if I'd realized the post was over 20 days old I wouldn't have replied. However, SIDs are really what permissions are tied to. the NewSID program I was hoping would set all those registry and file SIDs to the same thing.
He probably just reinstalled everything, which is really a better...
Why not go straight to 2010? If you've bought in the last 2 years you're most likely entitled to it.
I did find this great checklist from Microsoft designed to walk small guys (like me) through this. It is designed for Exchange 2010 though...
There is a utility available that can replace the SID on your machine. I would most likely try running that. I think it was called NewSID, and it was from the Sysinternals folks Microsoft bought.
Show me a person in my whole office that only has one password to remember and I'll show you the person with the mop, who probably still has more than one password.
Their machines attempt to login to the domain before their VPN is connected, with the Windows login. Though the VPN might authenticate to their AD account, it won't go through the same routine as far as checking for expired passwords, etc. Your best/easiest bet is to have them login through...
Well, attacks from the internet I would ignore, they're to be expected.
There should be a swift policy in place for internal attacks that would report the incident, locate the attacker in the network, remove them, then report the conclusion.
It sounds like you're talking about a grid or group header repeat. There's a header on the report, just right-click in the top left corner (same place you can get to report properties) and choose the report header.
It turned into a licensing thing because the discussion turned to general public access of a Sharepoint site. Despite his calling it MOSS, things that sounded more like WSS were being discussed. That's when I said...
"WSS is not MOSS. They're both Sharepoint. WSS isn't supposed to be...
Well, the MVPs said tat if you're going to power an external website you need CALs for the users. Feel free to read the article before you comment on it.
Here's a good article...
http://www.officesharepointpro.com/Articles/tabid/149/nodeid/1924/License-to-Fill--Licensing-Windows-SharePoint-Services-for-the-Extranet-.aspx
He does say you need Windows CALs.
http://msmvps.com/blogs/cgross/archive/2005/04/02/40723.aspx
According to the MS-MVP you...
It should only be users that have a CAL for your Windows server running WSS that should be able to use it. It is a violation of your license to allow others to use your WSS installation.
At least that's how I understood it.
I suppose that doesn't mean you can't have it exposed to the...
Yeah, but your internet IP is still visible when you're behind a NATing firewall. It only really will hide you if you're in a large private network like a corporation or a school network. Then it still isn't really hiding you because any organization large enough to hide someone will be...
Sounds like your addition of the share to the startup items was done right. I was suggesting though that you might have better luck after deleting everything windows related from your keychain. If that doesn't work, also make the 'connect to' path something like...
Here's a USB printserver from IOgear for $40, including shipping.
http://www.buy.com/prod/iogear-hi-speed-usb-2-0-print-server-gpsu21-iogear-gpsu21-print-server/q/loc/101/202717949.html
And a parallel printserver from netgear for $50 with free shipping...
The best luck I had with 10.3 was when I deleted the keychain and started from scratch again. I think if you 'connect to server' and connect to smb://username:password@serveraddress/sharename/ then drag that into your startup items, it will be properly remembered.
Or, heck, spring the $30...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.