Search:

Type: Posts; User: Janhavi4U

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    5
    Views
    1,268

    Re: Firewall and VPN Module in Plesk

    If still unsolicited commercial emails are left, makes the integrated as a separate module SpamAssassin them farewell. The mail size can be limited, as is the frequency of POP3 views. Very important:...
  2. Replies
    4
    Views
    781

    Re: Server Management with Plesk

    While talking about the right operating system, taken care of the import of Plesk, the auto installer. Denied this on our test computer with Open Suse 10.2 its service because he does not find a...
  3. Replies
    5
    Views
    2,445

    Re: Fiber-optic network architecture

    I would like to discuss about traditional fixed-line. Typically, the traditional fixed-network consists of a continuous copper cabling. Except the mediation Featured (Vst) is. Which is approached...
  4. Replies
    6
    Views
    1,357

    Re: Future of mobile communications

    Because no network can access those requirements on my own. The customer then has the opportunity with a terminal and a fare to get access to all networks, without having to worry about need, what...
  5. Re: How to set administrator password in firewall?

    I would like to tell you that in previous versions there were some problems while setting the passwords and the Tab key. These appear to be adjusted. When using the tab key the cursor jumps to the...
  6. Replies
    4
    Views
    1,169

    Re: Cache function in Proxy Server

    Function cache (caching). The server keeps track of all web pages requested by the clients it serves. The cache used to store information locally with a high probability of being called up again....
  7. Replies
    4
    Views
    664

    Re: IBM Smart Business Desktop Cloud

    Reducing costs, improving service quality and enable innovative business models. The IBM Smart Business Services provide expert advice on infrastructure design, high availability and security...
  8. Re: Bluetooth Basics: Communication and Security

    The extensive command of the HCI are divided into the following groups: Generic Events, device setup, controller flow control, controller information, controller configuration, device discovery,...
  9. Replies
    5
    Views
    1,389

    Re: How to configure Linksys Router?

    I called the UTP cable is like a telephone cable but the clips are larger where good or it can insert a cable to a LAN you ask crossed but depends on how you want it good meters and then insert it as...
  10. Replies
    5
    Views
    814

    Re: Is Virus Scanner from Microsoft better?

    It is basically nothing objectionable, but there are explanations in the SpyNet a small passage, the user is informed that there may in some cases, the
    Microsoft Security Essentials scans the...
  11. Replies
    4
    Views
    1,290

    Re: No connection to the router with Windows 7

    I would like to ask you few questions.

    How did you know that your router to your PC does not recognize?
    Ran the connection with Vista properly?
    Have you checked that the correct drivers...
  12. Replies
    5
    Views
    1,688

    Re: WiFi does not reconnect with Windows XP

    To disable agent startup, two possibilities:

    The startup folder.
    In the start menu> All Programs, there is a startup folder. You will find a shortcut to the executable agent in most cases. Then...
  13. Replies
    4
    Views
    1,330

    Re: How to find the network connections?

    Because TCP / IP Is a core component of Windows, you cannot remove it. However, you can reset TCP / IP to ITS original state by using the NetShell utility (netsh). The reset command is available on...
  14. Re: Net use command for printing with DOS in the network

    You will have to keep in mind that Windows XP users who are not administrators cannot map an LPT port to a path if the network printer LPT port subsists on the computer as a physical parallel port....
  15. Re: error in Data Source Configuration Wizard in Visual Studio 2008

    Yes, let me be your angel to resolve this problem, you just need to register the Adodb.dll file in the global assembly cache (GAC). On a computer where only the .NET Framework is installed, the file...
  16. Re: ALFA Network AWUS036H 500mW Wifi USB Adapter and Packet Injection

    You Need to first determine What wireless chipset your card uses. Can this be done by one or more of These techniques :

    Search the internet for "<your model> chipset card" or "linux <your model>...
  17. Re: How to get rid of Windows Vista Keyloggers?

