Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. asdasdasd

    WinNT 4.0 Server Resource Kit

    it sure is a must have for all the sys admins a major part of the NTRK is command like tools for almost all the services and gui programs, though its packed with some nice gui utilities which you wont find in the normal NT installation.
  2. asdasdasd

    NT 4.0 SP6; clients can't access server

    delete and add both of the win98SE workstations from the server.
  3. asdasdasd

    Logging Inet Access

    create an Access Control List and deny ip addresses of hosts that you do not want the users to see.
  4. asdasdasd

    Configuring NAT, doesn't work...

    i would assume that you have three different subnets for all three NICs. e.g. NIC1 = 192.168.1.0 (which is connected to the internet) NIC2 = 192.168.2.0 (which is connected to the hub) NIC3 = 192.168.3.0 (the 100Mbps card) all you have to do is enable NAT and DNS forwarding on NIC1, enable...
  5. asdasdasd

    Share security woes

    for file and folder lever permissions to take effect, you must have the partition NTFS formatted. check to see if you have the users added in some group other then users. also, use administrator account to create or set permission on this folder.
  6. asdasdasd

    MS Exchange 2000 on DMZ

    active directory itself is not a security hazard to the DMZ, but the default installation of Exchange 2000 web interface can expose your DMZ to intruder attacks. vulnerabilities like unicode are very popular among attackers to compromise the target host. you should apply the security patches...
  7. asdasdasd

    Detecting who changes/saves a file

    for *nix systems try tripwire and for windows based PCs, go for winfingerprint. additionally you can run a sniffer on your machines and see which computer is attempting to connect the shares (note that the virus tries to connect to some suspicious shares like NTLDM, NTVDM etc). you will get...

Part and Inventory Search

Back
Top