• Maximum network protection with public Internet access

    What is the best way to give public access to the internet yet protecting my company network?  We have a Cisco ASA 5510 firewall and wireless access points.

    Rpc5 pointsBadges:
  • How to hide UNC path of a mapped drive in MyComputer in Windows 7

    In Windows XP Professional I used a renuse command in place of the net use command to map a drive for users in a lab environment. The advantage of this command is that it hid the unc path to the network share that the mapped drive referred to. However, This renuse command is not working in Windows...

    Skenny175 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • Segmenting a piece of our Windows network

    How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.

    NewnanIT1,110 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • VPN connection suggestions: Linksys vs. Cisco

    Does anyone have experience with/opinions on Linksys VPN router connection versus Cisco MPLS configuration? Any details or advice would be greatly appreciated.

    TeachMeIT975 pointsBadges:
  • Firewall receiving PINGS from a non-public IP address

    My firewall has been receiving and blocking PING's from the following IP address: 10.40.16.145. This address being a non-public IP address, I'm a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to...

    Tswirka155 pointsBadges:
  • Bachelor of Science in Security System degree? is it worth it?

    Hello everyone, completely new here so here is my question...I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing.   Here is a list of some...

    blazes0ldja100 pointsBadges:
  • Anti bridging software

    I am looking for an anti bridging software. When the user is connected to internet via modem, s/he should not be able to access Corporate LAN and vice-versa. Pls suggest the one which is implemented in your network.

    TeachMeIT975 pointsBadges:
  • Locking down the USB & optical drives on Windows Server 2008 R2

    Can we lock down the USB and Optical drives on a Windows Server 2008 R2 box for all users except the administrators group or even just the administrator?

    NewnanIT1,110 pointsBadges:
  • Central Windows Server to aggregate Windows security and audit logs

    Can we have a central windows server aggregate all windows security/audit logs? If not does anyone have a script to grab them from domain machines?

    NewnanIT1,110 pointsBadges:
  • High School Computer Lab Network set up to prevent cheating

    I am trying to set up the network in my classroom to prevent students from stealing, renaming, deleting, etc. other students' work on the shared folder. Before the teacher's computer died, I was able to set up the permissions as write only, but the smart student could still rename someone's file if...

    Rollinsm325 pointsBadges:
  • Automatic clean up antivirus scan

    How to automatic clean up virus on infected client computer client via network? so we can monitoring on PC..

    STAFFIT110 pointsBadges:
  • What knowledge transfer required when transitioning from old IT manager to new one?

    What point / Knowledge transfer to be take care, while job transfer from resigned IT manager to new pointed IT manager for future smooth running of IT work?[o:p][/o:p] As CAL, ISO docs, all network passwords etc.[o:p][/o:p] Should we need to scan network for any unknown remote access installed...

    mitrum810 pointsBadges:
  • Manual updates of Symantec Endpoint security

    Symantec Endpoint protection will not update manually using the intelligent updater. We are using version 11 and upgraded from corporate v. 10. I get a error that a service is not running.

    TeachMeIT975 pointsBadges:
  • Adding another level of security to SQL 2005 database

    We have a SQL 2005 Database. It is protected by Windows Authentication. Can we add another level of security - requiring a SQL username and password along with a valid user name and password on the domain?

    NewnanIT1,110 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Freeze Active Directory users from changing passwords temporarily

    Can we prevent users from changing their AD passwords temporarily? We want to create a network freeze and not change or modify anything including passwords while we do some backup/restore testing.

    Troubleshooter24755 pointsBadges:
  • Virus disabled security updates, problem persists even after virus removed from Windows XP SP3

    A virus on Windows XP SP3 disabled the ability to access updates for Microsoft security essentials, Symantec or Norton. The infection has been cleaned but the problem persists. I check host file and dns. All good.

    NewnanIT1,110 pointsBadges:
  • How Many Information Security Policies Do I Need?

    I need some advice from other security experts. I was recently hired to work for a small company where our data and infrastructure is at a managed hosting facility. The hosting service has a SAS 70 that is regularly audited.  My company in the past relied – almost solely – on the managed...

    Vper10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following