Thank you for all your responses.
I'm looking for something more integrated into the website itself.
The only example that I could find of something similar to what I'm looking for (in presentation, not content, we'll be using it at our college for educational purposes)...
Good day!
Let me explain what I need.
I have a folder, with about 30 subfolders, each of which contains hundreds of files.
What I want is to have a way (using either static HTML or PHP, I don't care as long as it's automated) to create a catalog of these files, with a download link.
I...
Hi guys,
For my lab, I need to be able to nest virtual machines. That is, run several virtual machines inside one virtual machine.
If I install Windows 8 and then VMWare 9, I believe I won't be able to assign properly the resources to the nested virtual machines, that would run all under...
Hi all,
I have a problem, a client had a setup with another mailserver (Mdaemon), that allowed him to do that.
Anyone knows how to do the same in Exchange? I thought about distribution lists, but I don't think it will work to have a dist. list called [email protected], with the members joe...
OK, so I've been using this oldie PC for 5 years now, with XP.
I decided to try Ubuntu on it, didn't serve my purpose, so I went to install XP SP3.
After eliminating the partitions and formating a big one, the installation copied files and showed the usual "will reboot in 10 secs".
It does...
Hi all,
I'm in a pretty messed-up situation, hope you can give me a hand.
I deleted by accident a folder containing a VMware server virtual machine, that contains most critical information. The host OS is CentOS 5.5, which I believe by default uses Ext3.
I shut down the PC intermediately...
Hi all,
I'm in a pretty messed-up situation, hope you can give me a hand.
I deleted by accident a folder containing a VMware server virtual machine, that contains most critical information. The host OS is CentOS 5.5, which I believe by default uses Ext3.
I shut down the PC intermediately...
I was asked this on a test for the CEH. What would you answer? My own answer is at the bottom.
What defensive measures will you take to protect your network from password brute-force attacks? (Choose all that apply.)
A) Never leave a default password.
B) Never use a password that can be...
Hey man, thanks for the response.
Will try to get a hold on a copy ASAP!
I'm also using Counter Hack Reloaded, Second Edition (amazing book, check the reviews at Amazon.com) and also, Hacking Exposed, sixth edition, a little less general knowledge, is basically a huge review of tools & types of...
Hi guys,
Could someone post a thorough list of materials to study, to successfully pass this test?
All I can find is for the old version, it seems. It doesn't have all the new info for the new exam.
Hi guys, I need to set up load balancing for an implementation. We have 2 WAN links, one 10 MBs, the other 2.
Can anyone link to a site where I can find information on how to implement a Dual WAN failover configuration?
Hi all, thanks for taking the time to look at this question.
I need to install this model of AP on a network. Actually, 6 of them. The problem is that I need to provide service for 2 types of users: one of them, needs to access only to the Internet. The other, should have access to the...
Hi guys, I need that, let me show you, it will be easier to undertand.
A 1
A 2
A 3 6
B 2
B 5 7
C 1
C 1
C 5
C 3 10
So, basically, I have A LOT of different names in the columns with the letters.
I need Excel to look at column A and sum the values...
Hi guys,
I need to measure the signal rate in different parts of a building. I know that it can be done with SBSettings, but I don't want to jailbreak my phone.
Can this configuration (getting the signal strength in numbers instead of the lines) be done without jailbreaking?
Thanks all for the responses!!
Yes Impulse, it'll be great if you can confirm you can input via the connected mic and output via the bluetooth stereo system!!
thanks!
Hi Appa, thx for the response.
But have you (or anyone else for that matter) tried using a mic, like the one on the url I posted, to use with this device, WHILE using the a2dp bluetooth headsets?
If not, I'll need to go the route of buying a wired headset with mic incorporate.
Hi guys.
I have a Dell bluetooth stereo headset with mic incorporated.
I want to use this to have conversations with my iPod touch, using voip software.
Can this be done? I'm asking because when I pair the headset with my iPod, the new voice notes app says I don't have any mic.
In case...
Hi guys, I have the model stated in the subject.
I had the 2.x firmware. I restored to factory defaults.
After that, it hanged again.
Later, I updated to firmware 3.0.
And it just hanged a few minutes ago.
I never had an ipod before. But this is NOT normal behaviour right?
