• “Network Security Engineering” vs “computer software engineering”

    Which degree is better to do on the basis of scope and skills?

    Comparison5 pointsBadges:
  • how to protect router to hacker’s

    actuaaly ask this question is .... if any user work in web or internet  that's hacker is trace the route by  ping how to protect this  actvity... my means is router is indicate by hacker's if hacker's is find the route that's means  hacker is find the packet accesing .. router to router. that...

    Johnyrawat15 pointsBadges:
  • ping: sento: No Route to Host

    I have a unix server on an internal network, behind a ComCast SMC8013WG Cable Modem / Router. All of my PC's and MAC's on my internal network can see the sever and access it. They can all see and access the internet as well. All except for my Unix Server. I need to get remote access to this unix...

    PCMTCG0 pointsBadges:
  • Blocking Active Sync from our network

    Can we block activesync from being used on the network? Desktops are running Windows XP SP3 and we do not want contacts and data transferred to users personal devices for secrecy reasons.

    NewnanIT1,110 pointsBadges:
  • Authentication against Active Directory

    How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?

    NewnanIT1,110 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Could a honeypot machine risk the secure network?

    If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?

    ITKE346,430 pointsBadges:
  • How can we configure TACACS+ server on router?

    How we configure TACACS+ server on router

    Agt45 pointsBadges:
  • Checking networks for flaws and defects

    Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

    NewnanIT1,110 pointsBadges:
  • TZ 100 Hang, ping with no response and vpn drop and reconnect

    TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.

    Atracc5 pointsBadges:
  • IP lists to allow users to access a website internally only

    We want to launch an internal website that only can be accessed from our network clients. This includes remote users. Is there an "allow these IPs" list somewhere using is on a Windows 2003 standard? Or will I need to create firewall rules for this?

    ITKE346,430 pointsBadges:
  • Advanced firewall design

    suggest me some techniques regarding to the firewall design

    Asu30 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Disabling wifi capabilities in corporate desktops

    Our latest shipment of corporate desktops have wifi. We want the machines only to be able to connect with a wired connection and only via dhcp. Can I do this via group policy and force these options? I want to make sure no one can change the settings manually.

    ITKE346,430 pointsBadges:
  • Where do I enter my network password?

    I have windows xp I can see my network but cannot find where to put the password in...can you tell me how to find it?

    Postacey5 pointsBadges:
  • Switch or router for small office network with 10-20 computers

    Hi I am trying to setup a small network for an office. Not sure should I use a Switch or a router. Could be 10-20 computers. Also the user wants me to block everyone from accessing their emails. Any suggestions is appreciated

    NetworkingIT5 pointsBadges:
  • Is it possible to monitor network health from one console?

    Is there a way to monitor all of my Dell servers' health from a single window or console? We have hundreds of servers varying in models but all Dell. Can I monitor smart status, disk space, users, event logs more centrally?

    ITKE346,430 pointsBadges:
  • firewall design

    i want to design a firewall for a college.so plz suggest me sum ideas regarding to this subject and if you have any another idea related to this subject that also wil be accepted

    Asu30 pointsBadges:
  • AAA Network Security

    Is the use of a AAA Server limited to TACASC+, RADIUS, or Diameter, or is the functionality of AAA met by the seperation of the processes used in AAA (Authentication, Authorization, and Auditing).  Example:  For remote access to the company network, remote users will access through a SSL VPN,...

    Fugaz135 pointsBadges:
  • SSL VPN vs SSTP VPN

    What's the difference between an SSL VPN and an SSTP VPN? Is the connection the same or is an SSL VPN more secure than an SSTP VPN?

    SearchEnterpriseWAN1,080 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following