• New member contest: ASK, Answer and Win a $50 Amazon gift card

    As 2008 winds to a close, IT Knowledge Exchange has one more fun contest to end the year. From today until December 23rd, you can enter to win one of ten $50 (US) Amazon.com gift cards. There are two things, however, that you must do in order to enter: 1. Ask 2 questions 2. Answer 2 questions...

    ITKE342,960 pointsBadges:
  • Secure FTP for one User

    I'm in the process of setting up Secure FTP over SSL for a Single User Profile "TESTFTP".If i do enable of SSL FTP and assign certficates to FTP client from DCM. Everyone has to follow SSL ftp.Could anybody assist me in setting up SSL ftp for ONLY one user.? Currently no SSL is enabled in system....

    qmaster1,675 pointsBadges:
  • How do I setup an automated VPN connection?

    Our branch office uses Cisco VPN to connect to our corporate office - and our corporate office uses Check Point VPN to connect to our branch office. Can I have an automated VPN connection while being at either location? Thanks.

    NetworkingATE1,545 pointsBadges:
  • ASA Implementations

    Hi, I need to implement ASA Firewall in my network and current network topology is Router------Switch-----Servers. what should be best topology to implement the firewall. Please let me know i never configured firwall.

    ICND15 pointsBadges:
  • Copy only in a shared folder

    hI, I WOULD LIKE TO CREATE A SHARED IN WINDOWS 2003 WHERE USERS WILL BE ONLY ALLOW TO COPY THE FILE FROM THE SHARED FOLDER TO THEIR LOCAL MACHINE.I DON'T WANT THEM TO OPEN IT IN THE SERVER .IJUST WANT THEM TO BE ABLE TO COPY THE FILE .

    Hersent5 pointsBadges:
  • Intermittent Error using FTP/TLS

    Our shop has several jobs that are running on a z/OS system in which we are transfering data to an FTP server. Other than a difference in file names being transfered, the FTP script is virtually the same. Unfortunately, we are having a problem with one specific job. When attempting to log onto the...

    Spencer7565 pointsBadges:
  • Latest research in risk assessment

    I want to know about the recent risk assessment framework/approach, models & risk assessment metrices is need to be developed for software / information security in multiuser enviornment. What should be latest approach of risk assessment.

    Software Security10 pointsBadges:
  • Soon you can redeem knowledge points for Amazon.com gift cards

    Yes we are coming up knowledge points and will be announcing the ability to redeem all the points you have earned thru december this year for amazon.com gift cards. Next week we will be sending out an email with all the details but it should be fun to see who ends up asking and answering to beef up...

    ITKE342,960 pointsBadges:
  • Recover Mailbox Using Recovery Storage Group

    Hi All Im an apprentice in a goverment company in london and i was wondering if any one can help?? One of the staff at our company has left and before they left they deleted all their mail, so i have to figure out how to recover their mailbox using recovery storage group. I have recovered there...

    Geezzer0 pointsBadges:
  • Windows 2003 Security Audit: Need help blocking and tracking consistent hacker

    I've recently taking over as Admin working part-time for a non-profit organization in addition to my full-time job. I quickly discovered that their previous IT had been stealing from them for several years and now it appears that he has been hacking into the system. It's been rough keeping him out,...

    HoustonITGuy25 pointsBadges:
  • How do I reset an administrative account password I’ve forgotten on my HP G60 series laptop computer

    I have forgotten my password, I own the administrative account. What do I do?

    Techchallenged5 pointsBadges:
  • Lost my Windows XP Admin Password

    i loss my admin password of windows xp. i did not formate my windows bcz. there is very important data available. i can't loss it. pleas you sugest me. what i do. thanks with best regard

    141415 pointsBadges:
  • How to determine if desktop has been hacked?

    How can I find out for sure that my computer is being hacked into? I have very good reason to believe that is what is happening. Some people who have no axcess to my e-mail know things that only the person I sent it to should know. I suspect someone who might have a motive?

    Oldlady555 pointsBadges:
  • biometrics

    is biometrics compulsory when one is applying for reentry permit?

    Binishessani5 pointsBadges:
  • ACS installation

    how to install the ACS on ESXI

    Switching15 pointsBadges:
  • trying to get MS VPN client to work w/ SonicWALL VPN server

    Greetings. I'm pretty new to networking and VPN stuff (read: be gentle ;-) and am trying to get a MS VPN client to work w/ the SonicWALL server. I suspect I need to create a SSL cert on the server but not sure. I can connect with a SonicWALL client, but we'd like to use the MS client. When I try to...

    Crb5 pointsBadges:
  • Exchange 2003 OWA Certificate renewal

    I need to renew the web server certificate for OWA on an Exchange server 2003 SP2. Unfortunately the server is also a domain controller with no local admin accounts. Attempts to renew the certificate fail for insufficient permissions even with domain admin accounts.

    Pcrider1425 pointsBadges:
  • When users come in via Outlook Web Access, they get logged out instantly,the moment they click on ‘Public folders’

    We have 6 Exchange 2003 servers configured as Public Folder servers, along with many more Back End and Front End servers behind ISA 2004 firewalls. When users come in via OWA, they get logged out instantly, the moment they click on 'Public folders'. This is only happening to users from those...

    ITKE342,960 pointsBadges:
  • I want to upgrade my IOS Router 7507. but min flash IOS new version require 32 M.

    A question submitted on SearchNetworking.com I'm want Upgrade IOS Router 7507. but min flash IOS new version require 32 M. cisco RSP8 (R7000) processor with 262144K/8216K bytes of memory. 46976K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes). 16384K bytes of Flash internal SIMM (Sector...

    ITKE342,960 pointsBadges:
  • The Great SPAM experiment

    Hey... this is kinda interesting... supersize-me for spam ;) http://itknowledgeexchange.techtarget.com/it-trenches/did-you-see-this-issue-3

    Labnuke9932,960 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following