• User Can’t Delete a folder on the network Drive

    AOA Sir i have share three folders on the networks and ther e folder contains sub folder and sub folder contains files . i have set permission on the folders in sharing and security and deny Delete and Delete subfolder permission. but proble is that when user access the file and made change in...

    Muhammad usman125 pointsBadges:
  • How to control external vendors from connecting to our internal LAN?

    I have a few vendors who are located at other plant. I would like to block their access to our internal network using their own notebook. How can I go about? We are using different IP addresses for all the buildings. As some of the clients are connected to this IP address, it's not possible for us...

    Khoo5 pointsBadges:
  • Passwords

    Hi all, What do you recommend for initial password issue, that is, provided a new user with a password for the first time without compromising it. I find the entire help desk giving password initially or sysadmins doing that is not save enough even though the user will be prompted to change it at...

    Bangim0 pointsBadges:
  • Allow regular user to unlock screensaver locked computer

    We have the problem that in a multiuser environment users either lock their computers, or have the screensaver automatically lock it, and leave the workstation. As a result, nobody else can use that computer. By default, only the current user or an adminstrator can unlock the computer. I would like...

    AdminGurl0 pointsBadges:
  • Compliance to Acts

    How can softwares for url/content filtering or mail scanning be made compliant to HIPAA , Sarbanes-oxley act etc. ... What all features are required to be implemented to make them compliant ????

    Rohitmagazine0 pointsBadges:
  • Moving into the InfoSec role

    I work at a company that currently does not have a position dedicated to information security. I come from a background in networking with a good portion of my focus on firewalls and other security related technologies. I am interested in positioning myself into the role of InfoSec Admin at my...

    Kushalp0 pointsBadges:
  • Blue Socket Gateway and Certificates

    We are currently attempting to implement a Blue Socket Gateway in order to authenticate our wireless clients. I have been instructed by Blue Socket that the certificate used by them will not work through a NAT translation and that I should put this device on the outside of my ASA firewall....

    Skepticals0 pointsBadges:
  • SECURE FTP SITE ON Windows 2003

    We have a Windows 2003 IIS server setup behind our firewarll which is a PIX firewall. What is the best method to establish a secure FTP site on this IIS server? I have reviewed this topic on the internet and actually talked with somebody from IPSWITCH and the best method available is to purchase a...

    Mconfer0 pointsBadges:
  • terminal server and gpo

    i have a server 2003 that configure as a terminal server, and i want implement a strict acess to this server from client (xp pro) to that server, i create ou that called "for terminal users" and create for that ou a gpo, now,, i want to know how should i change the gpo to achive the next goals: 1....

    Drorbeny0 pointsBadges:
  • Port 1894

    Hi, Our port scanner has detected '1894' as an open port. We know 1894 is an 'O2Server' port. Could you please throw some light on the port '1894'? Thanks kbs

    Hellokbs0 pointsBadges:
  • Laptop Security…

    Hi, I am the head of my department and by the nature of the job I hold some confidential information on my laptop. How do I ensure that 1. Nobody can access any files on my laptop from the LAN or the internet (not even sys admins) 2. If somebody tries to access, can I find out /trace who it is or...

    Blackmagic0 pointsBadges:
  • Network Resource Allocation cum Planning cum Technical Problem

    This is the real commercial problem face by my company. Well, the reason I ask this problem is I salute and respect all of you as I believe all of you are as good as network solution company out there, or even better!! Lets me rephrase the entire problem again. Company expand so fast that the IT...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure-2

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Design NEW network cum NEW IT infrastructure

    Company expand so fast that the IT infrastructure is not fast enough to cater high volume of traffic; the initial design is not scalable. The number of new branch offices setup caused the company pay a high price in the leased line communication. Salesman and management staffs dial into company...

    Hunkgym5 pointsBadges:
  • Laptop Security (Remotely)

    Hi, I am an Information Security Consultant. We want to monitor all activities done by Laptop Users when they are working offline. Can somebody suggest a tool which can push all logs on server while a user is working offline. We have banned USB sticks in our office and also all email activity is...

    Tarang0 pointsBadges:
  • route mail with fax service in sbs 2003

    i have a sbs 2003 on my network and i configure him to get all the fax of my company, the only problem is that when i configure him to route all the incoming fax to some mail it does not seem to work, i check the event log and i get error 32083 and with this massage: Unable to route fax C:Documents...

    Drorbenyosef5 pointsBadges:
  • MSWord Password and MSExcel Password

    I am using different password for my secured files but I loose which one i use in certain file. Now I can not retrieve it. Is there any way i can open it again or retrieve my password so I can open my files? I have little knowledge in VB6, is there any one generous to give me a source code about...

    Cydean20060 pointsBadges:
  • Blocking music on internet connection

    Hi all, I have some internet users who listen to online radio stations. I have asked them not to do it, as I feel like it probably uses up a fair amount of bandwidth. Is this correct, or does it use very little? Also, other than purchasing and installing software, is there a way to block music?...

    TheVyrys0 pointsBadges:
  • Connection Management

    Hello, I am working on a project that we have a deployed a Personal Firewall product on laptop users. The Personal Firewall allows us to define a server based access profile or FW rules for each type of connection and IP range. ie. Ethernet, WLAN etc. The issue is this personal FW activates BOTH...

    Mkimonos0 pointsBadges:
  • Penetration Testing Career

    Hi Friends I want an advice from you guys. I have work exp in Web Developement and Quality Assurance. But my interest lies in security and penetration testing. Could you guys guide me where to start from. If there is any good material which can help me doing the same or some site where I can...

    DrDevil0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following