• Domain security policy and domain controller security policy

    What is the difference between domain security policy and domain controller security policy?

    Sonu1235 pointsBadges:
  • Windows Server 2003 FTP security and monitoring

    How can I see who is connected to my Windows 2003 FTP server and review what files have been uploaded or downloaded? Can I be emailed this log file daily or weekly? Can I be alerted if specific files or folders are touched?

    ITKE56,245 pointsBadges:
  • SAV & Cisco IronPort Email Security Plug-In

    Cisco IronPort Email Security Plug-In 7.1 is installed in OUtlook 2007 client. Symantec AntiVirus 10.1.6.6010 launches Windows Installer to install something from Symantec AntiVirus.msi. What is it trying to install?  The MSI file used to install SAV isn't enough...it "wants" something else.

    Tkbindpls5 pointsBadges:
  • Security Audit Tips and Tricks for antivirus?

    Dear all, I want to know what is the step to audit an antivirus product. What will be the plan of action?

    Kdic5 pointsBadges:
  • Free IT Book: AAA Identity Management Security

    This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...

    MelanieYarbrough6,345 pointsBadges:
  • SQL 2008 Security: How do I give users access to just views within a DB?

    I have inherited a SQL DB and need to give a group of users access to some views within a DB. We do not want them to access the tables, just the views. They will be connecting using MS Excel for reporting purposes. Do I use a role or schema? What is the best practice to accompish this task without...

    Multipass5 pointsBadges:
  • what is the best security website?

    i want to know where to go for security resources on the web

    Opheliamemphis25 pointsBadges:
  • Future prospects of networking and security courses

    I have done 14 months networking/hardware + security training course from IACM,delhi. I want to know what other advance courses are available related to this.

    Mukul185 pointsBadges:
  • Source size limit in SQLRPGLE

    I've been having some problems compiling a 25,000 line program and I'm figuring that a line limit is causing all of my errors. Is there a limit to what the SQL pre-complier can handle for a SQLRPGLE source object?

    ITKE56,245 pointsBadges:
  • Data Conversion

    How to convert PDF files to Excel Files

    Aumarve5 pointsBadges:
  • Windows

    How can Microsoft Windows assist me in school?

    leannafields5 pointsBadges:
  • Green screens messing up special characters in Win7

    We have a few users who just got new Windows 7 desktops, and their terminal emulators aren't behaving correctly. When they do some work at the end of a line (insert, delete, backspacing...) that is will sometimes: 1. extend the line past the edge 2. insert extra spaces between characters Our tech...

    michaelcsmith5 pointsBadges:
  • Microsoft Outlook Security

    When sending an email with an attachment through my application I get the following security warnings. "A program is trying to access e-mail addresses you have stored in Outlook. Do you want to allow this?" Yes. "A program is trying to automatically send e-mail on your behalf. Do you want to allow...

    Smythprog30 pointsBadges:
  • Outlook web Access (OWA) security concerns

    Hi, I'm trying to convince my boss that our organization can provide access to e-mail over the internet without security threats. I plan to use OWA. So, can you tell me the risks and the counter measures?

    Acastanheira20015 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • How Do I Move From AS400 Security Level 30 To 40?

    I have reviewed system values for QAUDLVL and found the we have the appropriate values running. I have reviewed the journals that contain over 3 months of information and determined that we have no AF or J entries. Is this all I need to verify before I recommend that we move to level 40? I have...

    TitaniumFJ5 pointsBadges:
  • Can I push out Microsoft Security Essentials to an entire network?

    Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

    TeachMeIT975 pointsBadges:
  • Exporting Active Directory server security log

    How can I export the data from a Windows Active Directory server's security log to create a graph of who logged in and out at what times?

    TeachMeIT975 pointsBadges:
  • Configuration problem on 2950 port security sticky behavior

    Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...

    Patelmanojk50 pointsBadges:
  • Modify environment for port security

    Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no  switchport port-security mac-address...

    Vptechie70 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following