• Track USER of Computer online who is using max. Bandwidth in lacal area connection

    Hi All, I am sandeep and working at one software company as system admninstrator. company has 60 user (computer) . we have 2 mb lise line . it go through cisco router. and all computer default gatway ip is the router ip. we have ISA server . Now i want to online moniter this network that which...

    Kapadane105 pointsBadges:
  • Which network security certifications would you recommend and why?

    I have currently finished a degree in Information Science from Bangalore, and I'm looking forward to a career in networking. Though Bangalore is known as the IT hub, I'm somehow not attracted towards the IT sector. I want to do something more security related. The CCNA and MCSE certifications are...

    NetworkingATE1,545 pointsBadges:
  • Will a BSc in Information Security get me a network security job?

    I would like to get my BSc in Information Security Systems. In the near future I would like to get a networking security career. Do you think this is a good degree? Otherwise what can I do to get into the security field?

    NetworkingATE1,545 pointsBadges:
  • Firewall rules

    Good Day! Currently, this is a simple LAN network with firewall diagram in my company. Please kindly refer to http://hgym.photosite.com/firewall/LANfirewall.html for the mentioned diagram. I wish to set an IP on the network interface of the FTP/Web/Mail Server. Any suggestion? Meanwhile, I would...

    Hunkgym5 pointsBadges:
  • How to disable ‘File and Printer Sharing’ with Group Policy

    i want to disable the option for the users to enable "File and Printer sharing for microsoft networks" in Lan properties through Group policy.

    Raj615020 pointsBadges:
  • How to work two Linux gateway firewalls in a same network?

    How to work two linux gateway firewall in a same network? Would u tell me please.

    Kuchtohai5 pointsBadges:
  • Monitoring the Network

    Hi, I have multiple remote sites. I would like to monitor the network and analyze the traffic and its performance in general. For example, how the bandwidth is consumed, if certain activities are unnecessary and how to improve the networks performance by blocking through the firewall like...

    Maryam82100 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • Network access control security problem

    Hi everybody, I am not a security expert nor an IT specialist but having a network of 7 terminals, some users are limited account others are administrators, some having XP OS others 98 and 2000.All the 6 terminals has to log on using a user name and a password when trying to click on any of the pc...

    Gaf5 pointsBadges:
  • Security of important files connected in LAN

    I have central server in which all our projects files are kept. All PCs are connected through LAN. Everyone access/modify/create files from the server PC. Offlate i have noticed files are moved /deleted. I need to know how to develop security to my files wherein people can just modify/create...

    Pia2895 pointsBadges:
  • Network Topology Help

    Currently, I am in the process of reqiring our entire network. Previously, this organization has had the 7th floor switches pour into the 6th, the 6th into thr 5th, and so on and so forth until they got to the main backbone and into the server room. I am converting this into a star topology, giving...

    Schmidtw11,330 pointsBadges:
  • How can I prevent users from deleting files?

    I have two or three remote users that come into my network on a VPN and map to a shared folder. I need to give them the ability to read, write and modify files and folders while at the same time preventing them from deleting those files and folders. Is there any way to do this?

    Windows Security ATE160 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • IT Security

    With all the talk about security certifications and working in IT security being hot right now and in the future, I was wondering if it would make more sense to try and get the Security + certification before trying to get another IT certification such as the MCSA (Microsoft Certified Systems...

    Davemd10 pointsBadges:
  • Procedures for a new area.

    We are a company where we have expirience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network... I need to know if some one can...

    Millan0 pointsBadges:
  • Paranoid about protecting my MAC address–Please read my story

    What is the easiest way to protect your MAC address against spoofing? In 2004 I was the victim of a hacker that somehow spoofed my Cable Modem Mac address and used it to cover his identity while serving copyright material thru the internet. I was unsuspecting until my ISP one day suspended my...

    DonBlake0 pointsBadges:
  • Installation and updates

    Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remotely...

    TheVyrys0 pointsBadges:
  • security provided to routing protocols

    whether double authentication scheme can be applied to distance vector routing protocols

    Sabi5 pointsBadges:
  • Cisco ASA DMZ configuration…

    I am in the process of setting up a DMZ in order to host a Web Server and an Exchange Server. I have been doing a great deal of research and have a few questions. This is my setup: Internet====>ASA====>Inside Network (Cisco Switches) I want to use an additional switch and attach it to the ASA...

    Skepticals0 pointsBadges:
  • Stop anonymous USB surfing

    Is there some way to block anonmous surfing on USB drives besides policy? Torpark is showing up in our logs.

    HankG0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following