Search:

Type: Posts; User: Pikachoo

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    1,267

    Re: Firewall and VPN Module in Plesk

    About so-called option-packs can be more exotic services Plesk manage, including Tomcat Server for Java applets or Cold Fusion support. Of course also includes the standard functions, such as the...
  2. Replies
    4
    Views
    780

    Re: Server Management with Plesk

    The watchdog module monitors now in version 2.0 on the server. With version 8.1, the manufacturer has introduced many new features. So the home page, Desktop, user-configurable. The main advantage...
  3. Re: Increased risk of threats to e-mail security

    In early days, spam has become a serious problem that threatened to severely damage the usefulness of email. The Federal Trade Commission of the United States began to take tough measures against...
  4. Replies
    5
    Views
    2,443

    Re: Fiber-optic network architecture

    To achieve high bandwidth at the local loop, the network operators are forced to the "last mile" to rebuild in the fixed network of the pure copper cabling to fiber optic cabling. The "last mile" the...
  5. Re: How to set administrator password in firewall?

    Now it is the root passwords for the user and admin set. The root user you need to log in to the command line of IPCop. User admin is the administrator for the Web interface that the firewall also...
  6. Replies
    4
    Views
    663

    Re: IBM Smart Business Desktop Cloud

    Features and benefits of IBM Desktop Cloud :

    The automated self-service delivery reduces the labor costs for configuration, operation and monitoring very difficult.
    Simplified management...
  7. Re: Information about Remote Desktop Connection and RemoteApp

    The following are some useful steps for Remote Desktop Connection:

    Open the same time Press the Windows key and the Pause button, the system properties. Alternatively, you come to the system...
  8. Replies
    4
    Views
    1,190

    Re: IEEE 802.15 Working Group for WPAN

    The ZigBee Alliance is in the range of short-range wireless networks remains the organization that attracts the most interest and the largest community in itself. In many places the term ZigBee is...
  9. Replies
    5
    Views
    696

    Re: Best tool for the wireless access

    Airsnaire warns remote administrators when a new MAC in the network shows up. Once done, the program included AirMail. The Options menu allows an SMTP server and many receivers set arbitrarily. You...
  10. Replies
    6
    Views
    1,214

    Re: VPN and IPSEC protocols

    IPSec is a Layer 3 protocol suite has the advantage that you can easily send it via existing IP connections. Depending on the mode you mean relatively little configuration effort, and network...
  11. Replies
    2
    Views
    2,193

    Re: Setting up a wireless network in 13 steps

    Step 8: connected network

    If the network has been connected successfully, we will display the connection details in the next window.


    http://img43.imageshack.us/img43/5100/wireless1.png
    ...
  12. Replies
    2
    Views
    2,193

    Re: Setting up a wireless network in 13 steps

    Step 5: Configuration data

    As you can see it has found an available wireless network, in this case the test name is "web master" but you can give it any name you want. Then, select the connect...
  13. Replies
    2
    Views
    2,193

    Setting up a wireless network in 13 steps

    A wireless network is one that enables the connection of two or more computers together without cables involved. Here's a tip to configuring a wireless network. Such networks offer us great...
  14. Replies
    4
    Views
    1,328

    Re: How to find the network connections?

    One of the mechanisms of the Internet connection on your computer is a built-in set of directives called TCP / IP. TCP / IP become sometimes can damaged or corrupted. If you cannot attach to the...
  15. Re: Net use command for printing with DOS in the network

    Use the net.exe command to ascertain a persistent connection. To do this, use the subsequent syntax at a command prompt:

    net use lpt x \ \ printserver \ sharename / persistent: yes where x is the...
  16. Replies
    7
    Views
    5,353

    Re: Problems with Wifi-link 5100 AGN

    A method of crack (passive method) is to target an access point, network and listen for hours until a client connects. Indeed, the 4-way handshake is a set of packets transmitted by the access point...
  17. Replies
    7
    Views
    1,451

