Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Software-Other

37K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hi all

I monitor my customers internet connections with PRTG and I am seeing spikes in outbound data.  It seems to be affecting about half of the connections I am monitoring.  It has been noticed because it saturates the upstream on some ADSL circuits providing VOIP, dropping calls.  

I have a customer with two networks, 1 voip and 1 data.  strangely, the bandwidth peaks affect both at the same time.  Then I noticed that it affects other customers at the same time!  I considered whether it is my monitoring platform, but some customers don't have them.    Attached are some graphs, with pink being the outbound data usage.  

The graphs show outages as a series of red dots, but I don't know if the line is down or whether it is simply that the upstream data is saturated so the usage data gets lost or the monitoring software times out before the SNMP response gets there.  

So for the purposes of this, please view the high upstream data and the outages as the same thing.  You will see that the times correlate across all the graphs, approx 9:05, 9~:30-9:45

Any suggestions as to what it is or even better - any ideas to prevent it would be greatly appreciated.  

The routers are all Cisco 867VAE, 887VA or 2821 and I use SNMP to monitor them.
Experts-Exchange-Graphs.pdf
0
Concerto's Cloud Advisory Services
LVL 4
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

1
Greetings! I'm trying to figure out which machines have ccleaner (and will be used to find other software), but when I run this script it creates a csv, but does not write anything to it. Any help here would be greatly appreciated it! Server 2012 R2.

$OutPath = "c:\software.csv"
$Software = "*cleaner*"

$Computers = Get-Adcomputer -Filter *
foreach ($Computer in $Computers)
{
$Ping = Test-Connection -ComputerName $Computer.Name -Quiet -Count 1
if ($Ping -eq $true)
{
try
{
$MachineName = $Computer.Name
Get-WmiObject -Class Win32_Product -ComputerName $computer.name -ErrorAction Stop | ? {$_.Name -like $Software} | Select-Object @{N="ComputerName";E={$Computer.Name}},Vendor,Name | Export-Csv $OutPath -Append
}
Catch
{
Write-Host "Unable to Obtain WMI Object of $MachineName"
}
}
}
If ($Ping -eq $False)
{
Write-Host "The $MachineName is not pingable"
}
1
I use Adobe acrobat XI Pro version 11.0.22 extensively

Have vba code that edits (E) acrobat files adding headers and footers and shrinking file sizes

I understand that Adobe will stop supporting this software on October and they recommend an upgrade

Any advice on the upgrade - how will it affect my code applications?

Examples are

--------------------------------------
Option Compare Database
Private Declare PtrSafe Function GetWindowText Lib "user32" Alias "GetWindowTextA" (ByVal hwnd As LongPtr, ByVal lpString As String, ByVal cch As LongPtr) As Long
Private Declare PtrSafe Function GetNextWindow Lib "user32" Alias "GetWindow" (ByVal hwnd As LongPtr, ByVal wFlag As LongPtr) As Long
Private Declare PtrSafe Function GetTopWindow Lib "user32" (ByVal hwnd As LongPtr) As Long
Private Declare PtrSafe Function FindWindow Lib "user32" Alias "FindWindowA" (ByVal lpClassName As String, ByVal lpWindowName As String) As Long
Private Declare PtrSafe Function PostMessage Lib "user32" Alias "PostMessageA" (ByVal hwnd As LongPtr, ByVal wMsg As LongPtr, ByVal wParam As LongPtr, ByVal lParam As LongPtr) As Long

Private Const GW_HWNDNEXT = 2
Private Const WM_CLOSE = &H10

Public Function MakeEvenPageCount(ByVal SourcePath As String, ByVal SourceFileName As String, ByVal DestPath As String, ByVal DestFileName As String, ByVal FrstPg As Double, ByVal MaxNoPgs As Double, ByVal FileNo As Double, ByVal DoYouWantToSendToPrinter As Integer, ByVal FontSize As Integer, ByVal 

Open in new window

0
Hi Experts,

1. In what kind of environment , would we need to manage SSH keys?  
   Is it when we have multiple users sshing into any network device/Servers ?

2. Is there any software , that can be used to centrally deploy  different SSL certificates , and manage them (as in inform the admins about the date of expiry , etc.)


