Floodgate is not worth its price in money. While it does feel good, being able to control the traffic at the firewall level, Floodgate fails in reporting. If you refer the brochure, you can see, it can do a lot of stuff about reporting. However, Floodgate only provides limited reporting functionality (top 10/20 whatever). However, [...]
View Answer | November 16, 2004 6:33 AM
Bandwidth, Check Point
It’s possible, but likely rests on the configuration of your VPN. It’s it an SSL-based solution or PPTP, or is it something lower-level, like a LAN Extension-type product?
View Answer | November 9, 2004 10:12 AM
cacls command can show you the NTFS permissions of files/folders.
View Answer | November 6, 2004 2:44 AM
Auditing, Data center operations, DataCenter, FAT and NTFS, Hardware, Help Desk, Operating system platforms, Performance/Tuning, Policies, Registry, Remote management, Servers, Space/structure, Storage, Tech support, Windows, Windows 2000 desktop, Windows 2000 Server, Windows client administration and maintenance, Windows Server 2003
A – Do you want to get your hands dirty or want a ‘admin’ job? B – You find yourself in the same boat as someone with NO experience. Five years was three generations in computer science. Dirty – Cisco routing cert and Security cert they can get you in the door. Make sure your [...]
View Answer | November 5, 2004 2:13 PM
Career development, Certifications, Security
What operationg system are you using and what network operationg system are you using? Without knowing the details there in one way to do this (kind of old fashion)but…create a batch file to run everytime the user logs in and put it in the startup folder under documents and settings. Have is say what you [...]
View Answer | November 5, 2004 1:47 PM
SAP, Security management, Tech support
Phone line -dedicated or not is just the physical media that the data is transferred over. HIPAA, GLB, Sarbanes-Oxley all deal with data and requirements for protecting that data, NOT the physical media. The physical security requirements – limited access to workstations, data servers, data centers – deal with preventing wiretaps. A ‘dedicated’ phone line [...]
View Answer | November 5, 2004 10:59 AM
If you are just starting out in IT get your A+. If you have been around computers and know them well enough go for your MCSE and then maybe a CCNA.
View Answer | November 5, 2004 10:56 AM
Career development, Certifications, DataCenter, Networking, Networking certifications, Security, Security management
View Answer | November 3, 2004 10:59 AM
Distribution/logistics applications, Signature updating/Management
Dear Sharan: A digital signature is an electronic sequence of bits that stands as a unique demonstration of its user’s identity. For more details on the term, see the excellent definition at WhatIs.com: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211953,00.html. For a more detailed tutorial on the subject, see the American Bar Association’s coverage of digital signatures at http://www.abanet.org/scitech/ec/isc/dsg-tutorial.html. www.searchsecurity.com will [...]
View Answer | October 27, 2004 10:34 AM
Security management, Security products, Tech support
Something like this can take a lot of frustrating time to troubleshoot which may prove futile in the end anyway. The simplest thing might be to reinstall Windows if you can – especially if you haven’t gotten too far in the process of setting up the server.
View Answer | October 26, 2004 12:19 PM
This sounds like a protocol timing issue – perhaps a hardware issue on the server. Make sure you’re running the latest network driver on your server (and possibly even a test workstation) and check your network hardware (switches, etc.) to see if you’re getting any errors. This could require a network analyzer to see things [...]
View Answer | October 26, 2004 12:16 PM
Firewalls, Forensics, Incident response, Intrusion management, Network security, Security, VPN, Wireless
An excellent package for IT Service Departments is Remedy Service Management. It is from GE and is a modular system that you can structure to suit your needs. You can call them at (877) 443-2487 and they’ll put you in touch with someone who can help you. WARNING- Once placed in use, you can become [...]
View Answer | October 25, 2004 10:40 AM
Content management applications, Corporate portal applications, DataCenter, Desktops, E-mail applications, Exchange, Firewalls, Forensics, Hardware, Help Desk, Incident response, Intrusion management, IT architecture, Knowledge management applications, Lotus Domino, Migration/Upgrades, Mobile devices, Network management software, Network security, Networking, Outlook, Planning, Project management, Security, Security management, Systems management software, Tech support, VPN, Wireless
Is the physical file keyed? Are there any logical files built over the new physical? If so, you should consider temporarily removing the logicals. If the application isn’t keying the physical as it runs, it should run much faster….
