Search Results

Search found 21551 results on 863 pages for 'company questions'.

Page 352/863 | < Previous Page | 348 349 350 351 352 353 354 355 356 357 358 359  | Next Page >

  • after upgrade to outlook 2013 Contacts have the default picture in reading pane

    - by Juan Zamudio
    I'm using Windows 8 on a domain (using a domain account not a Microsoft account) connecting to Exchange, all my Contacts were outlook contacts with pictures and other data, I could see the picture of the contact in the reading pane and people pane while using Outlook 2010. After the upgrade to Outlook 2013 I can see my outlook contacts but it appears that they are unavailable in the reading pane because all i can see is the default picture (the default picture picture is also visible in the notifications). If I put the mouse over the name of the people while in the reading pane all I can see is the card with the default info (the only data is that the contact is available in the next 8 hours), if i compose a new message and hover the name of the contact i can see the card with all the data (picture, company, etc.). Is this the default behavior in Outlook 2013 if you are in a domain and not connected to any service or there is a way to show the picture of my contacts in every part of outlook?

    Read the article

  • Steps to take when technical staff leave

    - by Tom O'Connor
    How do you handle the departure process when privileged or technical staff resign / get fired? Do you have a checklist of things to do to ensure the continuing operation / security of the company's infrastructure? I'm trying to come up with a nice canonical list of things that my colleagues should do when I leave (I resigned a week ago, so I've got a month to tidy up and GTFO). So far I've got: Escort them off the premises Delete their email Inbox (set all mail to forward to a catch-all) Delete their SSH keys on server(s) Delete their mysql user account(s) ... So, what's next. What have I forgotten to mention, or might be similarly useful? (endnote: Why is this off-topic? I'm a systems administrator, and this concerns continuing business security, this is definitely on-topic.)

    Read the article

  • Remote host: can tracert, can telnet, can*not* browse: what gives?

    - by MacThePenguin
    One of my customers of the company I work for has made a change to their Internet connection, and now we can't connect to them any more from our LAN. To help me troubleshoot this issue, the network guy on the customer's site has configured their firewall so that a HTTPS connection to their public IP address is open to any IP. I should put https://<customer's IP> in my browser and get a web page. Well, it works from any network I've tried (even from my smartphone), just not from my company's LAN. I thought it may be an issue with our firewall (though I checked its rules and it allows outbound TCP port 443 to anywhere), so I just connected a PC directly to the network connection of our provider, bypassing out firewall completely, and still it didn't work (everything else worked). So I asked for help to our Internet provider's customer service, and they asked me to do a tracert to our customer's IP. The tracert is successful, as the final hop shown in the output is the host I want to reach. So they said there's no problem. :( I also tried telnet <customer's IP> 443 and that works as well: I get a blank page with the cursor blinking (I've tried using another random port and that gives me an error message, as it should). Still, from any browser of any PC in my LAN I can't open that URL. I tried checking the network traffic with Wireshark: I see the packages going through and answers coming back, thought the packets I see passing are far less than they are if I successfully connect to another HTTPS website. See the attached screenshot: I had to blur the IPs, anyway the longer string is my PC's local IP address, the shorter one is the customer's public IP. I don't know what else to try. This is the only IP doing this... Any idea what could I try to find a solution to this issue? Thanks, let me know if you need further details. Edit: when I say "it doesn't work" I mean: the page doesn't open, the browser keeps loading for a long time and eventually shows an error saying that the page cannot be opened. I'm not in my office now so I can't paste the exact message, but it's the usual message you get when the browser reaches its timeout. When I say "it works", I mean the browser loads and shows a webpage (it's the logon page for the customers' firewall admin interface: so there's the firewall brand's logo and there are fields to enter a user id and a password). Update 13/09/2012: tried again to connect to the customer's network through our Internet connection without a firewall. This is what I did: Run a Kubuntu 12.04 live distro on a spare laptop; Updated all the packages I could and installed WireShark; Attached it to my LAN and verified that I couldn't open https://<customer's IP>. Verified that the Wireshark trace for this attempt was the same as the one I've already posted; Verified that I could connect to another customer's host using rdesktop (it worked); Tried to rdesktop to <customer's IP>, here's the output: kubuntu@kubuntu:/etc$ rdesktop <customer's IP> Autoselected keyboard map en-us ERROR: recv: Connection reset by peer Disconnected the laptop from the LAN; Disconnected the firewall from the Extranet connection, connected the laptop instead. Set its network configuration so that I could access the Internet; Verified that I could connect to other websites in http and https and in RDP to other customers' hosts - it all worked as expected; Verified that I could still traceroute to <customer's IP>: I could; Verified that I still couldn't open https://<customer's IP> (same exact result as before); Checked the WireShark trace for this attempt and noticed a different behaviour: I could see packets going out to the customer's IP, but no replies at all; Tried to run rdesktop again, with a slightly different result: kubuntu@kubuntu:/etc/network$ rdesktop <customer's IP> Autoselected keyboard map en-us ERROR: <customer's IP>: unable to connect Finally gave up, put everything back as it was before, turned off the laptop and lost the WireShark traces I had saved. :( I still remember them very well though. :) Can you get anything out of it? Thank you very much. Update 12/09/2012 n.2: I followed the suggestion by MadHatter in the comments. From inside the firewall, this is what I get: user@ubuntu-mantis:~$ openssl s_client -connect <customer's IP>:443 CONNECTED(00000003) If I now type GET / the output pauses for several seconds and then I get: write:errno=104 I'm going to try the same, but bypassing the firewall, as soon as I can. Thanks. Update 12/09/2012 n.3: So, I think ISA Server is altering the results of my tests... I tried installing Wireshark directly on the firewall and monitoring the packets on the Extranet network card. When the destination is the customer's IP, whatever service I try to connect to (HTTPS, RDP or SAProuter), I can only see outbound packets and no response packets whatsoever from their side. It looks like ISA Server is "faking" the remote server's replies, that's why I get a connection using telnet or the openSSL client. This is the wireshark trace from inside our LAN: But this is the trace on the Extranet network card: This makes a bit more sense... I'll send this info to the customer's tech and see if he can make anything out of it. Thanks to all that took the time to read my question and post suggestions. I'll update this post again.

