• Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Single Sign On with Windows NT and IIS and Domino

    Hi there, my dear peers, What solutions do you know for the following situation: A user has logged in into Windows NT using a certain name/password combination. He then starts his web browser and opens an application on an IIS web server (same domain) where he must be authenticated without entering...

    HenkeS0 pointsBadges:
  • ORA-12535 error on Oracle 9i

    My database runs on 9i. There are remote databases that connected to it. Today all of them are failing to connect because of the error message ora-12535. I increased the CONNECT_TIMEOUT but error still persists. I even set it to zero (0) and the system hangs indefinitely.tnsping to these remote...

    SINETA0 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • IT Asset Templates

    I am looking for "standardized" templates that would assist large organizations map out current IT infrastructure components. This would help provide a baseline to identify gaps as well as help drive out requirements. Ideally, the template would identify critical IT components and force you to...

    Securewing5 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41020 pointsBadges:
  • Triggers

    Does the AS/400 have a cross-reference file or files that give the same kind of information about triggers as QADBFDEP and QADBFCST do for dependent files and constraints? If so, what is/are they called? Thanks

    Xixones0 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • error in connection between oracle8i&developer2000

    I'm installing Oracle8i on Windows 2000 professional on NTFS partition and on the same machine I'm installing Developer 2000 or form6 in a different partition. When I try to connect Developer to Oracle, I get the error "TNS could not resolve." Please provide a solution. Can I use Oracle8i...

    POWERINIT0 pointsBadges:
  • media recovery

    Hi, Please help. I want to shift my datafiles from c: to S:. I have made a physical copy of dbf files from c: to s:. In Oracle 10g I made those files & tablespaces offline and renamed with new physical location. when bringing online I was getting error as "need media recovery". Please Guide me....

    Sukaina10 pointsBadges:
  • Lotus Domino Database Structure

    Hi I am trying to map a Lotus Domino Database into tables. Is is true that Views are like tables and documents are like rows in the view? Is this the right way to do it? If not, please could you explain how to do the mapping? Thank you in advance Mirkia Sadler

    Mirkia0 pointsBadges:
  • Urgent Help: web-Forms 6i don’t work after Upgrading the db from 8i to 10g

    Hi, We have web-Forms 6i that are deployed on a server A and run against a database installed on a server B. The database was recently upgrated from version 8.1.7.4.0 to 10g AND moved from the server C to the server B. However we're using now for the server B the alias we've used for the server C....

    1081080 pointsBadges:
  • Running a script at specified runtime

    I am creating an Oracle Developer form which will take the query created by the user and specified runtime (also by user) and saves it in two columns of a Oracle table. Is there a facility in oracle which can trigger off the saved query when the sysdate becomes equal to specified runtime? Thanks

    Columbus0 pointsBadges:
  • inserts through a database link

    Hello every body. Here I go again... Do you know if there is a restriction about performing inserts through a database link ? We are experiencing the following situation: We have two Oracle 8i instances running on a win 2k3 server, and a Forms applications needs to insert data from one instance to...

    carlosdl65,110 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • Upgrade to SQL Server 2005 sooner or later?

    Hello, I'm the editor of SearchSQLServer.com and I am hoping to get your opinons on a timely topic. Prior to Microsoft announcing its November 7 release date for SQL Server 2005, we had run a poll asking site members: How have the delays with SQL Server 2005 affected your organization's plans? 58%...

    RobynLorusso230 pointsBadges:
  • IM Blocking and URL Filtering

    We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL filterings can be imposed as per company's policy. Those users who are not on the domain, they can not...

    EngineerIT0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following