• terminal server and gpo

    i have a server 2003 that configure as a terminal server, and i want implement a strict acess to this server from client (xp pro) to that server, i create ou that called "for terminal users" and create for that ou a gpo, now,, i want to know how should i change the gpo to achive the next goals: 1....

    Drorbeny0 pointsBadges:
  • USB Flash Drives Not Installing On XP

    Hello All! I've been noticing recently that certain USB drives have not been installing automatically to windows XP pro. I'm working on one right now and have not found a solution to it yet. A user needs to install a Sandisk Cruzer Mini USB Drive to her machine which uses XP Pro. Instead of...

    Thecheyguy0 pointsBadges:
  • Port 1894

    Hi, Our port scanner has detected '1894' as an open port. We know 1894 is an 'O2Server' port. Could you please throw some light on the port '1894'? Thanks kbs

    Hellokbs0 pointsBadges:
  • Laptop Security…

    Hi, I am the head of my department and by the nature of the job I hold some confidential information on my laptop. How do I ensure that 1. Nobody can access any files on my laptop from the LAN or the internet (not even sys admins) 2. If somebody tries to access, can I find out /trace who it is or...

    Blackmagic0 pointsBadges:
  • strange processes showing up in the task list some random numbers.TMP

    I suspect I have some trojan downloader? I keep finding strange processes showing up in the task list. These are some random numbers and letters with a .TMP extension? They cause my internet connection to either run very slow or in most cases it stops the connection to the internet. When I kill the...

    BigDInfla0 pointsBadges:
  • Local LAN Vulnerabilities and Open Ports NAT

    QUESTION: How someone would go about exploiting a vulnerability within a LAN sitting behind a router running NAT/NAPT...where would you start? Hacking the open port? Routing Tables? Accessing remote administration on the modem? (disable NAT)?? bah... MY SYSTEM/SETUP: I have 1 XP SP2 Machine running...

    Ladrick0 pointsBadges:
  • Network Resource Allocation cum Planning cum Technical Problem

    This is the real commercial problem face by my company. Well, the reason I ask this problem is I salute and respect all of you as I believe all of you are as good as network solution company out there, or even better!! Lets me rephrase the entire problem again. Company expand so fast that the IT...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure-2

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • What is SSI injection

    I recently read an article that mentioned SSI injection. I'm aware of SQL injection, but not SSI. Can anyone explain what it is and what should be done to protect against it? Thanks

    Coder6270 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Connection Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Folder Security

    We have a folder containing lots of confidential docs that supposedly accessible to all employees that should have read permission only. They should not be able to Print/Copy/SaveAs/E-Mail and do other docs stuff. Our IT staff had made the folder read only though people could still re-save the...

    ALVXSE870 pointsBadges:
  • Penetration Testing Career

    Hi Friends I want an advice from you guys. I have work exp in Web Developement and Quality Assurance. But my interest lies in security and penetration testing. Could you guys guide me where to start from. If there is any good material which can help me doing the same or some site where I can...

    DrDevil0 pointsBadges:
  • Explanation & remedy for Web-based Attack

    Fully Patched fresh Windows 2003 with PLESK 7.5.6 Compromised again in 30 minutes after a CLEAN rebuild here is How attack occurs ========================== first we observe service.dll Nadeware.msi in system32 folder and a clone of srv-u FTP had run. then we observe an account named help added to...

    Aalborz0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Fixing violation errors found with CHKOBJITG

    I have just begun running the command to check object itegrity on my system. I have encountered 2 basic errors - BADSIG & ALTERED. Can you please explain how I now correct these errors? The objects are basic IBM supplied code (i.e. ADDTCPLNK in QTCP library). I have no idea how these objects were...

    CMHIT10 pointsBadges:
  • Virus scanning the iSeries IFS

    Do you know of any products that will allow me to scan my IFS for viruses? If so, are you using the product(s) and are you satisfied with their performance? THANKS! for your help.

    CMHIT10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following