• Advanced firewall design

    suggest me some techniques regarding to the firewall design

    Asu30 pointsBadges:
  • Juniper SSG550 Firewall – Routing Policy

    It's required to create a new (virtual) interface (with a global IP) that will receive hits and route them to a specific IP behind the INside interface. So basically a policy or route that will do: 1- User opens browser for www.test.com 2- DNS registered to point to our global IP on the new VIP on...

    TaherAfridi5 pointsBadges:
  • Scanning outbound emails

    We have been compromised and one email account is internally sending out a lot of spam. We shut it down and another machine popped up infected and doing the same thing. How can we scan all out bound emails for spam just like incoming email? We use a barracuda 300 spam firewall.

    ITKE344,875 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Blocking cell phone activity or wireless broadband cards from within our server room

    Is it possible to block cell phone activity or wireless broadband cards from being able to function within our server room to prevent data theft? Is there a way to capture what they are trying to send? Can I have activity set off an alarm?

    ITKE344,875 pointsBadges:
  • Blocking unsecured networks

    When I am scanning for wireless networks in my companies head quarters we see all sorts of unsecured outside networks. How can we prevent them from showing up and infiltrating our offices?

    ITKE344,875 pointsBadges:
  • Bachelor of Science in Security System degree? is it worth it?

    Hello everyone, completely new here so here is my question...I just finished my associate degree in Information Technology and starting my BS in Security System in Criminal Justice in fall 2010. I want to get in to IT Security (Computer Forensic/Security) kinda thing. Here is a list of some course...

    Shah9915 pointsBadges:
  • How do I password protect my work email in Outlook?

    I want to password protect my work email on Outlook. How do I do this?

    Sjcgpainting5 pointsBadges:
  • Spamming

    There is 1 ip because of that spamming is generated so what can i do to resolv the problem.

    Agt45 pointsBadges:
  • Benefits of VLANs?

    What are virtual lans or vlans? What are they used for and will they allow me to increase my networks overall speed and throughput ratio?

    ITKE344,875 pointsBadges:
  • Adjusting default inbox

    I have 4 email accounts. All four show messages when Inbox is highlighted in T-bird. But when I start T-bird, it automatically goes to my default account (1 of the 4) rather than to Inbox so I can see all msgs. How can I make it go to the Inbox when T-bird starts up so that I can see all my msgs?...

    Retlas5 pointsBadges:
  • Encryption routing within an exchange server

    How do we configure exchange 2003 or 2010 to forward email with subject line [secure] out of the exchange server and to our encryption box. All email in and out of our enterprise encrypts just fine, but email among users within the same exchange server dont get forwarded to out of then exchange...

    TonyLucich5 pointsBadges:
  • Is there anyway for a standard operating system to know the computer name of the physical server it is running on?

    Is there any way for a standard operating system running on a virtualized server to access the computer name of the physical server?

    Jim4522820 pointsBadges:
  • Network documentation/Diagram

    I am curious as to how others are documenting their network; both visually and configurations. I am familiar with MS Visio for drawing the network. Are there better options? What about documenting all equiptment? IP addresses? Settings? Changes? I am just using MS Excel/word to create all sorts of...

    Skepticals0 pointsBadges:
  • Connecting to VPN over an unsecured network

    When connecting to a remote VPN over an unsecured network am I putting the VPN server at risk when transmitting credentials? What is the preferred method of connecting to VPN over unsecured network?

    MelanieYarbrough6,345 pointsBadges:
  • Where do I enter my network password?

    I have windows xp I can see my network but cannot find where to put the password in...can you tell me how to find it?

    Postacey5 pointsBadges:
  • Setting up wireless network at a remote office

    When setting up my wireless network at a remote office what steps should I take to make sure it is secure and no one else can access the routers web console and change port forwarding and firewall rules? Is there a check list somewhere?

    ITKE344,875 pointsBadges:
  • How can I see what users are connected to my wireless network?

    How can I see what users are connected to my wireless network? I am running a sonicwall tz170 for wireless connectivity. Is there a place I can see which machines are connected? Host name and dynamic IP? Can I export this information as well?

    MelanieYarbrough6,345 pointsBadges:
  • Checkpoint firewall and Exchange 2010 CAS

    What is best practice for OWA, EAS and Outlook Anywhere through a NGX R65 HFA70 firewall?

    Rcivil5 pointsBadges:
  • Scanning incoming files to the FTP server

    I need to scan all incoming files to the ftp server (Windows 2000) before they are written to the drive. Normally the files are saved then scanned. Can I implement some sort of quarantine until they are cleared?

    ITKE344,875 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following