|
Can you fill us in a bit more on how the network is configured?
And why some of them can't see each other?
Love your sig by the way.
|
|
|
|
|
PC A is in domain A. PC C is in domain C. Domain C is a "Secure Network" wherein only authorized people can access the domain. PC A is sort-of a "Public Domain".
PC B is sort-of a "gatekeeper". In order to access computers on Domain C, you must first connect to PC B.
So if I'm using PC A and I want to transfer files to PC C, I must first need to copy the files to PC B, and instruct PC B to transfer the files to PC C.
Any suggestions?
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
|
|
|
|
|
I assume that PC B is having two network cards with one card connected to network A and the other card to network C. And that PC B is belonging to either or neither domain. But the fact that computers in both domains are having access to the "Bridge" computer makes the whole concept doubtful at the best...
I would have a talk to the network architect how you're supposed to use the network. Until then you can take a look at Robocopy which is a standard feature on Server 2008 and available in the resource kit for the prior versions. Run robocopy /? for some help on the usage. An interesting feature is the /MIR switch
|
|
|
|
|
You got it exactly right.
Right now I am using PSEXEC but I am thinking of developing a remote execution tool.
It is said that the most complex structures built by mankind are software systems. This is not generally appreciated because most people cannot see them. Maybe that's a good thing because if we saw them as buildings, we'd deem many of them unsafe.
|
|
|
|
|
I just don't see the point with a "secure network" if you want to be able to remote execute from the outside.
I would exchange this "PC B" for a firewall that is closed for everything on the outside, and allow a limited amount of services to access the outside to FETCH files.
|
|
|
|
|
it storngly depends on the network design
it might that there is a problem in connecting pc A and pc B
i think that it`s good to chek the connections first
|
|
|
|
|
You're trying to violate the security of a network that is designed to prevent you from accessing it. There's probably a good reason for that. The "right" way to do this is to establish trust relationships between the two domains, but your admin has chosen not to do so. It may be that, though it is inconvenient for you, the best choice for your organization is to continue using the tedious method. Another choice might be to establish an account in the remote domain for yourself that includes transferring files into the domain from outside. Remote Access priveleges can be established that will allow you to log on to the other domain from the local and make transfers oer that connection.
"A Journey of a Thousand Rest Stops Begins with a Single Movement"
|
|
|
|
|
Hello all,
I need help with Virtual PC 2007. I got virtual PC created by someone else. The virtual PC has SQL Server 2005 in it. I want to install Visual Studio (Trial version) from a CD. I already installed on my laptop, but I want to know how to install on virtual PC.
I tried to share the DVD folder from the laptop and thought I can just install from the Virtal PC, but it just shows the files from the folder.
Can anyone help me in this. Please let me know if the question is not clear.
Thanks
Mark.
|
|
|
|
|
Why not just stick the DVD in the drive and open it in the virtual machine?? By default, any hosted OS gets access to the host systems CD drives.
If you've turned this option off, just go to the CD menu of the virtual machine's host window and click on "Use physical drive driveLetter" to capture the CD/DVD drive for the virtual machines use.
This is all clearly spelled out in the documentation (Help menu/Virtual PC Help), under the "How to Help for Virtual PC" section.
|
|
|
|
|
Hi Dave,
Thanks for the reply. Your answered helped me to verify the CD options, there was check box to use as secondary. I unchecked it and re-started the VPC and it recognised the CD auto-run and i m able to installing now.
Thanks
Mark.
|
|
|
|
|
So I have two domians:
abc.co.uk
xyz.co.uk
abc.co.uk is set up and works fine on a Windows 2003 server - I can browse to it no problem.
I want to set up xyz.co.uk as an alias to abc.co.uk
Why is Googling this so hard? Anyway, I tried this:
Opened Admin tools / DNS
Expanded "Forward Lookup Zone"
Selected "abc.co.uk"
Right-clicked, selected "New Alias (CNAME)..."
Entered "xyz.co.uk" in the "Alias name" box, and "www.abc.co.uk" in the FQDN box (selected via "Browse..." button)
Didn't work.
Anyone know what I am supposed to do? Many thanks...
|
|
|
|
|
It's kind of the opposite way around.
You have to create the zone xyz.co.uk and create an alias that's pointing towards abc.co.uk...
|
|
|
|
|
"Kind of the opposite"...huh..? Come on, be nice to me!
