Search Results

Search found 7669 results on 307 pages for 'dealing with clients'.

Page 103/307 | < Previous Page | 99 100 101 102 103 104 105 106 107 108 109 110  | Next Page >

  • Hotel like Wifi manager

    - by flpgdt
    Does anyone knows which are these systems that manages paid wifi networks and some hotels and airports? Even better, would anyone know a open/free project that would do or could be adapted to that end? The idea is simple, I want to let the network open at physical level so anyone can connect. After connected however, the clients would have access only to a specified page where they can logging in, and doing the necessary validations the router would allow these of those ports (or even everything) for his IP.

    Read the article

  • IPTV: how to minimize the upload bandwidth

    - by gjmc
    hello guys, my questions would be in the field of IPTV Kindly consider the below: 200 channels, mp4 @ 1000kbps 1000 users. The main goal is to minimize the upload bandwidth required for this project. Also consider that the streaming server will be in different country then the clients. Thank you guys!

    Read the article

  • choosing filesystem for unified storage

    - by maruti
    which file system can serve storage to Windows and VMware ESX clients? planning a storage server box ~ 10TB using NexentaStor or FreeNAS. this has to serve Primarily Windows 2003, 2008 servers and occasionally VMware ESX. is that possible? please correct me if wrong.thx

    Read the article

  • Virtual machine : is it possible to run a 32 bits guest OS on a 64 bits host OS?

    - by Cédric Girard
    I am a software developer, and I need to use old version of Borland/Embarcadero Delphi 7 for one software. The others ones are PHP software. I will have soon a 64 bits PC, running Linux, but I need a Windows 32 bits virtual machine for Delphi (because Delphi 7 is a bit old, and our clients still use Windows XP 32 bits systems). I already have a VM under virtualbox for my Delphi environment. Will it run fine, or will I have some problem?

    Read the article

  • yousendit or filesend local as well on internet?

    - by neolix
    Hi there, We are looking setup our own yousendit equivalent for our user as well for our clients! what is open source software to use, we want web interface as well email. We are looking setup using centos do any one has done some thing link this pls share with us. i have ref following link from serverfault but not getting it how do i run the show http://serverfault.com/questions/127737/is-there-a-linux-equivalent-of-yousendit

    Read the article

  • Synergy config being shared across computers

    - by deworde
    For some reason, I'm unable to change where my synergy 1.3.1 profile data is being stored, with the result that when I start up, both computers end up reading it from the same shared file. Effectively this means that I'm ending up with both computers acting as clients or servers and both with the same name, until I change their profiles manually. Any advice? Thanks.

    Read the article

  • How do I set up domain names for IP's on my LAN?

    - by Qemal Stafa
    I have a LAN with 50 clients and my company has made me do a local WebApp. This is new territory for me, but as I see it, the individual internal IP's are regulated by MikroTIK. I was wondering, how does one make MikroTIK recognise internal domain names for this IPs? Right now, the WebApp works fine and can be used by entering 192.168.3.150/app/ But since most people have difficulties entering IPs I was wondering if i could do smth like : myroom.lan would be just as you typed 192.168.3.150

    Read the article

  • What is the correct way to distinguish services to which RADIUS request belongs?

    - by John
    If I have 1 generic RADIUS server and a number of clients (VoIP server, VPN server, WIFI access point) how to distinguish senders (NAS) of access and accounting requests? I didn't found anything helpful by reading all related RFCs, there just NAS-IP-Addess or NAS-Identifier is required, but this attributes usually represents IP address of the NAS and this address can not be used as a robust identifier, because it's often possible to fall into the case when 2 different NASes are running on the same server and this attributes can not be customized. Any ideas?

    Read the article

  • OpenVPN Chaining

    - by noderunner
    I'm trying to set up an OpenVPN "chain", similar to what is described here. I have two separate networks, A and B. Each network has an OpenVPN server using a standard "road warrior" or "client/server" approach. A client can connect to either one for access to the hosts/services on that respective network. But server A and B are also connected to each other. The servers on each network have a "site-to-site" connection between the two. What I'm trying to accomplish, is the ability to connect to network A as a client, and then make connections with hosts on network B. I'm using tun/routing for all of the VPN connections. The "chain" looks something like this: [Client] --- [Server A] --- [Server A] --- [Server B] --- [Server B] --- [Host B] (tun0) (tun0) (tun1) (tun0) (eth0) (eth0) The whole idea is that server A should route traffic destined to network B through the "site-to-site" VPN set up on tun1 when a client from tun0 tries to connect. I did this simply by setting up two connection profiles on server A. One profile is a standard server config running on tun0, defining a virtual client network, IP address pool, pushing routes, etc. The other is a client connection to Server B running on tun1. With ip_forwarding enabled, I then simply added a "push route" to the clients advertising a route to network B. On server A, this seems to work when I look at tcpdump output. If I connect as a client, and then ping a host on network B, I can see the traffic getting passed from tun0 to tun1 on Server A: tcpdump -nSi tun1 icmp The weird thing is that I don't see Server B receiving that traffic through the tunnel. It's as if Server A is sending it through the site-to-site connection like it should, but server B is completely ignoring it. When I look for the traffic on Server B, it simply isn't there. A ping from Server A -- Host B works fine. But a ping from a client connected to Server A to host B does not. I'm wondering if Server B is ignoring the traffic because the source IP does not match the client IP pool that it hands out to clients? Does anyone know if I need to do something on Server B in order for it to see the traffic? This is a complicated problem to explain, so thanks if you stuck with me this far.

