We want to know who and what you trust with your network security needs, from products to software. Had a less-than-stellar experience? We want to hear about that, too! The best stories get 100 points that’ll be mighty helpful in our Xbox 360 contest!
Answer Question | December 8, 2010 8:42 PM
Network security, Network Security Management, Open IT Forum, Security products, Security software
Hello We run a small business with about 20 clients on a lan and wlan architecture. We dont have a centralized management. We have about 10 engineers who are connected to a VPN. They are using a remote application located on a University Server. Today, I received a phone call from their IT manager. ”We [...]
Answer Question | November 25, 2010 7:58 PM
Access Points, Linksys RV042 VPN Router, Network Scanners, Network security, WLAN, WLAN access points
Hello I would be grateful if you could advise me on a security issue I have on my network security. I have a web application on linux with my data stored on a mysql database on the same server (actually it is a sugarcrm) The sugarcrm which contains information about my clients is used by [...]
Answer Question | November 15, 2010 1:34 PM
Firewalls, IDPS, IDS, Linux applications, MySQL Database, Network security
Is it possible to setup an access list for allowed computers on the network and prevent others from using any network resources like internet and printers. Even with a valid username and password I want them blocked if they are not on the Access Control List.
Answer Question | November 2, 2010 2:41 PM
Access Control List, Access Controls, Network Access Control, Network Access Policy, Network Access Protection, Network security, Network Security Management
I searched your site (great site BTW) and found some aspects of my questions addressed but they don’t really answer fuly. So, if you don’t mind, here it goes. My technology knowledge is pretty low. I have 5 PCs at home. 2 Vista, 2XP and 1 Mac OS. I would like to keep our Internet [...]
Answer Question | November 10, 2010 11:15 PM
Home VPN, Network security, VPN
I am trying to set up the network in my classroom to prevent students from stealing, renaming, deleting, etc. other students’ work on the shared folder. Before the teacher’s computer died, I was able to set up the permissions as write only, but the smart student could still rename someone’s file if it stayed in [...]
Answer Question | January 26, 2011 6:10 PM
Network security, Network Shared Folder, Permissions and settings, Security in 2010, Shared folders, Windows XP Professional
Which degree is better to do on the basis of scope and skills?
Answer Question | September 20, 2010 4:01 PM
Computer engineering, IT careers, IT certification and training, Network security, Network Security Management, Software engineering, Software Engineers
Can we block activesync from being used on the network? Desktops are running Windows XP SP3 and we do not want contacts and data transferred to users personal devices for secrecy reasons.
Answer Question | September 11, 2010 2:43 PM
ActiveSync, ActiveSync Policy, Data Transfer Function, Network security, Network Security Management, Network Security Policies, Security in 2010, Windows XP SP3
How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?
Answer Question | September 7, 2010 8:01 PM
Active Directory, Active Directory Permissions, Active Directory security, Network security, Network Security Management, Security in 2010, Wireless security
Hi, I would like to know the facts about the NAC (implementation, Deployment and trouble shooting guides) .some questions rasing in my mind. Appreciating your help.
Answer Question | November 25, 2010 11:02 AM
Cisco, Cisco NAC, Cisco security, NAC, Network Access Control, Network security, Network Security Management, Security in 2010
Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?
Answer Question | August 26, 2010 2:36 PM
Network management, Network security, Network Security Management, Wireless in 2010, Wireless network management, Wireless network security, Wireless security
TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.
Answer Question | August 24, 2010 9:19 AM
Network management, Network security, SonicWALL, TCP/IP, VPN, VPN Error Messages, Wireless in 2010, Wireless security
We want to launch an internal website that only can be accessed from our network clients. This includes remote users. Is there an “allow these IPs” list somewhere using is on a Windows 2003 standard? Or will I need to create firewall rules for this?
Answer Question | August 19, 2010 8:49 PM
Firewalls, Internal Website, IP address, Network access, Network Access Control, Network security, Remote User Authentication, Windows Server 2003 Standard Edition
Can I block the use of USB drives or flash drives or any removable media on our active directory network across the board. We are using group policy but I do not know how to configure it.
Answer Question | November 14, 2011 1:51 PM
Active Directory, Active Directory security, Network security, Network Security Policies, USB devices, USB drive, USB security, Wireless in 2010
Our latest shipment of corporate desktops have wifi. We want the machines only to be able to connect with a wired connection and only via dhcp. Can I do this via group policy and force these options? I want to make sure no one can change the settings manually.
Answer Question | August 13, 2010 1:52 PM
DHCP, Group Policy, Network security, Network Security Management, Wireless in 2010, Wireless security
I have windows xp I can see my network but cannot find where to put the password in…can you tell me how to find it?
Answer Question | August 12, 2010 5:14 PM
Network Password, Network security, Network Security Management, Windows XP, Windows XP administration
If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?
Answer Question | August 31, 2010 3:55 PM
DMZ, Honeypot, Network management, Network security, Network Security Management
Is there a way to monitor all of my Dell servers’ health from a single window or console? We have hundreds of servers varying in models but all Dell. Can I monitor smart status, disk space, users, event logs more centrally?
Answer Question | July 28, 2010 2:53 PM
Dell, Dell servers, network health, Network monitoring, Network security, Server management, Server monitoring
Is the use of a AAA Server limited to TACASC+, RADIUS, or Diameter, or is the functionality of AAA met by the seperation of the processes used in AAA (Authentication, Authorization, and Auditing). Example: For remote access to the company network, remote users will access through a SSL VPN, requiring a username/password, which utilizes Active [...]
Answer Question | July 23, 2010 5:20 PM
AAA server, Active Directory, LDAP, Network security, Remote access
i want to design a firewall for a college.so plz suggest me sum ideas regarding to this subject and if you have any another idea related to this subject that also wil be accepted
Answer Question | July 28, 2010 7:54 AM
Firewall configuration, Firewall management, Firewalls, Network security, Network Security Management