• Do you worry about your network’s security with remote users or outsourcing?

    If you have users who work remotely or outsource certain parts of your organization where network security might not be as highly regulated, is network security a particular point of concern for you? What are some of the measures you and your partners have in place to secure your network at all...

    JennyMack4,280 pointsBadges:
  • Is it necessary to be connected to sniff traffic over a wired network?

    Is it necessary to be connected to sniff traffic over a wired network?

    Rahul Shrivastava330 pointsBadges:
  • File deletion on the network

    I would like to set something up on our network in which if someone deletes a file or documents then the file or document is sent to a hidden folder on the network not just deleted. I would even like it to be put into the recycle bin but as it is people have deleted stuf off of my sever and it is...

    Sterling0125 pointsBadges:
  • How to check which user delete a file that is place on network drive

    I am using Windows 2003 domain server and in Active Directory, I have made organizational unit of different departments. I also enable auditing features in Windows 2003. Now my question is where I can check which user access which file on the network drives? When I saw it in even viewers of Domain...

    Muhammad usman125 pointsBadges:
  • What should I go for in networking?

    I have done Cert 3 Network Administration. What should I go for? I am interested in network security, system administration and web designing. Any help is appreciated.

    matrixstrings5 pointsBadges:
  • Dissertation/Theosis Topic Help

    Hello, I am currently in the middle of deciding a topic for my dissertation (theosis) for my Masters degree in Computer Networks. I've spent the past week searching all the emerging topics and looked for research holes in the field of network security. I am interested in the security in wireless,...

    Techy10 pointsBadges:
  • Port security for Switches

    Switch(config)#interface fastEthernet 0/1 Switch(config-if)#switchport port-security Command rejected: FastEthernet0/1 is a dynamic port. Why is that happening?

    Shiko15 pointsBadges:
  • Network connection history/log?

    My question is: How do I view previous network connections from my tablet? (Acer Iconia)

    macex285 pointsBadges:
  • Non Routable Networks

    Hi, Please i need someone to tell me what are Non Routable Networks and what are examples? Are there any security risks involved in having them? How Can we mitigate those risks and if there are tools we can use, what are the examples? Thankyou so much.

    345E15 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • How can I divide a network in two segments?

    Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide? Regards and...

    Nikjdk0 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,050 pointsBadges:
  • What is meant by Parking VLAN?

    What is meant by a “parking VLAN”? Why is this a useful network security tool? Give an example of its utility in the example of unused switch ports in a network switch accidentally left accessible to the public due to an unlocked door.

    Mahi2265 pointsBadges:
  • Can I push out Microsoft Security Essentials to an entire network?

    Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

    TeachMeIT975 pointsBadges:
  • Configuration problem on 2950 port security sticky behavior

    Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...

    Patelmanojk50 pointsBadges:
  • Modify environment for port security

    Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no  switchport port-security mac-address...

    Vptechie70 pointsBadges:
  • Top security issues with Windows 7

    What are some of the security issues people have run into with Windows 7? Do you have any advice for prevention or preparation when migrating?

    NewnanIT1,110 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Netgear N300 Network Monitoring

    I have a Netgear N300 wireless router. I live in an apartment building and I was wondering if there is a way for me to tell how many computers are connected to my network so I can tell if our neighbors are using our wireless network.

    techineptinVA5 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following