Search Results

Search found 5277 results on 212 pages for 'office suites'.

Page 134/212 | < Previous Page | 130 131 132 133 134 135 136 137 138 139 140 141  | Next Page >

  • Installing Windows 7 destroyed my dual boot setup

    - by ped
    I have a laptop on which I have two drives with separate Windows XP installs, one barebones for music production, the other "normal" Windows XP with Office etc. (unfortunately the bios won't give a boot disk choice). Normally I would be presented with two Windows XPs on booting. Selecting the second one would get me into the "normal" installation on disk 1 (C:). Selecting the first in boot order would give me D:\ (disk 2) with the barebones XP. However, I installed Windows 7 Home onto disk 1 (C:), but there were no dual boot options anymore, even though I installed DualBoot Pro and added Windows XP disk D:. The options now show up, but selecting Windows XP just turns into a reboot back to where I started.

    Read the article

  • active directory servers synchronization

    - by Mit Naik
    I have 3 AD servers with windows server 2008 R2 at 3 different places, main server is at datacenter and 2 are in our local office which are at 2 different place. I want to synchornize all the 3 server together, were datacenter server should be central server and rest 2 servers should synch with the datacenter server. Please provide us the steps or tutorial to do this. Also we want that once the changes are done in 1 of the AD server the changes are automatically done in all the servers. For example if I change the password of user in our local server it should be updated in our main AD server and other branch server too. Please provide us the steps or tutorial to do this asap. I have one more question I have already created main datacenter AD as domain.local and other domains as xyz.local and abc.local, how can I replicate the additional AD domains with main datacenter DC, also do we require VPN connection, is there any other way to replicate the servers without using VPN connection?

    Read the article

  • Connecting Small business network to Azure Site to Site VPN

    - by MarkKGreenway
    Would like to have connectivity between azure virtual machines and on LAN users. My current network has a Cisco ISA550 connected to the WAN (one Ethernet cable into the office the fiber transceiver is on a different floor)and any public servers can be one-to one NAT-ed to have a public and private IP. What is the best way to get a reliable connection. Between end users and the cloud? I want to know the preferred on site endpoint. Do the azure vm's have to have a local ip in the LAN subnet? (Right now 10.10.0.0/20 or 255.255.240.0 to give room if this is the case). If in purchased an asa550 would I put it behind or in front of the isa550. Would it be ahead or peer with the users switches? What is the best way to get a reliable connection. Between end users and the cloud servers?

    Read the article

  • Two identical fiber optic broadband lines working as one

    - by Katafalkas
    I have been trying to find an answer to this, but all I can find is hobbyists trying to connect their Linksys devices to get some magic out of them. I am looking for a way I could combine two 100Mbit fiber optic lines into a single connection for our office. I assume it involves some Cisco learning or something similar. Do I need to configure some big router to load-balance the NATing in some way? I assume that many of you have done something similar and hope someone could share their knowledge or at least provide me some tips on how to do this.

    Read the article

  • Bandwidth Control on our Internet Connection

    - by AlamedaDad
    Hi all, I have Covad dual/bonded T1 service in our office coming through a Cisco 1841 and then through a Sonicwall 3060Pro/Enhanced SW firewall. The problem I'm looking for some input on is how to limit the amount of bandwidth any single user/PC can user for downloading a file from the Internet. It's become an issue that when one person happens to download let's say an ~300MB file, normal internet access for the other employees slows to a crawl. I've seen through MRTG that in fact usage of the circuit jumps to the full 3mb for the duration of the download and then drops. Is it possible to control this? I'm not familiar with QOS or the like so I'm not sure. Any help on this would be appreciated. Thanks...Michael

    Read the article

  • How to keep Flash secured with EMET?

    - by Indrek
    I use EMET to secure a number of applications on my computer - web browsers, Office suite applications, PDF readers, as well as Adobe Flash. Overall it's working great, except that the Flash executables contain the version number in the file name, so every time there's an update, the file names change and I have to remember to re-add them manually to EMET. Is there a way to streamline this process? EMET does support wildcards, but only in the path itself, not the file name, so something like %windir%\system32\Macromed\Flash\*.exe wouldn't work. Is there any other way to add a whole folder to EMET so that any new executables in that folder are automatically secured?