    As the user types, the device collects each keystroke and saves it in a text file. Later, the third person who installed the keylogger can take note of everything that was typed, and use it....
  18. Remove Backdoor.Noppuca!inf

    My system also got infected with Backdoor and i try out many solution but none of then helped me a lot, when i told my friend about it he recommended me to use AVG anti virus which is capable of...
  19. Replies
    4
    Views
    738

    Unable to remove VX2

    If you really want to remove VX2 from your system then you can then search for hi5.dll, hi6.dll, offeroptimizer, sitehlpr.dll, vx2.dll in all your drivers and delete them, after that click on start...
  20. Replies
    5
    Views
    5,934

    System infected with BackDoor.Tdss.565

    If you want to remove BackDoor.Tdss.565 from your system then reboot your system and login into safe mode by pressing F8 button, after that click on start goto run option and type regedit, now...
  21. Remove Trojan.Agent/Gen-AppX

    If you really want to remove Trojan.Agent/Gen-AppX from your system then there is no need to format your system, in that case login into safe mode by rebooting your system, then click on start go to...
  22. Replies
    3
    Views
    3,268

    Computer infected with msb.exe virus

    My computer also got infected with msb.exe virus, when i told my friend about it he told me to use Spyware Terminator this will can your computer for known threats and report findings in a manner...
  23. Replies
    3
    Views
    1,433

    Re: Google updater cannot continue

    I was also facing similar type of issue i try to click on Start then click on run option and type cmd in run option and press enter, then command prompt window would get open over here paste the...
  24. Internet Explorer redirecting to random pages

    I don't think so running any spyware would solve your problem because i had find many solution but none of them help me a lot and finally i had to format my computer and after that try to install a...
  25. Replies
    3
    Views
    1,125

    wuaclt.exe always running on computer

    In that case i would suggest you to install AVG Anti-Spyware because this programs offer insufficient protection against urgently growing threats like Trojans, Worms, Dialers, Hijackers, Spyware and...
  26. Replies
    3
    Views
    1,670

    Remove Auto1.vbs from Dell laptop

    If you really want to overcome from this issue then i would your have system restore to previous date or insert Windows XP bootable CD and repair your operating system, but i am sure restoring to...
  27. Re: How to open port 3101 on my server running on SBS

    You can enable TCP/IP packet filtering on the NIC that is installed on the computer with SBS2000. You can enable packet filtering on a NIC in virtually all Windows O/S product line. Port 3101 is also...
  28. Re: What are the different type of inheritance that PHP supports

    The "design pattern" answer is to abstract the shared functionality into a separate component, and compose at runtime. In general Classes can be derived from another class, hence support...
  29. Re: How to measure transparency of location servers?

    If a requirement of the system was that it should be highly available, then it is very likely that each Service would have a backup service running in parallel to it. If the Price Quoting Service...
  30. Replies
    3
    Views
    3,025

    Re: Acer 5050 Wireless LAN doesn't work

    Go into the device manager and check it's status and for any error codes, you can also update the driver from there. how are you trying to access the wireless signal? is it being broadcast by your...
  31. Replies
    3
    Views
    1,170

    Re: How to stop Cisco router through console

    I have Transcender that I used for the CCNA and it would give me the same thing so I was pretty much used to it. I remember that question CCNA though. have you included a copy of your configuration...
  32. Replies
    3
    Views
    3,538

    Re: How to register ASP.Net with iis

    When multiple versions of the .NET Framework are executing side-by-side on a single computer, the ASP.NET ISAPI version mapped Doing all this manually can be a difficult operation, and requires a...
  33. Replies
    3
    Views
    5,124

    Re: What is kaspersky kis.en.msi file

    Extracting the files in the downloaded "kis8.0.0.454en.exe" with Universal extractor. Download latest English version of Kaspersky Internet Security and install. The reason you need to download again...
  34. Replies
    3
    Views
    1,866

