• Which is more secure: network or internet or remote desktop

    which is most secure and best to access and reliable, networking computers, internet or using remote desktop?

    Tigerpoody5 pointsBadges:
  • NAS device on my network

    If I have a NAS device connected to my network can everyone access it? Is there security?

    Troubleshooter24755 pointsBadges:
  • Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • Restrict traffic for Cisco VPN clients

    Hi all, First some background for my question: I have recently set up a VPN tunnel between a Cisco PIX 506E (VPN server) and remote clients. The remote clients use Cisco VPN Client software version 4.8. Everything seems to work fine. But as it is configured right now the remote clients have full...

    Daniel40 pointsBadges:
  • Samba Folder Access

    I want to allow permission to a specific folder, the scenario is: A) I open exchange server with samba as the domain controller B) I access via windows xp like: //servername/foldername My question is, how can I allow five users (full permission), groups (read only). Kindly tell me what steps i need...

    Chunter110 pointsBadges:
  • How to remove the password off a computer

    How do you remove the password prompt off a computer if I don't know the password? Is there any way to resolve this?

    NetworkingATE1,545 pointsBadges:
  • IP encryptor configuration

    LAN "A" connected to IP encryptor and connected to LAN "B" with also has an IP encryptor. i.e. we have IPsec VPN from "A" to "B" through MPLS VPN. Can I then connect LAN "A" to LAN "C" that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN "A" to do that.

    IPencryptor5 pointsBadges:
  • Disabling Network Threat module in Symantec Endpoint protection

    How can I permanently disable the Network Threat module from a Symantec Endpoint protection 11 installation. I installed it by accident and do not want to do a full uninstall/reinstall.

    TeachMeIT975 pointsBadges:
  • Help choosing a career path in IT Security

    Hi, I need expert advice on which aspect of security to major in. I have a background in engineering, from which i switched to Oracle database. Havent worked with the oracle Database learned and the certification gained as it was tough getting the job.I am doing  my Msc in Information Security...

    BENSARH5 pointsBadges:
  • Has anybody used Cyberoam for network security?

    Am looking at implemeting Cyberoam 15i a unified threat management equipment for a small enterprise instead of Microsoft Forefront please i want to know if cyberoam is a good security solution. Thanks

    liz30 pointsBadges:
  • Network Security appliances

    What are the key things to consider when choosing a network security appliance for 130 user network? I am confused with the plethora of appliances Cisco has on offer.  Network is laid across three floors, with all the switches connecting back to a wiring closet. 

    Bha77a40 pointsBadges:
  • Can VLANs communicate with each other and still block broadcast traffic?

    Can VLANs communicate with each other if necessary and still block broadcast traffic from the same machine because it's on a different subnet?

    Troubleshooter24755 pointsBadges:
  • Maximum network protection with public Internet access

    What is the best way to give public access to the internet yet protecting my company network?  We have a Cisco ASA 5510 firewall and wireless access points.

    Rpc5 pointsBadges:
  • How to hide UNC path of a mapped drive in MyComputer in Windows 7

    In Windows XP Professional I used a renuse command in place of the net use command to map a drive for users in a lab environment. The advantage of this command is that it hid the unc path to the network share that the mapped drive referred to. However, This renuse command is not working in Windows...

    Skenny175 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • Central security server for WiFI based on mac address?

    Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?

    NewnanIT1,110 pointsBadges:
  • Segmenting a piece of our Windows network

    How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.

    NewnanIT1,110 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • VPN connection suggestions: Linksys vs. Cisco

    Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.

    TeachMeIT975 pointsBadges:
  • Firewall receiving PINGS from a non-public IP address

    My firewall has been receiving and blocking PING's from the following IP address: 10.40.16.145. This address being a non-public IP address, I'm a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to...

    Tswirka145 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following