    Read the article

  • Bridging VirtualBox over OpenVPN TAC adapter on Windows

    - by Sean Edwards
    I'm trying to configure a virtual machine (VirtualBox guest running Backtrack 4) with a bridged adapter over a VPN connection. The VPN is is hosted by the cybersecurity club at my university, and connects to a sandboxed LAN designed for penetration testing against various servers that the club has built. My host (Windows 7 Ultimate) connects to the VPN fine and is assigned an IP through DHCP, but for some reason the VM can't do the same thing, and I'm not sure why. It's like OpenVPN is filtering out packets from the MAC address it doesn't recognize. I want the virtual machine to bridge over the VPN connection, because our IT office has very strict policies about what you can and can't do on the network. I want to be able to run active attacks (ARP spoofing, nmap, Nessus scans) in the sandbox environment without risking the traffic accidentally going over the university network and getting my internet access revoked. Bridging over the VPN connection and running all attacks from inside the VM would solve that problem. Any idea why the host can use this interface, but the VM can't?

    Read the article

  • SOHO Netflix and network security

    - by TW
    I want to use WIFI for HiDef video, but I don't trust it for my office PC's. I've heard of VLANs but I have no idea how to set it up or what (SOHO) hardware to buy. Other than getting 2 different DSL lines, how can I be absolutely sure that the PC side doesn't get hacked? What if I want to use MS Home server as a backup device for both sides? Can I make it "read only" for the PC side, and physically change the cable if I need to restore? TW

    Read the article

  • Monitor HTTP usage on network from Linux free

    - by David
    I manage a small office network. I am looking to start monitoring/logging internet usage (website requests) for each user on a small network. All the windows clients are running through a switch to a BT router. I also have a linux (centos) machine which is connected as a client to the BT router as well. Is there any free software I can install on the linux box (or my own machine) to allow me to log and monitor websites requested by users kind of like browser history. Ideally, something that would collect each client's browser history in 1 place. Thanks

    Read the article

  • Run a batch file silently, executed at remote desktop login

    - by ILMV
    In our office we are using Linux thin client machines, they work very well except the lack of IE, which is a pain because the corporations we deal with are too stupid to update their web apps (no flame wars please). To solve this problem we have machine in our computer room which users remote desktop into to access internet explorer, this is achieved by running a batch script which opens IE and when it closes logs them off, this setup works well for us. Even though I have @echo off and the cmd window isn't displaying anything, I would really like that batch file to be executed silently, so the cmd window doesn't appear at all. Is this possible? The Ubuntu terminal server client has an option to launch a file / app at login, is there a command I can use to run this batch silently. I have tried these: C:\my_batch.bat /NOCONSOLE C:\my_batch.bat /NOWINDOW C:\my_batch.bat /B C:\my_batch.bat /Q ...with no success, perhaps it's the way I am doing it? Cheers :-) Edit The remote desktop platform is a Windows XP machine, nothing entirely special but not a Windows Server setup.

    Read the article

  • Client outlook account deleted on client system, Need to recover e-mails that are on server back cli

    - by chris
    Hello, I have 2 client compters running XP and MS office with Outlook 2007. I have a 2003 server running exchange. Clients e-mail account was removed on clients computer. But the e-mails are still on server as I see the mailbox with approx 14k of mail How do I restore the e-mail account on clients and retrieve the e-mail from server. I did not set up the outlook or exchange, so I do not know the e-mail settings. Any help? Chris

    Read the article

  • IE8 Windows 7 (64bit) security certificate problem

    - by Steve
    Hi, We have just received some new computers for use in the office (Dell Vostro). They seem to work fine in the main. When we use IE8 to go to some web pages such as yahoo mail it tells us: “There is a problem with this websites security certificate” If we have a look at the details it says: “This certificate cannot be verified up to a trusted certification authority” This however works correctly in Firefox. I don't understand why I should get such an error message, should this not just work? I don't think its anything to do with the certificate itself as this is happening on www.yahoo.co.uk and other commercial (amazon I think?) sites. I think there is something off with the PCs setup. The PC has Windows 7 (64 bit) and Norton Internet Security installed. Any ideas as to why this is happening? Thanks

    Read the article

  • RTF File Opens as Read Only from Document Management System (Does not happen for all users)

    - by Dave
    We have a third party system in place that as one part of its duties hosts RTF files that a user can open, make changes to, and save back into the document management system. Recently we have begun upgrading users to Office 2007 from 2003. We are now hearing that when some users open these documents, they open as Read Only (even though there is no document protection in place and the files are set for Unrestricted Access). Other users though, who also have Word 2007, report no problems. There were no problems for anyone when Word 2003 was being used. I'm sure it's a setting in Word but I'm having a lot of difficulty in identifying where the issue could be. Looking for any assistance on why these RTF files are opening as Read Only for some and not for others when using Word 2007. Thanks! Dave