So now I have a new zone, xyz.co.uk
..and do "kind of the opposite" to before:
Still doesn't work.
I suppose it doesn't help that the terminology is somehat alien to me... sysadmin is not my forte, to say the least. But this is a simple enough task, surely - there must be a simple set of steps to follow....
So I have "zones" (whatever the <beep /> they are) for both abc.co.uk (the site) and xyz.co.uk (to be the alias)... please, now what?
|
|
|
|
|
|
Jesus H Christ, do people actually read that sort of stuff, much less understand it? I absolutely refuse to believe things need to be even half as complicated...
Anyway, thanks... got something working by ignoring DNS altogether in the end, and just setting "Multiple identities for this website" in the advanced website settings in IIS manager! Seems to work, except not for subdomains, which is a bit of a nuisance but not critical at this stage..
|
|
|
|
|
Phil Uribe wrote: do people actually read that sort of stuff
I don't suppose it is reaches the all-time sellers listings
modified 1-Aug-19 21:02pm.
|
|
|
|
|
Phil Uribe wrote: Jesus H Christ, do people actually read that sort of stuff, much less understand it?
Actually I prefer the books from Microsoft press.
|
|
|
|
|
Ok, so you have the zone abc.co.uk , in this zone you have the host (A-record) www which is pointing to 123.123.123.123, and by coincidence you happen to have a webserver on this ip-number.
On the same or different dns server you have the zone xyz.co.uk and you want the record www to point to the same server as in the abc.co.uk domain.
Then you have two choices, either make an A-record pointing the record www directly towards the ipnumber of the server or to create an alias (cname) that is pointing towards www.abc.co.uk.
The advantage of a cname is that if you change to a new server you only need to change the record in one dns-server.
Just remember to leave "host header value" in the IIS empty, as that will filter away all requests not having this value in the request.path
|
|
|
|
|
Dear All,
I am having difficulty in removing Vundo.gen.m from my system. I tried VundoFix, but didnt work.
Any help?
Best regards.
|
|
|
|
|
My experience of virus problems is that the best thing to do is just format the system and start again. Viruses are sneaky and once you have 1 it often opens up the doors for others. It's easy to get caught in a loop disabling one just to find you have 5 more hidden away.
If that isn't an option. Consider the following tips:
Start by downloading and running a full system scan using the latest version of an alternative virus checker. E.g. if you currently use AVG, try Avira or Avast:
AVG[^]
Avira[^]
Avast[^]
If they find anything, fix/quarantine and run a full scan again.
Get RootKitReveler[^] and run it.
Get Hijack this[^]. Run it an analyse the results.
If you don't understand the results of these tools, post them to a virus advice forum. There are loads of forums around that are dedicated to giving advice based on hijack this logs. (Don't post it here)
Both of these tools give advanced reports of the system. They are not automatic detection tools, they just give pointers to vulnerable or suspicious settings. Both tools are likely to find many results that are in actual fact harmless or windows components. Do not just blindly clean/delete everything found by these tools unless you understand exactly what you are doing.
CCleaner[^] is another useful tool that can help you disable auto start-ups and clean out unused/invalid/corrupt reg settings etc.
Consider reading and following the steps in this[^] article.
Good luck.
Simon
modified on Wednesday, November 5, 2008 5:22 AM
|
|
|
|
|
Suggest you delete SPAM mail rather clicking on their links.
modified 1-Aug-19 21:02pm.
|
|
|
|
|
Hi all,
I have created an Excel 2003 AddIn project and created one Setup project also for install the AddIns in target machines. My setup contains the primary out put of the AddIn project. I just came to know some registery entries are required for successful installation. Can any one help me in creating setup project with necessary registery entries.
|
|
|
|
|
I want to design a program, that can backup current system, and write the data to a bootable ISO file, and burn this ISO file to the DVD. Next time, if I want to restore the system, I can input this DVD disk to the DVD Driver and restart the system.
Then the computer can boot using this DVD disk and is loaded to my program to restore the computer.
But now I meet the program that I can not make the bootable file, a 2k size file. I search in the google, but I can not find the result. Does any one can tell me how can I write the bootable file and what type program can be loaded by bootable file.
thks.
|
|
|
|
|
You can start with reading this[^] and this[^].
Please tell us all when/if you succeed.
|
|
|
|
|