• Intel’s Open Port IT Scavenger Hunt has launched: Win a laptop and other great prizes.

    Think you've got the smarts to navigate Intel's Open Port community for answers to questions about Intel products? You could win a brand new 2010 Core vPro-based laptop, among other prizes. If you're an IT Knowledge Exchange member, we'll also give you 200 bonus Knowledge Points and send you a free...

    ITKE351,965 pointsBadges:
  • Acronis multicast and pxe boot over multiple vlans

    I just recently set up my switches to segregate my network into vlans and I have a sonicwall router to allow for inter vlan communication. I also have a server with acronis installed on it so I can image all of my computers when I need to do so. The problem now is, is that since I've enabled my...

    Wtfacoconut5 pointsBadges:
  • Port 443 is ‘filtered’ to internet clients. How can I make it ‘open’?

    The problem is that HTTPS 443 port isn't accessible from interned, but it is open in local network. Our iSeries is connected to inet via L2TP withot IPSec. If no packet filters are active, nmap shows that ports 25, 80, 110 and even 10322 (WAS admin console) have state 'open' on internet ip address....

    MICHAELRUS5 pointsBadges:
  • ISA Server 2000 error 12202

    When I disable proxy in browser and have isa client installed and configured, I receive: ’ The ISA Server denies the specified Uniform Resource Locator (URL). (12202)’ What am i doing wrong

    123456300 pointsBadges:
  • The most-watched IT questions this week: Feb. 16, 2010

    1. JHite ran into an Outlook 2003 display name issue for contact with multiple email, and XENOPHON22, Mrdenny and Carlosdl helped out. 2. Windows Server 2003 is giving a member some installation trouble, and MrDenny offers some advice. 3. Can you block Exchange 2007 admins from viewing other...

    ITKE351,965 pointsBadges:
  • Internet Restricting in ISA Server

    I AM NOT FAMILIER IN ISA,IN WHICH OPTION IN ISA I CAN RESTRICT INTERNET ACCESS?INCLUDING CLIENT SETTINGS.

    Razak5 pointsBadges:
  • Password synchronization doesn’t mean that the two passwords in sync are same.?

    What does syncronising the two different passwords mean? For example: What does the folowing paragraph mean? "All three groups of users may now receive an error or be prompted for a password. In this case, the user should enter their network password (the one they use when they first log onto the...

    TechFreak5 pointsBadges:
  • 802.1X

    What is the difference between NAC and 802.1x?  Can you implement 802.1x without NAC?  My understanding is you could implement a NAC solution not utilizing 802.1x but not the other way around.    Thanks Rick McGee 

    Mac15 pointsBadges:
  • Service Level Agreements (SLA) for cloud computing services

    Can anybody enlighten me about what kinds of things are in a real SLA for a cloud? I'm primarily interested in performance and availability. My reason for asking: A research group I'm becoming affiliated with has a neat technique for optimally scheduling tasks to provide realistic guarantees on...

    ITKE351,965 pointsBadges:
  • Sniffer Port

    Can a Sniffer port with port mirror configured pass data traffic?

    Vptechie70 pointsBadges:
  • VPN, WIFI and Sonicwall

    I have Wifi system on separate vlan and VPN is enabled on the Sonicwall 2040. Access works fine when accessing from outside the establishment IE home or cafe, but when I try the VPN from the wifi system we have setup it won't go through. What am I missing?

    Jsuarez145 pointsBadges:
  • Is Windows virtualized in a Mac OS safer?

    With so many people worry about virus/spam out in the cloud and looking for a safe haven would this reduce the below work to reduce virus/spam. Windows has a rep for having virus, so if I decide to use a Mac and install Windows as Virtual. Would any virus or spam be stop by the MAC before it gets...

    Webwillie8325 pointsBadges:
  • Cisco’s IOS emulator crackdown: What are your thoughts?

    The latest buzz around Cisco is that its latest iteration of its emulator OS, IOS 15, will help the company crack down on the use of its IOS emulator without plugging in a product key -- something many home network pros and enterprise network managers have relied on until now, especially when...

    JennyMack4,280 pointsBadges:
  • SiteMinder integration with SharePoint 2007?

    Can SiteMinder user authentication and single sign-on be integrated with Microsoft Office SharePoint Server 2007? Moderator Note: This is a user submitted question

    BrentSheets6,925 pointsBadges:
  • What is the .iso format?

    we downloaded a file in .iso format, but were expecting a .exe. what is .iso?

    P0688125 pointsBadges:
  • To block Skype messenger traffic from an organisations internal network?

    Hello All, I am trying to figure out how one can block skype from an organisations internal network? The threat here is it has the ability to change the port on which it is communicating. Normally ports 80 and 443 are open on a firewall for web browsing.

    Rahul Shrivastava330 pointsBadges:
  • The IT Blog Top 10: Feb. 4, 2010

    Here are the most popular blog posts on the ITKnowledgeExchange network this week. Read the rest of the top 10 on the Community Blog, or apply for your own blog by e-mailing me at Michael@ITKnowledgeExchange.com. 1. How to allow the root user to log in to VMware ESX Server with SSH David Davis’...

    Michael Morisy8,323 pointsBadges:
  • The most-watched IT questions this week: Feb. 2, 2010

    Tick tock, tick tock. What’s that sound?  The countdown for the Nexus One Challenge. What? You’ve moved on? Well

    Michael Morisy8,323 pointsBadges:
  • setting up cisco ACS SE

    Dear All, I'm trying to install an ACS Solution Engine in My network for access control (AAA). I succeed in setting up authentication using the internal database and that works. now My boss want users to be authenticated through an external database (windows AD). I tried achieving this but kept...

    Vwarhe5 pointsBadges:
  • Process documentation

    I need a tool (affordable!) for documenting complex processes.  The processes are custom, customer-specific and may be both administrative and technical in nature.  The idea is to have documentation that follows the incident process - showing questions to ask and actions to take (dependent upon...

    HDPro15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following