• need an outsourced managed security vendor

    Looking at a managed security service provider that can help with GLBA regulatory requirements

    Joseph340 pointsBadges:
  • User profile / Paswwords

    We need to check to see which users have they passwords EQ to they user profiles ID's. Would we use IBM API's QSYRUPWD and QSYCUPWD for this process? Thanks

    Bruce0070 pointsBadges:
  • can an outsider to all of your industries trigger a positive reaction from you?

    Over the last two years I have conducted research into the use of Autonomy IDOL's and DRE's along with Softsound's technology to allow voice control of services including automatic transcription (Although I have started fancying Nuance as a better contender for the voice to text side of this 'kit')...

    MarkDJA0 pointsBadges:
  • Stop bit problem: USB to Serial Converter attached to motion controller, unable to set for 7-E-2

    I have three different USB to Serial converters, one of them an isolated converter from B&B. One brand of motion controller I work on uses EVEN parity / 7 data bits / 2 stop bits as its default. I find that none of my converters will work on the controller in this configuration. If I borrow a PC...

    Kfink040 pointsBadges:
  • Group Policy Management

    Has anyone looked into Group Policy Management products (outisde of the functionality provided by Microsoft's Active Directory)? I'm trying to choose a product, and wanted to compare based on what current users thought (rather than what the sales departments tell me). The products I've been able to...

    TechSpaght0 pointsBadges:
  • SPAM

    I am running Exchange 2003 and Win2k3 servers. we get a ton of spam, and I want to stop it. What in your opinion are the best SPAM softwares and why? (such as strong points and weak points) let's hear it....

    TheVyrys0 pointsBadges:
  • Business Continuity Planning (BCP) Prioritization

    Greetings! I am a new IT Auditor and currently audits the BCP of a client. My client has no prioritization of which critical systems to be recovered in case of contingency/disaster. However, it has presented a list of priority systems that is currently addressed by its Problem Management policy. Is...

    Dyafrica0 pointsBadges:
  • AOL Spammer IP Identification

    Concerning the ever increasing amount of received spam, to battle this I have a program with which I can extract the IP address from the sender for reporting purposes, however, I have been receiving an increasing amount from AOL proxy server for which I cannot aquire the senders IP address. Is...

    Eyecatcher550 pointsBadges:
  • Maximum Message Size (Exchange SMTP)

    Encouraged by the helpful responses to the recent question about mailbox quotas I?d like to pose a related question: What size limits to you impose on inbound/outbound SMTP messages? BACKGROUND: We have 40,000+ email users in an Exchange network spanning 160+ locations around the world. Currently...

    Zaphod0 pointsBadges:
  • Uninstallation of norton wmi update

    respected recipient, I am currently having a trouble in uninstalling norton anti virus wmi update. My company got norton anti virus software installed on the system from the norton anti virus software cd and it was not norton system works , just the norton anti virus software.After somedays, it...

    Nishant70 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Company policies on protecting personal data

    I'd like to know what policies other companies have in place to protect personal data of employees, customers, etc.(data such as Social Security numbers, credit card numbers and the like) For example, is encryption required for transfer outside the company? How about inside the company? It is...

    Copleydt0 pointsBadges:
  • Seeking SAP SEM configuration help

    Recently, Manish, a SearchSAP.com user, sent in the following question on SAP SEM. <p> "Apart from standard SAP help, does anyone know of a SEM-BCS step-wise configuration guide? <p> Is there anything I can order online? I want to start on SEM-BCS as soon as possible." <p> Do you...

    laurenhoyt115 pointsBadges:
  • Recommendations on protecting a Microsoft 2003 server with Lotus Domino 6.5

    I need advice on where I can find information on how to secure a Domino web server on the internet. We are running on a Windows 2003 server. Is there a checklist or script I can work through to lock down my Domino configurations? Is there some way to know what I can uninstall or remove from the...

    JAlyn631280 pointsBadges:
  • Need Help – Netscreen 25 with Fortigate 60.

    Hi All. Good Morning & Greetings of the season. I recently joined this company as a Network Security Specialist & the 1st task that i got assigned to myself was this. We have 3 locations - A (India) - Indian Operations B (California) - US Operations C (Datacenter) - Web & Media Servers My network...

    Nileshroy0 pointsBadges:
  • Blocking File Transfers from MSN Messenger

    hi is there a way to block file transfers from MSN Messenger? or is there a software without the capability to transfer files but which can enable MSN messaging. thnx

    Aftabn0 pointsBadges:
  • Denying Internet Access to User on Network

    I have a PC on our network that has more than one user. I know how to deny access to the PC itself, but I would like one user be able to access our network, but not the internet. The other user to access both. The server is running Win2003SBS, the PC is running WinXP. I am pretty sure this is...

    TeeJay0 pointsBadges:
  • user password auditing

    We have recently purchased LC5 to perform password audits to discover weak passwords. The documentation indicates to use PWDUMP3 to extract password hashes from the Active Directory. I have looked everywhere and cannot find a legitimate site to download this tool nor can I find documentation. Has...

    INSANEIT0 pointsBadges:
  • Windows 2000 / 2003 Server Log Management

    Hi All, I am an IT Security Administrator of my company. i need to audit more than 100 Windows servers for systems logs, event logs , anti virus server logs almost every month. I am looking out for automated tools that can help me make my work easier. A product with a good reporting tool will be...

    Tarang0 pointsBadges:
  • how can an application disable/enable a user account in active directory??

    How can a fingerprint reader be used to disable/enable a user account?? Could I use a VBscript to do this?

    0JeanLuc00 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following