• wireless vlan

    hi all, is it possible to have one link from a switch to an access point and split the network into two networks a wireless network from the AP and a wired port for a user connected thru RJ45 and still keep it secured.

    92220990 pointsBadges:
  • Need opinions on severity of security risk from vulnerability scan

    We used eEye's Retina Scanner to run a vulnerability scan on a server. A risk was identified which was classed "Low" but the PCI Severity Level was classed as 5 or urgent. The vulnerability was Microsoft Windows optional Subsystems are permitted to operate on the system and the fix was to change a...

    Security Channel ATE15 pointsBadges:
  • not ethical

    is it okay to read the documents and look at the graphics files that are stored on user's computers or in their directories on the file servfer?

    1211875 pointsBadges:
  • Monitoring software for hardware usage

    Need to determine the best real-time monitoring software for hardware. Would like non-vendor specfic information on usage and suggestions for data placement in Raids and NAS type of storage,along with SOX. This request for help was originally submitted to the Research Assistant on WhatIs.com.

    ResearchAssistant855 pointsBadges:
  • Project Governance Chart

    Sample governance chart?

    DebW5 pointsBadges:
  • IT Governence

    is it necessary to have an IT organization structure in which the IT manager reports directly to CEO?

    Farrukh.malik5 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • SAS70

    When benchmarking a SAS70 audit to determine if the necessary controls were audited, what standards do you use as guidance to determine the controls to be tested and the control objectives? Does IT rely on internal audit for guidance or do you have your IT processes documented?

    SAS70ExPERT125 pointsBadges:
  • Stop Error (C000021a)

    I am receiving this stop error(C000021a) "windows logon process system process terminated unexpectedly" with win 2000 server. Safe mode and Last Known Good Conf. works fine. Is there any solution without reformating the HDD? I have ERD with me. Will that help me? Any advise on this would be highly...

    BinooDas123410 pointsBadges:
  • Standalone Auditing software, SPA/SIAA complient, Windows & Mac?

    I am looking for some recommendations on auditing software that I might be able to use. Because we have a mix of both Mac and PC, as well as some machines that are not on the domain (a situation not under my control), I'm interested in a potentially standalone application. The main requirements are...

    Lonewolfbw525 pointsBadges:
  • Procedures for a new area.

    We are a company where we have expirience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network... I need to know if some one can...

    Millan0 pointsBadges:
  • Installation and updates

    Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remotely...

    TheVyrys0 pointsBadges:
  • What is the speed of a PCI-X expansion bus?

    what is the speed of a PCI-X expansion bus?

    Babyc12095 pointsBadges:
  • security problem

    Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it....

    BinooDas123410 pointsBadges:
  • email data retention laws

    are inter-department email groups in a multinational bank subject to any US/UK financial regulation on data retention times..e.g. emails sent to a IT department's group mailbox which recieves requests from other departments in the organisation...e.g. legal restore requests, trader restore...

    Didsmith0 pointsBadges:
  • messaging and collaboration

    What is messaging and collaboration,how does it works,how to set it up ,where can it be implemented and how

    Eduado0 pointsBadges:
  • Auditing Feature

    Anyone know the best source(Slides,Simulation,Graphical representation) from which i totally get guideline how to use auditing and Even viewers feature in window server2003. Thanks Muhammad Usman

    Muhammad usman125 pointsBadges:
  • Passwords

    Hi all, What do you recommend for initial password issue, that is, provided a new user with a password for the first time without compromising it. I find the entire help desk giving password initially or sysadmins doing that is not save enough even though the user will be prompted to change it at...

    Bangim0 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Compliance to Acts

    How can softwares for url/content filtering or mail scanning be made compliant to HIPAA , Sarbanes-oxley act etc. ... What all features are required to be implemented to make them compliant ????

    Rohitmagazine0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following