    Read the article

  • Website deployment - managing uploaded content?

    - by Legion
    I'm a programmer by trade, "server administrator" by company necessity. We're looking at dumping the old painful "update site by FTP upload" style of deployment. Having the webserver check out the latest code base from version control into a folder and having a "current" symlink point to the latest checkout (allowing for easily stepping back to an older version by changing the symlink) seems to be the way we want to go. But I have a question: what's a good practice for dealing with user-uploaded content? This stuff isn't in version control. I have a couple of ideas for dealing with this, but what is the smart, accepted practice?

    Read the article

  • Unable to open Infopath2007 files in Outlook 2010

    - by Amy
    Our company recently began upgrading selected users to Outlook 2010, however we all still remain on Infopath 2007. Everything seems to be working fine for our users going from Infopath 2007 to Outlook 10. Where we are running into the problem is for our users who are on Outlook 10 talking to other users that are also on Outlook 10. When any user opens an Infopath file from a shared site, completes and submits it, and then choses to reply to it, our Outlook 10 folks can not open the emails. They pop open for just a second and close down. It also appears in their email list with a different icon. Any ideas on how to get our Outlook 2010 users to see all of their infopath emails?

    Read the article

  • Are there videocamera which geotag individual frames?

    - by Grzegorz Adam Hankiewicz
    I'm looking for a way to record live video with the specific requirement of having each frame georeferenced with GPS. Right now I'm using a normal video camera with a PDA+GPS that records the position, but it's difficult to sync both of these plus sometimes I've forgotten to turn the PDA+GPS or it has failed for some reason and all my video has been useless. Using google I found that about two years ago a company named Seero produced such video cameras and software, but apparently the domain doesn't exist any more and I only find references of other pages mentioning it. Does somebody know of any other product? I need to record this video in HD and have some way to export to Google Maps or other GIS software the positions of the frames in a way that I can click on the map and see what was being recorded in the video at that point. The precission of the GPS tracking is good enough as one position per second, intermediate frames of the video stream can be interpolated.