    Re: Problems with uTorrent Mac

    Delete folders lightly brings nothing good, by pure chance to erase the system is stabilized by reason whatever, but how to delete a folder that the operating system alone generates needs. Utorrent...
  18. Replies
    7
    Views
    1,933

    Re: Conflicy with site gateway 192.168.1.1

    A gateway (gateway) is a device, usually a computer, which allows interconnect networks with protocols and architectures different from all levels of communication. Its purpose is to translate the...
  19. Replies
    5
    Views
    2,279

    Re: 192.168.1.1 unreachable

    I think that the first problem you are facing is to get into the router. The following steps would be useful for you :

    Unplug and re-connect the router (not reset).
    Temporarily stop the...
  20. Replies
    6
    Views
    42,418

    Re: Dlinkap web page is not opening

    If you are still receiving the Error 500 when trying to join to the web configuration of your machine D-Link, make sure you have the newest version of Windows Update for Internet Explorer 6. If you...
  21. Replies
    6
    Views
    1,685

    Re: Windows network drive problem with iDisk

    In addition to the disk space you have on your way, Apple is also available records, including OS X and software update ... Then simply drag and drop the software of your choice to your desktop (as...
  22. Re: ALFA Network AWUS036H 500mW Wifi USB Adapter and Packet Injection

    If You Are Deciding on Which card to purchase, check the " Which is the best card to buy? "section on this page. There are many Considerations That should go Into your purchase decision :

    ...
  23. Replies
    6
    Views
    1,633

    Re: How to find Private/RSA Keys

    The strength of the RSA algorithm is based on the simple fact that it is very long to find the prime factors of a given integer. But these factors are needed to break a message encrypted with RSA....
  24. Replies
    5
    Views
    1,079

    Norton 360 liveupdate connection failure

    In that case i would suggest you to completely remove AVG from your laptop and at the same time install Norton removal Tool this will remove Norton 360 from your laptop and reboot your computer and...
  25. Replies
    5
    Views
    1,079

    Norton 360 liveupdate connection failure

    Before providing you any solution i would like you to ask you a question did you completely uninstall AVG anti virus from your system? How did you install Norton 360, i mean to say that at the time...
  26. Replies
    3
    Views
    3,382

    Remove Global.exe Virus

    My computer also got infected with Global.exe virus, i got many solution but none of them where useful for me, when i asked my friend about it he told me to use AVG anti virus because it has the...
  27. Replies
    3
    Views
    1,722

    Remove virus from adobe

    It doesn't seems that your computer is being infected by virus it might happen that your .exe might have got corrupted because of which you are facing such issue, in that case i would suggest you to...
  28. Re: Passing Javascript variable value into JSP scriptlet

    To get the value of the JavaScript variable, a request needs to be submitted to the servlet, passing the value as a request parameter. Whenever user clicks on submit button the value of hidden form...
  29. Replies
    3
    Views
    4,107

    Re: How to convert Javascript code to Html code

    It's easier to interact with PHP with AJAX. But why not send the username through the URL and retrieve the value using the _GET variable in PHP? If the script requires JavaScript enabled to work,...
  30. Re: How to configure 2 DHCP server using 2 switches and only 1 DSL router?

    Netgear are a bit cheaper than linksys and buffalo and they are decent for their price. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, Select WAN in...
  31. Re: Gateway Laptop Wireless capability turned off

    You may need to go into the BIOS / setup screen when you first boot the computer, and enable wireless/radio in there. Since installing Vista Home, the button has become inactive and i'm having...
  32. Re: What is the difference between extends vs implements in java

    I recently did a DHTML lesson on Inheritance for the Java class that I teach. Please look at the Java Tutorial on java.sun.com for an explanation of classes and interfaces . You'll need IE4 or later...
  33. Re: pinging a computer in LAN adds (.net) to its computer name

    go to the Control Panel, then Network Connections, right-click on Local Area Connection, and choose Properties. On the General tab, make sure that all the protocols such as Internet Protocol(TCP/IP)...
  34. Re: conflicker work group- unable to remove from the PC

    The Conficker worm and many other types of malware, The group’s “Conficker Eye Chart” pulls images from three sites that Conficker is known to block and displays them in a box. Update 1:...
  35. Re: compaq v2000 cannot connect to wireless network

    Try checking out the following things this will help you find the solution.


