Search:

Type: Posts; User: Kerwin

Page 1 of 4 1 2 3 4

Search: Search took 0.08 seconds.

  1. Replies
    6
    Views
    1,386

    Re: Information about SAN infrastructure

    Customers receive only a modular approach, the possibility of the integrity of their existing SAN installations and get the same well-developed recording services - meet the varying needs of business...
  2. Replies
    5
    Views
    1,254

    Re: Firewall and VPN Module in Plesk

    Especially the many details make the administrator the daily work. An example: If the firewall is slightly changed rules, so the new rules must saved, but just not enabled. To forget that is made at...
  3. Re: Access Control in LAN and Wireless Network in 802.1x

    The EAP requires the user to authenticate. Its first authentication information is forwarded to the port or the authenticator. Once that has received the data, it forwards them to an authorization...
  4. Replies
    6
    Views
    1,143

    Re: Increased risk of threats to e-mail security

    The companies software developers have created popular client and server programs for e-mail, thereby offering improved functionality through free downloads and high-end commercial applications. With...
  5. Replies
    5
    Views
    3,977

    Re: What is PON and GPON in Optical Network?

    We distinguish between passive optical networks based on a point-to-point architecture and a point-to-multipoint architecture. The abbreviation for Passive Optical Networks PON (passive optical...
  6. Re: How to set administrator password in firewall?

    The functions in the register tab "System", behind this tab to hide various system functions such as the update-menu, the password, the settings for the SSH access, or details of user interface and...
  7. Replies
    4
    Views
    1,163

    Re: Cache function in Proxy Server

    The safety function. The server can be a barrier between the Internet and the LAN or private firms. Some proxy software have security features, but nothing beats a firewall. Finally, a proxy can...
  8. Replies
    4
    Views
    653

    IBM Smart Business Test Cloud

    I would like to discuss about the IBM Smart Business Test Cloud. IBM Smart Business Test IBM Private Cloud is a cloud offering, the advantages of the IBM Public Cloud offers plus all the security of...
  9. Re: Information about Remote Desktop Connection and RemoteApp

    The RDC (Remote Desktop Connection - DRC, also called Remote Desktop) is the client application server Terminal. It allows a user to connect remotely to a server on the network running the Terminal...
  10. Replies
    4
    Views
    1,183

    Re: IEEE 802.15 Working Group for WPAN

    Z-Wave is a proprietary technology of the first US-Danish manufacturer Zensys A / S, which increasingly sought as part of an overall Z-Wave Alliance status to obtain a general. The technology is...
  11. Replies
    5
    Views
    687

    Re: Best tool for the wireless access

    The tool AirDefense Personal Lite offers help for home users. The free tool in the Lite version actually intended to evaluate, but already brings a lot of features. It examines the WLAN traffic...
  12. Re: Network-manager gets uninstalled while installing Wicd!!

    I think that you should also have knowledge about the basic things of Wicd. WICD (Wireless Interface Connection Daemon) is an application for managing network connections only for Linux. WICD is a...
  13. Replies
    6
    Views
    1,207

    Re: VPN and IPSEC protocols

    You should first clear the concept before moving in deep. LAN type can connect to the computer site of a company together. These networks are relatively secure because they are almost always behind a...
  14. Replies
    5
    Views
    1,385

    Re: How to configure Linksys Router?

    How about, look, I'm just like you but we have already set up the linksys, in a nutshell what you have to do is the following:

    First reset the router to factory default
    If you got a fixed IP...
  15. Replies
    5
    Views
    4,175

    Re: Sonicwall TZ 180 Port Forwarding

    What exactly do you mean "with the box on ..." access? "Is the box a device behind the NAT firewall Sonicwall or is that the Sonic Wall itself? Remember that the destination IP address is always the...
  16. Replies
    5
    Views
    805

    Re: Is Virus Scanner from Microsoft better?

