Search Results

Search found 15415 results on 617 pages for 'security groups'.

Page 341/617 | < Previous Page | 337 338 339 340 341 342 343 344 345 346 347 348  | Next Page >

  • How Can I Map IIS on My PC with Static IP to my Domain Name?

    - by Subhen
    Hi, Now I have got an internet connection with Static Ip. I want to know How can I map my website to my Static IP(Received from ISP). I know this is not a good Idea for Security and Performance issues, But just Wanted to know as I can set up a test Project. Again, Can't I just by a domain name and map it to my Static Ip, instead of buying them from WebHosting Providers. Now I have bought the space from bizzhost and hosted my site by setting the Name Server. Thanks, Subhen

    Read the article

  • How To Send Email to Active Directory Group?

    - by BGM
    Salvete! I have two servers, one hosts my email server (hMailServer on windows server 2003) and the other hosts active directory (on windows server 2008). I don't have Microsoft Exchange. In Active directory, there are user groups that have email addresses. How can I send an email to a user group? Somewhere I need to be able to connect my mail server to active directory. Maybe AD has a mail pickup folder? I can't find the information that I need. Here is a similar link, but it didn't help me. Send As Distribution Group Email Address? (I think a tag for hMailServer would be a good idea.) Thanks for y'all's help.

    Read the article

  • How does Ubuntu keep track of the "System restart required" flag in motd?

    - by Anders Lindahl
    I have a few Ubuntu servers (8.10, 9.10) that is set to automatically install security updates. Some times these updates requires a restart of the system, and this string is shown in motd: *** System restart required *** To get a notice about these, I plan to write a Nagios test to monitor if the server is in need of a reboot. So, my question: Is there a better way than parsing /etc/motd to find out if a reboot is needed?

    Read the article

  • Grouping extensions in Asterisk

    - by Matt
    We have an asterisk based phone system with multiple clients connected to it. At the moment, all the extension numbers fall in the range 100 - 9999. But, now we have an issue where a particular customer wants to come onto our service and insists on keeping their existing extension list. Is there a way of having extensions 700 for one customer, and also the same number range to another customer. But yet having them belong to a different group? I see there is a concept of groups in asterisk but none of them seem to provide a solution to this.

    Read the article

  • "iTunes.app" to accept incoming network connections?

    - by cust0s
    Every time I open iTunes I get the the following warning: Do you want the application "iTunes.app" to accept incoming network connections? Clicking Deny may limit the application's behavior. This setting can be changed in the Firewall pane of Security preferences. I always click "Allow" but it still pops up. I set the OS X firewall to allow incoming connections for iTunes. Any suggestions on how to fix this?

    Read the article

  • greping files question

    - by tearman
    I've been using grep to run a few PII scans and while its finding results, its indeed finding too many false positives. Is there a way that I can tell grep not to trigger a match for a file unless it contains other data? For instance, can I tell it not to trigger an alert on a regex for a SSN unless the file includes text like "ssn" or "social security number"?

    Read the article

  • Accessing Internal Server from Outside through SSH

    - by myahya
    The issue is as follows: I am using Ubuntu Linux. I am working from home, and I need to access a PostgreSQL database severer within my company's network. Call the DB server X. For security reasons, only one machine can be accessed from the outside using ssh, call it Y. So the scenario is: Home <--SSH-- Y <----- X(DB) I think something like SSH forwarding (configured in .ssh/config) could help with this, but I am not sure how to do this, any ideas?

    Read the article

  • VM Build XML file fails to validate against OVF 1.0 schema

    - by siddharthgod
    For our product, we were trying to generate VM / vApp build XML from java code. For this purpose, we were using XML Beans. When we tried to generate JAVA classes for OVF envelope for 0.9 (ovf-envelope.xsd in schemas/ovf) it was successful. However these schemas does not allow us to add IPassignment section which is available in OVF 1.0. When we tried to compile 1.0 schema (ovfenv-vmware.xsd in schemas/ovf1.0.0e/vmware folder), we get validation errors. When we loaded this schema in schema editor we could see some validation errors. First error we saw was following: When we loaded ovfenv-vmware.xsd in XMLspy we could see following validation error in dsp8027.xsd - "cos-nonambig: makes the content model non-deterministic against . Possible causes: name equality, overlapping occurrence or substitution groups." Same error was also thrown by xmlbean while generating java classes from ovfenv-vmware.xsd. Is there any workaround for this problem?

