• Netgear DG834 fails to block sites using HTTPS

    Using a netgear dg834 we have set a block for www.facebook.com this works fine if the users attempts to contact through HTTP but if they do an HTTPS access then this bypass's the filter and allows them access. Any help would be greatly appreciated.

    CITS15 pointsBadges:
  • Remote access security reference architecture

    Hi experts I am looking for a high level remote access security reference architecture and best practices. Following NIST document looks like a good start. Can anyone please give any further recommendations? Thanks in Advance.

    wonder00725 pointsBadges:
  • Can I trace all activity on cell phones and laptops if they are using my Wi-Fi?

    Would I be able to trace all activity on cell phones and laptops if they are using my Wi-Fi?

    Dsb20175 pointsBadges:
  • Network with virtual request

    How I can relate to network with virtual request?

    datauser5 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,565 pointsBadges:
  • Port security for Switches

    Switch(config)#interface fastEthernet 0/1 Switch(config-if)#switchport port-security Command rejected: FastEthernet0/1 is a dynamic port. Why is that happening?

    Shiko15 pointsBadges:
  • Setup multiple passwords on Wi-Fi network

    We have 4 children in our family (most of them teenagers) and I would like to setup multiple passwords for each child on our Wi-Fi network. Can that be done? Any help is greatly appreciated.

    ITKE1,027,250 pointsBadges:
  • How to know if someone can see my web history

    This is more of a general IT/technology question. I'm on a password protected Wi-Fi network and I just did a scan for viruses (nothing came up). I'm still worried someone can see my web history. Is that possible? If so, what else can I do to make it more secure?

    ITKE1,027,250 pointsBadges:
  • L2 versus L3 on your WAN

    We are running Comcast Fiber between sites.  I was wondering what the best practice is for using Layer 2 or Layer 3 across the link.  We current use both.  Are there security reasons for doing one versus the other?  Also interested in hearing general thoughts on it.

    ITKE1,027,250 pointsBadges:
  • Troubleshoot asymmetric routing in TCP based connection

    How can I troubleshoot asymmetric routing in TCP based connection?

    yfaizan15 pointsBadges:
  • Best Firewall UTM for 2017

    What is the best firewall UTM for 2017?

    mahboabalighaleb30 pointsBadges:
  • How to find laptop network security code

    My daughter gave me her laptop. I have a wireless computer in my home. Her laptops asks for my network security code. How can I use her laptop as my own. Where do I find this code? It keeps saying no Internet connection.

    BLONDE5 pointsBadges:
  • How to stop IP address from being hacked?

    I noticed that my IP address was hacked. My Internet connection has become very slow and it looks like he has access to my data. How can I stop this? Even a temporarily solution would help right now.

    ITKE1,027,250 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Accidentally open a reverse TCP meterpreter connection

    Can I get in trouble for accidentally opening a reverse TCP meterpreter connection to a malware scanning website? I was testing out if my meterpreter exe file was detectable with some online sandbox analyser when I got a meterpreter session in armitage. I used clearev because I read that will erase...

    Kokolol995 pointsBadges:
  • How to secure my network if UDP port is required to be allowed from outside

    Hi Team, We have a business requirement in which we need to open up Video session for our customers to contact our Customer Service Agents. Product requires UDP ports to be opened on Firewall. Kindly advise how can we secure this setup.

    GBPEC105 pointsBadges:
  • What’s the best network scanner?

    What's the best network scanner out there for me?

    sereq795 pointsBadges:
  • How can we start to develop an network security system in Java?

    Like honeypot, I'm planning to make a home network security system which may also be useful for the companies to protect the data from unauthorized access. So i would kindly request me to help me how to start this.

    pasaaa15 pointsBadges:
  • Using Douwin Software on a Network

    I would like to find out if it's possible to install Douwin Software? A hotel door lock software on a server and have other systems access and use the same software. I really appreciate your anticipated help.

    martinso20165 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following