• Indentifying end users with weak passwords

    I am looking for a product that I can use to identify end users that log into our network (NT4.0 going to Active Directory this summer) using weak passwords. Can anyone help?

    CalendarGirl0 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:
  • Wireless LAN roaming

    I need to set up a wireless LAN (ADSL router with 3-4 access points). The client wants to be able to move between the access points without being cut off from the internet. Which products will do the job? Any special design considereations?

    Benbje0 pointsBadges:
  • ping from outside

    hi, could you please tell me which command in cisco routers prevent them from being ping from outside networks. and also how can i prevent terminals inside a network to ping outside ips(group policies etc??). thanks

    Redrose0 pointsBadges:
  • Resticting Members of BuiltinAdministrator to just be able to create Domain Trust

    In windows 2000/2003, Can we restrict a BuiltinAdministrators member to have just enough rights so that he/she can only create/delete domain Trust. The requirement that we have is to be programmatically create trust with all the domains in a given forest. The other part of the requirement is to...

    EternalLearner0 pointsBadges:
  • A graduate student in need of help – I would like to know your professional opinion on information security.

    I am graduate student at the School of Information Studies at Syracuse University and am conducting research to gather empirical data on the subject of information security. My goal is to gain a better understanding of what IT professionals believe is an adequate level of information / network...

    Amolet0 pointsBadges:
  • PIX VPN DHCP Relay not relaying DHCP packets

    Hi, I've setup a VPN across 2 PIX506e's using primarily the PDM software. IT is a very basic setup using PDM. I also needed DHCP relay to relay from clients on pix B to pixA and then the dhcp server. So I add in the DHCP relay server address on pixB and point to the relevant IP over the outside...

    Rgoulding0 pointsBadges:
  • Weeding through vendor pricing hype

    Our consortium is thinking about changing vendors for desktop management. We?re being pitched by more about ten vendors who all say they can give us the best price. All of them have different approaches to pricing and we?re having a hard time figuring out how to compare apples to apples. What?s the...

    Margaret Rouse7,795 pointsBadges:
  • Problems Installing Novell Netware 6. PLEASE HELP.

    I am installing Netware 6 on a supermicro server with a supermicro X5DPA-GG motherboard, adaptec 2200s RAID controller card, two Seagate cheetah Ultra 320 SCSI HD's setup as a Mirrored array, and dual Xeon Processors. The problem is that after the DOS partition is installed, and after the files are...

    KJC48550 pointsBadges:
  • Stuck with WEP – will increasing key lengths help harden WLAN?

    I have potential security issues on my wireless LAN because my equipment is older and I can?t use WPA. I'm worried that my data is vulnerable. If I increase my WEP key length from 40 to 128 or greater, will this help?

    Margaret Rouse7,795 pointsBadges:
  • Configuring Multiple Internet Access Points

    We currently have a hub and spoke topology where all nine remote sites come back to HQ for Internet and server access. We have one site that uses about 60% of out Internet bandwidth, so we decided to drop a dedicated T1 Internet line at this site for this site's use only - all other sites will...

    Pooled0 pointsBadges:
  • Exchange Information Store Consolidation

    Hi there, I am currently busy planning for the Exchange Information Store consolidation, we have three Information Stores on Drive FGH, I would like to consolidate this into one volume. I have about 6x36GB drives that I would like to combine and use as a single vol for this project. Please advise

    Sbusiso0 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41055 pointsBadges:
  • isearch toolbar

    Has anyone heard of a malware product called isearch toolbar? If so, do you know how to get rid of it?

    Duckie5220 pointsBadges:
  • Offshore Outsourcing delivery model

    There is much information about Offshoring on the web but if you go deeper there is little about hands-on experiences. Does anybody have detailed information or experience about an Offshore delivery model? What are the drawbacks and traps for the project managment, where are the differences to the...

    Ger5150 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:
  • Cisco PIX VPN Bridging – Am I missing something??

    Hi, I'm tryin to set up a VPN between two internal sites on the same subnet. I have 2 PIX 506E's linked together (physically) in my test lab (on outside interfaces). All the configuration examples I've seen of setting up a VPN is between 2 different logical networks. However, I want them to act as...

    Rgoulding0 pointsBadges:
  • 2 quick questions: 1st on reports and 2nd on Call Disposition (Term codes)

    I have two basic questions: 1st, what is the difference between canned and Out-of-the-box reports? 2nd, I am facing a challange to measure call center performance and call center statistics for various customers, products, and agents based on call types that an agent receives. I am looking for some...

    Convermation0 pointsBadges:
  • Need one WinXP PC not change Daylight Savings in Win2k Server domain

    I know that this sounds strange, but I have a requirement for one WinXP PC to NOT change their time when our Win2k DC?s change their clocks to reflect daylight savings. Bottom line: When the servers change from Eastern Standard Time to Eastern Daylight Savings Time, I have one PC that must stay on...

    KeithD19670 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following