Thanks,
T
0
Hey guys,
I have a client of mine that is looking for a software, app or website in which you can put in multiple locations to visit and that automatically draws out a map based on the destinations and makes it time saving as possible, for example if you have two destinations to go to in Las Vegas and then one in California and you live in Arizona, it would take you to the two places in Las Vegas and then California, instead of going from Arizona to Las Vegas, then to California, then back to Vegas for the other destination.  I research this and found that you can create a map of multiple destinations on Google Drive, but this requires you to plan it out manually so this is not what she is looking for.  Any  suggestions?
0
How can I get an sap fico demo cd's or download for training?
0
I've installed the latest TightVNC (32bit) on my Dell Win 7 32bit as well as on
another laptop Win 7 64bit.   TightVNC service is started

In both cases, when I tried to launch them, nothing happens.  Windows
Firewall was permitted during installation.

'netstat -ano | find "pid_of_tightvn" '
shows TightVNC processes are listening on Tcp 5800 & 5900
& telnet localhost   5800  or  5900     connects

what did I miss
0
one of our network guys changed the ISCSI software adapter on a host to the iscsi path of a san. how can it be changed back to the orginal.  It was origininaly something like iqn.1998-01.com.vmware:esx-79cf2f59  now its iqn.2011-06.com.sansdigital:sansdigital-000c28521:target2

I have disabled it and rebooted the host and attempted to add a new ISCSI software adapter but then it just re-adds the SANS digital. Since he has done this, now LUN's are presented.
0
Folks,
Good evening to all. I have a desktop workstation and a new laptop, both pc's. I would like to be able to have the new pc "shadow" the desktop PC. This would be like the desktop pc would be the master and the laptop pc would be the slave. I do a lot of work on the desktop and would like the laptop to mirror the master. All I would like to do then is click on an icon that would then update the laptop from the desktop using wireless technology. Possible, and if so what would be some good software for this?
0
Will your db performance match your db growth?
LVL 3
Will your db performance match your db growth?

In Percona’s white paper “Performance at Scale: Keeping Your Database on Its Toes,” we take a high-level approach to what you need to think about when planning for database scalability.

We have several Remote Desktop Servers (Windows 2008R2) that are optimized as much as we can for the time being. We have budgeted for upgrades but in the mean time, has anyone used RDP Acceleration software such as Ericom, etc with any luck?

Can anyone recommend such a product?
0
CyberNewsRundown.jpg
Cyber News Rundown: Edition 9/15/17

German Voting Software Raises Concerns

With German elections only a couple weeks away, researchers have been working to determine how secure the voting systems really are. Per a recent study, the software being used contains multiple vulnerabilities that could lead to devastating results if the election is compromised. Meanwhile, the software creator maintains there is nothing wrong with the system and any tampering would only lead to confusion, rather than truly affecting the vote’s outcome.

Upgraded Android OS Slows Tide of Overlay Attacks

While overlay attacks are nothing new to Android™ users, the Toast window is a surprisingly fresh take on this technique. Google has already patched the issue being exploited, but many users unintentionally fell victim and gave permissions to a malicious app using the Toast window overlay on a legitimate page to spoof the users input. This type of attack can range from simply installing an annoying piece of malware on the device, all the way up to locking the device down and demanding a ransom.
1
I was looking for assistance in customizing the Software compliance - 1 and 3 reports.  I do not want it to prompt for collection ID or software update group.  I want to specify in the report the collection ID and Software update group so i can save each one individually and set up subscriptions to have them emailed to the site leads for each location(collection) every month.
0
Have you ever run into that annoying problem where the computer won't boot? Wouldn't it be great if you had a tool that would make that disk boot again? I have found one tool that works more often than not ...
0
Hello everyone,

can someone provide the name of a software or a link to a web site for a legal lease commercial and residential lease document.

I need to create/write/edit legal commercial and residential lease documents.

thank you,
0
Quickbooks error 176109
POS 1855-924-9508 associates customer to QuickBooks POS Error. Our POSAdvisors are availble round the clock and can resolve any blunder occuring in QuickBooks bookkeeping programming. Every one of the renditions of QuickBooks and empower customer to pick up the most extreme out of their venture.
0
What steps need to be followed so that I can make the far left hand Outlook 2016 column larger (so that the People icon at the bottom of the column) will also display (see the screenshot).

Currently when I drag this column to make it larger it always reverts back to this smaller size.

How can I make this column permanently retain the larger size?

