In my ISA server installed in integrated mode I am downloading a file through Scheduled download.
How can I read the file from cache?
How do Ipick the file and its data from cache. I am supposed to authenticate the user logon based on the data in that file lying in cache.
Can the cache be...
In my ISA server installed in integrated mode I am downloading a file through Scheduled download.
How can I read the file from cache?
How do Ipick the file and its data from cache. I am supposed to authenticate the user logon based on the data in that file lying in cache.
Can the cache be...
I have installed ISA Sever arrays on two machines with one as a upstream server.
One is Domain and other a subdomain of the domain..that is one is below the other in the domain tree.
Now I expect in a normal scenario the ISA array interfaces shud show up both the array servers but acually this...
We require to implement client authentication in our B2B portal. A supplier is expected to login only if he has a valid digital certificate issued by the certificate authority in Win 2K.
When a supplier applies for registration he is first approved by the authorities and issued a digital...
The "Valid To" and "Valid from" option specifies the duration for which the certificate is valid. I will explain it again:
While issuing a certificate we specify the duration for which it is valid. I am unable to make my Certificate Server to allow the end user to enjoy this...
I have installed Certificate Services on my machine.
I am unable to find out a option which could make the end user specify the "Valid To" and "Valid From" properties of the certificate.
That is im unable to edit this field as per my choice .
All the certificates issued...
I have installed Cetificate Services on Win 2K Server.
Now I can generat certificates through http://localhost/certsrv but i am unable to find out the option in which the duration of the certificate is specified. That is Valid from and To fields are being decided by the server automatically to...
sorry age,
no luck..kud find only passwd crackers n removers were for Excel only...am not interested in cracker..get me the url if u can for downloading password remover.
more imp : thanx a lot for info,
with best regards
gita
Can we similarly open any other application like "iexplore.exe" thru the code given in vb-island's site.
Please do update me regarding my query.
hi
Not very sure but you can install a firewall or ISA Proxy Server in which you can define policies . for eg in Checkpoint or any other commonly used firewall rules are specified as follows :
From.......To..........User.........Service.
Here "From" indicates "Source of...
You can use enumerated data types like the following :
enum BOOLEAN{No, Yes}
This way a constant value is assigned to "Yes" ie 1 and to "No" 0(zero).
Refer to P-39 of "The C Prgmng Lang" by Dennis Ritchie/Kernighan.
Also the concept of bit-field can also be used if...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.