Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
How To Configure Extended Access List?
1. Log into the router. 2. Enter the configuration mode. 3. Enter the command “access-list [number] [permit/deny] [source] [destination]” where [number] is the number of the extended access list, [permit/deny] is the action to take on the specified source/destination, [source] is the source addressRead more
1. Log into the router.
2. Enter the configuration mode.
3. Enter the command “access-list [number] [permit/deny] [source] [destination]” where [number] is the number of the extended access list, [permit/deny] is the action to take on the specified source/destination, [source] is the source address of the packet, and [destination] is the destination address of the packet.
4. Repeat step 3 for each rule you want to add to the access list.
5. Enter the command “exit” to save the configuration.
6. Enter the command “show access-lists [number]” to view the access list.
See lessHow To Open a Port In Symantec Endpoint Protection 14?
1. Open the Symantec Endpoint Protection Manager console. 2. Click the Policies tab. 3. Select the policy that you want to modify and click Edit. 4. Expand the Firewall policy and select Firewall Settings. 5. Select the Ports and Protocols tab. 6. Click the Add button and enter the port numbeRead more
1. Open the Symantec Endpoint Protection Manager console.
See less2. Click the Policies tab.
3. Select the policy that you want to modify and click Edit.
4. Expand the Firewall policy and select Firewall Settings.
5. Select the Ports and Protocols tab.
6. Click the Add button and enter the port number, protocol, and action you want to take.
7. Click the OK button to save your changes.
8. Click the Save button to save the policy.
9. Right-click the policy you just modified and select Deploy.
10. Select the clients you want to deploy the policy to and click OK.
11. Click the Close button to close the window.
How To Fix My Hacked Email Account?
1. Change your password - The first and most important thing to do if your email account has been hacked is to change your password. You should make sure to choose a strong, unique password that is not easily guessed. 2. Check for suspicious activity - After changing your password, you shouldRead more
1. Change your password – The first and most important thing to do if your email account has been hacked is to change your password. You should make sure to choose a strong, unique password that is not easily guessed.
2. Check for suspicious activity – After changing your password, you should check your account for any suspicious activity. Look for emails or files that you don’t recognize, or check your sent mail folder for emails that you didn’t send.
3. Enable two-factor authentication – If your email provider offers two-factor authentication, be sure to enable it. This will add an extra layer of security to your account and make it more difficult for attackers to gain access.
4. Contact your email provider – If you suspect that your account has been hacked, contact your email provider immediately. They may be able to provide additional security measures or help you recover your account.
5. Scan your computer for malware – If your email account was hacked, it’s possible that your computer is infected with malware. Run a scan with an anti-virus program to make sure that your system is clean.
See lessHow To Remove Macros From Excel?
1. Open your Excel document and click the "Developer" tab. 2. Select "Visual Basic" in the Developer tab. 3. In the Visual Basic window, select "Modules" in the Project Explorer window. 4. Right-click the module that contains the macro you want to delete and select "Remove Module" from the drop-downRead more
1. Open your Excel document and click the “Developer” tab.
See less2. Select “Visual Basic” in the Developer tab.
3. In the Visual Basic window, select “Modules” in the Project Explorer window.
4. Right-click the module that contains the macro you want to delete and select “Remove Module” from the drop-down menu.
5. Click the “Yes” button in the pop-up window to confirm your selection.
6. Close the Visual Basic window and save your document. The macro will no longer be available in the Excel file.
How To Put 2 Routers On The Same Network?
1. Start by connecting each router to the same modem or internet connection. 2. Configure the primary router with basic settings such as an IP address, subnet mask, and default gateway. 3. Set up the secondary router with a different IP address, but the same subnet mask and default gateway asRead more
1. Start by connecting each router to the same modem or internet connection.
2. Configure the primary router with basic settings such as an IP address, subnet mask, and default gateway.
3. Set up the secondary router with a different IP address, but the same subnet mask and default gateway as the primary router.
4. Connect both routers with an Ethernet cable, linking their LAN ports together.
5. Configure the secondary router to act as a “bridge” or “wireless access point” by disabling its DHCP server and enabling the “Bridge Mode” or “Access Point” feature.
6. Configure the wireless security settings on the secondary router to match the settings of the primary router.
7. Reboot both routers and test the connection.
See lessHow To Start Jboss Server In Windows?
1. Download and install the Java Development Kit (JDK) from the official Oracle website. 2. Download and install the JBoss Application Server from the official JBoss website. 3. Create a JBoss user to run the server. 4. Open a command prompt and navigate to the bin folder of the JBoss installation dRead more
1. Download and install the Java Development Kit (JDK) from the official Oracle website.
2. Download and install the JBoss Application Server from the official JBoss website.
3. Create a JBoss user to run the server.
4. Open a command prompt and navigate to the bin folder of the JBoss installation directory.
5. Run the standalone.bat script to start the server.
6. You can now access the server at localhost:8080.
See lessHow To Join Server 2019 To Domain?
1. Open Server Manager by clicking the Server Manager icon on the desktop or by clicking Start > All Programs > Administrative Tools > Server Manager. 2. Select Local Server from the left pane. 3. In the middle pane, click the link that says “WORKGROUP”. 4. In the System Properties window,Read more
1. Open Server Manager by clicking the Server Manager icon on the desktop or by clicking Start > All Programs > Administrative Tools > Server Manager.
2. Select Local Server from the left pane.
3. In the middle pane, click the link that says “WORKGROUP”.
4. In the System Properties window, click the “Change” button next to “Computer Name”.
5. In the Computer Name/Domain Changes window, select the “Domain” radio button and enter the name of the domain you wish to join.
6. Click OK.
7. Enter the domain username and password of an account with permissions to join the domain.
8. Click OK.
9. Wait for the server to restart and then log back in using the domain credentials.
10. Verify that the server is joined to the domain by opening Server Manager and selecting the “All Servers” option from the left pane. The domain should now be listed in the “Domain” column.
See lessWhat Is Amazon Cloud Services?
Amazon Cloud Services (also known as Amazon Web Services) are a suite of cloud computing services that are offered by Amazon. They include Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon Relational Database Service (RDS), Amazon Elastic Block Store (EBS), Amazon CloudFRead more
Amazon Cloud Services (also known as Amazon Web Services) are a suite of cloud computing services that are offered by Amazon. They include Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon Relational Database Service (RDS), Amazon Elastic Block Store (EBS), Amazon CloudFront, Amazon Simple Queue Service (SQS), and Amazon Route 53. These services enable businesses and developers to build, deploy, and scale their applications and websites on the Amazon Web Services platform.
See lessWhat Is Network Latency?
Network latency is the time it takes for a packet of data to travel from its source to its destination across a network. It is usually measured in milliseconds (ms), which is a thousandth of a second. Network latency can be affected by many factors including the type of network, the geographical disRead more
Network latency is the time it takes for a packet of data to travel from its source to its destination across a network. It is usually measured in milliseconds (ms), which is a thousandth of a second. Network latency can be affected by many factors including the type of network, the geographical distance between the source and destination, and the amount of traffic on the network.
See lessWhat Is Bridge Computer?
Bridge computer is a device that connects two networks together, allowing them to communicate and share resources. It acts as a bridge between two or more networks, providing a pathway for data to travel between them. Bridge computers are used in wide area networks (WANs) to connect different LANs aRead more
Bridge computer is a device that connects two networks together, allowing them to communicate and share resources. It acts as a bridge between two or more networks, providing a pathway for data to travel between them. Bridge computers are used in wide area networks (WANs) to connect different LANs and allow them to access the same resources.
See less