • Cisco Port-Security

    I would like to make port-security a little more flexable. For example, lets say I have 24 access ports. I would like to have a list of 24 mac-addresses that could access any one of those 24 ports at any time. So the interface port would look to see if the device trying to connect matched the list...

    Wdygts5 pointsBadges:
  • redirect dns requests to opendns on PIX 501 (v6.3)?

    I have a remote factory location that connects back to our home plant to get dns resolution. Most of the systems are configured to look to the PIX firewall at that location, and/or our dns server at the main facility via a point-to-point network setup we have. What I would like to do is have the...

    Koohiisan5,020 pointsBadges:
  • we are using a oracle D2k 6i based software and by mistake some one has changed a .fmx patch to open with notepad. Can I recover the files affected?

    we are using a oracle D2k 6i based software and by mistake some one has changed a .fmx patch to open with notepad and now all the files with such extension has been changed. so please tell me how to recover the file.

    Belli10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following