• Detecting rogue DHCP servers

    How can we automatically detect rogue DHCP servers like a user bringing in a wireless router from home and connecting it to our network?

    TeachMeIT975 pointsBadges:
  • ACL configuration

    hey, I want to create standard acl to allow all network to flow from 172.16.10.0 0.0.0.255 to 172.16.20.0 0.0.0.255 and 172.16.30.0 0.0.0.255 but i don’t want network to flow from 172.16.20.0 0.0.0.255 to 172.16.30.0 0.0.0.255 and vice versa, so I created the following acl, access-list standard...

    Bryan155 pointsBadges:
  • Changing passwords after network breach

    How can we force all users to change their passwords following a network breach? Windows Server 2008 AD.

    NewnanIT1,110 pointsBadges:
  • Network password recovery

    How can I recover my network password?

    Cbreaux5 pointsBadges:
  • How to be a professional hacker

    Can you tell me how to become a professional hacker? Are there any global certifications for it?

    NetworkingATE1,545 pointsBadges:
  • Blocking USB drives or any removable media on Active Directory network

    Can I block the use of USB drives or flash drives or any removable media on our active directory network across the board. We are using group policy but I do not know how to configure it.

    ITKE346,285 pointsBadges:
  • Separating commodity Internet from the financial and core systems

    Is it a good idea to separate an entperprise's commodity Internet from its financial database network (as in two physically separate networks)? Our current setup is that they're together (though protected by firewalls) -- meaning there is a way for someone to get into the commodity and with enough...

    drlove5 pointsBadges:
  • Banning IP address via Windows Firewalls

    Can we ban an IP address from connecting to our network by adding it to a block list in Windows Firewalls? Can that propagate to all systems?

    TeachMeIT975 pointsBadges:
  • Blocking Google Talk via Sonicwall firewall

    Is it possible to block Google Talk chat and not block other chat applications from the network using a Sonicwall firewall?

    TeachMeIT975 pointsBadges:
  • Unauthorised deployment, MS Hotfix’s remotely deployed via CMD, non-stop silent system file corruptions, unattended installations – how can I protect?

    Hi, I could really use some help securing my systems. I have been having some problems with deployment functionality being used to effectively supercede the BUILTIN Administrator accounts in my systems, limiting it’s privileges substantially.   About 9 weeks ago, I noticed my Permissions were...

    Goscuter130 pointsBadges:
  • Blocking IM clients from network

    How can I prevent all instant messaging clients on my network while still allowing our proprietary im/email system to function? We are using a sonicwall and barracuda web filter 300.

    TeachMeIT975 pointsBadges:
  • Tracking the computer or source of an email

    system: Ex 2003 back-end cluster, Ex 2003 Network Load Balanced Front end. Hi there, A user's account has become comprimised. They have since changed their password, but there are a few mails sent from their account that they did not send. Is it possible to find out the source ie PC hostname or IP...

    Maclanachu0 pointsBadges:
  • Creating ACLs on the network

    How can we create ACLs on the network to block out users from attempting to connect to HR file shares?

    Troubleshooter24755 pointsBadges:
  • VNC over Broadband/internet

    Hi all, My IP skills are somewhat rusty - could someone please help me with some high-level steps to remote control using VNC over the internet... scenario: Customer down the road is always requiring assistance - usually I need to jump in the car & go there to sort out the latest dilemma. I'd like...

    SCOOBAMAN0 pointsBadges:
  • Which is more secure: network or internet or remote desktop

    which is most secure and best to access and reliable, networking computers, internet or using remote desktop?

    Tigerpoody5 pointsBadges:
  • NAS device on my network

    If I have a NAS device connected to my network can everyone access it? Is there security?

    Troubleshooter24755 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • Restrict traffic for Cisco VPN clients

    Hi all, First some background for my question: I have recently set up a VPN tunnel between a Cisco PIX 506E (VPN server) and remote clients. The remote clients use Cisco VPN Client software version 4.8. Everything seems to work fine. But as it is configured right now the remote clients have full...

    Daniel40 pointsBadges:
  • Samba Folder Access

    I want to allow permission to a specific folder, the scenario is: A) I open exchange server with samba as the domain controller B) I access via windows xp like: //servername/foldername My question is, how can I allow five users (full permission), groups (read only). Kindly tell me what steps i need...

    Chunter110 pointsBadges:
  • How to remove the password off a computer

    How do you remove the password prompt off a computer if I don't know the password? Is there any way to resolve this?

    NetworkingATE1,545 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following