• Can I create I forgot my password page in Active Directory or SBS 2003?

    I have a user that consistently forgets their password. I then change it to a standard corporate password and then they change it again. We repeat this several times a week. Can I have some sort of "I forgot my password" page to answer secondary security questions? Can this be done via AD and SBS...

    NewnanIT1,110 pointsBadges:
  • In Access 2007, how do I increase the file lock capacity so I can split an existing table into smaller ones?

    In Access 2007, how do I increase the file lock capacity so I can split an existing table into smaller ones? Thanks

    Kadiddlehopper5 pointsBadges:
  • Restricting access to a file share to certain computers

    Here is the scenario. I have a Windows server 2003 domain with two DC's. This is an educational environment with roughly 3,000 computers and 30,000 users. Students are logging in with their own unique credentials. My issue is that there are multiple computer labs that need a share configured to...

    Siliconron20 pointsBadges:
  • Making Outlook Web Access (OWA) work on Firefox 3.6

    Outlook web access will not work on Firefox 3.6. Our president really wants it to work. Is there anything I can do so he does not have to use Internet Explorer? Windows 7 on the laptop and desktop. Exchange 2005 on the backend.

    NewnanIT1,110 pointsBadges:
  • Computer Information Technology

    Im currently enrolled in Computer Information Technology, and concentrating on Network admin and Security. What courses do i need to enroll in to be compatiable.

    Tbelcher5 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Could a honeypot machine risk the secure network?

    If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?

    ITKE346,055 pointsBadges:
  • Run out of addresses on SonicWall pro 3060

    We are using One to One nats on a sonicwall pro 3060. We have run out of addresses.We use them for remote desktop. There has to be a better solution. Has anyone found one yet? We have server 2003, 2008 and XP, 2000 and 7 clients.

    TeachMeIT975 pointsBadges:
  • Answer a Question, Win The Official Ubuntu Server Book!

    At the beginning of the month, we gave away The Official ubuntu Book, and now we're giving away The Official ubuntu Server Book, Second Ed.! The book includes a DVD that contains the versions of Ubuntu Server needed for different CPU architectures. You also receive a code for a free online version...

    MelanieYarbrough6,345 pointsBadges:
  • server temporary freezing

    I have Dell poweredge 700 with Dell CERC SATA 1.5/6ch Raid controller card in RAID 5 I have about 20-30 stations connected to it at any moment. The disk queue is small below 1 from time to time people will experience desconnection problems such as i will try to access file and server will stop...

    Dimchik0 pointsBadges:
  • Kerberos unconstrained delegation for MS SQL svc account

    Can an MS SQL service account run non-SQL services if "trust this user for delegation to any service (Kerberos only) has been enabled?

    Calicdaj5 pointsBadges:
  • Advice on wireless switching/routing and HP Procurve 2510G purchase?

    Hi, I'm thinking of purchasing the above model of intelligent switch(partly on monetary factors) for our network and I would appreciate any advice. I understand different Switches have different attributes such as layer 2 and layer 3 swicthing/routing . Also some work symmetrically/asymetrically...

    Pelvicthrust170 pointsBadges:
  • Data encryption best practices

    What is the best practice for data encryption? We use wifi and sometimes connect to unsecured networks. How can we use free encryption technology to keep our data safe from prying eyes? Even if someone gets our data I want it to be useless.

    ITKE346,055 pointsBadges:
  • Fix Patch 4 on Lotus Notes 8.5.1 client

    Problems with running with fix Patch 4 on  Notes 8.5.1 client.

    4410 pointsBadges:
  • TZ 100 Hang, ping with no response and vpn drop and reconnect

    TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.

    Atracc5 pointsBadges:
  • How do I find Route ip Address to query ipRouteNextHop ?

    How I find Route ip Address to query ipRouteNextHop ? in other words how find yellow segment  that it is the result of requesting  into 192.168.128.17?

    Rezvan15 pointsBadges:
  • System Administrators Access in a HR/Payroll System

    Hi I have taksed to define the access rights for sys admins for a HR/Payroll system. The thoughts are divided among the groups here - one, the segretion of duties that should limit any type of user to perform tasks end to end since this is a payroll system; two since it is a sys admin access the...

    Cognos20015 pointsBadges:
  • Appropriate configuration for adding a wireless router to a wired network

    What is the appropriate configuration for adding a wireless router to my wired network without affecting the network. This will be for visitors and does not need access to the network other than internet and printing. I would like to separate this out to our dmz. Are there white papers on this?

    TeachMeIT975 pointsBadges:
  • Client Loves User-Level Security, But Needs Access 2007

    Hey Guys, I have a Client for whom I have remodeled an access database. The database was initially created in Access 2003, and has been updated in 2007, though it is still in .mdb format. I showed the client a few simple user-level security options, and they worked like a charm. The only problem is...

    Washkuhnw90 pointsBadges:
  • Block MAC Address on Cisco Aironet 1260 Router

    How can I block one mac address from connecting to my Cisco Aironet 1260 Series router? We have open access but one client is being troublesome. Can this be done from the router or is it supposed to be done via the PIX firewall?

    JimmyIT1,725 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following