Cool solution...But the first time you have to move a large file from one building location or migrate data from one server in one build to another, I bet one will wish that they went with fiber in the first place.
Just my humble opinion
Cheers....
As for your phone systems I'd do a bit more research and get something more substantial then cat. 3. Heck it's not even a standard now when doing new instalations with my company. We use cat. 5e. Also plan your phone wiring to allow another 50% in growth. so instead of just 3 lines per...
While we're at it, I have a question that isn't really on topic. What are those outlets called that you plug UPS power supplies into? The ones with the big outlets? Are they 240 volt outlets?"
Depends on the type of plug....most are clearly marked on the plug itself. If done to code any...
Do it right and go with Fiber. you have to ask yourself how much will it cost the company for each day a building is down from data and phones. Fiber is not that expensive anymore.
Even if you do happen to find the cable, you still won't know the condition of that cable. It would be best to get a wirescope which has several of the testing tools built in plus your tone generator which you are using. I have to agree to using the 8 Pin Banjo adapter which you connect the two...
I wonder if this could be hardware related? Is the system in question, one that you have put together? Reason I ask is it possible the USB data cable that runs from the case and plugs into your motherboard correctly terminated? Are the wire pin-outs in the right order. I wasn't sure if you...
I'd have to follow the same lines. Some ofthe newer MB's have an option in the BIOS to boot up from a device connected to the USB port. Really cool in the corporate enviroment since it means one can rebuild/image PC's rather quickly by just plugging in a USB fob which has the startup files and...
Thank you rvnguy...
Much appreciated. I looked at those options and it would be pretty easy for a user to see if he/she was being watched since it would require a proxy to be established on the monitored system. This would mean that if he/she wereto go to another computer and check the IE...
Hi Everyone,
I've just been tasked to be a spook and go into a corporate users PC and edit the registry to trap IE history files and send them to another location. This individual has been in the habit of going to the porn sites on the companies PC and has inturned offended someone. The HR...
Well I think I found my answer....Went to Mandrake Linux and found thier product Mandrake SNF (Single Network Firewall). So I downloaded the ISO image and burned my CD. Installed it on one of my test machines and man was that easy and slick. The web browser interface work nicely an was able to...
Here's the situation, I have a DSL connection to my internet with a static IP, two #com PCI Ethernet cards, one connected to DSL Modem and the other for my "internal" network which have 3 Win2K servers for various duties. I want to setup a firewall using Linux (since MS Security...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.