    Read the article

  • sendmail is using return-path instead of from address

    - by magd1
    I have a customer that is complaining about emails marked as spam. I'm looking at the header. It shows the correct From: [email protected] However, it doesn't like the return-path. Return-Path: <[email protected]> Received-SPF: neutral (google.com: x.x.x.x is neither permitted nor denied by domain of [email protected]) client-ip=x.x.x.x; Authentication-Results: mx.google.com; spf=neutral (google.com: x.x.x.x is neither permitted nor denied by domain of [email protected]) [email protected] How do I configure sendmail to use the From address for the Return-Path?

    Read the article

  • My DNS cannot resolve an web site address?

    - by ipkiss
    Hello all, Recently, I could not access the webpage bbc.co.uk anymore, while I can access other websites smoothly. Ar first, I though there may be some problem with my laptop. However, if I use my laptop through my company network, I can load the page bbc.co.uk normally. Then, I though maybe my ADSL at home blocks that web address. However, I tried another laptop with my home ADSL and it can load the page bbc.co.uk very fast. Now I do not know what could be the problem. Can anyone tell me please? Thank you.

    Read the article

  • Most suitable high availability solution

    - by Alex Bagnolini
    My company is hosting a website in a server with IIS, SQL Server and a 3rd party windows service (written in C#, source code available for amendments). We bought a new identical server, composed by: 1x Quad Core, 12GB RAM, 4x160GB SATA Raid 5, Windows Server 2008 R2 Datacenter, Public IP. We aim to put all webpages and the 3rd party windows service in an high-availability state. After some lab-testing on how to configure Failover Clustering and Hyper-V, we have deep doubts on what the "best" solution would be, by "best" meaning maintainable and able to correctly handle a physical server failure. Any suggestion on how we should configure the two servers? We don't need all the configuration's step, just an hint on the right direction to follow.

    Read the article

  • DNS record question

    - by Just plain me
    So I have two Windows domains/seperate forests. One forest consist of what is left of the bought-out company's domain. They have 5 servers that still have important data and need to be worked with on a daily basis by a large group of employees. We have a forest level trust setup to ease file access. We manually create DNS A records for the 5 servers so their short names would resolve to the IP addresses. I need the FQDN to resolve though. Should I create CName records to achieve this? I hope this question makes sense, I am learning DNS on the fly... :)

    Read the article

  • Aironet 1130AG and WPA (not WPA2)

    - by DrZaiusApeLord
    Is it possible to enable this WAP to do WPA1? I've played with all sort of settings, but no matter what I set it to, it does WPA2. Even if I choose TKIP as the cipher. I need WPA for compatibility reasons. I'm running 12.3(7)JA1 firmware. Any advice would be greatly appreciated! I'm trying to get this company away from WEP, but WPA2 offers too many problems with their visitors (XP SP2 clients need to install patch, etc). I'll probably add a radius while I'm at it, but would love to get WPA + AES going. Or at least WPA + TKIP.

    Read the article

  • How to fix Windows 7 always delete file permanently

    - by Allen
    I am using a laptop from my company, installed with Windows 7. I found that I cannot delete the files to Recycle Bin. The files will always deleted permanently without going to the Recycle Bin. I am sure that the setting of the Recycle Bin is not "Remove files immediately when deleted". Then, I checked that, deleting files work fine in other drives, but only C: does not work. Besides that, C:\$RECYCLE.BIN is missing, but D: and E: have the $RECYCLE.BIN. I think that is why there is no problem other drives to use Recycle Bin. Please help.

    Read the article

  • Specific IP routing for VPN

    - by Roy
    Is there a way that I can prevent an entire subnet from using internal routing. The VPN server is supposed to be a way to access the company's intranet websites for some people, while for others it is supposed to do routing to the outside only and therefore not having access to any internal websites. The VPN server has a DNS on the actual server but not all should be using this DNS. Some of the users should be directly sent out of the server to the internet. Example: 10.0.0.1 is the DNS on the server, gateway for the VPN 10.0.0.2 is a user (A) on the VPN having access to the intranet websites (subnet is 10.0.0.0/25) 10.0.0.192 is a user (B) only needing routing and no access to intranet websites (subnet is 10.0.0.192/26) All traffic of user B should be directly rerouted out of the server. I have tried several iptables but without success.

