• Resticting Members of BuiltinAdministrator to just be able to create Domain Trust

    In windows 2000/2003, Can we restrict a BuiltinAdministrators member to have just enough rights so that he/she can only create/delete domain Trust. The requirement that we have is to be programmatically create trust with all the domains in a given forest. The other part of the requirement is to...

    EternalLearner0 pointsBadges:
  • A graduate student in need of help – I would like to know your professional opinion on information security.

    I am graduate student at the School of Information Studies at Syracuse University and am conducting research to gather empirical data on the subject of information security. My goal is to gain a better understanding of what IT professionals believe is an adequate level of information / network...

    Amolet0 pointsBadges:
  • Stuck with WEP – will increasing key lengths help harden WLAN?

    I have potential security issues on my wireless LAN because my equipment is older and I can?t use WPA. I'm worried that my data is vulnerable. If I increase my WEP key length from 40 to 128 or greater, will this help?

    Margaret Rouse1,775 pointsBadges:
  • Is Windows security an afterthought?

    As the editor of SearchWindowsSecurity.com, I often speak with users about their Windows security responsibilities. One senior systems analyst in particular sent me an interesting note recently... To give you some background, he's in charge of configuring and administering desktop systems...

    RobynLorusso230 pointsBadges:
  • How did I get a virus on my computer?

    Do you hear that question or something similar too often? We're taking an informal survery on SearchSecurity.com to find out what the most common security-related user questions are. Results will be compiled into a question and answer tip that you will be able to post or handout to your users. What...

    jwise41020 pointsBadges:
  • Safe user sandbox?

    *This question is from a SearchWindowsSecurity.com reader: I'm in a position to redesign our IT systems (network, servers, PCs, software, etc.) this summer, and I am undecided on which path to take. I'd like to disconnect our systems from the Internet so that we don't have to deal with all of the...

    LMullen0 pointsBadges:
  • Secure Email Delivery Applications

    I am currently searching for the best application or service to provide end to end security for delivering encrypted emails from one company to another accross the Internet. I need the solutions to provide Smime, PGP, TLS, SSL, etc. My goal is to some how have the app or user decide if the email...

    Jclarkfl0 pointsBadges:
  • Front-End Reporting Tools for Secure Web Service Application with MS-SQL server

    Hi... We are a Cdn Govt agency involved in Satellite Operations with a commercial partner based across the country. We will need to build/buy a small web service application for reporting purposes that will require minimal IT experise to build or maintain. The back end RDBMS engine is built with MS...

    Mmosystem0 pointsBadges:
  • Authorization in MIGO

    I would like to grant a user authorization to object S_TCODE MIGO (Goods Receipt specifically for Purchase Order (movement type 101) where they could then enter any related data but restrict their activity to HOLD. A subsequent user would have the authorization to POST the document. I have checked...

    CoCamo0 pointsBadges:
  • MS Office Outlook 2003 Address book

    I use MS office outlook 2003 but this is not adding the e-mail addresses to the address book/contacts automatically when I reply to someone. This feature is available in Outlook express but I didn't find this feature in MSOO 2003. Is there any simple way I can add e-mail ids to contacts /address...

    BinooDas123410 pointsBadges:
  • Security COncern, Files deleted from Server

    Good morning to all, and hope everyone is dooing well. I have a security issue, and need help solving this. Someone in my company within Engineering staff deleted an entire group of folders. Unfortunately it was on a project that ended, and it was discovered this morning. I have luckily a back up...

    ESuazo0 pointsBadges:
  • Data Visibility in RBAC and Rule-based systems issues

    Actually, I have two questions: 1) are there known solutions of how to control access to data ( database records ) in RBAC system where business policy states, e.g., that data belonds to the users in certain geographical are may be viewed by users located in the same area? This is quite actual...

    M3poulin0 pointsBadges:
  • DOS attack, DNS question

    My question has two parts, first: today at the place where i work we lost the internet, and after checking the firewall (sonicwall, this is a non profit organization so they cant afford the best stuff) i discovered it was more than likely a DOS attack. nobody could access the internet, and i could...

    KJC48550 pointsBadges:
  • Access to security log in Windows 2000

    In my company we want to give full access to the security log of Windows 2000 only to the security manager, but we want to give only read access to the support people, Is there how to do it ?

    Feaxavier0 pointsBadges:
  • Restricted access to win XP professional

    I have a small WORKGROUP with windows 2000 server and 5 windows XP professional systems. All computers can read/write each other. Now I want to make one XP client secure/restric access, so that no other computer can access that except only other XP computer. How can I do that? Please advise. Thanks...

    BinooDas123410 pointsBadges:
  • Information Security

    1. Could you please send me a portal policy template as we are about to rollout same. Thanks 2. Please send me FTP policy template. I wil then customize it to our environment

    Mofolo000 pointsBadges:
  • Wireless Security

    We are running an NT4 network in one building with about 50 users. I have recently installed a LinkSys WAP with a 32-bit WEP encryption key, so when our sales guys come in with their Thinkpads, they don't have to fight for network points. I have programmed the encryption key into their laptops, so...

    Tinners0 pointsBadges:
  • Network UserID Creation/Change

    Looking for White Papers, Best Practices, Your Practice...on UserIDs What should a Network UserID look like for strong security? I don't believe it should contain any part of the user's legal name. Agree? So what do you use to create a UserID? Should a user be able to change their UserID? Thanks...

    GPHdo60 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following