If you have assigned a public ip address to your SQL Server than just connect to it with the tools you have. You would need to connect to the ip address, not the machine name. If the SQL Server has a private ip then you will not be able to connect to it by simply [...]
View Answer | January 18, 2007 12:46 PM
Access, DataCenter, Desktops, Management, Microsoft Office, Microsoft Windows, OS, Patch management, Security, Servers, SQL Server
There are five files (other than databases) four that are critical and one that is highly desired to the individual server admin and should be backed up daily and secured close tot eh server should need arise to restore a server or otherwise make a critic response at the console. File names below are generic [...]
View Answer | January 16, 2007 3:42 PM
backdoors, Current threats, Firewalls, Forensics, Hacking, human factors, Incident response, Intrusion management, Lotus Domino, Network security, Spyware, Trojans, Viruses, VPN, Wireless, worms
Hello, You mentioned restarting just the sql agent, have you tried completely rebooting the server? The problem may not be directly related to DTSs or Jobs but possibly a malfunctioning dependent process. Good luck!
View Answer | January 16, 2007 9:43 AM
Desktops, Management, Microsoft Windows, OS, Security, Servers, SQL, SQL Server
Are your exchange servers clustered? Which topology are you using; RPC/HTTPS or FE/BE?? Be sure to exclude the following directories from your virus scanning software on the Exchange servers. http://support.microsoft.com/kb/823166
View Answer | January 15, 2007 5:31 PM
Desktops, Exchange, Exchange security, Management, Microsoft Windows, OS, Security, Servers, Software, SQL Server
This is more from a user perspective, but you might provide this article for your customers: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9007142&intsrc=hm_ts_head&bcsi_scan_4012CCBD6C63F55B=9yq81SuZ3oML8mWWELp3+gMAAADmZoIH&bcsi_scan_filename=article.do
View Answer | January 12, 2007 8:58 AM
Firewalls, Forensics, Incident response, Intrusion management, Network security, VPN, Wireless
Are you able to ping via the wireless when connected outside the office? Start with the gateway, then DNS Server (whatever IPconfig/all returns) finally a web site or e-mail server on the Internet. What is your internal wireless security like? Are you using GP to enforce it? If so, what are the related policies?
View Answer | January 10, 2007 11:23 AM
Desktops, Management, Microsoft Windows, Networking, OS, Security, Servers, SQL Server, Wireless
Protocol 2 is IGMP (Internet Group Management Protocol) It is defined by RFC 1112. This is usually used for multi-casting (but now always). I’d recommend that you look at http://www.iana.org/assignments/igmp-type-numbers to further see what this is that you’re concerned about. The destination address of 224.*-whatever should alert you to the fact that this is a [...]
View Answer | January 10, 2007 3:30 AM
Application security, configuration, Database, Encryption, Exchange, Firewalls, Forensics, Incident response, Instant Messaging, Intrusion management, Network security, patching, PEN testing, Platform Security, Secure Coding, Security, VPN, vulnerability management, Wireless
I think you’ll have to assign them the ddladmin role. If that’s too much rights for them, you’ll have to resort to granting the group explicit permissions (“View Definition”) on those stored procedures.
View Answer | January 8, 2007 3:21 PM
Desktops, Management, Microsoft Windows, OS, Patch management, Security, Servers, SQL Server
Dusty: You said the sites are connected via DSL. I assume this is through the internet. If the users at the remote sites can see the domain controllers, and have a valid domain account, they can log into the domain. With that said, having your domain controllers visible to the internet is asking for trouble. [...]
View Answer | January 8, 2007 12:15 PM
Active Directory, DataCenter, Desktops, Management, Microsoft Windows, OS, Security, Servers, SQL Server
Are there any other columns you could filter by so that the number of rows updated could be shared among separate queries? For example, you could update all rows before a certain date with in one batch and all rows after in another batch. This could help lighten the load.
