• Should we conduct our disaster recovery drill in its entirety?

    We have several applications working in our organization. However the DR drill is taken on a piecemeal basis for individual application only. Is it a best practice to conduct the DR drill in its entirety? We have resource problems in terms of hardware and software and personnel available.

    mdamirvij5 pointsBadges:
  • Restore Exchange to earlier backup delete recent messages in Outlook?

    Our Exchange 2003 server recently died and our latest working backup is several months old. We would like to restore to this backup to preserve the contacts and company public folders but we are concerned that doing so will wipe out all the recent messages and appointments in the Outlook clients...

    GCtech5 pointsBadges:
  • Configuring a disaster recovery plan for Exchange Server 2007

    I have disaster recovery plan for my Exchange server in mind, but I like to know if you have any idea how to configure it appropriately. I have a production server running Exchange Server 2007, and I backup with Data Protection Manager 2007 every 15 minutes. I like to have a virtual machine on a...

    Exchange Ask the Experts580 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Off-site back responsibilities for banks and other financial institutions

    With all respect to disaster recovery, does anyone know if it is mandatory for financial institutions who accept public funds to keep copies of important customer files off site?

    PAROPINTO50 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • ChoicePoint CISO says breach not an information security issue

    The CISO of ChoicePoint says the theft of private information on 145,000 from its databases isn't an information security issue because conmen used fraud, not hacking tools or techniques, to get the information. Anyone agree with that? Check it out:...

    Athletica0 pointsBadges:
  • Setting up database mirroring for disaster recovery in SQL Server

    I am a SQL Server DBA and in the process of upgrading our SQL Server 2000 to SQL Server 2005. I’ll be using database mirroring for the disaster recovery in SQL Server. One question I have is once I failover to the mirror server and use it as a principal for a couple of days, how do I make sure...

    SQL Server Ask the Experts2,585 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server-2

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small secure web service application for reporting purposes that will require minimal IT expertise to build or maintain, and will deliver maximum...

    Mmosystem0 pointsBadges:
  • Disaster Recovery

    Hello there This is Faisal Rafiq, kindly send me the best link of Windows Disaster Recovery articles. Thanks.

    239069370 pointsBadges:
  • Free IT Book: Network Security Technologies and Solutions

    From the back of the book: "A comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. Understand and implement current, state-of-the-art network security technologies to ensure secure communications through the network...

    MelanieYarbrough6,345 pointsBadges:
  • Need to know about the VMware SRM competitors and their DR solutions

    Hi, I am working for VMware SRM DR Solution in VMware. I am curious to know about the SRM Competitor Products and their solution features on Disaster Recovery. Regards Narendra

    um0L6Bg5 pointsBadges:
  • Some research ideas

    What does company look for in the field of SAN, disaster recovery or any research can be suggested in the domain of cloud storage?

    Teaching20115 pointsBadges:
  • Block IE or Internet access with group policy

    Is there any way to block Internet access with group policy? I am setting permissions for some of the machines locally to only allow certain users access to the IE executable, but that is a pain in the butt. I have: Win2k3 single domain with 2 DC's approx 50 XP Pro workstations. I'm guessing this...

    TheVyrys0 pointsBadges:
  • Backup and Disaster Policies

    I believe this is the best forum to ask this question. I have got 2 NetApp storage's: One on the Head Office and another on the DR site, which is basically storage to storage Replication with snapshots enabled. At present we don't take any kind of backups on the tapes or other drives. Is this a...

    886410 pointsBadges:
  • Windows Server 2012 – VM Domain Controller

    Hi, I am looking at implementing dual VMWare servers both running duplicate VM servers. 1 server would have a Virtual Exchange server and a Virtual Domain Controller. These would be to Network storage for data and mailboxes. The second server would also have a duplicated copy of the virtual servers...

    Riksupport15 pointsBadges:
  • SunGard live webcast: Optimizing your disaster recovery dollars to address real risks

    Join us on September 27 at 2 p.m. ET for the SunGard live webcast to learn why it's important to re-evaluate your DR strategy and spending dollars and determine whether or not they're being optimized to mitigate the real risks to the business.

    Michael Tidmarsh28,675 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following