• Adding NICs to my machine to run VMs from my Windows 7 computer

    If I want to run multiple VMs from my Windows 7 computer, I will need 6 NICs. How can I add 6 NICs to my machine? Are there ethernet banks or a single PCI card with lots of ports?

    Troubleshooter24755 pointsBadges:
  • PCI Simple Communications Controller

    What is the PCI Simple Communications Controller used for?

    Ericjaxn5 pointsBadges:
  • AS400 System Value Settings Help?

    In our AS400 environment there are several individuals who has *SECADM and *ALLOBJ authority due to some reason, we are trying to investigate few incidents of system value settings which were changed but we don't who did it, any help or workaround which can lead us to the right path?

    ZahoorHyder5 pointsBadges:
  • Application Access Control Management

    Is there an enterprise wide software management program that can manage access to our web-based applications, vendor specific programs located thru out the entire company, and our MS applications, including MS Outlook? In other words, we would like to control all of the various software programs...

    NBf9910 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • SAS-70 certification

    I have a quick question regarding SAS-70 Certification. If my company completes a SAS-70 audit, does that automatically make us certified or are there additional steps for certification? also when we get certified how long does that certification last before it will need to be renewed? any...

    JohnDough5 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Checking TCP Servers

    I need to code a program that will confirm that certain TCP Servers such as TFTP are NOT started per PCI requirements as they are insecure

    JerryBushika5 pointsBadges:
  • Open IT Forum: How do you raise awareness for security compliance in the enterprise?

    We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...

    MelanieYarbrough6,345 pointsBadges:
  • FINRA Guide to IT Compliance

    I am looking to set up a whole new network infrastructure for an Investment Bank - DATA and VOICE - covering ALL of their devices - onsite and remote. Does FINRA or anyone for that matter a publish a comprehensive guide with rules and regulations?

    Davidavdavid5 pointsBadges:
  • How to begin attempting to build and sustain security for our information assets?

    I recently learned about SKiP, Security Knowledge in Practice, in one of my classes at UAT and I am very intrigued by it.  I did not realize that the problem-based approach was the common.  I guess that is one of the great advantages of SKiP, being a process-based approach to organize and...

    JJUAT5 pointsBadges:
  • Changing proxy rights for select users

    I work in a company that has a proxy who can limit the people acces into some sites,my question is...what changes can i do to  the proxy server to accept these sites for one or more users?(usual changes into one basic proxy server)

    Razvan19875 pointsBadges:
  • Comprehensive distributed software management policy and standards

    Could anyone share or provide input on a comprehensive distributed software management policy and standards that prohibit non-developer access to source code and prohibit developers from creating executable code and placing it in migration folders (which then can be moved to test and production)?

    Debby10 pointsBadges:
  • Power Meter and Processor overheating

    I am facing a strange problem with my win 2000 server pc(256mb RAM, P4, 40gb hdd) as it automatically restarts when I start the computer. Yesterday it completely shut down before showing me the desktop and when I pressed the power button the initial screen came up showing message "the processor...

    BinooDas123410 pointsBadges:
  • Invalid login attempts in AS/400 SOX

    Hi, for SOX auditing I need to provide Information Security with a daily list of failed login attempts (any server type) and actual logins for a list of sensitive accounts. Straightforward stuff on other platforms but I can't see how it can be done on i5/OS. I have seen a few references to doing...

    londonunixguy5 pointsBadges:
  • SAS type 2 audits

    Hello If a customer don't wants to execute the SAS70 type 2 audit - is there any other compliance standards that you can choose from ? That is to get the same compliance documentation/status but not execute the SAS70 type 2 audit? Is there any light version of the SAS70 standards?

    OddLeth5 pointsBadges:
  • iSeries Net Time

    We are going through a PCI audit and it was suggested that we implement NET Time on the AS400. How do I do that?

    CharlieBrowne41,380 pointsBadges:
  • Creating abuse and postmaster exchange account

    How do I create an abuse and a postmaster exchange account to be in compliance? I am using Exchange 2003 and Outlook 2007.

    NewnanIT1,110 pointsBadges:
  • Compliance for Video Conferencing

    Greetings, We are currently in the planning phase for our first video conferencing solution. Does anyone know if there are any regulatory compliance requirements that need to be considered (i.e. conference archiving)? Thanks.

    Peanve0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following