• What kind of mobile device restrictions do you have in your organization?

    With the popularity of a diverse range of mobile phones and devices, many organizations have set strict policies and restrictions on the mobile devices employees are allowed to user for work. Whether it's making users choose between a set range of mobile offerings or not allowing mobile devices to...

    JennyMack4,280 pointsBadges:
  • How vulnerable is sensitive information on mobile devices?

    I'm quoted in today's Wall Street Journal in a special section on mobile security (page A20) and thought this subject would make for a good topic of discussion on ITKE. We hear story after story, breach after breach, and study after study related to sensitive information on mobile devices being...

    Kevin Beaver17,800 pointsBadges:
  • j2me merits / demerits

    I AM DEVELOPING AN APPLICATION FOR SMS ENCRYPTION USING J2ME.TELL ME THE MERITS DEMERITS OF USING THE SAME AS AGAINST SYMBIAN/WINDOWS ETC .THANK YOU

    Ashwini7710 pointsBadges:
  • System Security = hacking into laptop

    ad hoc computer to computer software for windows, can it really extract data from my mac by a entity, using as a location marker the laptops antenna and serial numbers. I've heard of NT users having this capability using a wifi neighborhood signal detector

    ReneeS5 pointsBadges:
  • Enterprise iPhone?

    Gartner recently flipped its position on the iPhone in the enterprise. Their opinion changed from: don't use it. To: use it at your own risk, but don't expect much support from Apple. Let's be honest: The iPhone may be one of the coolest gadgets to come along in a while, but does it have a place in...

    BKraemer25 pointsBadges:
  • security problem

    Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it....

    BinooDas123410 pointsBadges:
  • VLANS IN SWITCHES

    Hello, I have a managed switch and i have created three vlans in that switches. how can i communicate with these three vlans within this switch and also if i connect another switch with this one to the port belongs to vlan 1 then the frame comes out of third vlan to second switch will contain a...

    Breathe0 pointsBadges:
  • Remote users with VPN client slow access times

    I have couple of remote users with VPN clients. From time to time when they are not connected to main site they report that it takes long time to open documents on local machines. Their laptops are attached to domain; I enable logon cache in for 50 logons, via policy. Am I missing anything else? It...

    Dimchik0 pointsBadges:
  • SSID / DHCP isolation

    I am interested in installing a second WLAN in a warehouse that should already have another WLAN working. If have an unique SSID, will I have to worry about colliding with the DHCP services on other SSIDs? Thanks, Paul

    Paul144hart0 pointsBadges:
  • implementing LAN in mobile phones

    hi all, I am a final year Comp. Engg. seeking for a project related mobiles. I need help in implementing an appln. for mobiles which would be much similar to connecting PC's in LAN, i.e making mobiles to share data with the other in its network. According to my thinking this is possible in...

    Tampuraj0 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Multiple Connections – Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is, this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Ad Hoc in the corporate environment

    I am the LAN/WAN/WLAN administrator for a division of a very large corporation. I just received a Dell Latitude D-600, which has a built-in Intel Pro Wireless 2200BG. We have quite a few D-600's and D-610's. Looking through the wireless security alerts on my switch, I noticed that there were a lot...

    Larrythethird0 pointsBadges:
  • Hardware Firewall for Wireless

    We are plaining to implement wireless internet access in our company , which we be the best hardware firewall for wireless lan

    Malebold0 pointsBadges:
  • Blocking Music on Internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does is use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • error message I was trying to send out e-mails

    the error message stated " the connection to microsoft exchange server is unavailable outlook must be online or connected to complete this action"

    Newmiko390 pointsBadges:
  • NMAP IN WIRELESS

    Hello, Can any one explain me what is NMAP , how NMAP works and how to use it. Kind Regards, Gopal.

    Breathe0 pointsBadges:
  • WIRELESS BRIDGES

    Dear Sir's, I have two wireless bridges. Master and Slave which are 800 ft apart and two high gain antennas are attached to these units. I am finding a disconnection problem with these bridges. It works for a while but gets disconnected and after doing powercycle on the slave end the bridge starts...

    Breathe0 pointsBadges:
  • Antenna specifications / datasheets for Wireless LAN client end adapter

    Dear Friend, If you have any specifications / datasheets on antenna specifications for the client end adapter for 802.11a standard or 802.11b or 802.11g standard, please refer them to me. Thanks and regards, Bhushan

    MSNITSEARCH0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following