• Monitoring the Network

    Hi, I have multiple remote sites. I would like to monitor the network and analyze the traffic and its performance in general. For example, how the bandwidth is consumed, if certain activities are unnecessary and how to improve the networks performance by blocking through the firewall like...

    Maryam82100 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • Upgrading Win XP to act as Relay Server

    My Organisation needs to deploy Internet independent Updating system on our Antivirus program (we use Mcafee Total Protection-Enterprise edition). For this to work, there must be a relay server. Now, i learnt any computer system on the Network can be upgraded to a relay server. So, my question is,...

    Coolruler10 pointsBadges:
  • Network access control security problem

    Hi everybody, I am not a security expert nor an IT specialist but having a network of 7 terminals, some users are limited account others are administrators, some having XP OS others 98 and 2000.All the 6 terminals has to log on using a user name and a password when trying to click on any of the pc...

    Gaf5 pointsBadges:
  • Security of important files connected in LAN

    I have central server in which all our projects files are kept. All PCs are connected through LAN. Everyone access/modify/create files from the server PC. Offlate i have noticed files are moved /deleted. I need to know how to develop security to my files wherein people can just modify/create...

    Pia2895 pointsBadges:
  • Network Topology Help

    Currently, I am in the process of reqiring our entire network. Previously, this organization has had the 7th floor switches pour into the 6th, the 6th into thr 5th, and so on and so forth until they got to the main backbone and into the server room. I am converting this into a star topology, giving...

    Schmidtw11,330 pointsBadges:
  • How can I prevent users from deleting files?

    I have two or three remote users that come into my network on a VPN and map to a shared folder. I need to give them the ability to read, write and modify files and folders while at the same time preventing them from deleting those files and folders. Is there any way to do this?

    Windows Security ATE160 pointsBadges:
  • I.T Security procedure

    how can secure may network

    Xxxdimagiba5 pointsBadges:
  • Hacking and sabotaging

    Recently I have noticed that my computer will randomly loose connection to the network. Today it happened three times, when I looked in the event viewer this is what I found: `The DHCP Client service was successfully sent a stop control.` This done by another user in my office and on my network....

    Trapdoor35 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • IT Security

    With all the talk about security certifications and working in IT security being hot right now and in the future, I was wondering if it would make more sense to try and get the Security + certification before trying to get another IT certification such as the MCSA (Microsoft Certified Systems...

    Davemd10 pointsBadges:
  • Procedures for a new area.

    We are a company where we have expirience on network remote administration and now we have open a new area, The area of security. Now I need to start to make new procedures like when a new customer come to us and ask if we can handle the security for his network... I need to know if some one can...

    Millan0 pointsBadges:
  • Paranoid about protecting my MAC address–Please read my story

    What is the easiest way to protect your MAC address against spoofing? In 2004 I was the victim of a hacker that somehow spoofed my Cable Modem Mac address and used it to cover his identity while serving copyright material thru the internet. I was unsuspecting until my ISP one day suspended my...

    DonBlake0 pointsBadges:
  • Installation and updates

    Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remotely...

    TheVyrys0 pointsBadges:
  • security provided to routing protocols

    whether double authentication scheme can be applied to distance vector routing protocols

    Sabi5 pointsBadges:
  • Cisco ASA DMZ configuration…

    I am in the process of setting up a DMZ in order to host a Web Server and an Exchange Server. I have been doing a great deal of research and have a few questions. This is my setup: Internet====>ASA====>Inside Network (Cisco Switches) I want to use an additional switch and attach it to the ASA...

    Skepticals0 pointsBadges:
  • Stop anonymous USB surfing

    Is there some way to block anonmous surfing on USB drives besides policy? Torpark is showing up in our logs.

    HankG0 pointsBadges:
  • My current network Challenge

    Hi everyone, The following is my current task. 1) set up a network with 6 computers 2) must have file and printer sharing 3) internet access Things to consider 1) SECURITY - some computers will be laptops (wireless) and some desktop (hardwired) 2) Connectivity - at least one of these computer will...

    Ithlete5 pointsBadges:
  • security problem

    Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it....

    BinooDas123410 pointsBadges:
  • How solve Spam Attacker problem

    1. We currently using windows server 2003 and Maedmon as our corporate mail server with the macfee entreprise edition but we are still receiving over 500 spam email everyday so pliz assist on how to curb spam at the server level so that the boss and clients could not receive any spam anymore. 2....

    OMARI5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following