Questions & Answers
Active Directory, AS/400, Business Intelligence, Career Development, CIO, Cisco, Database, DataCenter, Desktops, Development, Exchange 2003, Exchange 2007, Hardware, iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Windows, Mobile, Networking, Oracle, OS, Outlook, Outlook 2003, Outlook 2007, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Tech support, Virtualization, Visual Basic, VoIP, VPN, Windows 7, Windows Server, Windows Server 2003, Windows Server 2008, Windows XP ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
How can I export the data from a Windows Active Directory server's security log to create a graph of who logged in and out at what times?
Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...
Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no switchport port-security mac-address...
What are some of the security issues people have run into with Windows 7? Do you have any advice for prevention or preparation when migrating?
Is Forefront client security server compatible with Server 2008R2? This question is from the Microsoft Live Chat which took place on July 13th.
All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...
Hi, I am a systems security auditor with CISSP certification. I have decided to narrow my specialization and become a subject matter expert in SAP security. SAP does not have such specific certification and I would like to get recommendations on: What is the most suitable SAP certification that I...
This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...
How do I secure my IFS on the AS400?
How do I bypass Cisco iron port web filtering using proxy setting and port numbers?
Hi, I am really confused about way to follow to become a Security Auditor... and the opportunities it has in future.. esp. in India? Currently I am working as a Security Consultant but dealing only with Security Related products including Firewalls, NMS, IPS etc and not Standards like BS7799,...
We need to export the windows server 2003 SAM database to a standalone server for an external security audit. Where do I find this file or how can I export the data needed?
When trying to install Security Update for Windows Server 2003, it fails with the following Error Code: 0x8007F0F4.
Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...
Our company is looking to redo some networking infrastructure. Previous IT administrators created a daisy chain network topology and all information types, from APs to workstations aggregate on a single network. Lately we have seen some performance issues and wish to rewire much of our network into...
What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?
This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...
I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.
Hello. I'm working on a presentation about SAP Security Best Practices. Can anybody can tell me where I can find material (documents, books, etc) related with SAP Security Best Practices? I'm trying to find a list of good practices in relation with SAP security. Thank you very much. Patricio.
Hello, I am using a multi - DB block in my forms 6i and everytime I run a execute_query statement, it does not returns all the rows, rather I am getting ORA-01002: fetch out of sequence error.I tried looking in the web and most of the places they said not to write COMMIT if using FOR UPDATE.but I...