• Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Allowing IE to Install Selected Software

    When restricting users to non-Power Users settings, how do we allow a Web Browser Front End to an application to download and install: a) Active X-Controls b) Files c) Registry Keys. I assume that there are settings we can make via GPO?

    Mattblack0 pointsBadges:
  • IPSec VPN Connection

    Hi All, Let me explain my situation: Currently I am making use a PTPP VPN to connect to certain remote sites connected via dialup using VNC to access desktops for support issues. To do this I'm making use of dyndns dynamic ip service which allows me to map a hostname e.g. remotesite.dyndns.org to a...

    Ladrick0 pointsBadges:
  • Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Virus scanning the iSeries IFS

    Do you know of any products that will allow me to scan my IFS for viruses? If so, are you using the product(s) and are you satisfied with their performance? THANKS! for your help.

    CMHIT10 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:
  • Exam question Antivirus – VPN – related

    Hi I would like to offer a sincere thank you for reading this far. Im in deep trouble and need to answer a theory question for a presentation and would really appreciate any thoughts you can offer me. I only have the below information to go on and need to explain and present a soultion for the...

    Sprogg20010 pointsBadges:
  • Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • Deleting old userids

    I used to display the last signon date on a specific user profile to know if it was still used, if it was older than 3 months, it was deleted. Now there are more & more user profiles defined to the system for other applications than the "green screen", like FTP, ISeries Navigator, ODBC, etc.......

    Hmonat20 pointsBadges:
  • Encrypted files on External HD, host machine formatted but recoverable

    Here is the lowdown, we have an external HD, and we backed up all the data needed too it. What i wasnt told was that the backup was being encrypted as it was being saved to the HD. So the pc was given to me to format and reinstall windows on. I did and now we get an access denied error when we try...

    Trelleborg0 pointsBadges:
  • data encryption/decryption

    We are in the process of building encryption/decryption applications. We are using the IBM QC3ENCDT AND QC3DECDT API'S. I've starting testing against our database using apprx 3000 records to encrypt and then decrypt. Out of that 3000 records, there are 17 instances of failure to decrypt to clear...

    Rigger0 pointsBadges:
  • Email encryption

    Dear Colleagues: What is the best way of detecting whether email messages are transmitted as cleartext? I want to determine whether our company email messages are encrypted or not when they are transmitted within and out of the corporate network. Thank you very much!

    Dyafrica0 pointsBadges:
  • Looking for good HIP.

    Hi, I am looking for a good Host-based Intrusion Prevention System to be implemented on Intel Servers in my Company. Is there anything you would recommend...?

    JakubK0 pointsBadges:
  • Outlook Express compacting

    Hi All, I am currently facing a problem with outlook express compacting folders option. One of my colleague complained that last 3 months of emails are removed from Deleted Emails folder after Outlook Express finished compacting the folders. However there is no option is selected to delete the...

    Inamhaque15 pointsBadges:
  • VPn solution required for remote IP telephony

    We would like to have remote ip telephony connectivity for our office so that it will be helpful for our remote users and our Royal customers to have ip soft phone which will be connected to our network through VPN tunnel to our IP PABX and dial out locally. We are having ADSL modem connectivity...

    Gobinatty0 pointsBadges:
  • Group Policy Management

    Has anyone looked into Group Policy Management products (outisde of the functionality provided by Microsoft's Active Directory)? I'm trying to choose a product, and wanted to compare based on what current users thought (rather than what the sales departments tell me). The products I've been able to...

    TechSpaght0 pointsBadges:
  • SPAM

    I am running Exchange 2003 and Win2k3 servers. we get a ton of spam, and I want to stop it. What in your opinion are the best SPAM softwares and why? (such as strong points and weak points) let's hear it....

    TheVyrys0 pointsBadges:
  • AOL Spammer IP Identification

    Concerning the ever increasing amount of received spam, to battle this I have a program with which I can extract the IP address from the sender for reporting purposes, however, I have been receiving an increasing amount from AOL proxy server for which I cannot aquire the senders IP address. Is...

    Eyecatcher550 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following