Hi, I had joind a company with a big, complicated and un-documented network. I want to know some connections passing through which switches. Some of the switches are layer2. To make it harder, switches are of different brands. Any idea how to achieve that? Regards
Answer Question | January 18, 2010 5:58 AM
Layer 2 switches, Layer2 switches connectivity, Network hardware, Switches
Hi All, We recently had a power failiure during our daily backup procedure (Yes outlasted our 30 min emergency ups) This inadvertantly caused the back to fail, now every time we try to log in we have message that sates “end of day processing please try later” then we come back to log in screen. [...]
Answer Question | January 19, 2010 9:27 PM
AS/400, backup error., Logon failure, logon problem
I’ve already searched on the forums, and searched posts relating to 508 compliant testing. My question is, how reliable are the free websites that check your website? I’m looking for a simple tool that could be used to test web-based training for 508 compliance. Anybody have any recommendations?
Answer Question | January 24, 2010 8:43 PM
Compliance, PEN testing, Security compliance
How can we enable username/password window in Microsoft Outlook 2003 and 2007? We you try opening MS Office 2003 , it directly takes u to Inbox. How can we ensure that there is some authetication asked before it opens the MS Office?
Answer Question | January 15, 2010 10:21 AM
Microsoft Office, Office 2003, Outlook 2003, Outlook security, User Permissions
Are there any Firewalls in MAC? If Yes, How are they differnent from Windows Firewall. If No, How does MAC handle the risks of Attacks and intrusions?
Answer Question | May 10, 2010 9:58 AM
Firewalls, Mac OS X
Why do we not require a anti virus in MAC?
Answer Question | May 10, 2010 9:55 AM
Antivirus, Mac OS, Mac OS X
“How to make code of biometrics fingerprint scanner using Visual Basic 6.0?”
Answer Question | April 14, 2012 9:45 AM
Biometric authentication, Biometric Security, Biometrics, VB 6, Visual Basic, Visual Basic 6
I have a windows 2000 server running filezilla’s ftp server running FTPS, port 990 I have a customer that requires SFTP which is SSH file transfer protocol, port 22. Can I just install SSHWindows on the same server and run both at the same time, as SFTP is not running over the same secured port? [...]
Answer Question | January 14, 2010 3:58 PM
Filezilla, FTPS, SFTP, SSHWindows
We are developing an ASP.NET 2.0/3.5 application that needs to display the logged in Windows Userid of the user. Is there a method that we can use that will allow us to determine this information ?
Answer Question | January 13, 2010 4:56 PM
ASP.NET 3.5, Windows Security
Dear MCSE please help me how to configure my exchange server 2003 and ISA Server 2004, currently i am using now pop3 to get my email from my hosting IP 220.127.116.11. to download my incoming message from external to internal by using igetmail. now myboss he like to use ISA server 2004 to work [...]
Answer Question | January 11, 2010 5:56 AM
Exchange 2003, ISA Server, ISA Server 2004, Systems administration
I have a batch file that I run from my server to establish communication with Symantec System Center on a different server within the same domain. The batch file works when run from a desktop with local admin rights (the computer shows up in the Symantec System Center), but users can’t run it since they [...]
Answer Question | January 8, 2010 8:11 PM
Batch files, GPOs, Group Policy, Group Policy management, Symantec, Symantec System Center
We’ve recently added 250 Knowledge Points to the following profiles for tweeting out our Google Nexus One Challenge: Jaideepkhanduja OwenAmbrose Carlosdl Ryan8613 MarkK Tweet out our Google Nexus One Challenge now and you can also earn the 250 Knowledge Point bonus. Remember that you don’t have to be an expert to earn Knowledge Points in [...]
Answer Question | January 27, 2011 3:23 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP Gateway
You’re asking and answering questions already, so why not put those Knowledge Points to good use? Win a Nexus One, Google’s new cell phone! It’s unlocked, so you can sign on with the (select) carrier of your choice contract-free! Read all the details, but the short and long of it is that over the next [...]
Answer Question | February 27, 2010 3:30 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
Hi, Can anyone please tell me when we enter a network path of any machine like (192.168.1.1) a popup appears. if you can tell me what services start this popup and which ports on network it uses.
Answer Question | January 7, 2010 1:10 PM
Network Authentication, Windows authentication
Hello all, A PCI compliance scan of my web server revealed that it allows weak and anonymous ciphers. I set the sslciphersuite entry in the ssl.conf file, but it didn’t change anything. Any ideas how to set the allowed ciphers in Oracle AS 10g?
Answer Question | January 6, 2010 12:01 PM
Oracle Application Server, PCI compliance
when i run my oracle 10g application in internet explorer it works fine, but when i tried to run it in Mozilla firefox browser its give me error. i cant run same application on mozilla firefox which runs fine on internet explorer
Answer Question | January 6, 2010 9:49 AM
Internet Explorer, Mozilla Firefox, Oracle 10g, Oracle applications
I have a VPN connection between 3 offices. I can not see a computer on the network from another computer hovwever I can remote connect to it and ping it. example: if I go to my computer and put the IP adderss I get nothing. I have no problem with this between 2 of my [...]
Answer Question | January 8, 2010 3:00 PM
Connection Issues, Network Associates, VPN issue
We have a McAfee SIG 3200 appliance, and rules are pretty much clear cut – Deny this, allow that! The ‘deny’ and ‘allow’ are applied to the different categories we have created for the different levels of access groups. whilst the rules remain unchanged, restricted sites (like yahoo, youtube etc) are accessible by our users. [...]
Answer Question | January 5, 2010 5:37 AM
Firewall management, Firewalls, McAfee Firewalls, McAfee SIG 3200
how d i bypass cisco iron port web filtering.Using proxy setting and port numbers.
Answer Question | January 5, 2010 5:14 PM
Cisco Firewall, Firewalls, Iron Port
Have a user using Outlook 2003 on WinXP Pro. User is set up with a signature that is preset as her default when she opens a new email. She use to be able to go to Insert where she would have a Signature option and when she would place her cursor over it, she could [...]
Answer Question | January 26, 2010 8:08 PM
Outlook 2003, Signatures