|
Mustafa Ismail Mustafa wrote: 192.168.1.30 (LAN) & 192.168.1.32 (WAN)
For routing to work, they will need to be on different subnets. So the default 255.255.255.0 wont work here. Try 255.255.255.8 (or 7 or 32, or 31, heck I cant remember now!).
xacc.ideIronScheme - 1.0 beta 3 - out now! ((lambda (x) `((lambda (x) ,x) ',x)) '`((lambda (x) ,x) ',x))
|
|
|
|
|
Can you suggest a site that can guide me on this? Google isn't being helpful by providing a zillion results
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Sounds like they will be in the same subnet. That will realy mess things up.
|
|
|
|
|
So I should take your and Leppie's advice and split them into two different ones?
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Make the first adapter 192.168.0.2 and the second 192.168.1.2 each with the subnet 255.255.255.0.
At the moment the server could be trying to get a resposne through the wrong nextwork interface and building up a queue of traffuc.
|
|
|
|
|
A number of things spring to mind:
1) The LAN and WAN cards should be configured into different subnets.
2) When you say you can't ping other computers, are you pinging them by name or IP address?
3) Using the router (now the other side of the firewall) to supply addresses to the internal network is going to take some work on the ISA server. I would suggest setting up a DHCP server on the internal network
4) Have you configured the computers on the LAN to use the ISA server's LAN IP as their gateway? Have you allowed the HTTP protcol from the internal network to the external network on the ISA server. Do the clients on the LAN have working name resolution for external hosts? If any of those answers is 'no', the clients won't be able to access the internet.
|
|
|
|
|
I got the DHCP working a while ago, and then I discovered that W2K3 can handle NAT/VPN routing all on its lonesome, so I've been busy with that. Alas, all my attempts have failed
Electron Shepherd wrote: 1) The LAN and WAN cards should be configured into different subnets.
Suggestions for the equivalent of a best practice address for the wan subnet or should I go with 10.0.0.1?
Electron Shepherd wrote: 2) When you say you can't ping other computers, are you pinging them by name or IP address?
This has been resolved now that the DHCP server is working, thank you
Electron Shepherd wrote: 3) Using the router (now the other side of the firewall) to supply addresses to the internal network is going to take some work on the ISA server. I would suggest setting up a DHCP server on the internal network
I guess 2 answers this one...
Electron Shepherd wrote: 4) Have you configured the computers on the LAN to use the ISA server's LAN IP as their gateway? Have you allowed the HTTP protcol from the internal network to the external network on the ISA server. Do the clients on the LAN have working name resolution for external hosts? If any of those answers is 'no', the clients won't be able to access the internet.
I have uninstalled ISA server for the moment, I figured installing and configuring the DHCP server first would be prudent. Would it be possible to set this up using W2K3's built-in Router?
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Hi, firstly please do not get the wrong idea, this is for good intentions,not spreading malicious software.
My school has over 300 computers connected to the network, and somehow they have ALL been infected with Conficker (the C edition). Unfortunately the schools IT manager recently retired and when it comes down to it I am the guy for fixing small IT problems.
We have already tried shutting down all computers and running the Microsoft Malicious Software Removal Tool (April 09 Edition) on each computer one by one. We have done this twice but obviously we are missing it somewhere and the dam virus keeps resurrecting and infects the whole network again.
My best guess is to somehow run the malicious software removal tool on all computers at once.
Does anyone know a way to copy and run a file from the server onto all networked machines?
I have full administrator access so thats no problem. Im just unsure of how to do this.
Thanks for your time in reading.
|
|
|
|
|
well I have been working on an assigment and it states::
A program has to be developed, and coded in C language, to decipher a document written
in Italian that is encoded using a secret key. The secret key is obtained as random
permutation of all the uppercase letters, lowercase letters, numbers and blank space. As
an example, let us consider the following two strings:
Plain: “ABCDEFGHIJKLMNOPQRSTUVXWYZabcdefghijklmnopqrstuvwxyz0123456789 ”
Code: “BZJ9y0KePWopxYkQlRjhzsaNTFAtM7H6S24fC5mcIgXbnLOq8Uid 3EDv1ruVGw”
The secret key modifies only letters, numbers, and spaces of the original document, while
the remaining characters are left unchanged. The document is stored in a text file whose
length is unknown.
The program has to read the document, find the secret key (which by definition is
unknown; the above table is just an example and it is not the key used for preparing the
sample files available on the web course) using a suitable decoding algorithm, and write
the decoded document to a new text file.
And I know that I have to upload an English dictionary into the program but I don't why it has been asked.(may be not in that statement but I have to dO THAT). My question is , while I can do that program using simple encryption/decryption algorithm then what's the use of uploading the english dictionary in our program? So is there any decryption algorithm that uses a dictionary to decrypt an encrypted file? or can somebody tell me what approach or algorithm should I use to solve that problem???
An early reply (and also authentic one) will be highly appreciated from you.
