IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi Experts,
the print screen key stopped working on my pc.
any suggestion?
preferably something that does not require restarting my pc...
thanks in advance.
fyi- I'm connected remotely thru gotomypc, however pass special keys to host is checked off.
0
Redefining Cyber Security w/ AI & Machine Learning
LVL 1
Redefining Cyber Security w/ AI & Machine Learning

The implications of AI and machine learning in cyber security are massive and constantly growing, creating both efficiencies and new challenges across the board. Join our webinar on Sept. 21st to learn more about leveraging AI and machine learning to protect your business.

In ubuntu 16:
it's added a wrong file in /etc/sudores.d/ folder.
I can't do sudo form any user. I can't do any thing.
How can I remove this file from folder sudores.d.
can I remove file if I login in as recover mode?

HELP
0
Can you see if reasonable to have 2-post rack this way?  Attached.  Any other pros/cons please?  Designing server room/lab.

 rm33
0
Hi Experts,

I have been approached by a group of 8 companies to provide for them an information exchange portal. Here they would store files, documents and posts, organized by category and sub category, and a bulletin board with latest news and events posted by the users.

The companies indicated that SharePoint wont’t work because the each have their own domain, and they need this solution to be independent from any of them. They also want to restrict each company to 3 users, and if another company wants to join, the admin of 3 other companies need to approve.

My question is - would this be a development project (I'm a PHP developer); or a sourcing project, where there is something pre-made that can be adjusted? What would a  bull park cost be for this?

Thank you.
0
I have a user who is running WIN 7 IE 11.  From time-to-time when they browse to a website that requires them to supply their domain credentials the dialogue box that generates contains credentials from a previous user and they must always select "Use another account".  I've reviewed Windows Credentials Manager but that doesn't contain the account to remove.  What we've noticed is that there's no Windows profile for the previous user.  Its as if they remotely accessed the PC (possibly someone from the local Helpdesk), supplied their credentials, and now IE has them cached somewhere - I'm just not sure where.

My next step was to review the registry and see what pops up.

Any thoughts?
0
Please provide me with guides on using System Center Configuration Manager 2016 (SCCM)  to deploy software such as Chrome, Acrobat Reader, & 7-Zip to clients.
0
trying to reach to the companyname.com, using ping companyname.com

This domain is hosted by goddady.com

it was hosted my email myname@companyname.com
now I can send but cannot receive any more.  bouncing back..
Cannot resolve using nslookup either.
email hosted outlook.office365.com

The error is "Domain unavailable"
The domain is not expired (it expires in 2019)
however non-pingable and cannot resolve..
What could be an issue?  Please help troubleshoot..
0
Linux admin supporting Macs.  I have a good Linux helpdesk candidate that will be require to support Macs in the future as well.  Would that be a huge knowledge curve for a good Linux admin to support Macs?  He claims almost 0% mac knowledge.
I know Linux guys very intuitive supporting Networking stuff (Cisco, etc.)  Not sure about Mac OS tho.
0
When taking on a new account, how do you transfer 365 from one MSP to another or do i need to migrate the accounts? Customer does not control the 365 account.
0
Dear Experts

installing SAP ERP on-premise or on cloud recommended, if we go for on-premise what would be best way for business continuity  and recovery, is it recommended interbranch for DR and recovery or cloud please suggest the best recommended.
0
Cloud Class® Course: MCSA MCSE Windows Server 2012
LVL 12
Cloud Class® Course: MCSA MCSE Windows Server 2012

This course teaches how to install and configure Windows Server 2012 R2.  It is the first step on your path to becoming a Microsoft Certified Solutions Expert (MCSE).

Hello I have configured my PDC server as an NTP server to sync its time to NTP.org  zone servers and apply throw GPO but my clients in domain didn't sync their time with PDC when I run w32 time query status in client Pc it gives me error although I have give access of NTP.org  URL access to my PDC throw Sophps XG firewall please help
0
Anyone has any experience with these flat CAT6 cables?  Are they god enough for users' desks?  
https://www.amazon.com/Cat-Ethernet-Cable-Black-Pack/dp/B01IQWGKXE/ref=sr_1_5?ie=UTF8&qid=1529696113&sr=8-5&keywords=ethernet+cable+5ft+flat
0
Looking for a small business IT consultant to fill in for me when I am away on vacation or attending seminars.  I have a small client base of 6 small businesses that may need attention while I am out of town.  I currently use Projent remote support for this need.  However, should there be a need for an onsite visit they do not have local availability since they are based in California and all my clients are located in Hampton Roads, Virginia.

Even though Projent support is great, the fact they cannot offer onsite support if needed to could a major issue.

I also tried working with another local IT consultant that is also a one man shop, and we scheduled all the days I would be gone so he could cover for me during my absence.  I then contacted him to remind him to cover for me since I was going to be out of the country, and he stated he could not help even though we discussed it prior and agreed on everything.  I even was going to cover for him as well.

Let's just say this experience was horrible.  I am trying to avoid that this year.

I also contacted other IT support companies within the area, they either would not be able to assist but were willing to take the client.  Another thing that concerns me is if the person or company decides to try and solicit  their services over mine therefore taking my client.  I do have a non compete clause that should minimize this sort of situation, but its not fool proof.  Any suggestions...
0
Hi Anyone,

My boss want me to define all the users (about 20,000 domain member) which member of group (about few 1000 groups) we've in our enterprise domain to come with a accurate user domain permission matrix.

What should I do as I'm very new to the enterprise domain network and not very good in writing script like using powershell or never work in the enterprise network before.

