We use Exch 2003 R2 Sp/2 and have IMF configured and working satisfactorily. Our ISP is advising to have our incoming email configured to accept from 1 IP block. The ISP provides us with Perimeter Email Protection (PEP). All email is routed through PEP.Is the suggestion a valid one considering we have IMF configured? Thanks
Answer Question | April 18, 2008 6:07 PM
Exchange 2003, IMP, Perimeter Email Protection
Our Lotus Notes Admin left and I am tasked to manage it. As more issues pile in I am still baffled by gaining access. I finally got the Lotus Notes 6.5, Domino Admin, and Designer installed but I don’t have permissions to do anything. I have access to the server directly if needed but I [...]
Answer Question | April 16, 2008 1:23 PM
Domino Administrator, Lotus Notes, Lotus Notes 6.x, Password
Have a W2003 server, part of our domain, whose shares are only accessible using domain IDs. A local ID on the server given suitable access rights to a share can’t attach remotely, using the same credentials. Even local admins can’t access remotely even to Admin$, IPC$, C$ or other created shares. Other 2003 servers using [...]
Answer Question | July 30, 2008 9:41 AM
Domain Server, Network connectivity, User Permissions, Windows Server 2003
I have been using exchange server 2000 for a year sending all outbound email through an SMTP connector to SBCGLOBAL.NET with no problems. This last week they changed their protocol to use SMTP with SSL and Authentication to SMTP.ATT.YAHOO.COM. My system stopped working. I have tried to reconfigure the exchange server with no luck. I [...]
Answer Question | April 15, 2008 8:57 PM
Exchange 2000, SMTP, SSL, Yahoo
can any one help with a lost past word for data file.
Answer Question | April 15, 2008 8:09 PM
Password, Symantec, Symantec Q&A
How important is it to have anti-virus on the computer that provides VOIP?
Answer Question | May 21, 2008 3:59 PM
Antivirus, VoIP, VoIP desktop devices
Is there any reason I should keep year-old snort log files? Only techs access the system and I need the space.
Answer Question | April 15, 2008 3:46 PM
Backup & recovery, Data Center, Data management, Log retention, Snort/Sourcefire
Hello Users let me tell you my lan senirio, in my lan i keep a internet server where droping DSL, and i install server 2003, I setup this Pc by configuring “remote and routing ” , acctually I have to know steps. 1) how will i configur our clients computer to access internet , client [...]
Answer Question | April 14, 2008 7:55 AM
Routing and Remote Access, User Permissions, Windows Server 2003
INFORMATIONAL SURVEY – Certified Software Quality Analyst Dear friends, I beseech you to spend few minutes and participate in my career information survey. Am currently working in a non IT field and planning to take up the CSQA exam, since I am looking for career shift in the IT industry? I request your assistance by [...]
Answer Question | April 13, 2009 12:34 PM
CSQA, Green belt Six Sigma, ISO 9001, IT auditing
How to Get/Set Share Permissions of a Shared Folder? Am able to get the Security Permission through ACL, but am not able to ger Share Permission. Please give some code snippets in .Net….
Answer Question | April 15, 2008 9:41 AM
ACL, Permissions, Share Level Permissions, Shared folders
Hello all, please tell me SFRM mean and its functionality in window server 2003. From which package or tool i will find it. I have Server 2003 CD but i can’t locate it. Also tell me its procedure how to install it. Thanks Muhammad Usman.
Answer Question | April 13, 2011 7:31 AM
Disk quota management, Security, SFRM
AOA Dear all, I have Enable Volume Shadow Copy feature in server 2003. Now i want that the previous version feature not to be show to any client user. The problem is that i have no install any client software on the client machine but client user view the Previous version feature. I want that [...]
Answer Question | April 20, 2008 5:31 AM
Security, Volume Shadow Copy, Windows Server 2003
I am trying to setup a squid proxy server. Squid 2.6.stable 17 .I have looked through various documentations but have not managed to get it work. I can start it up but it wont filter on the localhost (all web sites open up, even if I’ve set an acl to clowck it). if I try [...]
Answer Question | April 14, 2008 9:24 PM
ACL, FC8, Fedora Linux, Proxy, Squid
Has anyone heard of or used a solution that can prevent the forwarding or sending of internal emails that contain sensitive info or PI in an Exchange environment? It would seem it would have to happen at the point of creation. Is encryption the answer, although keys could be forwarded just as easily? Thanks.
Answer Question | April 19, 2008 3:52 PM
Email security management, Exchange security, Intrusion management
from where veritas take date and time and put in the backup xml file?
Answer Question | April 11, 2008 11:51 AM
Backup, date, Time, Veritas, XML
Hello, Is it possible to set a size limit on users folders in Windows 2003 server? Any ideas would be helpful. Thanks, Muhammad Usman.
Answer Question | April 11, 2008 5:01 AM
Disk quota management, Security, Windows Server 2003
Hey… this is kinda interesting… supersize-me for spam http://itknowledgeexchange.techtarget.com/it-trenches/did-you-see-this-issue-3
Answer Question | June 8, 2012 7:02 PM
Email, Security, Spam
I am trying to access a URL using the HttpURLConnection in Java code. The URL is password protected. I have to authenticate our Lotus Domino server for accessing before even attempting to access the URL. How do I authenticate my Lotus Domino server to access the password protected URL using the HttpURLConnection? Can anyone give [...]
Answer Question | March 8, 2012 5:16 PM
Authentication, Java, Lotus Domino server, Password protected, URL
hi i have an application portal hosted on one of the machines on our lan with the connection path “http://10.0.0.2:8082/cgi-bin/root.app.exe/”, and would like to connect to it with the internet URL “http://myapp.mydomain.com/”. www.mydomain.com is hosted by a local service providor, and i have created an A-Record called “myapp.mydomain.com” pointing directly to my ISA Server 2006 [...]
Answer Question | April 11, 2008 7:54 AM
ISA Server, ISA Server 2006
whether double authentication scheme can be applied to distance vector routing protocols
Answer Question | April 10, 2008 7:00 AM
Double Authentication, Network security, Routing protocols, Security