• How to be a professional hacker

    Can you tell me how to become a professional hacker? Are there any global certifications for it?

    NetworkingATE1,545 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Application data security versus network security

    What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

    NewnanIT1,110 pointsBadges:
  • Checking networks for flaws and defects

    Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

    NewnanIT1,110 pointsBadges:
  • Blocking USB drives or any removable media on Active Directory network

    Can I block the use of USB drives or flash drives or any removable media on our active directory network across the board. We are using group policy but I do not know how to configure it.

    ITKE351,285 pointsBadges:
  • How to locally authenticate users using PPTP on a local PIX firewall

    I need to locally authenticate users using Point-to-Point Tunneling Protocol (PPTP) on a local PIX firewall. Once the users have authenticated, I need them to connect to a Windows 2003 server which is hosted at a remote location securely with encryption or some sort of tunnel. I have already got...

    NetworkingATE1,545 pointsBadges:
  • Do I need Active Directory?

    I am needing to know if it is vital i setup the active directory. Using Windows Server 2003 on a server which will be used mainly as a terminal server for users to come into to access only data on this server, be able to access and copy data to their computer and run MS Office 2003. This server...

    Labrune20 pointsBadges:
  • Active Directory and Network security management

    What is the best way for me to ensure Active Directory is being backed up? Another question is some people have dos programs that require modify access on c: I would like to know if there is a better way to assign that permission. Some people need local admin rights to run their programs. Obviously...

    EnterpriseDesktopATE2,525 pointsBadges:
  • Encrypting or locking bat file with passwords in it

    Can we encrypt or lock a bat file from being read as it has passwords in it?

    TeachMeIT975 pointsBadges:
  • I.T Security procedure

    How can I secure my network?

    Xxxdimagiba5 pointsBadges:
  • DOS Attack

    Hello there, This is Faisal Rafiq, I have a problem after Dos attack. I got an error "ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs." Thanks & Regards,

    239069370 pointsBadges:
  • Hacking and sabotaging

    Recently I have noticed that my computer will randomly loose connection to the network. Today it happened three times, when I looked in the event viewer this is what I found: `The DHCP Client service was successfully sent a stop control.` This done by another user in my office and on my network....

    Trapdoor35 pointsBadges:
  • How to extract the IP address of a data packet and store it in the database?

    A client sends a data packet to the server machine, then how can the server extract the IP address of the data packet .Can you suggest a source code for this above query in JAVA? After extracting the IP address how can the IP address be stored in the database, where other IP addresses of other data...

    Indra5 pointsBadges:
  • Central security server for WiFI based on mac address?

    Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?

    NewnanIT1,110 pointsBadges:
  • Disabling Network Threat module in Symantec Endpoint protection

    How can I permanently disable the Network Threat module from a Symantec Endpoint protection 11 installation. I installed it by accident and do not want to do a full uninstall/reinstall.

    TeachMeIT975 pointsBadges:
  • Creating temporary Windows Server 2008 Active Directory accounts

    How can we place expirations on user accounts? We want to make temporary Windows Server 2008 Active Directory accounts for technicians in our data center. We want them to expire in one hour from first login. Is this possible?

    Troubleshooter24755 pointsBadges:
  • Do you worry about your network’s security with remote users or outsourcing?

    If you have users who work remotely or outsource certain parts of your organization where network security might not be as highly regulated, is network security a particular point of concern for you? What are some of the measures you and your partners have in place to secure your network at all...

    JennyMack4,280 pointsBadges:
  • Is it necessary to be connected to sniff traffic over a wired network?

    Is it necessary to be connected to sniff traffic over a wired network?

    Rahul Shrivastava330 pointsBadges:
  • File deletion on the network

    I would like to set something up on our network in which if someone deletes a file or documents then the file or document is sent to a hidden folder on the network not just deleted. I would even like it to be put into the recycle bin but as it is people have deleted stuf off of my sever and it is...

    Sterling0125 pointsBadges:
  • How to check which user delete a file that is place on network drive

    I am using Windows 2003 domain server and in Active Directory, I have made organizational unit of different departments. I also enable auditing features in Windows 2003. Now my question is where I can check which user access which file on the network drives? When I saw it in even viewers of Domain...

    Muhammad usman125 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following