    Read the article

  • Reading PFS First Choice and Word Perfect 5 files in an XP or Windows 98 environment

    - by indyK1ng
    Hello all, My priest has 3 computers, Windows 3.1, Windows 98 and Windows XP. Recently his power supply blew out on his Windows 3.1 computer and he needs to get to the data on the hard drive. He's looking into imaging the hard drive and setting it up as a VM, which might be a bit much for him. Ignoring getting the data off the hard drive as a separate problem, are there any programs out there that can read files from PFS First Choice and Word Perfect 5. He already has Microsoft Office so solutions involving that are preferable. If he can install the software on his Windows XP or 98 computer, that would be helpful too. Thank you for your help

    Read the article

  • How good is PDF password protection?

    - by Tim
    It appears that Word's password protection is not really good, at least until Office 2003, if I read this SU entry correctly. I'm under the impression that Acrobat's PDF password protection should be better (it says 128-bit AES for Acrobat 7 and higher). Is that true? Of course, it depends on the strength of the password used, but assuming I protect my PDF with a password like sd8Jf+*e8fh§$fd8sHä, am I on the safe side? Like, say, for sending confidential patient information - not really valuable, but potentially highly sensitive.

    Read the article

  • Outlook 2003 (with Exchange 2007) error: You cannot respond to a meeting without an Organizer

    - by Hissohathair
    The company recently upgraded to Exchange 2007. Since the upgrade users who are still on Outlook 2003 (SP3) get the following error for some meeting requests: You cannot respond to a meeting without an organizer. You must add an Organizer field to the item. The item has an organizer field filled in. Exchange is 2007 with SP1 MS Office (incl Outlook) is 2003 with SP3 Some users are using iPhones to accept / reject meetings. The iPhones never get an error like this. There are no delegates for the user attempting to accept or reject the meeting. Sometimes the meeting was previously accepted, sometimes not. We have not detected a pattern in the meeting requests that trigger the issue. I've found a few people asking the same question on other websites but no answers. Experts Exchange claims to have an answer but from looking at the discussion at the bottom of the page I'm pretty sure they don't.

    Read the article

  • Additional mailboxes in Outlook 07 SP2

    - by Nick
    I have had my Outlook 2007 open additional mailboxes via the advanced account settings. After updating to Office SP2, the list of emails in the additional account still displays, but I get a message for each mailbox item: This item cannot be displayed in the Reading Pane. Open the item to read its contents. After double clicking the message, I get a small error box which displays just Cannot open this item. Unknown Error. Also, if I try to re-add the mailbox in the Advanced tab of my account settings, I get an error message The name cannot be resolved. The connection to Microsoft Exchange is unavailable. Outlook must be online or connected to complete this action. However, the status bar indicates Online with Microsoft Exchange, and I can both send and receive emails from my primary account. What could be going wrong?

    Read the article

  • IT Asset Management

    - by CogitoErgoSum
    Our company has grown quite quickly and I am facing new tasks which I did not think I'd need to deal with. Recently we've come ot a point where we have 100+ Devices (Routers, Bridges, Computers, Laptops, VOIP Phones etc). The other day I was quite frightened when I asked for an inventory and no one had one. I want to start tagging all equipment and recording serials to begin tracking our inventory and ensuring we have a proper record of what equipment we have. Does anyone have advice as to how to go about 1. Convincing the higher ups why we need to do this and 2. What software or strategies might work? Keep in mind this is not for furniture, office equipment etc but IT specific equipment. I'm concerned over people 1. Stealing the physical devices and 2. Losing track of configuration data etc in case we'd need to do a wipe and restore

    Read the article

  • What's the strategy to implement a "knowledge base" in my company. [closed]

    - by Oscar Reyes
    In my current work we think we can get benefit from having a knowledge base, so the next time someone has a question/problem etc, that base can be consulted and an answer will show up. Also, it will reduce the risk from having people leaving the company with the knowledge and we would have to start all over again. My question is, what strategy can we follow to implement/buy/get/build/etc this knowledge base? Are there software ready for this? Would it be better to have something build by ourselves ( we have some programmers ) This is an small company ( < 30 ) and the base should be accessible from outside the office ( when the employees are with the customer etc.) so I guess a webapp is in order.