    Re: Dell 600m ethernet problem

    The bios is pretty weakly set up but I enable Cardbus NIC and onboard NIC on the boot order because boot order is really most of the only options given. You need to right click on that device and...
  35. Re: What is the Purpose of the preferred network list

    I can dynamically control my Preferred network list with my location so that i can change my network location and my airport card will automatically log me onto the other subnet. The MBP is running...
  36. Re: making network between two systems without using cables

    Not much settings involved in the laptops, as the automatically search and connect to the available wi-fi network. Instead of that why dont you make a connection with the Direct Cable following are...
  37. Re: How to Identify Open Ports on local computer

    To identify ports, open a command console and type the following command:

    netstat -a

    and this same command Have you may tried using unix "netstat" command? I think the "-a" option gives all...
  38. Re: Ethernet adapter Local Area Connection problem - Media Disconnected

    When you are having trouble with wireless then encryption question is important. Please login to your router and check the encryption (in the wireless section). If it is not already 'disabled' or...
  39. Re: How to deal with acservice.exe windows process

    ArcSoft Connect Service. Background service installed by the ArcSoft software which comes bundled with many PCs or TV cards. If you keep getting ACService.exe errors, you may have registry errors....
  40. Re: Access does not allow Primary key with two fields

    when you are in the relationship window, drag the relationship from People to the first field, check Referential Integrity (RI) store the customer's address in each record in the Orders table, you...
  41. Replies
    3
    Views
    1,964

    Re: How to schedule reset belkin f5d5130-5

    Just check on your router properly, when you will switch on your router the powered lights gets on, you need to press and hold the reset button for exactly
    seven seconds, this will restore the...
  42. Replies
    4
    Views
    1,768

    Re: Microsoft outlook connection error

    Try disabling Firewall and to do so follow these steps:


    Go the Control Panel (Start > Control Panel)
    Open Network Connection
    Right click on the internet connection you’re using (LAN, or...
  43. Re: Unable to install cumulative update for windows vista

    I will suggest you to Reinstall Windows Update Agent 3.0 and to do so you need to download the Windows Update Agent 3.0 and need to save to the C:\ drive.
    ...
  44. Re: Cannot connect to internet through Wireless USB modem or phones (gprs/edge)

    You need to find for the file wvdial.conf or something like that irrespective of your mobile phone, Opened it as Root so you could edit and Delete the contents and Pasted the following into the file....
  45. Re: Difference between Windows defender and Spybot search n Destroy

    As per the result I have seen on the internet there are people who give most preference to Spybot, but I can just say that in my experience is best to use them both and use some other also. Adaware...
  46. Re: ZfDInvScanner.exe Anti-virus slows down the PC

    Well not like 2 av systems, more like having a full virus scan done of your system at a regular schedule,or else if you are using another security system like McAfee and if you excluded a file in...
  47. Replies
    2
    Views
    952

    Re: Constantly having to restart Network

    Have you talk to your ISP customer center regarding this issues,there may be a possibility that the issue may be from ISP side, or else if it is with the router then unplug the router and plug in...
  48. Re: How to Detect Wireless LAN MAC Address Spoofing

    An attacker wishing to disrupt a wireless network has a wide arsenal available to them. Many of these tools rely on using a faked MAC address, masquerading as an authorized wireless access point or...
  49. Replies
    3
    Views
    1,439

    Re: Hardware vs. Software Firewalls

    A firewall is a protective system that lies, in essence, between your computer network and the Internet. When used correctly, a firewall prevents unauthorized use and access to your network. The job...
  50. Replies
    4
    Views
    2,977

    Re: "Logon Domains" for wireless Network

    Hello shanbaag,


    Check that you are running Windows XP Service Pack 2:

    Click on Start > Right click on My Computer > Go to Properties

    You will also need the WPA2 hotfix from Microsoft...
Results 1 to 50 of 71
Page 1 of 2 1 2
Page generated in 1,713,575,062.80002 seconds with 19 queries