• Free antivirus and spyware to pinpoint virus source

    We are looking for a free antivirus and spyware solution with a server. We want to see who is contracting viruses and where the problem areas lie. We would like it to be an open source product if possible, but all recommendations are appreciated.

    Troubleshooter24755 pointsBadges:
  • Firefox 4 compatibility with Windows 7

    Has anyone had problems with Firefox 4 regularly "Not Responding" - it seems to work  fine on Win XP but is always bombing out on my Win 7 PC. Any advice greatly appreciated - thanks!

    Compucure205 pointsBadges:
  • Desktop user appears to have logged in after hours but has no remote access

    A user (xx) came in to work to find their logon screen displaying another user name (yy) which would indicate that yy had successfully logged on using that desktop. However, neither xx nor yy were present at 11:00pm when the logon took place (as listed in the event viewer log), as the office is...

    Cjm135 pointsBadges:
  • How to open encrypted file

    I have formatted one pc, after reinstalling all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logeed through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • For a fresh BS ECE grad, is it advisable for me to take SAP or CISCO?

    I've just graduated taking up Bachelor of Science in Electronics and Communications Engineering. Is it advisable for me to take a certification for either SAP or CISCO? My friends have been suggesting to me to take either one of these certifications as it does create a wider scope of options for...

    Quartz5 pointsBadges:
  • Blocking LogMeIn and remote access programs

    Hi, I have a Watchguard X1250e and I would like to block "LogMeIn" from accessing the internal network from the WAN side. Looked on the Watchguard FAQ. Cannot seem to find a place where to enable this setting. Any help would be appreciated.

    CdnPlague25 pointsBadges:
  • How can a message board moderator find out my personal email address?

    I used a message board from my college campus and then later, I received an email to my college email address from a moderator. I do not use that address for anything but school and have never made it public or used it to log in anywhere. Can someone find that out through my IP address? How can I...

    Darkpassenger15 pointsBadges:
  • Enterprise Linux 3rd party support costs

    Seeking info about the cost factor of 3rd party support, as part of the TCO, in relation to Unix to Linux server migrations within the financial IT industry. Is it possible that a mid sized bank (with approx. 10,000 employees) will decide to cancel a planned unix to linux migration of all of the...

    Gidid35 pointsBadges:
  • Multi-tenancy versus virtualization for cloud security

    In a cloud environment, multi-tenancy is something that has been questioned when it comes down to ensuring customers' data security. Some have proposed virtualization as an alternative. What is your take on multi-tenancy versus virtualization?

    MelanieYarbrough6,345 pointsBadges:
  • Opening Port 80

    How can i open the port no 80.It is closed or is in use by another program.I use Windows xp

    Hahahaa205 pointsBadges:
  • Career Opportunities in Ethical Hacking

    I am going to start school in January for my BS degree in IT. I would like to specialize in Ethical Hacking or Computer Forensics. I am familiar with operating a computer and thats about it. What kind of jobs are available to Ethical Hackers? Who hires them? I have an investigative side to me and...

    ARKANSASMARINE15 pointsBadges:
  • Preparing an Assumption Risk Report

    Good Morning, I'm fairly new at my postion as an Information Security Officer (ISO) and I wanted to know how to prepare a letter to the Designated Aproving Authority (DAA) on the "Risk Assuptions" or " "Statement of Residual Risk". There are items on my Plan of Action and Milestone (POA&M) that the...

    Jay249690 pointsBadges:
  • Unauthorised deployment, MS Hotfix’s remotely deployed via CMD, non-stop silent system file corruptions, unattended installations – how can I protect?

    Hi, I could really use some help securing my systems. I have been having some problems with deployment functionality being used to effectively supercede the BUILTIN Administrator accounts in my systems, limiting it’s privileges substantially.   About 9 weeks ago, I noticed my Permissions were...

    Goscuter130 pointsBadges:
  • Lotus notes ciphered message & TDES encryption strength

    How I can confirm that cross certify Lotus messages are comply with TDES encryption strength (and the ciphertext form acceptable is encrypted using the KEK)?

    Stero15 pointsBadges:
  • Network based appliance for AntiVirus and AntiSpam ?

    we are small business company with 45 computers. we have been using Symantec Antivirus all these years on workstations & Servers. we have microsoft exchange email server- so we use the symantec mail security for MS exchange as well. We wanted to migrate to a newer or better solution. 1) Wanted to...

    Johnpau20135 pointsBadges:
  • WEP crack software

    What is a good WEP crack program that works on windows 7?

    BrianC15 pointsBadges:
  • One shared My Documents Folder for all users

    How can I set up a Windows workstation that is used by many people, who are now using a group logon, to save files to one My Documents folder if they are forced to log on inidividually? I need to be able to track whom does what and when but cannot do it with group logon and the Program Manager...

    Radsie5 pointsBadges:
  • Multiple users accessing KVM

    How can I have multiple users access our kernel-based virtual machine at the same time? Can we use some sort of screen sharing to get around the 1 user at a time limit?

    NewnanIT1,110 pointsBadges:
  • exchange 2003 incoming email connection refused

    Hi all and thanks in advance, I'm having an issue with a SBS2003 with exchange 2003.  I've set up a new web domain name which we are going to use within the recipient policy.  They already have several domain names so nothing new but, with the new domain name I'm getting a bounch back saying the...

    Autumncs55 pointsBadges:
  • How is my web hosting company’s ftp server setup?

    I'm trying to figure out how my web hosting company's ftp server that allows access to my web site is setup. I have ssh access so I can see some of the system files. I'll share some of these system files in order to help figure out how there ftp server is setup. bash-3.2$ whoami my_username...

    Ingram871,285 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following