I have tried the firegensef before, but was not able to process my logfile.
It seems that the default is to retrive the log remotely from Raptor using the Symantec utility.
However if we were to save the logfile into the PC in which firegensef was installed, I don't know I could make...
Have anyone of you tried out log analyser and log parser for raptor logfiles ?
What is the most useful tools that you have tried for that purpose ?
Have someone tried the freeware reptor ? I tried to download it but the website seems to be no longer working. If anyone has a copy, could you...
Can anyone tell me how do I send an email message to someone with an email address of this format name/Section/Group@domain
e.g. :
albert/FIN/MARKETING_GROUP@abc.com
I have no problem writing to the person using netscape account. But when I use my Outlook 2000 sending a message to that...
I am confuse.
I want to know what is the Free/busy connector in Exchange 5.5 used for.
Suppose that I want to plan a meeting. Using the
Action->plan a meeting facility, I could then put in all the attendees' email addresses. Now suppose that I would want to be able to see all the attendees'...
Yes,I know that. But renaming the file from .cc to .mdb
and open it using Microsoft Access does not solve the problem.
So it seems to be a case of missing identification, fake identification or propietary manipulation of files....
That's the problem.
The physical file name is having a .cc extension. I couldn't open it using MS Access. A peek into the file, among the garbage, we did see the db1.mdb.
Searching through the net revealed that .cc is related to visual dbase.
Anybody has a clue ?
thanks
I remember to flush the table, we have to wipe off certain file contents which I can't remember which files. But even after we wipe off the table, it would build up again and start to hit the systems slowness problem again.
1) Can we wipe off the table and choose what ip addresses to be listed...
I know in Checkpoint for instance, basically I can mark a rule and disable it or enable it. That simple. But how do I disable and enable a rule in Raptor ? Anybody has any idea ?
Thanks for your info. I can see that the logs file contains the Ip addresses. When I was using the Management Clients remotely and try to view the logs, there was a message now and then stating respond was slow and whether I chose to abort or continue.
That is the problem. Someone in my office...
1) How does licensing works in Checkpoint ?
2) If I buy 250-node license checkpoints, what does it means ?
3) What happen if with that license (250 nodes), I place 500 PCs behind the firewall ? How do I know which among the 500 is protected and which is not ?
4) Can I create a list of 200 IP...
I am asked to ensure my company IT security is in place.
My problem -> security is a big issue.
Scenario :
20 Servers running on Windows NT,2000, Hp-UX, Linux and Solaris. Network is one flat network with about 250 PCs running on Windows NT/XP/2000. We have our own DNS server to maintain our...
Thanks for the replies. However, I am looking at a single word or execel document in such a way that clicking that particular file would enable users to view it without having Microsoft office installed.
Let say that I want to email a word document or an excel document to someone. I want to be...
In powerpoint for example, I can save as powerpoint show so that the user who open up the document would not need to have Microsoft office installed in his pc to see the presentation. Other examples, Winzip. I can zip a file. Make it executable so that the user would not need winzip or other zip...
In powerpoint for example, I can save as powerpoint show so that the user who open up the document would not need to have Microsoft office installed in his pc to see the presentation. Other examples, Winzip. I can zip a file. Make it executable so that the user would not need winzip or other zip...
The file when opened using notepad contain a mixture of non-print-able character and print-able character. The text data (column) are separated with 'garbage'.
Eg :
è ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ U ` ` f ~ e › ÿ n q 9 µ µ...
I am not having any knowledge on Visual Dbase. Recently there was a problem reported from other departments in a company I work. A customised application was corrupted and the software are not able to run anymore. The data was kept in a file with an extension .cc
When I search through internet...
keithschm (or others who wish to contribute)
With the norton running from dos, do you think that I would be able to install Windows 2000 on it and not get alert messages detecting changes in the boot sector ?
How would the norton scan from dos solve my problem. Thanks for your information.
The question is how can I installed the antivirus even before the pc is connected to network ?
The PC has to be connected to network first because I intend to run it as BDC. It has to see the PDC.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.