• OMA/OWA compatiblility

    I'm starting to look into Outlook Mobile Access. I've read that it uses front end/back end configurations. I already have a front-end OWA server. Can I use the same server for OMA? Thank you in advance, Pamel

    EmailGoddess0 pointsBadges:
  • problems with wireless connection on firewall

    Hi, I have a "firewall"-box configured as NAT-router/firewall/transparent proxy which makes a connection to the internet with a WLAN card (to a hotspot). In fact for the moment it's a Kerio Winroute firewall on a Wintel box. So the "firewall"-box has actually 2 interfaces. One wired (connected to...

    Gert51420 pointsBadges:
  • Can connect by VPN but cannot ping internal addresses

    My director and I have set up a SmoothWall firewall with SmoothTunnel VPN in our office. We have created L2TP road warrior connections for our Win XP clients at home and we can both successfully connect via our individual VPN tunnels. However, whereas I can ping the decimal addresses of the...

    Roofrack0 pointsBadges:
  • Accessing MS Exchange Server on DMZ zone of Cisco Pix 515E as local server

    Hi, We currently have a MS Small Business Server 2000 (of which Exchange Server is a part) configured on the LAN behind a firewall and use POP3 Connector of MS Exchange to retrieve external mails. Our users connect to the MS Exchange Server within the LAN without requiring to connect to the...

    Krish690 pointsBadges:
  • Configure wireless APs for use with Tablet PCs using using 802.11b

    Dr. Don, a SearchMobileComputing.com reader needs your help clarifing his AP configuration and asks: I can't get a straight answer as to how to configure my wireless APs. My office is a 40' X 100' rectangle with all the examination rooms lined up on one of the long walls. There are four doctors who...

  • Network help

    Hello guys...Can u give me tips and guidelines on how to share a Dialup connection with Dlink Wireless DSL Router using Xp pro as :- ?We have a small LAN which have 8 WS, all on one floor with two 8 port switches (Total 16 ports) , and using internet through ICS simultaneously. ?We have 4 Laptops...

    Najmee0 pointsBadges:
  • Remote Desktop conflicts with VPN

    I am connecting using Remote Desktop from my Laptop PC (Windows 2000 Pro Sp4) to a Server (Windows 2000 Server Sp4) in our DMZ over our Corporate Network. I am then using a Network & Dialup Connection on the Remote Server to connect over VPN to our Customer Sites. However, this is currently...

    HenryKafeman0 pointsBadges:
  • Wireless network adapters

    How can I use a notebook wireless adapter and a USB wireless adapter together to increase my speed? Can it be done? If so what do I need to do. I use Windows XP and Windows 2003 server. Thanks

    Thetec0 pointsBadges:
  • IT Security

    Hi all, Thanks to all those who answered to my question"FTP sites" Can anyone of you let me know about the available products that we can use for our organisations IT security..Also let me know what products are available to find out vulnerabilities in a network. Appreciate your response. Thanks...

    Tarang0 pointsBadges:
  • Is Cisco Wireless .g radio backwards compatible with .b?

    Hi, Please can someone tell me whether the AIR-MP21G-E-K9 802.11g radio that we have in our Cisco 1200 series access point supports both 802.11g and 802.11b clients? If so, do I need to do anything to the running-config of the device to support both types of client? Thanks in advance. Greg.

    GregNottage0 pointsBadges:
  • Securing FTP on an Enterprise wide basis

    One of the recent questions here in the SeachWindowsSecurity.com ITKnowledge Exchange was stated the poster had blocked email services with a Proxy server so that internal employees could not obtain yahoo, AOL, and other external sources of security threats and the poster wanted further support in...

    CasR22070 pointsBadges:
  • Bad logon Event type 529

    A User ill advisedly switched off Anti-Virus and since then we see a failed logon (Type 4 - Batch)under Logon process Advapi every 15 minutes in his User Id. A search of the Web links this to possible virus infectection (Netdevil 1.2. We have scanned etc but can't track down what is generating the...

    Cripdan0 pointsBadges:
  • Security software for Linksys WAP

    I'm trying to find a easy-to-use / configure security software application that I can use with my Linksys Wireless-G Access Point (Mfg. Part: WAP54G). I need an application that will allow me to control who has access to the wireless access point as well as what they can access. I have looked at...

    Rountree0 pointsBadges:
  • Wireless & VPN

    Would you consider a Microsoft VPN tunnel established through a WEP encrypted access point to be secure? If not, how easy is it for someone to steal data passed through the tunnel? Are there any good references for judging relative security levels from the various configurations/solutions...

    Jeremy540 pointsBadges:
  • VOIP over W-CDMA or WIMAX

    Will VOIP solutions be better offer a W-CDMA or WIMAX and why exactly?

    Jeevang0 pointsBadges:
  • Need guidiance from pros already into the game

    Hi, I am a United Stated Marine stationed overseas since 2003, majoring in Information technology with National University. I am still an idiot in the field and thats why i joined this group. To get a glance of what to ecpect in the future. I am asking for your help in guiding me through whatever...

    Foguno0 pointsBadges:
  • Local Admin & passwords

    We have recently switched to allowing only Power User rights on notebook computers. We have a set of notebooks we loan out to employees with desktops when they need to travel. Currently those users will login with an account named loaner and use scripts and webmail to access the network. Discussion...

    Roced40 pointsBadges:
  • In Case of Emergency (ICE) – safe to use?

    Anyone having employees put ICE (In Case of Emergency) on their company cells? And should we perhaps mandate it as part of our Disaster Recovery Plan? http://www.icecontact.com.

    NoFX3915 pointsBadges:
  • Recommend good book on device management?

    Can anyone recommend a good book on managing PDAs?

    Margaret Rouse3,040 pointsBadges:
  • Blocking Tunneling Applications

    Hi; Any suggestions on how I can block hopster(and other similar socks based tunneling applications)from tunnelling out and bypassing the firewall? When hopster contacts its servers it uses different set of IPs, not a single domain, so its kind of hard to block it based on IPs Thank You

    Maryam82100 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following