• Demilitarized zone using iptables?

    Hi, I'm the Assistant Editor for SearchEnterpriseLinux.com. One of our users, "ruhi," posted the following question. Can you help? "I have to plan and design a demilitarized zone using iptables. How can I do this?" You can post your answer here on ITKE, or reply to...

    AmyKucharik870 pointsBadges:
  • Resticting Members of BuiltinAdministrator to just be able to create Domain Trust

    In windows 2000/2003, Can we restrict a BuiltinAdministrators member to have just enough rights so that he/she can only create/delete domain Trust. The requirement that we have is to be programmatically create trust with all the domains in a given forest. The other part of the requirement is to...

    EternalLearner0 pointsBadges:
  • PIX VPN DHCP Relay not relaying DHCP packets

    Hi, I've setup a VPN across 2 PIX506e's using primarily the PDM software. IT is a very basic setup using PDM. I also needed DHCP relay to relay from clients on pix B to pixA and then the dhcp server. So I add in the DHCP relay server address on pixB and point to the relevant IP over the outside...

    Rgoulding0 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • isearch toolbar

    Has anyone heard of a malware product called isearch toolbar? If so, do you know how to get rid of it?

    Duckie5220 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:
  • Cisco PIX VPN Bridging – Am I missing something??

    Hi, I'm tryin to set up a VPN between two internal sites on the same subnet. I have 2 PIX 506E's linked together (physically) in my test lab (on outside interfaces). All the configuration examples I've seen of setting up a VPN is between 2 different logical networks. However, I want them to act as...

    Rgoulding0 pointsBadges:
  • CITRIX – How to Print outside LAN to OFF-Site printers

    I need your help in this scenerio! what are your 2 cents? Goal: To go to a FULL Citrix Enviroment, Aiming at Thin clients, maybe linux based Off-site: Offices connect through the internet, they have DSL/T1's. Right now they are using Citrix successfully. If they have a printer over there and they...

    Ocarmona0 pointsBadges:
  • Desktop to AS/400 encrypted communications

    We currently have many users connecting to multiple AS/400 servers using TCP/IP. The servers OS vary from V4R5 to V5R3. Several products are used to communicate through the network from the desktops to the different servers. We are looking for a solution that will encrypt the information being...

    Neverham0 pointsBadges:
  • Restricted access to win XP professional

    I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks...

    BinooDas123410 pointsBadges:
  • Event viewer err Msg.

    Good day, 1.In our organisation, we are using windows2000 smallbusiness server with EXCHANGE , ISA server and DNS configured. but all the client pc's are given static ip address instead of dynamic ip. will this create any problem ? daily i'm receiving many application error logs.particularly 2 type...

    GiriPrasad0 pointsBadges:
  • Network UserID Creation/Change

    Looking for White Papers, Best Practices, Your Practice...on UserIDs What should a Network UserID look like for strong security? I don't believe it should contain any part of the user's legal name. Agree? So what do you use to create a UserID? Should a user be able to change their UserID? Thanks...

    GPHdo60 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following