    Read the article

  • Is it possible to use Sharepoint 2007 without installing it?

    - by foxtrot
    Hi there! My company wants to buy Sharepoint 2007 and they asked me if I could give an opinion. I've saw already a lot of videos and read e-books but would like to use it for a while, specially the integration with Sharepoint Designer 2007. The only way to do that is installing it on a trial basis? Is there any other way? Any available public installation? I only have an old 32-bit laptop with Windows XP. Thanks in advance!

    Read the article

  • zip password crack possible?

    - by tm1rbrt
    I have a piece of software i have to install on company laptops. The installer needs a serial to work properly, but i don't have it (my manager isn't here so i cant ask him). The installer tells me to ring a phone number which doesnt appear to be connected anymore. I would download win32dasm and ollydbg and have a go at cracking the installer but i dont really have time and i havnt done it in years. There is a zip file on the disc that looks like it contains all the program files but it is passworded. Is it feasible to crack this or will it take ages?

    Read the article

  • Picture syncing on Multiple Macs, iPhones, and iPad together so each device can update them all

    - by cohortq
    Hello! One of the owners of my company has put me to task to sync his pictures between the following devices together. (2) iPhones (2) iMacs (1) Macbook Air (1) iPad Here is what is happening 1) He has a camera that can upload pictures into iPhoto in either (1) of his iMacs, or Macbook Air. 2) He has (2) different iPhones. And here are how they are paired up iPhone - iMac Home iPhone - Macbook Air 3) He has MobileMe syncing Calendar, Contacts, and Notes across all devices 4) Currently we are using MobileMe web galleries to sync all photos, by having ME create each album and upload them to the MobileMe web gallery. Not the problem is. He wants to just take pictures, and once he does that it syncs with all his devices, he'll even dock the iPad. Is there a better way to sync photos between all devices?

    Read the article

  • I'm looking for a monitor tool to test Jitter, ICMP, Traceroute and other network issues

    - by Elad Dotan
    I'm looking for a monitor tool to test Jitter, ICMP, Traceroute and other network issues. it could be an application I run from my company Network in NY and London or a SAAS service that have a service that can do it for me. I have a problem in my Data Center that I would like to fix. it happens in different times of the day. I want to run the monitor for few days and save the results so we can analyze them. any idea? Thanks!! Elad.

    Read the article

  • Tracking Unique site Views for 2012 - Not my website

    - by user580950
    I am in trouble. I placed and advt on a website in 2012 which said he has 950,000 unique visits each month so early in 2012 i advertised with them. The advertised didn't worked out so checked in 2-3 months time and i saw that the unique visitors on their site was 8,000 at that time.I immediately close the account I dont remember which site i was checking the unique visitors.That advt company has filed a dispute against me. So is there any tool that give me stats of 2012 of any website. i tried google trends but it doesnt show statistics ..

    Read the article

  • Internet Connectivity Issue

    - by MastaChief11
    Lately, I have been having issues connecting to the internet on one of my computers. The computer I am using now, however, is on the same network as the computer I am posting from. The issues seemed to randomly start about 2 days ago, and the only thing that seemed to fix the issue was to connect to Hotspot Shield VPN. I do not get any yellow warning signs by the Wi-Fi icon in the taskbar. I am sometimes able to use Google search, but I can never go to a website. I am also not able to re-install Hotspot Shield or update Flash because they have to connect to their company's servers. I have tried other VPN services just to see if it would fix anything, but as I expected, nothing changed. I am unsure of how I can fix the issue, and I appreciate all help given. I am running Windows 7 64 Bit Pro on a custom-built computer. Thanks.

    Read the article

  • Web App Server hardware question. Which configuration?

