|
Mustafa Ismail Mustafa wrote: networking
Perhaps slightly into 'System Admin'.
Vasudevan Deepak Kumar
Personal Homepage Tech Gossips
The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep!
|
|
|
|
|
I thought of that, but I thought I'd ask first, just in case.
OT:
Been a while since school when we studied Robert Frost
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Same here, but his stuff is fantastic! The Road Not Taken is another I enjoyed in school.
Cheers,
Vikram. Current activities:
Films: The classic Pink Panther series
TV series: Friends, season 3
Books: Liar's Poker, by Michael Lewis. Carpe Diem.
|
|
|
|
|
I would suggest, Poe, Keats, Blake and Lord Tennyson. Heany is exceptional as well.
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Its worse to ask to ask. Just spit it out.
KISS "Keep It Simple, Stupid"
|
|
|
|
|
VectorX wrote: Its worse to ask to ask
It is an accepted universal trust that
"Ask, and it shall be given you;"
Vasudevan Deepak Kumar
Personal Homepage Tech Gossips
The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep!
|
|
|
|
|
Can I have £100 please.
------------------------------------
"Children today are tyrants. They contradict their parents, gobble their food and tyrannize their teachers. I despair for the future."
Socrates 400BC
|
|
|
|
|
You forgot the question mark (?) so its not a question therefor you will not be receiving anything sorry.
|
|
|
|
|
Vasudevan Deepak Kumar
Personal Homepage Tech Gossips
The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep!
|
|
|
|
|
Come on DD, you can think bigger than that:
Can I have $1 Trillion[^] please?
Simon
|
|
|
|
|
I am not a greedy man, and would not wish to bankrupt a fellow CPian, but £100 would allow for a rather fine meal!
------------------------------------
"Children today are tyrants. They contradict their parents, gobble their food and tyrannize their teachers. I despair for the future."
Socrates 400BC
|
|
|
|
|
Here (Probably)[^]
Hope this helps.
------------------------------------
"Children today are tyrants. They contradict their parents, gobble their food and tyrannize their teachers. I despair for the future."
Socrates 400BC
|
|
|
|
|
Probably not, mine is a server issue. Or servers rather, DHCP + ISA + Win2K3
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Just ask the Damn Question!
------------------------------------
"Children today are tyrants. They contradict their parents, gobble their food and tyrannize their teachers. I despair for the future."
Socrates 400BC
|
|
|
|
|
How many licks does it take to get to the center of a tootsie pop?
KISS "Keep It Simple, Stupid"
|
|
|
|
|
That reminds me of a joke that I can't post here (kid sister rule)
|
|
|
|
|
Mustafa Ismail Mustafa wrote: 192.168.1.30 (LAN) & 192.168.1.32 (WAN)
For routing to work, they will need to be on different subnets. So the default 255.255.255.0 wont work here. Try 255.255.255.8 (or 7 or 32, or 31, heck I cant remember now!).
xacc.ideIronScheme - 1.0 beta 3 - out now! ((lambda (x) `((lambda (x) ,x) ',x)) '`((lambda (x) ,x) ',x))
|
|
|
|
|
Can you suggest a site that can guide me on this? Google isn't being helpful by providing a zillion results
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Sounds like they will be in the same subnet. That will realy mess things up.
|
|
|
|
|
So I should take your and Leppie's advice and split them into two different ones?
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Make the first adapter 192.168.0.2 and the second 192.168.1.2 each with the subnet 255.255.255.0.
At the moment the server could be trying to get a resposne through the wrong nextwork interface and building up a queue of traffuc.
|
|
|
|
|
A number of things spring to mind:
1) The LAN and WAN cards should be configured into different subnets.
2) When you say you can't ping other computers, are you pinging them by name or IP address?