What is the best suggestion for me in order to complete within 1 days as my boss requirement.

Anyone can help.

Tks.

Lucky
Access-Matrix-v2.xlsx
0
I cant send email to one note

I have office 2010

I see all tabs in my one note , can create ne wpage manually but cant send

it gives error

one note cannot create page in new destination, it may have been deleted, password protected?
0
Why has Adobe Send and Track stopped working in Outlook?
0
After being hit with Ransomware, restoring from backup, and reinstalling applications as needed, I can't get the Quickbooks Database Server services started or the Quickbooks Database Server Manager to run. When I browse for files and 'Start Scan", it attempts to start the services after browsing the files, finding Quickbooks files. It claims the folder in which the company files live isn't shared. I guess that's technically true, but the directory one level up IS shared, so it's possible to browse to it from a network share. Then it tells me it is attempting to resolve Networking issues, and tells me after that to resolve network issues and try again later (not the exact syntax, obviously).

I have tried installing just the bare server (what we had done in the past), installing the full version of Quickbooks (2016 for the moment), uninstalling, rebooting the server (2008 R2), reinstalling just the database server, using the Quickbooks clean boot utility, disabling ALL firewalls (Kaspersky and WIndows Firewall), I can't get the QBDbMgrN to start and stay started. I can't get the QuickbooksDB26 started. For some reason it claims to be a service that should be started manually. I don't recall that having been the case in the past.  Also,  I don't think the QuickbooksDB26 ever disappeared, even after a clean install (using the Clean Install tool), an uninstall, and/or a reboot.

Previous to the ransomware, the server had Quickbooks 2015 and 2017 database servers installed. …
0
Running Exchange 2010 with MS outlook 2010
 I have a share mailbox call  (sharemailbox1@domain.com) in my inbox has an auto forward all mails to my inbox.

what I need is a rule that will move (filter) the email that is auto forwarded to a specific subdirectory in my personnel inbox in  Outlook 2010

Screen shot attached.
this-message-was-autoforward.PNG
0
Dear Experts

Would like to understand why online ups is recommended for server what happens if offline ups is used, please help me to understand
0
Cloud Class® Course: C++ 11 Fundamentals
LVL 12
Cloud Class® Course: C++ 11 Fundamentals

This course will introduce you to C++ 11 and teach you about syntax fundamentals.

Wanting to know about functionality and benefits/disadvantages of having multiple domains in one Office365 account.
I have a client that has several businesses, hence they have several domains. Currently only one business is using Office365 for email.
I'd like to know if there are benefits/disadvantages to having another or all domains in the same Microsoft Office365 Account.
These business do interact, but are somewhat separate, which complicates things like admin permissions.
Things that come to mind are things like, but not limited to seeing others in the GAL, calendar/contact sharing, user management, etc..
0
Dear Experts

We have mounted 2 nos of Dell Poweredge R730 with dual hot plug, redundant power supply (1+1) 750W and one L3 switch and one router to expect 4 hours power backup how much capacity UPS is required i,e 750W * 4 = 3000W and other network equipment's Router, L3 swtich auraba in total 3500W not sure if this how to calculate please suggest how much capacity of UPS required and for the backup of 4 hours and also how much capacity of power socket 15Amps or 20Amps for the power chords to connect.
please suggest
0
Trying to write an Exchange 2010 Transport Rule that will warn users if someone is attempting to impersonate a real AD/Exchange User.  IE, sender's EMail is liar@gmail.com but sets his text name to be John Smith, who is the president of the company.  So the inbound message is from John Smith <liar@gmail.com> when the correct sender would be John Smith <jsmith@real_domain_name.com>

I've created a Transport rule that checks:

- If inbound message is from a user that is outside the organization
- And sender's properties firstname is John
- And sender's propoerties match text pattern of lastname is Smith
- Then prepend message to EMail's Subject warning recipient

Had to add two conditions because if I put firstname and lastname in the sender's properties line, it made an OR statement instead of an AND statement

Note, can't just block liar@gmail.com, since the actual source address changes.

Not sure if this rule is working, or if GMail and other mailers always use what appear to be Active Directory fields of firstname and lastname.

Is there a better way to do this?

Thanks,

Nathan
0
Hello experts. We use time clock plus v6 and our admin left us high and dry. In tcp we have various departments (department 1, 2, 3 and so on). What I can't seem to figure out is how to add a specific department to a specific code. In this case we have a code defined as "paid break". I want to add Department 8 to the "paid break" code. Can anyone assist?
0
How can I use RDP (MSTSC.EXE) to log on to server as if you are at the console? I am looking for a way to modify the .RDP so when I execute the remote desktop to a server, the login page is pulled up so i can type my credentials in or use a digipass (vasco) alternative. I also use HP RGS to get into servers and blades, but the version in my environment is buggy and needs to install a client ... but it does accomplish the type of login behavior I am looking for ... when it works. I know that the .rdp file can be modified with a text editor, but I have not had any luck with the settings I have.
0
We use five 9 for our main call center and we want to expand to another state but we just want to hire someone or company that take the inbound call and out bound call using five 9

Do u know any call call can do this?
0

IT Administration

6K

Solutions

8K

Contributors

IT Administration is the processes and best practices for programming and development, and incorporates methodologies for managing activities and projects. Common methodologies include waterfall, prototyping, iterative and incremental development, spiral development, rapid application development, extreme programming and various types of agile methodology. The life-cycle "model" is a more general term for a category of methodologies, and a software development "process" a more specific term to refer to a specific process chosen by a specific organization.