Left Outlook pane
0
I changed my default printer and now MAS90 will not save the printer selection or recognize the windows default printer, it keeps trying to fax! It will hold the printer selection, and then after closing the software and opening, it defaults back to fax.
I just changed the Xerox PCL driver to a Universal PS driver as recommended by Xerox(to resolve a notification freezing issue) and now this.
0
I am working on a program in the CAPS (claim medical processing system) software.  It allows the user to enter claim information.  In the program claim information is written to files.  Before the claims entry screen is displayed, the program creates a backup of all the information for the patient.  This involves making copies of data in 5 different files in qtemp.  

If the user decides not to continue with the claim and backs out, the program removes all of the information in the 5 files for the patient being processed.  It then copies back the data that had been saved.  The problem with this is that on more than one occasion the claim entry screen ended before the information was copied back.

My manager has selected that we try commitment control.  But from what I have read this may not be the best choice.   Can anyone tell me if I am correct or can this be used?

Thank you
0
Enterprise Mobility and BYOD For Dummies
LVL 4
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

I am trying use the PAL software to generate a report from a .blg file that has multiple counters but, the report is only show %processor time. What setting am I missing to process all counters?
0
Hi there,
We have a customer who is using a software provider who's product is hosted in the cloud. Basically the customer has a reporting tool that they would like to connect to the back end of the software to interrogate and pull data out. The software provider wont allow this, but they are going to setup a WCF service which pulls the data out of their SQL server, and makes it available to the customer. What we need to do is create a WCF client that can connect to the WCF service, and pull the data out (ie daily), and then we would like to store the data in a local SQL DB, where the reporting tool can interrogate. Any thoughts / tips on this?
0
I have a Smoothwall firewall running the latest edition of software, Kenilworth.  Students have been discovered using an https proxy bypass site to get around the firewall.  How do you determine the port the bypass site is using so you can block traffic to disable it?  The specific site is https://xvpn.io.
0
i just wanted to know Which one Performance testing tool is better: Loadrunner or JMeter?
0
After running the ipconfig/all command I discovered that one of the network adapters is the "Microsoft Wi-Fi Direct Virtual Adapter"?

What is the "Microsoft Wi-Fi Direct Virtual Adapter"?

Wi Fi virtual adapter
0
OST to PST Converter - Convert OST to PST with Ease supported with MS Outlook up to 2007


Click Here to Download Free OST to PST Converter

OST to PST - Convert OST to PST with A Reliable OST to PST Software -  OST2PSTYou cannot convert an OST file to a PST directly, There is security in place that ties the Exchange mailbox OST file, and MAPI profile together. You can Convert OST to PST file easily by use Third Party

check-saving-process.gifFreeware Download OST to PST converter to convert your OST files into PST format easily and flawlessly.

If you are wondering why would you need to migrate from OST to PST, imagine you are working in a company where you are using Outlook with an Exchange server. Now in case you plan to leave the organization, you won't be able to access the data contained in the OST file and the reason is very simple. The OST  (offline storage table) files can only be accessed by the same computer and with the same email profile which was configured earlier with the Microsoft Exchange server. And if you are no longer the part of exchange server you cannot open/access the Outlook file. The only thing you can do is that you can recover your mailbox data by converting OST file into PST format. Once the OST files are converted into PST format the MS Outlook can open the files with ease.

 

0
 
LVL 10

Expert Comment

by:Jason clark
Thanks for sharing this helpful utility, As I have also found a Best OST to PST converter, which enables you to convert Corrupted or Orphaned OST file to PST format. Software can easily convert OST file of Outlook 2016, 2013, 2010 & all below versions to PST file format.
0
 
LVL 15

Expert Comment

by:Ajit Singh
You can convert OST to PST by using:

Import and Export
Drag and Drop
Archive

Detailed way to Convert OST to PST file manually: http://expert-advice.org/2016/11/convert-ost-file-to-pst-file-manually/

Few more OST to PST conversion tools out there you can check:

https://www.nucleustechnologies.com/convert-ost-to-pst.html
http://www.osttopstconverter.recoveryfix.com/
http://www.ost2.com/

Thanks,
0

Software-Other

37K

Solutions

38K

Contributors

Software is any set of instructions that directs a computer to perform specific tasks or operations. Computer software consists of programs, libraries and related non-executable data (such as documentation). Computer software is non-tangible, contrasted with computer hardware, which is the physical component of computers. Software written in a machine language is known as "machine code". However, in practice, software is usually written in high-level programming languages than machine language. High-level languages are translated into machine language using a compiler or interpreter or a combination of the two.