• Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • Sun Java Security Vulnerabilities

    Sun published updated versions of Sun Java JDK, JRE and SDK to close multiple security vulnerabilities. We have many applications that only work with a certain release of Java so if we upgrade all out client (to fix the vulnerabilities) then these applications will break. Are other companies...

    LisaChattin0 pointsBadges:
  • User profile / Paswwords

    We need to check to see which users have they passwords EQ to they user profiles ID's. Would we use IBM API's QSYRUPWD and QSYCUPWD for this process? Thanks

    Bruce0070 pointsBadges:
  • Group Policy Management

    Has anyone looked into Group Policy Management products (outisde of the functionality provided by Microsoft's Active Directory)? I'm trying to choose a product, and wanted to compare based on what current users thought (rather than what the sales departments tell me). The products I've been able to...

    TechSpaght0 pointsBadges:
  • AOL Spammer IP Identification

    Concerning the ever increasing amount of received spam, to battle this I have a program with which I can extract the IP address from the sender for reporting purposes, however, I have been receiving an increasing amount from AOL proxy server for which I cannot aquire the senders IP address. Is...

    Eyecatcher550 pointsBadges:
  • Uninstallation of norton wmi update

    respected recipient, I am currently having a trouble in uninstalling norton anti virus wmi update. My company got norton anti virus software installed on the system from the norton anti virus software cd and it was not norton system works , just the norton anti virus software.After somedays, it...

    Nishant70 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • Seeking SAP SEM configuration help

    Recently, Manish, a SearchSAP.com user, sent in the following question on SAP SEM. <p> "Apart from standard SAP help, does anyone know of a SEM-BCS step-wise configuration guide? <p> Is there anything I can order online? I want to start on SEM-BCS as soon as possible." <p> Do you...

    laurenhoyt115 pointsBadges:
  • securing a library on an iSeries400

    We've created a library to which we want to restrict access to a limited number of users. How can we do this on an iSeries at V5R3? There are files within this library that are used by programs in other libraries. When we restrict access to this library will this impact these files and if so is...

    Brami060 pointsBadges:
  • Need Help – Netscreen 25 with Fortigate 60.

    Hi All. Good Morning & Greetings of the season. I recently joined this company as a Network Security Specialist & the 1st task that i got assigned to myself was this. We have 3 locations - A (India) - Indian Operations B (California) - US Operations C (Datacenter) - Web & Media Servers My network...

    Nileshroy0 pointsBadges:
  • user password auditing

    We have recently purchased LC5 to perform password audits to discover weak passwords. The documentation indicates to use PWDUMP3 to extract password hashes from the Active Directory. I have looked everywhere and cannot find a legitimate site to download this tool nor can I find documentation. Has...

    INSANEIT0 pointsBadges:
  • Windows 2000 / 2003 Server Log Management

    Hi All, I am an IT Security Administrator of my company. i need to audit more than 100 Windows servers for systems logs, event logs , anti virus server logs almost every month. I am looking out for automated tools that can help me make my work easier. A product with a good reporting tool will be...

    Tarang0 pointsBadges:
  • Prefferred Anti Virus Program?

    Hi All, Can i get any suggestions on what you consider being the BEST Anti virus software with not much hassles! The 2 i`m most interested in is Norton and Mcafee? Any 3rd party app will also be greatly appreciated! I had Norton 2005 Internet Security on my PC,1.7GHZ AMD,Win XP SP2, 384MG RAM and...

    Wazzup0 pointsBadges:
  • limiting access to a command line.

    Is there a way to remove a command line from a screen such as a WRKOUTQ OUTQ(nnnnn)? I am trying to find out how "developers" can look at reports on outqs such as qezjoblog without being able to make use of the command line. Setting the "limit capabilities" value on the profile does not seem to...

    Jockcibc5 pointsBadges:
  • ECPI college…good or bad

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design and computer science and I'm wondering if ECPI or any...

    TripleHHH0 pointsBadges:
  • ECPI college…good or bad-2

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design, internet security and computer science and I'm wondering...

    TripleHHH0 pointsBadges:
  • has anyone had issues with appliances getting cracked?

    We have a mcafee anti-virus and anti-spam appliance. We used it as out internet email presence and as a web proxy. All email comes in thru it and all web traffic from our internal web proxy went thru it. The web proxy is limited to less than half of the internet bandwidth. It is behind stateful...

    Astronomer15 pointsBadges:
  • Pix Firewall and Proxy Server

    I need to allow only one IP address (the one for proxy server) to browse through Pix firewall to Internet. What will be the commands in PIX firewall to block the traffic to Internet from all the network 10.2.1.x but only allow 10.2.1.10 (Proxy server). All other computers will use proxy server...

    EngineerIT0 pointsBadges:
  • Windows 2000 Server logs

    Hi All, Basically i want to monitor all the activities of my administrators. Is there any way I can find out all the activities on a Windows 2000 Server eg:- success / failure logs ,which users had logged on to a server , user creation time ,service stopped at what time, what scripts have been...

    Tarang0 pointsBadges:
  • IT Security

    Hi all, Thanks to all those who answered to my question"FTP sites" Can anyone of you let me know about the available products that we can use for our organisations IT security..Also let me know what products are available to find out vulnerabilities in a network. Appreciate your response. Thanks...

    Tarang0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following