    Read the article

  • Grouping extensions in Asterisk

    - by Matt H
    We have an asterisk based phone system with multiple clients connected to it. At the moment, all the extension numbers fall in the range 100 - 9999. But, now we have an issue where a particular customer wants to come onto our service and insists on keeping their existing extension list. Is there a way of having extensions 700 for one customer, and also the same number range to another customer. But yet having them belong to a different group? I see there is a concept of groups in asterisk but none of them seem to provide a solution to this.

    Read the article

  • Windows 2003 Domain controller

    - by user40766
    I have a win 2K3 domain controller that has sudddenly started logging about 60 events a second. All events are ID 538, 540 and 576 All events pertain to Security Audit of the machine itself logging in successfully. a typical entry is Event Id 540 Successful Network Logon: User Name: <machinename>$ Any pointers to how I can diagnose this? CPU and memory are normal on the machine.

    Read the article

  • Replacement for NIS/YP

    - by mdpc
    The company that I am working for is embarking on replacing the current locally developed NIS/YP structure with LDAP. We already have AD in house for the Windows stuff and would like to consider using an AD system. The AD people are quite restrictive and would not support extensive modifications. We have needs to have the replacement include the support the full capabilities of the NIS/YP suite include netgroups, login restrictions to specific servers for specific users or groups of users, consistent passwords between the *nix and Windows environment,etc. Our environment is a mixture of Linux (suse, RH, Debian), Sun, IBM, HP and MPRAS as well as a NETAPP. So whatever we use must be totally inclusive to all environment. We have looked at Likewise, but our management wants other alternatives to compare with. What other things should I be looking at and what is you assessment of the alternative? Thanks

    Read the article

  • How to I set what browser Adobe Reader uses to open links?

    - by Sindri
    I have a Windows XP computer with Chrome set as the default browser. However whenever I click a link embedded in a pdf document I'm viewing with Adobe Reader 8.2.1 I get a popup security warning asking if this is ok, and then the Reader opens the link in IE. Is there a way to change Adobe Readers default browser?

    Read the article

  • Why can't service account such as Local Service, Network Service, or Local System be managed on a domain level?

    - by smwikipedia
    Hi security experts, I read from here that: On a local computer, an administrator can configure the application to run as Local Service, Network Service, or Local System. These service accounts are simple to configure and use but are typically shared among multiple applications and services and cannot be managed on a domain level. I just don't understand why these accounts cannot be managed on a domain level, since they all have well-known SIDs? Thanks for your time.

    Read the article

  • Why is my server using so much memory?

    - by Qasim
    I haven't even set up my website on my dedicated server so I'm the only one using it at the moment. And yet this is what I see in my sys info: Full Size I just got a bunch of security softwares installed today so I'm wondering if that could be the reason. Programs like Dos deflate, CSF firewall, Mod_security, SIM, Log watch, etc. My server's details: CentOS Processor Intel Xeon CPU X3220 CPU Speed 2.39 GHz Cache Size 4.00 MB RAM 2GB DDR2

    Read the article

  • Triggering GDM login on a remote machine

    - by creator
    I have to briefly describe the situation. We are planning to make a computer classroom with workstations running Ubuntu 10.04. Since making accounts for each student has not been considered reasonable, we decided to make accounts for each student group. We don't want students to share their passwords between groups so the solution would be not to give them passwords at all, but let the teacher log them in instead. Obviously he shouldn't go from one machine to another typing in credentials by hand, so we need some script that will connect to a remote machine by ssh and make GDM (or probably any other login manager if GDM cannot serve this purpose) log in specified user. I couldn't find any solutions, as well as I haven't noticed anybody in similar situation asking for help, so my question will be: can the scheme described be realized and if yes, then how? Thanks in advance.

