going slightly off-topic, you mentioned specifically about 'password protecting' office documents. as with most things, the devil is in the detail - and specifically here the implementation. it's important to remember that all forms of protection are not necessarily created equal. for example...
that's called steganography.
so long as it's out of band, it's all good. generally accepted methods are email, verbally over the telephone, via sms, or if you use blackberry devices then there is the send PIN function. the general rule of thumb being send the username/password separately...
to the best of my knowledge we've never experienced any issues with the vss, maybe we have been lucky - i couldn't say, but it works well for us. in terms of the 3750's, anything of any business criticality tends to be run within the blade/flex10 environment - either dedicated or virtualised...
within the data centre we run a pair of 6500's in a vss, with 4x 10gbe vsl's between them for our core. each cab (approximately 40) has a pair of 3750 switches (stacked) installed. each stack is connected to the core with a 2gbe trunk. everything here is fibre. blade centres are connected...
So if I were configuring a Windows DNS Server and I had a zone called example.com, what record within the zone do I need to create to point it at 1.2.3.4 such that I can create a CNAME of said record for www? I.e. How do I create the @ record? (I'm only used to seeing things like A, MX, CNAME...
say you have a website at www.example.com, which is also accessible via just example.com. i'm assuming this is achieved via dns, but i don't know what the record is called that you would create? i assume it's essentially an a record, but more of a wildcard default for the domain? if i was...
do you have any budget for this? whats the projected growth of the company, in terms of extra people? do you have laptops that roam between the internal lan and cafes/airports/hotels/homes? i would be tempted to suggest using a cloud provider such as webroot, et al for this.
hi there,
are there any netscaler people in here that wouldn't mind answering a few high level deployment related questions i have about a ha pair of devices in our environment? i'll provide a bit more info once i know if anyone can help.
thanks in advance,
andy.
I've just started at a new place. They PXE boot devices and use SCCM to perform a zero-touch install of Windows 7, all drivers, hotfixes, and base level applications (Office, AV, etc). Works really well. Haven't been a fan of traditional 'imaging' tools for a long time, too many client/server...
If so, I have a question about the remote console...
If the guest is Windows, does it only provide RDP access to an already installed machine? i.e. you cannot use the remote console to remotely install a machine?
Cheers.
as i say, haven't felt the need to shift away from safari tbh. everything on this macbook pro is blazingly fast so haven't felt the need to tinker - which is pretty much the main reason for switching tbh.
the mac is brand new, i've only had it for two weeks. i doubt the battery is on it's way out since the battery life is phenominal. the battery was (according to coconutbattery) at 94%.
i gave the mac the benefit of the doubt in terms of it not appearing to 'go to sleep' once reserve battery...
so i want to try to keep the battery on my new mac in tip top condition. i thought the process went like this:
use the mac disconnected from the mains until you are warned about being on reserve power... then, continue to use until the mac goes into sleep mode... let the white light pulse...
my sisters kids have gotten to the age where they are curious about stuff, so i set them up with an opendns account and used their free category/whitelist/blacklist service. it works well, no box to leave on 24/7, no software to install on the pc's, is centrally manageable through the online...
don't bother calling support because they are rubbish, return it and put a proper firewall in its place! :)
in all seriousness, are you running the latest code and/or hotfixes?
does this network comprise of a single router which is only used for internet access? i.e. you don't have other routers on the network for access to resources upstream on a wan or anything? if so, just give the machine a static ip address (outside of your dhcp scope) and omit the default...
limited or no connectivity suggests you have a basic connection i.e. a link established between the devices, just that you're either not getting an address on lease from your dhcp server or that you have a static ip address on the device that is not in the right subnet. check the latter first...
for 10/100 the only wires that are used are 1,2,3 and 6. this is why you can actually run two connections down one cable simultaneously. it's a bit nasty, but it's doable. you only need all four pairs if you want to run a gigabit connection.
i've only skim read the thread; but i've seen mentioned vpn, a 1.5 meg internet connection, and an access database... this, in my experience, sounds like a disaster waiting to happen. we've had people attempting to use access databases over private 10 meg synchronous wan connections and the...
check out this link:
https://learningportal.juniper.net/juniper/user_fasttrack_home.aspx
lots of training material on there covering routing, switching, and security.
vmware fusion and parallels desktop both have free trials, why not just take them for a test drive. alternatively just use virtualbox since that's free.
oh, and for those who would like to know a bit more about virtualisation in general, head over to the virtualisation sub-forum and check out...
Just installed ESXi 3.5 on my hardware. I originally used Server 2003 x64 and VMware Server 2.x but recently started using ESXi at work and was impressed so I decided to migrate at home too. Only using a whitebox setup, but so far it works really well.
Gigabyte G33M-DS2R motherboard, Intel...
great advice from cc. just my £0.02: if you outgrow remote web workplace and want 'proper' teleworking vpn capabilities in the future then go for ssl instead of ipsec would be my advice.
if the only thing that has internet access is the proxy, then that would mean your users would have to come up with some way to circumvent the perimeter firewall itself...which, if you have the firewall configured correctly, should not be easy for them to do. your running an asa, so from inside...
you've never worked in an environment where a users activity within systems is logged and monitored? particularly internet access? the typical 'get out' for end users is 'oh i didn't know there was a policy surrounding the use of x resource'...so, if you enforce the policy regularly via a...