    Read the article

  • How to change user for more rights on a SFTP client?

    - by Zenklys
    It is always suggested on first step to disable the remote root login for the SSH protocol. I have a low-right user able to connect via SSH and once connected, I simply su in order to gain more rights. Now when using a sFTP client, I use my low-right user and am thus able to do next to nothing. My question is : Is it possible to change user after login using 3rd party client, such as Transmit, Cyberduck, Filezilla ? PS : Mac clients would be great ;)

    Read the article

  • Postifix SMTP Load Balance

    - by user103373
    I want to load balance outbound emails between 3 post-fix gateways for sending mails only reason is to use multiple different source IPs to increase throughput & inbox delivery. Each gateway should receive an approximately equal amount of outbound messages. How is it possible please suggest. +---------- smtp A --------- Internet | clients -------- smtp lb ----- smtp B --------- Internet | +---------- smtp C --------- Internet

    Read the article

  • A free WebDAV client for Windows?

    - by Brian L.
    I'd like to copy files from a network drive to a SharePoint site (perhaps as a mapped drive). What's a good client to do so? Obviously Windows (XP) Explorer is bad, I"m trying RichCopy at the moment. Any opinions on CoreFTP? Are there any recommended open-source WebDAV clients?

    Read the article

  • "Banning" programs from Windows 7's Recently Launched list

    - by Zack
    I have a laptop I use for home and work. I like to keep them separate as best I can, and it's not very endearing to my clients to sit down in a meeting with them, crack open my start menu, and have WoW at the top of the list. Is there a way to "ban" a program from this list so that--no matter how much I use it--it will never pop in there again?

    Read the article

  • Subversion Permission Denied when adding or committing

    - by Rungano
    Hi guys I am running subversion 1.4 on Centos 5.2 and my clients are using tortoise to do their check out, commit etc. I think I have permissions problems but I have configured the folder to accessible to everyone with 777 attribute but I seem not to be getting anywhere. Its generating this error on tortoise "svn: Can't open file 'PATH/TO/MY/FILES/entries': Permission denied". Some guy was suggesting some indexing software installed on the client machine like google desktop, any suggestions?

    Read the article

  • can anyone can help me [closed]

    - by Shiranui01
    One of my clients just bought a used Panasonic P2 camera, a HVX200, and wants to edit P2 MXF footage (720p 24p) in iMovie 11 and OS 10.6. I'm looking for an simple, reliable, reasonably priced converter so they can take their Panasonic P2 footage and prep it for iMovie 11. I am seeing a number of products on the market that do this, but I'm not sure which one I should purchase. Do you guys have something suitable for this task?

    Read the article

  • What logs should I collect from a Windows server network?

    - by Cygnus X
    I'm setting up a log collection server for my Windows network (about 30 servers ranging from 2003 to 2008 R2, and about 300 vista/7 clients), and I was wondering which logs are good to collect and which ones are a waste of time. I'm going to collect the obvious ones (system, security, event, firewall, and role specific logs) but are there any others I should be worried about? I'm using Splunk if that helps answer the question.

    Read the article

  • What can SNMP be useful for in a small network?

    - by Sanoj
    I have been administering servers and clients in small business offices, and have never used SNMP. But I have read about it and it looks interesting. As what I understand, it is mostly useful if you have a bigger network with a lot of network equipment that should be monitored. Is there any useful use cases for SNMP in smaller networks? And is it recommended that I use it?

    Read the article

  • How to send e-mail to customers using quick campaing?

    - by ripperus
    I have a question/problem. I want sent email to my clients using quick campaing. But in those emails I want to put some information for only this customer. For example: First customer - A - have a information: login: only_for_A and password: only_for_A Second customer - B - have a information: login: only_for_B and password: only_for_B etc. But the passwords are in Excel file. Is there any possibility to automatically add login and password to email?

    Read the article

  • Why must user be logged in for impersonation to work?

    - by user16011
    My Windows Server 2008 server hosts an ASP.net application that uses impersonation. The application works as long as the user being impersonated remains logged on to the server. However, when the user logs off, clients can no longer view the web pages. They get a cryptic error instead. How can I configure the server to work without the impersonated user remaining logged on? Thanks in advance.

    Read the article

< Previous Page | 99 100 101 102 103 104 105 106 107 108 109 110  | Next Page >