• firewall design

    i want to design a firewall for a college.so plz suggest me sum ideas regarding to this subject and if you have any another idea related to this subject that also wil be accepted

    Asu30 pointsBadges:
  • What are the dangers of others having access to my wpan password?

    I have netgear setup in my house for my laptop and another desktop computer in another room. Unknown to me a relative gave my access code to someone in the house to operate their ds; gave it to his mother for her new laptop who lives across the street and uses it on one or two of his devices. He...

    Doriselaine5 pointsBadges:
  • wants google chat block windows server 2003 domain controller

    I wanted to block Google charting and Google talk without interruption gmail site. could you please help me. I have domain controller installed 2003 server  and using routing and remote access for internet sharing for client PC. Thanks for help

    Hirachilwal25 pointsBadges:
  • routine of network security engineer

    what are the daily routine of a network security engineer in a compney, form morning to evening?

    Ssssingh10 pointsBadges:
  • Unauthorized wireless networks in your environment

    Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?

    ITKE345,295 pointsBadges:
  • What headaches are your network users causing?

    Every network admin seems to have their favorite "network user" horror stories -- what are the most frequent types of problems you seem to encounter with your network users? What steps have you taken with "problem users" that were successful?

    JennyMack4,280 pointsBadges:
  • Educating your users on security policies

    What measures do you/your organization take to educate employees on network security policies? Do you include this information in new hire training? Do you hold special training? Does your include any unique or particular provisions?

    JennyMack4,280 pointsBadges:
  • Do you worry about your network’s security with remote users or outsourcing?

    If you have users who work remotely or outsource certain parts of your organization where network security might not be as highly regulated, is network security a particular point of concern for you? What are some of the measures you and your partners have in place to secure your network at all...

    JennyMack4,280 pointsBadges:
  • Enterprise IM security: what software and policies do you use?

    One of our bloggers, Tony Bradley, recently discussed in his blog and on SearchUnifiedCommunications' "Reality Check" podcast the implications of IM and social networking on network security. What do you have in place at your workplace to address these issues? What combination of security and...

    JennyMack4,280 pointsBadges:
  • Security Risk

    What is the most unexpected risk we can have on a network?

    Jsjules5 pointsBadges:
  • Port Security

    Hi All, I have port security enabled in my environment. While swapping the systems i used to remove the MAC entry in both the ports. Is  there any alternative options like removing the MAC address from the switches database.

    Vptechie70 pointsBadges:
  • DOS Attack

    Hello there This is Faisal Rafiq, I have a problem after Dos attack. I got an error "ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs". Thanks & Regards,

    239069370 pointsBadges:
  • internet Sharing

    Hi I have just share my internet connection only for one computer the client which i give the internet it is computer have two network card and he share the connection two more computer so I want to prevent the person from sharing the internet connection from it’s computer it means that he has a...

    9182010 pointsBadges:
  • Active Directory and Network security management

    What is the best way for me to ensure Active Directory is being backed up? Another question is some people have dos programs that require modify access on c: I would like to know if there is a better way to assign that permission. Some people need local admin rights to run their programs. Obviously...

    EnterpriseDesktopATE2,525 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following