What is the difference between the Checksum and TornPageDetection values of the PageVerify option in a SQL Server 2005 database’s properties?
Answer Question | November 5, 2008 6:15 PM
Checksum, PageVerify, SQL Server 2005, SQL Server database, TornPageDetection
I am on SQL Server 2000, and to secure my database, I want the user to be prompted for a user ID and password before the database is expanded. How might I do this?
Answer Question | November 5, 2008 5:54 PM
Database security, SQL Server 2000, SQL Server database, SQL Server security
We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can [...]
Answer Question | November 4, 2008 12:32 PM
.OST files, Encryption keys, Exchange migration, Exchange Server
Dear i need a technique that will maintain performance of PC either i use PC with internet or with out it by protecting virus. how can i see virus presence at DOS command prompt level.
Answer Question | January 30, 2012 6:27 AM
Antivirus, Desktops, Virus detection, Virus prevention, Virus protection
I understand about restoring the computer. However, for right now, how do I rid this virus from my computer? Norton finds it, but when I click “remove” it doesn’t remove it like it usually does. I’m not sure how to set up firewalls, but I’ll find that out later too. Any tips about removing it [...]
Answer Question | January 30, 2012 12:57 AM
malware, Trojan horses, Trojan.ByteVerify, Trojans, Virus removal
hI, I WOULD LIKE TO CREATE A SHARED IN WINDOWS 2003 WHERE USERS WILL BE ONLY ALLOW TO COPY THE FILE FROM THE SHARED FOLDER TO THEIR LOCAL MACHINE.I DON’T WANT THEM TO OPEN IT IN THE SERVER .IJUST WANT THEM TO BE ABLE TO COPY THE FILE .
Answer Question | June 16, 2012 11:11 PM
Shared folders, User Permissions, Windows Server 2003
Ok..i have a 1841 router with 12.4(19) and we use MS VPN client to connect to one of our clients. If i use from home, it works fine and a couple other sites it works fine, but at the office behind our 1841 router it doesn’t. Talked to the clients firewall service providers and they [...]
Answer Question | March 19, 2009 9:16 PM
Cisco 1841, Cisco Routers, Firewalls, Routers, VPN, VPN Client, VPN software
Get some Amazon.com gift cards for your holiday shopping. Now is your chance to win an Amazon gift certificate based on your activity in the IT Knowledge Exchange Community. Remember: the more you ask, answer or discuss questions, the more Knowledge Points you will earn. The top 10 most active members from noon today (Nov [...]
Answer Question | November 19, 2008 3:19 PM
AS/400, CIO, CRM, Database, Development, Exchange, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
Dear all. I have a File server as W2k3 and my need is users access to their sharing Account once,the next exiting the windown from Clients site ,they still can use another account of sharing. it means authority is required each login times. e.g I access to \fileserver once time with account :test/pass:123 after that [...]
Answer Question | March 31, 2012 1:06 PM
file sharing, User Permissions, Windows File Server
Hi all, There is a site, which provides access to a service if it comes from my office IP. Now I want to access the same service(or page) from home by making my home IP same as office ip, tricking the web site to believe that I am accessing from office. By the way the [...]
Answer Question | November 10, 2008 5:42 AM
Change IP address, IP address, IP spoofing, Networking
I need to implemet the shared mailbox solution for the work requiremtns. My concern is if its possible to track which user of the users who already have Send As permission to that shared mailbox, has sent actually the email. Is is possible? And HOW? Thanks
Answer Question | November 3, 2008 9:58 AM
Exchange 2003, Exchange 2003 shared mailboxes, Exchange user permissions, Mailbox management, Shared mailboxes, User Permissions
My company was just acquired by a larger one, and we are now preparing to combine our IT departments. What is the best way to do this and guarantee that everyone maintains access to the data/resources that they need? Should we create clusters based on who needs what? Can you recommend any visualization tools (or [...]
Answer Question | November 3, 2008 8:24 PM
Acquisitions, Clustering, Data Center, Data center planning, IT administration, Scalability
I am auditing a enterprise data warehouse and am concerned at the level of access provided. I’ve found many users who have read, update, and delete rights to all working environments (testing, QA, Production)
Answer Question | October 31, 2008 2:08 PM
Access Rights, Enterprise data management, User access
How to segment a specific group on a network to have its own bandwidth without tremendously slowing down the rest of the network?
Answer Question | October 31, 2008 1:00 PM
Bandwidth management, Network performance, Network Segmenting, Network Topology, Networking
Hi Last night when I browsed an unkown site suddenly my display size where changed and became so smaller than normal size!!! I run antivirus(I updated in before and its MacAfee) but I didn’t detect anything!!!! every thing in display setting is normal!!!! Could you please help me!!!!!??? Thank you. —- Regards Mahnaz
Answer Question | January 30, 2012 6:54 AM
Antivirus, malware, McAfee, Virus detection, Windows XP
I am trying to load Kaspersky 2009 on my pc at home but when trying to install a message comes up saying incompatible software is installed. It says the software is AVG 8 but i have removed all my AVG programs already? Any solutions would be appreciated.
Answer Question | June 14, 2010 9:05 PM
AVG, Kaspersky, Kaspersky Antivirus 2009
Hi, I have a remote office connected over a T1 line to the main office with Cisco routers. The problem is that I get tons of logs in our main firewall that connects to the outside world saying “Ping of Death Blocked” The source of the attack is always an IP address(not always the same) [...]
Answer Question | October 29, 2008 8:36 PM
Firewalls, LAN, Ping, Remote access, T1, WAN
We currently have Exchange 2003 and use ISA 2004 to publish OWA and HTTP/RPC. We are now moving to Exchange 2007 and have only seen clear instruction on using ISA 2006. Is the bottom line that I also have to go ISA 2006?
Answer Question | October 28, 2008 2:23 PM
Exchange 2003, Exchange 2007, Exchange migration, Exchange Server 2003 to Exchange Server 2007 Upgrade, HTTP over RPC, ISA Server 2004, ISA Server 2006, Outlook Web Access, OWA
I’m using Isa client 2004 bun when it is active I can’t connect witch sap client.
Answer Question | November 26, 2008 12:52 PM
ISA Server, ISA Server 2004, SAP Client
Hi folks I have a 64-bit vista ultimate PC with all SP’s applied. I have been attemting to upgrade the existing instance of SQL Server Expr to SP2, but it stops installing with an error dialog box saying: SQL BPA command line has stopped working Eventually I end up on a web page containing the [...]
Answer Question | October 27, 2008 9:54 PM
Authentication, Installation, SQL Express