• Limiting User rights to SQL Server from Web Service

    Hi folks I am in the early days of developing an app that has (I think) some unusual security requirements. It will be deployed eventually on an intranet. As an example, please see the following: There is a Clients table that everybody has access to. this will have the usual fields such as ID,...

    Rosspetersen5 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:
  • Exam question Antivirus – VPN – related

    Hi I would like to offer a sincere thank you for reading this far. Im in deep trouble and need to answer a theory question for a presentation and would really appreciate any thoughts you can offer me. I only have the below information to go on and need to explain and present a soultion for the...

    Sprogg20010 pointsBadges:
  • Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • SFTP supporing FTP product

    We have some external contacts that continue to use FTP to our FTP server. Is there an SFTP product that would support FTP without changing out the client software? This server is running Windows 2003 Server. I understand there is also a way to have both FTP and SFTP running on the same server....

    SecureMax0 pointsBadges:
  • Digital Certificates-2

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • Security Testing

    How do u use the 'whois' utility on a windows XP OS? Thanks.

    Homestead0 pointsBadges:
  • Loadsharing between two ISPs

    dear sir, I am looking for a load sharing solution between 2 leased lines for 2 different ISPs the diagram goes lke this: LAN-->Cisco Pix-->Router-->2 leased lines. can load-sharing be done at the router without extra configuration at the providers side? can CEF (cisco express forwarding)...

    SkullyMJ0 pointsBadges:
  • Digital Certificates

    Under what circumstances may an organisation decide to have its own Certification Authority(CA) rather than purchasing certificates from a commercial CA and its implications? Thanks in Advance

    Homestead0 pointsBadges:
  • AOL Spammer IP Identification

    Concerning the ever increasing amount of received spam, to battle this I have a program with which I can extract the IP address from the sender for reporting purposes, however, I have been receiving an increasing amount from AOL proxy server for which I cannot aquire the senders IP address. Is...

    Eyecatcher550 pointsBadges:
  • Hello

    New Discussion Post

    0 pointsBadges:
  • Uninstallation of norton wmi update

    respected recipient, I am currently having a trouble in uninstalling norton anti virus wmi update. My company got norton anti virus software installed on the system from the norton anti virus software cd and it was not norton system works , just the norton anti virus software.After somedays, it...

    Nishant70 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Regarding E-Mail Problem

    In my office we are using Netscape novigator to send and reveive mails. E-mail server is in Delhi (H.O). Here I am facing the problem that the attachments are not opening and when we want to send a E-mail it is hanging in the message box. But there is no problem with the E-mail server in H.O. No...

    Raaghu0 pointsBadges:
  • regarding vpn

    hi , i have to do project in vpn using l2tp.i have to test it between two linux machines. can anyone give me the steps to do that ? It will very useful for me if u give the websites regarding to that. thanks in advance. with regards, Nirmala.

    Nirmala20050 pointsBadges:
  • Seeking SAP SEM configuration help

    Recently, Manish, a SearchSAP.com user, sent in the following question on SAP SEM. <p> "Apart from standard SAP help, does anyone know of a SEM-BCS step-wise configuration guide? <p> Is there anything I can order online? I want to start on SEM-BCS as soon as possible." <p> Do you...

    laurenhoyt115 pointsBadges:
  • “Controled” proxy

    Hi, I need to control my user's access to different sites. for example user1 should be able to access www.yahoo.com on providing username/password, where user2 should be denied (or get password from Admin... :-) ), in otherwords the software can keep the profiles of different user to access my...

    Manije0 pointsBadges:
  • Need Help – Netscreen 25 with Fortigate 60.

    Hi All. Good Morning & Greetings of the season. I recently joined this company as a Network Security Specialist & the 1st task that i got assigned to myself was this. We have 3 locations - A (India) - Indian Operations B (California) - US Operations C (Datacenter) - Web & Media Servers My network...

    Nileshroy0 pointsBadges:
  • Denying Internet Access to User on Network

    I have a PC on our network that has more than one user. I know how to deny access to the PC itself, but I would like one user be able to access our network, but not the internet. The other user to access both. The server is running Win2003SBS, the PC is running WinXP. I am pretty sure this is...

    TeeJay0 pointsBadges:
  • user password auditing

    We have recently purchased LC5 to perform password audits to discover weak passwords. The documentation indicates to use PWDUMP3 to extract password hashes from the Active Directory. I have looked everywhere and cannot find a legitimate site to download this tool nor can I find documentation. Has...

    INSANEIT0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following