• I am using windows 2000 server. I have change my child domain password has been changed autometically,My administrator is unable to resetted the p/w?

    I am using windows2000 server with DNS,DHCP. I have child domain password. on 13th of August I have changed my child domain password. But  I asked my administrator " We are not getting child domain password, but didn't changed password or he is unable to reset password remotely. Please suggest me:...

    Vijay400885 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • How can I divide a network in two segments?

    Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide? Regards and...

    Nikjdk0 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • Configuration problem on 2950 port security sticky behavior

    Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...

    Patelmanojk50 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Wake on LAN / Magic Packet broadcast doesnt work through PPTP

    Hi, I have a network, where I want to use WOL from a remote PC. It works when I send a packet from inside the network (or on the server). If I connect via PPTP from a remote Windows XP PC, I can't wake up the PC on the LAN. I suspect the broadcast packet doesn't reach the LAN. The PPTP connection...

    Benbje0 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • LAN connectivity problem with Compaq notebook

    I have a Compaq EVO n1020v notebook. This works fine in our office LAN and sometimes it does not at all. Office LAN is a workgroup with ICS enabled in win 2K server. If I check the IP of the notebook it shows the IP of the LAN but never connects to the internet, can't access LAN...

    BinooDas123410 pointsBadges:
  • vpn through s-box firewall of checkpoint

    i'm try to create a vpn from the internet to my "small buisness server 2003" that act as vpn server without any luck, if i try to connect to my server from the internal network it's work just fine, iv'e mapped the correct ports according to the microsoft article that say to forward port 1723 and 47...

    Drorbenyosef5 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general detection & removal of virus).(Also...

    4238830 pointsBadges:
  • Developing an antivirus (efficient):for Windows:Using VC++-2

    I am working on a Project for making an antivirus.I have 2 other project parteners. But we don't have an guidance on how to develop the antivirus.Plz give me any relevent Information on this subject.(like components of AV,Algorithms(efficient),methods,general dection & removal of virus).(Also...

    4238830 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Limiting access to VPN users

    Hi, I am using VPN concentrator 3500. Please let me know how to limit access to certain users that have a VPN account on the VPN Concentrator on certain server when they VPN in. Looking forward to hearing from you, With thanks and regards, Helal

    Helalahad0 pointsBadges:
  • Where can I find record that my computer was attacked?

    The following question was sent to SearchWindowsSecurity.com by a user: Some hackers attacked my computer and shut it down. No port scan program or logger is reporting an attack. What's going on, and where can I find record of the attack?

    LMullen0 pointsBadges:
  • trojan horse downloader

    hi i have a win NT4.0 sp6 server.its a DNS and web server. from few days the IE was redirecting the sites to some search engines.when i scaned with AVG it detected some trojan horse downloader.i healed the trojan and restarted the DNS.the problem was solved.but after some hours the problem arise...

    Redrose0 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • VNC over Broadband/internet

    Hi all, My IP skills are somewhat rusty - could someone please help me with some high-level steps to remote control using VNC over the internet... scenario: Customer down the road is always requiring assistance - usually I need to jump in the car & go there to sort out the latest dilemma. I'd like...

    SCOOBAMAN0 pointsBadges:
  • Restrict traffic for Cisco VPN clients

    Hi all, First some background for my question: I have recently set up a VPN tunnel between a Cisco PIX 506E (VPN server) and remote clients. The remote clients use Cisco VPN Client software version 4.8. Everything seems to work fine. But as it is configured right now the remote clients have full...

    Daniel40 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following