...234567
  • Authorization in MIGO

    I would like to grant a user authorization to object S_TCODE MIGO (Goods Receipt specifically for Purchase Order (movement type 101) where they could then enter any related data but restrict their activity to HOLD. A subsequent user would have the authorization to POST the document. I have checked...

    CoCamo0 pointsBadges:
  • MS Office Outlook 2003 Address book

    I use MS office outlook 2003 but this is not adding the e-mail addresses to the address book/contacts automatically when I reply to someone. This feature is available in Outlook express but I didn't find this feature in MSOO 2003. Is there any simple way I can add e-mail ids to contacts /address...

    BinooDas123410 pointsBadges:
  • orcing a limit for the internet temp folder in windows 2000

    Hello all, Setup is as follows: Server is NT4, clients are windows 2000 I CANNOT spend any money. All my users log on do all work as normall and then go on the internet. Now all users default size for the internet's temp folders is 596MB!! and the Pc's will be used by 700+ Kids!! As you can guess,...

    Carl0s810 pointsBadges:
  • Security COncern, Files deleted from Server

    Good morning to all, and hope everyone is dooing well. I have a security issue, and need help solving this. Someone in my company within Engineering staff deleted an entire group of folders. Unfortunately it was on a project that ended, and it was discovered this morning. I have luckily a back up...

    ESuazo0 pointsBadges:
  • Data Visibility in RBAC and Rule-based systems issues

    Actually, I have two questions: 1) are there known solutions of how to control access to data ( database records ) in RBAC system where business policy states, e.g., that data belonds to the users in certain geographical are may be viewed by users located in the same area? This is quite actual...

    M3poulin0 pointsBadges:
  • DOS attack, DNS question

    My question has two parts, first: today at the place where i work we lost the internet, and after checking the firewall (sonicwall, this is a non profit organization so they cant afford the best stuff) i discovered it was more than likely a DOS attack. nobody could access the internet, and i could...

    KJC48550 pointsBadges:
  • Access to security log in Windows 2000

    In my company we want to give full access to the security log of Windows 2000 only to the security manager, but we want to give only read access to the support people, Is there how to do it ?

    Feaxavier0 pointsBadges:
  • Restricted access to win XP professional

    I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks...

    BinooDas123410 pointsBadges:
  • Information Security

    1. Could you please send me a portal policy template as we are about to rollout same. Thanks 2. Please send me FTP policy template. I wil then customize it to our environment

    Mofolo000 pointsBadges:
  • Wireless Security

    We are running an NT4 network in one building with about 50 users. I have recently installed a LinkSys WAP with a 32-bit WEP encryption key, so when our sales guys come in with their Thinkpads, they don't have to fight for network points. I have programmed the encryption key into their laptops, so...

    Tinners0 pointsBadges:
  • How to Obtain security information of Win 2003 server folders

    Does somebody know if there is a way to query the Directory database to obtain a listing that includes security and other settings (shares, permissions, etc) of all folders and subfolders of a machine running Win 2003 Server ? Any help or comment will be appreciated.

    carlosdl69,475 pointsBadges:
  • System utility require:to monitor real time user activiry

    does anyone know about the utility which can provide realtime monitoring of user activity.. i.e any creation or deletion of file on network resources, try to take access of another's system/ share etc

    JatinVS0 pointsBadges:
  • Network UserID Creation/Change

    Looking for White Papers, Best Practices, Your Practice...on UserIDs What should a Network UserID look like for strong security? I don't believe it should contain any part of the user's legal name. Agree? So what do you use to create a UserID? Should a user be able to change their UserID? Thanks...

    GPHdo60 pointsBadges:
  • Alternate way to stop Oracle Services on Win 2K Server

    Our database server is a Machine running Windows 2K Server. We make our backups stopping the Oracle Service and then copying the files to other location (and then to tape), but in order to do this, the user loged in on the server must be an administrator, and this is a problem, because the backup...

    carlosdl69,475 pointsBadges:
  • Alternate way to stop Oracle Services on Win 2K Server-2

    Our database server is a Machine running Windows 2K Server. We make our backups stopping the Oracle Service and then copying the files to other location (and then to tape), but in order to do this, the user loged in on the server must be an administrator, and this is a problem, because the backup...

    carlosdl69,475 pointsBadges:
...234567

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following