With "hanged"...
Hello all! Thanks so much for the responses, they helped me a lot.
I've been thinking the best might be to buy a good DDR 3 Mobo, with native AM3 support and go the 4770 solo route and add another one in crossfire in the following months, as I have a little more money.
What do you think of his...
The thing is that, at least the AM3 CPU available now, are backwards compatible with AM2+ Mobos... so I would think that there would be at least a few cool CPUs released in the future compatible...
Thanks for the response, guys.
But do you think I'll be limited by a AM2+ in future upgrades? I mean, 2 years from now, maybe I can get a better processor?
I'm not sure if AMD will keep releasing better versions.
RIGHT NOW, AM3 are compatible with AM2+ mobos... but this might change.
Hello guys.
At the end, I was convinced to go the Phenom II 720 route :P
So please, if you have any ideas about if it's a good idea to pay extra money for this, please reply here:
http://www.hardforum.com/showthread.php?p=1034117836#post1034117836
Thanks!
I've been thinking a lot, and after hearing a lot of good things of phenom II, I think I'm going that route.
It's cheaper (leaving more money for other parts, like GPU or HD), very powerful(better than Q6600 in loads of benchmarks) and more upgradeable.
The thing is that I'm not sure if I...
Hello guys.
I've found a Q6600, G0 :D
And I'm gonna build a new system.
In my country, there's a good difference between the P5Q and the P5Q-E.
And I don't need all the extra features of the P5Q-E (won't do SLI, don't need dual GPU, etc).
From what I found, both motherboards overclock...
Good morning.
We've established a number of group policies in our AD domain.
The problem we are having is that a number of them apply in some computers and in some not, in a seemingly random fashion.
This happens with all types of group policies, either startup scripts or all sorts of...
I tried adding a rule that allowed connections from Internal to http://*.eset.com for all users, but still doesn't work.
It recognizes the connection as the rule above but the connection says that it failed. The username is always anonymous.
I added that rule on top of all the others that...
Yes, but the problem is that NOD 32 informs that the database is current, but I see the date is very old.
I tried setting "connect to network as" and nothing, the same error at isa....
And the same version of NOD 32 at my home (without a proxy in the middle) work perfectly...
??
Good morning guys.
I can't update the NOD 32 AV definitions at my company.
The problem is that, even though the proxy is configured properly at the Nod32 propierties, NOD send the request without being authenticated.
You can see it here at this logs:
192.168.1.5 8080 http Denied...
Hey guys, I created a rule allowing traffic from internet to external, for the protocol denied and on all ports... the problem was that I DID create that rule, but the port was a different number.
Piece of cake (after solving it, LOL :d )
Following your suggestion, I disabled the proxy in Internet explorer and connected using the Isa Firewall client and got the exact same error in Isa's log.
Please check the following screenshot of Isa's log:
http://img219.imagevenue.com/img.php?image=03515_untitled_122_260lo.JPG
"Acceso full a external" is the rule "Full access to external", in spanish.
At the bottom, you see the IP ending in .198 which is the one that gets the blocked connections.
Good morning guys!
We have this problem at work; we connect to a Citrix Metaframe Presentation Server which servers the Terminal Services application.
When we click on it, it opens a .ICA file and trys to establish a connection to the remote server.
With ISA server in the middle, it fails...
The question is which soft is good for this.
GFI Webmonitor looks good on the outside, but the reports it generates do not include the most important for me: which sites a given user of Active Directory visits on a given day (much better if it includes the time they visited them).
Is there a way to generate a report to know which sites an specific user entered in a given day or series of days?
This is in my opinion the single MOST important report of them all & I can't find it anywhere!
Yeah, it created the database and all was fine :D
The weird thing is that I clicked on "update reporting data now" a lot of times and nothing hapenned... but now it's ok!
Anyone knows if there's an add-on to get new reports?
We are trying to setup this configuration and we've encountered with some problems.
I'm trying with a SQL 2005 server we are running for other purposes. The database was named GFI_WM and I didn't create the tables; I didn't find any info on how to create them. Are they created automatically...
The problem was that there was a rule in ISA server that routed the traffic coming from VPN clients under an specific group name.
Thanks for the ideas guys!