• Running SIP proxy server as a virtual machine

    What role does the SIP proxy server play and what issues would we see if it goes down? Can we run it as a virtual machine and have a backup one in another VM?

    TeachMeIT975 pointsBadges:
  • Auditing Oracle 10g and above

    Is it possible to fully audit Oracle Databases without Oracle's audit tools? At least on 10g and above, many of the configuration files that could be reveiwed and audited for content and permissions no longer exist or are not used. Init.ora, sqlnet.ora are no longer used, and I suspect I will find...

    DanD2,865 pointsBadges:
  • Creating firewall rules to allow FTP connections

    I need to create firewall rules to allow FTP connections from specific clients. I have their network address/subnet mask. How can I add this for all servers from my Sonicwall Pro 3060?

    TeachMeIT975 pointsBadges:
  • You Pick: Drupal’s Building Blocks, Scalability Rules, Building Cloud Apps, DTrace

    This week, you get your pick of our most recent IT book titles. Check out our latest titles in the IT Bookworm Blog for more details on these books: Scalability Rules Multicore Application Programming Drupal's Building Blocks Building Applications in the Cloud DTrace To win one of these great...

    MelanieYarbrough6,345 pointsBadges:
  • Gmail SMTP relay

    Hi, Just came to know that there is a possibility of SMTP relaying using gmail accounts(google apps as well). Can anyone help me on this ?????? I`m using Ubuntu 10.04 LTS

    Jibin405 pointsBadges:
  • Nullify Password in Solaris

    I have a userid (eg:rock) created with a password assigned to it now I want to nullify the password so that if I type in the userid (i.e. rock) the user should login without being prompted for a password

    Vohinder5 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • Fault tolerance on a web server

    What is the best way to have fault tolerance on our web server? We have a few backup machines all identical that get replicated via scripts every 10 minutes. How cab we automatically fail over to another already configured box if the primary production machine fails? Is this some DNS magic?

    TeachMeIT975 pointsBadges:
  • Contest Bounty: Ask/Answer questions this weekend, earn 100 points!

    Is the rain keeping your weekend plans from getting off the ground? Well, IT Knowledge Exchange has a chance for you to take advantage of staying indoors. Ask or answer 10 questions* this weekend, and you will earn 100 knowledge points, good for our current contest! Any combination of...

    MelanieYarbrough6,345 pointsBadges:
  • Windows XP SP2 problems after virus removal

    Hi, I am having a problem with windows xp. The pc had a virus on and I removed the virus with MCFEE antivirus. There after I am not able to logon. The computer gets to the loging screen, I logon but it reverts back to the login screen. I did a windows repair install, fixboot and fixmbr but the...

    Kiviet5 pointsBadges:
  • winchat.exe

    we have disabled access to many instant messenger programs, however we use winchat to communicate with each other, my question is whether or not some sneaky csr(customer service rep) finds access to this program, can we monitor the conversations thru it? we dont want to restrict access on all the...

    Tdurden5 pointsBadges:
  • Backup and restore with Backup Exec 2010

    I have a Lotus Domino 6.5 environment , clients as well. I have 2 questions , I'll ask the first one then once I get that answer I'll ask the next . I have recently upgraded Symantec to BE 2010. The new agent will no longer talk to the Lotus 6.5 databae , this is the Symantec remote agent for Lotus...

    MPSCareFree40 pointsBadges:
  • Corrupted file in Windows XP SP3

    We have an XP SP3 user with a corrupt profile. When logging in to it you get a blank desktop. When copying the files to another profile it works. What should I do? Will it be corrupted as well? What causes profile corruption?

    TeachMeIT975 pointsBadges:
  • SonicWall 3060 firewalls

    Do licenses allow us to create a hot spare sonicwall 3060 firewall licensed up and ready for action if the primary firewall fails?

    TeachMeIT975 pointsBadges:
  • Need SUSE LINUX ISO IMAGE?

    hi if any one having iso image for SUSE Linux.kindly give me.

    Sabarirajan45 pointsBadges:
  • Completed IT Knowledge Exchange Profile? Earn points!

    What's a community without a face? Let your fellow IT Knowledge Exchange members know a little more about you and your expertise by filling out your public profile and uploading a photo. Then put the link to your profile in the discussion area below to claim your 10 knowledge points, good toward...

    MelanieYarbrough6,345 pointsBadges:
  • Free Syslog tools

    What is the best free syslog tool? We used to use kiwi but it is no longer free. We need to simply monitor a syslog, write it to disk and resolve IPs in it to host names.

    Troubleshooter24755 pointsBadges:
  • Empty Reports in Forefront TMG SP1

    Hello! I am running Windows Server 2008 R2 Enterprise and Forefront TMG 2010 adn SQL-Express as local database After upgrading Forefront TMG 2010 to sp1 reports stopped generates. Reports are empty. First problem was "The report server cannot process the report. The data source connection...

    11235813215 pointsBadges:
  • Restrict traffic for Cisco VPN clients

    Hi all, First some background for my question: I have recently set up a VPN tunnel between a Cisco PIX 506E (VPN server) and remote clients. The remote clients use Cisco VPN Client software version 4.8. Everything seems to work fine. But as it is configured right now the remote clients have full...

    Daniel40 pointsBadges:
  • How to tackle the security risk an IT administrator generates

    Hello, im an auditor for global copany risks. One of the things that we look for is sepperation of functions. shortly said, you don't want the same person creating your bill's and be able to pay them (because he presents a serious security risk for commiting fraud.) Now what to do with an Domain...

    Nauthiz5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following