• ECPI college…good or bad-2

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design, internet security and computer science and I'm wondering...

    TripleHHH0 pointsBadges:
  • Pix Firewall and Proxy Server

    I need to allow only one IP address (the one for proxy server) to browse through Pix firewall to Internet. What will be the commands in PIX firewall to block the traffic to Internet from all the network 10.2.1.x but only allow 10.2.1.10 (Proxy server). All other computers will use proxy server...

    EngineerIT0 pointsBadges:
  • Windows 2000 Server logs

    Hi All, Basically i want to monitor all the activities of my administrators. Is there any way I can find out all the activities on a Windows 2000 Server eg:- success / failure logs ,which users had logged on to a server , user creation time ,service stopped at what time, what scripts have been...

    Tarang0 pointsBadges:
  • Associating MS Certificates w/ handwritten signatures

    Does anyone know if it is possible to associate a Microsoft PKI/Certificate to a signature image (handwritting) so that a document/email can be signed (digitally) but will also have an image of the associated handwritten signature embedded within the document (and secured)? I know more advanced...

    Michael7110 pointsBadges:
  • Using client certificates with Cisco VPN 3xxx concentrator

    I am specifically looking for a way to match Windows loging credentials with a user certificate and then transparently submit to Active Directory for authentication. It seems that the Cisco VPN client first checks the validity of the certificate (without matching the Windows credentials) then...

    Stuberman0 pointsBadges:
  • IT Security

    Hi all, Thanks to all those who answered to my question"FTP sites" Can anyone of you let me know about the available products that we can use for our organisations IT security..Also let me know what products are available to find out vulnerabilities in a network. Appreciate your response. Thanks...

    Tarang0 pointsBadges:
  • Need guidiance from pros already into the game

    Hi, I am a United Stated Marine stationed overseas since 2003, majoring in Information technology with National University. I am still an idiot in the field and thats why i joined this group. To get a glance of what to ecpect in the future. I am asking for your help in guiding me through whatever...

    Foguno0 pointsBadges:
  • Local Admin & passwords

    We have recently switched to allowing only Power User rights on notebook computers. We have a set of notebooks we loan out to employees with desktops when they need to travel. Currently those users will login with an account named loaner and use scripts and webmail to access the network. Discussion...

    Roced40 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • IM Blocking and URL Filtering

    We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL filterings can be imposed as per company's policy. Those users who are not on the domain, they can not...

    EngineerIT0 pointsBadges:
  • LDAP in DMZ

    We are using LDAP for Internal environment as an Enterprise directory having lot of application and user specific data. There is requirement to access LDAP from external network also. Bearing that in mind we shall have LDAP Server in DMZ to service external applications. Here we are using Sun...

    PankajAnand0 pointsBadges:
  • Sendig Mail to user@IP

    We have two Mx Record (same ISP) pointing to the same mail server. The Mail Server is REDHAT Linux. I want to send a mail to user@ip address (first or second Mx Record). This is basically to test if first Mx record fails, will the second record be used. I would be sending this mail from the LAN to...

    Jagdish60 pointsBadges:
  • expired credentials in Windows XP

    We have one particular XP-Pro system that repeatedly throughout the day (5-6 times) will ank the user for their credentials again. After entering them will continue just fine. This is the only system doing this and is pretty annoying. Why is this happening?

    Bugwit0 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:
  • ping from outside

    hi, could you please tell me which command in cisco routers prevent them from being ping from outside networks. and also how can i prevent terminals inside a network to ping outside ips(group policies etc??). thanks

    Redrose0 pointsBadges:
  • Resticting Members of BuiltinAdministrator to just be able to create Domain Trust

    In windows 2000/2003, Can we restrict a BuiltinAdministrators member to have just enough rights so that he/she can only create/delete domain Trust. The requirement that we have is to be programmatically create trust with all the domains in a given forest. The other part of the requirement is to...

    EternalLearner0 pointsBadges:
  • Stuck with WEP – will increasing key lengths help harden WLAN?

    I have potential security issues on my wireless LAN because my equipment is older and I can?t use WPA. I'm worried that my data is vulnerable. If I increase my WEP key length from 40 to 128 or greater, will this help?

    Margaret Rouse1,775 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following