Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. GitaMirza

    Read file from Cache

    In my ISA server installed in integrated mode I am downloading a file through Scheduled download. How can I read the file from cache? How do Ipick the file and its data from cache. I am supposed to authenticate the user logon based on the data in that file lying in cache. Can the cache be...
  2. GitaMirza

    ISA server::Reading file in cache-HELP!!!!!!

    In my ISA server installed in integrated mode I am downloading a file through Scheduled download. How can I read the file from cache? How do Ipick the file and its data from cache. I am supposed to authenticate the user logon based on the data in that file lying in cache. Can the cache be...
  3. GitaMirza

    I have installed ISA Sever arrays o

    I have installed ISA Sever arrays on two machines with one as a upstream server. One is Domain and other a subdomain of the domain..that is one is below the other in the domain tree. Now I expect in a normal scenario the ISA array interfaces shud show up both the array servers but acually this...
  4. GitaMirza

    Client Authentication using certificatefor the web server

    We require to implement client authentication in our B2B portal. A supplier is expected to login only if he has a valid digital certificate issued by the certificate authority in Win 2K. When a supplier applies for registration he is first approved by the authorities and issued a digital...
  5. GitaMirza

    Digital Certificate(Valid To/ Valid From)

    The "Valid To" and "Valid from" option specifies the duration for which the certificate is valid. I will explain it again: While issuing a certificate we specify the duration for which it is valid. I am unable to make my Certificate Server to allow the end user to enjoy this...
  6. GitaMirza

    Digital Certificate(Valid To/ Valid From)

    I have installed Certificate Services on my machine. I am unable to find out a option which could make the end user specify the "Valid To" and "Valid From" properties of the certificate. That is im unable to edit this field as per my choice . All the certificates issued...
  7. GitaMirza

    Forgoten PST's password

    age, Thanx a lot . I worked out right and i was able to retreive all my mails. Thanx a lot again. Gita
  8. GitaMirza

    Certificate Authority(Valid To/From)

    I have installed Cetificate Services on Win 2K Server. Now I can generat certificates through http://localhost/certsrv but i am unable to find out the option in which the duration of the certificate is specified. That is Valid from and To fields are being decided by the server automatically to...
  9. GitaMirza

    Forgoten PST's password

    sorry age, no luck..kud find only passwd crackers n removers were for Excel only...am not interested in cracker..get me the url if u can for downloading password remover. more imp : thanx a lot for info, with best regards gita
  10. GitaMirza

    Forgoten PST's password

    Does anybody knows this : how to open the pst when one has lost the password ??? Pls help..!!
  11. GitaMirza

    anti spam on exchange server 5.5 sp4

    Visit http://www.antivirus.com/products/smex/ It is a TrendMicro's product which can check for spam mails as well. Hope this helps.
  12. GitaMirza

    Call Notepad to open a text file by clicking button[/]

    Can we similarly open any other application like "iexplore.exe" thru the code given in vb-island's site. Please do update me regarding my query.
  13. GitaMirza

    Forgot PST's password

    I have a Outlook 2K pst file which was password protected. But now i have forgotten the password. Is there way i can open it now?? Pls help.
  14. GitaMirza

    LAN

    hi Not very sure but you can install a firewall or ISA Proxy Server in which you can define policies . for eg in Checkpoint or any other commonly used firewall rules are specified as follows : From.......To..........User.........Service. Here "From" indicates "Source of...
  15. GitaMirza

    How to define a boolean data type in C?

    You can use enumerated data types like the following : enum BOOLEAN{No, Yes} This way a constant value is assigned to "Yes" ie 1 and to "No" 0(zero). Refer to P-39 of "The C Prgmng Lang" by Dennis Ritchie/Kernighan. Also the concept of bit-field can also be used if...
  16. GitaMirza

    Active Directory objects

    We have a query regarding AD objects. Besides builin objects if we want to create our own "objects" can I do that. How. With ADSI or without and how ? Please help. It is urgent.
  17. GitaMirza

    Enumerating contacts in a public folder via VB and ADSI

    following is a VB solution to obtaining the whole of the "Contacts" folder. Set myNameSpace = Application.GetNamespace("MAPI") Set myFolder = myNameSpace.GetDefaultFolder(olFolderContacts) In order to access first item of the "Contacts" folder that is first...
  18. GitaMirza

    ADSI

    How is ADSI coding actually done. What is the interface used(like in case of Outlook or Access or Excel prgmng we have VB editor provided with them) . Similarly how do i code for Active directory. Please help.

Part and Inventory Search

Back
Top