Search Results

Search found 12720 results on 509 pages for 'moss2007 security'.

Page 280/509 | < Previous Page | 276 277 278 279 280 281 282 283 284 285 286 287  | Next Page >

  • Cisco 1242 WAP Bridging

    - by DanWake
    I'm looking to connect two facilities with a a pair of Cisco 1242 access points and am looking for advice on configuration. We have multiple VLANs running that will need to be passed through the connection, but otherwise a fairly simple setup. Any advice on best practices from security, reliability, and speed points of views?

    Read the article

  • How does Ubuntu keep track of the "System restart required" flag in motd?

    - by Anders Lindahl
    I have a few Ubuntu servers (8.10, 9.10) that is set to automatically install security updates. Some times these updates requires a restart of the system, and this string is shown in motd: *** System restart required *** To get a notice about these, I plan to write a Nagios test to monitor if the server is in need of a reboot. So, my question: Is there a better way than parsing /etc/motd to find out if a reboot is needed?

    Read the article

  • How to combine AWS and dedicated external servers?

    - by rfw21
    I have an extensive network of servers all currently hosted on AWS EC2. For reasons of cost I plan to gradually migrate to dedicated servers where possible. So: How can I best combine AWS and non-AWS servers in my network? Ideally, I should be able to assign internal IP addresses to the external servers, include them in AWS security groups and ensure that all private traffic between my AWS servers and external servers is secure.

    Read the article

  • backup aws ec2 to separate account

    - by Paul de Goede
    I want to backup my AWS snapshots to a completely separate AWS account for additional security (if my AWS credentials were acquired someone could delete all my snapshots and volumes). But I'm a bit stumped on how to do this. There doesn't seem to be a way to store a volume or snapshot in S3 such that another user could access that data in s3 and store it in a separate AWS account. Does anyone have any suggestions on how to acheive this? Thanks

    Read the article

  • How to handle many daily emails from cron efficiently?

    - by drumfire
    With each new server comes at least one more daily crontab email. The FreeBSD servers even send two: a daily and a security run output. Thanks to my obsession with virtualisation the number of emails I need to read (and then often discard without further action) is becoming too much. What ways are there to manage / automate this process? Can emails be replaced by something that is web based? Surely some of you must have found creative ways for this.

    Read the article

  • Accessing Internal Server from Outside through SSH

    - by myahya
    The issue is as follows: I am using Ubuntu Linux. I am working from home, and I need to access a PostgreSQL database severer within my company's network. Call the DB server X. For security reasons, only one machine can be accessed from the outside using ssh, call it Y. So the scenario is: Home <--SSH-- Y <----- X(DB) I think something like SSH forwarding (configured in .ssh/config) could help with this, but I am not sure how to do this, any ideas?

    Read the article

  • Windows 2003 Domain controller

    - by user40766
    I have a win 2K3 domain controller that has sudddenly started logging about 60 events a second. All events are ID 538, 540 and 576 All events pertain to Security Audit of the machine itself logging in successfully. a typical entry is Event Id 540 Successful Network Logon: User Name: <machinename>$ Any pointers to how I can diagnose this? CPU and memory are normal on the machine.

    Read the article

  • Cisco NAT vs Bridge vs BVI

    - by cjavapro
    The only devices on this particular LAN will all have public IP addresses. Also the public IP address will be configured directly on the machine,,, so we will not translate private/public IP addresses. If we use NAT,, we would have to translate the public IP on the WAN to the public IP on the LAN. The only security feature I expect on the gateway is an access list. I don't really know much about networking, so I am sorry if this question is generic.

    Read the article

  • Exchange 2010 Discovery Search Fails

    - by ITGuy24
    When ever I run an Exchange 2010 SP1 Discovery Search I get the following error: "Search failed as the results link to the target mailbox '[email protected]' couldn't be generated." I have checked to ensure the discovery mailbox is enabled I created a new Discovery mailbox. I get the same error with both Mailboxes. The user account I am using to run the search is a member of the "Discovery Management" security group. I get the same error whether I use the Shell or the ECP to run the search

    Read the article

  • "iTunes.app" to accept incoming network connections?

    - by cust0s
    Every time I open iTunes I get the the following warning: Do you want the application "iTunes.app" to accept incoming network connections? Clicking Deny may limit the application's behavior. This setting can be changed in the Firewall pane of Security preferences. I always click "Allow" but it still pops up. I set the OS X firewall to allow incoming connections for iTunes. Any suggestions on how to fix this?

