• What is SSI injection

    I recently read an article that mentioned SSI injection. I'm aware of SQL injection, but not SSI. Can anyone explain what it is and what should be done to protect against it? Thanks

    Coder6270 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • MSWord Password and MSExcel Password

    I am using different password for my secured files but I loose which one i use in certain file. Now I can not retrieve it. Is there any way i can open it again or retrieve my password so I can open my files? I have little knowledge in VB6, is there any one generous to give me a source code about...

    Cydean20060 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Folder Security

    We have a folder containing lots of confidential docs that supposedly accessible to all employees that should have read permission only. They should not be able to Print/Copy/SaveAs/E-Mail and do other docs stuff. Our IT staff had made the folder read only though people could still re-save the...

    ALVXSE870 pointsBadges:
  • Blocking pop access over http

    Dear you, How can I exactly block the following: 1- Hotmail pop access over http 2- Block skype phone calls 3- Block sites like gotomypc.com etc 4- Block internet file share drives like yousendit.com google drive Thank you Kindi

    KindiA0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Allowing IE to Install Selected Software

    When restricting users to non-Power Users settings, how do we allow a Web Browser Front End to an application to download and install: a) Active X-Controls b) Files c) Registry Keys. I assume that there are settings we can make via GPO?

    Mattblack0 pointsBadges:
  • IPSec VPN Connection

    Hi All, Let me explain my situation: Currently I am making use a PTPP VPN to connect to certain remote sites connected via dialup using VNC to access desktops for support issues. To do this I'm making use of dyndns dynamic ip service which allows me to map a hostname e.g. remotesite.dyndns.org to a...

    Ladrick0 pointsBadges:
  • Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Virus scanning the iSeries IFS

    Do you know of any products that will allow me to scan my IFS for viruses? If so, are you using the product(s) and are you satisfied with their performance? THANKS! for your help.

    CMHIT10 pointsBadges:
  • In VPN Which protocol to be used……??

    Hiiiii everybody..... I am Bala new member of this group I have got one small querry regarding VPN, in my organization i am trying to implement VPN for the remote access, in the bangalore office i wanted to install concentrator Cisco 3015 and in the bombay and pune office i wanted to configure VPN...

    Balasaheb0 pointsBadges:
  • Exam question Antivirus – VPN – related

    Hi I would like to offer a sincere thank you for reading this far. Im in deep trouble and need to answer a theory question for a presentation and would really appreciate any thoughts you can offer me. I only have the below information to go on and need to explain and present a soultion for the...

    Sprogg20010 pointsBadges:
  • Symantec Resources

    Our company has just partnered with Symantec and being new to their products, I'm finding myself a bit overwhelmed. Are there any websites that offer mailing lists or online forums that can help with some of the issues I'm running into? This seems like an interesting concept for user-to-user...

    SMSMVP0 pointsBadges:
  • Deleting old userids

    I used to display the last signon date on a specific user profile to know if it was still used, if it was older than 3 months, it was deleted. Now there are more & more user profiles defined to the system for other applications than the "green screen", like FTP, ISeries Navigator, ODBC, etc.......

    Hmonat20 pointsBadges:
  • Encrypted files on External HD, host machine formatted but recoverable

    Here is the lowdown, we have an external HD, and we backed up all the data needed too it. What i wasnt told was that the backup was being encrypted as it was being saved to the HD. So the pc was given to me to format and reinstall windows on. I did and now we get an access denied error when we try...

    Trelleborg0 pointsBadges:
  • data encryption/decryption

    We are in the process of building encryption/decryption applications. We are using the IBM QC3ENCDT AND QC3DECDT API'S. I've starting testing against our database using apprx 3000 records to encrypt and then decrypt. Out of that 3000 records, there are 17 instances of failure to decrypt to clear...

    Rigger0 pointsBadges:
  • Email encryption

    Dear Colleagues: What is the best way of detecting whether email messages are transmitted as cleartext? I want to determine whether our company email messages are encrypted or not when they are transmitted within and out of the corporate network. Thank you very much!

    Dyafrica0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following