View Answer | January 8, 2007 11:07 AM
Desktops, Management, Microsoft Windows, OS, Security, Servers, SQL Server
If you just wanted a count of the student IDs present, you could use COUNT(DISTINCT id). However, you want a running tally-mark. This involves sorting the file to temporary storage, then looking for changes, and putting a 1 in the slot where you have the changes: WITH sorted AS( SELECT * FROM sampleData ORDER BY [...]
View Answer | April 19, 2013 11:35 PM
Access, Data/Application Integration, Database, DB2, Desktops, Development, Management, Microsoft Windows, Oracle, Oracle Business Applications, Oracle development, OS, PeopleSoft, Programming Languages, Security, Servers, SQL, SQL Server, T-SQL, Windows
Have you set the NIC property to use the Magic Packet Frame? This worked for me. Once the LAN controller has been put into the Magic Packet mode, it scans all incoming frames addressed to the node for a specific data sequence, which indicates to the controller that this is a Magic Packet frame.
View Answer | January 5, 2007 1:10 PM
Cabling, Cisco, Desktops, Hardware, Hubs, Management, Microsoft Windows, Networking, OS, Routers, Security, Servers, SQL Server, Switches
You used Windows Account way to many times in your questions but I think your asking is an IFS folder is setup with *PUBLIC *EXCLUDE and WindowsUSER1 has *ALL can WindowsUSER2 map a drive to that folder and the answer is no.
View Answer | January 5, 2007 8:43 AM
http://support.microsoft.com/default.aspx?scid=kb;EN-US;q234270 http://www.windowsnetworking.com/articles_tutorials/Managing-Printers-Group-Policy-Part1.html http://www.windowsnetworking.com/articles_tutorials/Managing-Printers-Group-Policy-Part2.html Hi, I dealt with this issue over a year ago with a big project I worked on. I think this has to do with Windows 2003 applying the policy at boot up. Does your script remove and add the printers when it is applied? Check the links above. I used vb to [...]
View Answer | January 4, 2007 8:29 AM
DataCenter, Desktops, Management, Microsoft Windows, Networking, OS, Security, Servers, SQL Server, Tech support
Did you change this setting for all users or only one user?
View Answer | January 4, 2007 2:44 AM
Desktops, Exchange, Exchange security, Hardware, Interoperability, Management, Microsoft Windows, OS, Security, Servers, Software, Spam, SQL Server, Tech support
Hello, What type of budget do you have to invest in a DR solution? There is a growing number of products available using snapshot technology to back up databases such as Exchange or SQL which minimizes gaps between data collection. Open file technology has improved quite a bit as well. Downside to these options are [...]
View Answer | January 3, 2007 10:16 AM
Backup Exec, Exchange 2003, Exchange Backup, Veritas
Asking for a description from anyone about an ideal network is like asking for a description of the ideal woman, or car, etc. It depends…. You can build the biggest, most redundant and reliable network, but it may be complete overkill for what you are needing. You need to determine what you business needs are [...]
View Answer | January 3, 2007 7:49 AM
Is your ISA and OS up to date with fixes and SP? Check the event log for specific errors.
View Answer | January 1, 2007 10:00 AM
Firewalls, Forensics, Incident response, Intrusion management, Microsoft Windows, Network security, VPN, Wireless
Check Event Log of the Servers that holds the FSMO Roles, espacially the Schema Master and Domain Naming Master.
View Answer | January 1, 2007 8:20 AM
Desktops, Management, Microsoft Windows, OS, Security, Servers, SQL Server
Here is a suggestion from a users group: SubInACL in the Win2k Resource kit is able to do this: subinacl /noverbose /file serversharedir /setowner=whoever subinacl /noverbose /subdirectories serversharedir* /setowner=whoever If you don’t have the Win2k RK, the SubInACL.exe in the Windows Server 2003 RK (free) will maybe work on Win2k as well. Windows Server 2003 [...]
View Answer | December 28, 2006 10:38 PM
DataCenter, Desktops, Management, Microsoft Windows, OS, Security, Servers, SQL Server, Tech support