• Internet cafe solution

    In around 3 weeks away from actually implementing an internet cafe solution from my research and helpfulness of fellow members ive concluded that:- there are a few options to choose from. asuming an adsl connection. 1) set up a linux solution say clarkconnect and xp on the clients etc 2)setup a...

    R76ijecx0 pointsBadges:
  • How does point-of-sale technology work?

    How does point of sale technology work as a communication device? How does point of sale work through its parts?

    anita1235 pointsBadges:
  • Forward emails

    when I want to forward my emails I can not do so. I can reply only also when I try to open an attachment I get a star with an exclamation point with it. I have never had this happen before please advise me on this.

    poloke5 pointsBadges:
  • What can CIOs do to counter the spread of cyber attacks?

    With Jeep and Burger King becoming the recent victims of a hacker attack, cybersecurity has become the focus point for many enterprises and CIOs. What should CIOs do to counter the spread of cyber attacks? Can anything be done at all?

    Michael Tidmarsh34,110 pointsBadges:
  • What are your favorite cloud security blogs?

    You told us what your favorite IT blogs are, now we want to get a little more specific. Do you have any security blogs or cloud security blogs that you go to for the latest threats and solutions?

    MelanieYarbrough6,345 pointsBadges:
  • Prompt user to change password before expiration Issue

    I have a problem with only one user so far where the system will not notify them that their password will expire in 'X' days. I have the following item set in the GPO: "Interactive logon: Prompt user to change password before expiration - 5 Days" I've checked the Group Policy results and it shows...

    Kmeister0 pointsBadges:
  • Vulnerability Test analysis

    my project is based on the topic vulnerability test analysis of a computer system.can anyone please tell me what to do and where to start..give me some useful ideas to proceed

    Creeeper60 pointsBadges:
  • Free IT Book: AAA Identity Management Security

    This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...

    MelanieYarbrough6,345 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl70,220 pointsBadges:
  • Home Dir Security and file sync aka CSC

    I having issues configuring Home directory file sync. After I configured folder redirection by MS recommendations, I receive a folder permissions error when I right click on a file and tell it to sync. Following MS's white paper on configuring redirected folders,...

    JEAKINS0 pointsBadges:
  • Remote working with high latency & low bandwidth

    I own an Internet domain. We complete Property Management tasks for individual Australian Real Estate Agents at our Offshore Office in India. Indian staff remote into the desktop or local server based Property Management Software of the Australian Real Estate Agent clients & complete the tasks...

    Integra110 pointsBadges:
  • Software Quality Assurance Test by IKM

    Does anybody have sample questions from the Software Quality Assurance test by International Knowledge Management?

    Arunkumarprakash5 pointsBadges:
  • IKM assessment

    Can anybody help me with IKM Quality Assurance sample questions please

    d12345 pointsBadges:
  • is relationship management is a waste of an organisation’s resources

    is relationship management is a waste of an organisation's resources

    amuchemwa5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following