• Blocking spyware and inappropriate sites

    Can we monitor and filter our wireless network? Are there free tools for this? We want to block porn and spyware sites.

    Troubleshooter24755 pointsBadges:
  • Creating ACLs on the network

    How can we create ACLs on the network to block out users from attempting to connect to HR file shares?

    Troubleshooter24755 pointsBadges:
  • Help choosing a career path in IT Security

    Hi, I need expert advice on which aspect of security to major in. I have a background in engineering, from which i switched to Oracle database. Havent worked with the oracle Database learned and the certification gained as it was tough getting the job.I am doing  my Msc in Information Security...

    BENSARH5 pointsBadges:
  • Has anybody used Cyberoam for network security?

    Am looking at implemeting Cyberoam 15i a unified threat management equipment for a small enterprise instead of Microsoft Forefront please i want to know if cyberoam is a good security solution. Thanks

    liz30 pointsBadges:
  • Can VLANs communicate with each other and still block broadcast traffic?

    Can VLANs communicate with each other if necessary and still block broadcast traffic from the same machine because it's on a different subnet?

    Troubleshooter24755 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • VPN connection suggestions: Linksys vs. Cisco

    Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.

    TeachMeIT975 pointsBadges:
  • Anti bridging software

    I am looking for an anti bridging software. When the user is connected to internet via modem, s/he should not be able to access Corporate LAN and vice-versa. Pls suggest the one which is implemented in your network.

    TeachMeIT975 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Locking down the USB & optical drives on Windows Server 2008 R2

    Can we lock down the USB and Optical drives on a Windows Server 2008 R2 box for all users except the administrators group or even just the administrator?

    NewnanIT1,110 pointsBadges:
  • Central Windows Server to aggregate Windows security and audit logs

    Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?

    NewnanIT1,110 pointsBadges:
  • Automatic clean up antivirus scan

    How to automatic clean up virus on infected client computer client via network? so we can monitoring on PC..

    STAFFIT110 pointsBadges:
  • Adding another level of security to SQL 2005 database

    We have a SQL 2005 Database. It is protected by Windows Authentication. Can we add another level of security - requiring a SQL username and password along with a valid user name and password on the domain?

    NewnanIT1,110 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Open IT Forum: How much of your sensitive information can you trust to outside organizations?

    What is your limit for how much of your information security program you outsource to contractors? Is it better to develop information security expertise solely in your employees or is it acceptable to outsource to an external expert? Hiring security service providers and contractors to manage...

    MelanieYarbrough6,345 pointsBadges:
  • Open IT Forum: What Internet security solutions have you adopted or chucked?

    Antivirus software and PC protection are comforts of the past. These days the biggest threats come from the Internet, and we're wondering how you protect yourself and your hardware against Internet threats and the less knowledgeable users on your network. We'd love to hear about solutions you've...

    MelanieYarbrough6,345 pointsBadges:
  • Free IT Book: CompTIA Security+ Video Mentor

    This week's free IT giveaway is the CompTIA Security+ SYO-201 Video Mentor. Answer one of the unanswered questions and leave the link to your answer in the discussion area below. Voice and Data Network Setup WSUS Downstream Server Problem How much of your sensitive information can you trust to...

    MelanieYarbrough6,345 pointsBadges:
  • Viewing errors on a Windows 7 desktop

    Where can I view errors on a Windows 7 desktop from a failed Microsoft office 2010 installation? What security group would i need to be in to view it?

    Troubleshooter24755 pointsBadges:
  • Software Security. Getting host name

    These two are program for getting hostname... int main() { __asm__ (“xor %eax, %eax n” “push %eax n” “push $0x656d616e n” “push $0x74736f68 n” “push $0x2f6e6962 n” “push $0x2f2f2f2f n” “mov %esp,%ebx n” “push %eax n” “push %esp n” “push %ebx n” “mov $59,%al...

    SudhakarTekkali10 pointsBadges:
  • Open IT Forum: How do you raise awareness for security compliance in the enterprise?

    We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...

    MelanieYarbrough6,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following