• Count distinct rows on multiple columns

    I want to write a single query that counts each distinct Student ID from the following sample data. Sample Data: ID NAME PLAN DESCR --- ------- ---- ------------------- 101 Michael 010C Cafe- 10.00 Dollars 102 Adam 010C Cafe- 10.00 Dollars 102 Adam 05CC Cafe- 5.00 Dollars 103 Jane 010C Cafe- 10.00...

    Mjackson0 pointsBadges:
  • How does IPSec Passthrough enable packet transfer through a router?

    I have configured a remote access IPSec VPN with UDP encapsulation enabled which passes through a broadband router which in turn has IPSEC Passthrough enabled. The remote access tunnel works fine with the IPSEC Passthrough enabled. However, if the Passthrough option is disabled the tunnel is not...

    NetworkingATE1,545 pointsBadges:
  • Need to create a bootable server 2003 CD

    Hello, I have a burned copy of Server 2003 Enterprise edition that a friend gave to me. I'd like to install it on my test server, but am unable to because the CD is not bootable. I have tried booting the server with a 98SE floppy boot disk but am unable to run setup through DOS. I currently have a...

    Kfettig5 pointsBadges:
  • Cisco IPsec VPN: VPN up but no traffic/ping

    Hi, I'm having some problems setting up an IPsec VPN between a Cisco 851 and a Draytek Vigor 2200E+. The IPsec VPN seems to establish well, passes IPsec phase 2, and shows up as an active IPsec session in both routers. The problem is that I'm unable to ping, or send any traffic, to any of the hosts...

    Synesthesia5 pointsBadges:
  • Kaspersky Internet security 2012 update issue

    I am having update issues in Kaspersky internet security 2012. My update starts and it quickly reaches to 15%, download size=142kb but then it stops at 15% for half an hour and finally the messages arrives that network connection has timed out. This is only happening with Kaspersky product. My...

    Vivek275 pointsBadges:
  • Receiving undeliverable email we did not send

    Hi everyone, One of our users keeps getting undeliverable email messages. It looks like someone out there is sending mail and making it look like it is coming from him. Is there anyway to stop this? We are running Exchange 2007. I don't think it is relaying or a virus. It does this even when his PC...

    Fuddstud0 pointsBadges:
  • Group policy: Restricting users from accessing control panel

    I want to restrict users from accessing control panel from their workstation. How can I do that?

    Mulalo0 pointsBadges:
  • Multiple DHCP Scopes for multiple VLANS

    I am using Windows Server 2003 as a DHCP server. I would like to have centralized DHCP management using the one server to give out addresses to each of the 3 VLANS. We are also using Cisco switches and I planned on using the dchp-helper to allow the DHCP packets to be forwareded to the server. I...

    Skepticals0 pointsBadges:
  • Setting up NTP time source for Windows Server 2008 Active Directory network

    How do you set the NTP time source for a Windows Server 2008 Active Directory network and force all clients to sync to the 2008 ad server for time? Will this keep the network in sync for Kerberos?

    TeachMeIT975 pointsBadges:
  • How do I find out the gateway IP address of a WiFi network my computer is connected to wirelessly

    How do I find out the gateway IP address of a WiFi network I am connected to on my computer, through the WiFi connection only. I do not have access to the WiFi router directly to or the admin page

    Skyking7675 pointsBadges:
  • Disabling USB flash drive use via group policy

    Do you know of a way to effectively disable USB flash drives while permitting other USB devices on client computers through a group policy? Our systems administrator has tried a couple of alternatives, but some of them completely disable the USB ports, and others just block some specific types or...

    carlosdl65,110 pointsBadges:
  • USB External Hard drive and Windows XP

    I have two issues which are basically the same. I have an external USB hard drive that I connect to a computer running Windows XP. Windows USB driver recognizes the hard drive and shows the drive in Device Manager but Windows does not show the drive in Windows Explorer. A customer has a USB FLASH...

    Cestanley0 pointsBadges:
  • Login user and password for a new Cisco ASA 5505 router

    What is the login user name and password for a new Cisco ASA 5505 router?

    Tom6755 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • What Next?

    We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption....

    gailayres15 pointsBadges:
  • Citrix MetaFrame Login – Credential Validation Error

    I am new to Citrix Metaframe. Recently I had a virus attack and My Citrix server crushed. I have re-installed all the necessary services and also installed Citrix Metaframe 4.0. I have published applications on a myfarm and I can open then in Citrix program neighborhood. The problem comes when I...

    Sam19795 pointsBadges:
  • Difference between layer 2 & layer 3 switch?

    What's the difference between a layer 2 & layer 3 switch?

    Krishh 279835 pointsBadges:
  • How do I recover deleted files on a server?

    A user deleted a file on our server from his workstation. I tried to recover this file but I can't find it and I don't have shadow copy on my server. How can I recover this file?

    Windows Security ATE160 pointsBadges:
  • Security Knowledge in Practice implementation

    Hello, I am currently a student at the University of Advancing Technology and I am learning about security implementation frameworks this week. I was looking into a framework named Security Knowledge in Practice (SKiP) and I noticed some things about the framework and I wonder if anyone who has...

    f4ktu4l5 pointsBadges:
  • New system hardening techniques

    I am a student at the University of Advancing Technology in Tempe, AZ. My class is learning more about the Plan-Do-Check-Act Implementation framework. The Harden/Secure step lists several steps that an administrator can take to ensure that a system is strengthened against known attacks, by...

    SystemSaver5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following