• Setup multiple passwords on Wi-Fi network

    We have 4 children in our family (most of them teenagers) and I would like to setup multiple passwords for each child on our Wi-Fi network. Can that be done? Any help is greatly appreciated.

    ITKE1,011,665 pointsBadges:
  • How to know if someone can see my web history

    This is more of a general IT/technology question. I'm on a password protected Wi-Fi network and I just did a scan for viruses (nothing came up). I'm still worried someone can see my web history. Is that possible? If so, what else can I do to make it more secure?

    ITKE1,011,665 pointsBadges:
  • L2 versus L3 on your WAN

    We are running Comcast Fiber between sites.  I was wondering what the best practice is for using Layer 2 or Layer 3 across the link.  We current use both.  Are there security reasons for doing one versus the other?  Also interested in hearing general thoughts on it.

    ITKE1,011,665 pointsBadges:
  • Troubleshoot asymmetric routing in TCP based connection

    How can I troubleshoot asymmetric routing in TCP based connection?

    yfaizan15 pointsBadges:
  • Best Firewall UTM for 2017

    What is the best firewall UTM for 2017?

    mahboabalighaleb30 pointsBadges:
  • How to find laptop network security code

    My daughter gave me her laptop. I have a wireless computer in my home. Her laptops asks for my network security code. How can I use her laptop as my own. Where do I find this code? It keeps saying no Internet connection.

    BLONDE5 pointsBadges:
  • How to stop IP address from being hacked?

    I noticed that my IP address was hacked. My Internet connection has become very slow and it looks like he has access to my data. How can I stop this? Even a temporarily solution would help right now.

    ITKE1,011,665 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Accidentally open a reverse TCP meterpreter connection

    Can I get in trouble for accidentally opening a reverse TCP meterpreter connection to a malware scanning website? I was testing out if my meterpreter exe file was detectable with some online sandbox analyser when I got a meterpreter session in armitage. I used clearev because I read that will erase...

    Kokolol995 pointsBadges:
  • How to secure my network if UDP port is required to be allowed from outside

    Hi Team, We have a business requirement in which we need to open up Video session for our customers to contact our Customer Service Agents. Product requires UDP ports to be opened on Firewall. Kindly advise how can we secure this setup.

    GBPEC105 pointsBadges:
  • What’s the best network scanner?

    What's the best network scanner out there for me?

    sereq795 pointsBadges:
  • How can we start to develop an network security system in Java?

    Like honeypot, I'm planning to make a home network security system which may also be useful for the companies to protect the data from unauthorized access. So i would kindly request me to help me how to start this.

    pasaaa15 pointsBadges:
  • Using Douwin Software on a Network

    I would like to find out if it's possible to install Douwin Software? A hotel door lock software on a server and have other systems access and use the same software. I really appreciate your anticipated help.

    martinso20165 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,560 pointsBadges:
  • Risks for IT infrastructure assessment

    Dear All, I need your help! My administration wants to hire a 3rd party IT company to come and assess our IT infrastructure. I'm just not feeling "OK" with that because of all the security risks that may occur. I've worked for this company as a systems administrator for many years now, and frankly...

    Cuterido5 pointsBadges:
  • Does captcha comes under network security?

    Would captcha come under network security?

    putus25 pointsBadges:
  • Does a master’s degree in network security need good programming skills?

    Is it required to be in good in programming languages to pursue a career in network security?

    aishu1235 pointsBadges:
  • What are the best tools for SQL monitoring and SQL diagrams?

    we have SQL 2008, and looking for tools to monitor sql and get sql diagrams. do you know any good tools?

    Persa5 pointsBadges:
  • Port security for Switches

    Switch(config)#interface fastEthernet 0/1 Switch(config-if)#switchport port-security Command rejected: FastEthernet0/1 is a dynamic port. Why is that happening?

    Shiko15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following