• Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl73,855 pointsBadges:
  • Home Dir Security and file sync aka CSC

    I having issues configuring Home directory file sync. After I configured folder redirection by MS recommendations, I receive a folder permissions error when I right click on a file and tell it to sync. Following MS's white paper on configuring redirected folders,...

    JEAKINS0 pointsBadges:
  • Remote working with high latency & low bandwidth

    I own an Internet domain. We complete Property Management tasks for individual Australian Real Estate Agents at our Offshore Office in India. Indian staff remote into the desktop or local server based Property Management Software of the Australian Real Estate Agent clients & complete the tasks...

    Integra110 pointsBadges:
  • Software Quality Assurance Test by IKM

    Does anybody have sample questions from the Software Quality Assurance test by International Knowledge Management?

    Arunkumarprakash5 pointsBadges:
  • IKM assessment

    Can anybody help me with IKM Quality Assurance sample questions please

    d12345 pointsBadges:
  • What is the future of Virtualization?

    What is the future of Virtualization? How many of you have actually used it? How exactly? What benefits did your draw out of it for your Organization?

    Jaideep Khanduja10,300 pointsBadges:
  • Asset Management within the ISO 27001 Framework

    One of the many initiatives at the company I work for is to take a full inventory of all the network devices within the company. This is to stay ISO 27001 compliant. An advantage of being 27001 compliant is that it forces a company to be accountable and know every device that communicates across...

    rgabuat10 pointsBadges:
  • Access internal web server with domain name

    I was wondering what is the best method for allowing internal computers to access our locally-hosted web server with www.somedomain.com? I believe the internal clients are unable to do so because of how firewalls/NAT works (?). Is there a way I can add an entry in my DNS server? I am using Windows...

    Skepticals0 pointsBadges:
  • SQL Server restore job fails

    I've created a Restore Job under SQL Server Agent. Job owner is sa, Run as User dbo. There are no users connected to the database or processes running. The job fails with: Msg 3101, Sev 16: Exclusive access could not be obtained because the database is in use. [SQLSTATE 42000] Msg 3013, Sev...

    TuftsDBA0 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • SQL Server 2000/2005 – Creating Unique Constraints allowing multiple NULLs

    Hi there! I'm having a problem maintaining data integrity on a database table in MS SQL-Server 2000. To ensure maintaining the integrity I need to implement a Unique Constraint on one of my coloumns. The problem however is, that this coloumn also has to allow multiple NULL-values - but for every...

    LeChuck0 pointsBadges:
  • Old questions keep coming up on the top of the stack

    I cannot find new questions .. I suspect you've cleaned up some junk and it's reset the last change date..

    philpl1jb52,960 pointsBadges:
  • Query: IBM Cognos Certifications?

    Dear All,   I am interested in learning and making a career in the domain of business analytical and intelligence tool, and knowledge/experience in IBM Cognos it seems to be an acceptable and sought out thing in job market. However I don't have any clue about where to start from.   I came across...

    Scherian5 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Secondary storage for the future

    Does anyone have some examples of advancement in secondary storage for the future?

    winsonloseson5 pointsBadges:
  • What are the responsibilities of a CIO?

    What are the responsibilities of the Chief Information Officer in an organization?

    Haque5 pointsBadges:
  • Network Security Auditing tools

    Hi all - I'm hoping somebody out there might have a suggestion for me. My company unfortunately falls under Sarbanes Oxley and we need to audit all of the network directory security. The down side of this (ok well it's all down) is that we are a small company, no money to spend on getting the...

    Lirria0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.