We’ll give you 50 knowledge points for sending out a tweet about our iPad contest, happening now through February 16th! Spread the word, earn points, and qualify yourself for an iPad or Amazon.com gift card! Contest details at the Community Blog.
Answer Question | February 3, 2011 3:51 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, ITKE, ITKE Contests, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, twitter, Virtualization, VoIP, Windows Server
I have a Form with some confidential information in a field. I am sending this document (store form in the document) to a group. Now is there any way that field can be encrypted to certain recipiants of the group. I tried with secretkeyencryption, it worked fine if the document is accessed from Notes database [...]
Answer Question | February 2, 2011 1:36 PM
Email encryption, Encryption, Lotus Notes, Lotus Notes 8.x
How to fix windows/system32/firewall.cpl prloblem? Ploblem opening control panel shows error windows/system32/firewall.cpl…this somehow affected the opening of few other programs such as Internet Explorer(unable to connect to INTERNET but works well with firefox) and ms office..
Answer Question | February 2, 2011 1:17 AM
Firewalls, Windows firewall, Windows XP Professional, Windows XP Professional SP3
Everyone has their own reasons for not wanting to experiment in the cloud, but more and more the enterprise is trusting mission critical applications to the cloud. What are your major security concerns for 2011 regarding the cloud, if any? How have those concerns changed or evolved since 2010? We’ll give you 100 knowledge points [...]
Answer Question | December 16, 2011 9:44 PM
Cloud Computing, cloud computing management, Cloud computing security, Cloud Security, Open IT Forum, Security, Security management
This week’s free IT book is a practical guide to building and running incident response and product security teams. To win Cisco’s Computer Incident Response and Product Security answer one of these five questions and post the link to your answer in the discussion area below. Good luck! Mitigating cloud server risks during DDoS attacks [...]
Answer Question | February 1, 2011 5:18 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, Development, Exchange, Giveaways, ITKE Contests, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP, Windows Server
During recent DDoS attacks, the hackers are able to bring down all customers hosted on the targeted customer’s service. Suggestions for mitigating that risk?
Answer Question | March 1, 2011 3:59 PM
Cloud Security, Cloud Services, DDOS
How can we lock down and secure all of our SIP signaling so that it is not readable as plain text? The solution can not deteriorate the VoIP traffic either.
Answer Question | January 31, 2011 3:12 PM
Security, Security management, SIP Attacks, SIP Vulnerabilities, VoIP
can any one, tell me how to enable Port number 995,993 . i am using Exchange server 2010 ,TMG 2010-the port has been disable during the implementation time.i really don’t have the knowledge regrading these plz help.
Answer Question | January 31, 2011 11:49 AM
Exchange 2010, Microsoft Forefront TMG 2010, Port numbers
I’m having a total brain fart. I set this up before but can’t remember how I did it. I have one static IP for External interface. I have a second static IP set to my MX address. .114 is my main external IP. I have .115 as my mail.server.com record. I tried adding the .115 as [...]
Answer Question | January 28, 2011 6:14 PM
Exchange 2007, Exchange 2007 administration, WatchGuard
What are the key things to consider when choosing a network security appliance for 130 user network? I am confused with the plethora of appliances Cisco has on offer. Network is laid across three floors, with all the switches connecting back to a wiring closet.
Answer Question | February 25, 2011 10:32 AM
Cisco switches, Network security, Network security appliances, Security
I am trying to determine the best way to delete user profiles on a Windows 7 computer. I work in an educational institution and so there are hundreds of user profiles that get recorded on each computer in the lab before too long. The built-in user profile manager only deletes one user profile at a [...]
Answer Question | April 15, 2011 4:38 AM
Group Policy, User profiles, Windows 7, Windows Server 2008, Windows Server 2008 R2
How to use Active Directoy with Uniface Has anyone used Active Directory to authenticate users of a Uniface application? If so, how.
Answer Question | January 30, 2011 3:20 PM
Active Directory, Authentication, Uniface, Windows Server 2008
i have two vlans configured into a juniper netscreen (a screenOS device). I have connected a catalyst to the nic i have configured the vlans on. I need an example configuration to shoot into the cisco to be able to ping both juniper vlan addresses from the cisco
Answer Question | February 16, 2011 12:25 PM
Cisco Catalyst, Cisco Catalyst 3550, Cisco VLAN, IOS Fundamentals, Juniper NetScreen-25, ScreenOS, VLAN
What is the best way to set up my drive configuration for five virtual windows server 2003 on a system with five 750gb drives on a SCSI controller?
Answer Question | March 1, 2011 5:00 PM
Configuration management, SCSI, Server virtualization, Windows Server 2003, Windows Virtualization
Hello all, I have a weird issue with my company’s VPN. we are using cisco vpn via ASA firewall. When people login into VPN and want to browse our main shared drive, some of then get not a full list of folders. This issue seems to be with more or less the same group of [...]
Answer Question | March 1, 2011 2:14 PM
ASA, Cisco, Cisco ASA Hardware Firewall, Cisco VPN, Firewalls, Mapped Drive, Shared Drive, VPN
I presently use a product called MXlogix along with exchange server small business edition 2003. MXlogic is a proxy that stops spam. I have a situation where calling mxlogic has succesfully handed off the message to my exchange server, however the user never gets the email message. Is there somewhere i can look to see [...]
Answer Question | January 25, 2011 7:37 PM
Email monitoring, Exchange 2003, Exchange 2003 administration, Proxy servers, Windows Server 2003
What is the best way to give public access to the internet yet protecting my company network? We have a Cisco ASA 5510 firewall and wireless access points.
Answer Question | February 23, 2011 9:18 PM
Cisco ASA 5510, Cisco Routers, IP address, Network design, Network security
I am receiving the following message while trying to install these two windows security updates: KB981852, and KB956572 - ”the file c:windowssystem32ntkrnlpa.exe is open or in use by another application”
Answer Question | January 21, 2011 3:38 PM
Lenovo terminal, Security updates, Windows XP Security, Windows XP SP3
Anyone know i have some problem i can’t disinfect virus mal_otorun 1 and EXPL CPLNK.SM im use trendmicro antivirus…..
Answer Question | January 27, 2012 9:16 AM
Antivirus, Antivirus software, TrendMicro
Hi All. I have a Netgear WGR164v9 wireless router connected to internet directly by public IP and this router performing DHCP for wireless LAN ip subnet is 192.168.1.x. A server (DNS,DHCP & RRAS with NAT) connected with this router by ip 192.168.1.6 which has another subnet 192.168.10.x for LAN PCs. In this situation everything is [...]
Answer Question | January 24, 2011 7:54 AM
Alternating Record Formats, Netgear, Netgear router, Router IP address, Subnets problem, Subnetting