    Try reseating the wifi card,if you don't know check with the user manual.
    What wifi config application you are...
  36. Replies
    3
    Views
    15,526

    Re: How to Monitor traffic using Wireshark

    Might be easier to setup wireshark. Might also look at dd-wrt or openwrt for other features. Wireshark will only work to monitor all comps on the LAN IF all comps are connected to a hub, not a...
  37. Replies
    4
    Views
    1,024

    Re: Unable to remove Win Antivirus Vista/XP

    Download Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware Download Link


    Once downloaded, close all programs and Windows on your computer, including this one.

    Double-click on the icon...
  38. Re: Belkin N+ router does not store Network details

    Setting up the router is effortless; there is no need to worry about VPI/VCI or other cryptic settings.The N+'s storage function supports FAT, FAT32, and NTFS file systems and worked very well with...
  39. Replies
    3
    Views
    14,952

    Re: How to reset ILO reset switch

    Make sure to access the iLO,you need to have atleast one of the following ...
    To direct Access to iLO you need to have username and password.OR else you should be able to Root access to the Host...
  40. Re: Vista not cooperating with Multiple Gateways

    You need to configured your routers concurrently to get the access to your multiple PC. Proper configuration of router will also improve the network customization to load balanced or even split up...
  41. Replies
    3
    Views
    880

    Re: How does DNS works?

    DNS acts like a virtual phone operator for the internet and local networks. When any end user typed in ww.anyName.com or \\YourServerName both of these requests hit up a DNS server to ask it a simple...
  42. Replies
    2
    Views
    952

    Re: Constantly having to restart Network

    It's possible to have a hardware failure, but as per what have you mention, it is indicative of internet service problems.

    After internet service is interrupted, there are routers that continue to...
  43. Re: what is the difference between Soft and hard IP

    Hi,

    As long as you use the Block Plus core for the Hard IP implementation, the interface is very similar, save a few signals to the PCIe soft cores.

    Since the Block Plus core implements the...
  44. Replies
    3
    Views
    3,841

    Re: IPV4 elements in Windows 7

    Building a full dual-stack network cannot realistically be done in a short timeframe and must be scaled in time. Several reasons explain why the transition cannot be done rapidly:


    Lack of IPv6...
  45. Replies
    5
    Views
    3,779

    Re: dk2 dkii.icd error during playing game

    I am playing Dungeon Keeper 2 in that it was giving such an error. It is very irritating as it does not allow me go further.
  46. Replies
    5
    Views
    3,779

    dk2 dkii.icd error during playing game

    Hi, I keep getting this error message come up and the game shuts down.

    ''dkii.icd has encountered a problem and needs to close''

    i read in another thread that i need to the nocd crack to...
  47. Re: How to overclock an Amd Athlon64 X2 dual core processor

    The Speed of the HTT does really make much diffrence, it has the same performance at 200Mhz(LDT) *2 as with 200MHz*5. So you may be able to simplifie even more by saying just set the HTT bus...
  48. How to overclock an Amd Athlon64 X2 dual core processor

    Hi,

    I have buy this processor from one of colleague at very lower cost and now I wanted to overclock it,so how do i overclock an amd athlon 64 X2 dual core
    processor 5500+ and how could i gain...
  49. Servlet to call Session beans during runtime

    Hi,

    I hope anyone can help me with this.

    i'm using a session bean in a servlet. anyone can advise me should i call the bean's create() in the servlet init() or in the doService()?

    And can...
  50. Replies
    3
    Views
    7,036

    Re: Acer Aspire 6930 Bluetooth

    Hi again... I really appreciate the effort... but my 6930 does not have the Nvidia video card. Mine has the Intel GM45 video. I have been all over the Intel website and several driver websites and...
Results 1 to 50 of 72
Page 1 of 2 1 2
Page generated in 1,713,528,518.11385 seconds with 19 queries