• Network Resource Allocation cum Planning cum Technical Problem

    This is the real commercial problem face by my company. Well, the reason I ask this problem is I salute and respect all of you as I believe all of you are as good as network solution company out there, or even better!! Lets me rephrase the entire problem again. Company expand so fast that the IT...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure-2

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • LAN vulnerability behind a Router – with firewall – connected to the Internet (Through an Open Port!)

    Hi, I would just like some reassurance: I have a Router on my LAN that connects all host PCs to each other and the Internet. Question: a) How exposed is my LAN behind the Router that has a port open for Internet access (and in future anther for remote desktop terminal connection) would a port...

    ToneEzeeJ0 pointsBadges:
  • What is SSI injection

    I recently read an article that mentioned SSI injection. I'm aware of SQL injection, but not SSI. Can anyone explain what it is and what should be done to protect against it? Thanks

    Coder6270 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • look fax in OWA

    i have a sbs 2003 and it connect to modem to get fax, and iv'e configured him to get users to outlook web access but i want to know if there is a way to see fax on the server from the owa? is there a way that user log on to owa and then can see new fax that arrived? (suppose that he had the...

    Drorbenyosef5 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Connection Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Blocking pop access over http

    Dear you, How can I exactly block the following: 1- Hotmail pop access over http 2- Block skype phone calls 3- Block sites like gotomypc.com etc 4- Block internet file share drives like yousendit.com google drive Thank you Kindi

    KindiA0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Dynamic Local User in W2K clients

    Hello. Does anyone have an idea on how to configure a Wondows 2000 client to show the SID of any user that logs in to that computer. We run a Novell Netware 6.5 network, and have about 60 W2K clients. I have a generic local account for the W2K stations. When a user logs in, it does not record the...

    Onezorro0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Allowing IE to Install Selected Software

    When restricting users to non-Power Users settings, how do we allow a Web Browser Front End to an application to download and install: a) Active X-Controls b) Files c) Registry Keys. I assume that there are settings we can make via GPO?

    Mattblack0 pointsBadges:
  • Ipnat.sys related error on Win2003 Server

    Happy 2006 to you all! One of my customers is getting a strange error since someone disabled (deleted actually!!) the Terminal Server service on their Windows 2003 Server SP1. The error that pops up is: "Windows Firewall cannot run because another program or service is running that might use the...

    Hedgehog0 pointsBadges:
  • Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Terminal server installed on a WIndows 2000 DC – GPO question

    I have a Windows 2000 Domain controller with Terminal Server installed on it. I understand that running TS on a DC is not recommended, but I have to use what I have available. My question is how do I lockdown a user with a GPO when they log on remotely and not when they log in over the LAN. I would...

    Skepticals0 pointsBadges:
  • Limiting User rights to SQL Server from Web Service

    Hi folks I am in the early days of developing an app that has (I think) some unusual security requirements. It will be deployed eventually on an intranet. As an example, please see the following: There is a Clients table that everybody has access to. this will have the usual fields such as ID,...

    Rosspetersen5 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following