• Domino 8.5.3 – One User With Multiple Outbound Unique Email Addresses

    Our corporate structure consists of one corporate domain (acme.com) with multiple subsidiary domains (trains.com, planes.com, automobiles.com). We need to be able to have the users receive email from any or all of the sub-domains. We also need for the users to be able to send from any or all of the...

    Techie055 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Critical Error in Security Log

    All, I manage a Windows 2003 Small Business Server Network with 9 clients. The server provides all network services. We use Logon/logoff, shared storage, and print server functions. We do not use exchange except for the server reporting tool. We do use about 4 instances of SQL. All clients are...

    FlyNavy0 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • What is a ‘friendly name’?

    When Microsoft requires you to provide a "friendly name" when configuring a client, what does that mean? What does a friendly name do?

    SearchEnterpriseWAN1,040 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • How can I get rid of the PJL STATUS command from the top of my AS/400 Reports?

    I have just installed an IBM4247-003 printer to our AS400 via LAN connection. Everytime a report is printed, the top of the first page has a PJL command. We currently are on V5R2. I created the device as a Type(3812) Lanattach(*IP) Port(9100) MFRTYPMDL(*IBM4247DUAL) SYSDRVPGM(*IBMPJLDRV). The...

    zbbwoc95 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • What is router-on-a-stick configuration?

    What is router-on-a-stick configuration?

    NetworkingATE1,545 pointsBadges:
  • trojan horse downloader

    hi i have a win NT4.0 sp6 server.its a DNS and web server. from few days the IE was redirecting the sites to some search engines.when i scaned with AVG it detected some trojan horse downloader.i healed the trojan and restarted the DNS.the problem was solved.but after some hours the problem arise...

    Redrose0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41020 pointsBadges:
  • How do I configure network ports to full-duplex on McData switches?

    I want to know how to configure a network port on my McDATA Intrepid 6140 switch to full-duplex. Until now it's been on half-duplex.

    NetworkingATE1,545 pointsBadges:
  • Do I need to use QoS for full and half-duplex network configurations?

    I have a simple switched network containing only Layer 2. The switch is a good commercial product. I use only 8 ports. The traffic offered is 4 Mbps for VoIP while all other data gets 1 Mbps (with some control traffic).[o:p][/o:p] [o:p] [/o:p] Out of these two configs,  100BASE-TX (full) or...

    NetworkingATE1,545 pointsBadges:
  • User Auditing/Journaling

    I'm new to security on the AS/400 (730). We need to have a record of what program a user calls through our ERP system or what objects are changed and who changed them. I've read some on journaling but not sure if that will work for what we need. Suggestions? Thanks Mark

    Hllwyrs0 pointsBadges:
  • how to replace motherboards without loosing installed XP or 2000.

    Somebody out there must have figured out a reliable method of replacing a dead motherboard without loosing installed XP or 2000. Preferably a way that doesn't include matching the old motherboard (or its chipset). I am tired of seeing the "blue screen of death" or the "NT loader not found" message....

    Breesdad0 pointsBadges:
  • Looking for application vulnerability scanner

    My group is considering implementing an application vulnerability scanner to look for security holes in our Web sites. Can you recommend some products? Thanks

    Coder6270 pointsBadges:
  • How to network VLANs together

    What can be done for different VLANs to communicate including a router in a network, i.e., the commands when configuring on a router?

    NetworkingATE1,545 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following