View Answer | October 25, 2004 8:20 AM
COBOL, Data analysis, DataCenter, Development, Disaster recovery software, ERP, Financial services applications, Help Desk, Incident response, Lifecycle development, Manufacturing applications, Office Applications, Programming Languages, RPG, Special-purpose software, SQL, Storage, SunGard Data Systems, Systems Union Group, Tech support, Transaction Systems Architects
What you’re describing looks like to me a basic HelpDesk package. These can have quite a bit of functionality. I basic one like Track-it, http://itsolutions.intuit.com/landing.asp or a more intuitive self-help application like HelpDesk from http://www.grouplink.net.
View Answer | October 24, 2004 9:55 PM
Business/IT alignment, Corporate portal applications, DataCenter, Desktops, E-mail applications, Exchange, Hardware, Help Desk, Implementation, IT architecture, Knowledge management applications, Lotus Domino, Migration/Upgrades, Mobile devices, Network management software, Networking, Outlook, Planning, Security, Security management, Systems management software, Tech support
Personal biased opinion here. I find Microsoft technet abismal at best. 90% of the problem solutions I need come from other sources, namely Oracle Metalink, HP, or others. If you can find the “right” solution on technet you still need someone to explain it to you. Recently I’ve been having a problem with an HP [...]
View Answer | October 21, 2004 10:52 AM
configuration, Desktop security, patching, PEN testing, Platform Security, Security, vulnerability management, Windows, Windows 2000 desktop, Windows 2000 Server, Windows 95/98, Windows client administration and maintenance, Windows Server 2003, Windows tools/WSRM, Windows XP
IMHO. as the budget is only 125k I would say forget it. eg 40 average laptops @ $2k = 80k leaving $45k for infrastructue. Even if go to a server at main site and all satellite clients over terminal services etc the licensing as well as assoc. hw will chew up much of the if [...]
View Answer | October 19, 2004 6:48 PM
Budgeting, DataCenter, Networking, Project management, Security, Servers
You did not mention the average daily increase – industry average would be about 1 percent per day for very rapid growth = 250 to 350 percent each year (do you work weekends). Or medium growth of 1 percent a week, I hope this is your model or you are living on borrowed time. NAS [...]
View Answer | October 17, 2004 10:31 AM
Backup & recovery, DataCenter, Dell, IT architecture, Veritas
As far as I know you cannot implement a use counter in a template because when the user saves their data the template is not updated. This is as it should be otherwise mistaken input would alter the template for the next user in ways you never intended.
View Answer | October 15, 2004 10:21 AM
Database Management Systems, DataCenter, Desktop management applications, Desktops, Development, Hardware, Microsoft Systems Management Server, Networking, Programming Languages, Security, Systems management software, Tech support, VBA, VBScript, Visual Basic
Pretty broad question, but for installation issues with Oracle on Linux, I have found this site very helpful if used with the installation notes as well as some the documents available on Metalink. Good Luck http://www.puschitz.com/OracleOnLinux.shtml
View Answer | October 15, 2004 10:15 AM
Administration, AMD PC hardware, Data warehousing/Business intelligence, Database Management Systems, DB2, Development, Hardware, Implementation, Installation/Upgrade, MySQL, Operating system platforms, Oracle, Oracle 8i, Oracle 9i, OS/390, Performance/Tuning, PostgreSQL, Security products, Servers, SQL, SQL Anywhere Studio/M-Business Anywhere/Avantgo, Standard Edition, Standard One Edition, Storage, Storage management, Tech support, UDB for mainframe, Unisys, z/OS
I don’t know about the last three months but in my opinion, small hardware security devices that include VPN, Firewall protection, virus protection, content filtering etc have become fairly inexpensive, comprehensive solutions for smaller businesses. There are many vendors manufacturing such devices now but I personally like some of the SonicWall solutions. Max
View Answer | October 15, 2004 4:59 AM
Security, Security management