I noticed the following entries in the Security log of one of my Windows Domain Controllers this morning:
Event Type: Failure Audit
Event Source: Security
Event Category: Account Logon
Event ID: 681
Date: 5/9/2006
Time: 8:17:26 AM
User: NT AUTHORITY\SYSTEM
Computer: DC1
Description:
The...
I have several Windows Services that use a large amount of Windows memory, and must be up 24x7. I was hoping to use clustering in some way to ensure availability and possibly pool memory resources.
These Windows services stores info in RAM. I was researching the possibility of using clustering...
My company is currently occupying an office building with with other tenants. The demarc is in a common area, and houses all our voice and data T1's as well as the other tenants.
One of the tenants is currently undergoing a renovation in their space, and as a result we have had several...
Does anyone have any sample configs for establishing a site-to-site VPN connection using two Cisco 3000 series VPN Concentrators, or know of any good links providing configuration info?
I have 2 Windows 2000 domain controllers. DC1 is in theory used as the Primary Domain Controller and also has DNS running on it, and DC2 is used primarily as a backup and for hosting print services.
DC1 is dangerously close to capacity on drive C, and I have moved everything possible. What...
How can I trigger a batch file to run on a server remotely, without actually executing the batch on the machine I am using?
For example, I have create testbatch on Server A. At any given moment, I want to be able to triger the script testbatch script to run locally on Server A, from ServerB.
I am trying to use Hyperterminal using my LPT port rather than a COM, but it is not available in my list of connection options. I've seen it done. Does anyone know how I can add it?
My users recently began experiencing the following error when attempting to connect to a remote business partners citrix server:
THIN APPLICATIONS - Jabbab ERROR
Cannot connect to the Citrix Metaframe server. Protocol Driver error
I tested the same connection from a laptop outside of the...
I recently set up a site-to-site between Company A's PIX (outside int 206.139.x.x) and Company B's PIX (outside int 205.144.x.x). The intended goal was to allow for 15 machines on Company A's internal network (10.6.x.x) to access a machine on Company B's internal network (10.5.x.x).
When I...
I need to access resources on a remote network using a site-to-site VPN, using my Cisco VPN concentrator to connect to a remote PIX firewall.
Assuming the tunnel is established between the two devices, how would I be able to direct traffic intended for a resource on that remote site to through...
At what point is it recomended to use a site-to-site between two PIX firewalls for VPN connectivity over the standard Cisco Client?
Is there any additional security, bandwidth, or performance factors to take into consideration when deciding between the two?
For example, if you have a couple...
I am currently saving my PDF's to coincide with a certain number. However, within the document there is also a name. Is it possible to search using Windows Explorer for a pdf document via a name within the file?
I am looking to purchase an Avaya S8500 phone system, and have heard contrasting things regarding the voice mail. What are the major differences between Avaya's Modular Messaging and Audix Intuity LX?
Hello,
I am currently looking to purchase a solution phone system with Call Center functionality for a new site. There will be approximately 200 employees at this site, 80 of which will be ACD agents. I'd like to go with something that has IP functionality and the abilitiy to handle up to 500...
Hello,
I am currently looking to purchase a solution phone system with Call Center functionality for a new site. There will be approximately 200 employees at this site, 80 of which will be ACD agents. I'd like to go with something that has IP functionality and the abilitiy to handle up to 500...
In my existing office space, I have a Windows 200 domain with 2 domain controllers. I will be adding a second office to be connected via a point to point T1 and would like to share resources accross both buildings.
How do I go about setting up AD at that second site? Do I simply add another...
I recently applied the www-w2k3-dmz.inf security policy to a Windows 2003 IIS server. Since doing so, I am unable to map a drive ot any other resource or brwose the network.
I've copied the INF config below. Anyone know how to resolve this without removing the entire policy?
; Security...
I currently own a Nortel Norstar, MICS 6.1, with a Cinphony ACD I and am pretty much maxed in my existing site, which is fine because I do not have the seats to accomodate any more employees. We will be opening a second site about a mile away so that we can allow for additional growth within...
I have a client with a compromised FTP server running IIS 5.0. I found the hacker to have installed the W32/Wollf.B backdoor in the System32 directory. How can I determine how he was able to get in?
I have a client using a PIX 515 Firewall with some static entries in my PIX Configuration, similar to the following example:
static (public,outside) 209.145.50.125 173.15.6.2 netmask 255.255.255.255 0 0
These static entries are for web servers. Every couple of months or so, I encounter a...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.