• Etherchannel with different port shapers

    I want to implement a new solution in my network. I want to make an Etherchannel over a STM1 radio link. I don't have Gi ports available so I want to use two aggregated FaEth ports. But I'm thinking of using different service policy on each interface. So, I want to put a service policy with a port...

    bogdanmucuta15 pointsBadges:
  • Do you see mobile malware becoming a dangerous trend for BYOD?

    In a recent report, FortiGuard Labs has seen a 30% uptick in mobile malware and is tracking over 250,000 unique malicious Android samples, along with 300 unique malicious Android families. The company says while BYOD is still a fast-growing trend, malware could affect both an employee's device and...

    Michael Tidmarsh29,410 pointsBadges:
  • When it comes to cloud services, is security your highest concern?

    In a recent Quocirca study for CA Technologies, it was found that IT security spending was higher among companies who said they were enthusiastic about cloud computing services. But 72% said they lacked the resources required to secure their cloud services. When it comes to cloud services, is...

    Michael Tidmarsh29,410 pointsBadges:
  • Forgotten Skydrive Password, I can access via laptop but not from Windows phone

    I have had to do a factory reset on my HTC 8x Windows phone and have retrieved everything including full Outlook sync, but still cannot access SkyDrive files from my phone.Is it possible to find my password?If it is not and I have to reset my password, does that mean that I have to change my...

    johnrr5 pointsBadges:
  • How much does security play into your decision when deploying hypervisors?

    With security of paramount importance, admins should understand hypervisor vulnerabilities and the current concepts used to maintain security on virtual servers. Additionally, ways to minimize the hypervisor's system footprint and thus the potential attack surface should be considered. Does...

    Chris Leonard4,300 pointsBadges:
  • What’s your take on DefCon asking Feds to stay away from the conference?

    After DefCon founder Jeff Moss' announcement that Feds should skip the hacker conference, the SearchSecurity team asked Trey Ford, General Manager at Black Hat, what Black Hat's stance on the issue. His response: All Feds are welcome. With all the hoopla surround the NSA, what's your take on DefCon...

    Michael Tidmarsh29,410 pointsBadges:
  • New updated version 2013

    I bought Kaspersky 2012 a week ago. Why wasn't it the 2013 version?

    suzyqsa1010 pointsBadges:
  • The remote device or resource won’t accept the connection

    Hi, We have setup a simple VPN server with PPTP enabled and have forwarded correct PPTP 1723 port and GRE 47 on plain Windows Server 2008(NOT R2). Now when I am trying to connect from any VPN client ie: Windows 7 or XP it connects fine and I can PING the VPN server but I am unable to browse the...

    farikhan5 pointsBadges:
  • DNS works fine for internally but unable to resolve external websites

    I have a Windows 2003 server domain and around 50 users. While I was checking the DNS yesterday, I have found that its not resolving external websites from any of the domain computer. I checked through nslookup > www.google.com, I get the error DNS request time out timeout was 2 seconds request...

    Hunzian20 pointsBadges:
  • Data protection options

    Data protection....I have been asked by a finance company to confirm my address which I did I was then asked to confirm my date of birth and I asked them to ask me another security question, they refused and the call ended. I am in the right to ask for another security question relating to data...

    english2810 pointsBadges:
  • Windows security

    How can I delete the Windows security warning that ask me for a yes or no when I go to a new site. It is coming up every time I go to a new site and is driving me crazy.

    je52575 pointsBadges:
  • Biometric technology

    What do I need to set up a biometric access control system?

    ttk10 pointsBadges:
  • Improve IT Infrastructure

    Dear All, I need your contribution to help a small enterprise. The new Finance Officer (a friend) ask me to audit is Infrastructure and make proposal for immediate implementation in order to improve security and company equipment performance. Here is the actual infrastructure: -1 IT help desk...

    Abidjan0 pointsBadges:
  • The best antivirus

    I have been thinking about this for a while. A lot of my friends, family, and colleague ask me what is best as an antivirus. I would like to get some feedback from the community on what everyone thinks is the best antivirus they have used for personal and or business use and the reasons why. A lot...

    Schmidtw11,330 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:
  • Monitor Internet bandwidth

    Good day, We are using Windows 2000 Small Business Server in our organization with Exchange, DNS and ISA server configured. 1. I want to monitor the internet usage by the users. 2. I want to take a report on monthly or daily basis how much MB/GB utilized by each user. Thanks for your reply in...

    GiriPrasad0 pointsBadges:
  • How to monitor and manage LAN gateway from a Helius router?

    Hi everyone, I am trying to filter/manage a gateway through a Helius router for directway. We are running Windows 2000 Server with all XP clients, around 50 of them. We have active directory running with the domain controller handing out DNS and DHCP to clients. All clients are pointing to the...

    Kimberley0 pointsBadges:
  • Auditor prohibited from using Yahoo mail or other research need for the company

    In our company, the IT department set some policies to be able to control accessing inappropriate sites and other illegal sites. As an auditor, are we exempt from their policies because even accessing Yahoo mail is banned? There are times we need to research needed by the Top Management but we...

    Elgin5 pointsBadges:
  • Firewall

    We have a UTM firewall for using a internet processing to our clients. How do we block the inappropriate sites i.e is unwanted URLs, and how to configure the same in my UTM firewalls.

    Selva19645 pointsBadges:
  • Desktop lockdown

    Hi all, I have 30+ windows 2000 clients running of a NT4 Server. The clients are locked down via gpedit but due to teacher requirements need the right click enabled. What i want to do is either: Stop any changes to desktop, or set a default wallpaper that cannot be changed. We have no money despite...

    Carl0s810 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following