• Outlook web Access (OWA) security concerns

    Hi, I'm trying to convince my boss that our organization can provide access to e-mail over the internet without security threats. I plan to use OWA. So, can you tell me the risks and the counter measures?

    Acastanheira20015 pointsBadges:
  • Free IT Book: CompTIA Security+ Certification Passport

    This week's free IT book is Mike Meyers' CompTIA Security+ Certification Passport: Revised for the new CompTIA Security+ exam (SY0-301). The new edition provides a condensed and concise review of CompTIA’s well-established security credential. For a chance to win this quick review, cram-style...

    MelanieYarbrough6,345 pointsBadges:
  • 0x8007F0F4 error code when installing Windows Server 2003 security update

    When trying to install Security Update for Windows Server 2003, it fails with the following Error Code: 0x8007F0F4.

    123456300 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Free IT Book: The Accidental Administrator: Cisco ASA Security Appliance

    This week's free IT book comes with a bonus interview with the author, Don Crawley! Check out what he has to say about the book, the process, and the joys of being an IT-type personality. Then answer one of the questions below and post the link to your answer in the discussion section for your...

    MelanieYarbrough6,345 pointsBadges:
  • Cannot Ping Public IP from ISA server 2006

    Dear I am unable to Ping the Public IP over the Internet, My, Client is Behind ISA, ISA disallow to PING the Public IP on internet I want to enable but cannot done in ISA server 2006 E.E. I already add the ICMP and PING protocol in my Array

    Quakerquakest110 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • How to retrieve passwords in Thunderbird via HDD?

    How does Thunderbird 8 store passwords and how does one retrieve them via HDD? I would usually use NirSoft, but it's not compatible with Thunderbird 8.

    ITKE334,795 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • OST files

    We are migrating users from one exchange server to another. the users sit in remote sites and use very slow links to connect to the exchange server. Is it possible to use the old ost on the pc for the new exchange server instead of recreating the ost with the new exchange server, which can take...

    PaulBone10 pointsBadges:
  • Help with E-Mail error code 550 5.7.1

    Can anyone help me please.  I am trying to send an email to a business account but I keep getting the mails bounced back to me with the following error code.  I have also tried to email someone else at their headquarters and get the same message...... reason: 550 5.7.1 Requested action not taken:...

    Dan197315 pointsBadges:
  • Security implications of a password blacklist

    Does maintaining a password blacklist on database create any security risks?  Basically, I'm looking to create a list of 500 or so commonly used passwords to stump very basic automated spambots.

    ITKE334,795 pointsBadges:
  • What should the process be to remove users on leave?

    Typically when a user goes on disability, short term, or parental leave, do you disable their AD? What about their exchange? RSA? Smartphone?Also, is there usually a process to inform them that you are disabling their access?

    sfuboy5 pointsBadges:
  • How do spammers send email that looks like its from a real company?

    How do spammers send e-mails that appear as if they came from a big company and more importantly, are there techniques to detect which messages are soam and which are real?  Are the emails being sent from a spammers server or do they hijack the company's mail servers. Is it possible for someone to...

    ITKE334,795 pointsBadges:
  • Why use Cached Exchange Mode Outlook 2007??

    Only by using Cached Exchange Mode can i access previous mailbox items or per-configured OST file items. waiting for a good response....

    OutlookOST275 pointsBadges:
  • What does the “t” in .pst and .ost stand for

    What does the "t" in .pst and .ost stand for

    Jim H5 pointsBadges:
  • Does SSL equal secure email through transit?

    If an email server sends messages via SMTP/SSL and the recipient uses SSL to receive his email, will the message be secure through the entire transit? Des this mean the e-mail will be delivered in plain text between the servers?

    ITKE334,795 pointsBadges:
  • I’m looking for a stronger authentication method for web services

    I deployed a two-factor-authentication solution in order to strength logon to our web applications. The majority of our users who have new tokens are also pop3/imap users (this is from a long time ago). However, I noticed web applications are well protected by 2FA , but mail applications is an easy...

    ITKE334,795 pointsBadges:
  • Exchange mailbox reports

    Can some one please tell me how to enable to track mailbox content and mailbox traffic of my company. I want to create a report based on the mailbox traffic and content. I want to automate this process because I don't want to log in every month.

    bradcam5 pointsBadges:
  • Mailbox Access Permissions Auditing

    I need to get some suggestion about non-owners access to user mailboxes regarding full access permissions. In most cases Only users should access to their mailboxes on computers that are running Exchange 2008. I want to audit any changes made to any mailbox regarding Full Access Permissions and I...

    jonesaac5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following