• How can I divide a network in two segments?

    Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide? Regards and...

    Nikjdk0 pointsBadges:
  • How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • Non Routable Networks

    Hi, Please i need someone to tell me what are Non Routable Networks and what are examples? Are there any security risks involved in having them? How Can we mitigate those risks and if there are tools we can use, what are the examples? Thankyou so much.

    345E15 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN500 pointsBadges:
  • What is meant by Parking VLAN?

    What is meant by a “parking VLAN”? Why is this a useful network security tool? Give an example of its utility in the example of unused switch ports in a network switch accidentally left accessible to the public due to an unlocked door.

    Mahi2265 pointsBadges:
  • Can I push out Microsoft Security Essentials to an entire network?

    Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

    TeachMeIT975 pointsBadges:
  • Configuration problem on 2950 port security sticky behavior

    Hi, I am trying to put port security on a port, I want it to shutdown if another computer gets plugged into that port. I followed the following steps: I set these options: switchport mode access switchport port-security switchport port-security maximum 1 switchport port-security violation shutdown...

    Patelmanojk50 pointsBadges:
  • Modify environment for port security

    Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no  switchport port-security mac-address...

    Vptechie70 pointsBadges:
  • Top security issues with Windows 7

    What are some of the security issues people have run into with Windows 7? Do you have any advice for prevention or preparation when migrating?

    NewnanIT1,110 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Netgear N300 Network Monitoring

    I have a Netgear N300 wireless router. I live in an apartment building and I was wondering if there is a way for me to tell how many computers are connected to my network so I can tell if our neighbors are using our wireless network.

    techineptinVA5 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Network and security

    I need a book about network and security... can you recommend a good book where I can read about the network and security ... And much like another book too, which I can use as ITSupport. It may very well be a new book (year) ...

    BookReader5 pointsBadges:
  • Network Security refresher training

    Hello, I was wondering if anyone can refer me to a good and basically free online network auditing, testing, documentation resource available online. thank you.

    Fwguyus5 pointsBadges:
  • Port security for Switches

    Switch(config)#interface fastEthernet 0/1 Switch(config-if)#switchport port-security Command rejected: FastEthernet0/1 is a dynamic port. Why is that happening?

    Shiko15 pointsBadges:
  • What is a VPN tunnel?

    What is a VPN tunnel? What's the difference between a VPN and a VPN tunnel?

    SearchEnterpriseWAN500 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following