Using NT, I was wondering where IE6 stores the Authentication Pop Up information. When a user authenticates through a proxy server they have to enter there user name and password. Where can I delete the the user ID and password if the user has opted to save password.
Thank you
Hi all
I heard that it was possible to restore deleted files that were deleted on a mapped drive from the server by the client. Is there a tool that makes this possible.
i.e. A user deletes a folder from the server. Where can I find the deleted folder or is there a tool that buffers deleted...
How do I disable Administrator tools for clients running NT workstation. But as Administrator I would like to have access when I log in. Maybe just have the event viewer operational.
Thanks
Hi Guys...Please help me out with this MCSE question
Question 3: You wish to allow Windows 2000 machines on your network to communicate with several Netware servers. On the Windows 2000 computers you install the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol. After installing the protocol...
Okay..point taken...
Thank you all. Silly question though, what do banks do to protect their Data...any ideas?
SimonDavies...good points made.
Lets kill this thread
Remove them from the domain using the server manager. Then add them to the domain. Try this with one or 2 workstations. It should work. I had the same problem once, but not on such a great scale
Ta
SimonDavies,
Call it what you may. Would you not like a report to show to your superiors when you or some one in your team are suspected.
Its just a control, report, call it what you like. I am trusted here at my job I would hate for that trust to be broken on mere suspect.
Ta
I cannot believe that not one good idea has come from this forum. This is the situation. Now lets work on it....
Boss comes to you says secure these confidential folders. I want a list of all that open these folders generated to a text file then mailed to me.
What do you say...
"Eh...
This is my first entry
I have the same problem. My Director says that it is fine that us IT geeks have the rights to see everything. But what about the controlls. I have audited folders that contain sensitive material. What he suggested, (although I am no programmer is to create a script that...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.