We have a need to run numerous virtual servers from a NAS/SAN. The questions is, which should we choose? THe product we support (Citrix XenServer) supports either for backend virtual system storage and can run VM’s from either. Currently, our needs are small. We have about 10 virtual servers that we want to migrate to [...]
Answer Question | July 24, 2008 6:44 PM
DR, HBA, iSCSI, NAS, NFS, RAID 5, SAN, Virtual Machines, Xen
m suppose to build a honeypot system for my final year project, since my title is “developing a honeypot system for network administration” i chose the title, cus its unique, nobody ever has done it in our college yet, but now i’v been reading about it, n m confused on how to build one, does [...]
Answer Question | March 4, 2008 5:05 PM
Exchange 2003 RGC shows link state down for time to time to Bridgehead server and no mails flow even we are able to ping and telnet to the destination bridgehead server. We normally restart the SMTP to resolve this issue. Kindly let me know why this happens and any resolution.
Answer Question | March 4, 2008 1:06 PM
Bridgehead Server, Exchange 2003, Routing Group Connectors
what is a status code 50 in netbackup?
Answer Question | February 29, 2008 5:51 PM
Backup & recovery, NetBackup, Veritas
A user can be part of more than one Authorization list but can an object be also secured by more than one AUTL??
Answer Question | April 8, 2010 4:24 PM
AUTL, iSeries, Security
How can I remove these viruses from my Network? From Messenger Service; A message displayed to my all workstations including servers that “My God! Someone killed a chines hacker-2 Monitor..”
Answer Question | January 26, 2012 6:17 AM
I’ve got a Linksys BEFSR81 wired router, which is networked to about 5 other Linksys/Motorola routers. The BEFSR81 is on WEP, as are the others. The system runs at a crawl after i download the first 5mb of most files. I have been told that it could be that it’s because this system is on [...]
Answer Question | March 2, 2008 4:13 PM
Routers, WEP, WPA
I am on a Windows Server 2003 environment and I am currently working on folder permissions. Here is a small diagram of folders: Folder A / B C / / D E F G I am trying to deny deleting folders A, B and C but still allow users below that level to delete and [...]
Answer Question | February 29, 2008 4:04 PM
Permissions and settings, Windows Security, Windows Server 2003
Our company has a share called “ClientStore” where we store all client information. Within the “ClientStore” folder we have a letter for each letter in the alphabet. Then we have another folder with the client’s company name within the folder that the client’s company name starts with. Then we have all the client information within [...]
Answer Question | February 29, 2008 4:01 PM
Active Directory, GPO, Windows Security
How can I allow a user to access a shared folder by using Active Directory? I want only this user to be able to save data in this folder and to do so from any computer.
Answer Question | February 29, 2008 4:00 PM
Active Directory, Windows Security
How can I restrict a user from installing any software by making a Group Policy on domain server?
Answer Question | February 29, 2008 3:59 PM
Group Policy, Windows Security
I run a computer lab in a high school. We have a multi-platform environment with 12 XP Pro machines, six Windows 2000 machines and eight Vista Home machines. We are experiencing problems with students accessing class folders and deleting files. All students log in as student. I need a strategy to prevent all student users [...]
Answer Question | February 29, 2008 3:58 PM
Network access, Windows Security, Windows XP
I want to configure an account limiting its abilities to: 1)It cant install any application 2)restrictions on web 3)Accessing my local drives (eg D:) not the Windows Partition
Answer Question | February 26, 2008 7:17 AM
User accounts, User Permissions, Windows XP
Is it possible that someone could hack into an email account (without changing your passwords), send and recieve emails from your hotmail account while making it look like it came from your IP address, set up fake dating site profiles in your name (with all of your details, photographs etc) , and somehow managed to [...]
Answer Question | February 26, 2008 2:06 AM
Email, IP addressing, Security
A user deleted a file on our server from his workstation. I tried to recover this file but I can’t find it and I don’t have shadow copy on my server. How can I recover this file?
Answer Question | April 17, 2013 10:04 PM
Deleted files, File recovery, Windows Security
When I patch my Windows servers, how do I ensure that the patches have actually been implemented?
Answer Question | February 28, 2008 10:03 PM
Patch management, Windows security for the channel
From our Windows Server 2003 Web server, we are using Windows certification services for issuing certificates for our clients. After issuing the certificate to the client, the certificates are stored in the server. Is there any way to delete the issued certificates from the server? Do they pose a security risk if they remain on [...]
Answer Question | February 28, 2008 10:02 PM
Security certificate, Windows Server 2003
I need Windows Server 2003 folders to allow uploading duplicate file names. An example of a file that would be in this folder is mytest.txt file. Someone would have a newer version but would keep the same file name. I need them to have access to overwrite the existing file without any prompts, and the [...]
Answer Question | March 5, 2008 9:29 PM
Windows Security, Windows Server 2003
I am unable to open a Group Policy Object. The system cannot find the path specified in Windows Server 2003. I can open about half of the GPOs and edit them, but I can’t open the other half. If I rebuild the GPO, it works fine. I have run DCDIAG (Clean), GPOTOOL (Clean), I have [...]
Answer Question | March 4, 2008 9:27 PM
GPO, Group Policy Objects, Windows Security, Windows Server 2003
I’m working on a project which is on the Ethernet switch. I’m totally new to it. Could you help me with access control lists (ACL), Quality of Service (QoS), and packet filtering concepts in detail? I find it difficult writing test cases for it.
Answer Question | February 27, 2008 9:20 PM
Access Control List, ACL, Ethernet switching, Networking, Packet filtering, QoS, Quality of Service, Switches