• How do you protect a server against Denial of Service attacks?

    How do you protect a server against Denial of Service attacks? What techniques do advanced firewalls use to protect against DoS/DDoS attacks?

    ITKE346,360 pointsBadges:
  • Is it really necessary to block outgoing ports?

    I've been told that when I'm setting up my home network, I should make sure that all outgoing ports on my router should be blocked, although I should allow certain ones to open to support HTTP, HTTPS, etc. This even though I have a firewall in place. But is this really necessary if every computer...

    ITKE346,360 pointsBadges:
  • Connecting VPN PC to a PC having broadband connection

    I have BSNL VPN connection in my office and I have a broadband internet connection in my home which is 2 km away. I want to do my office work even in my home. Suggest me the ways to get connect with my office BSNL VPN ADSL router. Thank you.

    arun19335 pointsBadges:
  • How to overcome the target release constraint?

    It is our intention to FTP objects between IBM iSeries v6r1 and IBM iSeries v3r2. But when we create the SAVE FILE in IBM iSeries v6r1, in specifying the target release, We can at most stepdown to v5r3. Does anybody know how to overcome this constraint? We want to stepdown to v3r2. Thanks

    kennethc15 pointsBadges:
  • how can i configurate my nokia 620 to be accessible to network

    nokia620

    japheth5 pointsBadges:
  • Does a Firewall that allows ICMP pose a security risk?

    What are the security implications for a firewall that allows ICMP? Are there times where it should be turned off?

    ITKE346,360 pointsBadges:
  • Testing stateful firewall with TCP/IPv6

    This may seem as a general question but I'm wondering how experienced users actually test "stateful firewall" with TCP/IPv6. I would include these two tests:Echo reply without requestTCP ack without synIs there anything else other than this? Especially that pertains to IPv6?

    ITKE346,360 pointsBadges:
  • Proxy Server

    I'm using a Lenovo computer. This computer has a WiFi Network but it's not connected to the proxy server. The problem is happening anytime I open any web page.

    rameshselvaraj50 pointsBadges:
  • What is a VPN tunnel?

    What is a VPN tunnel? What's the difference between a VPN and a VPN tunnel?

    SearchEnterpriseWAN1,080 pointsBadges:
  • Router distance by GHz#

    Yes, I am basically router illiterate, so here is my question. I have a D-Link DCS-930L camera that we want to put on a stall wall to see the horse and foal in the stall. We deliver horse babies. Now, the Netgear Wi-Fi and booster that we have in the house is approx. 400' from the camera. Can I...

    neverdull5 pointsBadges:
  • Edge Router Firewall Question

    Is there a reason why I should run VPNs and Reflexive ACLs on a firewall with NAT + routing functions on the router, if the router alone can take care of it?

    ITKE346,360 pointsBadges:
  • Regarding Black-Listed IPs

    What unsuspecting users can do if they received a bad or hacked IP from their ISP.

    aasalem70 pointsBadges:
  • CCNA: Mobile telecom networking

    Is CCNA helpful for mobile telecom networking?

    saifullah5 pointsBadges:
  • How do I change my wireless router setting such as name and passwords

    How do I change my wireless router settings

    rodrigolujano5 pointsBadges:
  • Is VPN ID a login ID?

    What do you mean by VPN ID? Is it a login ID

    Autorobinc5 pointsBadges:
  • What are the disadvantages of the layered protocol approach?

    What are the disadvantages of protocol layering?

    NetworkingATE1,545 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE346,360 pointsBadges:
  • usb communication

    Sir/Madam, We are having 2 systems with windows as operating system. We need your help for transferring data from USB to USB Port. plese give max. possible ways. Thanking You, Appala Raju

    Appalaraju0 pointsBadges:
  • what is mean by proxy and proxy exception???

    any one can help this

    thiyagu1905 pointsBadges:
  • Detecting / Reacting to DNS tunnels

    Lately, I've been seeing a lot of talk discussing TCP/IP over DNS requests (usually because port 53 UDP is open and unfiltered). What techniques are out there to detect and block such tunnels? Have you seen such tunneling on a network before?

    ITKE346,360 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following