Quantcast
Browsing all 183026 articles
Browse latest View live

Managing multiple web domains in Spiceworks

Hi, As an MSP, I'm starting to look at managing the domain renewals for all our clients through spiceworks. Initially the idea is great with the system highlighting when they are within their 60 or 30...

View Article


Question about Canon iR C6800 06.03

what about the canon ir c 6800 model for colour copier

View Article


MODX Object Names and Keys: A Source of Confusion

The names and primary keys of MODX objects can be frustrating to new users trying to write MODX PHP code to work with them. Most MODX objects have a primary key called id, but some don’t. You can also...

View Article

Double count on validate

Hello,I have a problem.I am using thecount function.Here's an example:if (count(zzz[xxx==input.xxx])>0){double =true;}But nowI have anotherneed.Ineeda double conditionthatoccursin the same...

View Article

Disable User Registration in Joomla 3.0

This tutorial is about how to disable user registration in Joomla 3.0. This is useful when you are developing private websites to not allow user registration, also to prevent spammer’s registration....

View Article


Red Hat Questions

A client has a Red Hat Linux-based firewall that is multihomed and connected to both the internal (eth0 192.168.0.1) and external (eth1 69.25.33.245) networks. They would like you to configure this...

View Article

Mass Watermark for PC - 50% Off

On Saturday 29 Jun PST you can get Mass Watermark at a reduced price. Our price: $15List price: $30.00You save: 50% If you're thinking about putting your images on the Internet, you need to take the...

View Article

VPN Question

A client has performed some network maintenance on their side and, as part of the change, has modified the IP address of some of the servers we connect to, causing us to lose access. Our VPN tunnel...

View Article


Red Hat Enterprise Linux 6 with a single public network interface

Current setup: A server is running Red Hat Enterprise Linux 6 with a single public network interface, containing one IP for the server and two virtual IPs for services running on the server. Desired...

View Article


Adnoc Cautions Employment Hunters about Scam E-mails Offering Work

Adnoc (Abu Dhabi National Oil Company), most prominent oil company in the world and situated at Abu Dhabi is cautioning employment seekers about one scam e-mail promising work inside its establishment,...

View Article

how to read messsages on other computer

how can I read messages on other computer on my network

View Article

Carberp Trojan’s Source Code Revealed Online

Security Company Group IB, of late, had reported about Carberp, the Trojan whose source code appeared on different hacker websites for sale although, it was distributed through one folder which was...

View Article

network printer

HI IT toolbox members need some advice regarding about network printer,i have 3 notebook win 7 using wireless all notebook are dynamic address,a cannon 2800i printer with static IP address...

View Article


network printer

HI IT toolbox members need some advice regarding about network printer,i have 3 notebook win 7 using wireless all notebook are dynamic address,a cannon 2800i printer with static IP address...

View Article

Achievement Unlocked!

I just spent 30 long minutes walking my computer-illiterate, 71 year old mother through the process of doing a system restore on her home computer. I need some sort of badge. :)

View Article


This Week’s Five: Arm Your IT; Secure Your Network

This Week’s Five: Arm Your IT; Secure Your Network This Week’s Five  is a weekly column of five interesting reads from all over the web, with a different topic each week. The Optrics Insider - Insider...

View Article

How to monitor users logging in to the server?

I want to have informations of all people, when they logged on to server and when they logged off in an easy to use graphic interface. Does that kind of application exists?

View Article


Anatomy of a browser trick - you've heard of "clickjacking", now meet "keyja...

An Italian security researcher has rediscovered a trick known as "user interface redressing" and used it to detail some potentially risky behaviour in IE 8. Paul Ducklin takes a look to see just how...

View Article

Temporary folder sync between domains

We are migrating domains, and need a solution that will allow us to sync a folder from the old domain to the new domain: Due to security policy we can not build a trust ( Easiest answer) so what I...

View Article

Ashampoo Burning Studio 12 DISCOUNT: 70% OFF Coupon Code

Please note folks: Don't miss Ashampoo Burning Studio 12 DISCOUNT (70% OFF) because this offer is avaliable for a short time. Ashampoo Burning Studio 12 handles all types of optical burning chores...

View Article
Browsing all 183026 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>