Search:

Type: Posts; User: yuppicide

Page 1 of 3 1 2 3

Search: Search took 0.31 seconds.

  1. Replies
    6
    Views
    1,386

    Re: Information about SAN infrastructure

    The introduction of new technologies such as ILM and content management of structured and unstructured data also forces the person responsible to their applications better match you with the...
  2. Replies
    4
    Views
    775

    Re: Server Management with Plesk

    Plesk is an admin tool box that holds for a wide range of server settings, the right tools in one convenient web interface. The user management is divided into four groups: administrator, client,...
  3. Replies
    4
    Views
    527

    Re: What is Wireless IDS?

    The problem with the use of WIDS is often - in itself very useful indeed - Encryption of the data. Only integrated WIDS, proprietary systems so that the supplier of the infrastructure directly into...
  4. Re: Increased risk of threats to e-mail security

    The first e-mail worm was noteworthy was Melissa, which appeared in March 1999 and followed in May 2000 by the ILOVEYOU virus, which has created chaos on the Internet. Following the arrival of these...
  5. Replies
    6
    Views
    1,350

    Re: Future of mobile communications

    There are many opinions of what the future of mobile communications and will work. One thing's for sure, it will bring much more complex and not simply a faster transfer method, as it was when...
  6. Re: How to set administrator password in firewall?

    Would you like to IPCop console level via the SSH protocol remote wait, you first need the SSH server enabled. The firewall operating system would support SSH version 1 in the even that you need but...
  7. Replies
    4
    Views
    1,163

    Re: Cache function in Proxy Server

    Function filter (filtering). The server can be configured so that it operates an information filtering. One can also ask him to manage the rights of customers of the Internet. It is possible to...
  8. Re: How to reduce security risks of cloud computing

    No risk, no fun? What's in the private lives more and more, is contrary to the clear demands of the business world. From the data security, protection against manipulation and high availability often...
  9. Replies
    4
    Views
    1,182

    Re: IEEE 802.15 Working Group for WPAN

    It has been found to be specific standard, the extremely wide acceptance encounters and the many records on the network - transport and application-level build. In two other working groups 802.15.4a...
  10. Re: Bluetooth Basics: Communication and Security

    An important role in the course of a Bluetooth communication does the Service Discovery Protocol (SDP). Thus different Bluetooth devices, enabling the services and characteristics of the respective...
  11. Re: Network-manager gets uninstalled while installing Wicd!!

    When installing Wicd, Network-manager is uninstalled. Do not panic, is to avoid a conflict between the two programs. However, in some cases, will not uninstall Wicd Network Manager, so you need to do...
  12. Replies
    6
    Views
    1,206

    Re: VPN and IPSEC protocols

    The VPN is just a concept, not an implementation. It is characterized by the following obligations:

    authentication of communicating entities: the VPN server must be sure to talk to the true VPN...
  13. Replies
    5
    Views
    4,173

    Re: Sonicwall TZ 180 Port Forwarding

    But you are sure that this port is also accepted by the server? If it is TCP, you can telnet to the IP port test easily. Also, remember that you can not redirect ports. 27 458 -> 192.168.0.10:3389....
  14. Replies
    5
    Views
    805

    Re: Is Virus Scanner from Microsoft better?

    Particularly interesting is the point SpyNet. This is according to Microsoft, an online community that support the user not only when dealing with potential threats but also prevent the spread of...
  15. Replies
    6
    Views
    2,030

    Re: WRT54GL firmware via tftp import??

