• Help choosing a career path in IT Security

    Hi, I need expert advice on which aspect of security to major in. I have a background in engineering, from which i switched to Oracle database. Havent worked with the oracle Database learned and the certification gained as it was tough getting the job.I am doing  my Msc in Information Security...

    BENSARH5 pointsBadges:
  • Has anybody used Cyberoam for network security?

    Am looking at implemeting Cyberoam 15i a unified threat management equipment for a small enterprise instead of Microsoft Forefront please i want to know if cyberoam is a good security solution. Thanks

    liz30 pointsBadges:
  • Network Security appliances

    What are the key things to consider when choosing a network security appliance for 130 user network? I am confused with the plethora of appliances Cisco has on offer.  Network is laid across three floors, with all the switches connecting back to a wiring closet. 

    Bha77a40 pointsBadges:
  • Can VLANs communicate with each other and still block broadcast traffic?

    Can VLANs communicate with each other if necessary and still block broadcast traffic from the same machine because it's on a different subnet?

    Troubleshooter24755 pointsBadges:
  • Maximum network protection with public Internet access

    What is the best way to give public access to the internet yet protecting my company network?  We have a Cisco ASA 5510 firewall and wireless access points.

    Rpc5 pointsBadges:
  • How to hide UNC path of a mapped drive in MyComputer in Windows 7

    In Windows XP Professional I used a renuse command in place of the net use command to map a drive for users in a lab environment. The advantage of this command is that it hid the unc path to the network share that the mapped drive referred to. However, This renuse command is not working in Windows...

    Skenny175 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • Central security server for WiFI based on mac address?

    Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?

    NewnanIT1,110 pointsBadges:
  • Segmenting a piece of our Windows network

    How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.

    NewnanIT1,110 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • VPN connection suggestions: Linksys vs. Cisco

    Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.

    TeachMeIT975 pointsBadges:
  • Firewall receiving PINGS from a non-public IP address

    My firewall has been receiving and blocking PING's from the following IP address: 10.40.16.145. This address being a non-public IP address, I'm a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to...

    Tswirka155 pointsBadges:
  • Bachelor of Science in Security System degree? is it worth it?

    Hello everyone, completely new here so here is my question...I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing.   Here is a list of some...

    blazes0ldja100 pointsBadges:
  • Anti bridging software

    I am looking for an anti bridging software. When the user is connected to internet via modem, s/he should not be able to access Corporate LAN and vice-versa. Pls suggest the one which is implemented in your network.

    TeachMeIT975 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • Locking down the USB & optical drives on Windows Server 2008 R2

    Can we lock down the USB and Optical drives on a Windows Server 2008 R2 box for all users except the administrators group or even just the administrator?

    NewnanIT1,110 pointsBadges:
  • Central Windows Server to aggregate Windows security and audit logs

    Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?

    NewnanIT1,110 pointsBadges:
  • High School Computer Lab Network set up to prevent cheating

    I am trying to set up the network in my classroom to prevent students from stealing, renaming, deleting, etc. other students' work on the shared folder. Before the teacher's computer died, I was able to set up the permissions as write only, but the smart student could still rename someone's file if...

    Rollinsm325 pointsBadges:
  • Automatic clean up antivirus scan

    How to automatic clean up virus on infected client computer client via network? so we can monitoring on PC..

    STAFFIT110 pointsBadges:
  • What knowledge transfer required when transitioning from old IT manager to new one?

    What point / Knowledge transfer to be take care, while job transfer from resigned IT manager to new pointed IT manager for future smooth running of IT work?[o:p][/o:p] As CAL, ISO docs, all network passwords etc.[o:p][/o:p] Should we need to scan network for any unknown remote access installed...

    mitrum810 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following