• Monitoring 40-computer network

    How can I monitor network changes in my 40 computer network using free open source software? I need to see if someone steals memory or a hard drive or if any hardware has been disconnected. It should also be able to tell me what hardware is connected and what applications are installed.

    ITKE347,975 pointsBadges:
  • Can a remote access install LoJack to recover a stolen laptop?

    My laptop got stolen yesterday. It has Windows Vista Ultimate 64-bit. Can a remote access find or install LoJack on it?

    NetworkingATE1,545 pointsBadges:
  • windows password question

    I recently purchased a computer from a "going out of business" sale for my fathers business and when I try to logon to Windows I get the logon screen with domain. I have a valid username and password but obviously i am not connected to a domain. I need to bypass this if possible. The safe mode...

    Minxcomp10 pointsBadges:
  • “Network Security Engineering” vs “computer software engineering”

    Which degree is better to do on the basis of scope and skills?

    Comparison5 pointsBadges:
  • how to protect router to hacker’s

    actuaaly ask this question is .... if any user work in web or internet  that's hacker is trace the route by  ping how to protect this  actvity... my means is router is indicate by hacker's if hacker's is find the route that's means  hacker is find the packet accesing .. router to router. that...

    Johnyrawat15 pointsBadges:
  • ping: sento: No Route to Host

    I have a unix server on an internal network, behind a ComCast SMC8013WG Cable Modem / Router. All of my PC's and MAC's on my internal network can see the sever and access it. They can all see and access the internet as well. All except for my Unix Server. I need to get remote access to this unix...

    PCMTCG0 pointsBadges:
  • Blocking Active Sync from our network

    Can we block activesync from being used on the network? Desktops are running Windows XP SP3 and we do not want contacts and data transferred to users personal devices for secrecy reasons.

    NewnanIT1,110 pointsBadges:
  • Authentication against Active Directory

    How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?

    NewnanIT1,110 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Could a honeypot machine risk the secure network?

    If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?

    ITKE347,975 pointsBadges:
  • How can we configure TACACS+ server on router?

    How we configure TACACS+ server on router

    Agt45 pointsBadges:
  • Checking networks for flaws and defects

    Is there security testing equipment that will check my wireless and wired network for flaws or defects that would allow it to be taken over or infiltrated?

    NewnanIT1,110 pointsBadges:
  • TZ 100 Hang, ping with no response and vpn drop and reconnect

    TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.

    Atracc5 pointsBadges:
  • IP lists to allow users to access a website internally only

    We want to launch an internal website that only can be accessed from our network clients. This includes remote users. Is there an "allow these IPs" list somewhere using is on a Windows 2003 standard? Or will I need to create firewall rules for this?

    ITKE347,975 pointsBadges:
  • Advanced firewall design

    suggest me some techniques regarding to the firewall design

    Asu30 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Disabling wifi capabilities in corporate desktops

    Our latest shipment of corporate desktops have wifi. We want the machines only to be able to connect with a wired connection and only via dhcp. Can I do this via group policy and force these options? I want to make sure no one can change the settings manually.

    ITKE347,975 pointsBadges:
  • Where do I enter my network password?

    I have windows xp I can see my network but cannot find where to put the password in...can you tell me how to find it?

    Postacey5 pointsBadges:
  • Switch or router for small office network with 10-20 computers

    Hi I am trying to setup a small network for an office. Not sure should I use a Switch or a router. Could be 10-20 computers. Also the user wants me to block everyone from accessing their emails. Any suggestions is appreciated

    NetworkingIT5 pointsBadges:
  • Is it possible to monitor network health from one console?

    Is there a way to monitor all of my Dell servers' health from a single window or console? We have hundreds of servers varying in models but all Dell. Can I monitor smart status, disk space, users, event logs more centrally?

    ITKE347,975 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following