• Open IT Forum: What tech blogs and Twitter feeds do you follow?

    Each month, we cast the net asking what [Insert tech topic here] Twitter feeds and blogs you read, but this month is a free for all! We want to know any and all tech blogs or Twitter feeds you trust, admire, and follow religiously. We want links and we'd love to hear why you love them and how long...

    MelanieYarbrough6,345 pointsBadges:
  • IT help desk first come first serve

    Why is it good or bad to operate an IT support services system (help desk) on a strictly, first-come, first-served basis?

    Sean007marvin20 pointsBadges:
  • What is a File copy limit in Windows XP?

    Does any one know what is a copy limit in windows XP as when we copy a lot of small files Windows XP stations come up with low resources error ex. we copy 40GB=800000 files windows 2003 server edition is fine no problems.

    Dimchik0 pointsBadges:
  • Ghost imagaing

    Hiya all, Specs first.. Ghost Corporate multicast server 7.5. Switches are all 3com, 10/100. Wireless network is 10mg network ports (2) shared via 2 wirelss access points, (D-Link 22Mbps) Problem is, whenever i image multiple machines, the whole network goes slow. The machines affected are old and...

    Carl0s810 pointsBadges:
  • Open IT Forum: What do you want to see from IT Knowledge Exchange in 2012?

    We asked what your goals are for late 2011 and early 2012, but now we want to know what you hope to see from the IT Knowledge Exchange community. If there's a functionality you would like to see, or a topic you want to know more about, let us know in the discussion section! Don't be afraid to get...

    MelanieYarbrough6,345 pointsBadges:
  • Internet cafe solution

    In around 3 weeks away from actually implementing an internet cafe solution from my research and helpfulness of fellow members ive concluded that:- there are a few options to choose from. asuming an adsl connection. 1) set up a linux solution say clarkconnect and xp on the clients etc 2)setup a...

    R76ijecx0 pointsBadges:
  • How does point-of-sale technology work?

    How does point of sale technology work as a communication device? How does point of sale work through its parts?

    anita1235 pointsBadges:
  • Forward emails

    when I want to forward my emails I can not do so. I can reply only also when I try to open an attachment I get a star with an exclamation point with it. I have never had this happen before please advise me on this.

    poloke5 pointsBadges:
  • What can CIOs do to counter the spread of cyber attacks?

    With Jeep and Burger King becoming the recent victims of a hacker attack, cybersecurity has become the focus point for many enterprises and CIOs. What should CIOs do to counter the spread of cyber attacks? Can anything be done at all?

    Michael Tidmarsh50,225 pointsBadges:
  • What are your favorite cloud security blogs?

    You told us what your favorite IT blogs are, now we want to get a little more specific. Do you have any security blogs or cloud security blogs that you go to for the latest threats and solutions?

    MelanieYarbrough6,345 pointsBadges:
  • Prompt user to change password before expiration Issue

    I have a problem with only one user so far where the system will not notify them that their password will expire in 'X' days. I have the following item set in the GPO: "Interactive logon: Prompt user to change password before expiration - 5 Days" I've checked the Group Policy results and it shows...

    Kmeister0 pointsBadges:
  • Vulnerability Test analysis

    my project is based on the topic vulnerability test analysis of a computer system.can anyone please tell me what to do and where to start..give me some useful ideas to proceed

    Creeeper60 pointsBadges:
  • Free IT Book: AAA Identity Management Security

    This week's free IT book is your complete, authoritative guide to implementing, configuring, and managing AAA with CiscoSecure ACS. For a chance to win AAA Identity Management Security, answer one of the questions listed below and post the link to your answer in the discussion section of this...

    MelanieYarbrough6,345 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • How to generate a listing of security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl83,255 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following