    The installation is completed, vanishes Microsoft Security Essentials as a small icon in the taskbar. With a simple click, the user enters the application and there can inform not only the current...
  17. Replies
    5
    Views
    1,160

    Re: Seeking adsl router with modem

    Printer servers are used to do the following jobs :

    Printer without a network interface over the network to make available to
    Network printers to centrally manage
    the pooling centralize
    ...
  18. Re: Help to connect to network with WPA-PSK wpa_supplicant

    If you talk about security and say the only only way to make your network secure WLAN is to create a VPN into your LAN, so are two encryptions, especially VPN encryption is more secure than WAP or...
  19. Replies
    5
    Views
    972

    Re: Problems with Bridge Networks

    The principle of the bridge is included in the "switches" that could be considered as advanced HUBS, creating bridges between the network cards exchanging data via their MAC addresses. A bridge is a...
  20. Re: Need information about Gateways in IP Routing

    We have two physical Ethernet networks completely disjoint. Both network using TCP / IP hosts have IP addresses in the same class with the same subnet mask. However, there is no duplication in...
  21. Replies
    4
    Views
    1,270

    Re: Wireless network icon disappeared!!

    For the problem of wireless network icon, try performing these steps:

    Open Start> Run> type regsvr32 Netshell.dll> press Enter> Accept the dialog box that appears.
    Open Start> Run> type...
  22. Replies
    5
    Views
    1,366

    Re: Linksys ADSL2 modem problem

    When all the settings for connecting the first three phases are completed, you can operate your modem with Ethernet connection only. To do this you must do the following:

    Go into Windows networks...
  23. Replies
    10
    Views
    5,476

    Re: Unable to Join the Network with WPA-PSK

    If your connection worked before, try rebooting your router and modem to disconnect the plug from the wall. Wait for a couple of minutes, and re-plug the modem. Wait a few minutes to start the modem,...
  24. Replies
    7
    Views
    5,340

    Re: Problems with Wifi-link 5100 AGN

    Here, the wifi interface (characterized by the 802.11b / g) is recognized as wlan0. For the switch to monitor mode to listen to wireless networks, type the command airmon-ng start followed by the...
  25. Replies
    7
    Views
    1,448

    Re: Problems with uTorrent Mac

    Unlike the systems of traditional file sharing, its main objective is to provide an efficient way to distribute a single file to a large group of people, forcing everyone who download a file to share...
  26. Replies
    6
    Views
    1,374

    Re: Configuring the Wireless-G Broadband Router

    What type of config for 3 PC? Depends. So now, I advocated an ADSL modem, router separate from all in one is good, but when he farts all you got to change and anything that runs. Taking an ADSL modem...
  27. Replies
    7
    Views
    1,926

    Re: Conflicy with site gateway 192.168.1.1

    You will need to set a PC to have an IP address in the range 192.168.1.x connect to the router, login as admin then change the IP. You will loose connection at that point so you will then need to...
  28. Replies
    5
    Views
    2,275

    Re: 192.168.1.1 unreachable

    I have the same problem, that I stopped Noos to pay two times more expensive just for Orange no longer have any problem. Then I did the hard reset and everything started working properly. A hard...
  29. Replies
    6
    Views
    3,478

    Re: Dlinkap Problems

    Unable to access the AP. I've tried EVERYTHING. I've tried all sorts of dynamic ip's (I know that the AP should not give me IP) and static, placing the gateway at 192.168.0.1 - 50 (should be the...
  30. Replies
    6
    Views
    8,267

    Re: Dlinkap 1150 Problems

    The DIR-615 Wireless N Router provides the best signal for 802.11g wireless networking, enabling the raising of the characteristics of your network using Wireless N technology, which provides...
  31. Replies
    4
    Views
    1,800

    Re: Snow Leopard VPN

    Then I know where you want this information on the Cisco Client? That is an eternity that all VPN solutions including easy remote access VPN routers from 12.2 (13) T supports NAT-T. On the other...
  32. Replies
    6
    Views
    12,648

    Re: Iphone 3G 3.1.3 does not detect any wifi

    The fact that the laptop will not detect the wifi is also reassuring for the iPhone. Indeed it is rare that two different devices have the same breakdown. So your wireless adsl box which needs a...
  33. Replies
    4
    Views
    1,292

    Re: Using the iPad for Networking

    I came to know that most IPAD informed users that the Wi-Fi connectivity (connection drops or can not connect) failure occurs when a signal is weak, but they work correctly on any device except IPAD....
  34. Replies
    6
    Views
    2,479