    - by JBeckton
    I am pricing some new servers and I am not sure which configuration to get. The server will be running several web applications for our company. Some of them are ASP.Net sites and some are ColdFusion. The OS will be Win Server 2008 Web or Standard Edition. Do I need 2 processors or will a single quad core handle it? Xeon multi core Hyperthreading or non Hyperthreading? I am going 64bit so I can go higher than 4 Gigs of Ram. I am shopping at Dell and there are so many options, I want to get the most bang for my buck without going over budget and I also don't want the machine to be mostly under utilized.

    Read the article

  • redirect all youtube video requests to a specific one

    - by iTayb
    I'm on an IT team in my company and I would like to block youtube to users. I don't want to just deny access to the whole youtube domain, but only to replace the .flv/.mp4 request with the one that I want. That way, if someone tries to watch youtube videos on the network, He'll get a video of why using our expensive bandwidth for pleasure is a no-no. I thought about using a packet manipulation program and just replace the video ID with something that I want, but I didn't manage to do it right.

    Read the article

  • How to get old DLL's running on 64bit server

    - by quakkels
    Hello all, I'm moving my company's websites from a windows 2003x86 server to windows 2008x64 which is running IIS 7.5. The problem that I've got is that all the DLL's which were running fine on the old server, now error out whenever they're called. All I get is a generic error like: Server object error 'ASP 0177 : 800401f3' Server.CreateObject Failed /folder/scriptname.asp, line 24 800401f3 The line that errors is: '23 lines of comments set A0SQL_DATA = server.createobject("olddllname.Data") 'the rest of the script I already have that site running in an App Pool that is set to 32bit mode. But, I get the error anyway. Has anyone experienced this? I'm frusterated because all the info I look up says that all I need to do is set the app pool to run in 32bit mode. I did that and It's still not working. What else could I check?

    Read the article

  • How to integrate Windows Server 2008 R2's NPS with Cisco switches?

    - by Massimo
    I need to evaluate in a lab environment the use of Windows Server 2008 R2's NPS for 802.1x authentication with Cisco Catalyst 3750 switches; the general idea is to only let clients connect to the company network if they can provide valid domain logon credentials, placing them in a restricted VLAN instead if they can't. NAP would also be a bonus, but it can be evaluated later; the main point now is only 802.1x authentication. Although I have very good knowledge of Windows and Active Directory (on the Microsoft side) and quite good knowledge of Catalyst switches (on the Cisco side), I'm totally new to 802.1x; I'd really like some general guidelines and help here, and some sort of implementation guide would also be very useful.

    Read the article

  • SLA Violations - Compensation expectations and vague contracts

    - by llllxllll
    Tagging this as cautionary tale. I took over for an admin a year and a half ago, and reviewed the 3 year contract with our ISP. There were no specific SLA promises in the contract that I found, and have been meaning to review the contract with our rep. Of course, we had an outage this past week that resulted in almost four days of downtime !!!!! This involves eff-ups of epic proportions on our ISP's part and a telco they colocate with. Details can be provided. I am the network / systems / purchasing / and helpdesk at my company...and am willing to fight with the ISP. I also have more management that can get involved, including the name on the contract. First, if there are not concrete guarantees about compensation and downtime, we are screwed right? Two, if we want out of our contract, does anyone have experience going the legal route, and if so, who knows a lawyer? =)

    Read the article

  • Mystery "users" email group

    - by dangowans
    This morning, our entire company received a spam message sent to [email protected], where "ourdomain.on.ca" is our actual domain. There is a distinguished name that this could correspond to: CN=Users,DC=ourdomain,DC=on,DC=ca Looking at the attributes though, there is no mail, no proxyAddresses, no signs that there is a mailbox configured there. I did some LDAP queries, searching for: (proxyAddresses=smtp:[email protected]) ([email protected]) But am not seeing any records. (I also search for known email addresses to ensure the tree was being searched properly.) We are running Exchange 2003. Is there another place to look for group email addresses? Is it possible that the distinguished name is being automatically translated to an email address?

    Read the article

< Previous Page | 348 349 350 351 352 353 354 355 356 357 358 359  | Next Page >