Thank you guys.
|
|
|
|
|
It appears as if something has screwed up my system volume so that even with my master volume turned down it is loud as hell. The entire volume control is all the way down at the bottom of the slider so that it is either blasting me or it is completely off if I just move the slider up little bit.
Anyone else ever seen this?
I looked around to see if I had any other media players installed that may be screwing the system and I can't seem to locate any. This is my work machine so I tend to keep it pretty pristine.
|
|
|
|
|
A co-worker had a similar problem once. Did you try to uninstall/reinstall the driver? If that does not help, try reinstalling everything related to the Soundmixer.
As for the co-worker: He reinstalled Windows, without success. It turned out to be a broken soundcard.
Cheers,
Sebastian
--
"If it was two men, the non-driver would have challenged the driver to simply crash through the gates. The macho image thing, you know." - Marc Clifton
|
|
|
|
|
Hi, I plan to configure file auditing on windows server 2003. What i just want to know is the security log of each user activity on that file or folder is going to record in the security log of the server or on each user client computer. Thank in advance!!!
|
|
|
|
|
Hi, in my organization there are two server (domain controller and mail server running mdaemon) and other 50 client computer.
I plan to add one more server which is running ISA server as a firewall server. Once I have successfully deploy ISA server I plan to configure the following setting on the domain controller:
1. Install and configure domain controller as DHCP server.
2. Configure DNS on domain controller as AD integrated zone and configure DNS farwarder on DC. Each client will use IP of DC as their primary DNS server.
With the above two purpose, I need everybody to suggest or advice me about any security that might occure of I configure the above two point on DC?
Thank in advance!!!
|
|
|
|
|
"FILES THAT ARE REQUIRED FOR WINDOWS TO RUN PROPERLY HAVE BEEN REPLACED BY UNRECOGNIZED VERSIONS, TO MAINTAIN SYSTEM STABILITY WINDOWS MUST RETRIEVE THE ORIGINAL VERSION OF THE FILES"
The above error is coming open when i access from file in network and other time.
and I installed XP OS is original.
That XP CD was theft. I don't have any other XP CD. and I have that XP version CD key and license agreement how can i solve this problem
Thanks in advance.
|
|
|
|
|
Some antivirus programs generate such messages, so you will have to scan and clean your system(s) as well.
|
|
|
|
|
Hi, my computer is affect with the virus and now it prevent me from startup in safe mode. The virus name w32.sality.ae which is detect by symentic. Does anyone has an expereince to remove and solve this problem?
Thank in advance!!!
|
|
|
|
|
First you do these stuff :--->
1. Disable System Restore .
2. Update the virus definitions.
3. Run a full system scan.
4. Delete any values added to the registry.
|
|
|
|
|
n_nilesh wrote: 4. Delete any values added to the registry.
Thank you very much for your answer. But how could i know which value added to the registry?
|
|
|
|
|
|
|
Hi all,
we had a new system which acts as a backup server for all the members in our lab. Its a windows XP x64 system with bunch of shared folders for each member in the lab and it also acts as an FTP server for our lab, Maltab license server and also as Kaspersky admin server. Using SyncBack_NI, we are able to backup our systems regularly and all is fine for a while. All the client systems are windows XP x86 systems and setting up network share of their shared folder, they all are able to backup their systems fine for a couple of days, then the problems starts with windows network sharing, sometimes out of the blue it says access denied and then you need to disconnect and do some nbtstat refreshing and delete all the mountpoints for network shares and then redo all the steps for adding network shares, even then sometimes it still says access denied and sometimes it works for a while and to be honest we are quite tired of using windows network sharing.
So, now we are seriously looking for an alternative for this and get rid of this XP network sharing problems. Except network share access probems on client systems everything else works fine. Currently all the backup files are stored without any compression (as raw files) and users can access their files from backup system normally as they do from their local system. Any ideas/tips please???
thanks,
PKNT
|
|
|
|
|
Save the following to a .reg file
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters]
"autodisconnect"=dword:00000000
Then run it.
It will make the time that XP maintains mountpoints for shares be 0....Get what you need and disconnect. It should help a lot.
the value is F by default (15)
|
|
|
|
|
thanks for the tip, will try it and hoping it will resolve the issue.
PKNT
|
|
|
|
|
Hello all ,
I installed microsoft office 2003 on server machine and I want to share
office 2003 for network users . I notwant to install office 2003 on all the network machine . how can I do this . please describe if possible .
Thanks for this .
|
|
|
|
|
You can use Terminal Server to "share office 2003". However, Terminal Server licencing is a beast. I remember that you'd need one licence for the server and one for every user who is going to be using Office.
Also, you need a powerful machine in order to deal with several users at once. Office is not exactly easy on the resources.
I would always go with the local installation. You can automate the installation process, so why not go that way? And you only need one licence per user.
Cheers,
Sebastian
--
"If it was two men, the non-driver would have challenged the driver to simply crash through the gates. The macho image thing, you know." - Marc Clifton
|
|
|
|