Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Chriss Miller on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  • Users: sohtnax
  • Content: Threads
  • Order by date
  1. sohtnax

    Suspicious Security Log Entry

    I noticed the following entries in the Security log of one of my Windows Domain Controllers this morning: Event Type: Failure Audit Event Source: Security Event Category: Account Logon Event ID: 681 Date: 5/9/2006 Time: 8:17:26 AM User: NT AUTHORITY\SYSTEM Computer: DC1 Description: The...
  2. sohtnax

    Clustering Windows Services

    I have several Windows Services that use a large amount of Windows memory, and must be up 24x7. I was hoping to use clustering in some way to ensure availability and possibly pool memory resources. These Windows services stores info in RAM. I was researching the possibility of using clustering...
  3. sohtnax

    Demarc Power

    My company is currently occupying an office building with with other tenants. The demarc is in a common area, and houses all our voice and data T1's as well as the other tenants. One of the tenants is currently undergoing a renovation in their space, and as a result we have had several...
  4. sohtnax

    Cisco Concentrator Site-to-Site VPN

    Does anyone have any sample configs for establishing a site-to-site VPN connection using two Cisco 3000 series VPN Concentrators, or know of any good links providing configuration info?
  5. sohtnax

    Domain Controller near disk capacity

    I have 2 Windows 2000 domain controllers. DC1 is in theory used as the Primary Domain Controller and also has DNS running on it, and DC2 is used primarily as a backup and for hosting print services. DC1 is dangerously close to capacity on drive C, and I have moved everything possible. What...
  6. sohtnax

    Initiating Batch on Remote Server

    How can I trigger a batch file to run on a server remotely, without actually executing the batch on the machine I am using? For example, I have create testbatch on Server A. At any given moment, I want to be able to triger the script testbatch script to run locally on Server A, from ServerB.
  7. sohtnax

    Hyperterminal & LTP port

    I am trying to use Hyperterminal using my LPT port rather than a COM, but it is not available in my list of connection options. I've seen it done. Does anyone know how I can add it?
  8. sohtnax

    Protocol Driver Error

    My users recently began experiencing the following error when attempting to connect to a remote business partners citrix server: THIN APPLICATIONS - Jabbab ERROR Cannot connect to the Citrix Metaframe server. Protocol Driver error I tested the same connection from a laptop outside of the...
  9. sohtnax

    Site-to-Site Problem

    I recently set up a site-to-site between Company A's PIX (outside int 206.139.x.x) and Company B's PIX (outside int 205.144.x.x). The intended goal was to allow for 15 machines on Company A's internal network (10.6.x.x) to access a machine on Company B's internal network (10.5.x.x). When I...
  10. sohtnax

    Site-to-Site VPN, Concentrator to PIX

    I need to access resources on a remote network using a site-to-site VPN, using my Cisco VPN concentrator to connect to a remote PIX firewall. Assuming the tunnel is established between the two devices, how would I be able to direct traffic intended for a resource on that remote site to through...
  11. sohtnax

    Site-to-Site vs. Standard VPN Client

    At what point is it recomended to use a site-to-site between two PIX firewalls for VPN connectivity over the standard Cisco Client? Is there any additional security, bandwidth, or performance factors to take into consideration when deciding between the two? For example, if you have a couple...
  12. sohtnax

    Search PDF

    I am currently saving my PDF's to coincide with a certain number. However, within the document there is also a name. Is it possible to search using Windows Explorer for a pdf document via a name within the file?
  13. sohtnax

    Modular Messaging vs. Audix Intuity

    I am looking to purchase an Avaya S8500 phone system, and have heard contrasting things regarding the voice mail. What are the major differences between Avaya's Modular Messaging and Audix Intuity LX?
  14. sohtnax

    Looking to purchase new phone system

    Hello, I am currently looking to purchase a solution phone system with Call Center functionality for a new site. There will be approximately 200 employees at this site, 80 of which will be ACD agents. I'd like to go with something that has IP functionality and the abilitiy to handle up to 500...
  15. sohtnax

    Looking to purchase Avaya Solution

    Hello, I am currently looking to purchase a solution phone system with Call Center functionality for a new site. There will be approximately 200 employees at this site, 80 of which will be ACD agents. I'd like to go with something that has IP functionality and the abilitiy to handle up to 500...
  16. sohtnax

    Second Site

    In my existing office space, I have a Windows 200 domain with 2 domain controllers. I will be adding a second office to be connected via a point to point T1 and would like to share resources accross both buildings. How do I go about setting up AD at that second site? Do I simply add another...
  17. sohtnax

    Problems after applying Security Policy

    I recently applied the www-w2k3-dmz.inf security policy to a Windows 2003 IIS server. Since doing so, I am unable to map a drive ot any other resource or brwose the network. I've copied the INF config below. Anyone know how to resolve this without removing the entire policy? ; Security...
  18. sohtnax

    Infrastructure Advice

    I currently own a Nortel Norstar, MICS 6.1, with a Cinphony ACD I and am pretty much maxed in my existing site, which is fine because I do not have the seats to accomodate any more employees. We will be opening a second site about a mile away so that we can allow for additional growth within...
  19. sohtnax

    Assessing Compromised machine

    I have a client with a compromised FTP server running IIS 5.0. I found the hacker to have installed the W32/Wollf.B backdoor in the System32 directory. How can I determine how he was able to get in?
  20. sohtnax

    PIX Static Problem

    I have a client using a PIX 515 Firewall with some static entries in my PIX Configuration, similar to the following example: static (public,outside) 209.145.50.125 173.15.6.2 netmask 255.255.255.255 0 0 These static entries are for web servers. Every couple of months or so, I encounter a...

Part and Inventory Search

Back
Top