    Read the article

  • Why internet is said to be untrusted network?

    - by Ant's
    From wikipedia : 2 In computer security, a DMZ (sometimes referred to as a perimeter networking) is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet. Why it says larger untrusted network, usually the Internet. I see it many places that internet is said to be untrusted network. Are there any reason for it?

    Read the article

  • Exchange 2010 Discovery Search Fails

    - by ITGuy24
    When ever I run an Exchange 2010 SP1 Discovery Search I get the following error: "Search failed as the results link to the target mailbox '[email protected]' couldn't be generated." I have checked to ensure the discovery mailbox is enabled I created a new Discovery mailbox. I get the same error with both Mailboxes. The user account I am using to run the search is a member of the "Discovery Management" security group. I get the same error whether I use the Shell or the ECP to run the search

    Read the article

  • Tagging does not work with the Subversion plugin.

    - by mark
    I have exactly the same problem as the fellow from this post - http://jenkins.361315.n4.nabble.com/Tag-this-build-not-working-subversion-td384218.html, except that I use build 1.413 Unfortunately, the post does not provide any workarounds except downgrading to 1.310 (from 1.315) I would gladly provide the logs, if I knew the logger names. Please, help. P.S. I have posted this issue both on jenkins issues site - https://issues.jenkins-ci.org/browse/JENKINS-9961 and in the respective google group - https://groups.google.com/d/topic/jenkinsci-users/4UVKFxXA9Jo/overview. To no avail. So, this site is my last hope - thanks to all in advance. EDIT Upgraded to 1.417 - still tagging does nothing.

    Read the article

  • Creating user accounts in Amazon EC2

    - by Tvanover
    I am putting together a test environment using Amazon's EC2 for me and some friends to collaborate on a project. I am not a server guy but I do know my way around a bash prompt and have done some work on ubuntu before. I am using Amazon Linux AMI i386 EBS and have gotten apache and php running. Now I need to create the user accounts my friends and I will use to upload files (sftp) and work on the project (ssh). How should I go about this? Should I just use adduser and configure it like normal? Or should I use the AWS IAM groups?

    Read the article

  • Could not connect to the Virtual Server on “ ”. Access was denied.

    - by Kobojunkie
    HI. I downloaded Virtual Server R2, but when I try to create a Virtual Server from the administrative site, I get the following error message Could not connect to the Virtual Server on “MyServerName”. Access was denied. You can specify an alternate Virtual Server below. I have tried configuring DCOM security but that did not help much. Anyone have a solution please? Thanks in advance

    Read the article

  • Install MacAfee And Node32

    - by hosseinsinohe
    Hi All I Have a Computer With Windows Xp Service Pack 3 as an Operating System.This Computer is In the Network With The MacAfee Update Server.This Server Will be Install And Update MacAfee Client Version In The All Computers in The Network.When I Install And Runing 'Eset Node32 Smart Security or AntiVirus' in My Computer,The Computer will be Hang And Freeze And I Can Not Work with Computer.I Restart The Computer And Try Again And Try With Safe Mode To Fix This Problem(Unistall Node32 For Fix:-) ),But I Can Not Fix This Problem.How Can I Fix This Problem And Install Node32 And MaCAfee On This Computer 's Network?

    Read the article

  • Cisco NAT vs Bridge vs BVI

    - by cjavapro
    The only devices on this particular LAN will all have public IP addresses. Also the public IP address will be configured directly on the machine,,, so we will not translate private/public IP addresses. If we use NAT,, we would have to translate the public IP on the WAN to the public IP on the LAN. The only security feature I expect on the gateway is an access list. I don't really know much about networking, so I am sorry if this question is generic.

    Read the article

< Previous Page | 337 338 339 340 341 342 343 344 345 346 347 348  | Next Page >