Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Marketing Technology, Microsoft Access, Microsoft Excel, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
What are the database security requirements in a Linux environment?
A host receives an authenticated packet with the sequence number of 181 and the replay window spans from 200 to 299. What will the host do with this packet?
Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...
what is switch bounce
I installed Crystal Reports v11 on my Server 2003 system. Then when I try to open it I'm getting: crw32.exe Application Error. The instruction at "0x7ff2fbfc" referenced memory at "0x7ff2fbfc". The memory could not be "written". Can anybody tell me what is happening and how to fix it? Marty
What is a rooted app
Just curious what tools you have in your network toolkit? I've heard or used snort, TCPDump, NMap, but would love other suggestions
What is the best way UNIX Assessment procedure?
Where in local policy is the the ability to disable the calc from the user from using it. I have looked and Googled until I am blue in the fac.Thanks
Hi All, I am new to this forum and after reading to many forums i feel you guys can really help me out of the mess. Currently i am working in an IT company as Sr. Software Engineer for Oracle Applications(2 years of experience) but lately i feel more inclined towards Computer Network and also i...
When I tryto open one report from oracle report builder 10g the report builder is stoped working and close report builder by windows 7
I have a Huawei 8665 & Consumer Cellular is my carrier. I have used my AT&T home service for the wi-fi on my phone with no problem till last nite, my wi-fi icon has disapeared even though I am still connected acording to my settings. I have worked all day trying to correct this with no...
Have switched auditing on for a specific directory in the IFS, information is being collected in the audit journal. Now, how do I actually interpret when a file is deleted? I gleaned I need to look for an LD journal type - when I do a test delete of a file is generates numerous LD types, but I...
I have a library we will call liba. In liba i have files for different companies. For eg: files aa01.itm is an inventory file for co# 01 and bb01.cms is a customer file for co# 01. I also have files aa07.itm and bb07.cms. These files are for co# 07.I want to grant someone access to only the files...
A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....
I deploy Windows updates for new computers with VBScript. With some of the updates Open File Security popup comes up and I can't install the update passively or quietly. How can I do that silently?
We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?
Organizations make business deals with other organizations. When negotiating a specific deal, each organization is represented by one lawyer. The same organization can have deals with many other organizations and it might use different lawyers in each case. Each lawyer has a first and last name,...
Anyone who has a template in creating a source code security policy? Thanks!