• how can configure a roaming user in active directory

    how can configure a roaming user in active directory. and how can give the permission to a user to access a folder & files.

    Sudesh chauhan20 pointsBadges:
  • hi,i’ve just reloaded windows xp[sp2] on my pc and i did not format i left the current folders.But now i cannot access my documents,i receive this error ‘access denied’.

    hi,i've just reloaded windows xp[sp2] on my pc and i did not format i left the current folders.But now i cannot access my documents,i receive this error 'access denied'.

    Xxx385 pointsBadges:
  • User profile settings

    I have the results of: DSPUSRPRF USRPRF(*ALL)in a file, but I need the definition file i.e. the sequens of the informations in the file

    Revisor dk5 pointsBadges:
  • We have an internet connection from 2 different ISP, I want to use the same PIX 525 firewall 7.0(6)

    We have an internet connection from 2 different ISP, I want to use the same PIX 525 firewall 7.0(6) . My firewall has 2 Ethernet interface & 2 Giga Ethernet interfaces. I am using ethernet 0 for outside connection with ISP A ethernet 1 for outside2 connection with ISP B Giga Ethernet 0 for DMZ zone...

    Yasir Irfan5,535 pointsBadges:
  • How can I prevent users from deleting files?

    I have two or three remote users that come into my network on a VPN and map to a shared folder. I need to give them the ability to read, write and modify files and folders while at the same time preventing them from deleting those files and folders. Is there any way to do this?

    Windows Security ATE160 pointsBadges:
  • How to prevent memory hacking in game’s score?

    Hi, I'm building a java mobile game and i need to prevent people from hacking the score via the memory. I thought of maybe like this, -Instead of using numbers in the score's main variable, we use Alphabets like 1=AG, 2=RE -So the canvas or display just reads the score's alphabets and translate it...

    Melwong5 pointsBadges:
  • Help with a trojan

    I need help getting rid of a trojan that is effecting my desktop and laptop. It's name is svchost.system 32. please help me. Thanks.

    0 pointsBadges:
  • How to test the internet connection speed without putting any load and allocating bandwidth

    We do have a 10 MB internet connectivity, the speed is ok, I am monitoring the link using cacti and netflow. ISP----10 MB Link-------Cisco 3745 Router----Switch ----Firewall 525----DMZ Switch- ISA---- LAN Our bandwidth is under utilized, hence our average consumption is around 5 MB, half of our...

    Yasir Irfan5,535 pointsBadges:
  • Sonicwall to Sonicwall VPN is only one way

    I have 2 Sonicwalls and have created a VPN between them. From the remote site you can access all the computers and files at the main office. From the main office you cannot ping or connect to any computer at the remote location. This VPN needs to be two way. There are workgroups at each location...

    Hadden30 pointsBadges:
  • How will the planned changes in PCI-DSS affect the channel?

    Changes are in the offing for PCI-DSS. Are these changes for the better? How will it impact your channel business?

    Donnellymp430 pointsBadges:
  • What accounts for the trend toward SMB security?

    Our expert on SearchSecurityChannel.com says the natural consolidation of both technology and solution providers means that competition for named accounts and big-ticket items is fierce. As a result, the SMB security market is becoming more popular than ever. Has that been your experience?

    Donnellymp430 pointsBadges:
  • Do You Have A Question For Symantec’s Channel VP?

    Next week on the SearchITChannel.com Partner News Podcast, one of Symantec's top channel executives will be our guest. If you have a question about Symantec's partner program, leave it here and we'll make sure to ask when we record the podcast. This is your chance to have your voice heard! Once you...

    Colin Steele2,210 pointsBadges:
  • Do you use security metrics with your clients?

    Some experts say that security VARs and consultants aren't doing enough to help their clients formulate meaningful security metrics. The argument is that the typical security metrics aren't business-focused enough (e.g., cost reduction), so most companies end up viewing security as just an overhead...

    Donnellymp430 pointsBadges:
  • veritas backup across domain to NAS

    I am trying to back up a couple servers to my NAS. Nas and a few servers reside on domain A and a few servers reside on domain B. I am running into trouble in BackupExec on domain B when trying to add the NAS as a device. Both domains are running srvr 2k3 and the NAS is a procom netforce 800 (unix...

    Whobettrthankyle0 pointsBadges:
  • How could i set window server 2003?

    i just had started using Window Server 2003 SP1 as a Data center for my office which is we have set a permission for my colleage to be able to read the share file only, but the problem is they could access the file by the time they could be able to copy the file as well. In the past, we have using...

    Gantz5 pointsBadges:
  • I.T Security procedure

    how can secure may network

    Xxxdimagiba5 pointsBadges:
  • OpenLDAP and Oracle Database

    Hi, This is a question related to Oracle and OpenLdap. Can anybody please tell me how to setup the Oracle [10g] to use the installed OpenLdap server. I know we need to use netca and use the internet directory services; But how to set Open Ldap is the question here. Your help is greatly appreciated!...

    Parthahs5 pointsBadges:
  • Setup a user to manage user accounts in one Organizational Unit and no others

    How can I setup a user in MS2003 to manage user and computer accounts in a single OU? They should not be able to move users between OUs.

    Dppatri10 pointsBadges:
  • Change Request Management

    I am writing a new document for CR Management and integrating User discussion within the CRM tool suite we finally will provide and I am open to and hoping for input from people expert in this field. While I have used these tools for years and generally have 2 or more ready for users to use...

    Ysrd430 pointsBadges:
  • How to identyfy net usage

    I am a system admin in a private company.in my office we have 60 systems and 13 laptops.How can i get each systems internet usage ,not through proxy ,if any body have any idea about any tool please send your comments to robinsmjames@hotmail.com

    Sorry5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following