3) Using the router (now the other side of the firewall) to supply addresses to the internal network is going to take some work on the ISA server. I would suggest setting up a DHCP server on the internal network
4) Have you configured the computers on the LAN to use the ISA server's LAN IP as their gateway? Have you allowed the HTTP protcol from the internal network to the external network on the ISA server. Do the clients on the LAN have working name resolution for external hosts? If any of those answers is 'no', the clients won't be able to access the internet.
|
|
|
|
|
I got the DHCP working a while ago, and then I discovered that W2K3 can handle NAT/VPN routing all on its lonesome, so I've been busy with that. Alas, all my attempts have failed
Electron Shepherd wrote: 1) The LAN and WAN cards should be configured into different subnets.
Suggestions for the equivalent of a best practice address for the wan subnet or should I go with 10.0.0.1?
Electron Shepherd wrote: 2) When you say you can't ping other computers, are you pinging them by name or IP address?
This has been resolved now that the DHCP server is working, thank you
Electron Shepherd wrote: 3) Using the router (now the other side of the firewall) to supply addresses to the internal network is going to take some work on the ISA server. I would suggest setting up a DHCP server on the internal network
I guess 2 answers this one...
Electron Shepherd wrote: 4) Have you configured the computers on the LAN to use the ISA server's LAN IP as their gateway? Have you allowed the HTTP protcol from the internal network to the external network on the ISA server. Do the clients on the LAN have working name resolution for external hosts? If any of those answers is 'no', the clients won't be able to access the internet.
I have uninstalled ISA server for the moment, I figured installing and configuring the DHCP server first would be prudent. Would it be possible to set this up using W2K3's built-in Router?
If the post was helpful, please vote!
Current activities:
Book: The Gods Themselves by Isaac Asimov
Project: Hospital Automation, final stage
Learning: Image analysis, LINQ
Now and forever, defiant to the end.
What is Multiple Sclerosis[ ^]?
|
|
|
|
|
Hi, firstly please do not get the wrong idea, this is for good intentions,not spreading malicious software.
My school has over 300 computers connected to the network, and somehow they have ALL been infected with Conficker (the C edition). Unfortunately the schools IT manager recently retired and when it comes down to it I am the guy for fixing small IT problems.
We have already tried shutting down all computers and running the Microsoft Malicious Software Removal Tool (April 09 Edition) on each computer one by one. We have done this twice but obviously we are missing it somewhere and the dam virus keeps resurrecting and infects the whole network again.
My best guess is to somehow run the malicious software removal tool on all computers at once.
Does anyone know a way to copy and run a file from the server onto all networked machines?
I have full administrator access so thats no problem. Im just unsure of how to do this.
Thanks for your time in reading.
|
|
|
|
|
well I have been working on an assigment and it states::
A program has to be developed, and coded in C language, to decipher a document written
in Italian that is encoded using a secret key. The secret key is obtained as random
permutation of all the uppercase letters, lowercase letters, numbers and blank space. As
an example, let us consider the following two strings:
Plain: “ABCDEFGHIJKLMNOPQRSTUVXWYZabcdefghijklmnopqrstuvwxyz0123456789 ”
Code: “BZJ9y0KePWopxYkQlRjhzsaNTFAtM7H6S24fC5mcIgXbnLOq8Uid 3EDv1ruVGw”
The secret key modifies only letters, numbers, and spaces of the original document, while
the remaining characters are left unchanged. The document is stored in a text file whose
length is unknown.
The program has to read the document, find the secret key (which by definition is
unknown; the above table is just an example and it is not the key used for preparing the
sample files available on the web course) using a suitable decoding algorithm, and write
the decoded document to a new text file.
And I know that I have to upload an English dictionary into the program but I don't why it has been asked.(may be not in that statement but I have to dO THAT). My question is , while I can do that program using simple encryption/decryption algorithm then what's the use of uploading the english dictionary in our program? So is there any decryption algorithm that uses a dictionary to decrypt an encrypted file? or can somebody tell me what approach or algorithm should I use to solve that problem???
An early reply (and also authentic one) will be highly appreciated from you.
Thank you guys.
|
|
|
|