• ECPI college…good or bad

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design and computer science and I'm wondering if ECPI or any...

    TripleHHH0 pointsBadges:
  • ECPI college…good or bad-2

    Good Evening: I've recently completed 8 years in the US Navy and I'm looking to complete my degree and I see a lot of talk about ECPI college. It's a technical college but it's a 2-year degree. I'm looking to get into computer network design, internet security and computer science and I'm wondering...

    TripleHHH0 pointsBadges:
  • has anyone had issues with appliances getting cracked?

    We have a mcafee anti-virus and anti-spam appliance. We used it as out internet email presence and as a web proxy. All email comes in thru it and all web traffic from our internal web proxy went thru it. The web proxy is limited to less than half of the internet bandwidth. It is behind stateful...

    Astronomer15 pointsBadges:
  • Pix Firewall and Proxy Server

    I need to allow only one IP address (the one for proxy server) to browse through Pix firewall to Internet. What will be the commands in PIX firewall to block the traffic to Internet from all the network 10.2.1.x but only allow 10.2.1.10 (Proxy server). All other computers will use proxy server...

    EngineerIT0 pointsBadges:
  • Windows 2000 Server logs

    Hi All, Basically i want to monitor all the activities of my administrators. Is there any way I can find out all the activities on a Windows 2000 Server eg:- success / failure logs ,which users had logged on to a server , user creation time ,service stopped at what time, what scripts have been...

    Tarang0 pointsBadges:
  • IT Security

    Hi all, Thanks to all those who answered to my question"FTP sites" Can anyone of you let me know about the available products that we can use for our organisations IT security..Also let me know what products are available to find out vulnerabilities in a network. Appreciate your response. Thanks...

    Tarang0 pointsBadges:
  • DSO exploit in Windows XP reported by Spybot – Search and Destroy

    After updating both Windows XP and Spybot - Search and Destroy, the latter is reporting DS0 exploit registry entries on two computers not colocated on a network. Could this be as a result of a vulnerability being introduced with the August Windows XP security patches? Can you comment on the...

    Railroad0 pointsBadges:
  • Need guidiance from pros already into the game

    Hi, I am a United Stated Marine stationed overseas since 2003, majoring in Information technology with National University. I am still an idiot in the field and thats why i joined this group. To get a glance of what to ecpect in the future. I am asking for your help in guiding me through whatever...

    Foguno0 pointsBadges:
  • Local Admin & passwords

    We have recently switched to allowing only Power User rights on notebook computers. We have a set of notebooks we loan out to employees with desktops when they need to travel. Currently those users will login with an account named loaner and use scripts and webmail to access the network. Discussion...

    Roced40 pointsBadges:
  • OWA using SelfSSL and Certificate Services removal

    Hey there... I am curretly running Exchange 2003 on W2k3 member server. I installed Certificate Services and produced my own certificate and all works well with OWA. I recently found out that SelfSSL is available but not quite as robust, which would probably be good. I removed Cert services and was...

    TheVyrys0 pointsBadges:
  • Shares Baseline Security Information

    Hello, I use the Microsoft Baseline Security Analyser 2.0 to retrive information about shares in some local servers. I can not understand the diference between the information give in the report, about authorizations in the column Share ACL and Directory ACL. If some one can help me, Thank you PPG

    ITAudit0 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:
  • MS Office Outlook 2003 Address book

    I use MS office outlook 2003 but this is not adding the e-mail addresses to the address book/contacts automatically when I reply to someone. This feature is available in Outlook express but I didn't find this feature in MSOO 2003. Is there any simple way I can add e-mail ids to contacts /address...

    BinooDas123410 pointsBadges:
  • MS Exchange Mail Queues Constantly being Filled

    I have an MS Exchange 2000 Server that was being used as a mail relay. This was stopped and the mail filtered from the spam. The problem is that the mail queues keep getting filled up. I have even disconneted the server and emptied the queues but they still just fill up again. I have no idea where...

    Scotty670 pointsBadges:
  • DOS attack, DNS question

    My question has two parts, first: today at the place where i work we lost the internet, and after checking the firewall (sonicwall, this is a non profit organization so they cant afford the best stuff) i discovered it was more than likely a DOS attack. nobody could access the internet, and i could...

    KJC48550 pointsBadges:
  • Access to security log in Windows 2000

    In my company we want to give full access to the security log of Windows 2000 only to the security manager, but we want to give only read access to the support people, Is there how to do it ?

    Feaxavier0 pointsBadges:
  • Event viewer err Msg.

    Good day, 1.In our organisation, we are using windows2000 smallbusiness server with EXCHANGE , ISA server and DNS configured. but all the client pc's are given static ip address instead of dynamic ip. will this create any problem ? daily i'm receiving many application error logs.particularly 2 type...

    GiriPrasad0 pointsBadges:
  • What’s your experience with Microsoft tech support?

    I'm doing some research on the effectiveness of Microsoft's technical support, possibly for an article on SearchWindowsSecurity.com. Our site readers continually need help troubleshooting Windows security dilemmas. Some seem to find what they need on Microsoft's Web pages, and others don't get...

    RobynLorusso230 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following