    Read the article

  • Install MacAfee And Node32

    - by hosseinsinohe
    Hi All I Have a Computer With Windows Xp Service Pack 3 as an Operating System.This Computer is In the Network With The MacAfee Update Server.This Server Will be Install And Update MacAfee Client Version In The All Computers in The Network.When I Install And Runing 'Eset Node32 Smart Security or AntiVirus' in My Computer,The Computer will be Hang And Freeze And I Can Not Work with Computer.I Restart The Computer And Try Again And Try With Safe Mode To Fix This Problem(Unistall Node32 For Fix:-) ),But I Can Not Fix This Problem.How Can I Fix This Problem And Install Node32 And MaCAfee On This Computer 's Network?

    Read the article

  • Does the Virtual PC XP Mode need safety measures?

    - by Ivo
    Does the Virtual PC XP-Mode (or any other virtualized mode) require safety measures, such as antivirus or a firewall? I'm just wondering if the XP-Mode would be a large security loophole, since it's so much more integrated into Windows 7. Actually I'm wondering the same for Portable Ubuntu, are their any safety measures I should undertake, so that I don't open a backdoor on my computer.

    Read the article

  • Could not connect to the Virtual Server on “ ”. Access was denied.

    - by Kobojunkie
    HI. I downloaded Virtual Server R2, but when I try to create a Virtual Server from the administrative site, I get the following error message Could not connect to the Virtual Server on “MyServerName”. Access was denied. You can specify an alternate Virtual Server below. I have tried configuring DCOM security but that did not help much. Anyone have a solution please? Thanks in advance

    Read the article

  • Linux (redhat) how to change password to previous password

    - by ring bearer
    Is there a way to change password to value same as the previous password? I know this is a security flaw, but would like to know however. when I try this: [mrbean@wwwserver ~]$ passwd Changing password for user mrbean. Changing password for mrbean (current) UNIX password: New UNIX password: -- here i typed same password BAD PASSWORD: is too similar to the old one.

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • How to provide wireless internet in a small business?

    - by ColinYounger
    My wife has a small business that she wants to offer a free WiFi hotspot in. She suggested opening up our private 'net connection to the customers - T&Cs of our internet provider and thoughts of random people viewing kiddy porn floated through my mind. So, first action will be to get a separate internet connection. But I have no experience of setting up a public WiFi connection. What considerations should I make with regards to: WAP Security Access logging?

    Read the article

  • Data Center Design and Preferences

    - by Warner
    When either selecting a data center as a co-location facility or designing a new one from scratch, what would your ideal specification be? Fundamentally, diversified power sources, multiple ISPs, redundant generators, UPS, cooling, and physical security are all desireable. What are the additional key requirements that someone might not consider on the first pass? What are the functional details someone might not consider during the initial high level design?

    Read the article

  • How to I set what browser Adobe Reader uses to open links?

    - by Sindri
    I have a Windows XP computer with Chrome set as the default browser. However whenever I click a link embedded in a pdf document I'm viewing with Adobe Reader 8.2.1 I get a popup security warning asking if this is ok, and then the Reader opens the link in IE. Is there a way to change Adobe Readers default browser?

    Read the article

  • Why is my server using so much memory?

    - by Qasim
    I haven't even set up my website on my dedicated server so I'm the only one using it at the moment. And yet this is what I see in my sys info: Full Size I just got a bunch of security softwares installed today so I'm wondering if that could be the reason. Programs like Dos deflate, CSF firewall, Mod_security, SIM, Log watch, etc. My server's details: CentOS Processor Intel Xeon CPU X3220 CPU Speed 2.39 GHz Cache Size 4.00 MB RAM 2GB DDR2

    Read the article

  • Why can't service account such as Local Service, Network Service, or Local System be managed on a domain level?

    - by smwikipedia
    Hi security experts, I read from here that: On a local computer, an administrator can configure the application to run as Local Service, Network Service, or Local System. These service accounts are simple to configure and use but are typically shared among multiple applications and services and cannot be managed on a domain level. I just don't understand why these accounts cannot be managed on a domain level, since they all have well-known SIDs? Thanks for your time.

    Read the article

< Previous Page | 276 277 278 279 280 281 282 283 284 285 286 287  | Next Page >