In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, “Unfortunately, many security practitioners don’t fully understand encryption due to the technology’s ill-deserved reputation as the unapproachable domain of mathematicians and cryptographers.” Do you agree? And what encryption task do you find most challenging: Securing websites? Encrypting email? Protecting laptop data? Implementing VPNs?
Answer Question | May 1, 2010 8:34 PM
Encrypted email, Encryption, Encryption key management, Midmarket security
I AM NOT FAMILIER IN ISA,IN WHICH OPTION IN ISA I CAN RESTRICT INTERNET ACCESS?INCLUDING CLIENT SETTINGS.
Answer Question | February 16, 2010 3:43 PM
Blocking websites, ISA, ISA Server, Microsoft Internet Security and Acceleration Server
What does syncronising the two different passwords mean? For example: What does the folowing paragraph mean? “All three groups of users may now receive an error or be prompted for a password. In this case, the user should enter their network password (the one they use when they first log onto the network with their [...]
Answer Question | February 15, 2010 2:36 PM
LDAP, Password synchronization, SAP, SAP user authentication
how can i by pass cmos password for my dell
Answer Question | September 20, 2010 11:36 AM
CMOS, User authentication, Windows authentication, Windows XP
We forget our system administrator password. Kindly advise how to open the system
Answer Question | June 26, 2012 7:27 AM
Microsoft System Administrator, Password recovery, System administrator, Windows authentication, Windows password recovery
Do you have an official policy on unauthorized wireless networks in your environment? How do you go about detecting and disabling unauthorized devices, and what are the consequences? How often do you encounter this problem in your business?
Answer Question | February 23, 2010 8:51 PM
Network performance, Network permissions, Network security, Network Security Management, Wireless LAN, Wireless networks, Wireless routers, Wireless security
[strong]I want to become an IT Auditor and want to come to a [em]management level[/em]? What course should I do afer finishing CISA that will help me grow financially, and will increase my salary?How can I come to a management level in a company/bank?Please help me find the right path. I want to know what [...]
Answer Question | February 25, 2010 5:45 PM
CISA, IT training and certifications, Security certifications
What is the difference between NAC and 802.1x? Can you implement 802.1x without NAC? My understanding is you could implement a NAC solution not utilizing 802.1x but not the other way around. Thanks Rick McGee
Answer Question | February 13, 2010 4:20 PM
802.1x, Cisco networks, NAC
Sir/Mam, Is there any Career in Ethical Hacking. If so then please guide for me the same. I am in the Final year of Computer Engineering from Mumbai University.
Answer Question | February 23, 2010 3:48 PM
Information Security Career, Security careers
We have a number of mapped network drives and one of them is l linux mapped drive. When users search they tend to search all drives. When the Linux drive is searched it slows the linux server down for all users. How can I prevent them from searching a drive letter? I found this but [...]
Answer Question | February 25, 2010 10:01 AM
Group Policy, Network permissions, Windows Server 2003, Windows Server Permissions, Windows XP
Hi is the any application which can audit machines on the network.
Answer Question | February 23, 2010 7:15 AM
Auditing, IT auditing, IT auditing software
Can a Sniffer port with port mirror configured pass data traffic?
Answer Question | February 10, 2010 4:42 PM
Network connectivity, Network Monitoring Tools, Network security, Sniffer software
A large company is working on a new project that requires cloud computing. If they utilize their private network they can reasonably assume their data to be secure, given that all protocols with remote access are followed or the private network does not allow remote access.
Answer Question | December 16, 2011 8:21 PM
Cloud Computing in 2010, Cloud computing security, Knowledge Point Challenge, Security
I’m hoping to find a solid, inexpensive network auditing tool for virtual networks as prep for a HIPPA compliance audit. Does anyone have suggestions of open source or pay tools they’d recommend? Do I need to pull in an outside party for this?
Answer Question | March 9, 2010 6:48 PM
Cloud Computing, Cloud Computing in 2010, HIPAA, Knowledge Point Challenge, Virtual networking
With so many people worry about virus/spam out in the cloud and looking for a safe haven would this reduce the below work to reduce virus/spam. Windows has a rep for having virus, so if I decide to use a Mac and install Windows as Virtual. Would any virus or spam be stop by the [...]
Answer Question | February 9, 2010 4:13 PM
Cloud Computing in 2010, Mac OS X, Windows Security, Windows Virtualization
Hi, I have newly joined an AUTOMOBILE company as an IT supervisor. We have about 10 branches connected with each other thru different WAN connections (Leased line,MPLS,VPN over DSL,..etc) and with different service providers. Our ERP system is based in Head Office and the DMS (Dealer management system) is based in our main branch. I [...]
Answer Question | April 13, 2010 2:32 PM
ISA Server, ISP, Lotus Domino, SAP, WAN, WAN Connections, Windows Server 2003
The latest buzz around Cisco is that its latest iteration of its emulator OS, IOS 15, will help the company crack down on the use of its IOS emulator without plugging in a product key — something many home network pros and enterprise network managers have relied on until now, especially when needing to map [...]
Answer Question | February 8, 2010 9:00 PM
Cisco, Cisco IOS, Cisco IOS Emulator, Cisco Routers, IOS, IOS 15, Network hardware, Open IT Forum
Here are the most popular blog posts on the ITKnowledgeExchange network this week. Read the rest of the top 10 on the Community Blog, or apply for your own blog by e-mailing me at Michael@ITKnowledgeExchange.com. 1. How to allow the root user to log in to VMware ESX Server with SSH David Davis’ how-to on [...]
Answer Question | February 4, 2010 4:49 PM
AS/400, Channel, CIO, CRM, Database, DataCenter, DataManagement, Development, Exchange, ITKE, Linux, Lotus Domino, Microsoft Windows, Mobile, Networking, Oracle, SAP, Security, SQL Server, Storage, Virtualization, VoIP
we downloaded a file in .iso format, but were expecting a .exe. what is .iso?
Answer Question | February 5, 2010 4:54 PM
Disk image, File formats, ISO
Can anybody enlighten me about what kinds of things are in a real SLA for a cloud? I’m primarily interested in performance and availability. My reason for asking: A research group I’m becoming affiliated with has a neat technique for optimally scheduling tasks to provide realistic guarantees on completion. The nice part is that they [...]
Answer Question | February 10, 2010 1:52 PM
Cloud Computing in 2010, Cloud Services, Knowledge Point Challenge, Service Level Agreement