• How to create a small-network VPN

    I searched your site (great site BTW) and found some aspects of my questions addressed but they don’t really answer fuly. So, if you don’t mind, here it goes. My technology knowledge is pretty low. I have 5 PCs at home. 2 Vista, 2XP and 1 Mac OS. I would like to keep our Internet connections...

    Bondgoldfinger5 pointsBadges:
  • Access Control List for users allowed to access network

    Is it possible to setup an access list for allowed computers on the network and prevent others from using any network resources like internet and printers. Even with a valid username and password I want them blocked if they are not on the Access Control List.

    Troubleshooter24755 pointsBadges:
  • Locked out of Cisco Router – Password reset doesn’t work

    do work for a local non-profit group. Apparently some prior network admin left under unhappy circumstances and did something to the cisco router(s) there. We had no password access, so I went through the password recovery/reset procedure. Everything seemed to be fine except for two little details:...

    Bobkberg1,070 pointsBadges:
  • Monitoring 40-computer network

    How can I monitor network changes in my 40 computer network using free open source software? I need to see if someone steals memory or a hard drive or if any hardware has been disconnected. It should also be able to tell me what hardware is connected and what applications are installed.

    ITKE353,415 pointsBadges:
  • Can a remote access install LoJack to recover a stolen laptop?

    My laptop got stolen yesterday. It has Windows Vista Ultimate 64-bit. Can a remote access find or install LoJack on it?

    NetworkingATE1,545 pointsBadges:
  • windows password question

    I recently purchased a computer from a "going out of business" sale for my fathers business and when I try to logon to Windows I get the logon screen with domain. I have a valid username and password but obviously i am not connected to a domain. I need to bypass this if possible. The safe mode...

    Minxcomp10 pointsBadges:
  • “Network Security Engineering” vs “computer software engineering”

    Which degree is better to do on the basis of scope and skills?

    Comparison5 pointsBadges:
  • how to protect router to hacker’s

    actuaaly ask this question is .... if any user work in web or internet  that's hacker is trace the route by  ping how to protect this  actvity... my means is router is indicate by hacker's if hacker's is find the route that's means  hacker is find the packet accesing .. router to router. that...

    Johnyrawat15 pointsBadges:
  • ping: sento: No Route to Host

    I have a unix server on an internal network, behind a ComCast SMC8013WG Cable Modem / Router. All of my PC's and MAC's on my internal network can see the sever and access it. They can all see and access the internet as well. All except for my Unix Server. I need to get remote access to this unix...

    PCMTCG0 pointsBadges:
  • Blocking Active Sync from our network

    Can we block activesync from being used on the network? Desktops are running Windows XP SP3 and we do not want contacts and data transferred to users personal devices for secrecy reasons.

    NewnanIT1,110 pointsBadges:
  • Authentication against Active Directory

    How can I only allow employees to connect to our WiFi? Is there a method of authentication against active directory? Is there a guide on setting this up?

    NewnanIT1,110 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Could a honeypot machine risk the secure network?

    If I place a honeypot machine on my dmz what are the possible consequences? We want to see the possible issues lurking around us to better prepare for them. If we have a susceptible machine unpatched and asking for it could the rest of the secured network be at risk?

    ITKE353,415 pointsBadges:
  • TZ 100 Hang, ping with no response and vpn drop and reconnect

    TZ 100 is keep working but there is no response through http management. Firmware 5521 and 5520 have used but no improvemenet. VPN drops and reconnect all the times. I have adjusted the TCP/IP timeout to 60 Seconds. Unfortunately, it is useless.

    Atracc5 pointsBadges:
  • IP lists to allow users to access a website internally only

    We want to launch an internal website that only can be accessed from our network clients. This includes remote users. Is there an "allow these IPs" list somewhere using is on a Windows 2003 standard? Or will I need to create firewall rules for this?

    ITKE353,415 pointsBadges:
  • Advanced firewall design

    suggest me some techniques regarding to the firewall design

    Asu30 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Disabling wifi capabilities in corporate desktops

    Our latest shipment of corporate desktops have wifi. We want the machines only to be able to connect with a wired connection and only via dhcp. Can I do this via group policy and force these options? I want to make sure no one can change the settings manually.

    ITKE353,415 pointsBadges:
  • Where do I enter my network password?

    I have windows xp I can see my network but cannot find where to put the password in...can you tell me how to find it?

    Postacey5 pointsBadges:
  • Switch or router for small office network with 10-20 computers

    Hi I am trying to setup a small network for an office. Not sure should I use a Switch or a router. Could be 10-20 computers. Also the user wants me to block everyone from accessing their emails. Any suggestions is appreciated

    NetworkingIT5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following