• Remote Desktop IP Virtualization in Server 2012

    Hello Expert, I wants to deploy Remote Desktop Services in Server 2012. We having IP based web filtering in Juniper firewall that's why we require session based reserve IP Virtualization. Is there any option to assign a reserve IP address to Users profile on per session basis.. Example User A...

    Server20125 pointsBadges:
  • how to stop execution of a code until a Jwindow is closed?

    Hi this might be tuff to understand- what i m trying to do is i m creating an object of a JWindow class into another class... like this:- public class GamePlay extends JPanel{ TossWindow toss; public GamePlay(){ Toss(); } public void Toss(){ toss=new TossWindow(team1Name,team2Name);...

    hussain22juzer500 pointsBadges:
  • Antivirus software

    Is it not recommended to have more than 1 anti virus software? On your computer, and if it's not, why? & why would you want to go out & install your own anti virus when more all the carriers (Comcast, AT&T, Clear, etc.) supply it with their product. Or to flip the script so to speak,...

    Bluesman21220 pointsBadges:
  • phishing site

    Over Christmas inadvertently ordered product over fraudulent site. Bank credited $. Received either used/stolen or knocked off merchandise. Now receiving threatening emails regarding payment. Chinese address. Is my computer at risk as they have email address. Bank card replaced already. Tx

    llmette10 pointsBadges:
  • How to connect two subnets and two isp’s with Cisco RV042G

    I recently bought a Cisco RV042G dual wan router and it served it's primary function of load balancing two internet connections straight out of the box! I was impressed.. Regrettably I hit the limits of my (limited) networking knowledge with the following problems. Let me describe my network first:...

    heijligers15 pointsBadges:
  • Java security warning

    The latest Java Security warning has stirred up questions. What is the real threat? And what is the recommended precaution to be taken for a Windows network environment?

    bpenza5 pointsBadges:
  • cisco ASA 5510′s setup two firewalls, one for VPN only the other for VPN tunnel and internet

    I have a question that I have been working and can not seem to figure out. I have 2 ASA 5510's. Both have Internet service's from two different providers. On one I want to use for VPN access for remote users to connect through, the other I have a VPN tunnel built and I want to have the corporate...

    Skeletor6830 pointsBadges:
  • RIP, OSPF and EIGRP in same network

    If I have 3 routers connected to gather and every router connect to it one PC I use for first one rip and for second one ospf and for last one eigrp. Its not ping from PC on first netwoke to PC in second or last network why and it ping from router one to second one?

    omar895 pointsBadges:
  • “ip http secure-server ” command is not available

    Hi, I have Cisco 2801 Router, I want to enable https. But "IP http secure-server " command is not available !!!!!? System Version GSHDSL_Router#show version Cisco IOS Software, 2801 Software (C2801-IPBASE-M), Version 15.0(1)M5, RELEASE S OFTWARE (fc2) Technical Support:...

    sam20135 pointsBadges:
  • Password removal

    I buy storage units at auction. I get computers here and there. I got one yesterday but it has a password on it. How do I remove this?

    fruitcake25 pointsBadges:
  • Login problem

    I am registered member of radiff.com and my email id is sukhdev_xxx@radiffmail.com and my pass word is 999999 but when i login i did not succeed. What should I do?

    1510194320 pointsBadges:
  • Cisco ASA 5520

    I have a Cisco ASA 5520 as my firewall and a proxy server. I want all users to access internet via proxy server but some users change their gateway to Cisco ASA and access web without being filtered. How can I block these users to use proxy server only?

    Momin5 pointsBadges:
  • Where all the places we use Layer 2 and Layer3 Switches

    Where all the places we use Layer 2 and Layer 3 Switches?

    Krishasking10 pointsBadges:
  • Unlock computer admin

    How to unlock computer administrator when it's locked?

    1568500420 pointsBadges:
  • VPN successfully established, but no traffic is passed.

    We have cyberoam firewall at most of the remote end. VPN has been established successfully. There are number of VPNs which are working fine. We had the LAN IP changed at the obne of our remote end.VPN is established successfully but no traffic is getting passed to and fro. Troubleshooting is done...

    rainachris5 pointsBadges:
  • DOS attack

    What temporary modifications can I make to Windows Firewall on Windows 7 computer that stands between the web server and the internet that would allow legitimate customers to access the web server while blocking a Denial of Service Attack?

    Vince555 pointsBadges:
  • security

    How to secure my server 2003 client only write & Read permission but client do not delete or copy, move permission?

    TusharRajane90216200245 pointsBadges:
  • How to configure Cisco router 2811

    Halo We purchased a Cisco router 2811 with two Ethernet ports: Fast Ethernet 0/0 and Fast Ethernet 0/1, but without WAN interface cards! How can I configure one of the ports to work as a WAN port and the other to act as LAN port, so as to enable the 2811 router exchange information with other...

    1234567tuiojk10 pointsBadges:
  • SFTP using Get with variable file name

    I am unable to use SFTP with a 'get' on a file that has a date variable in the file name using wildcard characters. I have attempted using an asterik as a wild card for the date and I have tried using question marks for the date characters in the file name. I get the error message 'no such file...

    persichr10 pointsBadges:
  • Further enhancing public-private key encryption/decryption

    I am a volunteer with a non-profit organization. Part of my proposal entails encrypting and decrypting Personal Identifying Information, its storage on a database, and transfer over the internet. I would like to use or extend software code that improves upon the public-key and private-key paradigm....

    Pja15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following