• How to work two Linux gateway firewalls in a same network?

    How to work two linux gateway firewall in a same network? Would u tell me please.

    Kuchtohai5 pointsBadges:
  • Monitoring the Network

    Hi, I have multiple remote sites. I would like to monitor the network and analyze the traffic and its performance in general. For example, how the bandwidth is consumed, if certain activities are unnecessary and how to improve the networks performance by blocking through the firewall like...

    Maryam82100 pointsBadges:
  • Penetration Testing.

    Hi!! Good Morning. I have a simple question for you today. I intend to have a penetration testing done for all of my 3 sites - My US Office, My India Office & My US Datacenter. Can you suggest any trustworthy site which can offer me a free reliable scan? Also, I would like to have you suggestion on...

    Nileshroy0 pointsBadges:
  • Network access control security problem

    Hi everybody, I am not a security expert nor an IT specialist but having a network of 7 terminals, some users are limited account others are administrators, some having XP OS others 98 and 2000.All the 6 terminals has to log on using a user name and a password when trying to click on any of the pc...

    Gaf5 pointsBadges:
  • Security of important files connected in LAN

    I have central server in which all our projects files are kept. All PCs are connected through LAN. Everyone access/modify/create files from the server PC. Offlate i have noticed files are moved /deleted. I need to know how to develop security to my files wherein people can just modify/create...

    Pia2895 pointsBadges:
  • Network Topology Help

    Currently, I am in the process of reqiring our entire network. Previously, this organization has had the 7th floor switches pour into the 6th, the 6th into thr 5th, and so on and so forth until they got to the main backbone and into the server room. I am converting this into a star topology, giving...

    Schmidtw11,330 pointsBadges:
  • How can I prevent users from deleting files?

    I have two or three remote users that come into my network on a VPN and map to a shared folder. I need to give them the ability to read, write and modify files and folders while at the same time preventing them from deleting those files and folders. Is there any way to do this?

    Windows Security ATE160 pointsBadges:
  • Selecting an area within security to start

    Hi, I'm studying for an MSc in Information Security from Royal Holloway University of London, I have a B.Engg. degree in computers and a PG Diploma in Networking and Communication as well as the CCSA and CCNA. I'm also studying for the CISSP. Now, with all these qualifications, could you please...

    Secmax0 pointsBadges:
  • IT Security

    With all the talk about security certifications and working in IT security being hot right now and in the future, I was wondering if it would make more sense to try and get the Security + certification before trying to get another IT certification such as the MCSA (Microsoft Certified Systems...

    Davemd10 pointsBadges:
  • Paranoid about protecting my MAC address–Please read my story

    What is the easiest way to protect your MAC address against spoofing? In 2004 I was the victim of a hacker that somehow spoofed my Cable Modem Mac address and used it to cover his identity while serving copyright material thru the internet. I was unsuspecting until my ISP one day suspended my...

    DonBlake0 pointsBadges:
  • Installation and updates

    Howdy folks, Tryin to keep things going around here....need some advice. I have Win2003 servers and Active Directory.....single domain....approx. 100 client computers.....one location. Am upgrading all computers from Office XP to Office 2003. My project: Install Office 2003 and all updates remotely...

    TheVyrys0 pointsBadges:
  • security provided to routing protocols

    whether double authentication scheme can be applied to distance vector routing protocols

    Sabi5 pointsBadges:
  • Cisco ASA DMZ configuration…

    I am in the process of setting up a DMZ in order to host a Web Server and an Exchange Server. I have been doing a great deal of research and have a few questions. This is my setup: Internet====>ASA====>Inside Network (Cisco Switches) I want to use an additional switch and attach it to the ASA...

    Skepticals0 pointsBadges:
  • Stop anonymous USB surfing

    Is there some way to block anonmous surfing on USB drives besides policy? Torpark is showing up in our logs.

    HankG0 pointsBadges:
  • security problem

    Hello, I have small workgroup having 10 computers in my office. I do some personal work in office like using yahoo messenger, checking personal e-mails and some online banking site. But how does one of my senior knows it? I do everything lonely and securely so that nobody in the office knows it....

    BinooDas123410 pointsBadges:
  • Restict SOme File Extension

    Dear all, is it possible in window 2003 server that We can place some Restriction on the share folder that only certain types of Files to be save or place in these folder. The Problem is that i want to restrict *.Dat,*.wav etc files extension to be place on the Share folder because Some user place...

    Muhammad usman125 pointsBadges:
  • Symantec Anti Virus Corporate 8.0 issue

    Starting one WinXPSP2 (fully patched) computer last night revealed that the SAV Corporate 8.0 was not functioning properly (yellow "!" over systray icon). Restart of the computer did not resolve the issue. I cannot update (Live Update is disabled); I cannot uninstall (process appears to start and...

    Poppaman20 pointsBadges:
  • Need to Restrict View of network computers on wirelss router

    I work for a small business. I have enough knowledge to set up a basic wireless system on our network. We have a Server. It gives out all IP addresses. We have a Lynksys Router. It is setup to NOT give out IP addresses. We want to use the wireless router to ALLOW CUSTOMERS access to the INTERNET...

    Bsliwowski5 pointsBadges:
  • DNS Protocol

    In the DNS protocol, an application that accepts either a dotted-decimal IP address or a hostname should assume the former, and if that fails, then assume a hostname. What happens if the order of the tests is reversed?

    JimmyIT1,725 pointsBadges:
  • ISP blocks VPN connection

    My ISP blocks any attempt to establish a VPN connection and I was wondering if there is a workaround for this or if there are alternatives? I am using Windows XP. Any suggestion would be greatly appreciated.

    Istikph0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following