• Need to create a bootable server 2003 CD

    Hello, I have a burned copy of Server 2003 Enterprise edition that a friend gave to me. I'd like to install it on my test server, but am unable to because the CD is not bootable. I have tried booting the server with a 98SE floppy boot disk but am unable to run setup through DOS. I currently have a...

    Kfettig5 pointsBadges:
  • Cisco IPsec VPN: VPN up but no traffic/ping

    Hi, I'm having some problems setting up an IPsec VPN between a Cisco 851 and a Draytek Vigor 2200E+. The IPsec VPN seems to establish well, passes IPsec phase 2, and shows up as an active IPsec session in both routers. The problem is that I'm unable to ping, or send any traffic, to any of the hosts...

    Synesthesia5 pointsBadges:
  • Kaspersky Internet security 2012 update issue

    I am having update issues in Kaspersky internet security 2012. My update starts and it quickly reaches to 15%, download size=142kb but then it stops at 15% for half an hour and finally the messages arrives that network connection has timed out. This is only happening with Kaspersky product. My...

    Vivek275 pointsBadges:
  • Receiving undeliverable email we did not send

    Hi everyone, One of our users keeps getting undeliverable email messages. It looks like someone out there is sending mail and making it look like it is coming from him. Is there anyway to stop this? We are running Exchange 2007. I don't think it is relaying or a virus. It does this even when his PC...

    Fuddstud0 pointsBadges:
  • Group policy: Restricting users from accessing control panel

    I want to restrict users from accessing control panel from their workstation. How can I do that?

    Mulalo0 pointsBadges:
  • Multiple DHCP Scopes for multiple VLANS

    I am using Windows Server 2003 as a DHCP server. I would like to have centralized DHCP management using the one server to give out addresses to each of the 3 VLANS. We are also using Cisco switches and I planned on using the dchp-helper to allow the DHCP packets to be forwareded to the server. I...

    Skepticals0 pointsBadges:
  • Setting up NTP time source for Windows Server 2008 Active Directory network

    How do you set the NTP time source for a Windows Server 2008 Active Directory network and force all clients to sync to the 2008 ad server for time? Will this keep the network in sync for Kerberos?

    TeachMeIT975 pointsBadges:
  • How do I find out the gateway IP address of a WiFi network my computer is connected to wirelessly

    How do I find out the gateway IP address of a WiFi network I am connected to on my computer, through the WiFi connection only. I do not have access to the WiFi router directly to or the admin page

    Skyking7675 pointsBadges:
  • Disabling USB flash drive use via group policy

    Do you know of a way to effectively disable USB flash drives while permitting other USB devices on client computers through a group policy? Our systems administrator has tried a couple of alternatives, but some of them completely disable the USB ports, and others just block some specific types or...

    carlosdl69,365 pointsBadges:
  • USB External Hard drive and Windows XP

    I have two issues which are basically the same. I have an external USB hard drive that I connect to a computer running Windows XP. Windows USB driver recognizes the hard drive and shows the drive in Device Manager but Windows does not show the drive in Windows Explorer. A customer has a USB FLASH...

    Cestanley0 pointsBadges:
  • Login user and password for a new Cisco ASA 5505 router

    What is the login user name and password for a new Cisco ASA 5505 router?

    Tom6755 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • What Next?

    We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption....

    gailayres15 pointsBadges:
  • Citrix MetaFrame Login – Credential Validation Error

    I am new to Citrix Metaframe. Recently I had a virus attack and My Citrix server crushed. I have re-installed all the necessary services and also installed Citrix Metaframe 4.0. I have published applications on a myfarm and I can open then in Citrix program neighborhood. The problem comes when I...

    Sam19795 pointsBadges:
  • Difference between layer 2 & layer 3 switch?

    What's the difference between a layer 2 & layer 3 switch?

    Krishh 279835 pointsBadges:
  • Security Knowledge in Practice implementation

    Hello, I am currently a student at the University of Advancing Technology and I am learning about security implementation frameworks this week. I was looking into a framework named Security Knowledge in Practice (SKiP) and I noticed some things about the framework and I wonder if anyone who has...

    f4ktu4l5 pointsBadges:
  • Firewall ports for shared drive access

    Which ASA firewall ports have to be opened for shared drive access?

    desertdawg5 pointsBadges:
  • New system hardening techniques

    I am a student at the University of Advancing Technology in Tempe, AZ. My class is learning more about the Plan-Do-Check-Act Implementation framework. The Harden/Secure step lists several steps that an administrator can take to ensure that a system is strengthened against known attacks, by...

    SystemSaver5 pointsBadges:
  • VNX permission problem

    Hello I want to take a back-up from our VNX (NAS). I start a test back-up and I found a problem. There are files who have only read permissions for the owner not for others. The solution is ACL's i think. Do some of you have experience with VNX ACL's

    jackieserver180 pointsBadges:
  • Strong security measures (hardware and software) for data integrity

    Please help me in choosing how subject would be achieved to defend against hacker attack – especially against information theft and intruders. Critically compare and contrast the different methods (why should i choose certain than others) available...I need it for remote sites and main office.

    DigitalDrop40 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following