    TFTP, you can flash original firmware only. At least if the thing is already half perished. And in your case, you can turn off the option yes no no web interface. The best is, you first flashes on...
  16. Replies
    5
    Views
    972

    Re: Problems with Bridge Networks

    To solve this little trouble, you must:
    In a back window, type the following command:

    netsh bridge show adapter
    Locate the card number by responding more when the bridge is active. If it says...
  17. Replies
    5
    Views
    1,675

    Re: WiFi does not reconnect with Windows XP

    Reinstalling your software, it will work again. For cons, the next reboot, again a conflict. According to me, you need to switch off the start the other agents. You tell me: why not uninstall? Many...
  18. Re: Need information about Gateways in IP Routing

    A bridge has a foot in each network. It acts at the 2 on the link layer. It is able to pass frames from one network to another, but does not foolishly. ;) A bridge, after a period of learning, can...
  19. Replies
    5
    Views
    1,365

    Re: Linksys ADSL2 modem problem

    Each material placed in the network, router, modem and stations, must have a separate static IP address, an example of possible disease, if indeed that these addresses are available:

    IP Router:...
  20. Re: Local Area Connection Icon in Network Connections missing

    Missing icons for network connection (LAN) or dial-up connection as well as under "Network Tasks" to the link "Create a new connection", although the links work, it may be several reasons for this....
  21. Re: Net use command for printing with DOS in the network

    You open the Power Shell under Windows 7, then :

    A printer you associate with net use LPT1: \\ ip \ printer / persistent: YES
    A file you haws then with "Copy"

    In your case, could the job...
  22. Replies
    9
    Views
    3,058

    Re: Port Forwarding on Mac OS X

    Actually, there are a lot of Internet applications like uTorrent, Limewire, etc and use requires an open port to eavesdrop for incoming connections. If you have configured port forwarding for...
  23. Re: Crashed ADSL modem. 192.168.1.1 doesn't work

    You may not want to maintain the default IP address of 192.168.1.1 for the DSL Router. For example if you amend the IP address of the router to 192.168.5.1 then make certain that the IP address of...
  24. Re: My router doesnt open 192.168.1.1 in web browser

    If you can not you connect wireless but Ethernet, it may be that you connect to wireless it is necessary to add in the configuration of the router the mac address of your wireless card. You must then...
  25. Replies
    6
    Views
    8,264

    Re: Dlinkap 1150 Problems

    The utility to configure your wireless network USB adapter. You tried to run the program in compatibility mode with XP, 2000, 98, etc, and no way to boot. Also I downloaded the latest version...
  26. Replies
    6
    Views
    42,407

    Re: Dlinkap web page is not opening

    To resolve problems of access to the web utility model D-Link, please follow the steps that has mentioned below :

    Verify physical connectivity by checking for light fixtures on the device. If you...
  27. Replies
    4
    Views
    1,800

    Re: Snow Leopard VPN

    The integrated Cisco VPN client does not support IPSec in UDP encapsulation, generally used when one wants to make IPSEC behind a router that does NAT. Conclusion: Useless as it is beyond question...
  28. Replies
    6
    Views
    1,679

    Re: Network bandwidth usage tracking

    You can also go for the NBMonitor for tracking the Network Bandwidth. Some of the main areas covered by the software are network monitoring control network from virus attacks, uptime and downtime of...
  29. Replies
    6
    Views
    12,645

    Re: Iphone 3G 3.1.3 does not detect any wifi

    If you want to transfer from a wireless PC or Mac on your iPhone you need two wireless cards. 1 connected to the hotspot infrastructure and another on a different SSID and channel connected to the...
  30. Replies
    4
    Views
    1,291

    Re: Using the iPad for Networking

    If you are facing any problem with the network security I would like to recommend you to follow the steps :

    Create different names Wi-Fi network to identify each band. This is easily done by...
  31. Replies
    6
    Views
    2,534

    Re: BT4 VMWare image: networking broken

    Hello to all, is starting back on track four I have one question :
    I Backtrack4 under vmware with vista. My problem is that I have internet at backtrack4 but in regard to: / etc / init.d /...
  32. Re: ALFA Network AWUS036H 500mW Wifi USB Adapter and Packet Injection

    There are two Manufacturers Involved with wireless cards. The first is the brand of the card itself. Examples of card Manufacturers are Netgear, Linksys and D-Link. The second manufacturer is who...
  33. Re: How to add auto map network drive in samba server config

    Of course you do! The only thing we can not do is two fixtures on the same server with different accounts. Try to check the following things :

    The account used to mount the shares
    The...
  34. Replies
    6
    Views
    1,149

