• Regarding SFTP

    I am not a AS/400 programmer but overheard my colleagues and suggested them to use SSH. Greatly appreciated if anyone can suggest here... They have a batch job which creates a text file containing the sftp command passing IP address, username, password and the file to be transferred. I suggested...

    bijunator5 pointsBadges:
  • IT

    If company A attacks company B, how should the company A address the issue? What is the possible solution?

    RANARANA5 pointsBadges:
  • What are the costs involved in having a product certified

    I have a product that I want to get listed on the certified product list. How can I do that?

    dzerna5 pointsBadges:
  • Is it possible to stack a Catalyst WS-C3750X-24T-L with a WS-C3750X-12S?

    Is it possible to stack a Catalyst WS-C3750X-24T-L with a WS-C3750X-12S?

    Lilirouter135 pointsBadges:
  • Bonded ADSL Routers Cisco 1921

    Hi, everyone, My ISP (Enta) have started to do Bonded ADSL. The hardware they recommend is a Cisco 1921 - I'd also need a couple of ADSL Modules - this brings the price to over £1000 - bit too much for a broadband router. However, I'm told that I can connect multiple Netgear DG834's as they have a...

    flowerlee85 pointsBadges:
  • Key Loggers and Root kits

    Hi All, It seems my company is affected by key loggers and root kits and malware. Would you people suggest if this can be cleaned and controlled at perimeter level with help of ASA firewalls, IPS things of that sort? Can we tight the security for these kind of issues with ASA firewall at perimeter...

    raviv073110 pointsBadges:
  • Will litigation against Huawei affect me as a buyer?

    I have been working on assessing a few leading network equipment vendors in the likes of Cisco, HP, Juniper, etc., to procure Layer 2 switches. I am currently assessing the capabilities of Huawei and i have been hearing about a litigation raised by Nortel (Avaya) against Huawei on their Layer 2...

    Unified Communications ATE2,120 pointsBadges:
  • Router Cisco 2800

    How to restore iOS Cisco router 2800 card reader?

    abdoukh5 pointsBadges:
  • Preventing command prompt access except by domain admin

    Can we prevent command prompt access on all servers except for when run by a domain administrator?

    NewnanIT1,110 pointsBadges:
  • Using the free reverse engineering malware tools in REMnux

    Hi Experts, I have seen Keith Sir's(Keith Barker)Video on REMnux. This seems to be powerful. I have somewhat understood the video. Had little queries. Kindly guide/suggest.I Just wanted to understand if this can be implemented on production as VM and scan through the infected windows...

    raviv073110 pointsBadges:
  • Skinny website

    Website studyspanish.com appears small and skinny on Firefox. How can I fix this?

    WeeLassie15 pointsBadges:
  • Microsoft Virtualization live expert chat: 3/31, 11:00 am EST

    Edwin Yuen, Microsoft Virtualization expert, will be with us March 31st from 11 - 3 EST here on IT Knowledge Exchange to answer your enterprise virtualization questions in a live chat. Join us on the Microsoft Virtualization blog 11:00 am EST on March 31st to ask Edwin your toughest enterprise...

    JennyMack4,280 pointsBadges:
  • Screen saver

    How do I set up a security question for my screen saver?

    katydid405 pointsBadges:
  • Working on getting into the field…

    Hello anyone and everyone! My name is Marty and I am working on getting into the Information Security field so I have a lot of questions. For now though, I will post just this one to start. I am 45 and a Disabled Veteran starting late, obviously, getting into the field, so what are the most...

    MockLife5 pointsBadges:
  • How can I install Windows XP by USB with an ISO?

    I have a Windows XP ISO. I want to install windows by using USB.I have tried to transfer ISO by using this utility "Windows 7 USB DVD Download Tool", but I shows error "The selected file is not a valid ISO file. Please select a valid ISO file and try again".While ISO file is working. I have burnt a...

    Xaphar220 pointsBadges:
  • Implementing a Security Policy Within an Organization

    Hello everyone,My name is Trevor, and I'm a student at UAT, doing some research on different implementation frameworks for establishing a security policy. In particular, I came across the SKiP (Security Knowledge in Practice) framework, and saw some advantages and disadvantages.This framework has 6...

    tlawren35 pointsBadges:
  • Buffer overflow detection technique

    which is the best buffer overflow detection technique?

    Ta5 pointsBadges:
  • Free Chapter – Hardening a SQL Server implementation

    Another free chapter download is available on the IT Bookworm Blog. Written by: Ross Mistry and Hilary Cotter Book: Microsoft SQL Server 2008 Management and Administration. Overview: “If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based...

    BrentSheets6,925 pointsBadges:
  • Asset Management within the ISO 27001 Framework

    One of the many initiatives at the company I work for is to take a full inventory of all the network devices within the company. This is to stay ISO 27001 compliant. An advantage of being 27001 compliant is that it forces a company to be accountable and know every device that communicates across...

    rgabuat10 pointsBadges:
  • NIST

    Hi. I am a Network Security student at UAT and this week we are studying security frameworks. I have chosen to learn about NIST. Has anyone every used NIST and can you share what you did and did not like about it? Thank you very much.

    officialdave5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following