How can we connect to a remote laptop running Vista Pro in the field to run an AV scan and a Malwarebytes scan? Can we initiate this over the net without any preinstalled software?
Answer Question | September 27, 2010 4:14 PM
Antivirus software, Malware detection, Remote access, Security in 2010, Vista, Windows, Windows Vista
Is antivirus on the windows 2003 server and not on the desktops of Non-connected devices? They can not get to the Internet. The user saves all files to the server. Is it ok to only have antivirus on the server?
Answer Question | September 28, 2010 3:42 PM
Antivirus, Antivirus software, Security in 2010, Windows, Windows Server 2003, Windows Server 2003 security, Windows Server 2003 Security Updates
What is the proper way to connect two HP 4000M pro curve switches together? Is there a specific uplink port? Can we connect the switch to the other using two ports for redundancy? (We tried this and it takes the network down!)
Answer Question | September 24, 2010 3:41 PM
HP 4000, HP ProCurve, HP switches, Port redirection, ProCurve Switch 4000, Redundancy, Windows
How can I harden or configure IIS on a Windows server 2003 to be as secure as possible? It is hosting a admin site and that is all for now. We are running McAfee 8.7.1
Answer Question | November 8, 2010 1:46 PM
IIS, IIS configuration, IIS Server, Security in 2010, Windows, Windows Server 2003, Windows Server 2003 security
We had a question in the forums recently that brought up an interesting dilemma: In sensitive roles such as systems administrators, do you believe in granting full access or employing a segregation of duties to minimize risk? We’d love to hear how your company deals with these executive decisions and how that’s succeeded (or failed). [...]
Answer Question | September 23, 2010 6:37 PM
Open IT Forum, Security in 2010, Systems administration, Systems administrators
Windows Firewall cannot run because another program or service is running that might use the network address translation component (Ipnat.sys).
Answer Question | September 22, 2010 9:54 AM
Firewall management, Firewalls, Network Address Translation, Windows, Windows firewall, Windows Server 2003
Hello If a customer don’t wants to execute the SAS70 type 2 audit – is there any other compliance standards that you can choose from ? That is to get the same compliance documentation/status but not execute the SAS70 type 2 audit? Is there any light version of the SAS70 standards?
Answer Question | November 9, 2010 8:37 AM
Auditing, Auditing (compliance), SAS, SAS 70, SAS 70 Type II audit vendor, SAS70 type 2 audit replacement, Windows, Windows Server 2003, Windows Server 2003 Audit Policy, Windows Server 2008
l think my email is being hacked but not sure l have been recieving encryped emails and want to know is this coming from home or being hacked
Answer Question | September 22, 2010 10:26 PM
Encrypted email, Encryption, Hackers
Hi, I’m looking for a VBScript that will search and display complete path of an exchange Public Folder (either using Outlook or other tools) and then export ACL (all members with their permissions”. For first part, since Outlook search is very slow, it would be nice if the script can do a better job. Thanks, Saura
Answer Question | September 21, 2010 8:37 PM
ACL, Exchange public folder export, Exchange Public Folders, Public folders, VB script, Visual Basic Script
Can we see what open applications are open on domain workstations and what the computers focus is on? How can we do this?
Answer Question | September 21, 2010 4:14 PM
Security in 2010, Windows, Windows Server 2008 Domain, Windows Server 2008 R2, Windows XP SP3, Workstations
I want to audit about 200 servers for low disk space. The servers are using Windows 2000, 2003 and 2008. What is my best bet for doing this easily? The reporting machine can be any of the servers or a XP or 7 workstation.
Answer Question | November 9, 2010 4:12 PM
Active Directory, AD, Auditing, Disk space, Windows, Windows Server 2003, Windows Server 2003 Domain
We have two 10 MBit internet connections. They are both Ethernet handoffs and enter two different sonicwall firewalls. Is there a way to bridge or bond these two separate lines? They are from two separate carriers and have separate IP ranges.
Answer Question | September 21, 2010 3:36 PM
Bridging, Ethernet, Ethernet connection, Firewalls, IP range, SonicWALL
We are about to scrap several old copy machines. I know they have hard drives in them. Should they be removed, wiped or what are normal company procedures for destroying any potential data on it before decommissioning it.
Answer Question | September 21, 2010 3:17 PM
Copy Machine, HARD drive, Hard drives, printer security, Security in 2010, Windows
Lost all access to my mail from outside the network. What could be wrong
Answer Question | September 21, 2010 12:16 PM
Cisco Firewall, Dell servers, Exchange email servers, Exchange Server, Firewalls, Remote access, Remote email access
I have a client with Windows Vista Ultimate and need to connect to their machine. They say they have a firewall and do not know where it is located. How can I share the users screen to help them fix an issue? Free is preferable.
Answer Question | October 11, 2010 6:12 PM
Firewalls, Remote connection, Security in 2010, Windows firewall, Windows Vista, Windows Vista security and patches, Windows Vista Ultimate
We have about 20 Dell Dimension 4700’s that occasionally get Thermal issues and shut down. Sometimes it can take up to 10 tries to get it to turn back on. The machines are not hot and the problems show up intermittently of about 20% of the computers. How can I fix or prevent this from [...]
Answer Question | September 20, 2010 6:11 PM
Dell, Desktop security, dimension, thermal event, Windows
How can I secure a Windows XP workstation that is open to port 80 and hosting a website using IIS? The box is on the DMZ of our firewall for the time being. We will probably move it inside the firewall and open port 80 to it shortly.
Answer Question | September 28, 2010 6:10 PM
DMZ, Firewalls, IIS, Port 80, Security in 2010, Windows XP, Windows XP Security
We have about 10 IP addresses trying to cause a DDOS attack on our organization. As soon as I block the addresses in the firewall another batch takes its place. This has been ongoing for about 10 hours. How can I stop this attack without changing my IP addresses?
Answer Question | September 21, 2010 6:10 PM
Attacker IP blocking, DDOS, Firewalls, IP blocking, Security in 2010, Windows, Windows Server 2008 R2, Windows Server Security
Hi, I am hoping I am posting this in the correct forum. I work for a company that is running a simple tickets database program to track who uses what sports tickets. There is a .exe file and a few .dbf files, etc. About 10 files in a folder to run this Tickets program from [...]
Answer Question | May 26, 2012 5:56 PM
Database Files, FoxPro, FoxPro 2.6, FoxPro 2.6 for DOS, FoxPro for DOS
This week’s IT book giveaway is for the Microsoft Windows 7 Administrator’s Reference: Upgrading, Deploying, Managing, and Securing Windows 7. Interested? All you need to do is answer one of the questions below and post the link to your answer in the discussion area of this question. Multiple answers mean multiple chances to win! Resizing [...]
Answer Question | January 8, 2011 4:09 PM
Contests, Giveaways, IT Books, NAS, Networking, Security in 2010, Windows 7, Windows 7 in 2010, Windows Server 2003