• Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Biometrics with Visual Basic 6

    How I can use biometrics in V.B 6.0? Any sample code? Please help me?

    99527375915 pointsBadges:
  • Biometrics and Privacy

    Which method(s) of biometrics that would not meet with undue resistance from potential users would you recommend to a manager to replace password-based access controls?

    nvme1110 pointsBadges:
  • Single Sign On with Windows NT and IIS and Domino

    Hi there, my dear peers, What solutions do you know for the following situation: A user has logged in into Windows NT using a certain name/password combination. He then starts his web browser and opens an application on an IIS web server (same domain) where he must be authenticated without entering...

    HenkeS0 pointsBadges:
  • Biometric technology

    What do I need to set up a biometric access control system?

    ttk10 pointsBadges:
  • Biometrics security in banking

    How can the introduction of biometric surveillance and security benefit a bank? How can it improve a country's banking sector's banking? Not only banks but whole of banking in general. Most banks and ATM's have CCTV cameras inside them but what other type of surveillance equipment can be introduced...

    Blueduck30120 pointsBadges:
  • biometrics

    What are some of the pros and cons to biometrics

    ma5430 pointsBadges:
  • Need for police officers

    Do you think that the technology will improve to a point where police officers are not needed?

    ma5430 pointsBadges:
  • About biometrics

    What are the ten advantages and disadvantages of biometrics in information technology?

    chukwunonsough5 pointsBadges:
  • biometrics

    is biometrics compulsory when one is applying for reentry permit?

    Binishessani5 pointsBadges:
  • Fingerprint Programme to attend and go

    I have a problem when the signature programme for the establishment of a table in the Master of data presentation and the mafia ................................. ACTATEK_LOGS (userID VARCHAR2(20) not null, timeentry DATE not null, eventID VARCHAR2(20), terminalSN VARCHAR2(20) NOT NULL, jpegphoto...

    Nabeil5 pointsBadges:
  • Migrating from Novell 6.5 to Windows ???

    Hi, In the coming weeks I'm going to be migrating our file storage data from a novell netware 6.5 server to a windows 2003 server...basically for financial reasons. And I feel netware and microsoft are moving to far apart and it just doesnt run as smoothly as it used to... My question is what would...

    Ladrick0 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Live Scan fingerprints

    Is there any way a hacker can retrieve your electronic scanned finger prints, if using a company such as Live Scan?

    Kstranger2315 pointsBadges:
  • Application Access Control Management

    Is there an enterprise wide software management program that can manage access to our web-based applications, vendor specific programs located thru out the entire company, and our MS applications, including MS Outlook? In other words, we would like to control all of the various software programs...

    NBf9910 pointsBadges:
  • FingerPrint matching

    where to find a good and simple explanation about fingerprint matching algorithms and techniques?

    SYR5 pointsBadges:
  • oracle internet directory application developer’s guide — dbms_ldap_utl sample code doesn’t work

    Hi, all I'm trying to set up Oracle Internet Directory Rel 9. I'm trying to use APIs provided in Application Developer's Guide. I started by copying and trying to run the examples given in the guide. My procedure connects to LDAP, authenticates me, but won't create a user. (Actually, it passes the...

    Paulina0 pointsBadges:
  • Oracle9i an Biometric system

    What is the advantages of using Oracle9i for Biometric transactions( that is, when using biometrics technology for financial transactions)?

    Praiserehoboth110 pointsBadges:
  • How to determine password expiration

    Recently this iSeries user wrote in with a question about password expiration. He writes, "How can I tell if a user's password does not expire? I've used the user profile report, but all it gives me for expiration values are 0's or -1's for all of the users." Can you help? Michelle Davidson Editor...

    MichelleDavidson435 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following