• Should I move into the web application security field?

    I am currently working on network security devices like firewall and my work requires me to work 24*7. I want to move into a field where 24*7 is not required. Is web application security a good and relevant field?

    vanipatel220915 pointsBadges:
  • If the IP address is 172.16.2.41 then how many devices can be able to connect?

    Hello sir, I'm new to the network security. I don't know how to calculate mask, subnet mask, broadcast address, network address and for each IP address how many devices can able to connect so. Could you please provide me guidelines for above mentioned topic.                         ...

    gopiranganath5 pointsBadges:
  • Ipnat.sys related error on Win2003 Server

    Happy 2006 to you all! One of my customers is getting a strange error since someone disabled (deleted actually!!) the Terminal Server service on their Windows 2003 Server SP1. The error that pops up is: "Windows Firewall cannot run because another program or service is running that might use the...

    Hedgehog0 pointsBadges:
  • How solve Spam Attacker problem

    1. We currently using Windows Server 2003 and Maedmon as our corporate mail server with the McAfee enterprise edition but we are still receiving over 500 spam email everyday so please assist on how to curb spam at the server level so that the boss and clients could not receive any spam anymore. 2....

    OMARI5 pointsBadges:
  • Router Password from LAN

    I'm connected to my router through LAN and some one changed all the default user name and password for the router. So is there any way I can get my user name and password? I do have Kali Linux

    Code365 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,415 pointsBadges:
  • Adding remote branches to our network

    We use Active Directory, DHCP, network printers, software and file servers. We want to add two more branches to our network, so users get IP addresses by DHCP and assigned to AD server. How can we create them like remote branches without giving same subnet to remote users? We want VPN connection on...

    TeachMeIT975 pointsBadges:
  • Uninstallation of Norton WMI update

    Respected recipient, I am currently having a trouble in uninstalling Norton anti-virus VMI update. My company got Norton anti virus software installed on the system from the Norton anti virus software CD and it was not Norton system works, just the Norton anti virus software. After somedays, it...

    Nishant70 pointsBadges:
  • Security vulnerabilities of the OSI layers

    What are the security vulnerabilities when it comes to OSI layers?

    JOETEE5 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Digiboard, Inc on my home network and I didn’t put it on there

    I did a security scan on my home network and found out this digiboard, inc was listed on my network. I have no idea why it is on there, who put it there, and I want it off my network.

    Firecraker5 pointsBadges:
  • What are the major problems in using MANETs in our daily life?

    We use cellular, sensor networks in our daily life. Why can't we go for MANETs?

    Saranyavasanthamani5 pointsBadges:
  • What are the best tools for SQL monitoring and SQL diagrams?

    we have SQL 2008, and looking for tools to monitor sql and get sql diagrams. do you know any good tools?

    Persa5 pointsBadges:
  • How to block a specific URL in Cisco routers

    Can you block a specific URL in Cisco routers? If so, can you tell me the steps?

    NetworkingATE1,545 pointsBadges:
  • Explain how testing supports the Confidentiality, Integrity and Availability (CIA) of your information assets

    Explain how testing supports the Confidentiality, Integrity and Availability (CIA) of your information assets

    MegoIT10 pointsBadges:
  • Hide network devices from Nmap

    How can I hide all network devices from Nmap or any other network scanners? Is it by using Bridge, VLAN or DMZ?

    Matheo5 pointsBadges:
  • Website monitoring suggestions?

    Suggestions for website monitoring? Is there something that monitors for security vulnerabilities?

    NewnanIT1,110 pointsBadges:
  • How to track network traffic / WPA2 security

    How, in Windows 8, do I view all people who have been using my Wi-Fi to connect? For some reason, my security key keeps getting "flipped" off. When I go to connect to the network, I see the (!) and the message the other people may be able to see what I send over this network. I know Windows 8 is...

    ImSoConfused15 pointsBadges:
  • Network Security for Canon printer

    My Canon printer stopped scanning and faxing. I called Canon and a "diagnostician" told me my network had a csrss.exe.trojan. Numerous Microsoft programs were turned off, many warnings showed up etc.  My computer has been quite slow for a while.  Now Canon wants to sell me a 1-time fix which...

    lilagoodheart5 pointsBadges:
  • Network connection history/log?

    My question is: How do I view previous network connections from my tablet? (Acer Iconia)

    macex285 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following