• Sendig Mail to user@IP

    We have two Mx Record (same ISP) pointing to the same mail server. The Mail Server is REDHAT Linux. I want to send a mail to user@ip address (first or second Mx Record). This is basically to test if first Mx record fails, will the second record be used. I would be sending this mail from the LAN to...

    Jagdish60 pointsBadges:
  • DFs+policy restriction

    How do I prevent software download using group polocies Do i use software restriction and window installer policy Also, can i use dfs and a script that map network drives for my clients on logon togetter

    Outland0 pointsBadges:
  • iSeries IP adress restruction

    Hi, is there a way to restrict access to iSeries by IP address? I need to configure something on iSeries to prevent one PC to access on our iSeries and think that best way is to restrict IP address of this PC. Please help.

    Dalibor10 pointsBadges:
  • problem with exchange sync and pocket pc 2003

    i have a HP iPAQ hx4700 with Pocket PC 2003 on it that connect to the internet through my phone cellolar (with bluethooth connection), i want to sync all my contact and my calender on my ipaq to my exchange small buisness server 2003 through the internet,my server connect to the internet and are...

    Drorbenyosef5 pointsBadges:
  • ping from outside

    hi, could you please tell me which command in cisco routers prevent them from being ping from outside networks. and also how can i prevent terminals inside a network to ping outside ips(group policies etc??). thanks

    Redrose0 pointsBadges:
  • Desktop firewalls: Windows XP vs 3rd party

    For those with more experience with Windows XP, what do you think of the native personal firewall software? We recently upgraded a remote user to Windows XP from Windows 2000 Pro (actually, he got a new laptop). He connects to the Internet over DSL and we installed a free ZoneLabs firewall when he...

    VirgilB0 pointsBadges:
  • PIX VPN DHCP Relay not relaying DHCP packets

    Hi, I've setup a VPN across 2 PIX506e's using primarily the PDM software. IT is a very basic setup using PDM. I also needed DHCP relay to relay from clients on pix B to pixA and then the dhcp server. So I add in the DHCP relay server address on pixB and point to the relevant IP over the outside...

    Rgoulding0 pointsBadges:
  • Stuck with WEP – will increasing key lengths help harden WLAN?

    I have potential security issues on my wireless LAN because my equipment is older and I can?t use WPA. I'm worried that my data is vulnerable. If I increase my WEP key length from 40 to 128 or greater, will this help?

    Margaret Rouse1,725 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • Segmenting the LAN for Security purposes

    The worm Mspn32 came in on one machine behind the firewall and spread over e-mail or network to other departments. Could I isolate a worm once it's inside by dividing up my LAN into departments or sections with either departmental firewalls or managed switches and VLANS? Anyone doing this,...

    Rbos770 pointsBadges:
  • Backup of Router & Pix IOS

    How can we protect our router & pix firewall & how can we recover the ios when ios is totaly corrupted. how can we take backup of ios through tftp server. Please guide step by step as i am new to router & pix firewall. can u provide me website link from where i get the exact information.

    Psharma11760 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:
  • Cisco PIX VPN Bridging – Am I missing something??

    Hi, I'm tryin to set up a VPN between two internal sites on the same subnet. I have 2 PIX 506E's linked together (physically) in my test lab (on outside interfaces). All the configuration examples I've seen of setting up a VPN is between 2 different logical networks. However, I want them to act as...

    Rgoulding0 pointsBadges:
  • PIX – Allow UDP replies in.

    Hi All, The president of my company has started to use skype (www.skype.com). There is a function in the program to do file transfers. When we try that the program show that it has to relay the transfer and when it does that it limits the bandwith to 0.5kB/second. I've pasted the documentation that...

    Dansken0 pointsBadges:
  • SNORT RULES

    I am trying to define a snort rule that will detect the word "spam" in the subject field of an email. So far I have tried alert tcp any any -> any 25 (content:"Spam" nocase; msg:"Email traffic logged!";) But this is not filtering out only the emails that I want. ANy help would be much...

    Bred850 pointsBadges:
  • How to BVlock port on Pix 506 Firewall

    I am new to networking. I want to know how can i block the port in the network through firewall & proxy. Anybody can provide me some documenation on PIX Firewall & its basics.Pl. send some inportant site address to expand my knowledge. Bye Pramod

    Psharma11760 pointsBadges:
  • Use of TFTP

    Why is the use of TFTP discouraged on the network from a security perspective?

    AaronD0 pointsBadges:
  • Help required in configuring ISA server 2000 firewall

    Hi all, I have some queries related to Microsoft ISA server 2000. First of all I want to provide some info about my network. In my network most of the systems are using different flavor of MS windows and one computer (call it server1) is providing internet access to all the other computers...

    Iazher0 pointsBadges:
  • Security Forensics with Niksun or CA or Sandstorm

    Does any have experience recording and tracking traffic with playback using any of these venders. I am looking for the best solution to provide Forensics on my network. Niksun or CA or Sandstorm Also on a side not I am lookign for a product to do secure email delivery. Please let me know if anyone...

    Jclarkfl0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following