• File size download limit using ISA or any other tool

    I want to limit my users to download upto specific file size to download.

    Loveislife20 pointsBadges:
  • Cisco Site to Site DMZ Question

    Server A: 192.168.1.219 Server B: 192.168.2.220 10.10.10.10 1 gateway at 10.10.10.1 on Server B. Server A needs to connect to Server B. A can ping anything on 192.168.2.x but it cannot ping 192.168.2.220. Server B has two nic cards, hence two IP's, the internal of 192.x and the dmz 10.x. The...

    bradob160 pointsBadges:
  • Have you tried XVT Cross Platform Studio 2008?

    Is anyone aware of XVT? You can build C/C++ applications and compile the single source on any of 14 platform/OS combinations (windows, mac, unix, linux). Anyone tried it free? Anyone using it? www.xvt.com

    EnPassant5 pointsBadges:
  • Community Update: New Member Contest Win a XBox 360 this month for your participation.

    After a long, stressful day in IT, video games can be a great way to unwind and relax. That’s right, you know where this is leading. It’s time for a cool new contest on IT Knowledge Exchange. The month of September ( Sept 1-Sept 30) is your chance to get your hot little hands on your very own...

    ITKE62,200 pointsBadges:
  • windows xp security tips

    i am going to be storing a windows xp sp3 based tower for a period of months while travelling. while the tower will be relatively secure, i'm unfamiliar with newer password cracking techniques, as i've never had to implement them. all sensative data on the machine is encrypted using fips algorithms...

    Redbird15 pointsBadges:
  • Monitoring software for hardware usage

    Need to determine the best real-time monitoring software for hardware. Would like non-vendor specfic information on usage and suggestions for data placement in Raids and NAS type of storage,along with SOX. This request for help was originally submitted to the Research Assistant on WhatIs.com.

    ResearchAssistant855 pointsBadges:
  • To see user’s web site visit information in Linux

    Dear Friend I want to see the user's web site visit detail by using Linux code. And the same time want to see bandwidth using by the user i.e. monitor the bandwidth. Another question is, I want to block user's web site surfing from my PC. I am working here as Network Administrator. I use Red Hat...

    PervezIT15 pointsBadges:
  • Accessing email server behind firewall

    I have an email Microsoft exchange mail server running on our LAN, it takes emails form various ISPs and sends then to outlook users on the LAN via juniper firewall, i have a mac pc and i want to configure mac Mail with exchange server, i was able to get mails but fail to send emails. please help...

    26055 pointsBadges:
  • SID showing after restore

    i want backup files From NAS (W2k3 Storage Server) and restore to w2k3 Server (enterprise) . Backup Runs well and when i have resttored the files on the Target Server (w2k3 Server Enterprise )i get a access denied.Looking at the security tab , ACLS shown correctly for all groups (including domain...

    Ashneel10100 pointsBadges:
  • VPN won’t authenticate

    Hi, We have an Windows Server 2003 R2 Standard Edition SP 1 - Small Business Edition Domain Controller and a Windows Server 2003 R2 Standard Edition SP 1 ISA Server 2006. We have VPN setup in ISA and the administrator user has no problems connecting. With any other user we are denied access....

    DX15 pointsBadges:
  • Definition of the withGrant parameter in SQL

    When giving permissions to database users in SQL, what does the withGrant parameter do?

    SQL Server Ask the Experts2,585 pointsBadges:
  • How do I deploy a public-key infrastructure (PKI) for Exchange 2003?

    I have a front-end and a back-end server both using Exchange Server 2003 and an Active Directory server. What is the best method to deploy a public-key infrastructure (PKI) for Exchange Server 2003?

    Exchange Ask the Experts580 pointsBadges:
  • PKI certs from a “protected” system to an “unprotected” system?

    Can you send or transfer emails with PKI certs from a "protected" system to an "unprotected" system through a guard or cross-domain solution? When you send an email with PKI enabled, you send your public key with the message. However, if the destination you send it to receives it, can someone hack...

    Scriptkiddie5 pointsBadges:
  • FTP Users and Files access and management

    Hi, Our company has over 20k users, and we provide them with service packs and other downloads through our website (under HTML address). I want to have a little more control and report abilities over who's downloading what, and I am looking for such a system that can help me achieving that. 1. I...

    Saar15 pointsBadges:
  • Accessing email server behind firewall

    I have an email mail server running on our LAN, it takes emails form various ISPs and sends then to users on the LAN. I want to be able to access this email server via IMAP from the internet so I can see my emails when out of the office. I can set a rule which allows web traffic to a web server but...

    Bridgemics15 pointsBadges:
  • Small Business Anti-Virus Help!

    Whats the best way to set up antivirus protection to 5 computers on a shared server?

    YuliasAcups5 pointsBadges:
  • Cisco ASA 5500 and G.703 connection

    How should a G.703 modem be connected to a Cisco ASA 5500?

    Sponglertz5 pointsBadges:
  • Exchange 2007 Resource Forest / Public folder rights

    Hello, I have the following problem. We have a Exchange Resource Forest. The User forest is called Kenia-u, the resource forest kenia-r. For our archiving product it is necessary that the user Kenia-u\service2 has owner rights on a public folder. Service2 has a linked mailbox on the exchange 2007...

    Peterau5 pointsBadges:
  • How to prevent user to login from defferent system in Active directory Domain 2003 server?

    Hi All, I am sandeep. I have created 2003 AD server. in that gp is config to redirect My document and desktop to server. all user use different system every day. some user login on two or three system at a time i want to prevent user to so and trace only valid user is login in domain. plz help me.

    Kapadane105 pointsBadges:
  • Sametime will not auto logon

    Lotus Notes does auto logon just fine, and SameTime launches, but will not logon unless I click on the logon button.

    Pcdocga10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following