Search Results

Search found 29064 results on 1163 pages for 'network management'.

Page 714/1163 | < Previous Page | 710 711 712 713 714 715 716 717 718 719 720 721  | Next Page >

  • Remote Desktop over VPN or SSH?

    - by Jonathan
    I want to provide a remote employee remote desktop into a PC in the office and am trying to decide between the following two options: Use Microsoft VPN to get him a local network IP. Use RDP to connect to host machine. Use local SSH tunneling for VPN port. Connect RDP to localhost:portNumber Is either option more secure than the other? Will either option perform better than the other? Are there any better options I've missed or considerations I should make?

    Read the article

  • Backing up my xcode projects

    - by thelearner
    What is the best way of ensuring my xcode projects are backed up. I am new to Mac and I see there is a timemachine programme, but isn't that for all files? I just want to make sure my xcode files are backed up on a network drive because this is for work not pleasure. The rest of team uses TFS and CVS etc.

    Read the article

  • How do you test a new email filtering system?

    - by Zoredache
    What method do you use to test or evaluate potential new email filtering systems before you set it up on your production network? I am particularly interested in methods that are appropriate for small/medium sized organizations with a single mail server without the resources to build a duplicate of their email system.

    Read the article

  • How to stop computer waking up from sleep when LAN connected.

    - by jmatthias
    I have a Compaq desktop machine that wakes up from sleep only when the LAN cable is connected to it. The WOL feature is DISABLED in the BIOS, so why does it keep waking up? And why is it getting told to wake up? I was under the impression that an application or service has to specifically send a message to the machine in order to wake it up but I am not aware of any software on my network that would do this.

    Read the article

  • Wiki/CMS with synchronization?

    - by Clinton Blackmore
    We're looking into putting up a wiki or CMS for internal use by our IT department. One of the big things we want to use it for is disaster recovery procedures. Given that a disaster, such as a power or network outage, might render the wiki inaccessible, it seems sensible to to host the wiki in two places so that if one is inaccessible, we can fall back to the other. Are there any wikis or CMSes that synchronize (or an alternate way to achieve a similar end)?

    Read the article

  • How do you switch between Linux manual pages?

    - by Sheldon
    I'm new with Linux and have noticed that there are numbers beside certain commands I look up. For example I want to look up accept() in the aspect of network programming, but man accept shows this instead: accept(8) Easy Software Products accept(8) NAME accept/reject - accept/reject jobs sent to a destination So how do you switch between manual pages to other numbers like accept(1) ~ accept(7)?

    Read the article

  • Use same url externally as internally

    - by Nifle
    If I have a web server on my home network I can connect to it from work with http://my.external.ip/whatever/ (assuming NAT and forwarding). Naturally I have a bookmark in my browser that points to http://my.external.ip/whatever/ however when I use that bookmark on my home computer (also behind NAT) the link does not work because my firewall blocks it. (firewall is a old'ish Dlink) What is the best way to fix this issue?

    Read the article

  • wireless ethernet adapter with EAP-PEAP?

    - by Joseph
    We have a wireless network set up to support WPA or WPA2 with AES or TKIP encryption and EAP-PEAP authentication. Users are wanting to connect devices that don't have the ability to do EAP-PEAP but have ethernet ports. I have found a wireless printer server that can do this, but I have yet to find a wireless ethernet adapter that can. Has anyone seen one with this ability?

    Read the article

  • Symantec Gateway Security 320 VPN/Port Forwarding trouble

    - by Owl
    How do I check to see if port forward is enabled with one of my dynamic tunnels on this device? I'm having trouble using a feature in our software that requires a vpn to be used. My firewalls shows it as connected but I'm unable to ping the subnet ip. Our software vendor told me that port forwarding might be causing this problem, but I didn't set up this network I'm on and I don't fully know symantec hardware.

    Read the article

  • VPN connection sharing for Ubuntu guest

    - by pzico
    I have Ubuntu 10.04 guest on Windows XP host. I need to use a specific VPN software that works only on Windows. How should I configure virtualbox/guest so that the VPN connection would be visible on guest? I already tried NAT and bridged network settings. With both of these options I get only normal internet connection to work, but sites requiring VPN don't work on guest, only on host.

    Read the article

  • rhn_register through HTTP Proxy with Authentication

    - by kjloh
    Is there any limitation to the proxy authentication support of rhn_register? The proxy of the network I'm on sends the follow 407: HTTP/1.1 407 Proxy Authentication Required ( The ISA Server requires authorization to fulfill the request. Access to the Web Proxy filter is denied. ) Via: 1.1 VANESSA Proxy-Authenticate: Negotiate Proxy-Authenticate: Kerberos Proxy-Authenticate: NTLM It seems that rhn_register is not able to any of the authentication schemes above. Any advise?

    Read the article

  • Sort-of Software Raid-1 on windows?

    - by ricardowong
    I have 2 windows vista computers on a lan, can i set them up with a program so that they replicate the data written in one partition to another and the other way around. basically replicating data across 2 partitions whenever each is modified. Making that data is available on the network when either of the computers are turned on, when both are, data is synchronized. Is this posible?

    Read the article

  • Using iptables to forward traffic destined for specific ip via specific interface

    - by shapeshifter
    I want to forward traffic destined for a specific ip from my internal network via a specific interface. I have two interfaces which are currently load balanced. I need all requests for a certain ip to go out via eth0 otherwise my external ip changes and sessions are dropped. eg. all requests from 10.1.1.1/24 to ip 11.22.33.44 on port 443 must go out via interface eth0. How can I do this with iptables?

