-
what are key differences between a bridge & router? I know that a bridge connect between WAN network and a router connect PC within a network. What else should I know?
Last updated: -
how do i see the routing table in hyper terminal
how do i see the routing table in hyper terminal
Last updated: -
Cisco wireless controller authentication
Have serveral RDT devivces that are set up to Cisco Wireless controller. The devices are connecting and authenticating fine, but it seems when rdt's roam from 1 ap to another the rdt's need to re-authenticate even thought they are already authenticated. Can not find on the Cisco controller of...
-
my pc's windows registry editor was disabled by administrator.i was supposed to be the administrator bcoz i own this pc.what can i do to enable my registry editor?i've tried opening my admin account but it doesn't say anything about changing settings with regards to registry.i hope u could help me....
Last updated: -
After security update, any links emailed to me..would no longer open up at all. Error report comes up "Mozilla crash Report" AND WE DO NOT USE MOZILLA WE USE INTERNET EXPLORER 7
Last updated: -
Helpdesk Network Access to Local users and Groups on Workstations
Hello We have a network that is a single domain with 16000 + workstations. I need to assign the helpdesk group access into to workstations "local users and Groups". They need to be able to reset the workstations local administrator password. I know that if you are in the domain admins group you can...
Last updated: -
How do I connect Mac OS X clients with Entourage to Exchange Server?
Are there any specific settings I need to enable on Mac OS X clients or the Exchange server to allow Microsoft Entourage 2004 to connect to Exchange Server? I have not purchased a trusted certificate for the server yet. Do I need to? If so, which trusted certificate do you recommend?
Last updated: -
I am running Microsoft Outlook 2003 and have an AVG Firewall and (apart from occasional glitches) don't have any problems with e-mail. One sender's e-mail however never arrives (my partner's). It goes into his "sent items" but never arrives at this end. I have added his address to my "safe senders...
Last updated: -
I have set up FTP as SECURE ALLOWED on Z/os. I want to test an FTP from AIX and have it use SSL. How do I get it to read 'override' parameters of my FTP stack. i.e., the 'userid.FTP.DATA' file? Is there anyway to do that?
-
Hi all, There is a site, which provides access to a service if it comes from my office IP. Now I want to access the same service(or page) from home by making my home IP same as office ip, tricking the web site to believe that I am accessing from office. By the way the service uses https://........
Last updated: -
I have a Pentium 4 & need to upgrade. I teach Microsoft, use graphics in my manuals, & use CorelDraw a lot. I also design huge Excel spreadsheets with lots of formulas and design databases in Access - what would be a good PC processor, ram, etc? I have been quoted on a system with a Quadcor...
Last updated: -
ISA Server to Cisco PIX IPSec Tunnel
I have a IPSec tunnel From a ISA 2004 Server to a Cisco Pix. The Pix is sending TTl's which is dropping the tunnel. How can I set the ISA 2004 to respond to them so that the tunnel doesn't keep dropping out.
-
Do you know if we will be able to give our client access to monitor live calls remotely if we currently use Cacti and Cisco?
Last updated: -
How to secure password in a multi user environment?
I have a dilemma and I'm not sure what is the best way to go about it. I want my employees to have access to various websites, some do not have the option of setting multiple login with permissions so there's only 1 login. I want to use a password manager so it will automatically log in to those...
Last updated: -
Securing a SQL Server 2008 database
I am on SQL Server 2000, and to secure my database, I want the user to be prompted for a user ID and password before the database is expanded. How might I do this?
-
Differences between values in a SQL Server 2005 database
What is the difference between the Checksum and TornPageDetection values of the PageVerify option in a SQL Server 2005 database's properties?
Last updated: -
I need to implemet the shared mailbox solution for the work requiremtns. My concern is if its possible to track which user of the users who already have Send As permission to that shared mailbox, has sent actually the email. Is is possible? And HOW? Thanks
-
How much access do you give users?
I am auditing a enterprise data warehouse and am concerned at the level of access provided. I've found many users who have read, update, and delete rights to all working environments (testing, QA, Production)
Last updated: -
How to segment a specific group on a network to have its own bandwidth without tremendously slowing down the rest of the network?
Last updated: -
Hi, I have a remote office connected over a T1 line to the main office with Cisco routers. The problem is that I get tons of logs in our main firewall that connects to the outside world saying "Ping of Death Blocked" The source of the attack is always an IP address(not always the same) from the...
Last updated: