Search Results

Search found 22716 results on 909 pages for 'network architecture'.

Page 546/909 | < Previous Page | 542 543 544 545 546 547 548 549 550 551 552 553  | Next Page >

  • IIS 7 Web service access

    - by Aharon Manne
    I am trying to debug a simple web service. I have IIS 7 installed on my development machine (Windows 7), and have installed the web service. I can access it from my development machine, but not from any other machine in the local network.I opened the firewall to HTTP access, and I can access the default website from other machines, so it is not the firewall.What security settings should I look at to try to allow devices on the LAN to access the web service?

    Read the article

  • Free or very Cheap VPN server software with high concurrent users count

    - by Martin KS
    I'm hoping to implement a VPN whereby about 200 concurrent users can log in to briefly access my network. I had a look at OpenVPN and this seemed excellent, but was hoping that there would be a less costly option on a per-concurrent-user basis. I've no need for particularly strong security, and my only other requirement is that I would need to be able to add users in bulk via csv or similar. Does anyone have any suggestions?

    Read the article

  • Install anonymous proxy on Ubuntu

    - by jack
    How to install an anonymous proxy in Ubuntu 9.10 server which listens on every public network ethernet interfaces? I have other service like Nginx, MySQL running on that server so I hope the proxy server wont conflict with them.

    Read the article

  • Sharing an internet connection via crossover capable without changing IP settings

    - by jhioj
    I have a home wireless network and two laptops. My primary laptop is normal, and runs Windows 7. My secondary laptop has no wireless capability, and I have no access to the IP settings on my account. How can I access the internet on my secondary computer through my primary computer using a crossover cable or something similar? In other words, how can I make my primary computer produce a connection that my secondary computer will find indistinguishable from normal ethernet?

    Read the article

  • Untraceable malicious browser calls

    - by MaximusOMaximus
    I installed Fiddler 4 Beta to do some HTTP tracing. I found a lot of calls being made to sites like : facebook, collegehumor and a bunch of other sites I've never visited. Could not trace what/who is initiating these calls as I do not see any Windows Processes. No one else is connected to my network. I use both Google Chrome and IE10 on a Windows 7 box. Please help me tracing and removing these malicious HTTP calls.

    Read the article

  • AD logon script, how to...

    - by allenskd
    I'm a student, I have this assignment where I need to know how to disable the user from changing the background to a client computer, thing is that I've been looking around to know what language does the logon script use, any site with handy information, tried googling but I really can't find anything useful, don't know if I'm googling the right terms All I've found for now is a lot of tutorials about mapping network drives and so on

    Read the article

  • Change Computer Icon?

    - by Ullallulloo
    After finding out adding an autorun on a flash drive to change the icon to actually look like your flash drive, then after finding out that it'd work for Hard Drives too, I started to wonder if you could change your whole computer's icon so other computers on your network could actually see your physical computer. I doubt that there's a way to do this, but if there is, it'd be pretty cool. :D

    Read the article

  • a couple of questions about proxy server,vpn & how they works

    - by Q8Y
    I have a couple of questions that are related to security. Correct me if i'm wrong :) If I want to request something (ex: visiting www.google.com): my computer will request that then it will to the ISP then to my ISP proxy server that will take the request and act as a middle man in this situation ask for the site (www.google.com) and retrieve it then the proxy will send it back to me. I know that its being done like that. So, my question is that, in this situation my ISP knows everything and what I did request, and the proxy server is set by default (when I ask for an internet subscription). So, if I use here another proxy (lets assume that is a highly anonymous and my ISP can't detect my IP address from it), would I visit my ISP and then from my ISP it will redirect me to the new proxy server that I provide? Will it know that there is someone using another proxy? Or will it go to another network rather than my ISP? Because I didn't get the view clearly. This question is related to the first one. When I use a VPN, I know that VPN provides for me a tunneling, encryption and much more features that a proxy can't. So my data is travelling securely and my ISP can't know what I'm doing. But my questions are: From where is the tunneling started? Does it start after I visit the ISP network (since they are the one that are responsible for forwarding my data and requests)? If so, then not all my connection is tunneled in this way, there is a part that is not being tunneled. Since, every time I need to do anything I have to go to my ISP and ask to do that. Correct me if I misunderstand this. I know that VPN can let my computer be virtually in another place and access its resources (ex: be like in my office while I'm in my home. This is done via VPN). If I use a VPN service provider so that I can access the internet securely and without being monitored by my ISP. In this case, where is my encrypted data saved? Is it saved in my ISP or in the VPN service provider? If I use a VPN, does anyone on the internet know what I'm doing or who I am? Even the VPN service provider? Can they know me? I think they should know the person that is asking for this VPN service, am I right?

    Read the article

  • How to publish an intranet website on Vista 32 & IIS7

    - by user16011
    I am creating an intranet website on a Vista 32 machine with IIS7. On my machine it works great! However, when other users on our network try to connect to it they get an error saying "Oops! Internet Explorer could not connect to computername". Perhaps this is because the NTFS and/or IIS permissions are not set correctly. How do I set the permissions to publish a website on the intranet? Thanks in advance, Dan

    Read the article

  • dhcpd: How to tell how many leases are available?

