• Software Security. Getting host name

    These two are program for getting hostname... int main() { __asm__ (“xor %eax, %eax n” “push %eax n” “push $0x656d616e n” “push $0x74736f68 n” “push $0x2f6e6962 n” “push $0x2f2f2f2f n” “mov %esp,%ebx n” “push %eax n” “push %esp n” “push %ebx n” “mov $59,%al...

    SudhakarTekkali10 pointsBadges:
  • Open IT Forum: How do you raise awareness for security compliance in the enterprise?

    We've gotten your opinions on network security from the hardware and software side, but now we want to know what you're doing for compliance. From what your compliance policies are to the creative ways you raise awareness about those policies, share your stories and you might get 100 knowledge...

    MelanieYarbrough6,345 pointsBadges:
  • Open IT Forum: Recommendations for network security books

    I'm compiling a list of the best books on network security. What are some of your favorites, perhaps with a brief description? All contributors to the list will receive 100 knowledge points!

    MelanieYarbrough6,345 pointsBadges:
  • Opinions on open source security product UnTangle

    Does anyone have experience using UnTangle in their small business? Looking for a general overall security product with firewall, spam, filters, etc. Free or opensource most preferable.

    Troubleshooter24755 pointsBadges:
  • Should I disable macros on a network-wide basis?

    Just wondering if it is generally a policy to disable macros from Word, etc. Is there a safe macros list or should they all be disabled? How would I go about doing this across the network?

    TeachMeIT975 pointsBadges:
  • Open IT Forum: What are your suggestions for server hardening?

    Do you have a checklist or a favorite set of server hardening tools in your arsenal? Share with us what you think are the most important considerations when creating a server security baseline. Be sure to include what hardware and software you're using! Helpful suggestions and innovative ideas will...

    MelanieYarbrough6,345 pointsBadges:
  • Using SNMP traps for network monitoring

    What are SNMP traps and how can they be used for network monitoring in our new data center?

    Troubleshooter24755 pointsBadges:
  • Open IT Forum: What are your favorite network security tools?

    We want to know who and what you trust with your network security needs, from products to software. Had a less-than-stellar experience? We want to hear about that, too! The best stories get 100 points that'll be mighty helpful in our Xbox 360 contest!

    MelanieYarbrough6,345 pointsBadges:
  • SSL with a proxy server

    hI, My first pasot here so id like to say hello to everyone Our company has recently purchased a Data Loss Prevention server and it is my job to implement it , one of its tasks is to act as a proxy sever for all HTTPS traffic, I have done this but every time I go to a HTTPS site in Internet...

    0 pointsBadges:
  • Blocking remote connections to other computer from our network

    How can we block users from any remote connections to other computers from our office or laptops? We want to block logmein, remote desktop etc for our windows 7 machines.

    Troubleshooter24755 pointsBadges:
  • Windows 7 antivirus to prevent access

    Can the Windows 7 antivirus integrate into the system to block internet or network access upon detecting a virus or threat that could not be contained?

    Troubleshooter24755 pointsBadges:
  • Cisco Network Access Control

    Hi, I would like to know the facts about the NAC (implementation, Deployment and trouble shooting guides) .some questions rasing in my mind. Appreciating your help.

    RGPrakash170 pointsBadges:
  • Access Control List for users allowed to access network

    Is it possible to setup an access list for allowed computers on the network and prevent others from using any network resources like internet and printers. Even with a valid username and password I want them blocked if they are not on the Access Control List.

    Troubleshooter24755 pointsBadges:
  • “Network Security Engineering” vs “computer software engineering”

    Which degree is better to do on the basis of scope and skills?

    Comparison5 pointsBadges:
  • Scanning for up-to-date antivirus before connecting to network

    Can we prevent computers that do not have up to date antivirus definitions or no antivirus at all from connecting to the network or Internet? We are using Mcafee 871 with an EPO server. Can this be done?

    Troubleshooter24755 pointsBadges:
  • Blocking Active Sync from our network

    Can we block activesync from being used on the network? Desktops are running Windows XP SP3 and we do not want contacts and data transferred to users personal devices for secrecy reasons.

    NewnanIT1,110 pointsBadges:
  • Authentication against Active Directory

    How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?

    NewnanIT1,110 pointsBadges:
  • Computer Information Technology

    Im currently enrolled in Computer Information Technology, and concentrating on Network admin and Security. What courses do i need to enroll in to be compatiable.

    Tbelcher5 pointsBadges:
  • Could a honeypot machine risk the secure network?

    If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?

    ITKE347,980 pointsBadges:
  • Checking networks for flaws and defects

    Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

    NewnanIT1,110 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following