    Re: Alfa AWUS036H and VMware with wicd

    I would like to discuss about some precautions that should be taken while installing the wicd. If you install the version of the deposits, it is advisable to keep a customer. Wicd deb somewhere on...
  35. Replies
    6
    Views
    3,795

    Re: ALFA Networks AWUS036H

    I would like to tell you that on the 2nd USB plug, it is actually just an extra power supply, mainly intended to ensure backward compatibility of USB 1.1 card. With USB 2.0, the fact or not plug in...
  36. Replies
    6
    Views
    2,536

    Re: BT4 VMWare image: networking broken

    Type "ifconfig-a" to see all your interfaces. "Ifconfig" alone displays only active ones. The evidence, eth0 and eth1 appear in iwconfig. Start by removing the second network card that you created in...
  37. Re: Install Samba on the Linux PC.

    The default file / etc / samba / smb.conf is operational as provided by Debian and Ubuntu but it will have to edit some aspects of this file.

    The name of the workgroup will be amended to...
  38. Thread: wireless MITM

    by Kerwin
    Replies
    6
    Views
    1,150

    Re: wireless MITM

    As its name implies, "Man in the Middle" means that the hacker manages to fall between the Access Point and WLAN client device. In this way customer communications that wifi wireless network will be...
  39. Replies
    5
    Views
    2,554

    Re: Debian as router/gateway/dhcp

    You will have to do the following things initially :

    installation of cards
    / sbin / route
    make a bridge.

    Debian is already installed on the server, with a map eth0
    IP address...
  40. Replies
    4
    Views
    802

    How to remove Backdoor.Noppuca!inf

    I have seen that many of us don't bother about basic security which end up our system infected with Backdoor in such kind of case we should disable auto play to prevent the automatic launching of...
  41. Replies
    4
    Views
    1,124

    Remove JS.SecurityToolFraud.B

    If you really want to remove JS.SecurityToolFraud.B from your system then you need to reboot your computer and login into safe mode, once your system has started in safe mode then click on start go...
  42. Replies
    3
    Views
    609

    Information about Zlob

    If you really want to remove Zlob Trojan from your computer then i would suggest you to install Norman Malware Cleaner because it's good in removing rootkits, remove infections from disk including...
  43. Replies
    2
    Views
    1,018

    Remove Adware Vundo Variant

    If you really want to remove Adware Vundo Variant from your computer. Then click on start goto run option and type regedit, then register window would get open. Now locate the following path and...
  44. Replies
    3
    Views
    1,933

    Remove Olmarik trojan

    if you really want to remove Olmarik Trojan from your computer then you need to click on start then goto search option over there try to find out UACsnbfuyfvmevqlyg.dll and UACdfqsytqwwyfllri.dll...
  45. Replies
    3
    Views
    6,443

    Pen drive data are not showing

    In that case i would suggest you to right click on My Computer then goto manage option, over here a new window would get open from there select Disk management option and at the right hand side of...
  46. Computer freezes but happy mac icon appears on the screen.

    I was also facing such kind of issue in that case i try to remove any SCSI or serial devices attached to your computer for that you need to turn the computer off by pressing the power switch on the...
  47. Re: How to Disable smart windows arrangement in Windows 7

    Windows 7 lets you arrange your windows in an intelligent way with the help of Smart Window Arrangement. Press Windows 7 Start menu and then type "regedit" in Run item in order to open Windows...
  48. Replies
    3
    Views
    1,605

    Re: How to show pivot table all Emlements

    In Dynamic Chart using Pivot Table and Range Names I showed how to use dynamic ranges to allow a regular chart to update when the pivot table changes. I have found a the reason that the code isn't...
  49. Replies
    3
    Views
    710

    Re: How to delete in Database Design

    Clicking on delete link at the right side of line on ListView: you need to create a custom view.list.php to use a new template which does not display the delete link if its status is completed; The...
  50. Re: How to pop up Interactive map by sending data from MYSQL using PHP

    The web browser sends this address in a so-called HTTP request (HyperText Transfer Protocol) to the web server. I have looked into some examples but my problem is they all directly turn the table...
Results 1 to 50 of 161
Page 1 of 4 1 2 3 4
Page generated in 1,711,641,497.39644 seconds with 29 queries