• Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE352,485 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • Help with E-Mail error code 550 5.7.1

    Can anyone help me please.  I am trying to send an email to a business account but I keep getting the mails bounced back to me with the following error code.  I have also tried to email someone else at their headquarters and get the same message...... reason: 550 5.7.1 Requested action not taken:...

    Dan197315 pointsBadges:
  • Security implications of a password blacklist

    Does maintaining a password blacklist on database create any security risks?  Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.

    ITKE352,485 pointsBadges:
  • What should the process be to remove users on leave?

    Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?

    sfuboy5 pointsBadges:
  • How do spammers send email that looks like its from a real company?

    How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real?  Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...

    ITKE352,485 pointsBadges:
  • Why use Cached Exchange Mode Outlook 2007??

    Only by using Cached Exchange Mode can i access previous mailbox items or per-configured OST file items. waiting for a good response....

    OutlookOST275 pointsBadges:
  • What does the “t” in .pst and .ost stand for

    What does the "t" in .pst and .ost stand for

    Jim H5 pointsBadges:
  • Does SSL equal secure email through transit?

    If an email server sends messages via SMTP/SSL and the recipient uses SSL to receive his email, will the message be secure through the entire transit? Des this mean the e-mail will be delivered in plain text between the servers?

    ITKE352,485 pointsBadges:
  • I’m looking for a stronger authentication method for web services

    I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...

    ITKE352,485 pointsBadges:
  • Exchange mailbox reports

    Can some one please tell me how to enable to track mailbox content and mailbox traffic of my company. I want to create a report based on the mailbox traffic and content. I want to automate this process because I don't want to log in every month.

    bradcam15 pointsBadges:
  • How can I block an email tracking service?

    A good friend of mine recently came across this free email tracking service known as bananatag. He found out the service is able to track the fact that the email was read in Gmail without any notice but he has some concerns. Is there a way to block the email tracking service?

    ITKE352,485 pointsBadges:
  • Help! I lost an encrpyted emai

    Hi Everybody! I need to encrpyt an email with the recipient's public key, using Thunderbird, Enigmail and OpenPGP. I'm new to OpenPGP and have very little experience with Thunderbird. Now that I've encyrpted the email and sent it, I can't in my Sent folder. Any idea where it went?

    ITKE352,485 pointsBadges:
  • sending to groups

    I am trying to send e-mail to groups that I have in my address book with outlook (hotmail). My groups are 33-37 addresses. On my first attempt the message only went to 20 of 33 in the group. Is there a limit to how many can be in a group?

    jimmiejim5 pointsBadges:
  • Exchange 2013 where to troubleshoot mailflow issues.

    I ran into an interesting issue the other day we were having mail flow issues, end users reported mail not working, I remember in exchange server 2010 I would normally check make sure its not a connectivity issue they were still connected to exchange server, next I would check toolbox next.  with...

    Arcolino20 pointsBadges:
  • S/MIME and PGP: How do they differ?

    This is more of a general question but is S/MIME an abstracted system for MIME type encryption (Just as PGP is used more for email)? Why should I choose one over the other? Is it possible both could be used at the same time?

    ITKE352,485 pointsBadges:
  • Track Mailbox access on Exchange 2007

    I want to track who is accessing others’ mailboxes in our Exchange server environment. Settings of access permissions for mailbox access are not perfect. We are on Exchange 2007. I tried to find it through application event logs but wasn’t able to do that. Also, can I find who accessed...

    paulmarsh5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following