• Remove AD User object that is inheriting permissions

    I have an old user account that belongs to several distribution groups. The user WAS a member of the Domain Administrators group, but has been removed from that group, and now only belongs to Domain Users group. When I attempt to move this user from a dist list, I get "You cannot remove this...

    Jrlokken35 pointsBadges:
  • How to limit users to downloading file size limit?

    hi all, I am sandeep .I have ISA 2004 Server, how can I limit the download File Size? example not to allow user to download files bigger than 10MB

    Kapadane105 pointsBadges:
  • Read Only Table

    I create a table in sql server 2k5, the script is look like this: CREATE TABLE [dbo].[tb1PmtD]( [PmtDLU] [int] NOT NULL, [PmtDInvLU] [int] NOT NULL, [PmtDAmount] [money] NOT NULL ) ON [PRIMARY] GO ALTER TABLE [dbo].[tb1PmtD] WITH NOCHECK ADD CONSTRAINT [tb1Pmttb1PmtD] FOREIGN KEY([PmtDLU])...

    Ipong40 pointsBadges:
  • To connect to a wireless network?

    I am trying to connect to my company's wi fi network. Is it neccessary to know the SSID name and the WEP Or WPA key? Also can we try sniffers like aircap to gather and capture the required credentials. Do tools like these capture the SSID name and the encryption key also?

    Rahul Shrivastava330 pointsBadges:
  • Cisco Site to Site DMZ Question

    Server A: 192.168.1.219 Server B: 192.168.2.220 10.10.10.10 1 gateway at 10.10.10.1 on Server B. Server A needs to connect to Server B. A can ping anything on 192.168.2.x but it cannot ping 192.168.2.220. Server B has two nic cards, hence two IP's, the internal of 192.x and the dmz 10.x. The...

    bradob160 pointsBadges:
  • Have you tried XVT Cross Platform Studio 2008?

    Is anyone aware of XVT? You can build C/C++ applications and compile the single source on any of 14 platform/OS combinations (windows, mac, unix, linux). Anyone tried it free? Anyone using it? www.xvt.com

    EnPassant5 pointsBadges:
  • Community Update: New Member Contest Win a XBox 360 this month for your participation.

    After a long, stressful day in IT, video games can be a great way to unwind and relax. That’s right, you know where this is leading. It’s time for a cool new contest on IT Knowledge Exchange. The month of September ( Sept 1-Sept 30) is your chance to get your hot little hands on your very own...

    ITKE352,565 pointsBadges:
  • windows xp security tips

    i am going to be storing a windows xp sp3 based tower for a period of months while travelling. while the tower will be relatively secure, i'm unfamiliar with newer password cracking techniques, as i've never had to implement them. all sensative data on the machine is encrypted using fips algorithms...

    Redbird15 pointsBadges:
  • To see user’s web site visit information in Linux

    Dear Friend I want to see the user's web site visit detail by using Linux code. And the same time want to see bandwidth using by the user i.e. monitor the bandwidth. Another question is, I want to block user's web site surfing from my PC. I am working here as Network Administrator. I use Red Hat...

    PervezIT15 pointsBadges:
  • Accessing email server behind firewall

    I have an email Microsoft exchange mail server running on our LAN, it takes emails form various ISPs and sends then to outlook users on the LAN via juniper firewall, i have a mac pc and i want to configure mac Mail with exchange server, i was able to get mails but fail to send emails. please help...

    26055 pointsBadges:
  • SID showing after restore

    i want backup files From NAS (W2k3 Storage Server) and restore to w2k3 Server (enterprise) . Backup Runs well and when i have resttored the files on the Target Server (w2k3 Server Enterprise )i get a access denied.Looking at the security tab , ACLS shown correctly for all groups (including domain...

    Ashneel10100 pointsBadges:
  • Definition of the withGrant parameter in SQL

    When giving permissions to database users in SQL, what does the withGrant parameter do?

    SQL Server Ask the Experts2,585 pointsBadges:
  • PKI certs from a “protected” system to an “unprotected” system?

    Can you send or transfer emails with PKI certs from a "protected" system to an "unprotected" system through a guard or cross-domain solution? When you send an email with PKI enabled, you send your public key with the message. However, if the destination you send it to receives it, can someone hack...

    Scriptkiddie5 pointsBadges:
  • Accessing email server behind firewall

    I have an email mail server running on our LAN, it takes emails form various ISPs and sends then to users on the LAN. I want to be able to access this email server via IMAP from the internet so I can see my emails when out of the office. I can set a rule which allows web traffic to a web server but...

    Bridgemics15 pointsBadges:
  • Small Business Anti-Virus Help!

    Whats the best way to set up antivirus protection to 5 computers on a shared server?

    YuliasAcups5 pointsBadges:
  • Cisco ASA 5500 and G.703 connection

    How should a G.703 modem be connected to a Cisco ASA 5500?

    Sponglertz5 pointsBadges:
  • Exchange 2007 Resource Forest / Public folder rights

    Hello, I have the following problem. We have a Exchange Resource Forest. The User forest is called Kenia-u, the resource forest kenia-r. For our archiving product it is necessary that the user Kenia-u\service2 has owner rights on a public folder. Service2 has a linked mailbox on the exchange 2007...

    Peterau5 pointsBadges:
  • Sametime will not auto logon

    Lotus Notes does auto logon just fine, and SameTime launches, but will not logon unless I click on the logon button.

    Pcdocga10 pointsBadges:
  • Exchange Server 2007 Edge Server DNS DMZ IP problems?

    Ok, so we deployed Exchange server 2007 with an Edge server. The Edge server has two network cards. 1 Card for the DMZ in the 10.10.10.x range and 1 in the internal 192.168.13.x. Problem is when it is up and running it works fine, for ~10-12 hours. After it stops receiving email but can still send....

    bradob160 pointsBadges:
  • Exchange restores from swapped raid 1 drives

    My question relates to hardware and exchange. In this scenario I would be running a set of hotswap raid 1 drives: one with exchange and the information store databases and another with transaction logs. If my Information store were to become corrupt and I loaded a backup set of drives with the...

    Arakes0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following