    - by Jakobud
    I'm a little bit new to dhcpd. I'm trying to figure out how many leases we have available on our network. The /var/lib/dhcpd/dhcpd.leases file appears to show almost a history of leases and some of the current leases. Not sure if that really helps me or not... I figured there might be a command or something I'm unaware of that can tell me how many leases are left.

    Read the article

  • convert home phone wiring to Ethernet

    - by aaa
    can i convert phone wiring in walls to act as only Ethernet network cause the phone wiring is not in use and not connected to the phone company so there is no voltage in the wires i remove the wall plate and i find 6 wires blue,blue/white,green,green/white,orange,orange/white , and i know that Ethernet use 8 here is what i am thinking get Ethernet cable cut it in half and attach wires from wall to the first computer and the same with the other computer so if this is possible do i just attach wires in the same color and ignore brown wire or do i have to rearrange wires , and how much the speed will be thank you in advance

    Read the article

  • Forward RDP Connection from Server to Client

    - by Theveloper
    What I'm trying to achieve is in the following infrastructure: Server A running ADDS, DNS, DHCP, NPS LAN -Computer Client I -Computer Client II Server A NIC 1 goes to LAN Server A NIC 2 goes to Internet Server A provides DHCP and Internet access for Computer Clients How do I connect to Computer Client I or II through RDP from outside the network? Even when using credentials from Computer Client I (which are not in ADDS) the connection still only goes to the server.

    Read the article

  • How can I automatically require a password when connecting to a WD MyBookLive?

    - by user-123
    I have created a user which has specific privileges to access the shares on our WD MyBookLive Network drive (ie it requires a password to connect), however after connecting once Windows seems to remember the password (or at least for the rest of the session). How can I make it so it is necessary to require a password every time the user connects to the drive or makes some change on Windows? I am particularly thinking of Cryptolocker and other variants of "ransomeware" which will try and connect to the drive and encrypt it.

    Read the article

  • Different Ip adress range from provider

    - by victor
    I have different ip-range on the network, the dhcp is from the bordaband that says it uses different iprange as balancednetwork. however this causes issue as my nas and other computer gets the otner iprange of 84 and some computer gets iprange start at 94.254. i have use netgear switches gs108v2 but still get the issue with different ip adress. would apriciate answer on how i can get all devies on the same ip-range thanks

    Read the article

  • DNS server setting resets on reboot

    - by Vaibhav Bajpai
    I recently changed my physical location, and had to change my DNS server setting in network preferences. However my Mac reverts back to original DNS server IP address on each reboot and I have to manually change it everytime. How can I make my changes persist on reboot? I am running Snow Leopard 10.6.7 UPDATE This is has started to occur since the time I restored my entire system from TM backup.

    Read the article

  • convert home phone wiring to Ethernet

    - by aaa
    can i convert phone wiring in walls to act as only Ethernet network cause the phone wiring is not in use and not connected to the phone company so there is no voltage in the wires i remove the wall plate and i find 6 wires blue,blue/white,green,green/white,orange,orange/white , and i know that Ethernet use 8 here is what i am thinking get Ethernet cable cut it in half and attach wires from wall to the first computer and the same with the other computer so if this is possible do i just attach wires in the same color and ignore brown wire or do i have to rearrange wires , and how much the speed will be thank you in advance

    Read the article

  • Directly printing to remote CUPS/IPP server on Snow Leopard

    - by Martin v. Löwis
    I need to use Kerberos authentication when printing from my OSX machine, however, the machine itself does not have a service account in active directory, so the KDC will not issue a delegation ticket for the local CUPS installation. I think printing could work if the printing framework would directly print to the network CUPS server (or even to the Windows print server), bypassing the local CUPS. Is it possible to setup printing so that it directly accesses the remote print server? (asking for a service ticket for that server would succeed)

    Read the article

  • IPTABLES route, redirect, forwardc traffic

    - by Anthony
    I am trying to redirect traffic from one IP reached on a specific port to a website. For example I have two external ips, lets say 194.145.63.1 and 194.145.63.2 set on one network card as 194.145.63.1 - eth0 and 194.145.63.2 -eth0:1 mywebsite.com allows access only from 194.145.63.1 and I want to set my rules like if I hit http://194.145.63.2:8080 to open mywebsite.com trough 194.145.63.1. Thanks in advance!

    Read the article

  • Hosted file is downloaded damaged by IE

    - by victor hugo
    I have a ZIP file hosted via Apache with Akamai as CDN, the problem is when trying to download it with IE (and just IE) it is damaged and I'm unable to open it. Since the problem occurs in other computers in different locations I've discarded network settings (firewall, proxy, etc). I don't even know where start to look? What would be a possible cause for this to happen? UPDATE I'm trying to solve the problem in the server (or CDN), I've verified it's not a client error

    Read the article

  • Startup Folder, HKCU/.../Run, HKLM/.../Run. Where Else to Look to Track Down a Mysterious Login Even

    - by Bob Kaufman
    Starting around the time I installed the Office 2010 Beta, Whenever I login, Windows tries to open a file named "Bob", coincidentally the first part of my username. Selecting Notepad to open it, and it contains TCP/IP network settings. I've looked for and deleted unrecognized entries in my StartUp folder, in HKLM/.../CurrentVersion/Run and in HKCU/.../CurrentVersion/Run with no luck. Is there any other place I should be looking for errant entries?

    Read the article

< Previous Page | 542 543 544 545 546 547 548 549 550 551 552 553  | Next Page >