• Remote printer service pose security risk?

    The IT auditors have pointed some of my boxes (SUSE, Solaris 10 and AIX) have [strong]remote printer service[/strong] running and that is a potent security violation. I am confused what is remote printer service and how do I disable the same. I need the help. A prompt response is appreciable.

    RanaSarkar30 pointsBadges:
  • Software firewall that act like hardware firewalls

    i'm looking for a software firewall that filter on a layer 3, filtering by ip/mac/ports only, and ignore completely from files and folders. i tried to config windows 7 firewall and comodo to act like that, but both of them continue to make "decisions" and rules depending on files and applications.

    V470510 pointsBadges:
  • Management of root password in Linux & Unix environment

    Any reference available on best practices for managing root access & passwords in unix & linux env. ?  

    ed15 pointsBadges:
  • Tool for determining how many SIP proxy servers are needed for installation

    How can we determine how many sip proxy servers are needed for a new installation? Is there a tool for this?

    TeachMeIT975 pointsBadges:
  • Do I disable DHCP on my router to create a Windows or DHCP server?

    Do I have to disable DHCP on my router in order to be able to create a DHCP server or a windows server? And how would I configure each?

    NetworkingATE1,545 pointsBadges:
  • Securing a virtualized network

    What's new out there in securing a virtual network? I've done some research and found ALTOR but they've been purchased by Juniper so their product may soon be intergrated with their routers and switches. I'm looking for a defense in depth solution to my question.

    JMan785 pointsBadges:
  • Central security server for WiFI based on mac address?

    Is there a central security server for wifi that will only allow corporate clients or employees on the network automatically based on mac address?

    NewnanIT1,110 pointsBadges:
  • Segmenting a piece of our Windows network

    How can we segment a piece of our Windows network so users from the same subnet can not access it but people on that side of the network and a different subnet can. Currently they can communicate freely between each other.

    NewnanIT1,110 pointsBadges:
  • Is it right to do faculty job after CCNA?

    I am CCNA certified and I want to earn some experience.  Many companies prefer experienced CCNA candidates. So I am planning to join CCNA faculty job in any Computer Hardware and Networking institute to earn experience and then join any company for the post of network engineer. Can companies...

    Yjr15 pointsBadges:
  • Intervlan connectivity

    Hi All, I'm looking for solution/help to solve this issue. Scenario: Two vlans (Data & Voice) are created in my switch (3560). I 've voice router (2900 series) & braodband gateway which connects to the service provider. [strong]Note: Two vlans are connected to two different interfaces of a router...

    RGPrakash170 pointsBadges:
  • Open IT Forum: What IT conferences are you attending this year?

    Below is a list of the conferences IT Knowledge Exchange is planning on attending in 2011. If you or your company is planning on attending any of them, we'd love to see you there. Let us know if our schedules match up, or tell us which conferences you are going to. RSA Conference, February...

    MelanieYarbrough6,345 pointsBadges:
  • Need a stable wireless router – what one to get

    I currently have a D-Link WBR-2310 serving as the outside router for my network, and it likes to reboot irregularly. Sometimes it reboots a couple times a day, causing disruptions for our users who complain mightily. I've updated firmware to the latest (v1.05) and it continues to reboot...

    Fishmahn55 pointsBadges:
  • Inbound traffic is coming from router IP, not internet IP. Why?

    Hello, thank you for your time. I have recently noticed a strange occurence going on with inbound traffic. The other day, I helped my friend set up his network. icmp ping was good. while sniffing, I first noticed inbound tcp traffic to me was not coming from my friend's IP address, but coming from...

    Robert5795 pointsBadges:
  • TrendMicro vs Symantec experiences

    Hi everyone, Some years back, I did a rather exhaustive test to anti-virus software for small to medium business with support for MS Exchange (cleaning and filtering purposes). After some steps and iteractions with vaious products/vendors, TrendMicro and Symantec reached the point of my choosing....

    saturno4,585 pointsBadges:
  • Careers after MCSE certification

    Hi all, i m mcse certified and having good knowledge but not getting any job because every company require too much like third party products whereas no any institute teaches those. so, please help you out coz i m really in dilemma what should i do or to change my line to programming. thankx in...

    Yogender270 pointsBadges:
  • Lotus Notes Database encryption

    Is Lotus Notes encryption linked to the computer on which it is installed? I just moved to a new computer and now there is no access to the database.

    MJK265 pointsBadges:
  • What is the” Progam FilesExchsrvrMailrootvsi2UceArchive” folder?

    My antivirus scanner found a few viruses with on our exchange server. The files had a .eml extension and they were located in the " Progam FilesExchsrvrMailrootvsi2UceArchive" folder. I assume they are emails, but what is this folder for and why are there 2GB of .eml files in it?

    Ingram871,285 pointsBadges:
  • Firewall receiving PINGS from a non-public IP address

    My firewall has been receiving and blocking PING's from the following IP address: 10.40.16.145. This address being a non-public IP address, I'm a bit confused. First, how does this data traverse the Internet when the originating IP address is not a standard public address? Is there any way to...

    Tswirka155 pointsBadges:
  • Bachelor of Science in Security System degree? is it worth it?

    Hello everyone, completely new here so here is my question...I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing.   Here is a list of some...

    blazes0ldja100 pointsBadges:
  • Free IT Book: Drupal’s Building Blocks

    Today's free IT book is an essential addition to any developer's library: Drupal's Building Blocks. Learn how to quickly build web sites with CCK, Views, and Panels, all by answering one of five questions and posting the link to your answer in the discussion area below. A particular IP range cannot...

    MelanieYarbrough6,345 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following