Problem: We use Outlook 2003 as dispatch software for our company. Each order gets sent to the Outlook client (2003) from a CSR who has taken the order. The dispatcher then forwards the email to a driver’s phone. The driver then replies to confirm reception of the order Then, the dispatcher *deletes* the order and [...]
Answer Question | February 16, 2009 5:25 AM
Email management, Exchange user settings, Microsoft Outlook 2003, Outlook, Outlook 2003, User Permissions
Does it is practically possible to monitor and manage real time RPO and RTO for Disaster recovery environment?
Answer Question | February 14, 2009 12:56 PM
Disaster Recovery, Disaster recovery and business continuity, Disaster recovery services, Disaster recovery software, Recovery Point Objective, Recovery Time Objective
How can we do MAC address binding in Layer 2 (L2) and Layer 3 (L3) switches?
Answer Question | January 25, 2011 12:17 AM
L3 Switches, Layer 2 switches, Layer 3 switches, MAC address, Network equipment, Network hardware, Networking, Routing and switching
Hi All, I’m working on a small SFTP scripting, where in we connect to an external vendor via SFTP to get a file (File is on UNIX box), and push the file to Mainframes. As per the company norms, we should be using SFTP to get/put any files with external servers. So I’m using SFTP [...]
Answer Question | March 3, 2009 10:38 PM
FTP, Mainframe, Mainframe FTP Program, SFTP, Unix
I have had a 5 User – Avaya Long Ongoing, IP Phone quality Issue that connects to a Cisco POE 3560 switch and a 1841 router with a Full T1. No one can figure out the Poor Quality Issue and Pin Point where its coming from. What would be a Good Tool to use to [...]
Answer Question | February 19, 2009 8:32 PM
Avaya, Avaya 4610SW, Avaya VoIP Issue, Cisco, Cisco PoE Switch, Cisco switches, PoE, VoIP
how do I troubleshoot checkpoint VPN? let’s assume the user has full internet access from home. Do I check for user SSL certificate that is still valid? What is next step after checking SSL certificate?
Answer Question | February 12, 2009 6:58 PM
Checkpoint, Checkpoint VPN, SSL certificate, VPN
We need to secure our payroll printer and it’s spooled files. Right now anyone is able to view, print or delete reports on this prnter’s outq. The payroll person & anyone with SECOFR authority should be the only users with access. How do I set up this type of security? Thank you.
Answer Question | February 13, 2009 4:21 PM
Network printers, OUTQ security, printer security, spooled file security
I would like to know if there is an anitivirus prog that will scan automatically on sybase DB’s. Our server allows staff to upload word doc’s into the DB,,, with the increase of virus’s occuring on out windows PC’s,,, i would like to add protection to the doc’s in the DB. Any ideas?
Answer Question | February 12, 2009 4:19 PM
Antivirus, Sybase, Sybase Databases, Sybase Virus Scanning
Which monitoring tool is the best tool for application and database monitoring?
Answer Question | April 24, 2011 12:36 PM
Application monitoring, Database monitoring, MONITOR, Monitoring
how can i manage bandwidth on user basis or machine basis. i want to limit user a to download not more than 50 MB per day and user b 10 mb per day. Also i want to impose connectivity restriction i.e. 10Kbps per user out of 1 Mbps of my bandwidth
Answer Question | February 12, 2009 11:28 AM
Bandwidth limits, Bandwidth management, ISA Server 2004, User restrictions
We have a DC at each site. The problem I am having is I have a pc at site B authenticating to my DC at site A. Why is this happening
Answer Question | February 12, 2009 2:13 AM
Domain Controller, User authentication
I have inherited a network which has several issue but I need to setup a user that only has rights to one shared drive but no all shared drives. How can I do this as his network icon shows all shared folders
Answer Question | February 12, 2009 7:09 PM
Network permissions, Public folder permissions, Shared drives, User Permissions
Is it necessary to apply no IP route cache on virtual local area networks (VLAN) interfaces in an L3 switch and why? What are the advantages or disadvantages?
Answer Question | February 11, 2009 6:40 PM
IP routing protocols, L3 Switches, Layer 3 switches, Networking, Switches, Virtual LAN, VLAN
I ran Nmap 4.0 and GFI LANguard GFI LANguard Network Security Scanner (N.S.S.) on a Windows 2003 server and noticed that the FTP Port 21 is open but tcpwrapped. How do I check further if Port 21 is indeed open? I’ve checked the IIS6.0 and the Windows Add/ Remove program section there’s not FTP installed. [...]
Answer Question | February 25, 2009 6:17 PM
FTP, Network monitoring, Network security, Network security appliances, Networking, Nmap, Ports, Security scanner, tcpwrappers
I have a PPP network between our three office locations. In the master location I have a DSL line connected to my Layer 2 (L2) switch via a Cisco ASA 5505 Firewall. My server (ADC/DHCP/Proxy) is connected to the L2 switch. My branch office locations obtain IP through this server. I am using a Squid [...]
Answer Question | March 1, 2009 6:11 PM
Branch Office networks, Branch offices, Cisco ASA, Cisco ASA 5505, Cisco ASA Hardware Firewall, Firewall appliances, Firewalls, Internet connection, Network security, Network security appliances, Networking, Proxy, Servers
It’s that time again — a chance to win an Amazon.com gift certificate based on your activity in the IT Knowledge Exchange community! Remember: the more you ask, answer and discuss questions, the more Knowledge Points you will earn. (Only valid questions, answers and discussions will be counted towards your total.) The top 10 most [...]
Answer Question | April 3, 2012 5:17 PM
AS/400, CIO, CRM, Data management, Database, DataCenter, Exchange, Linux, Lotus Domino, Mobile, Networking, Oracle, SAP, Security, SQL, SQL Server, Storage, VMware, VoIP, Windows
I want to monitor my network users like, which user is downloading more from Inernet because I am facing my Airtel DSL Internet Bill problem. Please Kindly tell me soon……
Answer Question | February 12, 2009 6:26 AM
Bandwidth limits, Bandwidth monitoring, Internet download limit, Internet restrictions, Internet traffic control, Network monitoring, Network monitoring software, Network Monitoring Tools, User monitoring
Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend’s IP address, but coming from my [...]
Answer Question | February 9, 2011 6:24 AM
Gibson Research Corporation, grc, Hamachi, Network security, packet analysis, Packet sniffers, Packet Sniffing, Packets, Shields Up, syn, VPN
I would like to get my BSc in Information Security Systems. In the near future I would like to get a networking security career. Do you think this is a good degree? Otherwise what can I do to get into the security field?
Answer Question | February 11, 2009 7:47 PM
BSc, Degree, Degree programs, degrees, Information security, Information security careers, IT career planning, IT careers, IT jobs, Network security, Networking, Training, training and certificatio, Training/education
Dear sir, i want to know ,How to restrict the user from browsing the internet sites and downloading from windowsserver 2003.In client system i am having winxp.plz give solution for this problem. With regards, f.charles.
Answer Question | February 12, 2009 11:00 AM
Block Internet Access, Internet restrictions, User Permissions, Windows Server 2003, Windows XP