    Re: wireless MITM

    The attack mentioned is the latest version of MITM, in which the user suffers a hoax and is taken to the wrong website. The most common techniques to lure visitors include phishing emails, fake...
  35. Replies
    6
    Views
    1,628

    Re: How to find Private/RSA Keys

    As you know that RSA is a method for encrypting data using a public key and private key. This method is widely used today, particularly in banking, shopping on the internet or just to sign and / or...
  36. Thread: DLNA Slow

    by yuppicide
    Replies
    6
    Views
    4,186

    Re: DLNA Slow

    Download latest version of PC Share Manager. I see the port settings for the router, and see if your firewall is allowing access to this application, also in server mode. Otherwise the best option...
  37. Replies
    5
    Views
    2,554

    Re: Debian as router/gateway/dhcp

    If you choose this arrangement, the computer server will absolutely be on for pc1 and pc2 can go on the net. You can do this kind of configuration :
    I put pc1 and pc2 in two different subnets like...
  38. Re: How to get rid of Windows Vista Keyloggers?

    I would suggest you to Download Malwarebytes' Anti-Malware 1.45. The well appointed Malwarebytes' Anti-Malware will actively eradicating malware infecting your machines. The rather simplistic...
  39. Rundll32.exe - Bad image

    It seems that in your case calc.dll might had got corrupted because of which you are getting run dll error message, that case try to restore your system or you can also call repair your Operating...
  40. Replies
    3
    Views
    920

    File Sharing Error Message

    if you are not able to view network setup then on Windows Vista machine click on start go to run option and type regedit, then a registry window would get open, now browse to the following location...
  41. Replies
    2
    Views
    1,557

    Remove Mebroot.k Trojan

    If your system is infected with Mebroot.k Trojan then i would suggest you to replace MBR on a hard disk drive at the Recovery Console. Then Replace "HardDisk0" with the device name for the external...
  42. Internet Explorer redirecting to random pages

    It seems that your computer is being infected by Spyware. I would suggest you to download Ad-Aware spyware. After installation click on next button over here you will find some scan option list over...
  43. Replies
    9
    Views
    9,672

    How to convert number to text in excel

    If you want to convert number t text in excel then you can make use of TEXT function which allows you to converts a value to text in a specific number format. For that you need to insert a temporary...
  44. Replies
    3
    Views
    653

    Re: Dynamic LinkButton to a string value

    Moving the RebuildControls() sub from Page_Load to Page_Init actually made the issue worse, now when I click on the static Insert Row button or the dynamics link buttons to delete a row, all the...
  45. Re: How to open port 3101 on my server running on SBS

    1st off all, you only need an outgoing connection on 3101, not inbound which frankly is possible on a NAT router, Port 3101 must be configured for an open bi-directional traffic. It's not rocket...
  46. Replies
    3
    Views
    4,447

    Re: How to embed Javascript inside PHP script

    The ability to reference a PHP script inside your external JavaScript can be very useful! As for your javascript, I cannot help you validate that, I'm not much of a javascripter. What I can say, is...
  47. Replies
    3
    Views
    2,048

    Re: How to embed Youtube videos in Mysql?

    The embed code for each video is available on the YouTube website along with customization options. You can check their documentation of this method to see if there is some extra debug you can turn...
  48. Re: Changes made in the Database does not reflect on the front page

    Using Visual Basic Scripting Edition to handle your data means that the Web page does not have to be static. This behavior is only a problem upon initial connection to a stand-alone executable....
  49. Re: computer no longer recognizes wpa encryption??

    To gain access to your wireless router settings and configuration menu then connect to the router either wirelessly or via a Ethernet cable. Don’t forget to enable WPA2 encryption to encrypt the...
  50. Replies
    3
    Views
    1,246

    Re: Aspire 5100 USB Crash under Windows Vista

    Have you done the Chipset driver uptodate ? Do you know where you could find chipset drivers for the 5100? eLock settings? eManagement settings? all USB controller items be deleted in device manager,...
Results 1 to 50 of 128
Page 1 of 3 1 2 3
Page generated in 1,710,825,070.35940 seconds with 25 queries