    Read the article

  • Thinkpad CPU temperature reaches 100°C after 10 minutes of heavy use

    - by Nicolas Raoul
    Less than two years ago, I bought a Lenovo Thinkpad R500. When using the CPU heavily, it sometimes decides to reboot. I am using Linux, and a widget shows me the CPU temperature. The PC usually reboots when the temperature of the first core gets over 100°C Since I switched from Ubuntu 2010.10 32bit to Ubuntu 2011.04 64bit, it crashes much more often. I survive using these techniques: When in the office, I use a laptopcooler. When outside, I underclock to 800 MHz, by doing so it does not get too warm. QUESTION: Is it normal that a Thinkpad crashes if the CPU is at 100% for more than 10 minutes? How can I use the full power of my computer, for instance when showing CPU-hungry business intelligence tools to clients? The computer does not really feel that hot. Maybe the sensor itself is reporting wrong temperatures? Can I tell the BIOS to ignore it?

    Read the article

  • Unable to remove "Run this program as an administrator" (greyed out) with Excel 2010

    - by Sean Hu
    I have issue with one of the user in Terminal Server 2008 R2 who has "Run this program as an administrator" checked and greyed out with Excel 2010. This causes UAC to popup requesting for administrator credential whenever user want to start excel. I found in excel 2010 properties Compatibility tab "Run this program as an administrator" is checked and greyed out (Unable to make any change) This issue only occurs in Excel 2010, all other Office programs does not has this option checked and greyed out. Currently UAC is set to Default (Second level to top) Other users in terminal server do not have "Run this program as an administrator" checked and it is NOT greyed out. The user who has issue is in the same group and has the setting as other users who doesn't has the issue in AD. Could anyone advise me how could I remove this "Run this program as an administrator" in option in Excel 2010? Thank you.

    Read the article

  • mime-attachment incompatibility on forwarded messages from android to an iphone

    - by Peter Carrero
    A couple of guys got the evo android in the office. I got an iphone. When I receive a forwarded email from one of those phones, the forwarded piece comes as a mime-attachment that the iphone cannot open. I also tried this with a motorola droid and got the same result. I am not sure if the issue is the android sending the message on the wrong format or the iphone not being able to understand a mime type that it should... Has anyone experienced this, and, most importantly, found a fix/workaround? Thanks.

    Read the article

  • How to change aging AD password while connected over VPN from Mac

    - by Franek Kuciapa
    I am connecting to the office from mac via VPN, Cisco AnyConnect Secure Mobility Client. I do not know what to do when my AD password on the firm side will age and approach expiration to ensure that my Mac and VPN continue to work afterwards. Is the proper thing to do in this case to connect via VPN and then change the password on Mac via System Preferences, Users & Groups? Will this update the AD on the server side? Will it sync the PointSec as well that is running on the Mac? Or is a better procedure to RDP to a Windows box while connected over VPN and change the password there hoping the Mac will somehow sync up ?? Running Mountain Lion on the Mac.

    Read the article

  • Dialog box keeps asking for password

    - by hossam-khalili
    I am running Windows 7, Outlook 2007 (Office 2007 pro) and I'm connecting to our Exchange Server 2007 which is part of Small Business Server 2008. Outlook 2007 on one client keeps asking for the password to the remote access URL. If I simply click cancel it's OK for a few minutes. Entering the password and clicking the save PW box does no good. Sometimes clicking cancel results in another dilog box asking the same thing and I may have to click cancel several times to get it to go away for a while. Occasionally Outlook may actually go into a mode where it says it needs the password typed so I click the link which brings the dialog back but simply clicking cancel will make Outlook connect again. Can anyone help me? Thanks!

    Read the article

  • Security and Windows Login

    - by Mimisbrunnr
    I'm not entirely sure this is the right place for the is question but I cannot think of another so here goes. In order to login to the windows machines at my office one must press the almighty CTRL-ALT-DELETE command combo first. I, finding this very frustrating, decided to look into why and found claims from both my sys and Microsoft stating that it's a security feature and that "Because only windows could read the CTRL-ALT-DELETE it helped to ensure that an automated program cannot log in. Now I'm not a master of the windows operating system ( as I generally use *nix ) but I cannot believe that "Only windows can send that signal" bull. It just doesn't sit right. Is there a good reason for the CTRL-ALT-DELETE to login thing? is it something I'm missing? or is it another example of antiquated legacy security measures?

    Read the article

< Previous Page | 130 131 132 133 134 135 136 137 138 139 140 141  | Next Page >