Search Results

Search found 37607 results on 1505 pages for 'ms access 97'.

Page 772/1505 | < Previous Page | 768 769 770 771 772 773 774 775 776 777 778 779  | Next Page >

  • Curly braces in a URL

    - by lipton
    Often I have came across URLS like the following: http://www.isthisahacker.com/{7B643FB915-845C-4A76-A071-677D62157FE07D}.htm Do the curly braces in the URL above indicate some kind of attempt to access the registry, or is that a legitimate URL? It looks kind of suspicious to me.

    Read the article

  • How can Icheck how much data has been transfered in a particular remote computer in my LAN?

    - by oDx
    I am the system administrator. I am suspecting some unwanted data transfers in some of the computers under my lan. This also effects the overall performance of the network. Is there anyway by which i can check the transfered data over a particular interval. I am not supposed to install any applications on any other computers than mine. I have the router access. I can use tools like ettercap dsniff wireshark etc.

    Read the article

  • Certificate Authentication

    - by Steve McCall
    I am currently working on deploying a website for staff to use remotely and would like to make sure it is secure. I was thinking would it be possible to set up some kind of certificate authentication where I would generate a certificate and install it on their laptop so they could access the website? I don't really want them to generate the certificates themselves though as that could easily go wrong. How easy / possible is this and how do I go about doing it?

    Read the article

  • what would you use to run a mail server off ubuntu (8.04 or 10.04)

    - by Crash893
    I've been tasked with hosting our own inhouse mail server 1) i need to have web mail access , imap 2) it needs to be as cheap as possible i already have an ubuntu server that we use for our samba drives and so far have been very happy with it I am not apposed to building out another box for a dedicated email server but I'm not familiar enough with Linux or mail hosting programs to even know where to start.

    Read the article

  • Use mod_rewrite to force users to homepage when entering a site?

    - by scotru
    Is it possible to use mod_rewrite to force all users entering a site (either through a link from another site, or by typing a URL in the address bar) to be redirected to the homepage? From the homepage (or any page within the site), users should then be able to access other pages in the site. But all users would be forced to enter the site through the homepage. Can this be done with mod_rewrite (or without using a scripting language)?

    Read the article

  • Can you make desktop shortcuts to Seamless mode Windows apps in VirtualBox on OSX?

    - by Matt
    Running the latest version of VirtualBox on OSX and hosting a Windows virtual machine. Is there a way to put shortcuts on your Mac desktop for the Windows apps that you run in seamless mode? I can't find a way to do this, so every time I want to newly launch a Windows app in seamless mode I have to access the full Windows desktop, start the app and hit HostKey+L. Really a pain for apps that you want to run in seamless mode all time.

    Read the article

  • Firewall/Router upgrade

    - by Atlas
    We've been using a SonicWall TZ170 for several years, it's been working fine with occasional glitches. Now we switched to a 100Mpbs broadband, and the firewall has become the bottleneck for internet access because its max throughput is around 20-30Mpbs. Any ideas for a replacement? Brand/Model?

    Read the article

  • Find out how many DNS Queries/month via WHM or SSH?

    - by Kerry
    Is it possible? We have complete control over our DNS server and the server actually being pointed to. We are interested in how many DNS Queries we are currently getting, as we want to move to Ultra DNS, but we need to know how many queries we're likely to get in a month. Is this possible to figure out? Do I need to start a service before tracking begins? Or use shell to access the data?

    Read the article

  • Some web pages won't download fully

    - by Sumac
    Some web pages won't download fully under any browser on any computer connected to the network. I have Internet access through a wireless modem/router (2 Mbps DSL connection, wireless reception is excellent). I use Opera and when I turn on Opera turbo the same sites download fully. I tried changing to some other dns (opendns, google dns), but it made no difference. What would you suggest I try? OS : Windows 7 64 bit

    Read the article

  • Query exchange for sent item count by folder

    - by Rich
    I have a large Exchange server with many hundreds of thousands of emails in thousands of folders. I would like to generate a list of how many emails have been sent, by user, for a subset of the public folders. If I could run SQL against the server (can I?), I would like to run a query along the lines of: SELECT from, count(*) FROM emails WHERE email_is_in_folder_or_descendents('Public Folders/Customers/XYZ') GROUP BY from Is this possible? I have full administrator access to the server.

