• Is Trillian still being supported?

    Is Trillian still being supported or developed? The last time I used it, it got too buggy to even open. Plus, Trillian's own support page is saying that it's just been quiet on their end. Is it safe to assume I won't be able to use it again?

    Tessa Parmenter1,040 pointsBadges:
  • Receiving blank instant messages from coworkers

    I am receiving IMs from coworkers but there is no text in the message. I can see their responses pop up but they are blank.

    tpresland5 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • Security/ Audit Check list for DB2

    Hi, I'm in the process of hardening the DB2 in Linux and I'm looking for a checklist to help me make sure I don't miss anypoint. Since I'm not an expert on DB2 I would like to have a starting point. I'm looking to make sure I don't leave open doors and also I want ot make sure I don't get an Audit...

    Josec990 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • User circumventing security

    We have a rogue user who knows more than she should. She can grant herself and other users the authority to access files that are supposed to be secured. Does anyone know of how we can monitor her activity or go back and review what she has done or anything that we can do. We think she may be using...

    Mouse3330 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • Internet Fraud, Schemes, Hackers and the like

    Often times many consumers get these e-mails from Nigeria, Russia, China and so on purporting a long drawn out story about a deceased king and so on. They can be caught by looking at their headers, but I've been told sometimes they use fake e-mail addresses. Is their a fool proof way to identify...

    Intelops570 pointsBadges:
  • Configuring Lotus Sametime 7.5.1

    Is there a way to configure Lotus Sametime to show what you chat partner is typing before he sends the text? Or, a plugin that allows this option.

    JLiddle5 pointsBadges:
  • IM list

    Removal from IM list?Fri, 21 Dec 2012 00:50:20 You have been automatically removed from the IM list (im) as a result of repeated delivery error reports from your mail system. This decision was based on the list's automatic error monitoring policy and has not been reviewed or otherwise confirmed by...

    REMOVALFROMIMLIST35 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • How are Sametime Messages Stored and how to I Export Them?

    Hello, I've been asked if I can extract Sametime messages and then archive them to a recods management system.  How are the messages stored, assuming the customer has opted to save them?  If they are stored in an Oracle, MSSQL or MySQL database, I can probaby extract them easily.  If they are...

    Bbirns5 pointsBadges:
  • Blocking IM clients from network

    How can I prevent all instant messaging clients on my network while still allowing our proprietary im/email system to function? We are using a sonicwall and barracuda web filter 300.

    TeachMeIT975 pointsBadges:
  • Problem with Msn Messenger

    Hi, I have a Win Xp , service Pack 2 computer, and have msn messenger 7.5 on my computer. I am having a problem connecting with msn messenger. Its giving a message stating the key ports are blocked and i am not able to connect, suddenly it started doing this because i was able to connect with msn...

    Mdimthays10 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Posting Data Online

    We want to "post" various documents on-line so that we can give members of our outside consulting group access to view, and even possibly download them. Is it possible without opening them up to the public-at-large? In answering, keep in mind the following: 1. We prefer not to purchase any...

    TheVyrys0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following