• Is it possible I was hacked through my VPN?

    I have a hacker problem. I am using a VPN that specifies it is USA on an iPAD, and is Apple approved. When I log into my email it always gives a California or Texas IP address, with one exception: Once a week it says I have logged in from Dubai. I was actually logged in when this happened and the...

    ITKE351,335 pointsBadges:
  • Is SDN more than OpenFlow? What about overlay networking?

    As techniques like OpenFlow gain a foothold in the physical and virtual infrastructure layers and the multi-tenancy models mature, should OpenFlow conversations be taking place between the provider-controlled layer and the application-controlled layer? How do we - vendors, users, and industry pros...

    CohesiveFT5 pointsBadges:
  • Deleted Object not Found in Audit Log

    I found a Program object present in the system when I did a DSPOBJD for a library last week. But today, when checked the object is not present in the system. I checked the AUDIT Logs (DSPAUDJRNE, DSPJRN, CPYAUDJRNE) with DO, MO etc. But this object has not been registered anywhere in the Audit logs...

    AdminAS40015 pointsBadges:
  • How to make all branches visible to others

    I need a help please. I have fortigate 80c connected to 16 branches through IPsec VPN and all is fine. What I need is to make all branches see each others. I have a trend-net device in each branch.

    ITDeptsd5 pointsBadges:
  • DosCreateMutexSem privilege escalation

    I am looking for an explanation of how a privilege escalation hack would be able to be inserted with a call to doscreatemutexsem function from a windows service that is running under the local system account.  I was unable to find anything on Google and not being a security expert I just don't see...

    CarlCioffi345 pointsBadges:
  • Receiving error message connecting to SQL Server 2008 R2

    I'm trying to connect to SQL Server 2008 R2 using Windows authentication. However, I can't because I keep getting this error:Login failed for user 'AVATOPIA\ian'. Reason: Token-based server access validation failed with an infrastructure error. Check for previous errors. [CLIENT: ]Now, I can log in...

    ITKE351,335 pointsBadges:
  • Scanning Active Directory for weak passwords

    Is it possible to scan our active directory and see if people have weak passwords? We have upped the password policy but what about for users that already have passwords and are not scheduled to changed them yet?

    Troubleshooter24755 pointsBadges:
  • Controlling VPN access

    Here's my scenario. I fall under guidelines of HIPAA. I have mobile users using laptops and tablets loaded with Cisco VPN CLient connecting to my Cisco 2811 ISR which functions as my router/firewall/VPN. I am using Micorosoft AD in my domain. To authenticate users to the domain. Is there an easy...

    Gforsythe75 pointsBadges:
  • Cache-based side channel attacks

    Please help me find a new secure mechanism against cache based side channel attacks in the cloud. I found that ieee published a method for security against AES, RSA, BTB attacks to retrieve the secret key. It is architect based method. Can I do any modification to this work after implementing this...

    mvidya199020 pointsBadges:
  • Error Code 64: Host not available – ISA error

    Hello Sir;   When I am accessing the  internal website from other system, I get below error. How can I bypass internal broadcast  from ISA server?   I alread bypass from  broweser's internet option but still same issue.   With Regards Bhupendra Jesalpura 9426372705

    BhupenJesalpura10 pointsBadges:
  • Delivery Failures for mail I did not send – Spoofing or Trojan

    I'm getting delivery failures for email I didn't send. It's probabaly someone spoofing my account, but could it be a trojan sending emails directly via SMTP? How can I tell? Is there a way to query the SMTP service for a list of sent emails?

    Eag5 pointsBadges:
  • HIPAA audit on virtual network

    I'm hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPAA compliance audit. Does anyone have suggestions of open source or pay tools they'd recommend? Do I need to pull in an outside party for this?

    Michael Morisy8,323 pointsBadges:
  • FOXPRO 2.6 FOR MS DOS DATABASE CONVERSION

    I have a .dbf file from my dental software (FOXDENT V7.0B) MS DOS program that allows the printing of a standard 1994 American Dental Association form. HIPAA is now requiring the 2006 format- Mostly the government and Medicaid forms. Can anyone help me with this conversion as this software has...

    Cephid5 pointsBadges:
  • Personal E-mail at work (aol, gmail)

    I am looking for documentation to support blocking personal e-mail at work(aol, comcast, hotmail etc) for virus and HIPAA compliance regions. Can anyone direct me to any publications that support this? Thanks!

    Itadmin34775 pointsBadges:
  • Network Security Auditing tools

    Hi all - I'm hoping somebody out there might have a suggestion for me. My company unfortunately falls under Sarbanes Oxley and we need to audit all of the network directory security. The down side of this (ok well it's all down) is that we are a small company, no money to spend on getting the...

    Lirria0 pointsBadges:
  • Windows 2003 Server configuration

    I have been asked to configure a new server for a small Health care clinic. Previously they were using a Dell Dimension as a file server with open shares throughout the network and all users logging in as administrators. Considering the risks involved with HIPAA (Health Insurance Portability and...

    Stuntz0 pointsBadges:
  • Help

    What is the importance of HIPAA and security in an electronic health record?

    Bella4mommie10 pointsBadges:
  • Corporate laptop security/encryption

    Please can anyone offer any guidance or know what are the best products in the market place for encrypting/securing corporate laptops, preferably the solution should include hard disk wiping.

    Troubleshooter24755 pointsBadges:
  • Alternative web filtering software

    Are there any free alternatives to the horrible web filtering software that we have been using called Websense? We have no real needs other than monitoring and blocking urls based on categories.

    NewnanIT1,110 pointsBadges:
  • Securing Windows Server 2008

    What is the best way to lock down and secure a Windows 2008 server? We want to block all remote connections and secure passwords and what not.

    TeachMeIT975 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following