    Read the article

  • Simple Voip server for ubuntu

    - by Stalkerh
    I have a network that connects 2 households and would like to setup a simple voip server so that I can call between the houses. It needs to be for ubnutu , I have used the free 3CX system and while it works brilliantly it doesnt support linux and I can get a windows box. The users will never need to call external lines. They will only make 'calls' between laptops/pc. Can someone please make a recommendation and maybe even a tutorial that I can follow

    Read the article

  • Default Critique branch office setup: VPNTunnel->HQ, subnets for VOIP/PC, + several Q's

    - by CHickenTaragon
    We're setting up a new branch office. * ~10 users. * Each user has a VOIP phone provided by a hosted solution. * Users need access to resources on HQ (located in another state), so setting up VPN tunnel * HQ only supports certain Cisco/Juniper devices. VOIP provider only supports SonicWall, so current plan is to have two routers w/ separate subnets for VOIP vs. PC traffic. * PC's will plug into pass-thru Ethernet jacks on the VOIP phones, but the phones vs. PC's will point to different subnets. * Cable Modem is 50Mbps / 5Mbps DOCSIS 3.0 business line w/ 5 static IP's. * Each of the 2 subnets will map to one of the 5 public IP's. * May or may not also need to support a VPN tunnel with a second branch office because of a file server they have there that some in the new office use. I'm pushing to have them move the files to a server on the HQ's network so we don't have to worry about setting up an additional tunnel. Questions: Do you foresee any issues with the below set-up? Router recommendations by HQ IT staff: Cisco Router 2811, or Juniper SSG5 or SSG20. Any recommendations about these routers? We need Wi-Fi too – looks like the above routers have models that support this, any reason not to use this? Users need to be able to work from home. If so, how is authentication handled? Right now we use AD credentials for the HQ's domain, but we currently don't plan to have an AD system in the new location since it's only 10 users. We can't tie the authentication system from the new location's router to the AD system of the HQ. All the PC's that will be in the new location are currently in the existing office that is closing down, and are already joined to the domain of the HQ. Please confirm: this + the VPN tunnel will be sufficient for them to connect to authenticated resources on the HQ's network from the new location, correct? Mainly SQL servers and file servers, and a few remote desktop sessions. I'm sure I'll have some more questions, but can't think of them right now.

    Read the article

  • Ubuntu 12.4 - Terminal - Huge/Large text on each command line [closed]

    - by gotqn
    Possible Duplicate: Is it possible to change my terminal window prompt text? I have been using "Ubuntu 12.4" for few days now (no previous Linux experiences at all) and I have noticed that the symbols on each command line more then this in many examples in the network. For example, I have: And I want to remove the "gotqn-System-Product-Name" part, because it is taking too much space? What should I do to change this?

    Read the article

  • How to manage linux workstations with policies

    - by redknight
    I am going to be administering a small network of linux based workstations for a charity institution (not all have the same distro- some are ubuntu and some are fedora). Is there something in Linux that is similar to group policy in windows?. For example I would like to standardize the wallpapers - have only firefox as a browser - default VLC as the media player etc etc. Thank you, any suggestions are very appreciated.

    Read the article

  • Hiding mapped drives for all users but letting programs access them

    - by AgainstClint
    What I'm looking for (and not sure if it's possible) is that we have 16 mapped network drives that are mapped when any user logs on, what I would like is to cut this down to just one visible drive yet leaving the other ones still usable to certain programs. I would just un-map them, however one of our constantly used programs writes to almost all of the drive letters so they need to be mapped for just that program, however they do not need to be visible to the user. Is this possible?

    Read the article

  • How big of a bandwidth hog is Internet radio?

    - by jmgant
    I was thinking about logging into Pandora at work like I do at home, but I'm concerned about sucking up all of the available bandwidth on the network with something that's not strictly work-related. I don't have a thorough technical understanding of how streaming content like Internet radio is delivered, so I don't really know how to measure the impact. Can anyone offer any perspective on how much bandwidth Internet radio consumes relative to normal Internet browsing? Is there any way to measure how much I'm using for a specific site like Pandora?

    Read the article

  • How to make new copied file always 777 permission

    - by Master
    I have one Linux ext3 partition shared on network. Now when some one copy files from MAc , then other people can't change the file dute to permission problem. Is there any way that ane new file which is copied will always have 777 permission and some specific user as owner of file not the default user thanks

    Read the article

  • OAS log files filling up hard drive

    - by Andrew Hampton
    We've had issues with log files for Oracle Application Server filling up the hard drive on our server. The files are in the /network/admin folder and are named server.log_XXXXX.trc and client.log_XXXXX.trc where XXXXX are 5 digits. The files are typically anywhere from 1-2MB in size but can be up to 100MB and thousands of them are created at a rate of about 5-10 per minute. Does anyone know how to disable these logs? Thanks!

    Read the article

  • Simulation in Java/C for AI design

    - by abhishekgupta92
    I want to conduct a contest, in which contestants are required to code in java/c and design AI or gameplay. The game should have a visual simulation so that the players could enjoy their designs (AI or gameplay) graphically as well. A possible example can be soccer, in which contestant have to design the ai of the players and decided upon the team-play. Also, they play over the network in such a game against some other player. How can i go about it?

    Read the article

< Previous Page | 710 711 712 713 714 715 716 717 718 719 720 721  | Next Page >