Exchange 5.5 SP4 running on NT4 SP6a.
someone sent an abusive e-mail to our company's generic e-mail address. They're obviously an employee, sending from their home account.
We thought that odds are good that whoever owns that e-mail address likely sent messages back and forth between their...
I have several small branch offices doing site-to-site VPN tunnels. Three are doing PIX(501)-to-PIX(515) and seem to work fine.
Two are doing PIX(501)-to-3005 and have always done fine until recently.
The reason we want all the tunnels to terminate at the 3005 is because in the PIX-to-PIX...
Hey all:
We've been using Ghost for years with no problems. Because so many of our users require unique software builds, we Ghost each machine after we've gotten it all squeaky clean and running perfectly. Then we give it to the user and wait for them to destroy it. When they do, we load the...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.