• How to Block Chat in the Network

    Dear All, I am wrting this mail to you all, to know if any you have been successfull in Blocking Chats on your networks, and if so, then how have you acheived it? Could you please tell me which Ports to Block for MSN, Yahoo, Rediff, ICQ, Skype. I am using a NetAPPs Net Cache C 1300, and I am trying...

    Komlink0 pointsBadges:
  • How can I divide a network in two segments?

    Two companies are sharing a DSL connection, and for security reasons, the network has to be split up. They still have to share the DSL, but should not see each other. It is posible to split up physically, but how do they share the DSL? Can anyone point me to a solution or a guide? Regards and...

    Nikjdk0 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,085 pointsBadges:
  • What is meant by Parking VLAN?

    What is meant by a “parking VLAN”? Why is this a useful network security tool? Give an example of its utility in the example of unused switch ports in a network switch accidentally left accessible to the public due to an unlocked door.

    Mahi2265 pointsBadges:
  • Can I push out Microsoft Security Essentials to an entire network?

    Can I push out Microsoft Security Essentials to an entire network? How can this be achieved easily and quickly?

    TeachMeIT975 pointsBadges:
  • Modify environment for port security

    Hi All, We have enabled port security in our environment using the below command switchport port-security mac-address sticky the above command reserves the mac address of the connected PC to that particular port and in order to remove this we have to give no  switchport port-security mac-address...

    Vptechie70 pointsBadges:
  • Top security issues with Windows 7

    What are some of the security issues people have run into with Windows 7? Do you have any advice for prevention or preparation when migrating?

    NewnanIT1,110 pointsBadges:
  • Netgear N300 Network Monitoring

    I have a Netgear N300 wireless router. I live in an apartment building and I was wondering if there is a way for me to tell how many computers are connected to my network so I can tell if our neighbors are using our wireless network.

    techineptinVA5 pointsBadges:
  • Vendor Security Questions

    Hello, I am a student in the Network Security program at the University of Advancing Technology and just read "Plan, Do, Check, Act". The URL is below. https://buildsecurityin.us-cert.gov/bsi/articles/best-practices/deployment/574-BSI.html Years ago everything was stored in the data center and...

    Ad285 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Security audit of access within Active Directory 2008 network

    We need to do a security audit to see what users have access to what within our Active Directory 2008 network. Is there a free tool to help with this and possibly reassign permissions based on rules?

    Troubleshooter24755 pointsBadges:
  • Network and security

    I need a book about network and security... can you recommend a good book where I can read about the network and security ... And much like another book too, which I can use as ITSupport. It may very well be a new book (year) ...

    BookReader5 pointsBadges:
  • Network Security refresher training

    Hello, I was wondering if anyone can refer me to a good and basically free online network auditing, testing, documentation resource available online. thank you.

    Fwguyus5 pointsBadges:
  • What is a VPN tunnel?

    What is a VPN tunnel? What's the difference between a VPN and a VPN tunnel?

    SearchEnterpriseWAN1,085 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Adding remote branches to our network

    We use Active Directory, DHCP, network printers, software and file servers. We want to add two more branches to our network, so users get IP addresses by DHCP and assigned to AD server. How can we create them like remote branches without giving same subnet to remote users? We want VPN connection on...

    TeachMeIT975 pointsBadges:
  • Corporate laptop security/encryption

    Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.

    Troubleshooter24755 pointsBadges:
  • Explain how testing supports the Confidentiality, Integrity and Availability (CIA) of your information assets

    Explain how testing supports the Confidentiality, Integrity and Availability (CIA) of your information assets

    MegoIT10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following