• Design NEW network cum NEW IT infrastructure-2

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Linksys Wireless WRT54G Locking up

    Has anyone else had a problem with the newest Linksys Wireless WRT54G locking up? We have four customers with these units and the firewalls must be restarted each day for continued operation. A buddy of mine says Linksys has cut in half the memory in these models from previous versions. We have...

    Rodolfo10 pointsBadges:
  • Reliable wireless phones

    The following question was submitted to SearchMobileComputing.com editors. Can you help? --------------------------------- Which network (Cingular, Verizon, T-Mobile) is the most reliable for wireless phones? Which network provides the least amount of dropped calls and functions in most places...

  • LAN vulnerability behind a Router – with firewall – connected to the Internet (Through an Open Port!)

    Hi, I would just like some reassurance: I have a Router on my LAN that connects all host PCs to each other and the Internet. Question: a) How exposed is my LAN behind the Router that has a port open for Internet access (and in future anther for remote desktop terminal connection) would a port...

    ToneEzeeJ0 pointsBadges:
  • Communication between 2 AS/400s

    We have the Softlanding product Turnover to do our change management. Our development machine is in a different building and we distribute our software using that tool via FTP. From development to production machine we use a VPN tunnel (note this is controlled by network people). The software uses...

    Senator460580 pointsBadges:
  • Site-to-site VPN hardware recommendations

    I have a client that is needing a site-to-site VPN setup. They don't want to spend a lot of money on this but since they are a financial company, I want to have a very secure device on both ends. You know the type of client. Any ideas? I've looked at the Sonicwall 2040 and the Sonicwall TZ170 (in a...

    Abaddon0 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • certification help

    I had graduated from telecommunication last year and I was working as an IT Support for 1 year in Sudan I?m traveling to India to get some certification that could help me finding better job in IT or Telecommunication so I which if u could help me answering the following questions - Basically I...

    Pilot7370 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • Please Help Me

    My office Workstation name is "Workgroup". Here 8 computers connected in same workstation. Sometime I check how many computer connected. My server os is "windows 2000 advance Server" and the other computer's OS are WINXP home Edition and winXP Professional Edition. The Problem is- When I want to...

    Tariqul19730 pointsBadges:
  • End Program – explorer.exe

    From the last few days I am facing this problem. When I shut down my Win 2000 Server(SP4) at the end of the day the end program-exlorer.exe dialog box comes up twice and it shuts down only after I click on the 2 end now buttons. Both end program dialog boxes are same and comes one after another....

    BinooDas123410 pointsBadges:
  • Server allows unauthorised access

    I am trying to sort out a network using Windows Server 2003 and Windows XP Pro The domain has been set up on the server, and it is possible to log in. But mostly the users don?t log into the domain. They log into the local machine, with usernames which are NOT known on the server. They get access...

    BillBald0 pointsBadges:
  • Event ID 13508 in microsoft windwos 2000 server

    Hi all I have a three servers with windows 2000 (service pack4 ) and its running active directory and DNS also. My global catalog server (PDC) am calling as server ?A? , others are server ?B? and server ?C?. These are two servers are acting as BDCs. One of the BDC?s Hard disk was crashed last week...

    Management0 pointsBadges:
  • MSWord Password and MSExcel Password

    I am using different password for my secured files but I loose which one i use in certain file. Now I can not retrieve it. Is there any way i can open it again or retrieve my password so I can open my files? I have little knowledge in VB6, is there any one generous to give me a source code about...

    Cydean20060 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Multiple Connections – Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is, this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • wireless networks

    HAs anyone ever had a wireless network that they could see the access points but could not connect to them.

    Mhatrak0 pointsBadges:
  • Blocking pop access over http

    Dear you, How can I exactly block the following: 1- Hotmail pop access over http 2- Block skype phone calls 3- Block sites like gotomypc.com etc 4- Block internet file share drives like yousendit.com google drive Thank you Kindi

    KindiA0 pointsBadges:
  • NetBIOS-ssn (port 139)

    I got attacked thru NetBIOS-ssn port 139 according to Norton Worm Protection The intrusion is MS ASN1 Interger Overflow TCP The intruder's IP is always alternate thru the last two sets: 72.235.134.133(4223) Protocol is TCP I have no idea how to block the intrusion or trace the intruder so can...

    EEEEE50 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following