Viewing 6 posts - 46 through 51 (of 51 total)
If you can do inclusive firewalling (limiting the access to a limited IP set), then do that.
It gets round the issue of having external addresses spoofed, or proxied through compromised...
February 2, 2005 at 3:52 am
1x Athlon 64 3200 dual boot between Win2k and Fedora Core 2.
1x Athlon XP 2500+ running Fedora Core2, Free BSD or Win2k (depending on which drive it has in it....
January 28, 2005 at 2:23 am
1x Athlon 64 3200 dual boot between Win2k and Fedora Core 2.
1x Athlon XP 2500+ running Fedora Core2, Free BSD or Win2k (depending on which drive it has in it....
January 28, 2005 at 2:07 am
I'm definitely in the camp of 'Keep them Seperate'.
Over time, applications become legacy, are discontinued, or simply rewritten with new objectives. Sometimes, things simply go wrong with a database.
With...
January 27, 2005 at 9:38 am
The question seems to be flawed.
As stands, it ends with the keyword 'SUM', which is invalid, and would raise an error.
Selecting it as 'Sum' would be different, and would achieve...
January 26, 2005 at 4:17 am
Are you using fully qualified domain name for the address?
For IP address, are you using the name, or are you using the numeric IP address to access the server in...
January 6, 2005 at 5:02 am
Viewing 6 posts - 46 through 51 (of 51 total)
This website stores cookies on your computer.
These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media.
To find out more about the cookies we use, see our Privacy Policy