• Remove (revoke) an user out of lib object authority ?

    I added an user to access my lib (with authority *all) that user is no longer with company and i want to remove her out of that lib access./ please show me a simple way to delete her access in that lib. Thanks 

    01admin25 pointsBadges:
  • ssg-320 Address Labels

    Can I use a Address Label for a MIP in a SSG-320 configuration ... when I assign an IP address the DMZ zone and use it in a policy it no longer works ... if I use the (MIP x.y.z.q) Label Generated in the Global zone it works fine .... I would like to use the Labels I built

    Bradwaller5 pointsBadges:
  • ISA 2006 Standard transition to TMG

    Hi! Do anybody have a hint how to make a transition from ISA 2006 server to new TMG with HyperV technology?

    Silviozg5 pointsBadges:
  • Sponsor Post: Join the Endpoint Security Microsoft Live Chat Happening Now!

    Join the Endpoint Security Microsoft Live Chat that's going on now. Learn how forefront solutions protect client and server operating systems from emerging threats and information loss. Enter the Chat.

    ITKE351,325 pointsBadges:
  • Password protection for Joomla intranet site

    How can I password protect my Joomla intranet site so that all users need to login before they see ANY data? We're working on setting up a Joomla site to replace our current intranet site. What are the methods people use to password protect the entire site and not just individual modules?

    ITKE351,325 pointsBadges:
  • Sponsor Post: Secure End Point Live Expert Chat – Tomorrow @ 11am ET

    Join this expert chat tomorrow, July 13th from 11am-2pm ET, to learn how Microsoft Forefront solutions protect client and server operating systems from emerging threats and information loss, while enabling more secure access from virtually anywhere. Click here for reminder email to access the...

    ITKE351,325 pointsBadges:
  • Installing an IOS on a Cisco router or switch

    I would like to know the process of installing an IOS on a cisco router or switch. What are the steps and commands for installing the IOS.

    Kartikc920 pointsBadges:
  • blocking internet access for certain computers/users on a windows domain

    How I Can block internet access for certain computers/users on a windows domain

    Jpganesh5 pointsBadges:
  • SSL for OWA (outlook web access)

    After installing the SSL for OWA I am unable to open the OWA with https:// while before with the http:// I can not face any problem

    EXC25 pointsBadges:
  • Can’t VPN using Vista to Windows 7 OS using SonicWall Global VPN.

    I seem to be able to remote into Win XP and lower, but major issues when i try to remote into my PC which has Win 7 installed. Not specific error message - just that user authentication failed. I have checked the remote settings on my Win 7 PC and Allow access to lower network encryption is...

    ITKE351,325 pointsBadges:
  • Determine Bluetooth Specification Versions Supported by your hardware

    I understand there are a number of versions of the Bluetooth Specification, recently V2.1 with EDR and V3.0 and 4.0 perhaps on the horizon. How do I determine what versions are supported by my bluetooth hardware? (PC USB dongle or internal Laptop H/W) Can I test that my v2.0 or v2.1 device supports...

    Pagan5 pointsBadges:
  • Sponsor Post: Cloud Migration Pros and Cons Live Chat Today

    Today's live chat from 1-3 pm EST provides an exclusive opportunity to get your cloud migration questions answered directly from industry experts. Get tips on how to improve your ability to recover in any type of loss or disaster while keeping your budget in check and gain insight into: Data...

    EmNichs3,250 pointsBadges:
  • How can I track where an audit comes from?

    I have 4 systems - all new installed - which have many entries of event id 560 in the seclog. All systems have been checked for viruses/malware. None found. Running Windows XP Pro SP3 on these systems in a windows 2003 Server enviroment. Domain policy contains an audits for local policy....

    KL09575 pointsBadges:
  • communication between two different routing protocols

    is it possible to form adjacency between two routers running different routing protocols?

    Saurabh6chandra5 pointsBadges:
  • Which VPN would be optimal and scalable for large enterprise network

    I have two core sites and 400+ branch network through Layer-2 Data Connectivity. Which VPN solution will be best for this network   Basic WAN Information: [ULIST type="disc"> [ELEMENT class="MsoNormal">Have two core sites (Different Location)             Data Centre...

    Towhidhassan10 pointsBadges:
  • 2048-bit key in Domino 6.5

    How can I create a keyring and CSR for my 3rd party vendor in Domino 6.5? The largest key ring or CSR I can create is 1024. I know it can be done in Domino 8.5, but  we haven't upgraded yet. Thanks for your help!

    GailVan175 pointsBadges:
  • what is the wep key for wlan (NOKIA E63)

    what is the wep key for wlan (NOKIA E63)

    Dhelandiain5 pointsBadges:
  • Sponsor Post: Join Us for Endpoint Security and Identity Access Management Live Chats with Microsoft

    Today’s workforce faces a constantly evolving landscape of threats to information and infrastructure—even regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, resulting in lost productivity and real financial losses worldwide.  Join us this...

    EmNichs3,250 pointsBadges:
  • routing of traffic between two NICs

    I have two network card on my pc one is used for company's web based applications applications configured as ip        10.132.63.168 subnet 255.255.255.224 Default Gate way 10.132.63.161 2nd Nic is used for Broadband internet connection with DSL Modem when i connect to the Broadband...

    Sdonws5 pointsBadges:
  • Routing of traffic between separate compainies both using private 10 net addresses

    We have two different networks in two towns that wish you route traffic using existing 10.x.x.x network traffic. There is no conflict with the addresses we wish to use. There is of course a firwall in place on both sides. Is it possible to route all 10 net traffic between sights using one VPN, or...

    Bunny115 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following