Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations bkrike on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. icintamyself

    Log Analyzer or parser for Raptor ?

    Have anyone of you tried out log analyser and log parser for raptor logfiles ? What is the most useful tools that you have tried for that purpose ? Have someone tried the freeware reptor ? I tried to download it but the website seems to be no longer working. If anyone has a copy, could you...
  2. icintamyself

    Automatically Archiving Event Viewer

    I want to automatically archive the events in the event viewer log and clear it daily. How do I go about this. (Platform Windows NT and windows 2000).
  3. icintamyself

    How to address Special Character '/' in email address ?

    Can anyone tell me how do I send an email message to someone with an email address of this format name/Section/Group@domain e.g. : albert/FIN/MARKETING_GROUP@abc.com I have no problem writing to the person using netscape account. But when I use my Outlook 2000 sending a message to that...
  4. icintamyself

    Of Calendar and Free/Busy Schedule

    I am confuse. I want to know what is the Free/busy connector in Exchange 5.5 used for. Suppose that I want to plan a meeting. Using the Action->plan a meeting facility, I could then put in all the attendees' email addresses. Now suppose that I would want to be able to see all the attendees'...
  5. icintamyself

    DIsable a rule in raptor ?

    How do I disable a rule in raptor without osing information of the rule ?
  6. icintamyself

    License Issues

    1) How does licensing works in Checkpoint ? 2) If I buy 250-node license checkpoints, what does it means ? 3) What happen if with that license (250 nodes), I place 500 PCs behind the firewall ? How do I know which among the 500 is protected and which is not ? 4) Can I create a list of 200 IP...
  7. icintamyself

    Security Setup

    I am asked to ensure my company IT security is in place. My problem -> security is a big issue. Scenario : 20 Servers running on Windows NT,2000, Hp-UX, Linux and Solaris. Network is one flat network with about 250 PCs running on Windows NT/XP/2000. We have our own DNS server to maintain our...
  8. icintamyself

    Runtime for Word Document and Excel Worksheet

    In powerpoint for example, I can save as powerpoint show so that the user who open up the document would not need to have Microsoft office installed in his pc to see the presentation. Other examples, Winzip. I can zip a file. Make it executable so that the user would not need winzip or other zip...
  9. icintamyself

    Runtime for Word Document

    In powerpoint for example, I can save as powerpoint show so that the user who open up the document would not need to have Microsoft office installed in his pc to see the presentation. Other examples, Winzip. I can zip a file. Make it executable so that the user would not need winzip or other zip...
  10. icintamyself

    Is .cc related to visual dbase database ?

    I am not having any knowledge on Visual Dbase. Recently there was a problem reported from other departments in a company I work. A customised application was corrupted and the software are not able to run anymore. The data was kept in a file with an extension .cc When I search through internet...
  11. icintamyself

    Antivirus installation for new PC

    There is a new computer. How do we ensure that antivirus has already been installed in the computer before it is connected to the network ? Let say there is a network with 500 computer systems. Two computers are being attacked by virus. This virus try to attack other computers it can find in...
  12. icintamyself

    Usernames Guidelines ?

    We have been hearing about password guidelines to prevent the password to be easily cracked and known. How about usernames guidelines ? For e.g. should a username be made up from a person name and surnames ? I think there must be some guidelines on usernames. For instance if Mr Alex is a...
  13. icintamyself

    Quickly Rebuild Windows to Its Initial Stage

    Hi Suppose we have 250 newly bought PCs that come preinstalled with Windows 2000 Pro. Let us called the state of the PC at this junction as INITIAL STATE. Assume there is no Auto-Recovery CD for all the PCs. We wish to capture the OS state of this PC in a media. Then we proceed to start up Win...
  14. icintamyself

    Antivirus for Unix

    Anybody would like to comments... Do you really need an antivirus for Unix ? If yes, what do you think is the best antivirus solution for Hp-UX ? Thanks.
  15. icintamyself

    Oracle AppWizard for Microsoft Visual C++

    Have anyone tried out Oracle AppWizard for Microsoft Visual C++ ? With this you suppose to see a "Oracle AppWizard for MFC (exe)" from the list of new project that you wish to start with. Which CD of Oracle can you get that piece of software ? Anyone had tried out using the oracle...
  16. icintamyself

    Not all computers are shown by Network Neighbourhood

    Environment: Windows NT server 4.0, PDC. All clients (about 250 PCs) are running Windows NT Workstation 4.0. One domain exist : MYTHOL. All Workstation are having the domain MYTHOL. Problem : I browse network neighbourhood : Network Neighbourhood -> Entire Network -> Microsoft Windows Network...
  17. icintamyself

    The browser has received a server announcement indicating ...

    Every 2-3 minutes this message is being printed in my Event Viewer's Systems : "The browser has received a server announcement indicating that the computer ABC is a master browser, but this computer is not a master browser." 1) What is wrong with that ? 2) How serious is the warning...
  18. icintamyself

    How to plan for Maximum Uptime for Exchange ?

    Exchange 5.5 running on Windows NT 4.0. 300 Users. I set up an Exchange server serbing my organisation with 300 users. There is only one site and one server. We installed IMS. It has been running for almost 2 years. On and off, sometimes we experienced some outage such as IMS service failure...
  19. icintamyself

    Infinite Loop and Cpu Utilisation

    I write a program that which consist of an infinite loop. Within the loop are codes that suppose to look for new file that is just being uploaded in a folder. When it detect a new file arrives, it would open the file, read it and do some processing. It is critical for the file to be quickly...
  20. icintamyself

    Winword.exe has generated errors

    Microsoft Word 2000 (9.0.4402 SR-1) running on Microsoft Windows 2000 5.00.2195 Service Pack 2. When I tried to select the functions Format->Font, Word "Winword.exe has generated errors and will be closed by Windows. You will need to restart the progra. An error log is being...

Part and Inventory Search

Back
Top