Type: Posts; User: waverebel; Keyword(s):
Search took 0.02 seconds.
November 4th, 2004 01:18 PM
It goes without saying if you are using outlook for you email disable all scripting.
This can be checked / configured in outlook as follows
Tools -> Options
Under the "Security" Tab
November 3rd, 2004 12:52 PM
for instructions on installing vmware tools on linux, it pretty strait forward.
I have not used X...
November 2nd, 2003 06:06 PM
I expect the answer is that you can't stop them editing it if you still want it to be usable, because the users shell has to be able to change it in order to store the comand history. If you are...
October 9th, 2003 11:33 PM
So if you don't press the shift key then the software is installed without your concent? hmm
Or is there a note saying that by playing the CD you concent to having thier software installed?
September 7th, 2003 07:07 PM
pixelrockchick, there are a lot of threads about good AV programs on this site, a recent one is http://www.antionline.com/showthread.php?s=&postid=659609#post659609
Also this is not a good place...
September 6th, 2003 10:31 AM
Thanks Nokia Wow sudenly AVG doesn't look quite so hot. I had a quick look on the pcplus web site and found the whole thing online as a PDF...
September 3rd, 2003 01:28 AM
Found this in the tutorials index
Also on the sun site
I would also...
August 31st, 2003 11:39 AM
I have had 2 maxtor disks fail on me, one in under 6 months. So when I next come to build a PC I will be using either segate or western digital.
August 21st, 2003 08:59 PM
<rant> I noticed this show up as an update this morning I think. I wouldn't mind so much if IE wasn't tied into other programs that I use like MSN Mesenger, why can't they use the default browser,...
August 14th, 2003 10:13 PM
Anyone with access to BBC 1, looks like they are going to do a peice on msblast in a few mins on the news
August 14th, 2003 08:48 AM
Sounds more like a job for perl if you ask me.
you will probably need to use the nbtstat command to get the mac addresses, some kind of loop
for %%a in (1 2 3 4) do nbtstat -a...
August 13th, 2003 03:28 PM
Have you tried using the Java Plug in item in the control panel that gets installed along with Sun JVM to set it as the default in your browsers.
At least I know it installs along with SDK, not...
August 12th, 2003 06:30 PM
I am having a similar problem, I have sent the AP back to the suplier.
Except I am using win2k sp4
A Dlink USB ext card and a I was using a 3COM office 11 AP
I have already reinstalled the...
August 7th, 2003 10:43 PM
There is some good info in there, could do with a bit of tidying up on the formating front, maybe an introduction/index, some references and whats the exercises at the end all about?
I don't know...
August 5th, 2003 02:41 PM
Thats a great link, and well worth the read.
August 4th, 2003 08:07 PM
Is it possible it could have been done remotely?, Normal printer bios flash is via a connection to PC is it not? I seem to remember doing one over the network once.
That does sound very...
August 4th, 2003 07:48 PM
I did a test of ISA server 2000 a while ago, from comparison with Squid (a linux based proxy) point of view. The main advatange for a windows network was the ability to grant deny access based on...
August 4th, 2003 06:17 PM
Thanks DeadCr0w, I suspected it was a the recent RPC thing.
They seem to be scans,
connect to [0.0.0.0] from pcp02763925pcs.grenwy01.pa.comcast.net [18.104.22.168]
sent 0, rcvd 0
August 4th, 2003 05:45 PM
At the moment I don't know what they are, I am picking up dropped TCP packets in my firewall log. I am going to firing up netcat to try and capture some traffic. They started getting more frequent in...
August 4th, 2003 05:32 PM
I have been getting steadily increased activity directed at port 135 over the last day. My firewall is now logging one attempt every couple of minutes or less.
Has anyone else noticed this...
August 2nd, 2003 03:19 PM
Not sure about the modem drivers , but I have used winroute pro quite successfully for both connection sharing and firewall duties. You can download it on evaluation from thier webby upgrade is via a...
August 2nd, 2003 03:03 PM
If this could be done would it not be likely that a stronger level of encryption would become standard and hence the problem re-occur.
ps good link
You should be able to boot from the CD drive instead, but you will need to alter the bootup sequence in the bios. You can get into the bios by pressing the 'del' or sometimes the 'F2' key just after...
I think this is interesting, there is an attempt here to try and solve a real problem. But I am sceptical about how well it will work in practice for many companies, mostly because of the existance...
The best way to find out is simply to ask them, say that you were following up on suspicious activity. Also if you think it is one of your users that has done this then you have a responsibility to...