    Read the article

  • ldap export and import

    - by Jure1873
    Is it possible to export all the data inside openldap for example using ldapsearch or some other tool to a (ldif?) file and then import everything on another server and put this in a script that would be run every day. So that I could use the other one as a backup when the first/master server is not available? I have full access to the first/master server, but I can't modify it's configuration so I think I can't set up replication.

    Read the article

  • Limiting database security

    - by Torbal
    A number of texts signify that the most important aspects offered by a DBMS are availability, integrity and secrecy. As part of a homework assignment I have been tasked with mentioning attacks which would affect each aspect. This is what I have come up with - are they any good? Availability - DDOS attack Integrity Secrecy - SQL Injection attack Integrity - Use of trojans to gain access to objects with higher security roles

    Read the article

  • Reinstallation of Ubuntu

    - by Achuthan
    When I tried to re install Ubuntu 11.10, I wanted to erase the existing Ubuntu using gparted editor/ something else icon in Ubuntu. I found it was not detecting any existing partition. Then when I googled and used gparted editor I found it was showing unallocated space of entire hard disk space. However I am able to boot to Ubuntu normally and when I use disk utilities I am able to access and see all partitions. Please help me to solve my issue

    Read the article

  • SSH login without password prompt

    - by user477519
    I am trying to set up Opennebula. I want to set up my local host so that I can log into my remote host without having to use the password. I have followed the instructions in the "Secure Shell Access" section in the installation instructions. I can not log into my remote host from my local host, but I can log into my local host from my remote host. Not sure what's going on. Any help would be appreciated. Thanks

    Read the article

  • Best cPanel Reseller Company

    - by noorahmad
    I have a hosting company, I am using resellerpanel.com to buy domain and hosting for my clients, but I want to switch to cPanel, resellerpanel offers from 17.50$/M and hostgator.com offers 19.96$/M, I don't care about money all I care about services, live support and up time. Note: some of my clients request email only not hosting can I limit access to email mananger or hosting only with cPanel? Thanks.

    Read the article

  • Network Tracking

    - by jeswin14
    Hi all, I am having fifty workstations which are connected to a windows server 2003 server and the internet is shared from the server .My question is , am i able to implement a tracking mechanism without using any proxy server and track all the web pages which ever visited by an individual workstation connected to a network?If possible how to achieve that kind of tracking mechanism?Some workstations do open their web pages in InPrivate browsing , can we access those browsing history?

    Read the article

  • Server is sending SPAM but it's not an open relay

    - by alexandernst
    I have a problem with Dovecot + Postfix. My server is sending SPAM from the local user "dovecot", but my server is not configured as an open relay (mails can be sent without auth-ing only from localhost). Also, nobody except me, has SSH access to the server. How can I find what exactly is triggering all those SPAM mails? How can I get something like a backtrace that shows what exactly happened the moments before a SPAM email got in the queue of postfix? Regards

    Read the article

  • Network share permission issues

    - by JL
    I have an IIS server running a site, appPool is running under local system, this is done because its easier to have full permissions to certificates and other file based resources on the local server. Problem is when I try write or copy a file to a network share, permissions are obviously not in place on the remote system for the IIS server local system. Is it possible to grant permissions on the remote system to include read/write or even full access to the IIS servers local system account?

    Read the article

  • What causes "system call failed" and there are hanging ie processes?

    - by TecBrat
    System: Windows 7 Home Premium IE: 11.0.9600.17107 When I have had many, many apps and windows open, sometimes I'll try to access a folder and get a dialog that says "System Call Failed". I have found the fix for it is to open the task manager and End Process Tree on iexplore.exe and iexplore.exe *32. Often times there will be several of these even when I have closed all my browser windows. Does anyone have any experience with this error?

    Read the article

< Previous Page | 768 769 770 771 772 773 774 775 776 777 778 779  | Next Page >