I was wondering if we just got symantec endpoint protection 11.0 renewal do we also need a backup exec 2010?
Answer Question | November 8, 2011 6:09 PM
Backup, Backup and recovery software, Backup Exec, Backup Exec 11d, Symantec Endpoint Protection 11
I understand there are a number of versions of the Bluetooth Specification, recently V2.1 with EDR and V3.0 and 4.0 perhaps on the horizon. How do I determine what versions are supported by my bluetooth hardware? (PC USB dongle or internal Laptop H/W) Can I test that my v2.0 or v2.1 device supports EDR (Enhanced [...]
Answer Question | July 8, 2010 2:36 PM
Bluetooth-Compatible Applications, Dongle, USB devices
I seem to be able to remote into Win XP and lower, but major issues when i try to remote into my PC which has Win 7 installed. Not specific error message – just that user authentication failed. I have checked the remote settings on my Win 7 PC and Allow access to lower network [...]
Answer Question | July 8, 2010 8:44 PM
SonicWall VPN, VPN, Windows 7, Windows 7 in 2010, Windows Upgrades, Windows XP
not ble to open tally 9.2 company as there is virus in my data. how to remove the virus
Answer Question | January 26, 2012 6:01 PM
Data Recovery, Tally, Virus removal
Today’s workforce faces a constantly evolving landscape of threats to information and infrastructure—even regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, resulting in lost productivity and real financial losses worldwide. Join us this month for two Live Chats that will help you avoid these losses and gain a better [...]
Answer Question | July 6, 2010 5:48 PM
CIO, DataCenter, Endpoint security, Exchange server software, Identity and access management, Microsoft Live Chat, Security, SQL Server, Windows
How can I create a keyring and CSR for my 3rd party vendor in Domino 6.5? The largest key ring or CSR I can create is 1024. I know it can be done in Domino 8.5, but we haven’t upgraded yet. Thanks for your help!
Answer Question | July 7, 2010 2:34 PM
Certificate Signing Request, Lotus Domino 6.5, Windows Server 2003
Our Websense license needs to renewed by the middle of this month. I have been advised to switch to a Baracuda web filter solution. The rationale is that it is both a hardware and software solution that will enhance our network performance. Other advice suggests moving the Websense to its own server so it can [...]
Answer Question | December 3, 2010 1:07 PM
Barracuda, Web filtering, Websense
I would like to know the process of installing an IOS on a cisco router or switch. What are the steps and commands for installing the IOS.
Answer Question | July 9, 2010 6:33 PM
Cisco IOS, Cisco router configuration, IOS, Routers, Switches
I have two network card on my pc one is used for company’s web based applications applications configured as ip 10.132.63.168 subnet 255.255.255.224 Default Gate way 10.132.63.161 2nd Nic is used for Broadband internet connection with DSL Modem when i connect to the Broadband connection then i can,t access carprate application. pls help me. Thanks [...]
Answer Question | July 6, 2010 10:06 AM
Dual NICs, Dual NICs Routing, Network routing, Routing
After installing the SSL for OWA I am unable to open the OWA with https:// while before with the http:// I can not face any problem
Answer Question | July 8, 2010 7:53 PM
Outlook Web Access, Outlook Web Access Configuration, OWA 2003, SSL
we are using a oracle D2k 6i based software and by mistake some one has changed a .fmx patch to open with notepad and now all the files with such extension has been changed. so please tell me how to recover the file.
Answer Question | July 2, 2010 8:10 AM
D2K 6i, File recovery, FMX, Oracle 6i, Patch management
Is there a way to put documents on the Web site and put a password on them so only certain people can open them?
Answer Question | July 2, 2010 6:04 PM
Document warehousing, Dreamweaver, Web security
I would like to make port-security a little more flexable. For example, lets say I have 24 access ports. I would like to have a list of 24 mac-addresses that could access any one of those 24 ports at any time. So the interface port would look to see if the device trying to connect [...]
Answer Question | July 2, 2010 1:38 PM
Cisco 2960, Cisco switches, MAC address, Port Security
Setting up a small network – I have a 16 port switch all computers are accessing the internet through. Can I set up a network on this configuration as is?
Answer Question | March 1, 2011 11:34 PM
Network Configuration, Port Switches, routers and switches, VPN routers
how do you reset the password
Answer Question | June 30, 2010 1:33 PM
Netgear router, Netgear WGR614, Password cracking, wireless password, Wireless routers
Can an MS SQL service account run non-SQL services if “trust this user for delegation to any service (Kerberos only) has been enabled?
Answer Question | August 26, 2010 2:11 AM
Kerberos, MSSQL, SQL Server permissions, SQL Server security
I am wondering if there are any applications available in the market which would allow me to protect my hard drive data. Are there any tools which would prevent a hard drive from being accessible if it was removed from a computer and plugged into another computer or a portable hard drive case? I realize [...]
Answer Question | November 1, 2011 12:11 AM
Data protection, Data security breaches, Encrypting File System, External hard drives, Storage in 2010
I installed the VeriSign certificate and everything looks ok, but when i assign the certificate to the application it gives me an error saying that there’s no certificate for the type of application. Any idea ?
Answer Question | July 1, 2010 8:07 PM
AS/400, V5R4, VeriSign
I have a remote factory location that connects back to our home plant to get dns resolution. Most of the systems are configured to look to the PIX firewall at that location, and/or our dns server at the main facility via a point-to-point network setup we have. What I would like to do is have [...]
Answer Question | July 2, 2010 5:16 PM
Cisco networks, Cisco PIX Firewall, DNS configuration, Networking, PIX 6.3
is it possible to form adjacency between two routers running different routing protocols?
Answer Question | July 8, 2010 4:23 PM
routers and switches, Routing protocols, SMTP