• Encryption software for corporate laptops

    Is there free encryption software for our corporate laptops? Does it offer remote wiping capabilities?

    TeachMeIT975 pointsBadges:
  • Restrict traffic for Cisco VPN clients

    Hi all, First some background for my question: I have recently set up a VPN tunnel between a Cisco PIX 506E (VPN server) and remote clients. The remote clients use Cisco VPN Client software version 4.8. Everything seems to work fine. But as it is configured right now the remote clients have full...

    Daniel40 pointsBadges:
  • Samba Folder Access

    I want to allow permission to a specific folder, the scenario is: A) I open exchange server with samba as the domain controller B) I access via windows xp like: //servername/foldername My question is, how can I allow five users (full permission), groups (read only). Kindly tell me what steps i need...

    Chunter110 pointsBadges:
  • How to remove the password off a computer

    How do you remove the password prompt off a computer if I don't know the password? Is there any way to resolve this?

    NetworkingATE1,545 pointsBadges:
  • IP encryptor configuration

    LAN "A" connected to IP encryptor and connected to LAN "B" with also has an IP encryptor. i.e. we have IPsec VPN from "A" to "B" through MPLS VPN. Can I then connect LAN "A" to LAN "C" that is without IP encryptor via MPLS VPN. How do I configure the IP encryptor at LAN "A" to do that.

    IPencryptor5 pointsBadges:
  • Help choosing a career path in IT Security

    Hi, I need expert advice on which aspect of security to major in. I have a background in engineering, from which i switched to Oracle database. Havent worked with the oracle Database learned and the certification gained as it was tough getting the job.I am doing  my Msc in Information Security...

    BENSARH5 pointsBadges:
  • Has anybody used Cyberoam for network security?

    Am looking at implemeting Cyberoam 15i a unified threat management equipment for a small enterprise instead of Microsoft Forefront please i want to know if cyberoam is a good security solution. Thanks

    liz30 pointsBadges:
  • Can VLANs communicate with each other and still block broadcast traffic?

    Can VLANs communicate with each other if necessary and still block broadcast traffic from the same machine because it's on a different subnet?

    Troubleshooter24755 pointsBadges:
  • Maximum network protection with public Internet access

    What is the best way to give public access to the internet yet protecting my company network?  We have a Cisco ASA 5510 firewall and wireless access points.

    Rpc5 pointsBadges:
  • How to hide UNC path of a mapped drive in MyComputer in Windows 7

    In Windows XP Professional I used a renuse command in place of the net use command to map a drive for users in a lab environment. The advantage of this command is that it hid the unc path to the network share that the mapped drive referred to. However, This renuse command is not working in Windows...

    Skenny175 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • Segmenting a piece of our Windows network

    How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.

    NewnanIT1,110 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • VPN connection suggestions: Linksys vs. Cisco

    Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.

    TeachMeIT975 pointsBadges:
  • Firewall receiving PINGS from a non-public IP address

    My firewall has been receiving and blocking PING's from the following IP address: 10.40.16.145. This address being a non-public IP address, I'm a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to...

    Tswirka155 pointsBadges:
  • Bachelor of Science in Security System degree? is it worth it?

    Hello everyone, completely new here so here is my question...I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing.   Here is a list of some...

    blazes0ldja100 pointsBadges:
  • Anti bridging software

    I am looking for an anti bridging software. When the user is connected to internet via modem, s/he should not be able to access Corporate LAN and vice-versa. Pls suggest the one which is implemented in your network.

    TeachMeIT975 pointsBadges:
  • Locking down the USB & optical drives on Windows Server 2008 R2

    Can we lock down the USB and Optical drives on a Windows Server 2008 R2 box for all users except the administrators group or even just the administrator?

    NewnanIT1,110 pointsBadges:
  • Central Windows Server to aggregate Windows security and audit logs

    Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?

    NewnanIT1,110 pointsBadges:
  • High School Computer Lab Network set up to prevent cheating

    I am trying to set up the network in my classroom to prevent students from stealing, renaming, deleting, etc. other students' work on the shared folder. Before the teacher's computer died, I was able to set up the permissions as write only, but the smart student could still rename someone's file if...

    Rollinsm325 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following