• Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • SOX Vulnerability Assessment & Audit Prodcuts

    Are there reviews showing SOX Vulnerability Assessment & Audit products? NetIQ seems to show up in a number of security categories(SOX, Mtg, Assessment, Patching), how does it compare to the other products? Thanks for any help & pointers you can provide! Cheers

    WintelEngr0 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Automatic Refresh in Notes 8.5.1

    The Inbox view does not automatically refresh. This is a feature in Notes 8.5.1. Does anyone know what could be cause. Would deleting Inbox and replacing design to add Inbox back fix issue?

    Tvickiecc265 pointsBadges:
  • enable adjacency

    How do I enable the adjacency feature on a cisco 3550

    Bunny115 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41020 pointsBadges:
  • I’ve been hacked — I think….

    I'm an IT administrator with a little over 500 end users, running Windows 2000 and XP. One of our users is experiencing a problem with her Internet connection suddenly dropping for no apparent reason. When she restarts her computer, everything works fine for awhile, but then the connection drops...

    LMullen0 pointsBadges:
  • aaa authorization ?

    Which of the following authorization commands are valid? (we have to choose 2 correct) A. aaa authentication exec home radius B. aaa accounting exec home radius C. aaa authorization default none D. aaa authorization exec home radius E. aaa authorization network default enable F. aaa authorization...

    EngineerIT0 pointsBadges:
  • IM Blocking and URL Filtering

    We have Pix515E which is gateway to Internet. We also got IWSS Proxy(Trend Micro) along with URL filtering module. Domain users get directed to IWSS proxy (GPO settings) and restrictions about URL filterings can be imposed as per company's policy. Those users who are not on the domain, they can not...

    EngineerIT0 pointsBadges:
  • Demilitarized zone using iptables?

    Hi, I'm the Assistant Editor for SearchEnterpriseLinux.com. One of our users, "ruhi," posted the following question. Can you help? "I have to plan and design a demilitarized zone using iptables. How can I do this?" You can post your answer here on ITKE, or reply to...

    AmyKucharik420 pointsBadges:
  • Natting in PIX ???

    Hi Members, I have a requirement for accessing one of our server in inside segment using nat ip from inside segment. I have configured static nat but it is only for those connections initiated from outside and not from inside. Connections initiated from outside (internet) to this natted ip of my...

    Keshav0 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • isearch toolbar

    Has anyone heard of a malware product called isearch toolbar? If so, do you know how to get rid of it?

    Duckie5220 pointsBadges:
  • Cisco PIX VPN Bridging – Am I missing something??

    Hi, I'm tryin to set up a VPN between two internal sites on the same subnet. I have 2 PIX 506E's linked together (physically) in my test lab (on outside interfaces). All the configuration examples I've seen of setting up a VPN is between 2 different logical networks. However, I want them to act as...

    Rgoulding0 pointsBadges:
  • Exchange 2000 issues

    I seem to have 2 issues. Both are on the same setup. Windows 2000 Server running Exchange 2000. Both have all the latest patches and SP's. 1) Mail will flow inbound just fine. Some mail will flow outbound just fine. Certian addy's just have in the SMTP queue ( AOL,Yahoo, Bellsouth ). Other mail...

    Aclark950 pointsBadges:
  • Yearly Data owner review listing

    Hi, We are currently on SAP 4.6C With SOX and other security settings we need to min. yearly prepare a user list per data owner, so that the data owner can review and sign-of on this. The data owner is determined per role. Now my question is, does anyone know a way of assigning a data owner to a...

    Sigrconi0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following