-
Contest Bounty: Ask/Answer questions this weekend, earn 100 points!
Is the rain keeping your weekend plans from getting off the ground? Well, IT Knowledge Exchange has a chance for you to take advantage of staying indoors. Ask or answer 10 questions* this weekend, and you will earn 100 knowledge points, good for our current contest! Any combination of...
Last updated: -
Windows XP SP2 problems after virus removal
Hi, I am having a problem with windows xp. The pc had a virus on and I removed the virus with MCFEE antivirus. There after I am not able to logon. The computer gets to the loging screen, I logon but it reverts back to the login screen. I did a windows repair install, fixboot and fixmbr but the...
Last updated: -
we have disabled access to many instant messenger programs, however we use winchat to communicate with each other, my question is whether or not some sneaky csr(customer service rep) finds access to this program, can we monitor the conversations thru it? we dont want to restrict access on all the...
Last updated: -
Backup and restore with Backup Exec 2010
I have a Lotus Domino 6.5 environment , clients as well. I have 2 questions , I'll ask the first one then once I get that answer I'll ask the next . I have recently upgraded Symantec to BE 2010. The new agent will no longer talk to the Lotus 6.5 databae , this is the Symantec remote agent for Lotus...
Last updated: -
Corrupted file in Windows XP SP3
We have an XP SP3 user with a corrupt profile. When logging in to it you get a blank desktop. When copying the files to another profile it works. What should I do? Will it be corrupted as well? What causes profile corruption?
Last updated: -
Do licenses allow us to create a hot spare sonicwall 3060 firewall licensed up and ready for action if the primary firewall fails?
-
Completed IT Knowledge Exchange Profile? Earn points!
What's a community without a face? Let your fellow IT Knowledge Exchange members know a little more about you and your expertise by filling out your public profile and uploading a photo. Then put the link to your profile in the discussion area below to claim your 10 knowledge points, good toward...
Last updated: -
Empty Reports in Forefront TMG SP1
Hello! I am running Windows Server 2008 R2 Enterprise and Forefront TMG 2010 adn SQL-Express as local database After upgrading Forefront TMG 2010 to sp1 reports stopped generates. Reports are empty. First problem was "The report server cannot process the report. The data source connection...
Last updated: -
Restrict traffic for Cisco VPN clients
Hi all, First some background for my question: I have recently set up a VPN tunnel between a Cisco PIX 506E (VPN server) and remote clients. The remote clients use Cisco VPN Client software version 4.8. Everything seems to work fine. But as it is configured right now the remote clients have full...
Last updated: -
How to tackle the security risk an IT administrator generates
Hello, im an auditor for global copany risks. One of the things that we look for is sepperation of functions. shortly said, you don't want the same person creating your bill's and be able to pay them (because he presents a serious security risk for commiting fraud.) Now what to do with an Domain...
Last updated: -
AVG 2011 and Exchange 2010 issues?
anyone out there using AVG and Exchange, we would like to install AVG 2011 Mail version on the Exchange server but would like to find out if anyone is having issues and if you are, what are the corrections to make these two play nice. thanks much
Last updated: -
SAPMMC All Settings Gone after running CCCleaner , How to get all settings
Hello All SAPMMC All Settings Gone after running CCCleaner , How to get all settings back . I donot know what is SID ( System ID ), Instance etc. If this is not relevant to this forum plz let me know which forum .... Regards Rohit Running on Windows server 2003
Last updated: -
We developed some kind of database with excel spreadsheets to draw monthly stats for diffrent departments. It works as follows: Individual spreadsheets(formulated)feeds into a master Link spreadsheets(data) we then use Pivots for our reports. The problem that I now expierence is that: 1. The...
Last updated: -
Spam, Spam, Spam, Spam, Information, and Spam
recently, we have been getting a lot of people (bots?) posting to the discussions with links for jewelry or cheap flights, etc. How can we take back our site and prevent this without making it so difficult to reply we lose the value?
Last updated: -
Restrict one username (login) for only one session in ISA 2006
how i can restrict one username to work only as one session but without restrict him with only one computer i have isa 2006 and websense 7 also active dir 2006
Last updated: -
HI, We do have a exchange server 2003 in our organization,Now i am planning to change the authentication method to Integrated Windows Authentication(The client and server negotiate the windows security support provider interface).Can anybody tell me what settings or changes i need to do...
-
Ghost file preventing deletion of folders
I moved user profiles to a new location on a Windows 2003 server, then attempted to delete all the old folders after the move. Now a single "ghost" file seems to be preventing the deletion of folders 4 layers down. The folders are showing up as zero size so this is not a huge problem...but annoying...
-
Will you be at Interop Las Vegas next week?
Grab lunch or a coffee with editor Michael Morisy to discuss what you think of the keynotes, sessions, and vendor announcements at Interop next week. Get some sweet IT Knowledge Exchange swag and let us know what you're thinking of the show and the direction of networking in general! Let him know...
Last updated: -
Open IT Forum: Share networking resources, earn knowledge points!
It's Networking month at IT Knowledge Exchange, and we're looking for your best resources on the subject. Share networking guides, blogs, tips, books, and great Twitter pros to follow! For each category you contribute to, we'll give you 25 knowledge points, good toward our latest contest.
Last updated: -
HI, What are security loopholes that one must be careful while writing PHP code that interacts with databases and user accounts? I will be grateful for any help that is given regarding this.
Last updated: